From e85d96846b1e63deca82e711e274d6aaf52bac47 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sat, 19 Apr 2025 18:03:54 +0000 Subject: [PATCH] Auto-Update: 2025-04-19T18:00:19.935090+00:00 --- CVE-2025/CVE-2025-324xx/CVE-2025-32433.json | 6 +- CVE-2025/CVE-2025-38xx/CVE-2025-3804.json | 145 ++++++++++++++++++++ CVE-2025/CVE-2025-38xx/CVE-2025-3805.json | 145 ++++++++++++++++++++ CVE-2025/CVE-2025-38xx/CVE-2025-3806.json | 141 +++++++++++++++++++ CVE-2025/CVE-2025-38xx/CVE-2025-3807.json | 141 +++++++++++++++++++ README.md | 18 +-- _state.csv | 12 +- 7 files changed, 595 insertions(+), 13 deletions(-) create mode 100644 CVE-2025/CVE-2025-38xx/CVE-2025-3804.json create mode 100644 CVE-2025/CVE-2025-38xx/CVE-2025-3805.json create mode 100644 CVE-2025/CVE-2025-38xx/CVE-2025-3806.json create mode 100644 CVE-2025/CVE-2025-38xx/CVE-2025-3807.json diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32433.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32433.json index cdcab7e6801..6c5f0983798 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32433.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32433.json @@ -2,7 +2,7 @@ "id": "CVE-2025-32433", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-16T22:15:14.373", - "lastModified": "2025-04-19T02:15:13.027", + "lastModified": "2025-04-19T16:15:14.003", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -79,6 +79,10 @@ { "url": "http://www.openwall.com/lists/oss-security/2025/04/18/6", "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2025/04/19/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-38xx/CVE-2025-3804.json b/CVE-2025/CVE-2025-38xx/CVE-2025-3804.json new file mode 100644 index 00000000000..881490cb7c4 --- /dev/null +++ b/CVE-2025/CVE-2025-38xx/CVE-2025-3804.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-3804", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-19T16:15:14.250", + "lastModified": "2025-04-19T16:15:14.250", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in thautwarm vscode-diana 0.0.1. Affected is an unknown function of the file Gen.py of the component Jinja2 Template Handler. The manipulation leads to injection. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 4.3, + "accessVector": "LOCAL", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 3.1, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-707" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/thautwarm/vscode-diana/issues/1", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/thautwarm/vscode-diana/issues/1#issue-2982880456", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.305658", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.305658", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.554779", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-38xx/CVE-2025-3805.json b/CVE-2025/CVE-2025-38xx/CVE-2025-3805.json new file mode 100644 index 00000000000..2c382123150 --- /dev/null +++ b/CVE-2025/CVE-2025-38xx/CVE-2025-3805.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-3805", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-19T16:15:14.437", + "lastModified": "2025-04-19T16:15:14.437", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in sarrionandia tournatrack up to 4c13a23f43da5317eea4614870a7a8510fc540ec. Affected by this vulnerability is an unknown functionality of the file check_id.py of the component Jinja2 Template Handler. The manipulation of the argument ID leads to injection. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 4.3, + "accessVector": "LOCAL", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 3.1, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-707" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/sarrionandia/tournatrack/issues/86", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/sarrionandia/tournatrack/issues/86#issue-2982930491", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.305659", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.305659", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.554781", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-38xx/CVE-2025-3806.json b/CVE-2025/CVE-2025-38xx/CVE-2025-3806.json new file mode 100644 index 00000000000..7f96f8c7c77 --- /dev/null +++ b/CVE-2025/CVE-2025-38xx/CVE-2025-3806.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-3806", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-19T17:15:44.690", + "lastModified": "2025-04-19T17:15:44.690", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as problematic, has been found in dazhouda lecms up to 3.0.3. Affected by this issue is some unknown functionality of the file /admin of the component Edit Profile Handler. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 2.4, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N", + "baseScore": 3.3, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "LOW", + "exploitabilityScore": 6.4, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/dtwin88/cve-md/blob/main/lecms%20V3.0.3/lecms.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.305660", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.305660", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.554977", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-38xx/CVE-2025-3807.json b/CVE-2025/CVE-2025-38xx/CVE-2025-3807.json new file mode 100644 index 00000000000..9657cc00082 --- /dev/null +++ b/CVE-2025/CVE-2025-38xx/CVE-2025-3807.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-3807", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-19T17:15:44.860", + "lastModified": "2025-04-19T17:15:44.860", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in zhenfeng13 My-BBS 1.0. This affects the function Upload of the file src/main/java/com/my/bbs/controller/common/UploadController.java of the component Endpoint. The manipulation leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + }, + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/caigo8/CVE-md/blob/main/My-bbs/%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.305661", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.305661", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.555258", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 1c2f4c42ce5..760fa15e860 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-04-19T16:00:19.691612+00:00 +2025-04-19T18:00:19.935090+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-04-19T15:15:47.040000+00:00 +2025-04-19T17:15:44.860000+00:00 ``` ### Last Data Feed Release @@ -33,22 +33,24 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -290909 +290913 ``` ### CVEs added in the last Commit -Recently added CVEs: `3` +Recently added CVEs: `4` -- [CVE-2025-3801](CVE-2025/CVE-2025-38xx/CVE-2025-3801.json) (`2025-04-19T14:15:38.333`) -- [CVE-2025-3802](CVE-2025/CVE-2025-38xx/CVE-2025-3802.json) (`2025-04-19T15:15:46.073`) -- [CVE-2025-3803](CVE-2025/CVE-2025-38xx/CVE-2025-3803.json) (`2025-04-19T15:15:47.040`) +- [CVE-2025-3804](CVE-2025/CVE-2025-38xx/CVE-2025-3804.json) (`2025-04-19T16:15:14.250`) +- [CVE-2025-3805](CVE-2025/CVE-2025-38xx/CVE-2025-3805.json) (`2025-04-19T16:15:14.437`) +- [CVE-2025-3806](CVE-2025/CVE-2025-38xx/CVE-2025-3806.json) (`2025-04-19T17:15:44.690`) +- [CVE-2025-3807](CVE-2025/CVE-2025-38xx/CVE-2025-3807.json) (`2025-04-19T17:15:44.860`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `1` +- [CVE-2025-32433](CVE-2025/CVE-2025-324xx/CVE-2025-32433.json) (`2025-04-19T16:15:14.003`) ## Download and Usage diff --git a/_state.csv b/_state.csv index b14ad01d668..ed4b134b81f 100644 --- a/_state.csv +++ b/_state.csv @@ -290077,7 +290077,7 @@ CVE-2025-32426,0,0,97f7719ef42c67257e2006b52ab9747f51788ff83c926fc892139743aec5a CVE-2025-32427,0,0,0416426b54022f69535fafb066a105f3453a61c3cc047d8982deab84a0710a9d,2025-04-11T15:39:52.920000 CVE-2025-32428,0,0,32eeebbb9eb52efc2ed96bd05d1eccbda5203d0361f63bfcafb88d13c22b345a,2025-04-15T18:39:27.967000 CVE-2025-3243,0,0,b05341f12b748941f8ca2dc4c2b8a53c07658570f17c96676f3c5904a6066c66,2025-04-07T14:18:15.560000 -CVE-2025-32433,0,0,966ecdd9f6bc8b95a3342cc40bbbfdb03e8b0762693461449d13455ecb6bffed,2025-04-19T02:15:13.027000 +CVE-2025-32433,0,1,c289caeadd1f888b70f82733772d9676d42fd1a51298736b3d467e81ab5fbfd7,2025-04-19T16:15:14.003000 CVE-2025-32434,0,0,60a9d0f9f62fb664481ba807b23fb0fcf5caffaccf64d81ef76109da351ead25,2025-04-18T16:15:23.183000 CVE-2025-32435,0,0,7ba8a8f054688926acb7f901f231a9b0d1f3c82a661a3919e86abb05ad5c7deb,2025-04-16T13:25:37.340000 CVE-2025-32438,0,0,296774c27c9f9d6fea06d7416f18b1b6b989b53f8f837fb0990eec395e66a9b8,2025-04-16T13:25:59.640000 @@ -290739,10 +290739,14 @@ CVE-2025-3797,0,0,dc74c58e912ecadafabc19b2658c869de58f7d56dcc527f1bfb1cbc6524b7d CVE-2025-3798,0,0,49bede486667491bd386d9371a86ace9dd4957610b395db7d0b1355696e9b2e5,2025-04-19T10:15:15.470000 CVE-2025-3799,0,0,a7ff078c0a124529743a62bee727512421125a7cf086d3f94578c1d7ab6fdb6a,2025-04-19T11:15:48.967000 CVE-2025-3800,0,0,5a8dd97821b67d356a95921757917e897c3845e23e6878e79795ab927b8af28b,2025-04-19T12:15:13.913000 -CVE-2025-3801,1,1,7e4659bb9e345c112ae3c07d5f0da59c07d8fbae9bc83379f93f2b318a87b302,2025-04-19T14:15:38.333000 -CVE-2025-3802,1,1,d682b1e71f7408fce752a1fc7a22a9dd9a29b18f8f0e273dd0c0bfb788ac652b,2025-04-19T15:15:46.073000 -CVE-2025-3803,1,1,09f179d679e1c9035d339bafa41426a95df4462858b7e2a0a230448bd9d217f2,2025-04-19T15:15:47.040000 +CVE-2025-3801,0,0,7e4659bb9e345c112ae3c07d5f0da59c07d8fbae9bc83379f93f2b318a87b302,2025-04-19T14:15:38.333000 +CVE-2025-3802,0,0,d682b1e71f7408fce752a1fc7a22a9dd9a29b18f8f0e273dd0c0bfb788ac652b,2025-04-19T15:15:46.073000 +CVE-2025-3803,0,0,09f179d679e1c9035d339bafa41426a95df4462858b7e2a0a230448bd9d217f2,2025-04-19T15:15:47.040000 +CVE-2025-3804,1,1,d85200a5c5b178f3532baf338c703baccbd3e9b56ce0ec8f7d83bb89966b3a22,2025-04-19T16:15:14.250000 CVE-2025-38049,0,0,7676e0b60d8c855a8dd99b4b359c4fa0a814b8ab512b074750cfe511fcf6fb68,2025-04-18T07:15:43.187000 +CVE-2025-3805,1,1,3c520b153f616d262f7ff7ad6d2c8e837411e2121d1dc80bceb9847404c57631,2025-04-19T16:15:14.437000 +CVE-2025-3806,1,1,c06311dd910ba7e183ab9bb9f51e135ecd067e643161fe34206cad768547d07a,2025-04-19T17:15:44.690000 +CVE-2025-3807,1,1,ca01d40879d601a40fade6771a1cbd2ab417a194b35696f344bd73ac63d66be2,2025-04-19T17:15:44.860000 CVE-2025-3809,0,0,f5fbe405d13683c6b73ef7af09c5f40188da9234689ff8ec610595967a32a1cd,2025-04-19T06:15:19.960000 CVE-2025-38104,0,0,aac46924a4c28c51faaf99f75d4c0a5d0a65a1747d000155ea8b633f4bfe56a7,2025-04-18T07:15:43.290000 CVE-2025-38152,0,0,d2296d820f7f71e71472cf853a8cba12b58f3c84c5429c1618bed2e28567d654,2025-04-18T07:15:43.403000