From dc40901ab7dc1897060fa271eaf7b5ffe31c6172 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 24 Mar 2025 15:03:55 +0000 Subject: [PATCH] Auto-Update: 2025-03-24T15:00:22.415164+00:00 --- CVE-2020/CVE-2020-243xx/CVE-2020-24312.json | 6 +- CVE-2021/CVE-2021-241xx/CVE-2021-24177.json | 6 +- CVE-2022/CVE-2022-481xx/CVE-2022-48110.json | 32 ++- CVE-2024/CVE-2024-06xx/CVE-2024-0698.json | 74 +++++- CVE-2024/CVE-2024-07xx/CVE-2024-0761.json | 6 +- CVE-2024/CVE-2024-10xx/CVE-2024-1013.json | 81 ++++++- CVE-2024/CVE-2024-138xx/CVE-2024-13816.json | 42 +++- CVE-2024/CVE-2024-139xx/CVE-2024-13903.json | 89 +++++++- CVE-2024/CVE-2024-139xx/CVE-2024-13918.json | 76 ++++++- CVE-2024/CVE-2024-139xx/CVE-2024-13919.json | 76 ++++++- CVE-2024/CVE-2024-13xx/CVE-2024-1379.json | 74 +++++- CVE-2024/CVE-2024-14xx/CVE-2024-1473.json | 74 +++++- CVE-2024/CVE-2024-202xx/CVE-2024-20292.json | 63 +++++- CVE-2024/CVE-2024-203xx/CVE-2024-20301.json | 63 +++++- CVE-2024/CVE-2024-23xx/CVE-2024-2316.json | 76 ++++++- CVE-2024/CVE-2024-23xx/CVE-2024-2317.json | 86 ++++++- CVE-2024/CVE-2024-252xx/CVE-2024-25269.json | 34 ++- CVE-2024/CVE-2024-25xx/CVE-2024-2584.json | 51 ++++- CVE-2024/CVE-2024-25xx/CVE-2024-2585.json | 51 ++++- CVE-2024/CVE-2024-25xx/CVE-2024-2586.json | 51 ++++- CVE-2024/CVE-2024-26xx/CVE-2024-2654.json | 52 ++++- CVE-2024/CVE-2024-28xx/CVE-2024-2847.json | 74 +++++- CVE-2024/CVE-2024-325xx/CVE-2024-32508.json | 52 ++++- CVE-2024/CVE-2024-37xx/CVE-2024-3732.json | 74 +++++- CVE-2024/CVE-2024-413xx/CVE-2024-41311.json | 97 +++++++- CVE-2024/CVE-2024-441xx/CVE-2024-44179.json | 52 ++++- CVE-2024/CVE-2024-50xx/CVE-2024-5090.json | 74 +++++- CVE-2024/CVE-2024-545xx/CVE-2024-54539.json | 66 +++++- CVE-2024/CVE-2024-545xx/CVE-2024-54542.json | 70 +++++- CVE-2024/CVE-2024-54xx/CVE-2024-5418.json | 104 ++++++++- CVE-2024/CVE-2024-550xx/CVE-2024-55009.json | 45 +++- CVE-2024/CVE-2024-87xx/CVE-2024-8773.json | 86 +++++++ CVE-2024/CVE-2024-87xx/CVE-2024-8774.json | 86 +++++++ CVE-2025/CVE-2025-04xx/CVE-2025-0478.json | 27 ++- CVE-2025/CVE-2025-08xx/CVE-2025-0835.json | 27 ++- CVE-2025/CVE-2025-17xx/CVE-2025-1742.json | 14 +- CVE-2025/CVE-2025-206xx/CVE-2025-20615.json | 61 ++++- CVE-2025/CVE-2025-21xx/CVE-2025-2125.json | 72 +++++- CVE-2025/CVE-2025-21xx/CVE-2025-2147.json | 73 +++++- CVE-2025/CVE-2025-21xx/CVE-2025-2150.json | 31 ++- CVE-2025/CVE-2025-240xx/CVE-2025-24092.json | 41 +++- CVE-2025/CVE-2025-240xx/CVE-2025-24093.json | 41 +++- CVE-2025/CVE-2025-240xx/CVE-2025-24099.json | 54 ++++- CVE-2025/CVE-2025-241xx/CVE-2025-24101.json | 57 ++++- CVE-2025/CVE-2025-241xx/CVE-2025-24176.json | 54 ++++- CVE-2025/CVE-2025-243xx/CVE-2025-24387.json | 58 ++++- CVE-2025/CVE-2025-25xx/CVE-2025-2582.json | 83 ++++++- CVE-2025/CVE-2025-25xx/CVE-2025-2583.json | 83 ++++++- CVE-2025/CVE-2025-25xx/CVE-2025-2584.json | 83 ++++++- CVE-2025/CVE-2025-261xx/CVE-2025-26125.json | 12 +- CVE-2025/CVE-2025-267xx/CVE-2025-26796.json | 29 ++- CVE-2025/CVE-2025-26xx/CVE-2025-2621.json | 16 +- CVE-2025/CVE-2025-26xx/CVE-2025-2624.json | 16 +- CVE-2025/CVE-2025-26xx/CVE-2025-2625.json | 16 +- CVE-2025/CVE-2025-26xx/CVE-2025-2626.json | 16 +- CVE-2025/CVE-2025-26xx/CVE-2025-2628.json | 16 +- CVE-2025/CVE-2025-26xx/CVE-2025-2637.json | 12 +- CVE-2025/CVE-2025-26xx/CVE-2025-2638.json | 12 +- CVE-2025/CVE-2025-26xx/CVE-2025-2641.json | 12 +- CVE-2025/CVE-2025-26xx/CVE-2025-2642.json | 12 +- CVE-2025/CVE-2025-26xx/CVE-2025-2643.json | 12 +- CVE-2025/CVE-2025-26xx/CVE-2025-2644.json | 12 +- CVE-2025/CVE-2025-26xx/CVE-2025-2645.json | 12 +- CVE-2025/CVE-2025-26xx/CVE-2025-2646.json | 12 +- CVE-2025/CVE-2025-26xx/CVE-2025-2647.json | 12 +- CVE-2025/CVE-2025-26xx/CVE-2025-2648.json | 12 +- CVE-2025/CVE-2025-26xx/CVE-2025-2650.json | 12 +- CVE-2025/CVE-2025-26xx/CVE-2025-2652.json | 12 +- CVE-2025/CVE-2025-26xx/CVE-2025-2654.json | 12 +- CVE-2025/CVE-2025-26xx/CVE-2025-2691.json | 18 +- CVE-2025/CVE-2025-275xx/CVE-2025-27553.json | 29 ++- CVE-2025/CVE-2025-291xx/CVE-2025-29101.json | 43 +++- CVE-2025/CVE-2025-298xx/CVE-2025-29806.json | 18 +- CVE-2025/CVE-2025-300xx/CVE-2025-30092.json | 39 +++- CVE-2025/CVE-2025-303xx/CVE-2025-30346.json | 182 ++++++++++++++- CVE-2025/CVE-2025-303xx/CVE-2025-30347.json | 107 ++++++++- CVE-2025/CVE-2025-303xx/CVE-2025-30348.json | 71 +++++- CVE-2025/CVE-2025-305xx/CVE-2025-30521.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30522.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30523.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30525.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30526.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30527.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30528.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30529.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30530.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30531.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30532.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30533.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30534.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30535.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30536.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30537.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30538.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30539.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30540.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30541.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30542.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30543.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30545.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30546.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30549.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30550.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30551.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30552.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30553.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30555.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30556.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30557.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30558.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30560.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30561.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30564.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30565.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30566.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30568.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30569.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30570.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30571.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30572.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30573.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30574.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30575.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30576.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30577.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30578.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30581.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30583.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30584.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30585.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30586.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30587.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30588.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30590.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30591.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30592.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30593.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30595.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30597.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30598.json | 56 +++++ CVE-2025/CVE-2025-305xx/CVE-2025-30599.json | 56 +++++ CVE-2025/CVE-2025-306xx/CVE-2025-30600.json | 56 +++++ CVE-2025/CVE-2025-306xx/CVE-2025-30601.json | 56 +++++ CVE-2025/CVE-2025-306xx/CVE-2025-30602.json | 56 +++++ CVE-2025/CVE-2025-306xx/CVE-2025-30603.json | 56 +++++ CVE-2025/CVE-2025-306xx/CVE-2025-30604.json | 56 +++++ CVE-2025/CVE-2025-306xx/CVE-2025-30605.json | 56 +++++ CVE-2025/CVE-2025-306xx/CVE-2025-30606.json | 56 +++++ CVE-2025/CVE-2025-306xx/CVE-2025-30608.json | 56 +++++ CVE-2025/CVE-2025-306xx/CVE-2025-30609.json | 56 +++++ CVE-2025/CVE-2025-306xx/CVE-2025-30610.json | 56 +++++ CVE-2025/CVE-2025-306xx/CVE-2025-30612.json | 56 +++++ CVE-2025/CVE-2025-306xx/CVE-2025-30615.json | 56 +++++ CVE-2025/CVE-2025-306xx/CVE-2025-30617.json | 56 +++++ CVE-2025/CVE-2025-306xx/CVE-2025-30619.json | 56 +++++ CVE-2025/CVE-2025-306xx/CVE-2025-30620.json | 56 +++++ CVE-2025/CVE-2025-306xx/CVE-2025-30621.json | 56 +++++ CVE-2025/CVE-2025-306xx/CVE-2025-30623.json | 56 +++++ README.md | 65 +++++- _state.csv | 239 +++++++++++++------- 160 files changed, 8087 insertions(+), 439 deletions(-) create mode 100644 CVE-2024/CVE-2024-87xx/CVE-2024-8773.json create mode 100644 CVE-2024/CVE-2024-87xx/CVE-2024-8774.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30521.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30522.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30523.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30525.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30526.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30527.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30528.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30529.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30530.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30531.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30532.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30533.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30534.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30535.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30536.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30537.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30538.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30539.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30540.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30541.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30542.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30543.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30545.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30546.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30549.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30550.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30551.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30552.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30553.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30555.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30556.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30557.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30558.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30560.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30561.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30564.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30565.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30566.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30568.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30569.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30570.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30571.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30572.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30573.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30574.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30575.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30576.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30577.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30578.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30581.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30583.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30584.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30585.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30586.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30587.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30588.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30590.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30591.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30592.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30593.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30595.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30597.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30598.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30599.json create mode 100644 CVE-2025/CVE-2025-306xx/CVE-2025-30600.json create mode 100644 CVE-2025/CVE-2025-306xx/CVE-2025-30601.json create mode 100644 CVE-2025/CVE-2025-306xx/CVE-2025-30602.json create mode 100644 CVE-2025/CVE-2025-306xx/CVE-2025-30603.json create mode 100644 CVE-2025/CVE-2025-306xx/CVE-2025-30604.json create mode 100644 CVE-2025/CVE-2025-306xx/CVE-2025-30605.json create mode 100644 CVE-2025/CVE-2025-306xx/CVE-2025-30606.json create mode 100644 CVE-2025/CVE-2025-306xx/CVE-2025-30608.json create mode 100644 CVE-2025/CVE-2025-306xx/CVE-2025-30609.json create mode 100644 CVE-2025/CVE-2025-306xx/CVE-2025-30610.json create mode 100644 CVE-2025/CVE-2025-306xx/CVE-2025-30612.json create mode 100644 CVE-2025/CVE-2025-306xx/CVE-2025-30615.json create mode 100644 CVE-2025/CVE-2025-306xx/CVE-2025-30617.json create mode 100644 CVE-2025/CVE-2025-306xx/CVE-2025-30619.json create mode 100644 CVE-2025/CVE-2025-306xx/CVE-2025-30620.json create mode 100644 CVE-2025/CVE-2025-306xx/CVE-2025-30621.json create mode 100644 CVE-2025/CVE-2025-306xx/CVE-2025-30623.json diff --git a/CVE-2020/CVE-2020-243xx/CVE-2020-24312.json b/CVE-2020/CVE-2020-243xx/CVE-2020-24312.json index ad3fc0ebbb0..c60f68f5670 100644 --- a/CVE-2020/CVE-2020-243xx/CVE-2020-24312.json +++ b/CVE-2020/CVE-2020-243xx/CVE-2020-24312.json @@ -2,7 +2,7 @@ "id": "CVE-2020-24312", "sourceIdentifier": "cve@mitre.org", "published": "2020-08-26T13:15:10.860", - "lastModified": "2024-11-21T05:14:35.103", + "lastModified": "2025-03-24T14:32:35.300", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -85,9 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:webdesi9:file_manager:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:filemanagerpro:file_manager:*:*:*:*:*:wordpress:*:*", "versionEndIncluding": "6.4", - "matchCriteriaId": "7F95AF1E-4974-454A-B41E-C6E996B98C83" + "matchCriteriaId": "82EDFA9F-3005-43D8-A303-DD202534BBAC" } ] } diff --git a/CVE-2021/CVE-2021-241xx/CVE-2021-24177.json b/CVE-2021/CVE-2021-241xx/CVE-2021-24177.json index 9d00595af46..6449772b8b2 100644 --- a/CVE-2021/CVE-2021-241xx/CVE-2021-24177.json +++ b/CVE-2021/CVE-2021-241xx/CVE-2021-24177.json @@ -2,7 +2,7 @@ "id": "CVE-2021-24177", "sourceIdentifier": "contact@wpscan.com", "published": "2021-04-05T19:15:16.247", - "lastModified": "2024-11-21T05:52:31.933", + "lastModified": "2025-03-24T14:32:35.300", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -95,9 +95,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:webdesi9:file_manager:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:filemanagerpro:file_manager:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "7.1", - "matchCriteriaId": "CFE8F14C-4E02-474F-AE64-5ADE7F7D1F08" + "matchCriteriaId": "EDAF3474-8036-48E8-84C8-4F40036B69F9" } ] } diff --git a/CVE-2022/CVE-2022-481xx/CVE-2022-48110.json b/CVE-2022/CVE-2022-481xx/CVE-2022-48110.json index 1119a905309..8e08f7668b0 100644 --- a/CVE-2022/CVE-2022-481xx/CVE-2022-48110.json +++ b/CVE-2022/CVE-2022-481xx/CVE-2022-48110.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48110", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-13T20:15:10.820", - "lastModified": "2024-11-21T07:32:50.707", + "lastModified": "2025-03-24T13:15:24.493", "vulnStatus": "Modified", "cveTags": [ { @@ -43,6 +43,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -56,6 +76,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0698.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0698.json index fc0a06a03f4..4965cb00c0f 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0698.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0698.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0698", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-05T02:15:25.460", - "lastModified": "2024-11-21T08:47:10.293", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-24T14:21:24.423", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:easyappointments:easy\\\\!appointments:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.3.2", + "matchCriteriaId": "0CC6D729-8A5F-4E85-BE8B-CEAEEDF0E81B" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/easyappointments/trunk/public/class-easyappointments-public.php#L141", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4b002e40-712d-4c3f-b168-9132e7b77e60?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/easyappointments/trunk/public/class-easyappointments-public.php#L141", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4b002e40-712d-4c3f-b168-9132e7b77e60?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0761.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0761.json index a5851fb0d8d..3067005b47f 100644 --- a/CVE-2024/CVE-2024-07xx/CVE-2024-0761.json +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0761.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0761", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:04.733", - "lastModified": "2024-11-21T08:47:18.990", + "lastModified": "2025-03-24T14:32:35.300", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -80,9 +80,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:webdesi9:file_manager:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:filemanagerpro:file_manager:*:*:*:*:*:wordpress:*:*", "versionEndIncluding": "7.2.1", - "matchCriteriaId": "1B86D114-5F1C-459E-8C82-671D783FE7C6" + "matchCriteriaId": "7452FF6D-81C5-4331-9330-2D6C73726070" } ] } diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1013.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1013.json index 908ba147e61..c90064bbb4b 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1013.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1013.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1013", "sourceIdentifier": "secalert@redhat.com", "published": "2024-03-18T11:15:09.227", - "lastModified": "2024-11-21T08:49:35.760", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-24T13:02:51.540", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,32 +69,77 @@ "value": "CWE-823" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:unixodbc:unixodbc:-:*:*:*:*:*:*:*", + "matchCriteriaId": "55099A48-74BF-49AE-A928-E2B869F8CE64" + } + ] + } + ] } ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2024-1013", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2260823", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/lurcher/unixODBC/pull/157", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://access.redhat.com/security/cve/CVE-2024-1013", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2260823", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/lurcher/unixODBC/pull/157", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13816.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13816.json index a8dec835cba..6af838ac68b 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13816.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13816.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13816", "sourceIdentifier": "security@wordfence.com", "published": "2025-03-08T09:15:31.077", - "lastModified": "2025-03-08T09:15:31.077", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-24T14:23:45.580", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,50 @@ "value": "CWE-862" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:coderevolution:aiomatic:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.3.7", + "matchCriteriaId": "1C360910-2EA1-46ED-A75C-EC966CA979E8" + } + ] + } + ] } ], "references": [ { "url": "https://coderevolution.ro/knowledge-base/faq/full-changelog-aiomatic-automatic-ai-content-writer-editor-gpt-3-gpt-4-chatgpt-chatbot-ai-toolkit/#item-description__changelog", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/69de7d93-b255-4d41-8680-9762ff632804?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-139xx/CVE-2024-13903.json b/CVE-2024/CVE-2024-139xx/CVE-2024-13903.json index 96393ede1bd..8736f4b1131 100644 --- a/CVE-2024/CVE-2024-139xx/CVE-2024-13903.json +++ b/CVE-2024/CVE-2024-139xx/CVE-2024-13903.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13903", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-21T07:15:34.877", - "lastModified": "2025-03-21T07:15:34.877", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-24T14:36:07.503", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -122,32 +142,83 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:quickjs-ng:quickjs:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.9.0", + "matchCriteriaId": "08423DC4-B8AC-4824-9532-63722E3F64F7" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/quickjs-ng/quickjs/commit/99c02eb45170775a9a679c32b45dd4000ea67aff", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/quickjs-ng/quickjs/issues/775", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://github.com/quickjs-ng/quickjs/releases/tag/v0.9.0", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://vuldb.com/?ctiid.300571", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.300571", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.517394", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-139xx/CVE-2024-13918.json b/CVE-2024/CVE-2024-139xx/CVE-2024-13918.json index 1c12bd2dcaf..6ad607d0818 100644 --- a/CVE-2024/CVE-2024-139xx/CVE-2024-13918.json +++ b/CVE-2024/CVE-2024-139xx/CVE-2024-13918.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13918", "sourceIdentifier": "1e3a9e0f-5156-4bf8-b8a3-cc311bfc0f4a", "published": "2025-03-10T10:15:10.280", - "lastModified": "2025-03-10T17:15:34.383", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-24T14:15:59.000", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 5.8 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,24 +69,68 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:laravel:framework:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.9.0", + "versionEndExcluding": "11.36.0", + "matchCriteriaId": "A2A8A0BE-A7AA-4DA2-8A67-227CBBA94C18" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/laravel/framework/pull/53869", - "source": "1e3a9e0f-5156-4bf8-b8a3-cc311bfc0f4a" + "source": "1e3a9e0f-5156-4bf8-b8a3-cc311bfc0f4a", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://github.com/laravel/framework/releases/tag/v11.36.0", - "source": "1e3a9e0f-5156-4bf8-b8a3-cc311bfc0f4a" + "source": "1e3a9e0f-5156-4bf8-b8a3-cc311bfc0f4a", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/sbaresearch/advisories/tree/public/2024/SBA-ADV-20241209-01_Laravel_Reflected_XSS_via_Request_Parameter_in_Debug-Mode_Error_Page", - "source": "1e3a9e0f-5156-4bf8-b8a3-cc311bfc0f4a" + "source": "1e3a9e0f-5156-4bf8-b8a3-cc311bfc0f4a", + "tags": [ + "Exploit" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2025/03/10/3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory", + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-139xx/CVE-2024-13919.json b/CVE-2024/CVE-2024-139xx/CVE-2024-13919.json index 52e8e7df1af..ce2596a6589 100644 --- a/CVE-2024/CVE-2024-139xx/CVE-2024-13919.json +++ b/CVE-2024/CVE-2024-139xx/CVE-2024-13919.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13919", "sourceIdentifier": "1e3a9e0f-5156-4bf8-b8a3-cc311bfc0f4a", "published": "2025-03-10T10:15:13.890", - "lastModified": "2025-03-10T17:15:34.540", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-24T14:14:53.337", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 5.8 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,24 +69,68 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:laravel:framework:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.9.0", + "versionEndExcluding": "11.36.0", + "matchCriteriaId": "A2A8A0BE-A7AA-4DA2-8A67-227CBBA94C18" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/laravel/framework/pull/53869", - "source": "1e3a9e0f-5156-4bf8-b8a3-cc311bfc0f4a" + "source": "1e3a9e0f-5156-4bf8-b8a3-cc311bfc0f4a", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://github.com/laravel/framework/releases/tag/v11.36.0", - "source": "1e3a9e0f-5156-4bf8-b8a3-cc311bfc0f4a" + "source": "1e3a9e0f-5156-4bf8-b8a3-cc311bfc0f4a", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/sbaresearch/advisories/tree/public/2024/SBA-ADV-20241209-02_Laravel_Reflected_XSS_via_Route_Parameter_in_Debug-Mode_Error_Page", - "source": "1e3a9e0f-5156-4bf8-b8a3-cc311bfc0f4a" + "source": "1e3a9e0f-5156-4bf8-b8a3-cc311bfc0f4a", + "tags": [ + "Exploit" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2025/03/10/4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory", + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1379.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1379.json index ca5785f1aaa..e6c3db1ff57 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1379.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1379.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1379", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-20T07:15:09.903", - "lastModified": "2024-11-21T08:50:27.157", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-24T14:48:13.980", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:magenet:website_article_monetization:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.0.12", + "matchCriteriaId": "08C740F1-8336-4A86-9D65-8932985B3A07" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/website-article-monetization-by-magenet/trunk/admin/article-backlinks-admin.php#L110", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b8564dbb-6be8-4999-be65-d28609e05451?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/website-article-monetization-by-magenet/trunk/admin/article-backlinks-admin.php#L110", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b8564dbb-6be8-4999-be65-d28609e05451?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1473.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1473.json index 665dfc7fa20..7251bf8f740 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1473.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1473.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1473", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-20T07:15:10.133", - "lastModified": "2024-11-21T08:50:39.520", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-24T14:44:29.747", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:colorlib:coming_soon_&_maintenance_mode:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0.99", + "matchCriteriaId": "C44A079E-1149-4385-AE7F-F24691DA3FD8" + } + ] + } + ] + } + ], "references": [ { "url": "https://wordpress.org/plugins/colorlib-coming-soon-maintenance/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/48dc10a9-7bb9-401f-befd-1bf620858825?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://wordpress.org/plugins/colorlib-coming-soon-maintenance/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/48dc10a9-7bb9-401f-befd-1bf620858825?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20292.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20292.json index 5caf5f2e70c..b1dbc7e69bf 100644 --- a/CVE-2024/CVE-2024-202xx/CVE-2024-20292.json +++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20292.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20292", "sourceIdentifier": "psirt@cisco.com", "published": "2024-03-06T17:15:08.797", - "lastModified": "2024-11-21T08:52:14.293", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-24T13:56:44.540", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,16 +69,51 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-312" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:duo_authentication_for_windows_logon_and_rdp:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.0.0", + "versionEndExcluding": "4.3.0", + "matchCriteriaId": "D7A75C57-DC68-4A43-8ACA-90FAC4CBC271" + } + ] + } + ] } ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-duo-infodisc-rLCEqm6T", - "source": "psirt@cisco.com" + "source": "psirt@cisco.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-duo-infodisc-rLCEqm6T", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20301.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20301.json index d28c1851464..cfd0544d110 100644 --- a/CVE-2024/CVE-2024-203xx/CVE-2024-20301.json +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20301.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20301", "sourceIdentifier": "psirt@cisco.com", "published": "2024-03-06T17:15:08.987", - "lastModified": "2024-11-21T08:52:17.907", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-24T13:53:28.940", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.3, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.2, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.3, + "impactScore": 5.9 } ] }, @@ -49,16 +69,51 @@ "value": "CWE-287" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-613" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:duo_authentication_for_windows_logon_and_rdp:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.2.0", + "versionEndExcluding": "4.3.0", + "matchCriteriaId": "FBED07B7-4B6D-4518-9AB0-DD754925E1CA" + } + ] + } + ] } ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-duo-win-bypass-pn42KKBm", - "source": "psirt@cisco.com" + "source": "psirt@cisco.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-duo-win-bypass-pn42KKBm", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2316.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2316.json index 4316c9ed06e..1e5a03902f0 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2316.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2316.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2316", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-08T12:15:50.053", - "lastModified": "2024-11-21T09:09:29.647", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-24T13:45:34.743", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ], "cvssMetricV2": [ @@ -76,30 +96,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bdtask:hospital_automanager:*:*:*:*:*:*:*:*", + "versionEndIncluding": "20240227", + "matchCriteriaId": "9A799C05-4F43-4C92-B3A8-758D75995D2A" + } + ] + } + ] + } + ], "references": [ { "url": "https://drive.google.com/file/d/1v_Ee2FWlbpLgHYIl88COPp05EHSxUWI0/view?usp=sharing", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.256270", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.256270", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://drive.google.com/file/d/1v_Ee2FWlbpLgHYIl88COPp05EHSxUWI0/view?usp=sharing", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.256270", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.256270", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2317.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2317.json index 40b1dd32075..40eccbfa4dc 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2317.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2317.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2317", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-08T12:15:50.473", - "lastModified": "2024-11-21T09:09:29.780", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-24T13:40:28.963", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ], "cvssMetricV2": [ @@ -74,32 +94,82 @@ "value": "CWE-285" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bdtask:hospital_automanager:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2024-02-27", + "matchCriteriaId": "34BDF862-1057-4E25-B6E8-4DC3B782F521" + } + ] + } + ] } ], "references": [ { "url": "https://drive.google.com/file/d/13-Fxw8fw3VP1PvL0fYvDBVlpTDQHyCkc/view?usp=sharing", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.256271", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.256271", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry", + "Third Party Advisory" + ] }, { "url": "https://drive.google.com/file/d/13-Fxw8fw3VP1PvL0fYvDBVlpTDQHyCkc/view?usp=sharing", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.256271", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.256271", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "VDB Entry", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-252xx/CVE-2024-25269.json b/CVE-2024/CVE-2024-252xx/CVE-2024-25269.json index bad184453d5..b0c0fb74e2b 100644 --- a/CVE-2024/CVE-2024-252xx/CVE-2024-25269.json +++ b/CVE-2024/CVE-2024-252xx/CVE-2024-25269.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25269", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-05T01:15:06.780", - "lastModified": "2024-11-21T09:00:33.443", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-24T14:40:29.340", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:struktur:libheif:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.17.6", + "matchCriteriaId": "52B72FAF-90BC-4DAA-9E61-ECB83EE59A35" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/strukturag/libheif/issues/1073", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://github.com/strukturag/libheif/issues/1073", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2584.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2584.json index 30ec414d3be..5f79e2b2a5f 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2584.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2584.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2584", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-03-18T14:15:10.060", - "lastModified": "2024-11-21T09:10:03.963", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-24T13:26:38.360", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 4.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -51,14 +71,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:amss\\+\\+_project:amss\\+\\+:4.31:*:*:*:*:*:*:*", + "matchCriteriaId": "7923653C-8517-4869-A02F-4DC8AA1DAB6B" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-amssplus-amss", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-amssplus-amss", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2585.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2585.json index 707837dfbe5..289fd478f5f 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2585.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2585.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2585", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-03-18T14:15:10.290", - "lastModified": "2024-11-21T09:10:04.100", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-24T13:26:33.507", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 4.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -51,14 +71,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:amss\\+\\+_project:amss\\+\\+:4.31:*:*:*:*:*:*:*", + "matchCriteriaId": "7923653C-8517-4869-A02F-4DC8AA1DAB6B" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-amssplus-amss", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-amssplus-amss", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2586.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2586.json index f980350e806..5a7ad5e5f2d 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2586.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2586.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2586", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-03-18T14:15:10.540", - "lastModified": "2024-11-21T09:10:04.220", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-24T13:26:35.903", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 4.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -51,14 +71,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:amss\\+\\+_project:amss\\+\\+:4.31:*:*:*:*:*:*:*", + "matchCriteriaId": "7923653C-8517-4869-A02F-4DC8AA1DAB6B" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-amssplus-amss", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-amssplus-amss", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-26xx/CVE-2024-2654.json b/CVE-2024/CVE-2024-26xx/CVE-2024-2654.json index 109dc20e24a..7ed1d4abcbc 100644 --- a/CVE-2024/CVE-2024-26xx/CVE-2024-2654.json +++ b/CVE-2024/CVE-2024-26xx/CVE-2024-2654.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2654", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:35.947", - "lastModified": "2025-02-26T18:15:13.590", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-24T14:41:58.103", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -71,30 +71,66 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:filemanagerpro:file_manager:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "7.2.6", + "matchCriteriaId": "C973F4BF-578B-464A-8A13-B204D571FBE3" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/wp-file-manager/trunk/file_folder_manager.php#L1353", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3062387/wp-file-manager/trunk?contextall=1&old=3051451&old_path=%2Fwp-file-manager%2Ftrunk", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ca98fbc6-8cfa-4997-8a46-344afb75a97e?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/wp-file-manager/trunk/file_folder_manager.php#L1353", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3062387/wp-file-manager/trunk?contextall=1&old=3051451&old_path=%2Fwp-file-manager%2Ftrunk", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ca98fbc6-8cfa-4997-8a46-344afb75a97e?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2847.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2847.json index 94f5b234c12..55379fd59e5 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2847.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2847.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2847", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:37.823", - "lastModified": "2024-11-21T09:10:40.053", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-24T13:28:51.537", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:iptanus:wordpress_file_upload:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.24.6", + "matchCriteriaId": "8C7AA5C8-F9A7-4B84-89E1-36F08F7E3646" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3060091%40wp-file-upload%2Ftrunk&old=3045068%40wp-file-upload%2Ftrunk&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9f665099-d1c3-43a9-b37b-c9f42c9172ad?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3060091%40wp-file-upload%2Ftrunk&old=3045068%40wp-file-upload%2Ftrunk&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9f665099-d1c3-43a9-b37b-c9f42c9172ad?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-325xx/CVE-2024-32508.json b/CVE-2024/CVE-2024-325xx/CVE-2024-32508.json index 9762b610282..eaa6a0ffbf5 100644 --- a/CVE-2024/CVE-2024-325xx/CVE-2024-32508.json +++ b/CVE-2024/CVE-2024-325xx/CVE-2024-32508.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32508", "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-17T10:15:10.997", - "lastModified": "2024-11-21T09:15:03.767", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-24T14:27:15.187", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:detheme:dethemekit_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.1.0", + "matchCriteriaId": "FD69E481-93F1-4509-8406-2E96E36A6817" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/dethemekit-for-elementor/wordpress-dethemekit-for-elementor-plugin-2-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/dethemekit-for-elementor/wordpress-dethemekit-for-elementor-plugin-2-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3732.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3732.json index e7e899c9bfd..a9735e9304d 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3732.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3732.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3732", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-23T10:15:07.537", - "lastModified": "2024-11-21T09:30:16.123", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-24T14:18:23.650", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ayecode:geodirectory:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.3.49", + "matchCriteriaId": "6A396904-4878-4648-A92D-84F900404C1F" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3071121%40geodirectory&new=3071121%40geodirectory&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5a91e786-f570-4c6c-b1c7-0110774cb808?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3071121%40geodirectory&new=3071121%40geodirectory&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5a91e786-f570-4c6c-b1c7-0110774cb808?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-413xx/CVE-2024-41311.json b/CVE-2024/CVE-2024-413xx/CVE-2024-41311.json index 070a255239a..b4b43461679 100644 --- a/CVE-2024/CVE-2024-413xx/CVE-2024-41311.json +++ b/CVE-2024/CVE-2024-413xx/CVE-2024-41311.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41311", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-15T21:15:10.923", - "lastModified": "2024-11-21T09:32:30.190", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-24T14:41:38.683", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,20 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + }, + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -55,26 +89,75 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:struktur:libheif:1.17.6:*:*:*:*:*:*:*", + "matchCriteriaId": "DB71230B-9BA1-464C-B2D7-38752ECE890D" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/flyyee/79f1b224069842ee320115cafa5c35c0", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/strukturag/libheif/commit/a3ed1b1eb178c5d651d6ac619c8da3d71ac2be36", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/strukturag/libheif/issues/1226", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://github.com/strukturag/libheif/pull/1227", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00025.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44179.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44179.json index 5591f85c9cf..18ba0fcbb04 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44179.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44179.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44179", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-10T19:15:37.960", - "lastModified": "2025-03-11T03:15:37.160", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-24T14:55:43.037", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,60 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.7", + "matchCriteriaId": "064488F4-456F-4C5D-B325-4F1FCDF2D432" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.7", + "matchCriteriaId": "B8542FD9-368A-4A38-965E-47AE279208F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.0", + "matchCriteriaId": "E8017C16-A17E-4AE7-9A0B-1295200A3A45" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121238", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/121246", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/121250", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5090.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5090.json index 383c648c894..fc266afe89e 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5090.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5090.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5090", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-11T03:15:12.253", - "lastModified": "2024-11-21T09:46:56.690", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-24T13:29:44.987", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siteorigin:siteorigin_widgets_bundle:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.62.0", + "matchCriteriaId": "3F437509-3ACD-46D2-9B3A-756C3256667C" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3098819/so-widgets-bundle", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2878de45-0123-4e07-bfec-015b36b11d01?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3098819/so-widgets-bundle", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2878de45-0123-4e07-bfec-015b36b11d01?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54539.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54539.json index cc22de8398e..c0dca302856 100644 --- a/CVE-2024/CVE-2024-545xx/CVE-2024-54539.json +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54539.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54539", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:14.037", - "lastModified": "2025-03-18T18:15:27.703", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-24T14:53:49.143", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,18 +39,74 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.2", + "matchCriteriaId": "0E37694D-5783-4112-B372-5915C231512F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.2", + "matchCriteriaId": "617CA14A-5EA4-4112-A564-DB1A5109A066" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.2", + "matchCriteriaId": "A29E5D37-B333-4B43-9E4A-012CDD2C406D" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121839", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121840", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121842", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54542.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54542.json index 870d2543627..e9850f92bf4 100644 --- a/CVE-2024/CVE-2024-545xx/CVE-2024-54542.json +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54542.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54542", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:14.217", - "lastModified": "2025-03-17T17:15:34.087", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-24T14:53:26.340", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,80 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.2", + "matchCriteriaId": "12581F66-E5CF-4B04-A94C-E56DE31D0B62" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.2", + "matchCriteriaId": "61B67D76-E2DA-46D7-9E43-4E18D542AA57" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.2", + "matchCriteriaId": "02BF92BD-305C-46CA-8A77-C247AF8B1BC0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.2", + "matchCriteriaId": "3750AD63-B023-44CE-B44D-A90F98E3A8C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "11.2", + "matchCriteriaId": "8C446885-2BC5-454D-88A1-146B17C051C3" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121837", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121839", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121843", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121846", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5418.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5418.json index d2b72e15f6e..63656cbf351 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5418.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5418.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5418", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-31T03:15:08.853", - "lastModified": "2024-11-21T09:47:36.970", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-24T14:25:36.727", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,49 +36,129 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:detheme:dethemekit_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.1.5", + "matchCriteriaId": "1B7089A8-418A-4222-843D-0242CD9F7AEA" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/dethemekit-for-elementor/tags/2.1.0/widgets/de-product-tab-slide.php#L1619", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/dethemekit-for-elementor/tags/2.1.4/widgets/de-product-tab-slide.php#L1617", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3094885/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/dethemekit-for-elementor/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/19bdbde1-1414-4113-890e-b6c96b8a6e11?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/dethemekit-for-elementor/tags/2.1.0/widgets/de-product-tab-slide.php#L1619", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/dethemekit-for-elementor/tags/2.1.4/widgets/de-product-tab-slide.php#L1617", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3094885/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/dethemekit-for-elementor/#developers", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/19bdbde1-1414-4113-890e-b6c96b8a6e11?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-550xx/CVE-2024-55009.json b/CVE-2024/CVE-2024-550xx/CVE-2024-55009.json index 84c5b56a4f4..99354eb25c8 100644 --- a/CVE-2024/CVE-2024-550xx/CVE-2024-55009.json +++ b/CVE-2024/CVE-2024-550xx/CVE-2024-55009.json @@ -2,8 +2,8 @@ "id": "CVE-2024-55009", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-19T21:15:37.273", - "lastModified": "2025-03-19T21:15:37.273", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-24T14:15:17.190", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de cross-site scripting (XSS) reflejado en AutoBib - Bibliographic collection management system 3.1.140 y anteriores permite a los atacantes ejecutar Javascript arbitrario en el contexto del navegador de una v\u00edctima mediante la inyecci\u00f3n de un payload manipulado en el par\u00e1metro WCE=topFrame&WCU=." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://medium.com/@r3dd1t/poc-cve-0b3ad0535631", @@ -28,6 +63,10 @@ { "url": "https://youtu.be/SHk3mdsd2mI", "source": "cve@mitre.org" + }, + { + "url": "https://medium.com/@r3dd1t/poc-cve-0b3ad0535631", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-87xx/CVE-2024-8773.json b/CVE-2024/CVE-2024-87xx/CVE-2024-8773.json new file mode 100644 index 00000000000..bfe6788b6f3 --- /dev/null +++ b/CVE-2024/CVE-2024-87xx/CVE-2024-8773.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2024-8773", + "sourceIdentifier": "cvd@cert.pl", + "published": "2025-03-24T13:15:25.453", + "lastModified": "2025-03-24T13:15:25.453", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SIMPLE.ERP client is vulnerable to MS SQL protocol downgrade request from a server side, what could lead to an unencrypted communication vulnerable to data interception and modification.\n\nThis issue affect SIMPLE.ERP from 6.20 to 6.30. Only the 6.30 version received a patch 6.30@a03.9, which make it possible for an administrator to enforce encrypted communication. Versions 6.20 and 6.25 remain unpatched." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cvd@cert.pl", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "cvd@cert.pl", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-757" + } + ] + } + ], + "references": [ + { + "url": "https://cert.pl/en/posts/2025/03/CVE-2024-8773/", + "source": "cvd@cert.pl" + }, + { + "url": "https://cert.pl/posts/2025/03/CVE-2024-8773/", + "source": "cvd@cert.pl" + }, + { + "url": "https://simple.com.pl/produkty/simple-erp/dla-kogo/", + "source": "cvd@cert.pl" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-87xx/CVE-2024-8774.json b/CVE-2024/CVE-2024-87xx/CVE-2024-8774.json new file mode 100644 index 00000000000..dc5622dce75 --- /dev/null +++ b/CVE-2024/CVE-2024-87xx/CVE-2024-8774.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2024-8774", + "sourceIdentifier": "cvd@cert.pl", + "published": "2025-03-24T13:15:25.693", + "lastModified": "2025-03-24T13:15:25.693", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The SIMPLE.ERP client stores superuser password in a recoverable format, allowing any authenticated SIMPLE.ERP user to escalate privileges to a database administrator.\n\nThis issue affect SIMPLE.ERP from 6.20 through 6.30. Only the 6.30 version received a patch 6.30@a03.9, which removed the vulnerability. Versions 6.20 and 6.25 remain unpatched." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cvd@cert.pl", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "cvd@cert.pl", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-257" + } + ] + } + ], + "references": [ + { + "url": "https://cert.pl/en/posts/2025/03/CVE-2024-8773/", + "source": "cvd@cert.pl" + }, + { + "url": "https://cert.pl/posts/2025/03/CVE-2024-8773/", + "source": "cvd@cert.pl" + }, + { + "url": "https://simple.com.pl/produkty/simple-erp/dla-kogo/", + "source": "cvd@cert.pl" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0478.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0478.json index 189a23d36c7..dadc6ab11bd 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0478.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0478.json @@ -2,7 +2,7 @@ "id": "CVE-2025-0478", "sourceIdentifier": "367425dc-4d06-4041-9650-c2dc6aaa27ce", "published": "2025-03-24T12:15:13.227", - "lastModified": "2025-03-24T12:15:13.227", + "lastModified": "2025-03-24T14:15:17.930", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "Software installed and run as a non-privileged user may conduct improper GPU system calls to issue reads and writes to arbitrary physical memory pages.\n\nUnder certain circumstances this exploit could be used to corrupt data pages not allocated by the GPU driver but memory pages in use by the kernel and drivers running on the platform, altering their behaviour." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "367425dc-4d06-4041-9650-c2dc6aaa27ce", diff --git a/CVE-2025/CVE-2025-08xx/CVE-2025-0835.json b/CVE-2025/CVE-2025-08xx/CVE-2025-0835.json index 02fa8b1637e..eb7a1df1545 100644 --- a/CVE-2025/CVE-2025-08xx/CVE-2025-0835.json +++ b/CVE-2025/CVE-2025-08xx/CVE-2025-0835.json @@ -2,7 +2,7 @@ "id": "CVE-2025-0835", "sourceIdentifier": "367425dc-4d06-4041-9650-c2dc6aaa27ce", "published": "2025-03-24T12:15:13.597", - "lastModified": "2025-03-24T12:15:13.597", + "lastModified": "2025-03-24T14:15:18.090", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "Software installed and run as a non-privileged user may conduct improper GPU system calls to corrupt kernel heap memory." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "367425dc-4d06-4041-9650-c2dc6aaa27ce", diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1742.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1742.json index 22b9610a6f9..b1099720ae9 100644 --- a/CVE-2025/CVE-2025-17xx/CVE-2025-1742.json +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1742.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1742", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-27T17:15:16.460", - "lastModified": "2025-02-27T17:15:16.460", + "lastModified": "2025-03-24T14:15:18.307", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", @@ -111,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -125,6 +125,10 @@ } ], "references": [ + { + "url": "https://github.com/janssensjelle/published-pocs/blob/main/pihomehvac_xss_home.md", + "source": "cna@vuldb.com" + }, { "url": "https://vuldb.com/?ctiid.297830", "source": "cna@vuldb.com" @@ -136,10 +140,6 @@ { "url": "https://vuldb.com/?submit.502501", "source": "cna@vuldb.com" - }, - { - "url": "https://www.singto.io/pocsforexploits/pihomehvac_xss_home.md", - "source": "cna@vuldb.com" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20615.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20615.json index 1e53de14862..0ec880c8118 100644 --- a/CVE-2025/CVE-2025-206xx/CVE-2025-20615.json +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20615.json @@ -2,8 +2,8 @@ "id": "CVE-2025-20615", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2025-02-13T22:15:11.590", - "lastModified": "2025-02-13T22:15:11.590", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-24T13:39:29.907", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.7, "impactScore": 5.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.6, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.7, + "impactScore": 5.9 } ] }, @@ -49,16 +69,49 @@ "value": "CWE-359" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:qardio:qardio:2.7.4:*:*:*:*:iphone_os:*:*", + "matchCriteriaId": "E68698AD-E33B-4C00-A016-FBF85EDAB538" + } + ] + } + ] } ], "references": [ { "url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-044-01", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "US Government Resource" + ] }, { "url": "https://www.qardio.com/about-us/#contact", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-21xx/CVE-2025-2125.json b/CVE-2025/CVE-2025-21xx/CVE-2025-2125.json index 36fa3ace216..219cd49acc2 100644 --- a/CVE-2025/CVE-2025-21xx/CVE-2025-2125.json +++ b/CVE-2025/CVE-2025-21xx/CVE-2025-2125.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2125", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-09T16:15:12.550", - "lastModified": "2025-03-09T16:15:12.550", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-24T13:55:50.327", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,6 +63,26 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -118,24 +138,64 @@ "value": "CWE-99" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:assaabloy:control_id_rhid:25.2.25.0:*:*:*:*:*:*:*", + "matchCriteriaId": "ED890EAB-4EA2-47F7-8BF4-3AF92E718BA1" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/yago3008/cves", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.299038", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.299038", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.509856", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-21xx/CVE-2025-2147.json b/CVE-2025/CVE-2025-21xx/CVE-2025-2147.json index 10e2268f1a1..e4b72331251 100644 --- a/CVE-2025/CVE-2025-21xx/CVE-2025-2147.json +++ b/CVE-2025/CVE-2025-21xx/CVE-2025-2147.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2147", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-10T11:15:38.157", - "lastModified": "2025-03-10T11:15:38.157", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-24T14:30:40.943", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -122,24 +142,63 @@ "value": "CWE-552" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-425" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:caishixiong:modern_farm_digital_integrated_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "AEED862C-2283-47AF-9870-9D9238FC6202" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/fubxx/CVE/blob/main/%E7%91%9E%E7%94%B0%E7%8E%B0%E4%BB%A3%E5%86%9C%E5%9C%BA%E6%95%B0%E5%AD%97%E5%8C%96%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E7%9B%AE%E5%BD%95%E9%81%8D%E5%8E%86.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.299058", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.299058", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?submit.506593", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-21xx/CVE-2025-2150.json b/CVE-2025/CVE-2025-21xx/CVE-2025-2150.json index 818919847ae..689b685d11e 100644 --- a/CVE-2025/CVE-2025-21xx/CVE-2025-2150.json +++ b/CVE-2025/CVE-2025-21xx/CVE-2025-2150.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2150", "sourceIdentifier": "twcert@cert.org.tw", "published": "2025-03-10T08:15:11.917", - "lastModified": "2025-03-10T08:15:11.917", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-24T14:06:07.687", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hgiga:c\\&cm\\@il:-:*:*:*:*:*:*:*", + "matchCriteriaId": "177F8E98-5F0D-4D4C-9386-8FDC6614AF5D" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.twcert.org.tw/en/cp-139-10005-05e0f-2.html", - "source": "twcert@cert.org.tw" + "source": "twcert@cert.org.tw", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.twcert.org.tw/tw/cp-132-10004-99474-1.html", - "source": "twcert@cert.org.tw" + "source": "twcert@cert.org.tw", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24092.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24092.json index 9832eebe168..20c91bd3237 100644 --- a/CVE-2025/CVE-2025-240xx/CVE-2025-24092.json +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24092.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24092", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:15.267", - "lastModified": "2025-03-18T15:15:58.933", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-24T14:53:04.507", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.7.3", + "matchCriteriaId": "6049E692-EB64-4E7D-A1AC-CEBA288B7A55" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.3", + "matchCriteriaId": "33FE4A81-3E35-4934-ABBB-4531E8E249AF" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122068", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122069", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24093.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24093.json index a2adb1709f5..99b2ece4e92 100644 --- a/CVE-2025/CVE-2025-240xx/CVE-2025-24093.json +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24093.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24093", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:15.350", - "lastModified": "2025-03-18T12:15:14.730", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-24T14:52:50.327", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.3", + "matchCriteriaId": "A12642CB-69CC-4C6E-A2C2-CA8AE736EE88" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.3", + "matchCriteriaId": "9C523C7E-B1CF-454B-8AFD-B462C5120D9E" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122069", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122070", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24099.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24099.json index 0f63d82aef0..a45d5134222 100644 --- a/CVE-2025/CVE-2025-240xx/CVE-2025-24099.json +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24099.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24099", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-30T17:15:18.473", - "lastModified": "2025-01-30T22:15:10.160", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-24T14:59:36.260", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.3", + "matchCriteriaId": "A12642CB-69CC-4C6E-A2C2-CA8AE736EE88" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.3", + "matchCriteriaId": "9C523C7E-B1CF-454B-8AFD-B462C5120D9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.3", + "matchCriteriaId": "33FE4A81-3E35-4934-ABBB-4531E8E249AF" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122068", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/122069", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/122070", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24101.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24101.json index 4f83cc4b822..0e510dbfec1 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24101.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24101.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24101", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:15.717", - "lastModified": "2025-01-29T17:15:29.547", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-24T14:52:32.450", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.3", + "matchCriteriaId": "38BA63B3-CC2C-4E63-AE2C-B8DB08B5E89B" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122068", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24176.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24176.json index 7fb2cf1527c..660990e227f 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24176.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24176.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24176", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:20.643", - "lastModified": "2025-01-28T16:15:44.630", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-24T14:59:58.437", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.3", + "matchCriteriaId": "A12642CB-69CC-4C6E-A2C2-CA8AE736EE88" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.3", + "matchCriteriaId": "9C523C7E-B1CF-454B-8AFD-B462C5120D9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.3", + "matchCriteriaId": "33FE4A81-3E35-4934-ABBB-4531E8E249AF" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122068", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/122069", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/122070", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24387.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24387.json index e86b0c2d04b..d71402190fa 100644 --- a/CVE-2025/CVE-2025-243xx/CVE-2025-24387.json +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24387.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24387", "sourceIdentifier": "security@otrs.com", "published": "2025-03-10T10:15:14.360", - "lastModified": "2025-03-10T10:15:14.360", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-24T14:11:20.387", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,12 +69,44 @@ "value": "CWE-1275" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:otrs:otrs:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndIncluding": "2025.1.2", + "matchCriteriaId": "94C7FB8D-6F6C-4C2C-8F52-EE231CDFB848" + } + ] + } + ] } ], "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2025-05/", - "source": "security@otrs.com" + "source": "security@otrs.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-25xx/CVE-2025-2582.json b/CVE-2025/CVE-2025-25xx/CVE-2025-2582.json index 676054dcbdb..139d0c64a1d 100644 --- a/CVE-2025/CVE-2025-25xx/CVE-2025-2582.json +++ b/CVE-2025/CVE-2025-25xx/CVE-2025-2582.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2582", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-21T07:15:36.953", - "lastModified": "2025-03-21T07:15:36.953", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-24T14:29:50.370", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -122,28 +142,75 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:simplemachines:simple_machines_forum:2.1.4:*:*:*:*:*:*:*", + "matchCriteriaId": "BF35AE54-3B18-4459-900E-95D9F3D7E9BC" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/Fewword/Poc/blob/main/smf/smf-poc3.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/Fewword/Poc/blob/main/smf/smf-poc4.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.300542", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.300542", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.511999", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-25xx/CVE-2025-2583.json b/CVE-2025/CVE-2025-25xx/CVE-2025-2583.json index 6d688bb4662..3adcc3cb30b 100644 --- a/CVE-2025/CVE-2025-25xx/CVE-2025-2583.json +++ b/CVE-2025/CVE-2025-25xx/CVE-2025-2583.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2583", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-21T07:15:37.157", - "lastModified": "2025-03-21T07:15:37.157", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-24T14:27:53.530", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -122,28 +142,75 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:simplemachines:simple_machines_forum:2.1.4:*:*:*:*:*:*:*", + "matchCriteriaId": "BF35AE54-3B18-4459-900E-95D9F3D7E9BC" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/Fewword/Poc/blob/main/smf/smf-poc5.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/Fewword/Poc/blob/main/smf/smf-poc6.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.300543", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.300543", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.512001", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-25xx/CVE-2025-2584.json b/CVE-2025/CVE-2025-25xx/CVE-2025-2584.json index 1623d76e1fc..504fb4a0b6b 100644 --- a/CVE-2025/CVE-2025-25xx/CVE-2025-2584.json +++ b/CVE-2025/CVE-2025-25xx/CVE-2025-2584.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2584", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-21T08:15:11.273", - "lastModified": "2025-03-21T08:15:11.273", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-24T14:02:56.053", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.2 } ], "cvssMetricV2": [ @@ -122,28 +142,75 @@ "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:webassembly:wabt:1.0.36:*:*:*:*:*:*:*", + "matchCriteriaId": "06135620-B0C1-480E-84EA-C8AABC2D9D68" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/WebAssembly/wabt/issues/2557", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://github.com/WebAssembly/wabt/issues/2557#issue-2900405517", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.300544", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.300544", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.515406", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-261xx/CVE-2025-26125.json b/CVE-2025/CVE-2025-261xx/CVE-2025-26125.json index 01d0d8d19b4..88b4776240b 100644 --- a/CVE-2025/CVE-2025-261xx/CVE-2025-26125.json +++ b/CVE-2025/CVE-2025-261xx/CVE-2025-26125.json @@ -2,7 +2,7 @@ "id": "CVE-2025-26125", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-17T18:15:21.763", - "lastModified": "2025-03-19T19:15:46.717", + "lastModified": "2025-03-24T13:15:25.920", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -22,20 +22,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:H", - "baseScore": 6.8, - "baseSeverity": "MEDIUM", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.3, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", - "confidentialityImpact": "LOW", + "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.3, - "impactScore": 5.5 + "impactScore": 5.9 } ] }, diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26796.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26796.json index e708c27aa57..ebc3eba5734 100644 --- a/CVE-2025/CVE-2025-267xx/CVE-2025-26796.json +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26796.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26796", "sourceIdentifier": "security@apache.org", "published": "2025-03-22T13:15:35.513", - "lastModified": "2025-03-22T14:15:16.537", - "vulnStatus": "Received", + "lastModified": "2025-03-24T14:15:18.500", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "security@apache.org", @@ -18,7 +18,30 @@ "value": "** UNSUPPORTED WHEN ASSIGNED ** Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Apache Oozie.\n\nThis issue affects Apache Oozie: all versions.\n\nAs this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users.\n\nNOTE: This vulnerability only affects products that are no longer supported by the maintainer." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2621.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2621.json index 539bec3f4fd..77b8c84acfe 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2621.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2621.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2621", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-22T17:15:34.790", - "lastModified": "2025-03-22T17:15:34.790", - "vulnStatus": "Received", + "lastModified": "2025-03-24T13:15:26.220", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "cna@vuldb.com", @@ -16,6 +16,10 @@ { "lang": "en", "value": "A vulnerability was found in D-Link DAP-1620 1.03 and classified as critical. This issue affects the function check_dws_cookie of the file /storage. The manipulation of the argument uid leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer." + }, + { + "lang": "es", + "value": "Se detect\u00f3 una vulnerabilidad en D-Link DAP-1620 1.03, clasificada como cr\u00edtica. Este problema afecta a la funci\u00f3n check_dws_cookie del archivo /storage. La manipulaci\u00f3n del argumento uid provoca un desbordamiento del b\u00fafer en la pila. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante." } ], "metrics": { @@ -66,7 +70,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -114,7 +118,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -147,6 +151,10 @@ { "url": "https://www.dlink.com/", "source": "cna@vuldb.com" + }, + { + "url": "https://witty-maiasaura-083.notion.site/D-link-DAP-1620-check_dws_uid-Vulnerability-1b4b2f2a63618025b049f6e62a1835c0", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2624.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2624.json index a285986df57..999414bdc37 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2624.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2624.json @@ -2,13 +2,17 @@ "id": "CVE-2025-2624", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-22T19:15:34.450", - "lastModified": "2025-03-22T19:15:34.450", - "vulnStatus": "Received", + "lastModified": "2025-03-24T13:15:26.373", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in westboy CicadasCMS 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /system/cms/content/save. The manipulation of the argument content/fujian/laiyuan leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Westboy CicadasCMS 1.0. Se ha clasificado como cr\u00edtica. Este problema afecta a una funcionalidad desconocida del archivo /system/cms/content/save. La manipulaci\u00f3n del argumento content/fujian/laiyuan provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +140,10 @@ { "url": "https://vuldb.com/?submit.519295", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/IceFoxH/VULN/issues/11", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2625.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2625.json index 0508095bca1..f7e3ef879f0 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2625.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2625.json @@ -2,13 +2,17 @@ "id": "CVE-2025-2625", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-22T20:15:12.470", - "lastModified": "2025-03-22T20:15:12.470", - "vulnStatus": "Received", + "lastModified": "2025-03-24T13:15:26.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in westboy CicadasCMS 1.0. This affects an unknown part of the file /system/cms/content/page. The manipulation of the argument orderField/orderDirection leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad cr\u00edtica en westboy CicadasCMS 1.0. Esta afecta a una parte desconocida del archivo /system/cms/content/page. La manipulaci\u00f3n del argumento orderField/orderDirection provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +140,10 @@ { "url": "https://vuldb.com/?submit.519296", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/IceFoxH/VULN/issues/12", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2626.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2626.json index 3d54367a69d..f5a5f7fd081 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2626.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2626.json @@ -2,13 +2,17 @@ "id": "CVE-2025-2626", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-22T21:15:36.817", - "lastModified": "2025-03-22T21:15:36.817", - "vulnStatus": "Received", + "lastModified": "2025-03-24T13:15:26.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in SourceCodester Kortex Lite Advocate Office Management System 1.0. This vulnerability affects unknown code of the file edit_case.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en SourceCodester Kortex Lite Advocate Office Management System 1.0. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo edit_case.php. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://www.sourcecodester.com/", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Hefei-Coffee/cve/issues/16", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2628.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2628.json index f0667db8707..822041230e7 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2628.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2628.json @@ -2,13 +2,17 @@ "id": "CVE-2025-2628", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-22T22:15:12.160", - "lastModified": "2025-03-22T22:15:12.160", - "vulnStatus": "Received", + "lastModified": "2025-03-24T14:15:19.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in PHPGurukul Art Gallery Management System 1.1. Affected is an unknown function of the file /art-enquiry.php. The manipulation of the argument eid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Art Gallery Management System 1.1. La funci\u00f3n afectada es desconocida en el archivo /art-enquiry.php. La manipulaci\u00f3n del argumento eid provoca una inyecci\u00f3n SQL. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.519615", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/ydnd/cve/issues/3", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2637.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2637.json index 0f54799ddbe..2336ed20ce4 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2637.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2637.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2637", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-23T00:15:26.223", - "lastModified": "2025-03-23T00:15:26.223", - "vulnStatus": "Received", + "lastModified": "2025-03-24T14:15:19.310", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +136,10 @@ { "url": "https://vuldb.com/?submit.519632", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/H3rmesk1t/vulnerability-paper/blob/main/jizhiCMS-1.7.0-Incorrect%20Access%20Control.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2638.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2638.json index c2b95f36f9f..a66d6c30074 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2638.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2638.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2638", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-23T02:15:24.877", - "lastModified": "2025-03-23T02:15:24.877", - "vulnStatus": "Received", + "lastModified": "2025-03-24T14:15:19.430", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +136,10 @@ { "url": "https://vuldb.com/?submit.519633", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/H3rmesk1t/vulnerability-paper/blob/main/jizhiCMS-1.7.0-Incorrect%20Access%20Control2.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2641.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2641.json index 3e9719c7bfa..03a05240abb 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2641.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2641.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2641", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-23T05:15:12.020", - "lastModified": "2025-03-23T05:15:12.020", - "vulnStatus": "Received", + "lastModified": "2025-03-24T13:15:26.757", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +140,10 @@ { "url": "https://vuldb.com/?submit.519768", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/liuhao2638/cve/issues/2", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2642.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2642.json index 493089a1b88..29b81c11f43 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2642.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2642.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2642", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-23T07:15:12.103", - "lastModified": "2025-03-23T07:15:12.103", - "vulnStatus": "Received", + "lastModified": "2025-03-24T13:15:26.883", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +140,10 @@ { "url": "https://vuldb.com/?submit.519769", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/liuhao2638/cve/issues/3", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2643.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2643.json index dd5cecd6585..15170dd9896 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2643.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2643.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2643", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-23T08:15:11.860", - "lastModified": "2025-03-23T08:15:11.860", - "vulnStatus": "Received", + "lastModified": "2025-03-24T13:15:27.007", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +140,10 @@ { "url": "https://vuldb.com/?submit.519772", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/liuhao2638/cve/issues/6", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2644.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2644.json index 55bf36ef5dc..e2678cf4b6f 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2644.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2644.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2644", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-23T08:15:12.743", - "lastModified": "2025-03-23T08:15:12.743", - "vulnStatus": "Received", + "lastModified": "2025-03-24T13:15:27.143", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +140,10 @@ { "url": "https://vuldb.com/?submit.519773", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/liuhao2638/cve/issues/7", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2645.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2645.json index e5819a74562..b517b298c3c 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2645.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2645.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2645", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-23T09:15:16.060", - "lastModified": "2025-03-23T09:15:16.060", - "vulnStatus": "Received", + "lastModified": "2025-03-24T13:15:27.263", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +140,10 @@ { "url": "https://vuldb.com/?submit.519775", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/liuhao2638/cve/issues/8", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2646.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2646.json index 8243174d6f2..b24c0686363 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2646.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2646.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2646", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-23T10:15:12.810", - "lastModified": "2025-03-23T10:15:12.810", - "vulnStatus": "Received", + "lastModified": "2025-03-24T13:15:27.390", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +140,10 @@ { "url": "https://vuldb.com/?submit.519776", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/liuhao2638/cve/issues/9", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2647.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2647.json index 05ca4009ac8..3379216a511 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2647.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2647.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2647", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-23T11:15:34.133", - "lastModified": "2025-03-23T11:15:34.133", - "vulnStatus": "Received", + "lastModified": "2025-03-24T13:15:27.513", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +140,10 @@ { "url": "https://vuldb.com/?submit.519777", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/liuhao2638/cve/issues/10", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2648.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2648.json index 9882ff32cd7..b98118b9162 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2648.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2648.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2648", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-23T12:15:12.110", - "lastModified": "2025-03-23T12:15:12.110", - "vulnStatus": "Received", + "lastModified": "2025-03-24T13:15:27.633", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +140,10 @@ { "url": "https://vuldb.com/?submit.519779", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/liuhao2638/cve/issues/11", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2650.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2650.json index 1ce8b612f8f..07e138a504b 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2650.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2650.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2650", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-23T14:15:13.797", - "lastModified": "2025-03-23T14:15:13.797", - "vulnStatus": "Received", + "lastModified": "2025-03-24T14:15:19.550", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +140,10 @@ { "url": "https://vuldb.com/?submit.519781", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/liuhao2638/cve/issues/13", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2652.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2652.json index ee54384cc61..48b43d96f85 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2652.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2652.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2652", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-23T15:15:13.737", - "lastModified": "2025-03-23T15:15:13.737", - "vulnStatus": "Received", + "lastModified": "2025-03-24T13:15:27.757", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +140,10 @@ { "url": "https://www.sourcecodester.com/", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/happytraveller-alone/cve/blob/main/dir.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2654.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2654.json index f5b0b5addd8..43dfbf50ebc 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2654.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2654.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2654", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-23T16:15:13.840", - "lastModified": "2025-03-23T16:15:13.840", - "vulnStatus": "Received", + "lastModified": "2025-03-24T13:15:27.943", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +140,10 @@ { "url": "https://www.sourcecodester.com/", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Colorado-all/cve/blob/main/AC%20Repair%20and%20Services%20System%20using/SQL-4.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2691.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2691.json index 15b89cd1c0c..3ae6c0922f3 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2691.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2691.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2691", "sourceIdentifier": "report@snyk.io", "published": "2025-03-23T15:15:13.940", - "lastModified": "2025-03-23T15:15:13.940", - "vulnStatus": "Received", + "lastModified": "2025-03-24T13:15:28.787", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -89,12 +89,26 @@ "value": "CWE-918" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] } ], "references": [ { "url": "https://security.snyk.io/vuln/SNYK-JS-NOSSRF-9510842", "source": "report@snyk.io" + }, + { + "url": "https://security.snyk.io/vuln/SNYK-JS-NOSSRF-9510842", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27553.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27553.json index 9a45bd20393..7142628f22a 100644 --- a/CVE-2025/CVE-2025-275xx/CVE-2025-27553.json +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27553.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27553", "sourceIdentifier": "security@apache.org", "published": "2025-03-23T15:15:13.377", - "lastModified": "2025-03-23T19:15:14.350", - "vulnStatus": "Received", + "lastModified": "2025-03-24T14:15:18.687", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,30 @@ "value": "Relative Path Traversal vulnerability in Apache Commons VFS before 2.10.0.\n\nThe FileObject API in Commons VFS has a 'resolveFile' method that\ntakes a 'scope' parameter. Specifying 'NameScope.DESCENDENT' promises that \"an exception is thrown if the resolved file is not a descendent of\nthe base file\". However, when the path contains encoded \"..\"\ncharacters (for example, \"%2E%2E/bar.txt\"), it might return file objects that are not\na descendent of the base file, without throwing an exception.\nThis issue affects Apache Commons VFS: before 2.10.0.\n\nUsers are recommended to upgrade to version 2.10.0, which fixes the issue." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2025/CVE-2025-291xx/CVE-2025-29101.json b/CVE-2025/CVE-2025-291xx/CVE-2025-29101.json index 2b169db4e6a..f02915b9658 100644 --- a/CVE-2025/CVE-2025-291xx/CVE-2025-29101.json +++ b/CVE-2025/CVE-2025-291xx/CVE-2025-29101.json @@ -2,7 +2,7 @@ "id": "CVE-2025-29101", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-20T13:15:36.467", - "lastModified": "2025-03-20T13:15:36.467", + "lastModified": "2025-03-24T14:15:18.843", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,11 +15,50 @@ "value": "Se descubri\u00f3 que Tenda AC8V4.0 V16.03.34.06 contiene un desbordamiento de pila a trav\u00e9s del par\u00e1metro deviceid en la funci\u00f3n get_parentControl_list_Info." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/Raining-101/IOT_cve/blob/main/tenda-ac8_get_parentControl_list_Info_overflow.md", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Raining-101/IOT_cve/blob/main/tenda-ac8_get_parentControl_list_Info_overflow.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29806.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29806.json index 3c58daa5cfa..b8e2e749481 100644 --- a/CVE-2025/CVE-2025-298xx/CVE-2025-29806.json +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29806.json @@ -2,8 +2,8 @@ "id": "CVE-2025-29806", "sourceIdentifier": "secure@microsoft.com", "published": "2025-03-23T17:15:29.450", - "lastModified": "2025-03-23T17:15:29.450", - "vulnStatus": "Received", + "lastModified": "2025-03-24T13:15:26.083", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", @@ -35,6 +35,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29806", diff --git a/CVE-2025/CVE-2025-300xx/CVE-2025-30092.json b/CVE-2025/CVE-2025-300xx/CVE-2025-30092.json index e3595ad8927..5a3a976d302 100644 --- a/CVE-2025/CVE-2025-300xx/CVE-2025-30092.json +++ b/CVE-2025/CVE-2025-300xx/CVE-2025-30092.json @@ -2,7 +2,7 @@ "id": "CVE-2025-30092", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-19T21:15:41.293", - "lastModified": "2025-03-19T21:15:41.293", + "lastModified": "2025-03-24T14:15:20.007", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Intrexx Portal Server 12.x <= 12.0.2 y 11.x <= 11.9.2 permite XSS en m\u00faltiples scripts de Velocity." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://security.intrexx.com/en/security-advisories/ixsa-20250310-02/", diff --git a/CVE-2025/CVE-2025-303xx/CVE-2025-30346.json b/CVE-2025/CVE-2025-303xx/CVE-2025-30346.json index 80951388e7d..65d90e2a0e8 100644 --- a/CVE-2025/CVE-2025-303xx/CVE-2025-30346.json +++ b/CVE-2025/CVE-2025-303xx/CVE-2025-30346.json @@ -2,8 +2,8 @@ "id": "CVE-2025-30346", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-21T07:15:37.350", - "lastModified": "2025-03-21T07:15:37.350", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-24T14:47:51.437", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 2.5 } ] }, @@ -49,12 +69,168 @@ "value": "CWE-444" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-444" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:varnish-software:varnish_enterprise:6.0.11:r1:*:*:*:*:*:*", + "matchCriteriaId": "943E3FE8-EA6D-4500-8014-697A9A0CEF91" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:varnish-software:varnish_enterprise:6.0.11:r2:*:*:*:*:*:*", + "matchCriteriaId": "F2CBF396-441D-44F2-BAFF-D3B2A981FBCD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:varnish-software:varnish_enterprise:6.0.11:r3:*:*:*:*:*:*", + "matchCriteriaId": "136343D5-80C1-4F83-8471-2C26F9FD492A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:varnish-software:varnish_enterprise:6.0.11:r4:*:*:*:*:*:*", + "matchCriteriaId": "A34B5F57-B86F-41CB-A3D8-9084960D3E45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:varnish-software:varnish_enterprise:6.0.11:r5:*:*:*:*:*:*", + "matchCriteriaId": "F56C6B72-1648-4BC7-A1E6-909DD51DAA30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:varnish-software:varnish_enterprise:6.0.11:r6:*:*:*:*:*:*", + "matchCriteriaId": "F6A98E3A-74A4-46AB-BE58-EA0BF9D5EF89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:varnish-software:varnish_enterprise:6.0.11:r7:*:*:*:*:*:*", + "matchCriteriaId": "27571EA4-E959-4B6B-A7BA-ED18C42D59B8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:varnish-software:varnish_enterprise:6.0.12:r1:*:*:*:*:*:*", + "matchCriteriaId": "D94DA623-9D4C-4E20-9187-084B1F26115F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:varnish-software:varnish_enterprise:6.0.12:r2:*:*:*:*:*:*", + "matchCriteriaId": "EA7B6AAB-DB21-42EA-B363-C17290E0A05E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:varnish-software:varnish_enterprise:6.0.12:r3:*:*:*:*:*:*", + "matchCriteriaId": "7E00CC49-4237-44EC-8CE5-695F99222B91" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:varnish-software:varnish_enterprise:6.0.12:r4:*:*:*:*:*:*", + "matchCriteriaId": "6C052A78-5D8B-4249-B298-E1AEA6A80B5C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:varnish-software:varnish_enterprise:6.0.12:r5:*:*:*:*:*:*", + "matchCriteriaId": "233436C7-4DE1-4780-A074-B83864B023CF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:varnish-software:varnish_enterprise:6.0.12:r6:*:*:*:*:*:*", + "matchCriteriaId": "2D5CE182-CC6C-4D6C-A481-D467C09756B4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:varnish-software:varnish_enterprise:6.0.12:r7:*:*:*:*:*:*", + "matchCriteriaId": "EFDE0DA4-9EDE-4EB9-870E-8402DD590566" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:varnish-software:varnish_enterprise:6.0.12:r8:*:*:*:*:*:*", + "matchCriteriaId": "092A6346-A101-44D8-A5B2-8178B251CB6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:varnish-software:varnish_enterprise:6.0.12:r9:*:*:*:*:*:*", + "matchCriteriaId": "8A5DAC70-FD7A-4E8A-B5E3-5380CDE0A7F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:varnish-software:varnish_enterprise:6.0.13:r1:*:*:*:*:*:*", + "matchCriteriaId": "7345B2F1-A33C-430E-9DB9-52BF63F750A8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:varnish-software:varnish_enterprise:6.0.13:r2:*:*:*:*:*:*", + "matchCriteriaId": "5C977CB4-E9E8-49B4-9D2A-B5DFA088EA1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:varnish-software:varnish_enterprise:6.0.13:r3:*:*:*:*:*:*", + "matchCriteriaId": "F0FEF673-0DED-4646-B5C2-3D5A4617380F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:varnish-software:varnish_enterprise:6.0.13:r4:*:*:*:*:*:*", + "matchCriteriaId": "E2128880-BA15-414B-84F0-E57B96DF376C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:varnish-software:varnish_enterprise:6.0.13:r5:*:*:*:*:*:*", + "matchCriteriaId": "A9C9D8DF-86F8-4020-AC66-EF8367A11EDC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:varnish-software:varnish_enterprise:6.0.13:r6:*:*:*:*:*:*", + "matchCriteriaId": "132F60B2-FADA-479E-B45E-166046A2567C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:varnish-software:varnish_enterprise:6.0.13:r7:*:*:*:*:*:*", + "matchCriteriaId": "E4FB05CB-0966-43CD-84AA-B4F2DA181446" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:varnish-software:varnish_enterprise:6.0.13:r8:*:*:*:*:*:*", + "matchCriteriaId": "2AAA8F5B-F974-4493-9573-F60CC9E084A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:varnish-software:varnish_enterprise:6.0.13:r9:*:*:*:*:*:*", + "matchCriteriaId": "B67CD7FB-4810-4AFA-BD4D-F2AB2A41D0A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:varnish_cache_project:varnish_cache:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.6.2", + "matchCriteriaId": "757060EC-9D22-4B11-9112-648A9B8A22F2" + } + ] + } + ] } ], "references": [ { "url": "https://varnish-cache.org/security/VSV00015.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-303xx/CVE-2025-30347.json b/CVE-2025/CVE-2025-303xx/CVE-2025-30347.json index 6711300471e..c520d6873de 100644 --- a/CVE-2025/CVE-2025-303xx/CVE-2025-30347.json +++ b/CVE-2025/CVE-2025-303xx/CVE-2025-30347.json @@ -2,8 +2,8 @@ "id": "CVE-2025-30347", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-21T07:15:37.527", - "lastModified": "2025-03-21T07:15:37.527", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-24T14:19:23.963", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,12 +69,93 @@ "value": "CWE-125" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:varnish-software:varnish_enterprise:6.0.13:r10:*:*:*:*:*:*", + "matchCriteriaId": "D5975FD1-9072-41BC-90DD-2623499C0596" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:varnish-software:varnish_enterprise:6.0.13:r11:*:*:*:*:*:*", + "matchCriteriaId": "0E789035-901F-4D2D-B2A5-A59D7027C774" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:varnish-software:varnish_enterprise:6.0.13:r12:*:*:*:*:*:*", + "matchCriteriaId": "2D8B185D-B4A9-42DE-8997-8E6ECF3B4DE7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:varnish-software:varnish_enterprise:6.0.13:r2:*:*:*:*:*:*", + "matchCriteriaId": "5C977CB4-E9E8-49B4-9D2A-B5DFA088EA1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:varnish-software:varnish_enterprise:6.0.13:r3:*:*:*:*:*:*", + "matchCriteriaId": "F0FEF673-0DED-4646-B5C2-3D5A4617380F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:varnish-software:varnish_enterprise:6.0.13:r4:*:*:*:*:*:*", + "matchCriteriaId": "E2128880-BA15-414B-84F0-E57B96DF376C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:varnish-software:varnish_enterprise:6.0.13:r5:*:*:*:*:*:*", + "matchCriteriaId": "A9C9D8DF-86F8-4020-AC66-EF8367A11EDC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:varnish-software:varnish_enterprise:6.0.13:r6:*:*:*:*:*:*", + "matchCriteriaId": "132F60B2-FADA-479E-B45E-166046A2567C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:varnish-software:varnish_enterprise:6.0.13:r7:*:*:*:*:*:*", + "matchCriteriaId": "E4FB05CB-0966-43CD-84AA-B4F2DA181446" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:varnish-software:varnish_enterprise:6.0.13:r8:*:*:*:*:*:*", + "matchCriteriaId": "2AAA8F5B-F974-4493-9573-F60CC9E084A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:varnish-software:varnish_enterprise:6.0.13:r9:*:*:*:*:*:*", + "matchCriteriaId": "B67CD7FB-4810-4AFA-BD4D-F2AB2A41D0A4" + } + ] + } + ] } ], "references": [ { "url": "https://docs.varnish-software.com/security/VEV00001/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-303xx/CVE-2025-30348.json b/CVE-2025/CVE-2025-303xx/CVE-2025-30348.json index 11ae8406030..ac813724a19 100644 --- a/CVE-2025/CVE-2025-303xx/CVE-2025-30348.json +++ b/CVE-2025/CVE-2025-303xx/CVE-2025-30348.json @@ -2,8 +2,8 @@ "id": "CVE-2025-30348", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-21T07:15:37.673", - "lastModified": "2025-03-21T07:15:37.673", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-24T14:08:36.513", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,12 +69,57 @@ "value": "CWE-407" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-407" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:qt:qt:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.15.19", + "matchCriteriaId": "EE4D111C-B1A7-4A17-AA3D-4A7F81D81F82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:qt:qt:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.0.0", + "versionEndExcluding": "6.5.9", + "matchCriteriaId": "2052B596-AF66-4AB5-9353-7DF480123D7B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:qt:qt:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6.0", + "versionEndExcluding": "6.8.0", + "matchCriteriaId": "2F90A01A-9D6A-4094-A589-D1188D83C9FE" + } + ] + } + ] } ], "references": [ { "url": "https://codereview.qt-project.org/c/qt/qtbase/+/581442", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30521.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30521.json new file mode 100644 index 00000000000..5693e643bcc --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30521.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30521", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:20.170", + "lastModified": "2025-03-24T14:15:20.170", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in giangmd93 GP Back To Top allows Cross Site Request Forgery. This issue affects GP Back To Top: from n/a through 3.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/gp-back-to-top/vulnerability/wordpress-gp-back-to-top-plugin-3-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30522.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30522.json new file mode 100644 index 00000000000..b8fdecc04d4 --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30522.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30522", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:20.397", + "lastModified": "2025-03-24T14:15:20.397", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Damian Orzol Contact Form 7 Material Design allows Stored XSS. This issue affects Contact Form 7 Material Design: from n/a through 1.0.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/cf7-material-design/vulnerability/wordpress-contact-form-7-material-design-plugin-1-0-0-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30523.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30523.json new file mode 100644 index 00000000000..8f8fedf26d3 --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30523.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30523", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:20.593", + "lastModified": "2025-03-24T14:15:20.593", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Marcel-NL Super Simple Subscriptions allows SQL Injection. This issue affects Super Simple Subscriptions: from n/a through 1.1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/super-simple-subscriptions/vulnerability/wordpress-super-simple-subscriptions-plugin-1-1-0-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30525.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30525.json new file mode 100644 index 00000000000..8d7bd88c4e3 --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30525.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30525", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:20.757", + "lastModified": "2025-03-24T14:15:20.757", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ProfitShare.ro WP Profitshare allows SQL Injection. This issue affects WP Profitshare: from n/a through 1.4.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-profitshare/vulnerability/wordpress-wp-profitshare-plugin-1-4-9-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30526.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30526.json new file mode 100644 index 00000000000..cb35bc4c8aa --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30526.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30526", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:20.920", + "lastModified": "2025-03-24T14:15:20.920", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in lucksy Typekit plugin for WordPress allows Cross Site Request Forgery. This issue affects Typekit plugin for WordPress: from n/a through 1.2.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/typekit/vulnerability/wordpress-typekit-plugin-1-2-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30527.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30527.json new file mode 100644 index 00000000000..d26b49c3d09 --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30527.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30527", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:21.083", + "lastModified": "2025-03-24T14:15:21.083", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in codetoolbox My Bootstrap Menu allows Stored XSS. This issue affects My Bootstrap Menu: from n/a through 1.2.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/my-bootstrap-menu/vulnerability/wordpress-my-bootstrap-menu-plugin-1-2-1-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30528.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30528.json new file mode 100644 index 00000000000..3a4c63c7dc4 --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30528.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30528", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:21.240", + "lastModified": "2025-03-24T14:15:21.240", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in wpshopee Awesome Logos allows SQL Injection. This issue affects Awesome Logos: from n/a through 1.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/awesome-logos/vulnerability/wordpress-awesome-logos-plugin-1-2-csrf-to-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30529.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30529.json new file mode 100644 index 00000000000..4d997be68a0 --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30529.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30529", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:21.397", + "lastModified": "2025-03-24T14:15:21.397", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in S\u00e9bastien Dumont Auto Load Next Post allows Cross Site Request Forgery. This issue affects Auto Load Next Post: from n/a through 1.5.14." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/auto-load-next-post/vulnerability/wordpress-auto-load-next-post-plugin-1-5-14-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30530.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30530.json new file mode 100644 index 00000000000..86b76f03454 --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30530.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30530", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:21.543", + "lastModified": "2025-03-24T14:15:21.543", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Atikul AI Preloader allows Stored XSS. This issue affects AI Preloader: from n/a through 1.0.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/ai-preloader/vulnerability/wordpress-ai-preloader-plugin-1-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30531.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30531.json new file mode 100644 index 00000000000..9e47c1bc9a3 --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30531.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30531", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:21.693", + "lastModified": "2025-03-24T14:15:21.693", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in GBS Developer WP Ride Booking allows Cross Site Request Forgery. This issue affects WP Ride Booking: from n/a through 2.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-ride-booking/vulnerability/wordpress-wp-ride-booking-plugin-2-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30532.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30532.json new file mode 100644 index 00000000000..49e743b91ac --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30532.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30532", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:21.850", + "lastModified": "2025-03-24T14:15:21.850", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in MorganF Weather Layer allows Stored XSS. This issue affects Weather Layer: from n/a through 4.2.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/weather-layer/vulnerability/wordpress-weather-layer-plugin-4-2-1-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30533.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30533.json new file mode 100644 index 00000000000..34a00bb5a2a --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30533.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30533", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:21.993", + "lastModified": "2025-03-24T14:15:21.993", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in gopiplus Message ticker allows Stored XSS. This issue affects Message ticker: from n/a through 9.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/message-ticker/vulnerability/wordpress-message-ticker-plugin-9-3-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30534.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30534.json new file mode 100644 index 00000000000..7818cdb93b6 --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30534.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30534", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:22.143", + "lastModified": "2025-03-24T14:15:22.143", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in captcha.soft Image Captcha allows Cross Site Request Forgery. This issue affects Image Captcha: from n/a through 1.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/image-captcha/vulnerability/wordpress-image-captcha-plugin-1-2-cross-site-request-forgery-csrf-to-settings-change-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30535.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30535.json new file mode 100644 index 00000000000..c5ef7473d89 --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30535.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30535", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:22.297", + "lastModified": "2025-03-24T14:15:22.297", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in muro External image replace allows Cross Site Request Forgery. This issue affects External image replace: from n/a through 1.0.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/external-image-replace/vulnerability/wordpress-external-image-replace-plugin-1-0-8-cross-site-request-forgery-csrf-to-settings-change-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30536.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30536.json new file mode 100644 index 00000000000..82c10ca8d07 --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30536.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30536", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:22.450", + "lastModified": "2025-03-24T14:15:22.450", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in zeitwesentech Beautiful Link Preview allows Stored XSS. This issue affects Beautiful Link Preview: from n/a through 1.5.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/beautiful-link-preview/vulnerability/wordpress-beautiful-link-preview-plugin-1-5-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30537.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30537.json new file mode 100644 index 00000000000..2308cb00387 --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30537.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30537", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:22.593", + "lastModified": "2025-03-24T14:15:22.593", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Cristian Sarov Upload Quota per User allows Stored XSS. This issue affects Upload Quota per User: from n/a through 1.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/upload-quota-per-user/vulnerability/wordpress-upload-quota-per-user-1-3-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30538.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30538.json new file mode 100644 index 00000000000..ed38d679879 --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30538.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30538", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:22.743", + "lastModified": "2025-03-24T14:15:22.743", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in ChrisHurst Simple Optimizer allows Cross Site Request Forgery. This issue affects Simple Optimizer: from n/a through 1.2.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/simple-optimizer/vulnerability/wordpress-simple-optimizer-plugin-1-2-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30539.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30539.json new file mode 100644 index 00000000000..ea2b6558d38 --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30539.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30539", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:22.887", + "lastModified": "2025-03-24T14:15:22.887", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Benedikt Mo BMo Expo allows Stored XSS. This issue affects BMo Expo: from n/a through 1.0.15." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/bmo-expo/vulnerability/wordpress-bmo-expo-plugin-1-0-15-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30540.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30540.json new file mode 100644 index 00000000000..8e1734a5f6c --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30540.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30540", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:23.030", + "lastModified": "2025-03-24T14:15:23.030", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in avaibook AvaiBook allows Stored XSS. This issue affects AvaiBook: from n/a through 1.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/avaibook/vulnerability/wordpress-avaibook-plugin-1-2-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30541.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30541.json new file mode 100644 index 00000000000..452aa9714be --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30541.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30541", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:23.180", + "lastModified": "2025-03-24T14:15:23.180", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in OTWthemes Info Boxes Shortcode and Widget allows Cross Site Request Forgery. This issue affects Info Boxes Shortcode and Widget: from n/a through 1.15." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/info-boxes-shortcode-and-widget/vulnerability/wordpress-info-boxes-shortcode-and-widgets-plugin-1-15-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30542.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30542.json new file mode 100644 index 00000000000..12d350949ef --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30542.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30542", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:23.337", + "lastModified": "2025-03-24T14:15:23.337", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in wpsolutions SoundCloud Ultimate allows Cross Site Request Forgery. This issue affects SoundCloud Ultimate: from n/a through 1.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/soundcloud-ultimate/vulnerability/wordpress-wp-soundcloud-ultimate-plugin-1-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30543.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30543.json new file mode 100644 index 00000000000..22e756e063e --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30543.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30543", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:23.483", + "lastModified": "2025-03-24T14:15:23.483", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in swayam.tejwani Menu Duplicator allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Menu Duplicator: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/copy-menu/vulnerability/wordpress-menu-duplicator-plugin-1-0-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30545.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30545.json new file mode 100644 index 00000000000..c4dbe3d6ff6 --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30545.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30545", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:23.653", + "lastModified": "2025-03-24T14:15:23.653", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in pixeline issuuPress allows Stored XSS. This issue affects issuuPress: from n/a through 1.3.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/issuupress/vulnerability/wordpress-issuupress-plugin-1-3-2-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30546.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30546.json new file mode 100644 index 00000000000..bec603614c1 --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30546.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30546", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:23.820", + "lastModified": "2025-03-24T14:15:23.820", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in boroV Cackle allows Cross Site Request Forgery. This issue affects Cackle: from n/a through 4.33." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/cackle/vulnerability/wordpress-cackle-plugin-4-33-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30549.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30549.json new file mode 100644 index 00000000000..180a54adc35 --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30549.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30549", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:23.970", + "lastModified": "2025-03-24T14:15:23.970", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Yummly Yummly Rich Recipes allows Cross Site Request Forgery. This issue affects Yummly Rich Recipes: from n/a through 4.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/yummly-rich-recipes/vulnerability/wordpress-yummly-rich-recipes-plugin-4-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30550.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30550.json new file mode 100644 index 00000000000..f8453bd281f --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30550.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30550", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:24.117", + "lastModified": "2025-03-24T14:15:24.117", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in WPShop.ru CallPhone'r allows Stored XSS. This issue affects CallPhone'r: from n/a through 1.1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/callphoner/vulnerability/wordpress-callphone-r-plugin-1-1-1-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30551.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30551.json new file mode 100644 index 00000000000..4cb8e74a742 --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30551.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30551", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:24.260", + "lastModified": "2025-03-24T14:15:24.260", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in smartredfox Pretty file links allows Stored XSS. This issue affects Pretty file links: from n/a through 0.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/pretty-file-links/vulnerability/wordpress-pretty-file-links-plugin-0-9-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30552.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30552.json new file mode 100644 index 00000000000..0fd67e9e582 --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30552.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30552", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:24.407", + "lastModified": "2025-03-24T14:15:24.407", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Donald Gilbert WordPress Admin Bar Improved allows Stored XSS. This issue affects WordPress Admin Bar Improved: from n/a through 3.3.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wordpress-admin-bar-improved/vulnerability/wordpress-wordpress-admin-bar-improved-plugin-3-3-5-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30553.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30553.json new file mode 100644 index 00000000000..ae144245815 --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30553.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30553", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:24.547", + "lastModified": "2025-03-24T14:15:24.547", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Z.com byGMO GMO Font Agent allows Stored XSS. This issue affects GMO Font Agent: from n/a through 1.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/gmo-font-agent/vulnerability/wordpress-gmo-font-agent-plugin-1-6-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30555.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30555.json new file mode 100644 index 00000000000..fb005f6c68c --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30555.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30555", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:24.690", + "lastModified": "2025-03-24T14:15:24.690", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in iiiryan WordPres \u540c\u6b65\u5fae\u535a allows Stored XSS. This issue affects WordPres \u540c\u6b65\u5fae\u535a: from n/a through 1.1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp2wb/vulnerability/wordpress-wordpres-plugin-1-1-0-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30556.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30556.json new file mode 100644 index 00000000000..4b500dba3b5 --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30556.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30556", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:24.837", + "lastModified": "2025-03-24T14:15:24.837", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in flyaga Fix Rss Feeds allows Cross Site Request Forgery. This issue affects Fix Rss Feeds: from n/a through 3.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/fix-rss-feed/vulnerability/wordpress-fix-rss-feeds-plugin-3-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30557.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30557.json new file mode 100644 index 00000000000..9c248742d61 --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30557.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30557", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:24.973", + "lastModified": "2025-03-24T14:15:24.973", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in odihost Easy 301 Redirects allows Cross Site Request Forgery. This issue affects Easy 301 Redirects: from n/a through 1.33." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/odihost-easy-redirect-301/vulnerability/wordpress-easy-301-redirects-plugin-1-33-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30558.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30558.json new file mode 100644 index 00000000000..c73ec59cc1d --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30558.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30558", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:25.113", + "lastModified": "2025-03-24T14:15:25.113", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in EnzoCostantini55 ANAC XML Render allows Stored XSS. This issue affects ANAC XML Render: from n/a through 1.5.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/anac-xml-render/vulnerability/wordpress-anac-xml-render-plugin-1-5-7-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30560.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30560.json new file mode 100644 index 00000000000..39797b00a93 --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30560.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30560", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:26.910", + "lastModified": "2025-03-24T14:15:26.910", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Sana Ullah jQuery Dropdown Menu allows Stored XSS. This issue affects jQuery Dropdown Menu: from n/a through 3.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/jquery-drop-down-menu-plugin/vulnerability/wordpress-jquery-dropdown-menu-plugin-3-0-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30561.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30561.json new file mode 100644 index 00000000000..00c5ce246e9 --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30561.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30561", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:27.460", + "lastModified": "2025-03-24T14:15:27.460", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Henrique Mouta CAS Maestro allows Stored XSS. This issue affects CAS Maestro: from n/a through 1.1.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/cas-maestro/vulnerability/wordpress-cas-maestro-plugin-1-1-3-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30564.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30564.json new file mode 100644 index 00000000000..cbd81692e7d --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30564.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30564", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:28.200", + "lastModified": "2025-03-24T14:15:28.200", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in wpwox Custom Script Integration allows Stored XSS. This issue affects Custom Script Integration: from n/a through 2.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/custom-script-integration/vulnerability/wordpress-custom-script-integration-2-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30565.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30565.json new file mode 100644 index 00000000000..7ce1120018b --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30565.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30565", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:28.347", + "lastModified": "2025-03-24T14:15:28.347", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in karrikas banner-manager allows Stored XSS. This issue affects banner-manager: from n/a through 16.04.19." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/banner-manager/vulnerability/wordpress-banner-manager-plugin-16-04-19-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30566.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30566.json new file mode 100644 index 00000000000..fcf46293484 --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30566.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30566", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:28.490", + "lastModified": "2025-03-24T14:15:28.490", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Aryan Themes Clink allows DOM-Based XSS. This issue affects Clink: from n/a through 1.2.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/clink/vulnerability/wordpress-clink-1-2-2-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30568.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30568.json new file mode 100644 index 00000000000..9a31c1236b1 --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30568.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30568", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:28.630", + "lastModified": "2025-03-24T14:15:28.630", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in hitoy Super Static Cache allows Cross Site Request Forgery. This issue affects Super Static Cache: from n/a through 3.3.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/super-static-cache/vulnerability/wordpress-super-static-cache-3-3-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30569.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30569.json new file mode 100644 index 00000000000..c3997282688 --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30569.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30569", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:28.780", + "lastModified": "2025-03-24T14:15:28.780", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Jahertor WP Featured Entries allows SQL Injection. This issue affects WP Featured Entries: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-featured-entries/vulnerability/wordpress-wp-featured-entries-1-0-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30570.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30570.json new file mode 100644 index 00000000000..20276f624fd --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30570.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30570", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:28.937", + "lastModified": "2025-03-24T14:15:28.937", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in AliRezaMohammadi \u062f\u06a9\u0645\u0647\u060c \u0634\u0628\u06a9\u0647 \u0627\u062c\u062a\u0645\u0627\u0639\u06cc \u062e\u0631\u06cc\u062f allows SQL Injection. This issue affects \u062f\u06a9\u0645\u0647\u060c \u0634\u0628\u06a9\u0647 \u0627\u062c\u062a\u0645\u0627\u0639\u06cc \u062e\u0631\u06cc\u062f: from n/a through 2.0.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/dokme/vulnerability/wordpress-d-mh-shb-h-gtm-aa-khr-d-2-0-6-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30571.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30571.json new file mode 100644 index 00000000000..7c183506e30 --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30571.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30571", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:29.077", + "lastModified": "2025-03-24T14:15:29.077", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in STEdb Corp. STEdb Forms allows SQL Injection. This issue affects STEdb Forms: from n/a through 1.0.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/stedb-forms/vulnerability/wordpress-stedb-forms-1-0-4-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30572.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30572.json new file mode 100644 index 00000000000..2439170c0d2 --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30572.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30572", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:29.217", + "lastModified": "2025-03-24T14:15:29.217", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Igor Yavych Simple Rating allows Stored XSS. This issue affects Simple Rating: from n/a through 1.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/simple-rating/vulnerability/wordpress-simple-rating-plugin-1-4-cross-site-request-forgery-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30573.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30573.json new file mode 100644 index 00000000000..082bfe86578 --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30573.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30573", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:29.360", + "lastModified": "2025-03-24T14:15:29.360", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in mrdenny My Default Post Content allows Stored XSS. This issue affects My Default Post Content: from n/a through 0.7.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/my-default-post-content/vulnerability/wordpress-my-default-post-content-0-7-3-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30574.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30574.json new file mode 100644 index 00000000000..7d3d50db011 --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30574.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30574", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:29.507", + "lastModified": "2025-03-24T14:15:29.507", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jenst Mobile Navigation allows Stored XSS. This issue affects Mobile Navigation: from n/a through 1.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/mobile-navigation/vulnerability/wordpress-mobile-navigation-1-5-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30575.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30575.json new file mode 100644 index 00000000000..c0c8dd51f52 --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30575.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30575", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:29.650", + "lastModified": "2025-03-24T14:15:29.650", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Arefly Login Redirect allows Stored XSS. This issue affects Login Redirect: from n/a through 1.0.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/login-redirect/vulnerability/wordpress-login-redirect-1-0-5-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30576.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30576.json new file mode 100644 index 00000000000..5383ea22fbe --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30576.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30576", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:29.790", + "lastModified": "2025-03-24T14:15:29.790", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in HuangYe WuDeng Hacklog Remote Image Autosave allows Cross Site Request Forgery. This issue affects Hacklog Remote Image Autosave: from n/a through 2.1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/hacklog-remote-image-autosave/vulnerability/wordpress-hacklog-remote-image-autosave-2-1-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30577.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30577.json new file mode 100644 index 00000000000..ba4917132eb --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30577.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30577", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:29.923", + "lastModified": "2025-03-24T14:15:29.923", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in mendibass Browser Address Bar Color allows Stored XSS. This issue affects Browser Address Bar Color: from n/a through 3.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/browser-address-bar-color/vulnerability/wordpress-browser-address-bar-color-plugin-3-3-cross-site-request-forgery-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30578.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30578.json new file mode 100644 index 00000000000..56073130c03 --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30578.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30578", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:30.073", + "lastModified": "2025-03-24T14:15:30.073", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in hotvanrod AdSense Privacy Policy allows Stored XSS. This issue affects AdSense Privacy Policy: from n/a through 1.1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/adsense-privacy-policy/vulnerability/wordpress-adsense-privacy-policy-plugin-1-1-1-cross-site-request-forgery-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30581.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30581.json new file mode 100644 index 00000000000..f463a6d60e8 --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30581.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30581", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:30.217", + "lastModified": "2025-03-24T14:15:30.217", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in PluginOps Top Bar allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Top Bar: from n/a through 3.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/ultimate-bar/vulnerability/wordpress-top-bar-3-3-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30583.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30583.json new file mode 100644 index 00000000000..59640574cb6 --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30583.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30583", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:30.353", + "lastModified": "2025-03-24T14:15:30.353", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in ProRankTracker Pro Rank Tracker allows Stored XSS. This issue affects Pro Rank Tracker: from n/a through 1.0.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/proranktracker/vulnerability/wordpress-pro-rank-tracker-plugin-1-0-0-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30584.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30584.json new file mode 100644 index 00000000000..ac50b9985cd --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30584.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30584", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:30.490", + "lastModified": "2025-03-24T14:15:30.490", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in alphaomegaplugins AlphaOmega Captcha & Anti-Spam Filter allows Stored XSS. This issue affects AlphaOmega Captcha & Anti-Spam Filter: from n/a through 3.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/alphaomega-captcha-anti-spam/vulnerability/wordpress-alphaomega-captcha-anti-spam-filter-plugin-3-3-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30585.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30585.json new file mode 100644 index 00000000000..cd386bc1fee --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30585.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30585", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:30.630", + "lastModified": "2025-03-24T14:15:30.630", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in marynixie Generate Post Thumbnails allows Cross Site Request Forgery. This issue affects Generate Post Thumbnails: from n/a through 0.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/generate-post-thumbnails/vulnerability/wordpress-generate-post-thumbnails-0-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30586.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30586.json new file mode 100644 index 00000000000..93bd5ff8b87 --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30586.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30586", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:30.767", + "lastModified": "2025-03-24T14:15:30.767", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in bbodine1 cTabs allows Stored XSS. This issue affects cTabs: from n/a through 1.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/ctabs/vulnerability/wordpress-ctabs-plugin-1-3-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30587.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30587.json new file mode 100644 index 00000000000..d8cc379604d --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30587.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30587", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:30.910", + "lastModified": "2025-03-24T14:15:30.910", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in shawfactor LH OGP Meta allows Stored XSS. This issue affects LH OGP Meta: from n/a through 1.73." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/lh-ogp-meta-tags/vulnerability/wordpress-lh-ogp-meta-plugin-1-73-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30588.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30588.json new file mode 100644 index 00000000000..27016a2abfa --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30588.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30588", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:31.057", + "lastModified": "2025-03-24T14:15:31.057", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in ryan_xantoo Map Contact allows Stored XSS. This issue affects Map Contact: from n/a through 3.0.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/map-contact/vulnerability/wordpress-map-contact-plugin-3-0-4-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30590.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30590.json new file mode 100644 index 00000000000..87f89e51c9d --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30590.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30590", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:31.197", + "lastModified": "2025-03-24T14:15:31.197", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Dourou Flickr set slideshows allows SQL Injection. This issue affects Flickr set slideshows: from n/a through 0.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/flickr-set-slideshows/vulnerability/wordpress-flickr-set-slideshows-0-9-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30591.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30591.json new file mode 100644 index 00000000000..59bee679666 --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30591.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30591", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:31.333", + "lastModified": "2025-03-24T14:15:31.333", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in tuyennv Music Press Pro allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Music Press Pro: from n/a through 1.4.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/music-press-pro/vulnerability/wordpress-music-press-pro-1-4-6-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30592.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30592.json new file mode 100644 index 00000000000..548be8f4a40 --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30592.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30592", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:31.477", + "lastModified": "2025-03-24T14:15:31.477", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in westerndeal Advanced Dewplayer allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Advanced Dewplayer: from n/a through 1.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/advanced-dewplayer/vulnerability/wordpress-advanced-dewplayer-1-6-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30593.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30593.json new file mode 100644 index 00000000000..c69eb84d550 --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30593.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30593", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:31.620", + "lastModified": "2025-03-24T14:15:31.620", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in samsk Include URL allows Stored XSS. This issue affects Include URL: from n/a through 0.3.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/include-url/vulnerability/wordpress-include-url-0-3-5-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30595.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30595.json new file mode 100644 index 00000000000..53e5d042b56 --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30595.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30595", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:31.770", + "lastModified": "2025-03-24T14:15:31.770", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in tstafford include-file allows Stored XSS. This issue affects include-file: from n/a through 1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/include-file/vulnerability/wordpress-include-file-1-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30597.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30597.json new file mode 100644 index 00000000000..5e5ffa97107 --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30597.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30597", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:31.910", + "lastModified": "2025-03-24T14:15:31.910", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in iografica IG Shortcodes allows DOM-Based XSS. This issue affects IG Shortcodes: from n/a through 3.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/ig-shortcodes/vulnerability/wordpress-ig-shortcodes-3-1-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30598.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30598.json new file mode 100644 index 00000000000..bead0a9dc66 --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30598.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30598", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:32.067", + "lastModified": "2025-03-24T14:15:32.067", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Link OSS Upload allows Cross Site Request Forgery. This issue affects OSS Upload: from n/a through 4.8.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/oss-upload/vulnerability/wordpress-oss-upload-4-8-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30599.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30599.json new file mode 100644 index 00000000000..12cb1a21ff6 --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30599.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30599", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:32.227", + "lastModified": "2025-03-24T14:15:32.227", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wp-maverick WP Parallax Content Slider allows Stored XSS. This issue affects WP Parallax Content Slider: from n/a through 0.9.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-parallax-content-slider/vulnerability/wordpress-wp-parallax-content-slider-plugin-0-9-8-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30600.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30600.json new file mode 100644 index 00000000000..b75b6790fcc --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30600.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30600", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:32.370", + "lastModified": "2025-03-24T14:15:32.370", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in thiagogsrwp WP Hotjar allows Stored XSS. This issue affects WP Hotjar: from n/a through 0.0.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-hotjar/vulnerability/wordpress-wp-hotjar-plugin-0-0-3-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30601.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30601.json new file mode 100644 index 00000000000..c1b6c5f37da --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30601.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30601", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:32.520", + "lastModified": "2025-03-24T14:15:32.520", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in flipdish Flipdish Ordering System allows Cross Site Request Forgery. This issue affects Flipdish Ordering System: from n/a through 1.4.16." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/flipdish-ordering-system/vulnerability/wordpress-flipdish-ordering-system-plugin-1-4-16-cross-site-request-forgery-csrf-to-settings-change-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30602.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30602.json new file mode 100644 index 00000000000..2085d5bbbaf --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30602.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30602", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:32.667", + "lastModified": "2025-03-24T14:15:32.667", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in alphasis Related Posts via Categories allows Stored XSS. This issue affects Related Posts via Categories: from n/a through 2.1.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/related-posts-via-categories/vulnerability/wordpress-related-posts-via-categories-plugin-2-1-2-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30603.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30603.json new file mode 100644 index 00000000000..c77f146306f --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30603.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30603", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:32.810", + "lastModified": "2025-03-24T14:15:32.810", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in DEJAN CopyLink allows Stored XSS. This issue affects CopyLink: from n/a through 1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/copy-link/vulnerability/wordpress-copylink-plugin-1-1-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30604.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30604.json new file mode 100644 index 00000000000..0c6f27566b0 --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30604.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30604", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:32.953", + "lastModified": "2025-03-24T14:15:32.953", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in jiangqie JiangQie Official Website Mini Program allows Blind SQL Injection. This issue affects JiangQie Official Website Mini Program: from n/a through 1.8.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/jiangqie-official-website-mini-program/vulnerability/wordpress-jiangqie-official-website-mini-program-plugin-1-8-2-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30605.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30605.json new file mode 100644 index 00000000000..65b3533583e --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30605.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30605", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:33.103", + "lastModified": "2025-03-24T14:15:33.103", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in ldwin79 sourceplay-navermap allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects sourceplay-navermap: from n/a through 0.0.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/sourceplay-navermap/vulnerability/wordpress-sourceplay-navermap-plugin-0-0-2-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30606.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30606.json new file mode 100644 index 00000000000..57759334fc3 --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30606.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30606", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:33.247", + "lastModified": "2025-03-24T14:15:33.247", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Logan Carlile Easy Page Transition allows Stored XSS. This issue affects Easy Page Transition: from n/a through 1.0.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/easy-page-transition/vulnerability/wordpress-easy-page-transition-plugin-1-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30608.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30608.json new file mode 100644 index 00000000000..8a5dc6c33d7 --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30608.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30608", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:33.383", + "lastModified": "2025-03-24T14:15:33.383", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Anthony WordPress SQL Backup allows Stored XSS. This issue affects WordPress SQL Backup: from n/a through 3.5.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wordpress-sql-backup/vulnerability/wordpress-wordpress-sql-backup-3-5-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30609.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30609.json new file mode 100644 index 00000000000..2744cd8e85b --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30609.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30609", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:33.533", + "lastModified": "2025-03-24T14:15:33.533", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insertion of Sensitive Information Into Sent Data vulnerability in AppExperts AppExperts \u2013 WordPress to Mobile App \u2013 WooCommerce to iOs and Android Apps allows Retrieve Embedded Sensitive Data. This issue affects AppExperts \u2013 WordPress to Mobile App \u2013 WooCommerce to iOs and Android Apps: from n/a through 1.4.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-201" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/appexperts/vulnerability/wordpress-appexperts-wordpress-to-mobile-app-woocommerce-to-ios-and-android-apps-1-4-3-sensitive-data-exposure-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30610.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30610.json new file mode 100644 index 00000000000..6417d8bc110 --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30610.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30610", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:33.680", + "lastModified": "2025-03-24T14:15:33.680", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in catchsquare WP Social Widget allows Stored XSS. This issue affects WP Social Widget: from n/a through 2.2.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-social-widget/vulnerability/wordpress-wp-social-widget-2-2-6-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30612.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30612.json new file mode 100644 index 00000000000..ad2f3be4b6e --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30612.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30612", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:33.823", + "lastModified": "2025-03-24T14:15:33.823", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in mandegarweb Replace Default Words allows Stored XSS. This issue affects Replace Default Words: from n/a through 1.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/replace-default-words/vulnerability/wordpress-replace-default-words-plugin-1-3-cross-site-request-forgery-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30615.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30615.json new file mode 100644 index 00000000000..bccff9bdfad --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30615.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30615", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:34.040", + "lastModified": "2025-03-24T14:15:34.040", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Jacob Schwartz WP e-Commerce Style Email allows Code Injection. This issue affects WP e-Commerce Style Email: from n/a through 0.6.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 9.6, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-e-commerce-style-email/vulnerability/wordpress-wp-e-commerce-style-email-plugin-0-6-2-csrf-to-remote-code-execution-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30617.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30617.json new file mode 100644 index 00000000000..f39f41f5c5a --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30617.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30617", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:34.223", + "lastModified": "2025-03-24T14:15:34.223", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in takien Rewrite allows Cross Site Request Forgery. This issue affects Rewrite: from n/a through 0.2.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/rewrite/vulnerability/wordpress-rewrite-0-2-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30619.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30619.json new file mode 100644 index 00000000000..d91aa92127a --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30619.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30619", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:34.370", + "lastModified": "2025-03-24T14:15:34.370", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in SpeakPipe SpeakPipe allows Cross Site Request Forgery. This issue affects SpeakPipe: from n/a through 0.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/speakpipe-voicemail-for-websites/vulnerability/wordpress-speakpipe-0-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30620.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30620.json new file mode 100644 index 00000000000..175ccb81212 --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30620.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30620", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:34.520", + "lastModified": "2025-03-24T14:15:34.520", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in coderscom WP Odoo Form Integrator allows Stored XSS. This issue affects WP Odoo Form Integrator: from n/a through 1.1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-odoo-form-integrator/vulnerability/wordpress-wp-odoo-form-integrator-plugin-1-1-0-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30621.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30621.json new file mode 100644 index 00000000000..b77452c5f48 --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30621.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30621", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:34.660", + "lastModified": "2025-03-24T14:15:34.660", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in kornelly Translator allows Stored XSS. This issue affects Translator: from n/a through 0.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/translator/vulnerability/wordpress-translator-plugin-0-3-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30623.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30623.json new file mode 100644 index 00000000000..77e11d9a998 --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30623.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30623", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-24T14:15:34.797", + "lastModified": "2025-03-24T14:15:34.797", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rachel Cherry wA11y \u2013 The Web Accessibility Toolbox allows Stored XSS. This issue affects wA11y \u2013 The Web Accessibility Toolbox: from n/a through 1.0.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wa11y/vulnerability/wordpress-wa11y-the-web-accessibility-toolbox-plugin-1-0-3-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 13ec903734c..e5ad903cb96 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-03-24T13:00:19.913817+00:00 +2025-03-24T15:00:22.415164+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-03-24T12:48:35.967000+00:00 +2025-03-24T14:59:58.437000+00:00 ``` ### Last Data Feed Release @@ -33,24 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -286294 +286377 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `83` -- [CVE-2025-0478](CVE-2025/CVE-2025-04xx/CVE-2025-0478.json) (`2025-03-24T12:15:13.227`) -- [CVE-2025-0835](CVE-2025/CVE-2025-08xx/CVE-2025-0835.json) (`2025-03-24T12:15:13.597`) +- [CVE-2025-30590](CVE-2025/CVE-2025-305xx/CVE-2025-30590.json) (`2025-03-24T14:15:31.197`) +- [CVE-2025-30591](CVE-2025/CVE-2025-305xx/CVE-2025-30591.json) (`2025-03-24T14:15:31.333`) +- [CVE-2025-30592](CVE-2025/CVE-2025-305xx/CVE-2025-30592.json) (`2025-03-24T14:15:31.477`) +- [CVE-2025-30593](CVE-2025/CVE-2025-305xx/CVE-2025-30593.json) (`2025-03-24T14:15:31.620`) +- [CVE-2025-30595](CVE-2025/CVE-2025-305xx/CVE-2025-30595.json) (`2025-03-24T14:15:31.770`) +- [CVE-2025-30597](CVE-2025/CVE-2025-305xx/CVE-2025-30597.json) (`2025-03-24T14:15:31.910`) +- [CVE-2025-30598](CVE-2025/CVE-2025-305xx/CVE-2025-30598.json) (`2025-03-24T14:15:32.067`) +- [CVE-2025-30599](CVE-2025/CVE-2025-305xx/CVE-2025-30599.json) (`2025-03-24T14:15:32.227`) +- [CVE-2025-30600](CVE-2025/CVE-2025-306xx/CVE-2025-30600.json) (`2025-03-24T14:15:32.370`) +- [CVE-2025-30601](CVE-2025/CVE-2025-306xx/CVE-2025-30601.json) (`2025-03-24T14:15:32.520`) +- [CVE-2025-30602](CVE-2025/CVE-2025-306xx/CVE-2025-30602.json) (`2025-03-24T14:15:32.667`) +- [CVE-2025-30603](CVE-2025/CVE-2025-306xx/CVE-2025-30603.json) (`2025-03-24T14:15:32.810`) +- [CVE-2025-30604](CVE-2025/CVE-2025-306xx/CVE-2025-30604.json) (`2025-03-24T14:15:32.953`) +- [CVE-2025-30605](CVE-2025/CVE-2025-306xx/CVE-2025-30605.json) (`2025-03-24T14:15:33.103`) +- [CVE-2025-30606](CVE-2025/CVE-2025-306xx/CVE-2025-30606.json) (`2025-03-24T14:15:33.247`) +- [CVE-2025-30608](CVE-2025/CVE-2025-306xx/CVE-2025-30608.json) (`2025-03-24T14:15:33.383`) +- [CVE-2025-30609](CVE-2025/CVE-2025-306xx/CVE-2025-30609.json) (`2025-03-24T14:15:33.533`) +- [CVE-2025-30610](CVE-2025/CVE-2025-306xx/CVE-2025-30610.json) (`2025-03-24T14:15:33.680`) +- [CVE-2025-30612](CVE-2025/CVE-2025-306xx/CVE-2025-30612.json) (`2025-03-24T14:15:33.823`) +- [CVE-2025-30615](CVE-2025/CVE-2025-306xx/CVE-2025-30615.json) (`2025-03-24T14:15:34.040`) +- [CVE-2025-30617](CVE-2025/CVE-2025-306xx/CVE-2025-30617.json) (`2025-03-24T14:15:34.223`) +- [CVE-2025-30619](CVE-2025/CVE-2025-306xx/CVE-2025-30619.json) (`2025-03-24T14:15:34.370`) +- [CVE-2025-30620](CVE-2025/CVE-2025-306xx/CVE-2025-30620.json) (`2025-03-24T14:15:34.520`) +- [CVE-2025-30621](CVE-2025/CVE-2025-306xx/CVE-2025-30621.json) (`2025-03-24T14:15:34.660`) +- [CVE-2025-30623](CVE-2025/CVE-2025-306xx/CVE-2025-30623.json) (`2025-03-24T14:15:34.797`) ### CVEs modified in the last Commit -Recently modified CVEs: `3` +Recently modified CVEs: `75` -- [CVE-2023-44415](CVE-2023/CVE-2023-444xx/CVE-2023-44415.json) (`2025-03-24T12:48:35.967`) -- [CVE-2024-4362](CVE-2024/CVE-2024-43xx/CVE-2024-4362.json) (`2025-03-24T12:47:20.663`) -- [CVE-2025-2702](CVE-2025/CVE-2025-27xx/CVE-2025-2702.json) (`2025-03-24T10:15:12.943`) +- [CVE-2025-2625](CVE-2025/CVE-2025-26xx/CVE-2025-2625.json) (`2025-03-24T13:15:26.507`) +- [CVE-2025-2626](CVE-2025/CVE-2025-26xx/CVE-2025-2626.json) (`2025-03-24T13:15:26.627`) +- [CVE-2025-2628](CVE-2025/CVE-2025-26xx/CVE-2025-2628.json) (`2025-03-24T14:15:19.187`) +- [CVE-2025-2637](CVE-2025/CVE-2025-26xx/CVE-2025-2637.json) (`2025-03-24T14:15:19.310`) +- [CVE-2025-2638](CVE-2025/CVE-2025-26xx/CVE-2025-2638.json) (`2025-03-24T14:15:19.430`) +- [CVE-2025-2641](CVE-2025/CVE-2025-26xx/CVE-2025-2641.json) (`2025-03-24T13:15:26.757`) +- [CVE-2025-2642](CVE-2025/CVE-2025-26xx/CVE-2025-2642.json) (`2025-03-24T13:15:26.883`) +- [CVE-2025-2643](CVE-2025/CVE-2025-26xx/CVE-2025-2643.json) (`2025-03-24T13:15:27.007`) +- [CVE-2025-2644](CVE-2025/CVE-2025-26xx/CVE-2025-2644.json) (`2025-03-24T13:15:27.143`) +- [CVE-2025-2645](CVE-2025/CVE-2025-26xx/CVE-2025-2645.json) (`2025-03-24T13:15:27.263`) +- [CVE-2025-2646](CVE-2025/CVE-2025-26xx/CVE-2025-2646.json) (`2025-03-24T13:15:27.390`) +- [CVE-2025-2647](CVE-2025/CVE-2025-26xx/CVE-2025-2647.json) (`2025-03-24T13:15:27.513`) +- [CVE-2025-2648](CVE-2025/CVE-2025-26xx/CVE-2025-2648.json) (`2025-03-24T13:15:27.633`) +- [CVE-2025-2650](CVE-2025/CVE-2025-26xx/CVE-2025-2650.json) (`2025-03-24T14:15:19.550`) +- [CVE-2025-2652](CVE-2025/CVE-2025-26xx/CVE-2025-2652.json) (`2025-03-24T13:15:27.757`) +- [CVE-2025-2654](CVE-2025/CVE-2025-26xx/CVE-2025-2654.json) (`2025-03-24T13:15:27.943`) +- [CVE-2025-26796](CVE-2025/CVE-2025-267xx/CVE-2025-26796.json) (`2025-03-24T14:15:18.500`) +- [CVE-2025-2691](CVE-2025/CVE-2025-26xx/CVE-2025-2691.json) (`2025-03-24T13:15:28.787`) +- [CVE-2025-27553](CVE-2025/CVE-2025-275xx/CVE-2025-27553.json) (`2025-03-24T14:15:18.687`) +- [CVE-2025-29101](CVE-2025/CVE-2025-291xx/CVE-2025-29101.json) (`2025-03-24T14:15:18.843`) +- [CVE-2025-29806](CVE-2025/CVE-2025-298xx/CVE-2025-29806.json) (`2025-03-24T13:15:26.083`) +- [CVE-2025-30092](CVE-2025/CVE-2025-300xx/CVE-2025-30092.json) (`2025-03-24T14:15:20.007`) +- [CVE-2025-30346](CVE-2025/CVE-2025-303xx/CVE-2025-30346.json) (`2025-03-24T14:47:51.437`) +- [CVE-2025-30347](CVE-2025/CVE-2025-303xx/CVE-2025-30347.json) (`2025-03-24T14:19:23.963`) +- [CVE-2025-30348](CVE-2025/CVE-2025-303xx/CVE-2025-30348.json) (`2025-03-24T14:08:36.513`) ## Download and Usage diff --git a/_state.csv b/_state.csv index ec2ebb2f80b..f66c79916a5 100644 --- a/_state.csv +++ b/_state.csv @@ -154149,7 +154149,7 @@ CVE-2020-24297,0,0,e576b9cd01cf6a8994f318babf69e2f2b06adb788f381b595912df71e9ace CVE-2020-24301,0,0,7b680ba77d912a029f5cecc57e5bd531ee6ea2f1ffbc277a7f5ab043d9ea4cdc,2024-11-21T05:14:34.623000 CVE-2020-24303,0,0,ef03ad71b17738f90f744dcc66e05974fa20b5590bca1359b9392a054cf84c66,2024-11-21T05:14:34.773000 CVE-2020-24307,0,0,76feeb4891bca5305064e4b61f4e78c6f585a2c308c247b6f103763d5cac669e,2024-11-21T05:14:34.913000 -CVE-2020-24312,0,0,e3370c0d382fd208fd40f0e0929c11f29888735b1932342522ed4a33b29ff2e0,2024-11-21T05:14:35.103000 +CVE-2020-24312,0,1,8c8bb42f1985c02e3b1caa4223c4f05625c4a374e9acd8d50d3092d8823438ac,2025-03-24T14:32:35.300000 CVE-2020-24313,0,0,3e4c26500ee58133028fcd8142343f0a4c9504b5a122cefd9f57fa296e38c2a4,2024-11-21T05:14:35.257000 CVE-2020-24314,0,0,786633013412d9742cf14839ab73d9fa200faf53f2335ad5ad8c25e00ee8551f,2024-11-21T05:14:35.397000 CVE-2020-24315,0,0,aa8bca7f7c830abb983b690c10093ee1d57f1af5adcb7ff27b89010c23a805d4,2024-11-21T05:14:35.537000 @@ -170322,7 +170322,7 @@ CVE-2021-24173,0,0,5d7dc34484764822ca47a3c5625d2b4f89e9d88f9dac2d61d9bd63cfbcdab CVE-2021-24174,0,0,07f5cde2d2cd100350b207dfcadb378a15f288a7f12241ead2d473892faecfe5,2024-11-21T05:52:31.510000 CVE-2021-24175,0,0,024bcd8d2e9892f34765fdec02921fdd89843022eb529a533d85af615f254014,2024-11-21T05:52:31.653000 CVE-2021-24176,0,0,55952ff6c8fc1b9fb41d12f43a3298987aefbd3cb5f79d1750910b0f7c838cb9,2024-11-21T05:52:31.800000 -CVE-2021-24177,0,0,85ff5bb8106bd0726b502c670f4440793f621fe914e9089b632237fd59dd9964,2024-11-21T05:52:31.933000 +CVE-2021-24177,0,1,cc5956bf2409264519b12bf4e596d83373e91f0b84938c48be6c7d208aafc6fe,2025-03-24T14:32:35.300000 CVE-2021-24178,0,0,407525c7c748a6a6cfc671c6d846f4ba1435f73482ccadd120668ee624ed863d,2024-11-21T05:52:32.107000 CVE-2021-24179,0,0,39e0f1177d0cc5bfcdd30b330ce756a196afc941334c73337d62de37fb1c7927,2024-11-21T05:52:32.240000 CVE-2021-2418,0,0,bdaaa24559fe65d9811dda1b668ec25fbdc3a3f6611648120b806865f11c6653,2024-11-21T06:03:05.173000 @@ -212368,7 +212368,7 @@ CVE-2022-4810,0,0,25162b24bf11dc0190512c5405cee16d314c523643e157ba40ee82b21459eb CVE-2022-48107,0,0,ea86b4df2888c77620f092846cd1660fa21ca354f29faf5cf44596d14ec923af,2024-11-21T07:32:50.230000 CVE-2022-48108,0,0,8d4f3b9b9efdf48cd29c33c16382d7f14321ac3ec536a714fd38fcbac269811b,2024-11-21T07:32:50.467000 CVE-2022-4811,0,0,c9ad55ad708c43d2e552a2a5cff5f2a41a15cb1ba0ee8006d753aaa8ca172523,2024-11-21T07:35:59.310000 -CVE-2022-48110,0,0,763d20be13ef5dbfe0eb13693f978f5479f04cde867846fcaa47508cb6f269a5,2024-11-21T07:32:50.707000 +CVE-2022-48110,0,1,4dfdc9bedc7c08ff14ba89cadd1d23d2de867d284056a453d36181031a922c24,2025-03-24T13:15:24.493000 CVE-2022-48111,0,0,6d90f28a337f6a00ea5e92197007edfb483aacede200ab8d61a3d9120f75dc78,2025-02-27T20:15:34.833000 CVE-2022-48113,0,0,b0d683d068557c5969d1f62219ce4bf5e3277c4d0cb6043a6977a60f5c15c44d,2024-11-21T07:32:51.957000 CVE-2022-48114,0,0,efe3af806680c265fe7c78edb3e8c4369f4d49d721d84f4e91d3192d71856932,2024-11-21T07:32:52.123000 @@ -235357,7 +235357,7 @@ CVE-2023-44411,0,0,5b73d7993ecb1e03473311340db5236397f5da42eb4c3c92ec97a1c9fa2db CVE-2023-44412,0,0,6216ac153fb55d835f60246bbb50d103769c8d5dc05c43fa99141c8048ca9c0b,2024-11-21T08:25:51.077000 CVE-2023-44413,0,0,f05f5a2a2ce80d46dbf9af9fcd6d7108fdba7b335628dbc7bcd594742b01d42b,2024-11-21T08:25:51.190000 CVE-2023-44414,0,0,4863139c39a5e2444afa2bc8a31ae4d79bf72c72c7e5042970d2e09ad2ad38ad,2024-11-21T08:25:51.303000 -CVE-2023-44415,0,1,76624e7442dbefa7d6042a7153b0e4add907db188a8588c7070de83d297cc212,2025-03-24T12:48:35.967000 +CVE-2023-44415,0,0,76624e7442dbefa7d6042a7153b0e4add907db188a8588c7070de83d297cc212,2025-03-24T12:48:35.967000 CVE-2023-44416,0,0,a8aa52de01d9bab02c5656b5193a650636dc7f0c182948154a8a159d3bab7637,2024-11-21T08:25:51.530000 CVE-2023-44417,0,0,d604d11eab16579ae507c724601dca6ac0340686b33321707acfebf29618dbd8,2024-11-21T08:25:51.660000 CVE-2023-44418,0,0,0f609b4f0722e7e7caabfa66af90176247cbc3cf793526b632257273742f8214,2024-11-21T08:25:51.780000 @@ -244072,7 +244072,7 @@ CVE-2024-0694,0,0,dc9fe628f2a11097b105f7eb57210979fce97a3cb1f54662a5d4688094bad5 CVE-2024-0695,0,0,473e62fcdac89c4d11adf50166cbb6d0f9f9346399cf546335c44cfbfe767100,2024-11-21T08:47:09.900000 CVE-2024-0696,0,0,34d00cb254f7cf4a7093a585c54d9d7f30888019d67c8e153525039a02e0b8b6,2024-11-21T08:47:10.033000 CVE-2024-0697,0,0,e9919142a54436f19fc761fdb7f668d20ed1451c051d4c52306aa6fd1fc674aa,2024-11-21T08:47:10.177000 -CVE-2024-0698,0,0,1694ad608f5ee442755a15c319b1b0043e2d280cb09c80445367f081002cccdd,2024-11-21T08:47:10.293000 +CVE-2024-0698,0,1,1cd0e9e76f6b290e1fd798d1310e5ecf99d0d744165599a478eec84059433537,2025-03-24T14:21:24.423000 CVE-2024-0699,0,0,76e0d4ff7a6c7cec726bb9d0f8dcd611b263184fdcc42117ab04d2112edec24d,2024-11-21T08:47:10.410000 CVE-2024-0700,0,0,ac3e3621778b65e996092479935d35d5822a5b6777807eb3a41da8381759c32c,2025-03-11T13:30:56.303000 CVE-2024-0701,0,0,1676b6dada46706acbed70af8cd91d936d02f269f1a280f9961571f79de427ca,2024-11-21T08:47:10.637000 @@ -244134,7 +244134,7 @@ CVE-2024-0757,0,0,946a152258210ddf800742de2d2343ce7559594b796f9e76d968aa0487d9bd CVE-2024-0758,0,0,e2cbb6a743b0f38d8763d67905dd1888ec1c82e9f64e59374dd3f997e1e4d7e2,2024-11-21T08:47:18.590000 CVE-2024-0759,0,0,99b9eb8ee7043f71b6949c108b98a1a65f3d27bc16c58f4c0db3736fc042324b,2025-03-04T14:34:52.510000 CVE-2024-0760,0,0,28b1688290a8429996cb15aa4a590dfc852aa2c256b386e9997c92991939332f,2024-11-21T08:47:18.850000 -CVE-2024-0761,0,0,3880824002a244098dc4a9d203545fa3dda9ea94020902bbdff8af939e9833c7,2024-11-21T08:47:18.990000 +CVE-2024-0761,0,1,862e4c887a97ccd6e0ed5165f4de47f8991bd45bee511f493ef7ab898282e708,2025-03-24T14:32:35.300000 CVE-2024-0762,0,0,55ce0ccbbb179304c2f94ca58c87f5c89024696b56a67d10de02a4397359f1e2,2025-03-20T14:15:16.470000 CVE-2024-0763,0,0,2fda1eb8296cb6fa787c30d0596620796cc26e6d14774e3e7885e7a139af41ee,2025-03-04T14:33:46.043000 CVE-2024-0765,0,0,147924df3c2a99e28ac84acf5407b5a7987726a2c64f3e2adccb459d5985f3d0,2025-01-08T14:32:04.447000 @@ -244466,7 +244466,7 @@ CVE-2024-10126,0,0,fa04ca2f438ecf0cc8567a4ed348afa49323dd8bd363f782a90a303269298 CVE-2024-10127,0,0,06e3c3472db857e7c40872ae531d6718f8d7b4a5c6c7da876449bd838933d7f9,2024-11-21T15:15:19.910000 CVE-2024-10128,0,0,2893e20f6d74e02ac5d6c0b7b4f8c97548dbf66f37fca83817656bb915edd6da,2024-10-30T20:31:33.213000 CVE-2024-10129,0,0,28a13625bf718e9885946b665a3f84bd4ea57a8e0462714cfde15849b73ffdc4,2024-10-30T21:15:29.877000 -CVE-2024-1013,0,0,f32d27b1b2b50666d2454c08b20a8df43fb82eae81e98b7aac846eec69e6136a,2024-11-21T08:49:35.760000 +CVE-2024-1013,0,1,ad1a10ec29024816a3e1ece2af7e76289f4967487110c7ac1339b671fbf3c37c,2025-03-24T13:02:51.540000 CVE-2024-10130,0,0,b538a29f7fa6c9f149785378ab707ac409176535e686025ad1e1e2da58f643b6,2024-10-28T16:08:57.147000 CVE-2024-10131,0,0,3fc0e7cb588d9b85e8a5d703474c6933761121415434ba46fde24feaf3b0827c,2024-11-01T17:12:26.297000 CVE-2024-10133,0,0,d1f6b85c268525fdcbda778feeb0cbdeed8aa39fb2b79287e0b1951aeaaea915,2024-10-22T18:10:58.963000 @@ -248049,7 +248049,7 @@ CVE-2024-13781,0,0,55b434da390091121d3d513d1001af7581c49a5184e304eb6431dc22698b9 CVE-2024-13783,0,0,4d1adc087edd34d52079e199658ef345cbd94c9c74350c99493fda1d34bf23f7,2025-02-21T12:19:42.537000 CVE-2024-13787,0,0,0eff21fc23493e01651531789dedbb01e9f9791c6b2318877412ee79834420bc,2025-03-05T10:15:16.810000 CVE-2024-13789,0,0,2b0af9ac1cf71402f1bdf617ac72ff1dc3e5b91a3734626a9c4e88889f4b7dad,2025-02-25T20:56:25.757000 -CVE-2024-1379,0,0,80ef94f14b81af8686333ad09c1ad2f5017c23d1adeba6105930342040ebce86,2024-11-21T08:50:27.157000 +CVE-2024-1379,0,1,329b3b08765a69102416ab28d875ef22ab72660cea0367e0a1a6768dc9317682,2025-03-24T14:48:13.980000 CVE-2024-13790,0,0,5ba2b4aa3f9e5ca19f6db2b23c62c6b59fa6ef48bdc3c75c47e6b8b955b8ac49,2025-03-19T09:15:14.250000 CVE-2024-13791,0,0,87d34d666cc6abe64fd811a08f4df25c9dcd54e5f0bd075f781061adfbd26e98,2025-02-25T04:01:52.803000 CVE-2024-13792,0,0,95c136c58ffd0d86dab2da9aa86fa75170f9d7e438d0612c3363162ba0d1c0ed,2025-02-25T20:56:55.553000 @@ -248072,7 +248072,7 @@ CVE-2024-13811,0,0,57806b80d84984ab0707eab6f87b5409b8e69c8b4253d9d4911055373b8ed CVE-2024-13813,0,0,fdc4ad5ea8556267af57de167767e42189cf8d83fe0a9d1183500203243c2b38,2025-02-20T15:56:04.087000 CVE-2024-13814,0,0,1eaa34671c59ff347de019eb0f7db92c91d554728619786a007d058e64ccd6e0,2025-02-18T21:30:00.523000 CVE-2024-13815,0,0,aec719e5fa41cba0df41e6a8bd188b47d403ebb0cf52dae42ee4fb030c59c5d4,2025-03-05T10:15:18.210000 -CVE-2024-13816,0,0,1e01703bf95fb79fd98d27baa9549fabe4361bf13cec7205abd2bb90a2f4f38b,2025-03-08T09:15:31.077000 +CVE-2024-13816,0,1,0cc34a51d53a80c858ce2d43f6d4bd1247e7d0f4da717997083f594220381cd0,2025-03-24T14:23:45.580000 CVE-2024-13817,0,0,b5a69d8e5693042f6213842e77c8ea5e9adad031b258d4d25f98e0b0bd22c27b,2025-01-31T03:15:10.910000 CVE-2024-13818,0,0,b34cef01cb19d809209555e3902d48d3c034a9e483326b43d02f63f2eb6722a8,2025-02-25T17:03:16.093000 CVE-2024-1382,0,0,46ba372cc585c5cc80406db23ae24542751b0e1ef43905cbc6e0bcf967676a5e,2025-01-21T17:04:33.737000 @@ -248151,7 +248151,7 @@ CVE-2024-1390,0,0,ffdeb8cc4a3b1077717739c1e237f842eedff68b0ec02858887f3acd549f9f CVE-2024-13900,0,0,a36f38c86f625b2f6c78f95d04b10fcda1c4c7dcd50cfc141d8c356f3933fb59,2025-02-25T04:02:36.137000 CVE-2024-13901,0,0,eae64dcc2a1b4a359bdfacf8ac3e5ceaa3388c11896901d76eda175625edfbfb,2025-03-01T06:15:33.827000 CVE-2024-13902,0,0,b7c5a8d197d4a425ef20716ec672f0302e19616c286ab40947d5091ad0b83b7f,2025-03-06T10:15:09.900000 -CVE-2024-13903,0,0,458a1ae619515c427233c8422b8e0cf5c600ab06ec81ae344ae74e9e5998e3fa,2025-03-21T07:15:34.877000 +CVE-2024-13903,0,1,8eaf38ca34d9751808d9b1052a7046c19fa10f1d49bd5cb16f1f51911fabc6eb,2025-03-24T14:36:07.503000 CVE-2024-13904,0,0,72951d50371ccb3b7b3d0bc50fc43f180c4fdb7fa249b4640e6ea8f80e40a148,2025-03-13T17:43:12.470000 CVE-2024-13905,0,0,436741d4745da61f32b1dd276f8785ce3d1d88be86851a86061b5781057f28de,2025-03-12T17:47:03.400000 CVE-2024-13906,0,0,c18d3ed61043491f118577c9199dd56f8e4281ffddbc9a5f32cd948a9ff0542a,2025-03-07T08:15:37.467000 @@ -248161,8 +248161,8 @@ CVE-2024-1391,0,0,fccbf24dfb651f372e2b51106217c90f4de85c1f936edcd91290184be12fa7 CVE-2024-13910,0,0,6885427b6394b62d7dcb79523e61be62dd8281aad81e8cab0af59c67e1beea02,2025-03-01T09:15:09.517000 CVE-2024-13911,0,0,4ecdacf9340f565972d67d0fd0f16ebfb137c877e410b587b04d73d76789b018,2025-03-01T08:15:33.803000 CVE-2024-13913,0,0,97e9263ea64a11bf1d9dd911c989e4107d7a928b53ec2e2ca6bd3929a0fde8a1,2025-03-14T06:15:24.490000 -CVE-2024-13918,0,0,aac9d206b672ba1aab6fed634936e376969cf60ac5105bcd290dee3cb04643fd,2025-03-10T17:15:34.383000 -CVE-2024-13919,0,0,7c5ab092a55439dc8c02bc97bab1d29d32b755887059a3b61b9ad224908cb057,2025-03-10T17:15:34.540000 +CVE-2024-13918,0,1,42b43ee8cd03c685390e4720249fe990efc04f95289c224e1def5175db4f83ef,2025-03-24T14:15:59 +CVE-2024-13919,0,1,e47cf885ddbb3552eadad29313f1bea2b10cd197fed90bc6c347d954f876d2b0,2025-03-24T14:14:53.337000 CVE-2024-1392,0,0,7d376d426c7bde42291bb43e543815dd80a04cb004b570eb44a0e5840366c498,2025-01-17T19:53:57.010000 CVE-2024-13920,0,0,412080a58ac2beffc4f0b5116c9e59adf34c92959ad0774a448af2bf0cf9fa9a,2025-03-20T12:15:13.477000 CVE-2024-13921,0,0,7f5b22f3ec5af9968b6c5029ec792e6e70eaae63a1dd9752a50bc7e4318e5b71,2025-03-20T12:15:13.633000 @@ -248249,7 +248249,7 @@ CVE-2024-1469,0,0,590671307a558ec03a593a57d055ca4159f61cbf1591b1c2a815f487ae5ee4 CVE-2024-1470,0,0,8f3d9e30e6356f6f03333fcffbe645c7bf7c4fc576142a7e721ae6cb68df2804,2025-02-14T17:24:17.347000 CVE-2024-1471,0,0,777aec2b62d8d0522847f5c8ad1ffb32c1bdfef2816c32249a594f8d812bf3ca,2024-11-21T08:50:39.250000 CVE-2024-1472,0,0,593c5c88248935b38d8bc270b49c466696a468591761351bb4a10275c97146a0,2025-02-27T22:40:46.877000 -CVE-2024-1473,0,0,67a510a205fa9df5a35c0d8b4e0964af9a300cd370b4f39f55a30652a7bc597e,2024-11-21T08:50:39.520000 +CVE-2024-1473,0,1,12bc01d23f0f4006d4cd9068f8d7be107a40e23c5527983747b4948d686e1c5b,2025-03-24T14:44:29.747000 CVE-2024-1474,0,0,daadec47e39f2f44b7199c43a754dd51ef7d732e2acb33666807f90722fd7837,2025-01-02T13:58:35.287000 CVE-2024-1475,0,0,7e529a880d46e414bd5f047f8a63bafbd14e3985a6a0fccfcbd403918470f93b,2025-02-27T22:33:02.830000 CVE-2024-1476,0,0,f9a001a7ca25fc8c88c5a70a9911e03cd3724effb31daf4187c778e14a9f4f95,2025-03-06T18:01:06.013000 @@ -248962,7 +248962,7 @@ CVE-2024-20289,0,0,5a41bc3598f1aaec7151598e1fa9b8bdf8e15887462c2c995bc9a053cd9eb CVE-2024-2029,0,0,b4ec0fb87b25dbda385a151f4a9390a5913fdb85d70aeda457cf530e66ab8d7c,2024-11-21T09:08:52.600000 CVE-2024-20290,0,0,0babbf7a7f9d2f4798677a463b58b8e44a6aa9038067184cbb9fb6075566f6d6,2024-11-21T08:52:14.023000 CVE-2024-20291,0,0,029c47a97724a22184840a9712db5c752c0968d20047e707848301e3d1a84644,2024-11-21T08:52:14.173000 -CVE-2024-20292,0,0,3e840538fd3ca90ef930e620ce580b70a9bc4510d00d31c0d0aa23a52d50daea,2024-11-21T08:52:14.293000 +CVE-2024-20292,0,1,2ae4b2a0092af513b2a969df74bc0e8de5c71055687517b95ced80ad1ccc2c0d,2025-03-24T13:56:44.540000 CVE-2024-20293,0,0,699e1ee34bc0f92d31d8dc082f608b5ec46fd158fcf8f4fea9b6469de92ce39e,2024-11-21T08:52:14.410000 CVE-2024-20294,0,0,a7e79899a9eca655f52ace711fb53511da6db54120966d800bd4b619294f60f0,2024-11-21T08:52:14.550000 CVE-2024-20295,0,0,1ff967f4ad8e670fbf5ce51dec8d2be2b1d861a90b7d824c96aaf5baa6a1dcfc,2024-11-21T08:52:14.813000 @@ -248972,7 +248972,7 @@ CVE-2024-20298,0,0,c176dc00948a2b0adc44e9434e8502044991acb45e290de075daed84f9564 CVE-2024-20299,0,0,65fa35648e4579cfebc5c23e99a9d7fcef4a936e9d99477694daf09563b8545d,2024-10-25T12:56:36.827000 CVE-2024-2030,0,0,7b76af7278d28b7f41a4d8c9693da8b31419db2993731d8e01ed07cf48059f09,2024-11-21T09:08:52.810000 CVE-2024-20300,0,0,c2151cff897f92f1e62149d5bfff33ae8d2867de5d5923269d3cbccedd3848fe,2024-11-01T20:14:59.393000 -CVE-2024-20301,0,0,296a6ef41bddd17e25fb20e67e596418baf6aa68a4c1e72767103de927f97463,2024-11-21T08:52:17.907000 +CVE-2024-20301,0,1,a63b81f847770e36109ebc116049c7baa7c7b42f5a62b92bb91ac0b0576a3bf2,2025-03-24T13:53:28.940000 CVE-2024-20302,0,0,8ffcc974c4242a1201a39e60273e5b111bb4a4f772f5e493721de8e448c1b361,2024-11-21T08:52:18.023000 CVE-2024-20303,0,0,39722f677aa5fcc08370fbf0670fda818a9bce0c2f9be09ce2e1c2c2ce497791,2024-11-21T08:52:18.157000 CVE-2024-20304,0,0,f59929d4ee2b44d7536f77812cb12006cdc47f7a16a595b1606514d6161e064f,2024-10-03T14:20:07.680000 @@ -251292,10 +251292,10 @@ CVE-2024-23156,0,0,0bcc44be265b5ec4b95352c8dc20103c92c8b119e5bee417ac43e4c8972db CVE-2024-23157,0,0,22dc84604a856aa7b754d635be48ab6b2fbad48efabede87eb773a3c55273ec6,2025-01-28T18:15:36.170000 CVE-2024-23158,0,0,1f3c0438d650bfaf474ab8211c4f7f7d8ab35a503ed9ec36c17b870c88173989,2025-01-28T18:15:36.657000 CVE-2024-23159,0,0,17f9618d779e6067e5fdd2980c955bd551b1f15a6ad974e2af8f8fa3e6bf07cd,2025-01-28T18:15:36.913000 -CVE-2024-2316,0,0,83d5cf4659a170084e1e0470a7f66505174bf53f1de9a7b03c8d0aeafab986fb,2024-11-21T09:09:29.647000 +CVE-2024-2316,0,1,ee7121ef0a40371a7ae671273a460282030840c9d4e64f3373d9085f63540c8c,2025-03-24T13:45:34.743000 CVE-2024-23168,0,0,2aa18f1b49da1e0964e0bd3c314ad28ba6c11c2b0afd22534b6b4245d90b594b,2024-08-19T13:00:23.117000 CVE-2024-23169,0,0,082b720683f3e21b7d47db625d5710583514f62debf5a7d0b4b55633c65d78f9,2024-11-18T17:11:56.587000 -CVE-2024-2317,0,0,1b6d9f632088323dfd2c2b844743a0d5c9ce88afaa399a7bbad7ed3dc388f7ea,2024-11-21T09:09:29.780000 +CVE-2024-2317,0,1,28ff1b529d0defa986bd83b72f9ca183158fc25cf191dacef2d67f1bf508f9bc,2025-03-24T13:40:28.963000 CVE-2024-23170,0,0,268f0a563023a4ecee170c2c2a538f43bf34cf80fcec28a68775c17939e45eb6,2024-11-21T08:57:06.877000 CVE-2024-23171,0,0,70c0fa678e5b29818735a906a916ff67de22d23af48d8373974888133417fea3,2024-11-21T08:57:07.033000 CVE-2024-23172,0,0,5c1a5fe9b7cebf0c34d4878687c3005ec538c3891848fbba3ae0ca350177b5dc,2024-11-21T08:57:07.193000 @@ -252903,7 +252903,7 @@ CVE-2024-25255,0,0,879d4410a08cc23864a4824dcb477088b28d669368fe48b08008f9744ea81 CVE-2024-2526,0,0,6d31299cf21b3ca70a30e311fc2e2a656acf83713529031d03c01f6863912087,2025-03-03T16:58:40.533000 CVE-2024-25260,0,0,6ee402f74d2c05b4570f4093e7c197c9456061478a7a78d4fa79e707475ac8a5,2024-11-21T09:00:33 CVE-2024-25262,0,0,6b97d3438756703316ea9218afd4ff7812af2caa96c0282d0288ca35efad388f,2024-11-21T09:00:33.223000 -CVE-2024-25269,0,0,ac67bea52ec61578eaf85eb63c962f926d5a98fd2090f6b635a91bd784257179,2024-11-21T09:00:33.443000 +CVE-2024-25269,0,1,482664a96fc862e0ad9b079504b50f4a622c1b74901af4ecedf9f04628c59364,2025-03-24T14:40:29.340000 CVE-2024-2527,0,0,3ff67e930beef40cc15c15e5bf25e8f7b61c331fea60f294803bbbb673743b1c,2025-03-03T16:58:18.573000 CVE-2024-25270,0,0,8208357e1e39e95096dcbaa9833346184b3d01a6dfda4e5a2a59f10ccfd4ef6f,2024-09-13T16:01:01.810000 CVE-2024-25274,0,0,e9c3338ea30ee27a2b2e63cb3c1583dff1e7dfbf6ba74eeffc44e3645c9dc1e5,2024-11-21T09:00:33.740000 @@ -253261,7 +253261,7 @@ CVE-2024-25832,0,0,4bbe4be7f5e3dc776aebcb65e171010ecfa1bf1c2a8aa0f96d07eea3ec5ac CVE-2024-25833,0,0,50dde66bc691dda473a0e2525b2d4cb41dc2484c7572d20b63fa74d0870cf5ff,2025-01-16T17:50:18.237000 CVE-2024-25837,0,0,86d76b7ebf93751ffe6cf8d9f95368b24e68bf00449c3aaf1e935929e8a4ec61,2024-10-30T15:35:08.810000 CVE-2024-25839,0,0,a6951a161c8400420691d40a579c87f91e6e0f1f8f29502c5d7b5cde306b0917,2024-11-21T09:01:24.383000 -CVE-2024-2584,0,0,287c014326fd7341f0b983231ce9a63b746a1f5137020a78b87ee06f265f4e27,2024-11-21T09:10:03.963000 +CVE-2024-2584,0,1,f782ed97eaf6cf6c32af6095746ef607fb7c7319b676af932aa88b96de0d2629,2025-03-24T13:26:38.360000 CVE-2024-25840,0,0,8953a162377158948ebf7583b7c44850336b1c32eb8d66824e9b6ea8a16712b3,2024-11-21T09:01:24.607000 CVE-2024-25841,0,0,1cb7464f2518f62dee904dbba21f1e8aa99b45085cfe0282e745efb6a4ab2baa,2024-11-21T09:01:24.830000 CVE-2024-25842,0,0,0dd71701c493fa8da9031acda8d33e9cd4280835d6b7f61962baa7202804e979,2024-11-21T09:01:25.070000 @@ -253272,14 +253272,14 @@ CVE-2024-25846,0,0,febc35ffe3a6b2f8081b7b020429f1044997f06712c8efc18af146fe6acc4 CVE-2024-25847,0,0,f8cb76c7e5cff1c422ae5c1e74e8d8e012e5cb4d2465db8ddbfb94b841426882,2024-11-21T09:01:26.110000 CVE-2024-25848,0,0,da8ab744f7e053f2d4b25a6add8955f2ba29a6a3c30f16fce58f174bb4752a74,2024-11-21T09:01:26.427000 CVE-2024-25849,0,0,098caf13d6f2d164bbafe70249d20ff79f96a6616cdc1821d31a83f282c60e57,2024-11-21T09:01:26.647000 -CVE-2024-2585,0,0,16e055e57b1385b8b62a6c78ed4b4d7473c21355b2514051eaf54646cf380b8b,2024-11-21T09:10:04.100000 +CVE-2024-2585,0,1,50144b1d3dd97c13f96cca4907fda85fa00ce60c94d731acf778acedd7f8e173,2025-03-24T13:26:33.507000 CVE-2024-25850,0,0,4673176ecee34dcc78af9600d014f3dd902b7b63e9c85bc9670c420773e42318,2024-11-21T09:01:26.870000 CVE-2024-25851,0,0,92477e80faa4859fa2111695793059bae73f5a11f7ff8ed9bd0450f255996b8c,2024-11-21T09:01:27.100000 CVE-2024-25852,0,0,5168a334b2b38e4578bd25dcc0cf32bd39c16c5efd9deeb1d0d54f814df180b1,2024-11-21T09:01:27.317000 CVE-2024-25854,0,0,686a7b03cad9de1c1d99d567cba7c4b572b04e11530dbfbd0ce774f89ebdc2cd,2024-11-21T09:01:27.533000 CVE-2024-25858,0,0,a77c4e8bd8b75d30f14ed1903eaa31883fb836c272ec5e4d5c204f2a26cdf227,2024-11-21T09:01:27.757000 CVE-2024-25859,0,0,34b3066024d487e69b7e4402052d02a767e3807f28bf8d04e6b68bff8e2c3131,2024-11-21T09:01:27.973000 -CVE-2024-2586,0,0,8a0685696a84a6bde28efbe1f961a00aa8f8a3b0b38937280c5c769ccc1969d1,2024-11-21T09:10:04.220000 +CVE-2024-2586,0,1,1a548a3917ebac3974bc08df78e85551fe8991af6bba6bdd3cfdd5a3fef654d2,2025-03-24T13:26:35.903000 CVE-2024-25864,0,0,ae5cde95439c3b4830e2d483da84fc1134137334054aa6643d506272a01c9cde,2025-03-13T17:15:29.623000 CVE-2024-25865,0,0,fb8b9022037f41dea0736e6440808f813bc3f7c4d97efa80bd4633ae556ce670,2025-01-21T15:06:54.557000 CVE-2024-25866,0,0,cddbbd2f3013eb33e91e4d0d1121bc9557a1a9dcbf91365570d4368c1e595cd0,2024-11-21T09:01:28.557000 @@ -253808,7 +253808,7 @@ CVE-2024-26520,0,0,7cdc56c5d27885a06d263f0d33badd1c8b5db539649a135f3710771b22a3a CVE-2024-26521,0,0,7a4a8c17931324da0360080baca8e9b8985dc9e1a6b4a9fe5e3ac63cc7433d0c,2024-11-21T09:02:32.387000 CVE-2024-26529,0,0,10e5da07aaf6222757a327b3019ccb7168bffdf2d8b6f4a7805796ec8e2dbef6,2024-11-21T09:02:32.617000 CVE-2024-2653,0,0,2740d2471c15491d9ea329b79cb148ef218e8f532d711ebb3c9abf47fb26cb31,2024-11-21T09:10:13.160000 -CVE-2024-2654,0,0,c8e44b7f15192974f1da13f96b927a76874d38dcd4e8ae51d8f291db3c87ba32,2025-02-26T18:15:13.590000 +CVE-2024-2654,0,1,de0e9aeb600c35d393cda0d9b71327456c70ba2dcd19304dcb4a563e697a2b27,2025-03-24T14:41:58.103000 CVE-2024-26540,0,0,5970c3a2d028ecebe91244fa68ea154ff04c44c8c8a65c7d51e6549924364887,2024-11-21T09:02:32.843000 CVE-2024-26542,0,0,005342b86fb12fcb5776ff8acf0dbdaf45e957519ff7c276f4bd35750e623b36,2024-11-21T09:02:33.060000 CVE-2024-26548,0,0,aa5bd2e38cc9b49813f4d4591520334b4656e0d644b76a1a13648f9798a2f54c,2024-11-21T09:02:33.270000 @@ -255458,7 +255458,7 @@ CVE-2024-2845,0,0,80105c9d9b479536e543f6f21c5940bb1e70afb1eb269649ceef66615a1542 CVE-2024-28456,0,0,1a1d69ea4fc531fae8bde9b79420c01cafbf08538cff31b49285edb153e71acd,2025-02-27T14:06:39.447000 CVE-2024-28458,0,0,385ea8b6fe8386a730f9d9ec753012f4fee3e0df928948a71e162020d8f7252c,2024-11-21T09:06:24.153000 CVE-2024-2846,0,0,73546df08f61686e6ff129bb1ed27be8b2886976e7d37bdbc909044b09df10da,2024-11-21T09:10:39.930000 -CVE-2024-2847,0,0,bfdff29d4ac831dbed99cd09fb18d5dae900bd72826fcb0d4dda81caee385df2,2024-11-21T09:10:40.053000 +CVE-2024-2847,0,1,071016739328742b92b352de5364c32b24bf8902a38c2e6f36bcce22b371719e,2025-03-24T13:28:51.537000 CVE-2024-2848,0,0,62f4db9349fd62ae0d92f0f5786ba69f9c846f07a3e4b71b03d1f2958f128eec,2024-11-21T09:10:40.180000 CVE-2024-2849,0,0,81ad90dc36b16f68fa0ba01fb79a027c60b62a93e38d7f86cabe537f282de438,2025-02-18T16:57:52.660000 CVE-2024-2850,0,0,ddfa8db4983f18c60701e96d4942ce6f6bb96a73c28f0cc400ac097ced2a3a5d,2024-11-21T09:10:40.440000 @@ -258395,7 +258395,7 @@ CVE-2024-32504,0,0,2aabe701b6eec7e2b45fe499888dddd7f5a1aa426efb26ffa55d554911270 CVE-2024-32505,0,0,d7a2d32ddee71d2913c15e727239ce4e988f5d0e41404c47775dd189972a5643,2024-11-21T09:15:03.347000 CVE-2024-32506,0,0,b107e8ddd51e583a9d0ff0af499834d62f7eab2b21288816ce4e8a42d24808cb,2024-11-21T09:15:03.497000 CVE-2024-32507,0,0,adfaa8d5d3c430c1e863ff4b449d0566f7cb0a7900c0306a1fa64b604809d5e4,2024-11-21T09:15:03.640000 -CVE-2024-32508,0,0,9b0ca29425d4b42d69f65288c10e28e41f5332a88072e31e4d9e6cd850f66d37,2024-11-21T09:15:03.767000 +CVE-2024-32508,0,1,48fe7cb0bf663bd083947b5ff0c443f41f9ac46980f5ba5afad6c351eaea1d8c,2025-03-24T14:27:15.187000 CVE-2024-32509,0,0,d7ae0abbffa293f67efb9678c0e0a3733d5c85e86821f6192484d815522412b8,2024-11-21T09:15:03.920000 CVE-2024-3251,0,0,5f99736f6157d086833551a83496b0a98b854275568feca671d660eead54b153,2025-01-24T16:31:37.807000 CVE-2024-32510,0,0,d00b602fa3d5cf5b31ed40fc54835d9b4e6454dd89336228be943571d234b5a1,2024-11-21T09:15:04.043000 @@ -262227,7 +262227,7 @@ CVE-2024-37316,0,0,aa32ad5c3622ebb71c43342a819282f9a97168598b980296b31ee7da94fc3 CVE-2024-37317,0,0,3b64b0f97639e499f51c67cc747dc0c3939dfb9ef323865a8762acf95bc3a6d6,2024-11-21T09:23:35.997000 CVE-2024-37318,0,0,2d4aab45158778d1d7fad47b4742d31a104224cc74d3e8ae43a30a4495818e1a,2024-11-21T09:23:36.153000 CVE-2024-37319,0,0,ee81be4d97a87943f7c59a68ffce264da032be1fe97c2cbbc3a669a18e32e608,2024-11-21T09:23:36.300000 -CVE-2024-3732,0,0,cc371986c7cf1506e7648c5ddf7250c62125d2cd802af97dbd5e745961da592a,2024-11-21T09:30:16.123000 +CVE-2024-3732,0,1,2ce9b326b1f7dc76fee1ad03e2e8a0f40924a47e98776d441a4a225a098491a0,2025-03-24T14:18:23.650000 CVE-2024-37320,0,0,abb32fe40270e34f3de7a787200ad52fc19154fcca83da0f94320663ba388fb2,2024-11-21T09:23:36.440000 CVE-2024-37321,0,0,3599724510d409972a2c369a40e20b7dee3441b45d237015c8ec006172fe249c,2024-11-21T09:23:36.587000 CVE-2024-37322,0,0,9062728a31a0ed45209ba67b972edc92452e760ef80af533867bdb442750f6d7,2024-11-21T09:23:36.720000 @@ -265267,7 +265267,7 @@ CVE-2024-41308,0,0,246da12aea3861cf0f31cc72fde3509dc23f9da5018b459fad63ff4358f27 CVE-2024-41309,0,0,e0fd676cb9822aff90101d75eeadc774022c0635057955d2adf3a5b268980c3c,2024-08-08T15:35:19.553000 CVE-2024-4131,0,0,4dae8560917ba1dbb256e658dd81a89fe2669bff14a51ed3ec048f75ee1bc896,2024-10-17T19:40:47.187000 CVE-2024-41310,0,0,d1d49ccbac664e5009a1f1e845d00957a88a31261c986d0289baa9324bfd588d,2025-03-18T20:15:22.757000 -CVE-2024-41311,0,0,5e8f22fc8f8c64fab572b01450b4c33433654d83403c546cb512aea17cc2c5f4,2024-11-21T09:32:30.190000 +CVE-2024-41311,0,1,1fcd2258b87322a5bfd29d32af9e08080a54faeb80f8dcb0bf0faa2b24b9d93e,2025-03-24T14:41:38.683000 CVE-2024-41314,0,0,a1bbd0aeb1f582375ecb918b9c5cc43f281f2650baf6dfda1d036ddaf106874a,2024-11-21T09:32:30.427000 CVE-2024-41315,0,0,59ec2b072028032cef846dcd3457548b2ac7cee52888b2425478c874345efc09,2024-11-21T09:32:30.633000 CVE-2024-41316,0,0,78e9061126d98776eb5b07d553d57e787294e454197c8fd8bfbae08ae13ce284,2024-11-21T09:32:30.850000 @@ -267084,7 +267084,7 @@ CVE-2024-43613,0,0,d7299c559a75859017911328de01e3cf012a0c38c26222986e53798dd88d1 CVE-2024-43614,0,0,c5d2c4e61e699928a9aa80596895800f4eb921603cf99ac879c7ced052428111,2024-10-21T20:50:38.370000 CVE-2024-43615,0,0,fa3ae0c75332c4f77e78f0d17ed80118371844c95c489872e0a72219eacc2cf0,2024-10-21T21:00:34.967000 CVE-2024-43616,0,0,53854d33ac39e3d7883338ceed28a977b17a47e36ed07fb5aef1617d3c509acc,2024-10-21T20:47:00.313000 -CVE-2024-4362,0,1,bb774e1e8915d69721ba8e30a59811fec618bd2752bcac57607a0c7eea514be3,2025-03-24T12:47:20.663000 +CVE-2024-4362,0,0,bb774e1e8915d69721ba8e30a59811fec618bd2752bcac57607a0c7eea514be3,2025-03-24T12:47:20.663000 CVE-2024-43620,0,0,8e0c2a1210cc0c4b2cb1627c80802cd8cf1eb8d1337fe83c819d52cdc6ca964e,2024-11-15T23:59:51.167000 CVE-2024-43621,0,0,0abee03416290603675a89e86634b63819c275cad6799db8e43c2e3aac84cbd0,2024-11-15T23:59:21.473000 CVE-2024-43622,0,0,ad575e18f1ef382f66d7c1290041cf669cb5b64261107c3aa70fa11f73f5952f,2024-11-15T23:58:33.873000 @@ -267633,7 +267633,7 @@ CVE-2024-44175,0,0,21fd54203e8a328aa6ddadf60d944e0a0983b6a3a07be2abcb838cb48b12d CVE-2024-44176,0,0,006ec9194c70728a5e2d1ad56f20f8afbe0767c2cf3f242696ae5316e66b3e7f,2025-03-18T20:15:23.277000 CVE-2024-44177,0,0,0086874e5f4389e06928db6b81db20629e71c2b6609f712738d0b53b5de5c4fc,2024-09-24T16:28:09.853000 CVE-2024-44178,0,0,52136cefe2d25f7e7593f3a1baf6ea17ef87911f72a4c46fe3c4d4132a742324,2025-03-15T16:15:13.397000 -CVE-2024-44179,0,0,974c324437d0b47843308bfaa610ce0667fd15147952f788efc7cb0e89824d01,2025-03-11T03:15:37.160000 +CVE-2024-44179,0,1,c0592876efcda576cab02a87be9668a0113f116d0ed031b45a5c7f5026765be8,2025-03-24T14:55:43.037000 CVE-2024-4418,0,0,3c06db20d6f1d09e33f3b0bdaf6cae857194aef327226f05897e6eec0e0197ea,2024-11-21T09:42:47.483000 CVE-2024-44180,0,0,5ee06b0d7bca5ffa3ec5bcd8648dbe062fdbe7bdbeef38c79adf1789513da422,2025-03-13T15:15:47.787000 CVE-2024-44181,0,0,9f764041db3ee2ae306fa1aaa1ce0b51551ba6471f7fcb4d2aa59af3236b99bf,2025-03-20T15:15:42.527000 @@ -272419,7 +272419,7 @@ CVE-2024-50861,0,0,daab97f5069a3bfda43517026828d2c16c97699dbe9561ee4716d07ce3db0 CVE-2024-5087,0,0,31abeedd94931ed5c0834d8eca1075c48705227fc52b3830e1422827a9f66ace,2024-11-21T09:46:56.403000 CVE-2024-5088,0,0,cb760213addc1b272fedcd03b93efb771012fe463aac9fb68544dce6e855ac4a,2025-01-07T18:03:40.723000 CVE-2024-5089,0,0,305706c4595c847ac9cbba52082727d9aefdb687316aa25305e2ea82257716b3,2024-06-06T09:15:14.897000 -CVE-2024-5090,0,0,1b6a1576c22e6f2b85c5d79dd01eec957542c9927090487f52624e8d5cbdad76,2024-11-21T09:46:56.690000 +CVE-2024-5090,0,1,be9394a77b166a243259c0077ca7af2caca708f2842e943e56e3d030bdb15fcd,2025-03-24T13:29:44.987000 CVE-2024-5091,0,0,393c014b4bb52a48a9d4b8937594c0dfb4193040ec7b84211155e6ea1ec0e366,2025-03-21T19:32:12.860000 CVE-2024-50919,0,0,0e0de43028cbc2e3a7be2da6c3327cae947119486f4b0445705a5caa5d92a911,2024-11-19T21:57:56.293000 CVE-2024-5092,0,0,a6aa1eacad0ce06d5b2937e57090c83511924826ad271d66c972571f704e30fa,2025-03-21T17:56:42.750000 @@ -274727,7 +274727,7 @@ CVE-2024-54173,0,0,9626ebf00dbcb8d683d602e32e68262d1ef27b7e0ae499ee14c2f9df98191 CVE-2024-54175,0,0,6922222bcdfc7b96fef3a341f6cefc80aabd1e3cb954e956a74e6c94cdaedb34,2025-02-28T17:15:15.487000 CVE-2024-54176,0,0,5463f590e796ae65427debb4e96d6df8b03f447d67021c1f3c7471918becbe24,2025-02-08T17:15:21.643000 CVE-2024-54179,0,0,cc40342456ec0e93880ba1ff6de6912ca898fe0485f93a482cde3b645de39dc5,2025-03-03T14:15:33.960000 -CVE-2024-5418,0,0,be238546d1feb3ca25567c8479cf0b38156870d92f596185ebce2aa2231b4054,2024-11-21T09:47:36.970000 +CVE-2024-5418,0,1,e8b4cd9b422aa40da5d2622d5e29796eb5a07db3f41b03941ba29e731fed299e,2025-03-24T14:25:36.727000 CVE-2024-54181,0,0,dfc1a5ecb59f8ee1aa215392f6a5f462d2b4bfc57816ecf4c45667d73975fba9,2024-12-30T14:15:05.867000 CVE-2024-5419,0,0,bf78f58706f13dc16fbd00574fc12a2ad63186889150404f7c80cf6aaa4041da,2024-11-21T09:47:37.083000 CVE-2024-54191,0,0,247e99cd867b0b816f93e1330170d487e47438a01b1b24e3eb1ed293d8adb8cf,2025-01-16T16:21:27.237000 @@ -275080,10 +275080,10 @@ CVE-2024-54535,0,0,93cfc2e3f7ef6acbc5dbb1cc184a51f7781d104271fc6b2624d565551722e CVE-2024-54536,0,0,c98f603f951680ba4768b8a781e9ee4b1b50a2e9974ad3ec2a10b1d650e3b438,2025-01-31T22:15:10.077000 CVE-2024-54537,0,0,c68a6744bda0bf69e01783e98c5c4c4076f531c7f9b134c973d8c4233177cb65,2025-03-18T15:15:56.877000 CVE-2024-54538,0,0,7edb6abe162912ee005c390ccfee8e5c4c4cb96a25890eec5d650424cab9c014,2025-01-06T15:11:09.817000 -CVE-2024-54539,0,0,fbc1a67c719ba87fc736f69c24d4eab37517dc4991e2f2a79cb780df28816a9c,2025-03-18T18:15:27.703000 +CVE-2024-54539,0,1,36e3e53910a537dc715b48aebe0ea1b1697e0649a55067c940d6bf3822ffc04b,2025-03-24T14:53:49.143000 CVE-2024-54540,0,0,45cbf8d0efbe2b50a737f3ba5c71b070e28795ef3412a885891858b9f7aaea05,2025-03-04T15:42:52.453000 CVE-2024-54541,0,0,f19c7b13045c8627a2b5a1173512bbfb9d625759e2824642b40f1cbcb1e144d8,2025-03-18T16:15:24.763000 -CVE-2024-54542,0,0,e5a094da59025f31a497ea83cee49e2f88eb5fa3b5158cbc7466b9e85c396b28,2025-03-17T17:15:34.087000 +CVE-2024-54542,0,1,662a7c4c4af757188b4b981c4e65556e8c00ea70c392f13ee5dbc84e99a3669c,2025-03-24T14:53:26.340000 CVE-2024-54543,0,0,603876c5dd2c62a2a366bc570ded9afb84d36803ecff2c07cec2b1684773ae76,2025-02-05T16:15:41.137000 CVE-2024-54546,0,0,74d2474bedbfbd0ad3c983a84a08e8278cf35ea05d87ada33d51119288ecc61e,2025-03-14T11:54:22.363000 CVE-2024-54547,0,0,a618dc80c063ba06842a7d3f6b960a332bab473379d1eeed9cc28ea9a9897404,2025-02-18T20:15:22.093000 @@ -275237,7 +275237,7 @@ CVE-2024-54999,0,0,7d688b5e6850db35622cee3d7c13ceaf526f67556bf50ea8d38cf86c561fb CVE-2024-5500,0,0,280f34db2c8783872a68d6daa217e3e1e4614074bb8e8b0a741315b28d98613a,2024-11-21T09:47:49.373000 CVE-2024-55000,0,0,e44bbf604c17a445fefb05afc4d06c2cd9a73bf2a0f90098b42e7ec22fc64a03,2025-01-14T17:15:18.300000 CVE-2024-55008,0,0,46155f9f511c9f5f76f29eb42e0ab350c4f420855b69bdcc893ca8113faf6544,2025-01-08T20:15:28.467000 -CVE-2024-55009,0,0,0a517735c95eb441964a0fa6b78465201d2a2a179b72b48065fc6f67426d5178,2025-03-19T21:15:37.273000 +CVE-2024-55009,0,1,fde2119bc20e2cabdcc3bae42d40b7784dbdc702905edbb9d829fff63edb6b99,2025-03-24T14:15:17.190000 CVE-2024-5501,0,0,c16d3f86bb6f5e02795073b49cb84dc8c7e7a5718a6fed025ea914c4721b4cad,2024-11-21T09:47:49.573000 CVE-2024-5502,0,0,5a18d45bd85121e2ecc06d05133613fd7aff163eb02902343f6ea41930ef607b,2024-09-12T21:05:37.880000 CVE-2024-5503,0,0,9845e42fb1624974feec370d0d7a831f8d27d3205ac47bd2622c9c03ded76cc7,2024-11-21T09:47:49.763000 @@ -279699,6 +279699,8 @@ CVE-2024-8769,0,0,8c4927a7842d642fba069f99f3c8448b3fc1950b4d1c0da0d563e19160f962 CVE-2024-8770,0,0,c7113885ecad220e747c3ea367cfe403add592b8fe01afb3e0bedfd37441b198,2024-09-27T13:49:29.690000 CVE-2024-8771,0,0,0e4ebb772d4e98e8a4a526dca961dd5c09acde45f28acffd114423f8f3c183ac,2024-09-30T12:46:20.237000 CVE-2024-8772,0,0,e8bacf7bfc0ec5a21b856ef5850c73cdc0412d618e7556967faae405da0f4139,2024-11-26T08:15:08.033000 +CVE-2024-8773,1,1,24c76bfab5331596138754587326b827b76636ff8bb173183c8ffc6f59b5c763,2025-03-24T13:15:25.453000 +CVE-2024-8774,1,1,9c82750cc24057348bdd5f4d41661ae3f23aa0ec7fa36cef374ff78219be89e6,2025-03-24T13:15:25.693000 CVE-2024-8775,0,0,685c51a591da40efaecff95bf8b680deb0709c71e8470aa1c0deb056f4f4f163,2025-02-10T19:15:39.603000 CVE-2024-8776,0,0,c9367f28b47b7eb0252655b9fdcb543963fcd9e9d38a227b3c172ad22d1b4725,2024-09-20T16:38:51.910000 CVE-2024-8777,0,0,f7fc5b4f1c438c7ae9e70c1efccdbec5a6cb3c400eaee8e08927c4be3c1c4d33,2024-09-20T14:22:19.840000 @@ -281088,7 +281090,7 @@ CVE-2025-0474,0,0,82177afd4a03f9b6718aa062961dc28425e1582c17c2ed083ad764687f417f CVE-2025-0475,0,0,01db7095a6c7830189d7083ba5dadbe174587f0c8cb8ad9a02bc26d9e4bd7967,2025-03-07T12:32:57.013000 CVE-2025-0476,0,0,fac19eeb41e69ef9b9ba32b4e73c5aedd599dc2dafbcc6b1f4512a698dd08737,2025-01-16T00:15:25.217000 CVE-2025-0477,0,0,1d2c7ee2848c276d12d41f37ad7b73e6dd2826f71da2d7cb5a1d643051eaef77,2025-01-30T18:15:31.893000 -CVE-2025-0478,1,1,1f4aabb5650e840e976a0e313b3626192adad7446920b7354d6764e048c7ee47,2025-03-24T12:15:13.227000 +CVE-2025-0478,0,1,ffac020705bd903b4820f29343719a54a7437bb41abc68d2c2730f906669f1ae,2025-03-24T14:15:17.930000 CVE-2025-0479,0,0,2519d0225470d49a1589a61611ed9a2d77344f18032b639d511518af5dfff43b,2025-01-20T12:15:23.563000 CVE-2025-0480,0,0,b6ff79c1b0c358f30039b6ee5968981830198ea21cc11109addc04c2235b3def,2025-01-15T18:15:24.457000 CVE-2025-0481,0,0,597e987c2ef3e0bab5375b6813524f432662b75635bb0bca60f6ceb98848e55a,2025-01-15T19:15:26.807000 @@ -281342,7 +281344,7 @@ CVE-2025-0830,0,0,9a09f6cd59297de14c786b57843ccc6a6834be44206053ad44f69a7724007e CVE-2025-0832,0,0,413ae4e1569d5017dacdb94a87d43e27e5c58e09507a3074d3fd9a0a6056474e,2025-03-17T14:15:21.500000 CVE-2025-0833,0,0,de268e8dd407a9161c80ed220626dd50e5de552fd702f4d269ab27d3c6ec8cda,2025-03-17T14:15:21.693000 CVE-2025-0834,0,0,239a6f08c2db88ce57ab64c699932d200eff33712703b8a8f00d02b01207348f,2025-01-30T09:15:09.703000 -CVE-2025-0835,1,1,33166d94fc6ead944ec90f4453732b3faabecaa5a443995c5ba4a2e56fbdf2f3,2025-03-24T12:15:13.597000 +CVE-2025-0835,0,1,0aec3b5989b1b3a73f20f96d9f469f22b3333e78a1bfced050b24eadb94c8355,2025-03-24T14:15:18.090000 CVE-2025-0837,0,0,edb903a525c34e5db3f70de24ac0ad9bb2158867f6a7f92ca61239987715eef7,2025-02-24T17:08:29.033000 CVE-2025-0838,0,0,5a9fc4e1768f097f2fc50c995427721cfd5a7a3b77299bdbe2955b9299abd536,2025-02-21T15:15:11.890000 CVE-2025-0840,0,0,ad52784c9689f7e5a12133bf5b8e57840dc23d31e5e9f25f1808977a060838b2,2025-03-04T15:08:47.770000 @@ -281910,7 +281912,7 @@ CVE-2025-1730,0,0,1995ccb1e144a2c7a6984fe76cde065e7b6f85edc7bf90ff89583ed751f146 CVE-2025-1738,0,0,88cd928ab6b3e7b21edc6d43e0b3a3d2962b8b23417ddd8c84224e61394ebbde,2025-02-27T13:15:11.720000 CVE-2025-1739,0,0,3fd0271bebf5dab4e4b7dc5bc9151c4b432e19911079ec61b281141a587b7651,2025-02-27T13:15:11.883000 CVE-2025-1741,0,0,e3cefbac58ae300d7a16e849817a4e07ca1da020b4a797f97ccd724d6b4aefd2,2025-02-27T16:15:38.930000 -CVE-2025-1742,0,0,3691d98a8ef935d8f5b33040a2a9528758300e7487ea2dd4faf22ae3f2bac338,2025-02-27T17:15:16.460000 +CVE-2025-1742,0,1,2b428eeb1a848441198f90678bf3136400fb6755ed31190a889a915deabc5c61,2025-03-24T14:15:18.307000 CVE-2025-1743,0,0,bee1e73e97e9601080a06d9803444f53f91ce94b2810d40c3b0e4ff691e7e1fa,2025-02-27T18:15:27.650000 CVE-2025-1744,0,0,1f1ef389af661a882010c3d23413e9c514afeb8763bb832b32ecaadb3b36cc7d,2025-02-28T04:15:09.603000 CVE-2025-1745,0,0,9400d8eb0fef37d809d5bd41ae0c788a13003350e8c6190c28df0488dd38f2c5,2025-02-27T18:15:27.923000 @@ -282206,7 +282208,7 @@ CVE-2025-2058,0,0,f17d74d5176557010d92e84206629b4ae32b579c9df6cd1825b5253f9069cf CVE-2025-2059,0,0,98f0e4907c748c46eb23fa97d3982082105e6125a8164cebf0b76c34f283c39c,2025-03-07T02:15:38.600000 CVE-2025-2060,0,0,b95276417946000626ba35ce1fcd40fedea925c4b8f3a32de639a506cfd8ef19,2025-03-07T03:15:33.457000 CVE-2025-2061,0,0,d7ab9d4eb0f6e1b6e90c5964dc8919b88521be29fc837dcc09adf787e55d3706,2025-03-07T03:15:33.630000 -CVE-2025-20615,0,0,d699879cde223b1df6955ee31029ea24c46a6f3851ffea4d24d91204543bf695,2025-02-13T22:15:11.590000 +CVE-2025-20615,0,1,4bdb7ad547b1d5e26bc347d865e82b0a29cd307c874897b85046f68556e9dfaa,2025-03-24T13:39:29.907000 CVE-2025-20617,0,0,c8bfdf3a13c0fef33afce1eb72104d7b2280ba78c5b2dced7cd944ea31c0a2c7,2025-02-20T06:15:20.277000 CVE-2025-2062,0,0,8a88dc2e54b11410d9eb114fa69d1c88e3ab1c623315f4166748ac69dbc8c3ca,2025-03-07T04:15:08.933000 CVE-2025-20620,0,0,3537bfd354e2e5606a7442449870297aadd63b5c6f244c03eb513f3f9ee090eb,2025-01-14T10:15:07.860000 @@ -282445,7 +282447,7 @@ CVE-2025-21246,0,0,2355d5f1e5f99349a2c983a1867ed42b3be58a725316ed8d7e78af1b25b93 CVE-2025-21247,0,0,446fecaae5ad502f99b2008af383a3865bc849c841f94f82be4a4b347c7e6a42,2025-03-11T17:16:20.400000 CVE-2025-21248,0,0,5fec9176d3491513238c849ca9f8b98246abbf6bcab1978fcfceaa9a87899f2d,2025-01-24T21:54:19.163000 CVE-2025-21249,0,0,cc0cd96bf402d287899c115acc983f6d8b986d6d0cc004dd6bff6ad28b81b32e,2025-01-24T21:54:39.180000 -CVE-2025-2125,0,0,276faa9bb96f39d14d4a669e94074cc51470f1e650841c3e210625384a386b65,2025-03-09T16:15:12.550000 +CVE-2025-2125,0,1,740c56f0c366ecafc71c86982dfcd48fd0cae63807f2621409c04c4faaba6680,2025-03-24T13:55:50.327000 CVE-2025-21250,0,0,4e89a566438f1e28e8838350c59192f7c8bae0fa09d47d1f5f0f32355a4e81f7,2025-01-24T21:54:48.480000 CVE-2025-21251,0,0,5440266405ae4f5a1eea13ba92fdc75258561cea9d4f2a0de5b103c45023d533,2025-01-24T21:54:57.333000 CVE-2025-21252,0,0,6055e1c3e54e765508a0901e6591be173ca3b23ac49a425f1555d0244d559b99,2025-01-24T21:55:05.360000 @@ -282621,7 +282623,7 @@ CVE-2025-21418,0,0,286c461de95fba525ffd95fe19188a97b0613df56bf1afe14ca9be4aa494d CVE-2025-21419,0,0,acdb4d37a32faa1cb0f65f0fbb7358475e2deb811438263e59eb8f6bcbeca8e1,2025-02-14T17:32:53.087000 CVE-2025-21420,0,0,32a7e46f27d290c0e9a5b92e079c0424752a30e3cfa9e5d424062d7af6a66d41,2025-02-14T17:36:09.683000 CVE-2025-21424,0,0,3a83225b8d2edd7b934464a21b7f49bd35353b067d8247c64049e806cfc35f96,2025-03-07T14:12:17.933000 -CVE-2025-2147,0,0,2b2686392220918f0d29456c255060b93e3a9f48ef31e3be9ecad4961d2bc0dc,2025-03-10T11:15:38.157000 +CVE-2025-2147,0,1,8d64955bcd54c9e90fd3d983c30c955ed78fbb149aa1e8a8da2ca80431331131,2025-03-24T14:30:40.943000 CVE-2025-2148,0,0,d4190a3f054e2420a8d60bda0390077417613c29dc75da593352ca97816f8b9e,2025-03-10T14:15:26.130000 CVE-2025-21489,0,0,5d30c3b0acc3ddba1057df1a4f29e61d74be0ae611271efb1a2a3c05a60a8cda,2025-01-23T20:15:31.630000 CVE-2025-2149,0,0,d7df4a69e494fa588a972d8a9b2091768f937c9cdd73a96cb132062cdf0f66aa,2025-03-10T14:15:26.267000 @@ -282634,7 +282636,7 @@ CVE-2025-21495,0,0,fe11be338e1c05fec9619cc491b1fbe01f7127eb46f2c1cd0e8e0b8eeb095 CVE-2025-21497,0,0,d72398150450df53d5b7a47f71be2a91de3fc300c37f2167b3e74a3222c92d53,2025-01-23T17:15:23.070000 CVE-2025-21498,0,0,79239fea0fbf0d172db5dafbc92924ab759f3676cf4dbe1cb372fd23b3ba88fd,2025-01-31T21:15:12.840000 CVE-2025-21499,0,0,2c32e354ed5a6e4eea492ba23bb7728e07a08fad97151da4f29131ca6df8e113,2025-01-23T17:15:23.230000 -CVE-2025-2150,0,0,b7b07d5ec35c647863bd484b69702937b27dd0214130da31c1258d974e067199,2025-03-10T08:15:11.917000 +CVE-2025-2150,0,1,26b85120033ef00f8d5cdc74a27f615b353e8d6ecd51bbd951bd056eddde48d1,2025-03-24T14:06:07.687000 CVE-2025-21500,0,0,bbe9f114cc8d8e49962ad9854df4e89c5a30ee8cfa74d29f4db3b527d20b85d8,2025-01-23T17:15:23.520000 CVE-2025-21501,0,0,b499d527899d3c99b0af0dd327ab08d36e2a133ebd4d99fcf7220ac8dcf2048e,2025-01-23T17:15:23.680000 CVE-2025-21502,0,0,389d0578b0efac827f054d0c6c38b5e80f2fec0e9cc037bd997594f58cd454d8,2025-02-07T11:15:10.717000 @@ -284358,13 +284360,13 @@ CVE-2025-24084,0,0,4f1d493333efac73a350343a7437854970264be0f4eb6be8e9cda2c1b784d CVE-2025-24085,0,0,c110c1e5c7fcb91d09d7ebbeba87f90ad818d57e9db14cac177386dcf16b0e01,2025-03-21T21:01:31.620000 CVE-2025-24086,0,0,7c644e120cc41a291828171399048534e1e04b082ef7ed82ac204947bf2fab49,2025-02-05T15:15:21.750000 CVE-2025-24087,0,0,b6d09d2d8f9c9fb48f34374a1c228deecaf72eab2a92a63c6f3af02952b5c8f4,2025-02-05T15:15:21.923000 -CVE-2025-24092,0,0,9eb96f60702d8d52d18cf5af4b10c1f0313cbbbec76e5656f12bbe6a8b58cf48,2025-03-18T15:15:58.933000 -CVE-2025-24093,0,0,399fb99e86d72f8f64f535d1c8314fdb510773e1b0ff8ca78a6c885202395705,2025-03-18T12:15:14.730000 +CVE-2025-24092,0,1,aba935414a4c1326ca6d726f96fce2994529ef2b0a5a57cdd8a446243a988452,2025-03-24T14:53:04.507000 +CVE-2025-24093,0,1,428559a708ad1a85c3c179f9b46c53383858d91239d755fba2db0791cb090da5,2025-03-24T14:52:50.327000 CVE-2025-24094,0,0,86d262f71f2e67892faf4dbf8f0a50eff9cb9026771b88386373f113d46381a8,2025-02-04T21:15:28.227000 CVE-2025-24096,0,0,ac69c9566c3d48cc557b26bc2ed716878d8206500a277eb4956f75bd231dad30,2025-02-05T16:15:41.840000 -CVE-2025-24099,0,0,9ac733c66f981521044d55991b68403f81f4b4ece5888bc69708355b0385700d,2025-01-30T22:15:10.160000 +CVE-2025-24099,0,1,1b1ce59a5a4469ee6cf51c42ed296968523d0f5e14bd69e6e7e9c3f9c98c6d0b,2025-03-24T14:59:36.260000 CVE-2025-24100,0,0,2eb1be595e647c553152fa6178e0b240d2a4c9e18148941d2c792cbf709c2b81,2025-02-05T15:15:22.070000 -CVE-2025-24101,0,0,dae89b1167004681c237272fea45914f96a54415fc2aa5c9187504f4af2012ba,2025-01-29T17:15:29.547000 +CVE-2025-24101,0,1,5de59a541b049a07cf4cf8647eb22085e2d572c64eef6b5bd856ddba1404700c,2025-03-24T14:52:32.450000 CVE-2025-24102,0,0,b5cfc7b1838de2f08624eed5825f5af665597fa426821ba937adbf9a4e3c8fa2,2025-03-19T18:15:24.580000 CVE-2025-24103,0,0,9d77a1391acd11970f5b83f9a3163a0cc44f6475e53e33ea770a58444256625e,2025-03-18T15:15:59.120000 CVE-2025-24104,0,0,eaf2341118958cce67dbc21070a8e2f4a62ff3d770291a310ec877a84b56e1da,2025-02-05T15:15:22.223000 @@ -284417,7 +284419,7 @@ CVE-2025-24163,0,0,e5dfd7fc25470d49a4e1465851f83d31b328f7f38425488eccdc7978762ee CVE-2025-24166,0,0,15edf859d475720db53f3f95ed8d575ade96a95f125f2377032600fe411e75ab,2025-01-28T22:15:17.080000 CVE-2025-24169,0,0,dc7fdf5a34ca171f91b452ca483098d6852ee04a0c9927ea185bfbd0220db78b,2025-01-31T22:15:14.117000 CVE-2025-24174,0,0,0904d4c28286c429cd94ca17762197a0f9f9874c511f730b1e00485e49f57ce4,2025-03-18T14:15:43.020000 -CVE-2025-24176,0,0,8a151411616e238cc2afeabee27a87a9c1b6ac9dd5553369acab3c240b386505,2025-01-28T16:15:44.630000 +CVE-2025-24176,0,1,7bc6c29fa68217fbdd8476cc21dc4655eb0116cc1dc71deacded88f5df0a4027,2025-03-24T14:59:58.437000 CVE-2025-24177,0,0,79a71d65a51a9b6afaebd476d0d597d4ed4eaba333259a9c33b9b13f1b1bef2f,2025-02-04T22:15:43.237000 CVE-2025-24185,0,0,9b04e48d3ec2bb9bc8530d5b2b0eeb4b3b05e94722eaecea43606040308d42f9,2025-03-21T16:15:18.463000 CVE-2025-2419,0,0,153707543e9bc32e5fdb338510a7c29ac05b7b4717e1a9871d5ed8414730714f,2025-03-18T14:15:45.067000 @@ -284457,7 +284459,7 @@ CVE-2025-24372,0,0,d67365bd89db4c3751e20f68485685bbddaa30222f766a46b2792537e2dc9 CVE-2025-24373,0,0,828a96e86ff08b742aa150355f229fc88d281347208da05d776aed19719723da,2025-02-19T15:45:13.197000 CVE-2025-24374,0,0,9d28476f7b9e0a721c68d8f61a3e330d2e4b6e221dde61867e43ef2d95c1b3bb,2025-01-29T16:15:44.090000 CVE-2025-24376,0,0,7e46d4cd45c80d06e2794dedbb8a5a694e79dc599f98b5860f6d746c41079abd,2025-01-30T16:15:31.630000 -CVE-2025-24387,0,0,0ea59e58ee74520262ee0939adf8bacea013f9ef8c8182c46a86b541c514fa9e,2025-03-10T10:15:14.360000 +CVE-2025-24387,0,1,a1fdb446384ec34d7bd22f11041c6c4796cab0ef1e55e8ba9e452979dedd7e7f,2025-03-24T14:11:20.387000 CVE-2025-24389,0,0,1f2059cf3f125eed1b0425e33b29a7475638e7301a1298ff7d6746702fae8f56,2025-01-27T06:15:24.170000 CVE-2025-24390,0,0,53fee9e5767117124ab0c247372dae1e808caf6f2871cdd5b9d8bb2222404390,2025-01-27T06:15:24.313000 CVE-2025-24397,0,0,9ba22bfb54e58957b01d845dc69a58567b508933ed35160174e59b93ecc06487,2025-01-23T17:15:27.643000 @@ -285257,12 +285259,12 @@ CVE-2025-25802,0,0,d97088e007851ab933ca944783447ce692cfbd40d40b16934f0a6aa482cb1 CVE-2025-2581,0,0,e4939182f5af5e2d3dbc69bb8785afc6a1231065dfea3ac950a17ef8a6f217bd,2025-03-21T05:15:38.280000 CVE-2025-25813,0,0,29785da07b8f111218d1b9b58c66081665210db526a21defc9e5491fcec4ad0a,2025-03-06T18:15:43.027000 CVE-2025-25818,0,0,40ddbafdf9692bd0bb31a2e859c8e57e42e627fd7e19bb409eb5a4ac63b878d1,2025-03-03T17:15:15.230000 -CVE-2025-2582,0,0,4249d6a1488a0afc6fcc264e3c0e0bab93c8d42ab22e3ded0e1c0e7fcf823002,2025-03-21T07:15:36.953000 +CVE-2025-2582,0,1,4785ce7c12661aad317c69e36620dea23112ae200c7b0211413b5528a73e06a9,2025-03-24T14:29:50.370000 CVE-2025-25823,0,0,01cc00e46c57e1cd4b84caa1ec0705b698501680e84031ab252f0d5809c36fcf,2025-03-06T21:15:15.130000 CVE-2025-25825,0,0,44662eb5095fccda4e3c5daeb8867cc0b42f8cea49e95654318106019a993ae4,2025-03-06T21:15:15.300000 CVE-2025-25827,0,0,592a10fc3f850156d30f40a9c171cd33687dda2306b5a1e50f6dc9f481441aeb,2025-03-06T21:15:15.460000 -CVE-2025-2583,0,0,1f9f08c61cbae634aa69ff68534db3928eaa4c34108026a5e1836d0a3a5e0857,2025-03-21T07:15:37.157000 -CVE-2025-2584,0,0,999058e0dacf6bdabebe536e74618b1b17bf21e5463758bf27cd9ba9d721448a,2025-03-21T08:15:11.273000 +CVE-2025-2583,0,1,e56249999003fa41d84db27bc5c94a2f34b712603397c15057dea01bd9c82b32,2025-03-24T14:27:53.530000 +CVE-2025-2584,0,1,c1657b43012c8d09c45dd44f9a25fe024e886e6aabee713305db57005beb4b2a,2025-03-24T14:02:56.053000 CVE-2025-2585,0,0,090dade5152106dd6130007ac8edb53ce6a59e87736c5215aed7beee13811d44,2025-03-21T02:15:12.073000 CVE-2025-2587,0,0,c3f63a7f55664de0db756e491b6cc72e11afe5470eba9853059c366ed535ccbe,2025-03-21T18:15:39.093000 CVE-2025-25871,0,0,0a82550b1d2d046f647e980d017fc2255def0d1bb38591c44cc31261bf72a0fd,2025-03-19T19:15:46.047000 @@ -285343,7 +285345,7 @@ CVE-2025-2608,0,0,6154f4c95ab9ab878289179a091133b4bdb0b1f5a3bb16758adefdabb865f5 CVE-2025-2609,0,0,7b21c41b261b6158c5310edb04b5cc2a367339014900651dec4048e891b30024,2025-03-21T23:15:21.493000 CVE-2025-26091,0,0,0a53a3c2cb2d2c7caf4bc303bc2b91dad9caaf8869a6ee9842c32b5a6487c809,2025-03-04T17:15:18.243000 CVE-2025-2610,0,0,46fa2e1103ee2b3232a528fc11a838861348ee0a3dad066e80c1f931cbbe7a20,2025-03-21T23:15:21.613000 -CVE-2025-26125,0,0,fd96162a58cbc5df740e16378bf037c70e657ecbbd5a3d7eba6f948cac175338,2025-03-19T19:15:46.717000 +CVE-2025-26125,0,1,4ae7f7ba353601c45dbee82b55634f507486c612ec0e7fb0295802c5ca1a95ba,2025-03-24T13:15:25.920000 CVE-2025-26127,0,0,ff848518068745ae246227c687011816436068efa4d4914700821387766f6d15,2025-03-17T18:15:21.860000 CVE-2025-26136,0,0,2adb34c79a3ec7fe584c4e7725e79c104805fdaa01d3b24e5975e14259ccd144,2025-03-05T17:15:16.017000 CVE-2025-26137,0,0,37a92e216dde0297171d2b6ce245644b17650b35f91a7303f77c7bcd5a53a122,2025-03-18T17:15:46.503000 @@ -285365,19 +285367,19 @@ CVE-2025-26202,0,0,f8b0cbe65a751dd37df4c2f886b778f4059fbbdee95a620e7d770c31cb873 CVE-2025-26204,0,0,a8f05c49578ea0cbde7e961f0f9aa7f0415694b1127756defe681b9982099ed9,2025-03-09T22:15:12.120000 CVE-2025-26205,0,0,63ed32d242f54d965851d14b37db546b9e668c5b81ac02938c74583c42eba152,2025-03-09T22:15:12.200000 CVE-2025-26206,0,0,bc67999dabe96502b241246d2665faf1f09178bdb9b72e5e7dd5401b748e2b93,2025-03-04T17:15:18.487000 -CVE-2025-2621,0,0,e645a11d37d3513e549f7f118f5a37919bfad735fafa27ee0bff1e6cbba542b4,2025-03-22T17:15:34.790000 +CVE-2025-2621,0,1,c6bc27be8f862f55b8d9753d89cb3490c9b77f2579a5a986a2f8e37b7b78bc76,2025-03-24T13:15:26.220000 CVE-2025-26215,0,0,398e0534dde9630858e15022c6decb119d529efa2fc59efd24b3f1a57cdf3f89,2025-03-14T17:15:51.613000 CVE-2025-26216,0,0,fa35563faa6505245c7f05bc4878e14310c206fdd07c5771663544280eaa71b8,2025-03-14T17:15:51.730000 CVE-2025-2622,0,0,91ac5bc22af896f8580271a5c082c15d7c55661c47f4bf5397d39b48166a2d58,2025-03-22T17:15:35.213000 CVE-2025-2623,0,0,ea0c57bd044f13afbd3c8183e71a50223508ddf4470ee6c0234a42a5935cf3ba,2025-03-22T18:15:12.497000 -CVE-2025-2624,0,0,b5d01a34ccbff70259859813976d70c3ae1ba93ef3a4beac5f6d58fa05b64ab5,2025-03-22T19:15:34.450000 -CVE-2025-2625,0,0,acd8f4429f11a8c768070301e144a83ff45e9d43d154e3cfc9e4c033b219ab5b,2025-03-22T20:15:12.470000 -CVE-2025-2626,0,0,bd809ef9f1569d1ef58fb15a2071738d0364bc2938e1d4622c2a2f38768ec711,2025-03-22T21:15:36.817000 +CVE-2025-2624,0,1,bc606e20c0e5c55cc53d1933e6f1f55633ccca71c219d29fc5a5fb8f94a43142,2025-03-24T13:15:26.373000 +CVE-2025-2625,0,1,eeb077ee93bf9fc0d1a86a0f1c7081989d99e17600137fd49e5e44ffeb3095d2,2025-03-24T13:15:26.507000 +CVE-2025-2626,0,1,2ec672e2fe0c1e79dfa3082efb3637c788281bb0a435927822d89abd613cd4eb,2025-03-24T13:15:26.627000 CVE-2025-26260,0,0,d87498df9911f6ec3fcf716c1acf728dc302a17a13c2bad4d77a68a80619f6a0,2025-03-19T19:15:46.987000 CVE-2025-26263,0,0,87852969ca209a829a551b3d11cffebf3ca020061fd4d362c34f3d6a1719258e,2025-03-19T14:15:39.293000 CVE-2025-26264,0,0,7eeeb1b8e87d7e06484f4d071bc6d32b977cfa79c395c4fbca1cefbdfdd35c84,2025-03-19T14:15:39.440000 CVE-2025-2627,0,0,4daf5960dd225ccfb1575a0d3cd91b0950dbd7a3d541f2e3404563a63660f454,2025-03-22T21:15:36.997000 -CVE-2025-2628,0,0,a0ac1366c5190a01fca0374fb7accfd9612444330c98a0038e866f4efdfa533e,2025-03-22T22:15:12.160000 +CVE-2025-2628,0,1,83a1631f49317916690a06572d89f47748433e4b0c01a8875ee0f80e5ce95629,2025-03-24T14:15:19.187000 CVE-2025-26304,0,0,70c8f37d4db2054dfe1099a4a2c4b06129c826d4de254465b9316b6b41e402d7,2025-02-21T21:15:24.653000 CVE-2025-26305,0,0,1a1d603a79ab0dad9b04f449d78f3a3bb9f5de25113a59f9bb3a8e492946e3de,2025-02-21T21:15:24.803000 CVE-2025-26306,0,0,f6318b29dc3c8fcf62d8d059c582dc4ed277312d31ede047e5262baa26bd01da,2025-02-24T18:15:21.357000 @@ -285425,7 +285427,7 @@ CVE-2025-26366,0,0,791459512be83b7fc0ade0a1c646586bc122ab878822f19fa4a4996b21043 CVE-2025-26367,0,0,192446302caaccc3a8935e030b7cf39ec46e9d6744921fa9ae9a4afbae377639,2025-03-03T22:10:39.357000 CVE-2025-26368,0,0,49c1a4ea04d256772db98bc336eb92f454713116ba6a6617ece21dd6f9957c85,2025-03-03T22:11:28.123000 CVE-2025-26369,0,0,409cccb6d85f0d0e89130b7b1bb9fadf3b9dcae0a6ed481d428a29d672802669,2025-03-03T22:11:42.140000 -CVE-2025-2637,0,0,85f3e286eb9d7fa56c622ff7c46a5cf8a669c6b8fe70861fe7bfc78d6561d6ff,2025-03-23T00:15:26.223000 +CVE-2025-2637,0,1,c259ec85d759da9035c01cbde78d7fbfd753e4a332b4e948fd98240ff40b6841,2025-03-24T14:15:19.310000 CVE-2025-26370,0,0,bbb2d9fb4c0649126ad0d0a3c98d217a6344733d746a48a9e3d9d92e5e0ecd29,2025-02-12T14:15:37.940000 CVE-2025-26371,0,0,0dee0bce21e1da68ea270b9b5f43862dc11484119f532f0cd0ddc57c5f426487,2025-03-03T22:11:52.920000 CVE-2025-26372,0,0,de2a693b58e4aceb43078b6b71ca42b9ef9fc3b5d2d8c334ca012461b3455e72,2025-03-03T22:12:13.660000 @@ -285435,26 +285437,26 @@ CVE-2025-26375,0,0,3fa352fa0f0f2172d8d93dc85ee1fbf79d293844d2a08249d8b10f720aca8 CVE-2025-26376,0,0,90eeec3b23b739a411f2298590832d14f091d24699dbf3da6862c5e4407f2f57,2025-03-03T22:13:23.850000 CVE-2025-26377,0,0,96f969cb5307f2cbebc16af725f96ac45b51be8c065b61bf3eeda7b6d861fdb8,2025-02-12T14:15:38.933000 CVE-2025-26378,0,0,ee2f1897a6683ea6c4c3e60750a42143f8a85d34ee7d0a636569caad0aaac614,2025-03-03T22:06:52.163000 -CVE-2025-2638,0,0,bb7c0deef75ef7c7d44894dc75ee621cbb61332dfe7dfaae74deffe7d266970a,2025-03-23T02:15:24.877000 +CVE-2025-2638,0,1,06dcc2861f2ff3fdb512fc1b694a039774a26af5aafcb589eef9f2f270fd3b4f,2025-03-24T14:15:19.430000 CVE-2025-2639,0,0,6f7df99e40957187fa9d990f2cba8e1cd9732c0e9619aaac0fb44ab51eaa1839,2025-03-23T03:15:11.807000 CVE-2025-26393,0,0,0084efd52fbee3d09de405c3fe48d1fbc4bd7655a73c657547c37f33e81d553f,2025-03-17T20:15:14.140000 CVE-2025-2640,0,0,8a571ac00caf27bcf1f3fdf058216d3356c0f3492cb5c164df6ee5479e91aa19,2025-03-23T04:15:14.120000 CVE-2025-26408,0,0,cc3ff44719bfe263908c93711d844cb0c43379729d03c83e2a4a7413b5395225,2025-03-22T15:15:38.687000 CVE-2025-26409,0,0,cdf29866235215f5068aacbcbdb6f999e9c9f7adf8baf249758a0e54e8048ba1,2025-03-17T17:15:39.723000 -CVE-2025-2641,0,0,5bff2143551f23ed0380bb2239d799975000e33937d7ded7e915049538056cf4,2025-03-23T05:15:12.020000 +CVE-2025-2641,0,1,bb5d5b41978eb876affb01b2a2efb08bcf3a309c416453380cae1b966bd7733a,2025-03-24T13:15:26.757000 CVE-2025-26410,0,0,e0a8c1ecc38adad5db47008cfe5d8287500ec3cbba2c1f9a4a60a8e1051c525e,2025-03-18T19:15:50.450000 CVE-2025-26411,0,0,3c8f066d5451ad6ef36a27d64d17719d6f654697fa56337f49dfc83e42e73333,2025-03-14T18:15:31.947000 -CVE-2025-2642,0,0,e1f81c838fa9f0928a247f201d475bd86d7a1f7b0c1164be84c4537af5335a0c,2025-03-23T07:15:12.103000 -CVE-2025-2643,0,0,be83629595a0002533e8fe6f3a5c423b1e82cbe18965e3253b8bd0bb16a44145,2025-03-23T08:15:11.860000 -CVE-2025-2644,0,0,f76973c0303e544b82568f33bac265bf55804389a0131d568d7f1757ed2f91af,2025-03-23T08:15:12.743000 -CVE-2025-2645,0,0,8d73de360e25baafe444d070f4d907abbc17e9dd640dd760dce92ff0a1ddbee0,2025-03-23T09:15:16.060000 -CVE-2025-2646,0,0,49e88a4168caa534ea466ca215f11cabee5282d4f780cdcf983eac3333d6df4c,2025-03-23T10:15:12.810000 +CVE-2025-2642,0,1,ca8499c76804b4a50c0db5ba95f2c8a1bb0c4ba42e10275f9a7a66b8a05e7e3b,2025-03-24T13:15:26.883000 +CVE-2025-2643,0,1,0b75731f96ca90c525b2549a73d5457b100a208a6862b1ef5aebe3b921594e1f,2025-03-24T13:15:27.007000 +CVE-2025-2644,0,1,7aa4b84e59a3d158f22665a60fcf4872d6525afdf0adc7b8ec4e130e25e468a8,2025-03-24T13:15:27.143000 +CVE-2025-2645,0,1,7bbc1fa755f6425122b9b3456a8c65d3481ac676b8959fd9dabc5baed2c31bd1,2025-03-24T13:15:27.263000 +CVE-2025-2646,0,1,d320e2e4c7558b3098d6f529c0ca3564ed016a6c83aea9062d119b752bb0c1cb,2025-03-24T13:15:27.390000 CVE-2025-26465,0,0,10ca81b0503bc2056f51aff42b836da7e13cef94fb05326f3b97cc95851c9520,2025-03-06T17:20:00.520000 CVE-2025-26466,0,0,7e41d5cb0f04df9b23d47e085939285815b80db61162a3634dbd18c39c71ef9f,2025-03-21T16:15:18.677000 -CVE-2025-2647,0,0,067ff974516c511a5a2b618cbf128ddacd24f79b5ebcd065d2dad19db4eac3fc,2025-03-23T11:15:34.133000 +CVE-2025-2647,0,1,23e60a8fc6fe4c52ecff074a1dabaa019ef63c238d4a380e355a6dafbc9c7aea,2025-03-24T13:15:27.513000 CVE-2025-26473,0,0,41b0bd46f32c6729eefb29a2666cce546dde395dd2362800539aebed7d4bc19a,2025-03-19T10:34:55.550000 CVE-2025-26475,0,0,4c11595a9f53aaa25545570dfec450fa96951cf66b685488bd2989725dd8947f,2025-03-19T16:15:31.030000 -CVE-2025-2648,0,0,7f35903a6068358b784043beebe9ed5e303e8680947abc085ade3b107899cce1,2025-03-23T12:15:12.110000 +CVE-2025-2648,0,1,2258419089dad5b97332903fc63907d2aaac521108f7751edd6c7e921abca6cf,2025-03-24T13:15:27.633000 CVE-2025-26485,0,0,1606c27211335fac5bd91d62ee9c69aaf84877e83ad554d60c27495ea9c75e60,2025-03-19T16:15:31.257000 CVE-2025-26486,0,0,840914b82b00c0f3670423b9968b421b887ef974d79fc9288bc628a5718ff5ce,2025-03-19T16:15:31.457000 CVE-2025-2649,0,0,9bb64dd175a1115ef157186fe3b95b0be9349706d7d0219fc647ff0d37bd3057,2025-03-23T12:15:13.083000 @@ -285464,7 +285466,7 @@ CVE-2025-26492,0,0,10f610a7afe531efeeb1575e93a64c84a3a6f9453498a7cd0479c1add3e10 CVE-2025-26493,0,0,f799a8cc0e301789ed68586a5557695a6ad2df626328779fd09deada6e66bea3,2025-02-11T14:15:31.473000 CVE-2025-26494,0,0,9fa7dddcdaa3cd38f994e8d5f44807b1011184fd2f20f9f1171b97bd05f68ad5,2025-02-19T22:15:24.083000 CVE-2025-26495,0,0,983e2fd32f57fd04049b2b771442705c11716769548e3c408ea9243e53d33e3b,2025-03-04T21:15:14.020000 -CVE-2025-2650,0,0,df058f4536194eb3c6dacaddd7549c5a7ad62056b8efd02826b96f103f75f3ce,2025-03-23T14:15:13.797000 +CVE-2025-2650,0,1,039b69faad34f504c60917a8e67e0af384c4810593c125e37703ff2bbae63b3f,2025-03-24T14:15:19.550000 CVE-2025-26500,0,0,476e36bea575ec0f48bccd9f90b81b0779f14f9f3be6366ed83ebedcdfc30e59,2025-03-21T23:15:21.327000 CVE-2025-26506,0,0,fbc7fbe48e89907d7f54c9d44bbfddf8def7e8f962f2da16afa56ece7168f990,2025-02-14T17:15:22.747000 CVE-2025-26507,0,0,95b908cc64a72128294640690e70f9b52cb7f86d46bb5d8b6708727a9b7abcf3,2025-02-14T17:15:22.863000 @@ -285472,7 +285474,7 @@ CVE-2025-26508,0,0,d39bd75c34a7083f955ea70add860587db1f6572db6bc11a7a1abfe21efc9 CVE-2025-2651,0,0,d9b1054ab98174b67980c64949f28fa7d8fe5cf8f88cc487ecefa60439ceb3b0,2025-03-23T15:15:13.523000 CVE-2025-26511,0,0,5821dfa9ec884c136a5cce2e30ef6411210f7cca8ca28def218ae523a096d84c,2025-02-14T00:15:07.667000 CVE-2025-26519,0,0,189b0c6946f901ee4eed556955000825a3005cbd4fd73b84bf5b1493f77b4b5d,2025-02-14T17:15:23.090000 -CVE-2025-2652,0,0,d9ae5ab04f699d4aa9cf1f5e85fea470d5866d3c580e83f0993ba96d9d3c1506,2025-03-23T15:15:13.737000 +CVE-2025-2652,0,1,13ff8d5f1214168cc0bd9abab130757983a053df4956d56eb856ba4be1901ee2,2025-03-24T13:15:27.757000 CVE-2025-26520,0,0,ba194be47bd9d3f863191be1fe91614122666503cc65593c3b5d3845ece3a845,2025-03-03T14:52:47.173000 CVE-2025-26522,0,0,15654b8dc281e5e95b6cb8d0b0449d89135cfca68e40163629b408b401b71985,2025-02-14T12:15:29.583000 CVE-2025-26523,0,0,9eb8004a3f0db5f271f82a4160bc199ec38e8d40fc177becbe2105cc644170be,2025-02-14T12:15:29.723000 @@ -285491,7 +285493,7 @@ CVE-2025-26534,0,0,ab467a5c9c98bcf93d9b7ea4108c47f6694cf2610d3631b8a1fb0fc39b004 CVE-2025-26535,0,0,565367cf0af5ec55fb84aa51b9f3cdbadac3508258cd3a35844455f68691b45e,2025-03-03T14:15:54.900000 CVE-2025-26538,0,0,1b562cf933ca4f85387b9ad113a7e0bff6d82f6dfd74192b752d3543af30d3f6,2025-02-13T14:16:19.100000 CVE-2025-26539,0,0,276f32835753e35ddba03e434efdb4b7cdb02fdf3cdfcf4922e56feaff65d802,2025-02-13T14:16:19.383000 -CVE-2025-2654,0,0,8daaa13d39041c78cb77f25532880d980297163da91dd2c8799bcc72a3e0416b,2025-03-23T16:15:13.840000 +CVE-2025-2654,0,1,58b7251fcb2327098709236979de9e00fe7c93fa7a4a8e55b8e5e5a1ed218067,2025-03-24T13:15:27.943000 CVE-2025-26540,0,0,08a03edcb3fb5cbf83ab6f143d7641096163430d54f5e1cdf4c07f2284606837,2025-03-03T14:15:55.037000 CVE-2025-26543,0,0,b3dbce2448f1125de716ecbc885f7a4be61adfbd3d23eb6c2c769d8219c9a560,2025-02-18T18:15:36.597000 CVE-2025-26545,0,0,671b62b3ebd6109c7d444305b7bdaf6b06c56d8b40b26f4862f918f454077764,2025-02-13T14:16:20.043000 @@ -285635,7 +285637,7 @@ CVE-2025-2679,0,0,169f41591fb4905806636fc9e7f300f9215918ca1a085683c3b503ecafc376 CVE-2025-26791,0,0,a7d63ea0959b4846f11cfb3951f45279f457c98157e5d52d56097a5da007bce1,2025-02-14T16:15:37.350000 CVE-2025-26793,0,0,d30b44911459092c9e08ffe42552727cfd072bd06f4aa8564ac964446a27eec1,2025-02-24T17:15:14.580000 CVE-2025-26794,0,0,fe65001567301b62f9f70becffce46b16ab4f6e8292d604a049482502e1fc499,2025-02-22T01:15:10.670000 -CVE-2025-26796,0,0,9dbf889de866ca41ab74b84afcf0d854880b44cea138661c6f19e43b7bc96f29,2025-03-22T14:15:16.537000 +CVE-2025-26796,0,1,b75ca789edaf2db40a83c7e39a3f34d24eef54f2ef7ca40bedf7bca90f834758,2025-03-24T14:15:18.500000 CVE-2025-2680,0,0,5b2d82e1da8d4f5b5849755dc0c1154d4196889828cbec1024ab3bf93e06c00a,2025-03-24T03:15:15.727000 CVE-2025-26803,0,0,8c486e737c398ad4bd709101648ff92403877558e051d24af9f92cf436430efd,2025-02-28T17:21:55.827000 CVE-2025-2681,0,0,96e3adbdb0acc40a906d68f34fae609d1b764f077ae3c384f9d71b0d62d6c757,2025-03-24T04:15:13.510000 @@ -285678,7 +285680,7 @@ CVE-2025-26900,0,0,059a3c3ee3ee2a5a8549e4b2d083087d5d389f3b34374b636a32cc0884702 CVE-2025-26904,0,0,cab9a4c8649e54f1340a29bbdf14f52168b5cc51065c592884d99916bd742bf3,2025-02-25T15:15:25.990000 CVE-2025-26905,0,0,3fd420b5cf6d35f2394ffb7c8b96279ea5b6a88032aa4ac13abb160d4bcc3b89,2025-02-25T15:15:26.127000 CVE-2025-26907,0,0,12cbcc5c8b9c8102e25a8b6b26b7cf51a11f16a102e0d9c393e6b591cd6460db,2025-02-25T15:15:26.263000 -CVE-2025-2691,0,0,7c726780a3003e05f96538b2afdbfc47720c17782ea8b5b3b058c5bfb77a10c0,2025-03-23T15:15:13.940000 +CVE-2025-2691,0,1,d3cf3b445ffd6cd1fb54bf67ce61da9ddd2b735665621fd9256db3c167a23eb3,2025-03-24T13:15:28.787000 CVE-2025-26910,0,0,ca74ac486aa989f6f999598f8bf14014c34c48339b6905c0296af8a29556b3ef,2025-03-10T15:15:37.660000 CVE-2025-26911,0,0,69bc9028618de684f0fd93e47f869e941f72b06df9e8d8d5b5d7c83ef9d05729,2025-02-25T15:15:26.393000 CVE-2025-26912,0,0,e79b24db34788e23307e263a850245edf07e94d4a7f854cf9650116a3ca5b4f5,2025-02-25T15:15:26.530000 @@ -285751,7 +285753,7 @@ CVE-2025-27013,0,0,9b9378b18f13319340e1f24d5072a99db201f1036e2a63d2b47d9e89c2a36 CVE-2025-27016,0,0,f2c7dbbbe198c036189ea7e0294285906759c96b4b4fc3925b1ca597f8d458ee,2025-02-18T20:15:34.013000 CVE-2025-27017,0,0,487799b83e349646c0969a6714868b1c6a1e0d2f10d5e6737c1115cacdd0bce5,2025-03-12T17:15:50.327000 CVE-2025-27018,0,0,c8f7642fbc1b46f7dd7b5a5853f4ce39af708a7b7c634c6a32cfcce2c8047a30,2025-03-19T19:15:47.170000 -CVE-2025-2702,0,1,df0262a5fd2d1f68476b97b0668292b58d225a530ead46671532bfafd32c27b5,2025-03-24T10:15:12.943000 +CVE-2025-2702,0,0,df0262a5fd2d1f68476b97b0668292b58d225a530ead46671532bfafd32c27b5,2025-03-24T10:15:12.943000 CVE-2025-27080,0,0,42e0a7d70009a70996fc58eb7f4ee4c8d798d6b5d13faea5a93ec59abf435a8f,2025-03-18T20:15:26.300000 CVE-2025-27088,0,0,fbdc36eed3cad3a0ad2022cbe7aca458560a9c5f707fbc00203d874cefc235d6,2025-02-21T22:15:13.673000 CVE-2025-27089,0,0,4c46df8a0eff7d16a653158eecc2014910418a0d0440d1d2334e56d23f56f25a,2025-02-27T20:31:27.267000 @@ -285956,7 +285958,7 @@ CVE-2025-27517,0,0,0c6e1cbd03f08aa0c28a052f1a961fd35d2b58b4844c0e34e3b438f6bc1c8 CVE-2025-27518,0,0,33c2ec7c1e9790b801dd04e89fd77042adb014555e9a900add53790edfc9f15c,2025-03-07T16:15:39.187000 CVE-2025-27519,0,0,ccdb73c39ee93a016094b17abcf363c0c91c0cb8a87d6bd768900a706722d9f7,2025-03-07T16:15:39.623000 CVE-2025-27521,0,0,238fcbb4ddab85c97db2ebf1a5930f855cf28b2ad902f1b11a70a00fedb1566e,2025-03-05T14:00:54.577000 -CVE-2025-27553,0,0,59d262469428a6ec91f5844d837b1f726dc25064ba03b1b367aa24385034a58e,2025-03-23T19:15:14.350000 +CVE-2025-27553,0,1,183dc3a86b8b1f61354b767d69fc5cfccf39fac83a814abf975899e48ebf1d50,2025-03-24T14:15:18.687000 CVE-2025-27554,0,0,cf23284196495ef624f6aebb4a495f3e36a6b5bfc39b634f5a2b752d43a7754d,2025-03-01T06:15:34.693000 CVE-2025-27579,0,0,e37901d639203dabeb0abb1f8d25952e3d9090042ecc93a0b94bf072c75c186f,2025-03-04T19:15:38.800000 CVE-2025-27583,0,0,0323a5ab9427edc3fc5fcf52b07bbd68cd541b31029bf0b1077e85dabad17762,2025-03-05T17:15:16.693000 @@ -286159,7 +286161,7 @@ CVE-2025-29029,0,0,39541c2aec3ae7c63f9d62e0a3860448d6ebc46233cbb2f267704a4d9534c CVE-2025-29030,0,0,5c6a6bbb988d8463666139df5df874e45be8a953aa025e17f70aff541e298642,2025-03-19T19:15:47.790000 CVE-2025-29031,0,0,fc79f4214f85e8c2dc7f22a3d332d338110c9a0fc6645f125dc5ea2077bdeb39,2025-03-19T19:15:47.940000 CVE-2025-29032,0,0,de0e6dba36725e7eb376f4f499583a9ba773e23f18ca4062299593c1211d4783,2025-03-19T19:15:48.083000 -CVE-2025-29101,0,0,e372dff2728a1e1a87d38266f0fe80fe8cb21b28ad993b9ca8d0c36fe328c980,2025-03-20T13:15:36.467000 +CVE-2025-29101,0,1,ce4c77c0b44d11cc405984b90301b79d0826ba8b91d475db95d54669cce6548a,2025-03-24T14:15:18.843000 CVE-2025-29118,0,0,02b4ab91e325cbc424c9f611f5094198724d25665ee3e3789b08bbc51de55607,2025-03-21T14:15:16.487000 CVE-2025-29121,0,0,c3aa438f62a6a9f84e07b89449cc7c5ee42d049ab9d1947268d5247e6de8d563,2025-03-21T19:15:45.557000 CVE-2025-29137,0,0,720ba11d924de175b1bf67482cc142061a1b9799fd3947bba36e81cdb29bc0c0,2025-03-19T21:15:41.063000 @@ -286213,7 +286215,7 @@ CVE-2025-29787,0,0,2fd3435cc0f680f18716d607bc13a6c7a954d55969aae7d30fd344637489e CVE-2025-29788,0,0,864c3c65f52e851c38fc6d391e926f348d1c70745c997c79fa8abde39ce5bc67,2025-03-17T14:15:22.653000 CVE-2025-29790,0,0,a917e7f845d5526a877724b56a3ae7cbb2c47c308a32a65b6f3b54e65b4f8c98,2025-03-18T19:15:50.813000 CVE-2025-29795,0,0,6628c110a8ddfa1ddc624b3c8e04a9da92178a53d5d396807fa8edc11e306135,2025-03-23T17:15:28.920000 -CVE-2025-29806,0,0,4f2bee4b8c3d2b7820c6daa91b9988478de1d159aa975ec139343afbd8691d36,2025-03-23T17:15:29.450000 +CVE-2025-29806,0,1,a35a41b55c2532a6a7b5d5365a6e904c2be7b4ba79db1ad5389566415b6789e8,2025-03-24T13:15:26.083000 CVE-2025-29807,0,0,530d9f651149a8b635edd48694d649666884c8d7e97fd101d5bd23cb34763719,2025-03-21T01:15:17.070000 CVE-2025-29814,0,0,435e9e17285030a77811f9738adb8ece14bf52c5a294fba746e389024996a262,2025-03-21T01:15:17.253000 CVE-2025-29891,0,0,6f656b5325e6e317e0701bf37e32b1fd845a6f162de74687e113855da8de633f,2025-03-19T14:15:39.573000 @@ -286245,7 +286247,7 @@ CVE-2025-30074,0,0,c994f8833240724dd3b207dc3daf9a3403659cb85de62da850d9ebebe8cf0 CVE-2025-30076,0,0,ae70a6cce406a05e108d38c82fa058b5f2fc46a32f1bafe789b6ecdef84b3c03,2025-03-17T16:15:28.220000 CVE-2025-30077,0,0,3552a491790a6839d39471705d681d0b56a0da48a2daaa633f419312864c12e5,2025-03-17T16:15:28.360000 CVE-2025-30089,0,0,94fa5ca45d8355546d9ceb129470f63603acc7f5a96fbd0d387c59c0d7484c0e,2025-03-17T16:15:28.507000 -CVE-2025-30092,0,0,fa933162298383312a35228da7eeb2717f67f4fc1cff40a44408263e00ff71db,2025-03-19T21:15:41.293000 +CVE-2025-30092,0,1,81be76bd5e4d358e5e497793b136a481ab98791f4e442314445db080e37b822d,2025-03-24T14:15:20.007000 CVE-2025-30106,0,0,d0ec2fed531a791fcdb7e275c6cc676f11c96b4c23a970884370a41e87a3b6a0,2025-03-21T17:15:40.227000 CVE-2025-30107,0,0,77557f9c868524f1824d12c252cbc2cbb6cd1c59bdfa5b7000c0dae98b609a9c,2025-03-18T15:16:01.930000 CVE-2025-30109,0,0,c697d3ced89db3fb240ff33efe8653842b736020e748d3eead592e6135cb99ac,2025-03-21T17:15:40.447000 @@ -286287,9 +286289,90 @@ CVE-2025-30342,0,0,ec79ee9186dd733015e625209b994fd3e583c376e947e2a04b038bae51e62 CVE-2025-30343,0,0,7290b05f7af7e4feaa8c5b6b6656bd70fb786e87f6a5e948860c1eef29abd1f0,2025-03-21T06:15:26.700000 CVE-2025-30344,0,0,780f50a92b57ac376b63188352a6b224e9cb64b22b874dd880e7f875960f5cb9,2025-03-21T06:15:26.900000 CVE-2025-30345,0,0,222450d90ce3ca76b09ca2dd84ec0b64a1025ae11dbda1312fbce9536a800783,2025-03-21T06:15:27.090000 -CVE-2025-30346,0,0,85ae769c5a6808fde72d6f726bf6c76a1a6274e09792c71718e344a72b7b0e52,2025-03-21T07:15:37.350000 -CVE-2025-30347,0,0,27d56bf240067d97a4c3ccc07919f015a1bfcda0f87e793f00052b7c7d44d67d,2025-03-21T07:15:37.527000 -CVE-2025-30348,0,0,1df3086d42b3344bc82b6c75db15009c33a7d5b7c2ad821f03e295b9e9b4d47b,2025-03-21T07:15:37.673000 +CVE-2025-30346,0,1,a5ab4f3d9ba1cce34693c27771a45fbf120b9b80a448e75dfe49bd2a7ac1a793,2025-03-24T14:47:51.437000 +CVE-2025-30347,0,1,ed9763d5b530026684262273e310ca4c964268ef0ffc4c726547353dbc6770db,2025-03-24T14:19:23.963000 +CVE-2025-30348,0,1,0fb0e9fd503e8730c9a3857e63ee0ac5611b8bb7632a64f763dd19e4ff36427c,2025-03-24T14:08:36.513000 CVE-2025-30349,0,0,5d6b1c837b52ea2e0b150e37502c6480a47b485a7d67b45f4ee88d21842fc776,2025-03-21T17:15:40.853000 CVE-2025-30472,0,0,85399152b1fc2d9c05d60262346c19f5de2d6adfe37e52c27adbdd526d5ac32b,2025-03-22T02:15:16.620000 CVE-2025-30474,0,0,1e288c28c7a9253d8007962ed83d55ed1c6a50132909d1d77f3fa1d8a9ee1e62,2025-03-23T19:15:14.973000 +CVE-2025-30521,1,1,5628833c406d1038fd02b2ad092f3ee38f7ae3a566edf44ce6916cf9500b6088,2025-03-24T14:15:20.170000 +CVE-2025-30522,1,1,61dbd18ac9fc8876e53d5dee51de98728b6ba5e3b815da5c48323d330287f281,2025-03-24T14:15:20.397000 +CVE-2025-30523,1,1,d29e9b0538f54e9c1cd8a883e758c4212290e8cae097817f9490384414251d35,2025-03-24T14:15:20.593000 +CVE-2025-30525,1,1,bfec53d727fa2348c2ec09f07094131e639ec29c7c5aa2ef071d41c52079a430,2025-03-24T14:15:20.757000 +CVE-2025-30526,1,1,233a73b1c552feb3513375edad31518a379b983453d8c5a040bec010e7718952,2025-03-24T14:15:20.920000 +CVE-2025-30527,1,1,6dede3b1b3f4acadafd9e7644473b8454c0df86f1f67ada80578c1a93fdbeb31,2025-03-24T14:15:21.083000 +CVE-2025-30528,1,1,d13ff92fb12be652ac779efbf31c0afc8ae7192e188258c3d6f763d6a9a466ca,2025-03-24T14:15:21.240000 +CVE-2025-30529,1,1,6aa6b5ea898a9fb42db948fa7f6a82d9dd4d2e345f64f2d9ba774e740f3a5cc4,2025-03-24T14:15:21.397000 +CVE-2025-30530,1,1,29b8060b4ed369f63a59dbc4cf9f5ee7bbfb4aaab72144fdbb905e39d8cf7241,2025-03-24T14:15:21.543000 +CVE-2025-30531,1,1,3b44d679bda29178ffaa458c1ca70bbc4dccb497b42c5eadffa808abbad8dcfb,2025-03-24T14:15:21.693000 +CVE-2025-30532,1,1,25b97a648f850ea0cd54f566b3268f22c5fa7b7af5b8dd5ee1ce3ea2d33a32e9,2025-03-24T14:15:21.850000 +CVE-2025-30533,1,1,8fa7e7db15adb0b2377404b47efa861b14e8b24ef08bbb66640ec8c22e3df525,2025-03-24T14:15:21.993000 +CVE-2025-30534,1,1,d92342333a477892514db39c433015e3680ab769a689cc562cc01695a9e47b7b,2025-03-24T14:15:22.143000 +CVE-2025-30535,1,1,1c125e0318a03adb33849079e86e3d4f03182630800a9eb972d0b1558b50b274,2025-03-24T14:15:22.297000 +CVE-2025-30536,1,1,99b9a8e0c96d1071d9ead79a3a1e9c8124fefc74d9eab69d06b50c806a7d9910,2025-03-24T14:15:22.450000 +CVE-2025-30537,1,1,1843683cff60937da2e72f161fc157de8422ce8f8f039620128c3af9843d1537,2025-03-24T14:15:22.593000 +CVE-2025-30538,1,1,4fee3e194e3abcdf34e0bc881aed73308fa545f993701cd34c71317276c0817e,2025-03-24T14:15:22.743000 +CVE-2025-30539,1,1,382a9396a262e7295b429780bcda5e86e7896ee4eda7bc120b8acfb6b7856a3c,2025-03-24T14:15:22.887000 +CVE-2025-30540,1,1,07ca27ec4d4ff39ead173866259baaa3ca9edf645419e204930fcc752a85dd08,2025-03-24T14:15:23.030000 +CVE-2025-30541,1,1,8e03c04976ce687cfa0d40fe94a9e56700281a586002886635f8614ba2931e59,2025-03-24T14:15:23.180000 +CVE-2025-30542,1,1,f598b709175fd716f1d07bd6d6683855f1a02a0c8bcbc77c06a312ac92543e6d,2025-03-24T14:15:23.337000 +CVE-2025-30543,1,1,b572d1e03702acdb73afede488ba6c3fafd65564a9782d4080dc163459cd3c73,2025-03-24T14:15:23.483000 +CVE-2025-30545,1,1,09038e659f29bb8334dab018ac1af11bc07acfe9b9ef0b676f60c0f06c0a0d73,2025-03-24T14:15:23.653000 +CVE-2025-30546,1,1,bceb1c7151b7484fb7edbe17a72ff2bfb07021fdcb2df674f72f222e08147d7e,2025-03-24T14:15:23.820000 +CVE-2025-30549,1,1,d3093b594e814c31c2be6cc962fbc616f17cf1820bb372e97602ce0186f51af5,2025-03-24T14:15:23.970000 +CVE-2025-30550,1,1,7ac49c16c891b8af02842d4df67347da7864e3ee149e200453c1d4a6bd0e6870,2025-03-24T14:15:24.117000 +CVE-2025-30551,1,1,77041d49792c102f2f89fd26f0d5d1b561dced80b5b7e88c660c48cd1123f961,2025-03-24T14:15:24.260000 +CVE-2025-30552,1,1,dcad7ec5d79e5c12f8ec03f799840687888ed85c2af14f22908eb4846d1b7aa8,2025-03-24T14:15:24.407000 +CVE-2025-30553,1,1,74ef40a26079be78b4e4b0bbf9460447757db82bce37c6c1e09ad74ff4ae95af,2025-03-24T14:15:24.547000 +CVE-2025-30555,1,1,93a34d23301fdf9719653d4047639e594311b4bd8fecccd18d917ba0078e4768,2025-03-24T14:15:24.690000 +CVE-2025-30556,1,1,20fa0637e0c15d0820b21c083878a8cee3ce78b604c838965a11be1b1b132ad3,2025-03-24T14:15:24.837000 +CVE-2025-30557,1,1,8951b563def80180458a0879fec7748f2c5e6cc5b65572d3e6772fc48ae0582a,2025-03-24T14:15:24.973000 +CVE-2025-30558,1,1,04f3b4790b52ea3ab3f371c26a56a231096f529e60b59c45c3822b923c92602d,2025-03-24T14:15:25.113000 +CVE-2025-30560,1,1,50b57d60e1fea97e97c7c9b5f27105a331a07a04e0c3603c55c44e3cd6da1a1a,2025-03-24T14:15:26.910000 +CVE-2025-30561,1,1,65bc9917880192fc9140f3dd908f3dad545ecc83037787daaaeb109f1d2594ef,2025-03-24T14:15:27.460000 +CVE-2025-30564,1,1,fb6e0be3266eddeb470e05f39df60da4e4ff8307b2ce290cddcf3f140481623b,2025-03-24T14:15:28.200000 +CVE-2025-30565,1,1,c5ec5f4b4529aa8e5b351ed4a8cb035c64aabfd4d0714f3c19d31946a6c27d64,2025-03-24T14:15:28.347000 +CVE-2025-30566,1,1,6a850ac2812c0c8e880732469097938447128b716d4da989ab4eefb206795ded,2025-03-24T14:15:28.490000 +CVE-2025-30568,1,1,d1d5319824ed81ec72c5449307ef2efaec394d2edf33a3cb74ceb9128fc2c125,2025-03-24T14:15:28.630000 +CVE-2025-30569,1,1,eb47a5a4c81aa2be469faab015842335d567716b016738d8a86b290a23e093ef,2025-03-24T14:15:28.780000 +CVE-2025-30570,1,1,91a9150d55f8cdb3006a0b4d7cdf2ca90de83c773e48f68faaa25bf8076ce8fe,2025-03-24T14:15:28.937000 +CVE-2025-30571,1,1,ec88c6f6142005d31cd248ee69df4b02fe2a62052f56c5994def7b05023c7060,2025-03-24T14:15:29.077000 +CVE-2025-30572,1,1,2e96db263f7e2c044b90c8d218e28c7bc1f92e267a86eca4ae651a80dbac7a75,2025-03-24T14:15:29.217000 +CVE-2025-30573,1,1,3fbb08986976fdcb65021d51b429493ed57a925e0e856f4ecbe7763dd950edc1,2025-03-24T14:15:29.360000 +CVE-2025-30574,1,1,472863cbb5cfac685a37c9b9ac48d3e9e33aa11905d6af4d638d96bdcc1e28f7,2025-03-24T14:15:29.507000 +CVE-2025-30575,1,1,47cad20483c66e8c916526e1c398498390deac53af81f172887cd65964557b1c,2025-03-24T14:15:29.650000 +CVE-2025-30576,1,1,d18b64cbc3316f0ea70e160b7ce64eec9f720e879be918b1fea4f12cc73b53f5,2025-03-24T14:15:29.790000 +CVE-2025-30577,1,1,ea446d06e0023c57ad3c9f21652df8c5ed7529edf483ebbb7e990435517abf33,2025-03-24T14:15:29.923000 +CVE-2025-30578,1,1,0eead375fae8fcd5247c89ab28b7423fa2c072914c5d3544fba9b90107a98ec6,2025-03-24T14:15:30.073000 +CVE-2025-30581,1,1,133ad960a5d8cad561e8ed15ec4eb68830c7bd938918124beee6bfce4344a9be,2025-03-24T14:15:30.217000 +CVE-2025-30583,1,1,25351af88434115dca2a003fbb7dccf452dd83cb435de3fc2a5597206ae02eed,2025-03-24T14:15:30.353000 +CVE-2025-30584,1,1,e12230d0270dd0954825ef734e1a1d0e9ef22d8637b1eb1f22eeb9e52c7d84ec,2025-03-24T14:15:30.490000 +CVE-2025-30585,1,1,416ce93690790135ddd368b762ffcef16dfe1533f92c9dbfd322472a75d32c39,2025-03-24T14:15:30.630000 +CVE-2025-30586,1,1,647dec5cebdee424027fd2645522a344a2aecd5dcc27f31bdf30613d591ca1a6,2025-03-24T14:15:30.767000 +CVE-2025-30587,1,1,3e273b97e47862e24560b2ac279d34da53c967c1b31a9dd2bca9123b7179d76d,2025-03-24T14:15:30.910000 +CVE-2025-30588,1,1,7503d9e513299a14752c1c79d89d06816cedb07356b24fe58a255e4ec31e1ae2,2025-03-24T14:15:31.057000 +CVE-2025-30590,1,1,334ff85de355b9bdf1748fb5b088a291b43008999974bf07991198de0c685309,2025-03-24T14:15:31.197000 +CVE-2025-30591,1,1,21dbe33cb804a93b9ebf094ee34d01be3e5c49e39c8cf48499d3fdb414a5be81,2025-03-24T14:15:31.333000 +CVE-2025-30592,1,1,c3290a2f98f6d8929590389084f40729e82349022256f0377d5d53003eb2aeed,2025-03-24T14:15:31.477000 +CVE-2025-30593,1,1,719af592dbc4ce0806270547e16bf10c7979f298d10a55a433b119161fa234ab,2025-03-24T14:15:31.620000 +CVE-2025-30595,1,1,a45b7df8bd3a5dd4368a9423b921105f13432b245ad61221d55867bdec5b7dd7,2025-03-24T14:15:31.770000 +CVE-2025-30597,1,1,a04ad63bf592e5a39c9c545282e449651b53eff5de24f648c7398f9be69c264f,2025-03-24T14:15:31.910000 +CVE-2025-30598,1,1,3c99b8cb45729e6b858bb170ff5081c27b85d6da447bf8824f3ddc034c6364eb,2025-03-24T14:15:32.067000 +CVE-2025-30599,1,1,28fb44503df9b92ef6e78b73f13c2e6abff12fe3c21b75e27717f588727ebbe9,2025-03-24T14:15:32.227000 +CVE-2025-30600,1,1,1849d5e78d237af7002ba2ba3c70e7147949c54337fb431bf4e420aec781515c,2025-03-24T14:15:32.370000 +CVE-2025-30601,1,1,3931ff887c5dcb62a5ff9b598710b94211aa6c52ddb43eabb26e0ae4a121c4a2,2025-03-24T14:15:32.520000 +CVE-2025-30602,1,1,da60d2a49c9b31e3f00dd993feffdc68c116b9a82fec7cb37caed99a8d32c228,2025-03-24T14:15:32.667000 +CVE-2025-30603,1,1,2cd56bce2341b5e9bdcd3408a6dc8a5a07456ef968e8eafab741af05721160ba,2025-03-24T14:15:32.810000 +CVE-2025-30604,1,1,9135775c232addd774fd617a0805008b87a7e85522ef3e8aba02755910ad351f,2025-03-24T14:15:32.953000 +CVE-2025-30605,1,1,f775a0458cd73aba467df44175f875858ae4a452c2c73603f8050c0f45a56460,2025-03-24T14:15:33.103000 +CVE-2025-30606,1,1,0f24ea3bafc75918cd25765440f8581c6b9e2c3b4345d958b7521c52990db0bb,2025-03-24T14:15:33.247000 +CVE-2025-30608,1,1,28555b520093bff5cbae5b22b2f9a2b8546f4c0ba6a3f15d3e3811303dd9263c,2025-03-24T14:15:33.383000 +CVE-2025-30609,1,1,bdfd75cd3628fee55d194f0113fbf6fb9b644a65d294c916019316d80179182e,2025-03-24T14:15:33.533000 +CVE-2025-30610,1,1,4eacde542d9b77dbf074fa5b59341eea96a7e9e3825f32bd1a466d4906324ee8,2025-03-24T14:15:33.680000 +CVE-2025-30612,1,1,f06998d0820f15850436fb62ef8735aa329d0347372168396ef0330871f3736f,2025-03-24T14:15:33.823000 +CVE-2025-30615,1,1,a2a2888bed09e57fe9782a2e13ed5c77e4ef1a979892f48e6b118cbcbcf34b4c,2025-03-24T14:15:34.040000 +CVE-2025-30617,1,1,509633640d9bf823d91364ebfb535847b49e4ce3f91dd49c4d41165399a36d21,2025-03-24T14:15:34.223000 +CVE-2025-30619,1,1,ec6314955f09d72377e200c614895de73fe0417fa852230dda50f4e2ab91f425,2025-03-24T14:15:34.370000 +CVE-2025-30620,1,1,8cb20ec3a9d4fd9c59608e97a0d5ae368b50e3d06eb12b3515695a603531a04e,2025-03-24T14:15:34.520000 +CVE-2025-30621,1,1,5d4cdbcdb4b4fcd90b5f2b2106f218b95148d82610e047fabd8c26e50f6e3ad9,2025-03-24T14:15:34.660000 +CVE-2025-30623,1,1,1d1d541570cee9e8bd680cf66c388813ad97d6b9db28e22b406d83cc5fc8feed,2025-03-24T14:15:34.797000