Auto-Update: 2025-04-28T14:00:19.945572+00:00

This commit is contained in:
cad-safe-bot 2025-04-28 14:03:55 +00:00
parent 19e20f9d7e
commit e7618c3201
13 changed files with 916 additions and 52 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-51533", "id": "CVE-2023-51533",
"sourceIdentifier": "audit@patchstack.com", "sourceIdentifier": "audit@patchstack.com",
"published": "2024-02-28T19:15:09.963", "published": "2024-02-28T19:15:09.963",
"lastModified": "2024-11-21T08:38:19.523", "lastModified": "2025-04-28T13:13:33.597",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.8,
"impactScore": 2.5 "impactScore": 2.5
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
} }
] ]
}, },
@ -51,14 +71,38 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lightspeedhq:ecwid_ecommerce_shopping_cart:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "6.12.5",
"matchCriteriaId": "0FA181E9-AFED-44AC-B43F-77A2CB4A7E9A"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://patchstack.com/database/vulnerability/ecwid-shopping-cart/wordpress-ecwid-ecommerce-shopping-cart-plugin-6-12-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", "url": "https://patchstack.com/database/vulnerability/ecwid-shopping-cart/wordpress-ecwid-ecommerce-shopping-cart-plugin-6-12-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com" "source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://patchstack.com/database/vulnerability/ecwid-shopping-cart/wordpress-ecwid-ecommerce-shopping-cart-plugin-6-12-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", "url": "https://patchstack.com/database/vulnerability/ecwid-shopping-cart/wordpress-ecwid-ecommerce-shopping-cart-plugin-6-12-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52048", "id": "CVE-2023-52048",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-02-28T20:15:41.640", "published": "2024-02-28T20:15:41.640",
"lastModified": "2024-11-26T16:15:08.977", "lastModified": "2025-04-28T13:08:59.177",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,14 +51,37 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ruoyi:ruoyi:4.7.8:*:*:*:*:*:*:*",
"matchCriteriaId": "0A5136AA-E92F-4309-A67C-D159C7BD2186"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/chongfujun/test/blob/main/2023-52048.docx", "url": "https://github.com/chongfujun/test/blob/main/2023-52048.docx",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}, },
{ {
"url": "https://github.com/chongfujun/test/blob/main/2023-52048.docx", "url": "https://github.com/chongfujun/test/blob/main/2023-52048.docx",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24714", "id": "CVE-2024-24714",
"sourceIdentifier": "audit@patchstack.com", "sourceIdentifier": "audit@patchstack.com",
"published": "2024-02-26T16:27:58.503", "published": "2024-02-26T16:27:58.503",
"lastModified": "2024-11-21T08:59:33.893", "lastModified": "2025-04-28T12:48:10.637",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 1.2, "exploitabilityScore": 1.2,
"impactScore": 5.9 "impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
} }
] ]
}, },
@ -51,14 +71,38 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bplugins:icons_font_loader:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.1.5",
"matchCriteriaId": "187749D0-AA72-4730-A73F-E29D06943737"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://patchstack.com/database/vulnerability/icons-font-loader/wordpress-icons-font-loader-plugin-1-1-4-arbitrary-file-upload-vulnerability?_s_id=cve", "url": "https://patchstack.com/database/vulnerability/icons-font-loader/wordpress-icons-font-loader-plugin-1-1-4-arbitrary-file-upload-vulnerability?_s_id=cve",
"source": "audit@patchstack.com" "source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://patchstack.com/database/vulnerability/icons-font-loader/wordpress-icons-font-loader-plugin-1-1-4-arbitrary-file-upload-vulnerability?_s_id=cve", "url": "https://patchstack.com/database/vulnerability/icons-font-loader/wordpress-icons-font-loader-plugin-1-1-4-arbitrary-file-upload-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25170", "id": "CVE-2024-25170",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-02-28T20:15:41.770", "published": "2024-02-28T20:15:41.770",
"lastModified": "2024-11-21T09:00:23.747", "lastModified": "2025-04-28T13:45:09.357",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,30 +51,65 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jupo:mezzanine:6.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FF14847F-A0CE-4930-B35E-F95C73EBECB3"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/shenhav12/CVE-2024-25170-Mezzanine-v6.0.0", "url": "https://github.com/shenhav12/CVE-2024-25170-Mezzanine-v6.0.0",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://ibb.co/DpxHpz9", "url": "https://ibb.co/DpxHpz9",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Exploit"
]
}, },
{ {
"url": "https://ibb.co/T0fhLwR", "url": "https://ibb.co/T0fhLwR",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Exploit"
]
}, },
{ {
"url": "https://github.com/shenhav12/CVE-2024-25170-Mezzanine-v6.0.0", "url": "https://github.com/shenhav12/CVE-2024-25170-Mezzanine-v6.0.0",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://ibb.co/DpxHpz9", "url": "https://ibb.co/DpxHpz9",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
}, },
{ {
"url": "https://ibb.co/T0fhLwR", "url": "https://ibb.co/T0fhLwR",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26342", "id": "CVE-2024-26342",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-02-28T18:15:45.890", "published": "2024-02-28T18:15:45.890",
"lastModified": "2024-11-21T09:02:23.983", "lastModified": "2025-04-28T13:15:09.927",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,14 +51,51 @@
] ]
} }
], ],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:asus:4g-ac68u_firmware:3.0.0.4.384.82230:*:*:*:*:*:*:*",
"matchCriteriaId": "C1697362-B417-4CA2-9E43-327F335195CC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:asus:4g-ac68u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46317EAB-C1A9-4811-9DB4-767A58E92A3B"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/Nicholas-wei/bug-discovery/blob/main/asus/2/ASUS_ac68u.md", "url": "https://github.com/Nicholas-wei/bug-discovery/blob/main/asus/2/ASUS_ac68u.md",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}, },
{ {
"url": "https://github.com/Nicholas-wei/bug-discovery/blob/main/asus/2/ASUS_ac68u.md", "url": "https://github.com/Nicholas-wei/bug-discovery/blob/main/asus/2/ASUS_ac68u.md",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -0,0 +1,76 @@
{
"id": "CVE-2025-32472",
"sourceIdentifier": "psirt@sick.de",
"published": "2025-04-28T13:15:23.053",
"lastModified": "2025-04-28T13:15:23.053",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The multiScan and picoScan are vulnerable to a denial-of-service (DoS) attack. A remote attacker can exploit this vulnerability by conducting a Slowloris-type attack, causing the web page to become unresponsive."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@sick.de",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@sick.de",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"references": [
{
"url": "https://cdn.sick.com/media/docs/1/11/411/Special_information_CYBERSECURITY_BY_SICK_en_IM0084411.PDF",
"source": "psirt@sick.de"
},
{
"url": "https://sick.com/psirt",
"source": "psirt@sick.de"
},
{
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices",
"source": "psirt@sick.de"
},
{
"url": "https://www.first.org/cvss/calculator/3.1",
"source": "psirt@sick.de"
},
{
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0006.json",
"source": "psirt@sick.de"
},
{
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0006.pdf",
"source": "psirt@sick.de"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-4018",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-28T12:15:31.913",
"lastModified": "2025-04-28T12:15:31.913",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in 20120630 Novel-Plus up to 0e156c04b4b7ce0563bef6c97af4476fcda8f160. This issue affects the function addCrawlSource of the file novel-crawl/src/main/java/com/java2nb/novel/controller/CrawlController.java. The manipulation leads to missing authentication. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
},
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"references": [
{
"url": "https://vuldb.com/?ctiid.306371",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.306371",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.558377",
"source": "cna@vuldb.com"
},
{
"url": "https://www.cnblogs.com/aibot/p/18827504",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-4019",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-28T12:15:32.093",
"lastModified": "2025-04-28T12:15:32.093",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in 20120630 Novel-Plus up to 0e156c04b4b7ce0563bef6c97af4476fcda8f160. Affected is the function genCode of the file novel-admin/src/main/java/com/java2nb/common/controller/GeneratorController.java. The manipulation leads to missing authentication. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
},
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"references": [
{
"url": "https://vuldb.com/?ctiid.306372",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.306372",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.558360",
"source": "cna@vuldb.com"
},
{
"url": "https://www.cnblogs.com/aibot/p/18827469",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-4020",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-28T13:15:24.603",
"lastModified": "2025-04-28T13:15:24.603",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in PHPGurukul Old Age Home Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /contact.php. The manipulation of the argument fname leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/Q3qc1n/myCVE/issues/1",
"source": "cna@vuldb.com"
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.306374",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.306374",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.558365",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-4021",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-28T13:15:24.773",
"lastModified": "2025-04-28T13:15:24.773",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Patient Record Management System 1.0. It has been classified as critical. This affects an unknown part of the file /edit_spatient.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/plj-sudo/cve/blob/main/README.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.306375",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.306375",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.558402",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-46661",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-28T13:15:24.117",
"lastModified": "2025-04-28T13:15:24.117",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IPW Systems Metazo through 8.1.3 allows unauthenticated Remote Code Execution because smartyValidator.php enables the attacker to provide template expressions, aka Server-Side Template-Injection."
}
],
"metrics": {},
"references": [
{
"url": "https://code-white.com/public-vulnerability-list/",
"source": "cve@mitre.org"
},
{
"url": "https://www.ipwsystems.com/",
"source": "cve@mitre.org"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2025-04-28T12:00:21.013755+00:00 2025-04-28T14:00:19.945572+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2025-04-28T11:15:38.847000+00:00 2025-04-28T13:45:09.357000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -33,28 +33,30 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
291581 291587
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `5` Recently added CVEs: `6`
- [CVE-2025-3200](CVE-2025/CVE-2025-32xx/CVE-2025-3200.json) (`2025-04-28T10:15:16.033`) - [CVE-2025-32472](CVE-2025/CVE-2025-324xx/CVE-2025-32472.json) (`2025-04-28T13:15:23.053`)
- [CVE-2025-4014](CVE-2025/CVE-2025-40xx/CVE-2025-4014.json) (`2025-04-28T10:15:16.863`) - [CVE-2025-4018](CVE-2025/CVE-2025-40xx/CVE-2025-4018.json) (`2025-04-28T12:15:31.913`)
- [CVE-2025-4015](CVE-2025/CVE-2025-40xx/CVE-2025-4015.json) (`2025-04-28T10:15:17.057`) - [CVE-2025-4019](CVE-2025/CVE-2025-40xx/CVE-2025-4019.json) (`2025-04-28T12:15:32.093`)
- [CVE-2025-4016](CVE-2025/CVE-2025-40xx/CVE-2025-4016.json) (`2025-04-28T11:15:38.657`) - [CVE-2025-4020](CVE-2025/CVE-2025-40xx/CVE-2025-4020.json) (`2025-04-28T13:15:24.603`)
- [CVE-2025-4017](CVE-2025/CVE-2025-40xx/CVE-2025-4017.json) (`2025-04-28T11:15:38.847`) - [CVE-2025-4021](CVE-2025/CVE-2025-40xx/CVE-2025-4021.json) (`2025-04-28T13:15:24.773`)
- [CVE-2025-46661](CVE-2025/CVE-2025-466xx/CVE-2025-46661.json) (`2025-04-28T13:15:24.117`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `4` Recently modified CVEs: `5`
- [CVE-2025-32907](CVE-2025/CVE-2025-329xx/CVE-2025-32907.json) (`2025-04-28T11:15:38.037`) - [CVE-2023-51533](CVE-2023/CVE-2023-515xx/CVE-2023-51533.json) (`2025-04-28T13:13:33.597`)
- [CVE-2025-32911](CVE-2025/CVE-2025-329xx/CVE-2025-32911.json) (`2025-04-28T11:15:38.547`) - [CVE-2023-52048](CVE-2023/CVE-2023-520xx/CVE-2023-52048.json) (`2025-04-28T13:08:59.177`)
- [CVE-2025-3954](CVE-2025/CVE-2025-39xx/CVE-2025-3954.json) (`2025-04-28T10:15:16.680`) - [CVE-2024-24714](CVE-2024/CVE-2024-247xx/CVE-2024-24714.json) (`2025-04-28T12:48:10.637`)
- [CVE-2025-4013](CVE-2025/CVE-2025-40xx/CVE-2025-4013.json) (`2025-04-28T09:15:22.090`) - [CVE-2024-25170](CVE-2024/CVE-2024-251xx/CVE-2024-25170.json) (`2025-04-28T13:45:09.357`)
- [CVE-2024-26342](CVE-2024/CVE-2024-263xx/CVE-2024-26342.json) (`2025-04-28T13:15:09.927`)
## Download and Usage ## Download and Usage

View File

@ -240449,7 +240449,7 @@ CVE-2023-5153,0,0,9c9af9ee0585ae99c11dc28be44a3d285d24f0e534e56e6e3bc49f885c490b
CVE-2023-51530,0,0,10aa7972ebcc143fc175a676ecc0636cfb1bd808ee825b8d1ba9998f1ed6f97f,2025-02-27T02:51:16.947000 CVE-2023-51530,0,0,10aa7972ebcc143fc175a676ecc0636cfb1bd808ee825b8d1ba9998f1ed6f97f,2025-02-27T02:51:16.947000
CVE-2023-51531,0,0,ed65fb56698b1668a229da16713fbb3a00de61d6cd1c84cc2b94de89c27c7bfa,2025-02-27T02:55:35.553000 CVE-2023-51531,0,0,ed65fb56698b1668a229da16713fbb3a00de61d6cd1c84cc2b94de89c27c7bfa,2025-02-27T02:55:35.553000
CVE-2023-51532,0,0,ab7508cc452da5caaa84a729d614de6dcf5a6b68199b1a01ad6bed86c7b79196,2024-11-21T08:38:19.377000 CVE-2023-51532,0,0,ab7508cc452da5caaa84a729d614de6dcf5a6b68199b1a01ad6bed86c7b79196,2024-11-21T08:38:19.377000
CVE-2023-51533,0,0,8407403514f44c57077be96a69f715472597e8422008375af049cf846726150c,2024-11-21T08:38:19.523000 CVE-2023-51533,0,1,2ef6b746e3ae13092e5325bb7897fb9a47cf6eafaf6307c389e0af4501a290f9,2025-04-28T13:13:33.597000
CVE-2023-51534,0,0,674283aa9bee476e3f518de07ee15ce728e3ea64deca08374beae81fdb205f23,2024-11-21T08:38:19.663000 CVE-2023-51534,0,0,674283aa9bee476e3f518de07ee15ce728e3ea64deca08374beae81fdb205f23,2024-11-21T08:38:19.663000
CVE-2023-51535,0,0,b4ee7d4c77008fec43e7a917d42277372a9bc28a04a14adf861b98934323efbd,2024-11-21T08:38:19.803000 CVE-2023-51535,0,0,b4ee7d4c77008fec43e7a917d42277372a9bc28a04a14adf861b98934323efbd,2024-11-21T08:38:19.803000
CVE-2023-51536,0,0,5459c09b4b1682eae7f140dbb92e6e712692b6c8c3fc2399e747fac5b9fd78de,2024-11-21T08:38:19.930000 CVE-2023-51536,0,0,5459c09b4b1682eae7f140dbb92e6e712692b6c8c3fc2399e747fac5b9fd78de,2024-11-21T08:38:19.930000
@ -240823,7 +240823,7 @@ CVE-2023-52044,0,0,5b5e70107668847bba1d6062e34c0bf4eaededd76c0935abbe5da27ca0360
CVE-2023-52045,0,0,b95570fd6064d2fac3cb39dff45979071738bfc47c15c31d200252b85a2f3e9f,2025-04-17T19:11:05.073000 CVE-2023-52045,0,0,b95570fd6064d2fac3cb39dff45979071738bfc47c15c31d200252b85a2f3e9f,2025-04-17T19:11:05.073000
CVE-2023-52046,0,0,194849462bf429fc749f298b05a36377ff7074363e301b433cd9950d69c4c501,2024-11-21T08:39:04.817000 CVE-2023-52046,0,0,194849462bf429fc749f298b05a36377ff7074363e301b433cd9950d69c4c501,2024-11-21T08:39:04.817000
CVE-2023-52047,0,0,d56b5255bbf43ce833425482d3a7c4458ee12e08ce88fc91b5b4e4a71c62ee74,2025-04-01T13:30:28.050000 CVE-2023-52047,0,0,d56b5255bbf43ce833425482d3a7c4458ee12e08ce88fc91b5b4e4a71c62ee74,2025-04-01T13:30:28.050000
CVE-2023-52048,0,0,f9f7189303c23a63c2883144b7d524d470efcf0f25c77449cbee3649707df3b9,2024-11-26T16:15:08.977000 CVE-2023-52048,0,1,dc6a64e99c990ac71e2e5fd5c1632b65bf305feb3beb43bad667892a5fedb150,2025-04-28T13:08:59.177000
CVE-2023-5205,0,0,ad9e6403ed51d32e238949552f23850cd3c894ce7b700f7f43181c17b96bcabf,2024-11-21T08:41:17.900000 CVE-2023-5205,0,0,ad9e6403ed51d32e238949552f23850cd3c894ce7b700f7f43181c17b96bcabf,2024-11-21T08:41:17.900000
CVE-2023-52059,0,0,631fc170b23676a9d5a914e1efcd033aa6ac461afd7c0cbe7ba670738271ca23,2024-11-21T08:39:05.367000 CVE-2023-52059,0,0,631fc170b23676a9d5a914e1efcd033aa6ac461afd7c0cbe7ba670738271ca23,2024-11-21T08:39:05.367000
CVE-2023-52060,0,0,916b6d0023ba25356201b349f9585af7af15e0ab89951480565e91e01992b734,2025-03-13T20:15:16.240000 CVE-2023-52060,0,0,916b6d0023ba25356201b349f9585af7af15e0ab89951480565e91e01992b734,2025-03-13T20:15:16.240000
@ -252729,7 +252729,7 @@ CVE-2024-24710,0,0,3e1e20a8dfa79a8b78b75c17d13801e5e4aa6e91804fe24acce34eb915d0b
CVE-2024-24711,0,0,22ae5814b6f1b3b16c3d1525f8fcb2be9e6f73b9bf83108e69c5d785af0e14a5,2024-11-21T08:59:33.490000 CVE-2024-24711,0,0,22ae5814b6f1b3b16c3d1525f8fcb2be9e6f73b9bf83108e69c5d785af0e14a5,2024-11-21T08:59:33.490000
CVE-2024-24712,0,0,efc844b6aac243f9d2a4e2fa0e4f20ffb1fa53d6800923dfed2d946c95888150,2024-11-21T08:59:33.620000 CVE-2024-24712,0,0,efc844b6aac243f9d2a4e2fa0e4f20ffb1fa53d6800923dfed2d946c95888150,2024-11-21T08:59:33.620000
CVE-2024-24713,0,0,9b6abef33bc7d884bbcfe7f84a8de01ffd604fe1e84fadee5fa6903c498a1f90,2024-11-21T08:59:33.757000 CVE-2024-24713,0,0,9b6abef33bc7d884bbcfe7f84a8de01ffd604fe1e84fadee5fa6903c498a1f90,2024-11-21T08:59:33.757000
CVE-2024-24714,0,0,d97d011d8f9e625b892ecdec6786676ba03f51fa0f6ac25c82900381caf959b8,2024-11-21T08:59:33.893000 CVE-2024-24714,0,1,fa6f31994511f691ec58d6cd25d830472c6518df8eb14d92ad8a1216e17c5ef2,2025-04-28T12:48:10.637000
CVE-2024-24715,0,0,0e1efbeecdbbc67506e62ff0a15195fb63b9939321818a7128fc2e9bb4370e11,2024-11-21T08:59:34.020000 CVE-2024-24715,0,0,0e1efbeecdbbc67506e62ff0a15195fb63b9939321818a7128fc2e9bb4370e11,2024-11-21T08:59:34.020000
CVE-2024-24716,0,0,2a1681202601d9e99709e6831ac4b63ea8c43e8b87405bb1f57ab626394c187f,2024-11-21T08:59:34.150000 CVE-2024-24716,0,0,2a1681202601d9e99709e6831ac4b63ea8c43e8b87405bb1f57ab626394c187f,2024-11-21T08:59:34.150000
CVE-2024-24717,0,0,75805cbf14610b8ac5098a39951fb1a53c50c5d54fe991e08ae0e81f017efa6f,2024-11-21T08:59:34.317000 CVE-2024-24717,0,0,75805cbf14610b8ac5098a39951fb1a53c50c5d54fe991e08ae0e81f017efa6f,2024-11-21T08:59:34.317000
@ -253137,7 +253137,7 @@ CVE-2024-25167,0,0,6680c9ae0b5f0e6a56ae0f989b9e9129826f63fc1c07b9d46b893bd2a5ea0
CVE-2024-25168,0,0,8cefebfb25cf73bfbc7148eb27cdd7832e378fc25a13306a6452184972fcdac6,2024-11-21T09:00:23.370000 CVE-2024-25168,0,0,8cefebfb25cf73bfbc7148eb27cdd7832e378fc25a13306a6452184972fcdac6,2024-11-21T09:00:23.370000
CVE-2024-25169,0,0,99447ba0d35007c05de0bb325e4f626f2e771e1210f38989dc4b7d60408a0543,2025-03-28T19:15:19.433000 CVE-2024-25169,0,0,99447ba0d35007c05de0bb325e4f626f2e771e1210f38989dc4b7d60408a0543,2025-03-28T19:15:19.433000
CVE-2024-2517,0,0,295e66015290670d17656ff58cb1c4da5fc5fa5488e00738c41044e38528f829,2025-02-14T17:00:42.847000 CVE-2024-2517,0,0,295e66015290670d17656ff58cb1c4da5fc5fa5488e00738c41044e38528f829,2025-02-14T17:00:42.847000
CVE-2024-25170,0,0,c80053700c63ecebd48c458fdb3b5e82ab4535efb3047c237c54b40e832e908a,2024-11-21T09:00:23.747000 CVE-2024-25170,0,1,4c56b2b9fe4a87cb80c5dee02642b875be800d1c7ec89e66c4b2e2df368f00c2,2025-04-28T13:45:09.357000
CVE-2024-25175,0,0,d202acf4b9d186a327285b02335009822d657110c4d7975ee8e4ed90ceea8ae1,2024-11-21T09:00:23.977000 CVE-2024-25175,0,0,d202acf4b9d186a327285b02335009822d657110c4d7975ee8e4ed90ceea8ae1,2024-11-21T09:00:23.977000
CVE-2024-2518,0,0,218e6d38201830e4f08ae52d79ac56db7a7b552c444bda2da7a3568e50b7a7a6,2025-02-14T16:59:49.713000 CVE-2024-2518,0,0,218e6d38201830e4f08ae52d79ac56db7a7b552c444bda2da7a3568e50b7a7a6,2025-02-14T16:59:49.713000
CVE-2024-25180,0,0,0d4a542b02265d3f9b8201e343a419b397fe0f87ee7decd85beea8db7b2a744c,2024-11-21T09:00:24.200000 CVE-2024-25180,0,0,0d4a542b02265d3f9b8201e343a419b397fe0f87ee7decd85beea8db7b2a744c,2024-11-21T09:00:24.200000
@ -254039,7 +254039,7 @@ CVE-2024-26335,0,0,d935f588a5f25fc8eb3a1cad35a0e183dcfe3bb620dcbf94cb5db283d0be6
CVE-2024-26337,0,0,8f97136a32143d7c5cb4e695fc03098705d0a94d9a4445524aede82b9c17fb81,2025-04-01T15:48:49.013000 CVE-2024-26337,0,0,8f97136a32143d7c5cb4e695fc03098705d0a94d9a4445524aede82b9c17fb81,2025-04-01T15:48:49.013000
CVE-2024-26339,0,0,50901e7be8d4dc2f1ae969674b464222e6c5cb243f33556cac70b86975fdb414,2025-04-01T15:48:23.610000 CVE-2024-26339,0,0,50901e7be8d4dc2f1ae969674b464222e6c5cb243f33556cac70b86975fdb414,2025-04-01T15:48:23.610000
CVE-2024-2634,0,0,f23d5a69439faf8e582a9c275f183d86336ce7e598134e5aefd6ea8385c5e2eb,2024-11-21T09:10:10.983000 CVE-2024-2634,0,0,f23d5a69439faf8e582a9c275f183d86336ce7e598134e5aefd6ea8385c5e2eb,2024-11-21T09:10:10.983000
CVE-2024-26342,0,0,fc05f488cb309aec3f77bdc6b69f04165ef7f2603bdb12d6ed4147ff5691cb8b,2024-11-21T09:02:23.983000 CVE-2024-26342,0,1,da6762122e9027a78d524f6ee4cae5691172afa8889ba4ddcc1104b2ff0a8e3b,2025-04-28T13:15:09.927000
CVE-2024-26349,0,0,1bbbf3597c87b9929fc5eb4bb026f97edb7f2e0b4184399ebdf8842d543c4e8f,2025-03-25T17:00:12.093000 CVE-2024-26349,0,0,1bbbf3597c87b9929fc5eb4bb026f97edb7f2e0b4184399ebdf8842d543c4e8f,2025-03-25T17:00:12.093000
CVE-2024-2635,0,0,5fc435b0b5b40519e84566e07c1fce38fb260b472efb6bf37eb63fcc0934d662,2024-11-21T09:10:11.093000 CVE-2024-2635,0,0,5fc435b0b5b40519e84566e07c1fce38fb260b472efb6bf37eb63fcc0934d662,2024-11-21T09:10:11.093000
CVE-2024-26350,0,0,aafbc8f10bb2284d20ad7acc10a6c83f87626d2b046e77e8585f67ff9e4808a2,2025-03-28T19:15:20.007000 CVE-2024-26350,0,0,aafbc8f10bb2284d20ad7acc10a6c83f87626d2b046e77e8585f67ff9e4808a2,2025-03-28T19:15:20.007000
@ -290016,7 +290016,7 @@ CVE-2025-3196,0,0,bb0d2ecf21993903a71e6dff645fdb05a339ebaf3e6e9f8f684bcf59eec4ea
CVE-2025-3197,0,0,e79e9bde316dbfd1ba7b8b9ac58822adceab867075d18a7670c50494d881764a,2025-04-07T14:18:15.560000 CVE-2025-3197,0,0,e79e9bde316dbfd1ba7b8b9ac58822adceab867075d18a7670c50494d881764a,2025-04-07T14:18:15.560000
CVE-2025-3198,0,0,9ea9a8c586fb27cd4141f26bc5f53c6d47512dda4a6f8f32123c47190f49343b,2025-04-07T14:18:15.560000 CVE-2025-3198,0,0,9ea9a8c586fb27cd4141f26bc5f53c6d47512dda4a6f8f32123c47190f49343b,2025-04-07T14:18:15.560000
CVE-2025-3199,0,0,b2c8a0f552e5c66b559702403ed11bd1140ca56173e2c4b53e84f8a9895b6f6e,2025-04-07T14:18:15.560000 CVE-2025-3199,0,0,b2c8a0f552e5c66b559702403ed11bd1140ca56173e2c4b53e84f8a9895b6f6e,2025-04-07T14:18:15.560000
CVE-2025-3200,1,1,2c38baa15b047d30a9e672c9e140064caada08da87795d8ebef57c8ca7901f5b,2025-04-28T10:15:16.033000 CVE-2025-3200,0,0,2c38baa15b047d30a9e672c9e140064caada08da87795d8ebef57c8ca7901f5b,2025-04-28T10:15:16.033000
CVE-2025-32012,0,0,b0776b1f52985236e3b0f0ac31e6563e5d0337c072f41a1ff81c3b677d9f11c3,2025-04-16T13:25:59.640000 CVE-2025-32012,0,0,b0776b1f52985236e3b0f0ac31e6563e5d0337c072f41a1ff81c3b677d9f11c3,2025-04-16T13:25:59.640000
CVE-2025-32013,0,0,c9fa83fb3b6c11b2eb57b44937dc465050a0a4b58e55a1ffb249ac7249aa9f12,2025-04-08T18:54:07.337000 CVE-2025-32013,0,0,c9fa83fb3b6c11b2eb57b44937dc465050a0a4b58e55a1ffb249ac7249aa9f12,2025-04-08T18:54:07.337000
CVE-2025-32014,0,0,af089ef047d3ce8d7747406914b66a9d22daea2274c66b4c0d88bc73728bf977,2025-04-08T18:14:17.307000 CVE-2025-32014,0,0,af089ef047d3ce8d7747406914b66a9d22daea2274c66b4c0d88bc73728bf977,2025-04-08T18:14:17.307000
@ -290315,6 +290315,7 @@ CVE-2025-32464,0,0,d585900889b901117e0fe728cc5e64b12123c28db643e71ecaab58b676037
CVE-2025-3247,0,0,de417f93083f53a095a331b7f7a4a52b9b1338fe061d7ed48128d633e68ff031,2025-04-16T13:25:37.340000 CVE-2025-3247,0,0,de417f93083f53a095a331b7f7a4a52b9b1338fe061d7ed48128d633e68ff031,2025-04-16T13:25:37.340000
CVE-2025-32470,0,0,7dbeb6b6cb094fd7f696e62a410c872fc392f11a7c72598439cf161f2bb1ead2,2025-04-28T09:15:20.643000 CVE-2025-32470,0,0,7dbeb6b6cb094fd7f696e62a410c872fc392f11a7c72598439cf161f2bb1ead2,2025-04-28T09:15:20.643000
CVE-2025-32471,0,0,d22d1b90bf02f3583666588af972e5f20ef3a20c8b44c857c2696eed80c41065,2025-04-28T09:15:21.263000 CVE-2025-32471,0,0,d22d1b90bf02f3583666588af972e5f20ef3a20c8b44c857c2696eed80c41065,2025-04-28T09:15:21.263000
CVE-2025-32472,1,1,fce3c184bf175e1d727111b51d6fafe6a64818eddd51d33f1f21b4c8d2601bd8,2025-04-28T13:15:23.053000
CVE-2025-32475,0,0,cf74498a36221a51f220d05d078ed063eee4c8ce48d68258cae808bc296530bd,2025-04-17T20:21:48.243000 CVE-2025-32475,0,0,cf74498a36221a51f220d05d078ed063eee4c8ce48d68258cae808bc296530bd,2025-04-17T20:21:48.243000
CVE-2025-32476,0,0,9d54d65167184e122be5c3a790d5ad19d5abaa6b052713e592bcb27d26085427,2025-04-09T20:02:41.860000 CVE-2025-32476,0,0,9d54d65167184e122be5c3a790d5ad19d5abaa6b052713e592bcb27d26085427,2025-04-09T20:02:41.860000
CVE-2025-32477,0,0,6aaeb344af7fac729d48ed1cd0817d6c11c34e76428c0bd5b074c3df21934506,2025-04-09T20:02:41.860000 CVE-2025-32477,0,0,6aaeb344af7fac729d48ed1cd0817d6c11c34e76428c0bd5b074c3df21934506,2025-04-09T20:02:41.860000
@ -290658,11 +290659,11 @@ CVE-2025-32872,0,0,a6acd2c4749d25af3a9674e470b92f66756a824f6626eef20d9bf26ef8cf4
CVE-2025-3288,0,0,f38b6103c86e4b43a603efa2302f1894dd9c86a56576c13140616463a055f77c,2025-04-08T18:13:53.347000 CVE-2025-3288,0,0,f38b6103c86e4b43a603efa2302f1894dd9c86a56576c13140616463a055f77c,2025-04-08T18:13:53.347000
CVE-2025-3289,0,0,2dce3ef8eb88e8d6d3c6bdcdd7b6d448658ce48e819de5faca8e16dde3fc5df6,2025-04-08T18:13:53.347000 CVE-2025-3289,0,0,2dce3ef8eb88e8d6d3c6bdcdd7b6d448658ce48e819de5faca8e16dde3fc5df6,2025-04-08T18:13:53.347000
CVE-2025-32906,0,0,4ec5f2ca7b9b8ea45c77e5ce5ab48abb3a754736cb55462f85af932adb790b5a,2025-04-15T18:39:27.967000 CVE-2025-32906,0,0,4ec5f2ca7b9b8ea45c77e5ce5ab48abb3a754736cb55462f85af932adb790b5a,2025-04-15T18:39:27.967000
CVE-2025-32907,0,1,1e86adb6a5d89d4f9bf781229ca64bca81be27db36a8583b08ded3a98fcbc5e9,2025-04-28T11:15:38.037000 CVE-2025-32907,0,0,1e86adb6a5d89d4f9bf781229ca64bca81be27db36a8583b08ded3a98fcbc5e9,2025-04-28T11:15:38.037000
CVE-2025-32908,0,0,f80bb7c7aa52de7bec22f93e1f33735c17e76c61d454a4c320c750a2c077bf2f,2025-04-15T18:39:27.967000 CVE-2025-32908,0,0,f80bb7c7aa52de7bec22f93e1f33735c17e76c61d454a4c320c750a2c077bf2f,2025-04-15T18:39:27.967000
CVE-2025-32909,0,0,0884dca753e2c79439ff41be1ac33162b422fea3f958d4f092d8b4757c9eeb8e,2025-04-15T18:39:27.967000 CVE-2025-32909,0,0,0884dca753e2c79439ff41be1ac33162b422fea3f958d4f092d8b4757c9eeb8e,2025-04-15T18:39:27.967000
CVE-2025-32910,0,0,8c3c89c7ada7acbcb1166439c21c35fca837058d502fd7e6ae633b46c7521a45,2025-04-15T18:39:27.967000 CVE-2025-32910,0,0,8c3c89c7ada7acbcb1166439c21c35fca837058d502fd7e6ae633b46c7521a45,2025-04-15T18:39:27.967000
CVE-2025-32911,0,1,f25d9de68e935d3d4c0b90b9de7bcf930b2b27ee73113ea9ab7796c0f19b4f5e,2025-04-28T11:15:38.547000 CVE-2025-32911,0,0,f25d9de68e935d3d4c0b90b9de7bcf930b2b27ee73113ea9ab7796c0f19b4f5e,2025-04-28T11:15:38.547000
CVE-2025-32912,0,0,d3070db8447868fa2ece35d0452a8355ec1e0bd109d8c6849b4a995c4f9a6f4f,2025-04-15T18:39:27.967000 CVE-2025-32912,0,0,d3070db8447868fa2ece35d0452a8355ec1e0bd109d8c6849b4a995c4f9a6f4f,2025-04-15T18:39:27.967000
CVE-2025-32913,0,0,9a6437af944f5a8dfca81e0157cf042c9111cc56e3ea3f711289676647b70152,2025-04-15T18:39:27.967000 CVE-2025-32913,0,0,9a6437af944f5a8dfca81e0157cf042c9111cc56e3ea3f711289676647b70152,2025-04-15T18:39:27.967000
CVE-2025-32914,0,0,9339e03e13fdc57e8071d217b67af961566b6ba4b2f1f9b9540277c735046c80,2025-04-15T18:39:27.967000 CVE-2025-32914,0,0,9339e03e13fdc57e8071d217b67af961566b6ba4b2f1f9b9540277c735046c80,2025-04-15T18:39:27.967000
@ -291195,7 +291196,7 @@ CVE-2025-39532,0,0,c6a1aa250e41f609065af7ae7d78ed7ce37833beb178fb16dc9d01c8b07d0
CVE-2025-39533,0,0,00e9840fa3e721ed8659351609375801316fb69ce2b1599aede6965245df00e3,2025-04-17T20:21:05.203000 CVE-2025-39533,0,0,00e9840fa3e721ed8659351609375801316fb69ce2b1599aede6965245df00e3,2025-04-17T20:21:05.203000
CVE-2025-39535,0,0,51a8ea640c30c3212f3acbc8c60211505a3d6be753d78e2a8fe398418000d425,2025-04-17T20:21:05.203000 CVE-2025-39535,0,0,51a8ea640c30c3212f3acbc8c60211505a3d6be753d78e2a8fe398418000d425,2025-04-17T20:21:05.203000
CVE-2025-39538,0,0,0321e90c8ae30051c1566250939763852d597c73645ce940aa3b0b48f0398335,2025-04-16T13:25:37.340000 CVE-2025-39538,0,0,0321e90c8ae30051c1566250939763852d597c73645ce940aa3b0b48f0398335,2025-04-16T13:25:37.340000
CVE-2025-3954,0,1,36701b23061310142fdfbbfd4c93642b03e23c6630df84acc480dfd224a27a5b,2025-04-28T10:15:16.680000 CVE-2025-3954,0,0,36701b23061310142fdfbbfd4c93642b03e23c6630df84acc480dfd224a27a5b,2025-04-28T10:15:16.680000
CVE-2025-39540,0,0,9f2b7c96a776d5337b7ede4771066d56c291c66d5234e974d6115bb216968598,2025-04-16T13:25:37.340000 CVE-2025-39540,0,0,9f2b7c96a776d5337b7ede4771066d56c291c66d5234e974d6115bb216968598,2025-04-16T13:25:37.340000
CVE-2025-39542,0,0,29037c72c794514818baade4169583642447a541359265130df56621fba6f773,2025-04-17T20:21:05.203000 CVE-2025-39542,0,0,29037c72c794514818baade4169583642447a541359265130df56621fba6f773,2025-04-17T20:21:05.203000
CVE-2025-39543,0,0,4679595a0a70619c9b1c4aaadff325f9e3ed17afaacdb6ce73b0ee1cde976e9a,2025-04-16T13:25:37.340000 CVE-2025-39543,0,0,4679595a0a70619c9b1c4aaadff325f9e3ed17afaacdb6ce73b0ee1cde976e9a,2025-04-16T13:25:37.340000
@ -291320,11 +291321,15 @@ CVE-2025-4007,0,0,3846cafda0a4bf16cb150d354f302855ca52abe97e1511ff7952049139e97b
CVE-2025-4011,0,0,fd650462e3420207cd31233fc4c431e7e596a74ee02347146aba4f31f454ff6e,2025-04-28T09:15:21.727000 CVE-2025-4011,0,0,fd650462e3420207cd31233fc4c431e7e596a74ee02347146aba4f31f454ff6e,2025-04-28T09:15:21.727000
CVE-2025-40114,0,0,52258d38a9d74d61c359446421539f0af5d39305348a01561ec36d1d740dd110,2025-04-21T14:23:45.950000 CVE-2025-40114,0,0,52258d38a9d74d61c359446421539f0af5d39305348a01561ec36d1d740dd110,2025-04-21T14:23:45.950000
CVE-2025-4012,0,0,f328a3cb4a568b061bba5b27e6a5e1ea50f039823b05da9dea1b3e7afb2dd143,2025-04-28T09:15:21.910000 CVE-2025-4012,0,0,f328a3cb4a568b061bba5b27e6a5e1ea50f039823b05da9dea1b3e7afb2dd143,2025-04-28T09:15:21.910000
CVE-2025-4013,0,1,c941a6bbe86d1a82bf653d8d0594f3ea5e76ed6e8fa083636e732f43fddf6a3a,2025-04-28T09:15:22.090000 CVE-2025-4013,0,0,c941a6bbe86d1a82bf653d8d0594f3ea5e76ed6e8fa083636e732f43fddf6a3a,2025-04-28T09:15:22.090000
CVE-2025-4014,1,1,f259da298f4f8af0d94e8db357ade1efd3596c515c364d9d5ad548177efecd4c,2025-04-28T10:15:16.863000 CVE-2025-4014,0,0,f259da298f4f8af0d94e8db357ade1efd3596c515c364d9d5ad548177efecd4c,2025-04-28T10:15:16.863000
CVE-2025-4015,1,1,232ad8d07784c7f62ca3c92d0470dbab847354aba047abbda5ccbbb5a53b9ce5,2025-04-28T10:15:17.057000 CVE-2025-4015,0,0,232ad8d07784c7f62ca3c92d0470dbab847354aba047abbda5ccbbb5a53b9ce5,2025-04-28T10:15:17.057000
CVE-2025-4016,1,1,16f701a218e4c9c52d5777c88e9d05fa414760ac751896fa6c1b284b8a014d10,2025-04-28T11:15:38.657000 CVE-2025-4016,0,0,16f701a218e4c9c52d5777c88e9d05fa414760ac751896fa6c1b284b8a014d10,2025-04-28T11:15:38.657000
CVE-2025-4017,1,1,9f05b4a2eb6e84cc88a7e99ef8ccfa2b8d02b26e170cf3daf0c31a72832baaaa,2025-04-28T11:15:38.847000 CVE-2025-4017,0,0,9f05b4a2eb6e84cc88a7e99ef8ccfa2b8d02b26e170cf3daf0c31a72832baaaa,2025-04-28T11:15:38.847000
CVE-2025-4018,1,1,b12b51cf30fc2db7d195c2c9ee830ba57f48502213630f4d9ad39d9d3bfacbe7,2025-04-28T12:15:31.913000
CVE-2025-4019,1,1,026f93b3c776aee8c544c5f460bdd25f6379836f2a5d55dda570425a7ee6b846,2025-04-28T12:15:32.093000
CVE-2025-4020,1,1,511fd7ea80791808b10d31addcf8c936b71df14f2c24338c3857d1e24f7e838a,2025-04-28T13:15:24.603000
CVE-2025-4021,1,1,c6b32e73983711a929174c81d1269e862674efafae7a66852d16c04025876af8,2025-04-28T13:15:24.773000
CVE-2025-40325,0,0,21d661e5b65e79dd3cd00a7c9db2e14d6a6a65a1394969a7ad07f16fa08c79ce,2025-04-21T14:23:45.950000 CVE-2025-40325,0,0,21d661e5b65e79dd3cd00a7c9db2e14d6a6a65a1394969a7ad07f16fa08c79ce,2025-04-21T14:23:45.950000
CVE-2025-40364,0,0,e1468b00bb22572a62ec1b141065bed37efcb85f9368d87c29b0ce5bc57ec67c,2025-04-21T14:23:45.950000 CVE-2025-40364,0,0,e1468b00bb22572a62ec1b141065bed37efcb85f9368d87c29b0ce5bc57ec67c,2025-04-21T14:23:45.950000
CVE-2025-41395,0,0,c0d9bccd77abd47bebe5c3b7233aa41647dd331b6362659738a8c7fec7081455,2025-04-24T07:15:31.600000 CVE-2025-41395,0,0,c0d9bccd77abd47bebe5c3b7233aa41647dd331b6362659738a8c7fec7081455,2025-04-24T07:15:31.600000
@ -291572,6 +291577,7 @@ CVE-2025-46654,0,0,572c4d63fa2f8afca64ec12e1381813d160fa2c2ee84d4e0448e47cdcd412
CVE-2025-46655,0,0,a9f672e75f586721e3ec47d88a24167a5da40f45a10ccbe0303bfb6061c72944,2025-04-26T21:15:15.260000 CVE-2025-46655,0,0,a9f672e75f586721e3ec47d88a24167a5da40f45a10ccbe0303bfb6061c72944,2025-04-26T21:15:15.260000
CVE-2025-46656,0,0,696b18d293f3e47530d9a462ec4dcce6fe7c7473fa83e2a90e8336464b46aa30,2025-04-26T22:15:17.260000 CVE-2025-46656,0,0,696b18d293f3e47530d9a462ec4dcce6fe7c7473fa83e2a90e8336464b46aa30,2025-04-26T22:15:17.260000
CVE-2025-46657,0,0,61b5714a3945d18f5b1028d9d01f06343b4f515928a414fd8f4acc9db2248fff,2025-04-27T17:15:16.193000 CVE-2025-46657,0,0,61b5714a3945d18f5b1028d9d01f06343b4f515928a414fd8f4acc9db2248fff,2025-04-27T17:15:16.193000
CVE-2025-46661,1,1,1b88a1421b991af9f83e00012e017bc52e3d2608548a1f64585fab31eb98f621,2025-04-28T13:15:24.117000
CVE-2025-46672,0,0,a515f04f2684525b908fbd5bf52c62317ae3f104cec7ce6d3fbe0f544f2f50f4,2025-04-27T01:15:44.327000 CVE-2025-46672,0,0,a515f04f2684525b908fbd5bf52c62317ae3f104cec7ce6d3fbe0f544f2f50f4,2025-04-27T01:15:44.327000
CVE-2025-46673,0,0,b4b185c7af04fb38cea193788026d34ee5cbd860f38177d871857854e4306632,2025-04-27T01:15:44.477000 CVE-2025-46673,0,0,b4b185c7af04fb38cea193788026d34ee5cbd860f38177d871857854e4306632,2025-04-27T01:15:44.477000
CVE-2025-46674,0,0,46444152edd713c1307e6ccc5d1033b322cbe1d07cb6f10dea38fc2301d3d28e,2025-04-27T01:15:44.623000 CVE-2025-46674,0,0,46444152edd713c1307e6ccc5d1033b322cbe1d07cb6f10dea38fc2301d3d28e,2025-04-27T01:15:44.623000

Can't render this file because it is too large.