diff --git a/CVE-1999/CVE-1999-02xx/CVE-1999-0236.json b/CVE-1999/CVE-1999-02xx/CVE-1999-0236.json index f8291ea2380..130b7e6fcee 100644 --- a/CVE-1999/CVE-1999-02xx/CVE-1999-0236.json +++ b/CVE-1999/CVE-1999-02xx/CVE-1999-0236.json @@ -2,8 +2,8 @@ "id": "CVE-1999-0236", "sourceIdentifier": "cve@mitre.org", "published": "1997-01-01T05:00:00.000", - "lastModified": "2025-04-03T01:03:51.193", - "vulnStatus": "Deferred", + "lastModified": "2025-04-17T17:14:30.760", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -67,7 +67,7 @@ "description": [ { "lang": "en", - "value": "CWE-200" + "value": "NVD-CWE-noinfo" } ] } @@ -81,8 +81,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:apache:http_server:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D623D8C0-65D2-4269-A1D4-5CB3899F44C8" + "criteria": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0", + "matchCriteriaId": "9A453C77-BCCD-4BE2-BE55-FE5E21F9EEBF" }, { "vulnerable": true, @@ -97,11 +98,17 @@ "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0236", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0236", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2020/CVE-2020-266xx/CVE-2020-26630.json b/CVE-2020/CVE-2020-266xx/CVE-2020-26630.json index 48aa76c18d2..3b09b3d5129 100644 --- a/CVE-2020/CVE-2020-266xx/CVE-2020-26630.json +++ b/CVE-2020/CVE-2020-266xx/CVE-2020-26630.json @@ -2,7 +2,7 @@ "id": "CVE-2020-26630", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-10T09:15:43.953", - "lastModified": "2024-11-21T05:20:10.273", + "lastModified": "2025-04-17T16:15:20.770", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 } ] }, diff --git a/CVE-2020/CVE-2020-69xx/CVE-2020-6998.json b/CVE-2020/CVE-2020-69xx/CVE-2020-6998.json index 7037bdf5186..488cf7f30bb 100644 --- a/CVE-2020/CVE-2020-69xx/CVE-2020-6998.json +++ b/CVE-2020/CVE-2020-69xx/CVE-2020-6998.json @@ -2,7 +2,7 @@ "id": "CVE-2020-6998", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2022-07-27T21:15:08.297", - "lastModified": "2024-11-21T05:36:27.750", + "lastModified": "2025-04-17T16:15:21.730", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-226xx/CVE-2021-22640.json b/CVE-2021/CVE-2021-226xx/CVE-2021-22640.json index 776977bc09b..ae5d039c0fc 100644 --- a/CVE-2021/CVE-2021-226xx/CVE-2021-22640.json +++ b/CVE-2021/CVE-2021-226xx/CVE-2021-22640.json @@ -2,7 +2,7 @@ "id": "CVE-2021-22640", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2022-07-28T15:15:07.193", - "lastModified": "2024-11-21T05:50:22.060", + "lastModified": "2025-04-17T16:15:21.933", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -73,6 +73,16 @@ "value": "CWE-307" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-226xx/CVE-2021-22642.json b/CVE-2021/CVE-2021-226xx/CVE-2021-22642.json index 58df235b6c8..b7f4a723d8b 100644 --- a/CVE-2021/CVE-2021-226xx/CVE-2021-22642.json +++ b/CVE-2021/CVE-2021-226xx/CVE-2021-22642.json @@ -2,7 +2,7 @@ "id": "CVE-2021-22642", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2022-07-28T15:15:07.257", - "lastModified": "2024-11-21T05:50:22.347", + "lastModified": "2025-04-17T16:15:22.093", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-400" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-226xx/CVE-2021-22644.json b/CVE-2021/CVE-2021-226xx/CVE-2021-22644.json index 7aa9b107956..b667f07682e 100644 --- a/CVE-2021/CVE-2021-226xx/CVE-2021-22644.json +++ b/CVE-2021/CVE-2021-226xx/CVE-2021-22644.json @@ -2,7 +2,7 @@ "id": "CVE-2021-22644", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2022-07-28T15:15:07.310", - "lastModified": "2024-11-21T05:50:22.600", + "lastModified": "2025-04-17T16:15:22.230", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-798" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-321" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-226xx/CVE-2021-22646.json b/CVE-2021/CVE-2021-226xx/CVE-2021-22646.json index e8dc989e1fe..8d8cbfad2a3 100644 --- a/CVE-2021/CVE-2021-226xx/CVE-2021-22646.json +++ b/CVE-2021/CVE-2021-226xx/CVE-2021-22646.json @@ -2,7 +2,7 @@ "id": "CVE-2021-22646", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2022-07-28T15:15:07.367", - "lastModified": "2024-11-21T05:50:22.847", + "lastModified": "2025-04-17T16:15:22.370", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-226xx/CVE-2021-22648.json b/CVE-2021/CVE-2021-226xx/CVE-2021-22648.json index 0b11f4bfe8a..4d550623177 100644 --- a/CVE-2021/CVE-2021-226xx/CVE-2021-22648.json +++ b/CVE-2021/CVE-2021-226xx/CVE-2021-22648.json @@ -2,7 +2,7 @@ "id": "CVE-2021-22648", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2022-07-28T15:15:07.420", - "lastModified": "2024-11-21T05:50:23.107", + "lastModified": "2025-04-17T16:15:22.503", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-732" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-226xx/CVE-2021-22650.json b/CVE-2021/CVE-2021-226xx/CVE-2021-22650.json index cf05d8d0104..3efd6f43a0c 100644 --- a/CVE-2021/CVE-2021-226xx/CVE-2021-22650.json +++ b/CVE-2021/CVE-2021-226xx/CVE-2021-22650.json @@ -2,7 +2,7 @@ "id": "CVE-2021-22650", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2022-07-28T15:15:07.477", - "lastModified": "2024-11-21T05:50:23.373", + "lastModified": "2025-04-17T16:15:22.643", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-23" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-262xx/CVE-2021-26264.json b/CVE-2021/CVE-2021-262xx/CVE-2021-26264.json index 50fc88d4cd0..3743dee2426 100644 --- a/CVE-2021/CVE-2021-262xx/CVE-2021-26264.json +++ b/CVE-2021/CVE-2021-262xx/CVE-2021-26264.json @@ -2,7 +2,7 @@ "id": "CVE-2021-26264", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2022-01-28T20:15:10.927", - "lastModified": "2024-11-21T05:56:00.323", + "lastModified": "2025-04-17T16:15:22.780", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -94,6 +94,16 @@ "value": "CWE-306" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-274xx/CVE-2021-27493.json b/CVE-2021/CVE-2021-274xx/CVE-2021-27493.json index cd33d93fcf4..64cb1216b5b 100644 --- a/CVE-2021/CVE-2021-274xx/CVE-2021-27493.json +++ b/CVE-2021/CVE-2021-274xx/CVE-2021-27493.json @@ -2,7 +2,7 @@ "id": "CVE-2021-27493", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2022-04-01T23:15:09.207", - "lastModified": "2024-11-21T05:58:06.113", + "lastModified": "2025-04-17T16:15:22.950", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -94,6 +94,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-707" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-274xx/CVE-2021-27497.json b/CVE-2021/CVE-2021-274xx/CVE-2021-27497.json index e4e55843f8a..66b7d735d1d 100644 --- a/CVE-2021/CVE-2021-274xx/CVE-2021-27497.json +++ b/CVE-2021/CVE-2021-274xx/CVE-2021-27497.json @@ -2,7 +2,7 @@ "id": "CVE-2021-27497", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2022-04-01T23:15:09.267", - "lastModified": "2024-11-21T05:58:06.597", + "lastModified": "2025-04-17T16:15:23.113", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -94,6 +94,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-693" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-286xx/CVE-2021-28655.json b/CVE-2021/CVE-2021-286xx/CVE-2021-28655.json index d1b8db2dd16..8d69b6a0f6e 100644 --- a/CVE-2021/CVE-2021-286xx/CVE-2021-28655.json +++ b/CVE-2021/CVE-2021-286xx/CVE-2021-28655.json @@ -2,7 +2,7 @@ "id": "CVE-2021-28655", "sourceIdentifier": "security@apache.org", "published": "2022-12-16T13:15:08.723", - "lastModified": "2024-11-21T06:00:02.277", + "lastModified": "2025-04-17T16:15:23.250", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,13 +36,33 @@ }, "exploitabilityScore": 3.9, "impactScore": 2.5 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 } ] }, "weaknesses": [ { "source": "security@apache.org", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-329xx/CVE-2021-32960.json b/CVE-2021/CVE-2021-329xx/CVE-2021-32960.json index 652f8c2a5d1..04e76f959dc 100644 --- a/CVE-2021/CVE-2021-329xx/CVE-2021-32960.json +++ b/CVE-2021/CVE-2021-329xx/CVE-2021-32960.json @@ -2,7 +2,7 @@ "id": "CVE-2021-32960", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2022-04-01T23:15:09.817", - "lastModified": "2024-11-21T06:08:00.637", + "lastModified": "2025-04-17T16:15:23.433", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -94,6 +94,16 @@ "value": "CWE-863" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-693" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-345xx/CVE-2021-34527.json b/CVE-2021/CVE-2021-345xx/CVE-2021-34527.json index 9a77a1c7fee..7760446fb03 100644 --- a/CVE-2021/CVE-2021-345xx/CVE-2021-34527.json +++ b/CVE-2021/CVE-2021-345xx/CVE-2021-34527.json @@ -2,8 +2,8 @@ "id": "CVE-2021-34527", "sourceIdentifier": "secure@microsoft.com", "published": "2021-07-02T22:15:08.757", - "lastModified": "2025-04-16T16:15:18.007", - "vulnStatus": "Modified", + "lastModified": "2025-04-17T17:59:06.210", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -258,11 +258,19 @@ }, { "url": "https://www.vicarius.io/vsociety/posts/cve-2021-34527-printnightmare-detection-script", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.vicarius.io/vsociety/posts/cve-2021-34527-printnightmare-mitigation-script", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-384xx/CVE-2021-38410.json b/CVE-2021/CVE-2021-384xx/CVE-2021-38410.json index 2b1a4c63bc0..9cb454023d6 100644 --- a/CVE-2021/CVE-2021-384xx/CVE-2021-38410.json +++ b/CVE-2021/CVE-2021-384xx/CVE-2021-38410.json @@ -2,7 +2,7 @@ "id": "CVE-2021-38410", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2022-07-27T21:15:08.523", - "lastModified": "2024-11-21T06:17:01.790", + "lastModified": "2025-04-17T16:15:23.570", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-427" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-384xx/CVE-2021-38417.json b/CVE-2021/CVE-2021-384xx/CVE-2021-38417.json index dd464ea5a90..631a535845a 100644 --- a/CVE-2021/CVE-2021-384xx/CVE-2021-38417.json +++ b/CVE-2021/CVE-2021-384xx/CVE-2021-38417.json @@ -2,7 +2,7 @@ "id": "CVE-2021-38417", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2022-07-27T21:15:08.577", - "lastModified": "2024-11-21T06:17:02.813", + "lastModified": "2025-04-17T16:15:23.727", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-425xx/CVE-2021-42535.json b/CVE-2021/CVE-2021-425xx/CVE-2021-42535.json index 7b802b9c4ca..caee0839e93 100644 --- a/CVE-2021/CVE-2021-425xx/CVE-2021-42535.json +++ b/CVE-2021/CVE-2021-425xx/CVE-2021-42535.json @@ -2,7 +2,7 @@ "id": "CVE-2021-42535", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2022-07-27T21:15:08.633", - "lastModified": "2024-11-21T06:27:45.453", + "lastModified": "2025-04-17T16:15:23.857", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-425xx/CVE-2021-42537.json b/CVE-2021/CVE-2021-425xx/CVE-2021-42537.json index 9c7217a704e..e0b260fa320 100644 --- a/CVE-2021/CVE-2021-425xx/CVE-2021-42537.json +++ b/CVE-2021/CVE-2021-425xx/CVE-2021-42537.json @@ -2,7 +2,7 @@ "id": "CVE-2021-42537", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2022-07-27T21:15:08.687", - "lastModified": "2024-11-21T06:27:45.703", + "lastModified": "2025-04-17T16:15:23.990", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-611" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-444xx/CVE-2021-44463.json b/CVE-2021/CVE-2021-444xx/CVE-2021-44463.json index d79643b9ed1..1ee6f5245e5 100644 --- a/CVE-2021/CVE-2021-444xx/CVE-2021-44463.json +++ b/CVE-2021/CVE-2021-444xx/CVE-2021-44463.json @@ -2,7 +2,7 @@ "id": "CVE-2021-44463", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2022-01-28T20:15:12.137", - "lastModified": "2024-11-21T06:31:01.623", + "lastModified": "2025-04-17T16:15:24.120", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -94,6 +94,16 @@ "value": "CWE-427" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-10xx/CVE-2022-1059.json b/CVE-2022/CVE-2022-10xx/CVE-2022-1059.json index 27741ed5292..210082f55c5 100644 --- a/CVE-2022/CVE-2022-10xx/CVE-2022-1059.json +++ b/CVE-2022/CVE-2022-10xx/CVE-2022-1059.json @@ -2,7 +2,7 @@ "id": "CVE-2022-1059", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2022-10-21T16:15:10.527", - "lastModified": "2024-11-21T06:39:57.217", + "lastModified": "2025-04-17T16:15:24.267", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-10xx/CVE-2022-1066.json b/CVE-2022/CVE-2022-10xx/CVE-2022-1066.json index 0710a59290e..d17d19de806 100644 --- a/CVE-2022/CVE-2022-10xx/CVE-2022-1066.json +++ b/CVE-2022/CVE-2022-10xx/CVE-2022-1066.json @@ -2,7 +2,7 @@ "id": "CVE-2022-1066", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2022-10-21T16:15:10.597", - "lastModified": "2024-11-21T06:39:57.923", + "lastModified": "2025-04-17T16:15:24.417", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-10xx/CVE-2022-1070.json b/CVE-2022/CVE-2022-10xx/CVE-2022-1070.json index df9f752834c..68149b954fb 100644 --- a/CVE-2022/CVE-2022-10xx/CVE-2022-1070.json +++ b/CVE-2022/CVE-2022-10xx/CVE-2022-1070.json @@ -2,7 +2,7 @@ "id": "CVE-2022-1070", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2022-10-21T16:15:10.673", - "lastModified": "2024-11-21T06:39:58.407", + "lastModified": "2025-04-17T16:15:24.543", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,20 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + }, + { + "lang": "en", + "value": "CWE-306" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-264xx/CVE-2022-26423.json b/CVE-2022/CVE-2022-264xx/CVE-2022-26423.json index 335fa7a0595..6b34ceed283 100644 --- a/CVE-2022/CVE-2022-264xx/CVE-2022-26423.json +++ b/CVE-2022/CVE-2022-264xx/CVE-2022-26423.json @@ -2,7 +2,7 @@ "id": "CVE-2022-26423", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2022-10-21T16:15:10.727", - "lastModified": "2024-11-21T06:53:55.210", + "lastModified": "2025-04-17T16:15:24.677", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,20 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + }, + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-274xx/CVE-2022-27494.json b/CVE-2022/CVE-2022-274xx/CVE-2022-27494.json index 5a593cc7033..a2851cde157 100644 --- a/CVE-2022/CVE-2022-274xx/CVE-2022-27494.json +++ b/CVE-2022/CVE-2022-274xx/CVE-2022-27494.json @@ -2,7 +2,7 @@ "id": "CVE-2022-27494", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2022-10-21T16:15:10.783", - "lastModified": "2024-11-21T06:55:50.290", + "lastModified": "2025-04-17T16:15:24.810", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-386xx/CVE-2022-38659.json b/CVE-2022/CVE-2022-386xx/CVE-2022-38659.json index 39088fccf6d..05bb715e9e2 100644 --- a/CVE-2022/CVE-2022-386xx/CVE-2022-38659.json +++ b/CVE-2022/CVE-2022-386xx/CVE-2022-38659.json @@ -2,7 +2,7 @@ "id": "CVE-2022-38659", "sourceIdentifier": "psirt@hcl.com", "published": "2022-12-19T11:15:10.330", - "lastModified": "2024-11-21T07:16:52.910", + "lastModified": "2025-04-17T16:15:24.940", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-326" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-326" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-404xx/CVE-2022-40434.json b/CVE-2022/CVE-2022-404xx/CVE-2022-40434.json index 233d0ea512d..a756155fe14 100644 --- a/CVE-2022/CVE-2022-404xx/CVE-2022-40434.json +++ b/CVE-2022/CVE-2022-404xx/CVE-2022-40434.json @@ -2,7 +2,7 @@ "id": "CVE-2022-40434", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-19T22:15:11.020", - "lastModified": "2024-11-21T07:21:24.060", + "lastModified": "2025-04-17T16:15:25.137", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-425xx/CVE-2022-42544.json b/CVE-2022/CVE-2022-425xx/CVE-2022-42544.json index 979682f46ed..373b7bf3f30 100644 --- a/CVE-2022/CVE-2022-425xx/CVE-2022-42544.json +++ b/CVE-2022/CVE-2022-425xx/CVE-2022-42544.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42544", "sourceIdentifier": "security@android.com", "published": "2022-12-16T16:15:24.227", - "lastModified": "2024-11-21T07:25:10.607", + "lastModified": "2025-04-17T16:15:25.493", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-74" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-428xx/CVE-2022-42839.json b/CVE-2022/CVE-2022-428xx/CVE-2022-42839.json index f800d3522ae..90b5a262ed4 100644 --- a/CVE-2022/CVE-2022-428xx/CVE-2022-42839.json +++ b/CVE-2022/CVE-2022-428xx/CVE-2022-42839.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42839", "sourceIdentifier": "product-security@apple.com", "published": "2024-01-10T22:15:47.330", - "lastModified": "2024-11-21T07:25:26.900", + "lastModified": "2025-04-17T16:15:25.663", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-447xx/CVE-2022-44750.json b/CVE-2022/CVE-2022-447xx/CVE-2022-44750.json index 4dacd79fb90..0c334a37f0e 100644 --- a/CVE-2022/CVE-2022-447xx/CVE-2022-44750.json +++ b/CVE-2022/CVE-2022-447xx/CVE-2022-44750.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44750", "sourceIdentifier": "psirt@hcl.com", "published": "2022-12-19T11:15:10.807", - "lastModified": "2024-11-21T07:28:25.523", + "lastModified": "2025-04-17T16:15:25.840", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-447xx/CVE-2022-44752.json b/CVE-2022/CVE-2022-447xx/CVE-2022-44752.json index 160e0f12005..fae54dceebd 100644 --- a/CVE-2022/CVE-2022-447xx/CVE-2022-44752.json +++ b/CVE-2022/CVE-2022-447xx/CVE-2022-44752.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44752", "sourceIdentifier": "psirt@hcl.com", "published": "2022-12-19T11:15:10.950", - "lastModified": "2024-11-21T07:28:25.810", + "lastModified": "2025-04-17T16:15:25.970", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-447xx/CVE-2022-44754.json b/CVE-2022/CVE-2022-447xx/CVE-2022-44754.json index b7f07f02a40..df00ead5682 100644 --- a/CVE-2022/CVE-2022-447xx/CVE-2022-44754.json +++ b/CVE-2022/CVE-2022-447xx/CVE-2022-44754.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44754", "sourceIdentifier": "psirt@hcl.com", "published": "2022-12-19T11:15:11.070", - "lastModified": "2024-11-21T07:28:26.060", + "lastModified": "2025-04-17T16:15:26.100", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-468xx/CVE-2022-46870.json b/CVE-2022/CVE-2022-468xx/CVE-2022-46870.json index ef7fba66a54..52c8694efb2 100644 --- a/CVE-2022/CVE-2022-468xx/CVE-2022-46870.json +++ b/CVE-2022/CVE-2022-468xx/CVE-2022-46870.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46870", "sourceIdentifier": "security@apache.org", "published": "2022-12-16T13:15:09.103", - "lastModified": "2024-11-21T07:31:12.807", + "lastModified": "2025-04-17T16:15:26.343", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,13 +36,33 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, "weaknesses": [ { "source": "security@apache.org", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-323xx/CVE-2023-32378.json b/CVE-2023/CVE-2023-323xx/CVE-2023-32378.json index 5668fae4a16..4ac1eb5b34a 100644 --- a/CVE-2023/CVE-2023-323xx/CVE-2023-32378.json +++ b/CVE-2023/CVE-2023-323xx/CVE-2023-32378.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32378", "sourceIdentifier": "product-security@apple.com", "published": "2024-01-10T22:15:47.943", - "lastModified": "2024-11-21T08:03:14.050", + "lastModified": "2025-04-17T16:15:26.570", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42225.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42225.json index 39b34d874d5..b070ee29d27 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42225.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42225.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42225", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:10.493", - "lastModified": "2025-01-23T18:15:28.787", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T17:43:15.710", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zucchetti:helpdeskadvanced:*:*:*:*:*:*:*:*", + "versionEndIncluding": "11.0.33", + "matchCriteriaId": "A969F46B-C47E-4498-A5CD-4DE588A40741" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42226.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42226.json index 20c2771ccfa..abf546afa47 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42226.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42226.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42226", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:10.620", - "lastModified": "2025-01-23T18:15:28.997", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T17:43:43.210", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zucchetti:helpdeskadvanced:*:*:*:*:*:*:*:*", + "versionEndIncluding": "11.0.33", + "matchCriteriaId": "A969F46B-C47E-4498-A5CD-4DE588A40741" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42227.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42227.json index a9383c6ac75..f4ee487942c 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42227.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42227.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42227", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:10.770", - "lastModified": "2025-01-23T18:15:29.260", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T17:43:48.100", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zucchetti:helpdeskadvanced:*:*:*:*:*:*:*:*", + "versionEndIncluding": "11.0.33", + "matchCriteriaId": "A969F46B-C47E-4498-A5CD-4DE588A40741" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42228.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42228.json index 74b584a7f1f..6116cae9711 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42228.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42228.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42228", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:10.887", - "lastModified": "2025-01-23T18:15:29.450", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T17:43:54.063", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zucchetti:helpdeskadvanced:*:*:*:*:*:*:*:*", + "versionEndIncluding": "11.0.33", + "matchCriteriaId": "A969F46B-C47E-4498-A5CD-4DE588A40741" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42229.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42229.json index 3a0225ced12..dd29637160c 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42229.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42229.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42229", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:10.993", - "lastModified": "2025-01-23T18:15:29.657", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T17:43:58.597", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zucchetti:helpdeskadvanced:*:*:*:*:*:*:*:*", + "versionEndIncluding": "11.0.33", + "matchCriteriaId": "A969F46B-C47E-4498-A5CD-4DE588A40741" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42230.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42230.json index 1e7854bea17..ff29d7d783f 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42230.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42230.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42230", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:11.110", - "lastModified": "2025-01-14T15:15:11.633", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T17:44:01.577", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zucchetti:helpdeskadvanced:*:*:*:*:*:*:*:*", + "versionEndIncluding": "11.0.33", + "matchCriteriaId": "A969F46B-C47E-4498-A5CD-4DE588A40741" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42231.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42231.json index 414e08b5618..e77067d475a 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42231.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42231.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42231", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:11.233", - "lastModified": "2025-01-23T17:15:12.523", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T17:44:04.820", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zucchetti:helpdeskadvanced:*:*:*:*:*:*:*:*", + "versionEndIncluding": "11.0.33", + "matchCriteriaId": "A969F46B-C47E-4498-A5CD-4DE588A40741" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42232.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42232.json index cc123374880..567c2bff314 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42232.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42232.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42232", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:11.353", - "lastModified": "2025-01-23T17:15:12.693", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T17:44:08.917", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zucchetti:helpdeskadvanced:*:*:*:*:*:*:*:*", + "versionEndIncluding": "11.0.33", + "matchCriteriaId": "A969F46B-C47E-4498-A5CD-4DE588A40741" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42233.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42233.json index 03d278802b4..8309bb9a37a 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42233.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42233.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42233", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:11.480", - "lastModified": "2025-01-14T15:15:12.000", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T17:44:11.843", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zucchetti:helpdeskadvanced:*:*:*:*:*:*:*:*", + "versionEndIncluding": "11.0.33", + "matchCriteriaId": "A969F46B-C47E-4498-A5CD-4DE588A40741" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42234.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42234.json index c307407b88d..bedb644a232 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42234.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42234.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42234", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:11.593", - "lastModified": "2025-02-03T14:15:36.287", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T17:44:15.430", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zucchetti:helpdeskadvanced:*:*:*:*:*:*:*:*", + "versionEndIncluding": "11.0.33", + "matchCriteriaId": "A969F46B-C47E-4498-A5CD-4DE588A40741" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42235.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42235.json index 18fa4afe05d..34da60f4216 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42235.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42235.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42235", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:11.717", - "lastModified": "2025-01-31T19:15:15.320", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T16:35:22.003", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:seling:visual_access_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.42.2", + "matchCriteriaId": "43ECDF03-5A6A-4940-894E-AFC2BC0E0D52" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42236.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42236.json index 18015d36b18..fe75958ab5f 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42236.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42236.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42236", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:11.830", - "lastModified": "2025-01-31T19:15:15.497", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T16:35:10.180", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:seling:visual_access_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.42.2", + "matchCriteriaId": "43ECDF03-5A6A-4940-894E-AFC2BC0E0D52" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42237.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42237.json index f756d9d53f2..78033fc7ed3 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42237.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42237.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42237", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:11.953", - "lastModified": "2025-01-31T19:15:15.673", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T16:35:07.840", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:seling:visual_access_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.42.2", + "matchCriteriaId": "43ECDF03-5A6A-4940-894E-AFC2BC0E0D52" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42238.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42238.json index d32574f8f6e..1688ca26d59 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42238.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42238.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42238", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:12.080", - "lastModified": "2025-01-31T19:15:15.837", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T16:35:05.157", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:seling:visual_access_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.42.2", + "matchCriteriaId": "43ECDF03-5A6A-4940-894E-AFC2BC0E0D52" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42239.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42239.json index 24708ef5721..6efa239e732 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42239.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42239.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42239", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:12.197", - "lastModified": "2025-01-31T19:15:16.003", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T16:35:01.600", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:seling:visual_access_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.42.2", + "matchCriteriaId": "43ECDF03-5A6A-4940-894E-AFC2BC0E0D52" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42240.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42240.json index a3e2f0a46da..48efd48ddd2 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42240.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42240.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42240", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:12.327", - "lastModified": "2025-01-31T19:15:16.180", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T16:34:58.637", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:seling:visual_access_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.42.2", + "matchCriteriaId": "43ECDF03-5A6A-4940-894E-AFC2BC0E0D52" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42241.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42241.json index 75d59e215ae..c741c38c9a7 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42241.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42241.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42241", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:12.450", - "lastModified": "2025-01-31T19:15:16.347", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T16:34:55.850", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:seling:visual_access_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.42.2", + "matchCriteriaId": "43ECDF03-5A6A-4940-894E-AFC2BC0E0D52" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42242.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42242.json index bef859c40eb..1113aefc775 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42242.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42242.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42242", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:12.583", - "lastModified": "2025-01-31T19:15:16.510", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T16:34:52.450", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:seling:visual_access_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.42.2", + "matchCriteriaId": "43ECDF03-5A6A-4940-894E-AFC2BC0E0D52" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42243.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42243.json index 14de2ea1fe5..86d8ae491dc 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42243.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42243.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42243", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:12.690", - "lastModified": "2025-01-31T19:15:16.677", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T16:34:49.190", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:seling:visual_access_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.42.2", + "matchCriteriaId": "43ECDF03-5A6A-4940-894E-AFC2BC0E0D52" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42244.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42244.json index 3c9ecbb1019..a1fae89c81c 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42244.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42244.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42244", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:12.810", - "lastModified": "2025-01-14T17:15:11.847", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T16:34:45.740", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:seling:visual_access_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.42.2", + "matchCriteriaId": "43ECDF03-5A6A-4940-894E-AFC2BC0E0D52" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42245.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42245.json index b551f697701..713da0f9605 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42245.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42245.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42245", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:12.950", - "lastModified": "2025-01-14T15:15:12.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T16:34:42.030", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:seling:visual_access_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.42.2", + "matchCriteriaId": "43ECDF03-5A6A-4940-894E-AFC2BC0E0D52" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42246.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42246.json index 729f2a7d171..122d6089c36 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42246.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42246.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42246", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:13.057", - "lastModified": "2025-01-14T15:15:12.317", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T16:34:38.627", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:seling:visual_access_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.42.2", + "matchCriteriaId": "43ECDF03-5A6A-4940-894E-AFC2BC0E0D52" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42247.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42247.json index 7ddf5cbb493..647b770f3b2 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42247.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42247.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42247", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:13.177", - "lastModified": "2025-01-14T15:15:12.470", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T16:34:34.370", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:seling:visual_access_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.42.2", + "matchCriteriaId": "43ECDF03-5A6A-4940-894E-AFC2BC0E0D52" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42248.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42248.json index 93b70e93dff..1534624a84a 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42248.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42248.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42248", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:13.293", - "lastModified": "2025-01-31T17:15:11.570", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T16:34:29.350", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:seling:visual_access_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.42.2", + "matchCriteriaId": "43ECDF03-5A6A-4940-894E-AFC2BC0E0D52" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42249.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42249.json index d1a5001f4eb..44f39a70931 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42249.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42249.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42249", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:13.413", - "lastModified": "2025-01-14T15:15:12.610", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T16:34:22.640", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:seling:visual_access_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.42.2", + "matchCriteriaId": "43ECDF03-5A6A-4940-894E-AFC2BC0E0D52" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42250.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42250.json index 8cf234abafb..c25e2bb5773 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42250.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42250.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42250", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:13.557", - "lastModified": "2025-01-14T15:15:12.760", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T16:34:15.420", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:seling:visual_access_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.42.2", + "matchCriteriaId": "43ECDF03-5A6A-4940-894E-AFC2BC0E0D52" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51339.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51339.json index cb8c28aaa84..6ff5acb8af8 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51339.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51339.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51339", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-20T19:15:11.510", - "lastModified": "2025-02-21T18:15:15.993", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T17:59:04.733", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpjabbers:event_ticketing_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C2D66142-CE36-42B4-8198-4487F8604086" + } + ] + } + ] + } + ], "references": [ { "url": "https://packetstorm.news/files/id/176519", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "VDB Entry" + ] }, { "url": "https://www.phpjabbers.com/event-ticketing-system/#sectionDemo", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-519xx/CVE-2023-51959.json b/CVE-2023/CVE-2023-519xx/CVE-2023-51959.json index ddd0caa6b58..87785df66aa 100644 --- a/CVE-2023/CVE-2023-519xx/CVE-2023-51959.json +++ b/CVE-2023/CVE-2023-519xx/CVE-2023-51959.json @@ -2,7 +2,7 @@ "id": "CVE-2023-51959", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-10T15:15:09.347", - "lastModified": "2024-11-21T08:38:59.080", + "lastModified": "2025-04-17T16:15:26.863", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-519xx/CVE-2023-51962.json b/CVE-2023/CVE-2023-519xx/CVE-2023-51962.json index 4b16e83bb15..f5420db78f8 100644 --- a/CVE-2023/CVE-2023-519xx/CVE-2023-51962.json +++ b/CVE-2023/CVE-2023-519xx/CVE-2023-51962.json @@ -2,7 +2,7 @@ "id": "CVE-2023-51962", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-10T16:15:49.763", - "lastModified": "2024-11-21T08:38:59.613", + "lastModified": "2025-04-17T16:15:27.027", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-119xx/CVE-2024-11924.json b/CVE-2024/CVE-2024-119xx/CVE-2024-11924.json index 2fb2a5d4858..bfd4f3bcd49 100644 --- a/CVE-2024/CVE-2024-119xx/CVE-2024-11924.json +++ b/CVE-2024/CVE-2024-119xx/CVE-2024-11924.json @@ -2,7 +2,7 @@ "id": "CVE-2024-11924", "sourceIdentifier": "contact@wpscan.com", "published": "2025-04-17T06:15:42.460", - "lastModified": "2025-04-17T06:15:42.460", + "lastModified": "2025-04-17T16:15:27.233", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "The Icegram Express formerly known as Email Subscribers WordPress plugin before 5.7.52 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 2.5 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/70288369-132d-4211-bca0-0411736df747/", diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12530.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12530.json new file mode 100644 index 00000000000..8bcba806718 --- /dev/null +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12530.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-12530", + "sourceIdentifier": "security@opentext.com", + "published": "2025-04-17T16:15:27.360", + "lastModified": "2025-04-17T16:15:27.360", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled Search Path Element vulnerability in OpenText Secure Content Manager on Windows allows DLL Side-Loading.This issue affects Secure Content Manager: 23.4.\n\nEnd-users can potentially exploit the vulnerability to execute malicious code in the trusted context of the thick-client application." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@opentext.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security@opentext.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://portal.microfocus.com/s/article/KM000040073?", + "source": "security@opentext.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20010.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20010.json index 54d61490c00..84a832e8685 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20010.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20010.json @@ -2,7 +2,7 @@ "id": "CVE-2024-20010", "sourceIdentifier": "security@mediatek.com", "published": "2024-02-05T06:15:47.387", - "lastModified": "2024-11-21T08:51:47.437", + "lastModified": "2025-04-17T16:15:27.490", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-843" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25517.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25517.json index d09a20058d4..d374a3391bb 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25517.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25517.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25517", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-08T15:15:07.843", - "lastModified": "2024-11-21T09:00:54.813", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T17:20:09.337", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ruvar:ruvaroa:6.01:*:*:*:*:*:*:*", + "matchCriteriaId": "0B7DDA46-A76B-462C-BB1E-41C2BB7082FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ruvar:ruvaroa:12.01:*:*:*:*:*:*:*", + "matchCriteriaId": "36982980-5612-4BC6-AA7D-BFB4AAA713F8" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#mfaspx", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#mfaspx", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25518.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25518.json index 6c4ef7323a2..df8f52a878f 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25518.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25518.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25518", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-08T15:15:07.903", - "lastModified": "2024-11-21T09:00:55.037", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T17:20:04.510", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ruvar:ruvaroa:6.01:*:*:*:*:*:*:*", + "matchCriteriaId": "0B7DDA46-A76B-462C-BB1E-41C2BB7082FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ruvar:ruvaroa:12.01:*:*:*:*:*:*:*", + "matchCriteriaId": "36982980-5612-4BC6-AA7D-BFB4AAA713F8" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_get_fields_approveaspx", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_get_fields_approveaspx", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25519.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25519.json index c56ccaf62c0..b0df5210f0b 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25519.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25519.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25519", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-08T15:15:07.960", - "lastModified": "2024-11-21T09:00:55.263", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T17:20:01.370", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ruvar:ruvaroa:6.01:*:*:*:*:*:*:*", + "matchCriteriaId": "0B7DDA46-A76B-462C-BB1E-41C2BB7082FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ruvar:ruvaroa:12.01:*:*:*:*:*:*:*", + "matchCriteriaId": "36982980-5612-4BC6-AA7D-BFB4AAA713F8" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_work_printaspx", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_work_printaspx", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25520.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25520.json index 23642737481..30239a16e0e 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25520.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25520.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25520", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-08T15:15:08.017", - "lastModified": "2024-11-21T09:00:55.510", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T17:19:58.233", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ruvar:ruvaroa:6.01:*:*:*:*:*:*:*", + "matchCriteriaId": "0B7DDA46-A76B-462C-BB1E-41C2BB7082FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ruvar:ruvaroa:12.01:*:*:*:*:*:*:*", + "matchCriteriaId": "36982980-5612-4BC6-AA7D-BFB4AAA713F8" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#sys_blogtemplate_newaspx", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#sys_blogtemplate_newaspx", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25521.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25521.json index 30afea2728c..588b1fc86f7 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25521.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25521.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25521", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-08T15:15:08.073", - "lastModified": "2024-11-21T09:00:55.743", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T17:19:53.447", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ruvar:ruvaroa:6.01:*:*:*:*:*:*:*", + "matchCriteriaId": "0B7DDA46-A76B-462C-BB1E-41C2BB7082FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ruvar:ruvaroa:12.01:*:*:*:*:*:*:*", + "matchCriteriaId": "36982980-5612-4BC6-AA7D-BFB4AAA713F8" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#get_companyaspx", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#get_companyaspx", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25522.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25522.json index e57fbca24c4..8be9df66359 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25522.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25522.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25522", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-08T15:15:08.130", - "lastModified": "2024-11-21T09:00:55.970", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T17:19:48.983", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ruvar:ruvaroa:6.01:*:*:*:*:*:*:*", + "matchCriteriaId": "0B7DDA46-A76B-462C-BB1E-41C2BB7082FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ruvar:ruvaroa:12.01:*:*:*:*:*:*:*", + "matchCriteriaId": "36982980-5612-4BC6-AA7D-BFB4AAA713F8" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_work_form_saveaspx", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_work_form_saveaspx", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25523.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25523.json index 97959c4b175..10b0fceb149 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25523.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25523.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25523", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-08T15:15:08.183", - "lastModified": "2024-11-21T09:00:56.200", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T17:19:45.957", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ruvar:ruvaroa:6.01:*:*:*:*:*:*:*", + "matchCriteriaId": "0B7DDA46-A76B-462C-BB1E-41C2BB7082FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ruvar:ruvaroa:12.01:*:*:*:*:*:*:*", + "matchCriteriaId": "36982980-5612-4BC6-AA7D-BFB4AAA713F8" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#file_memoaspx", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#file_memoaspx", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25524.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25524.json index cb78b99854b..56911e65ee5 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25524.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25524.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25524", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-08T15:15:08.253", - "lastModified": "2024-11-21T09:00:56.413", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T17:19:41.527", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ruvar:ruvaroa:6.01:*:*:*:*:*:*:*", + "matchCriteriaId": "0B7DDA46-A76B-462C-BB1E-41C2BB7082FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ruvar:ruvaroa:12.01:*:*:*:*:*:*:*", + "matchCriteriaId": "36982980-5612-4BC6-AA7D-BFB4AAA713F8" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#workplanattachdownloadaspx", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#workplanattachdownloadaspx", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25525.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25525.json index 470b36d16d6..d779d3fd86e 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25525.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25525.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25525", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-08T15:15:08.310", - "lastModified": "2024-11-21T09:00:56.637", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T17:19:08.510", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ruvar:ruvaroa:6.01:*:*:*:*:*:*:*", + "matchCriteriaId": "0B7DDA46-A76B-462C-BB1E-41C2BB7082FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ruvar:ruvaroa:12.01:*:*:*:*:*:*:*", + "matchCriteriaId": "36982980-5612-4BC6-AA7D-BFB4AAA713F8" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#officefiledownloadaspx", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#officefiledownloadaspx", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25526.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25526.json index 13c974b3043..54251457510 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25526.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25526.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25526", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-08T15:15:08.367", - "lastModified": "2024-11-21T09:00:56.860", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T17:19:03.610", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ruvar:ruvaroa:6.01:*:*:*:*:*:*:*", + "matchCriteriaId": "0B7DDA46-A76B-462C-BB1E-41C2BB7082FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ruvar:ruvaroa:12.01:*:*:*:*:*:*:*", + "matchCriteriaId": "36982980-5612-4BC6-AA7D-BFB4AAA713F8" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#pm_gatt_incaspx", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#pm_gatt_incaspx", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25527.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25527.json index adfc7472307..80dfeb3064f 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25527.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25527.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25527", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-08T16:15:08.503", - "lastModified": "2025-03-13T19:15:43.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T17:18:59.457", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ruvar:ruvaroa:6.01:*:*:*:*:*:*:*", + "matchCriteriaId": "0B7DDA46-A76B-462C-BB1E-41C2BB7082FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ruvar:ruvaroa:12.01:*:*:*:*:*:*:*", + "matchCriteriaId": "36982980-5612-4BC6-AA7D-BFB4AAA713F8" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#worklog_template_showaspx", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#worklog_template_showaspx", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25528.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25528.json index a9912300b5c..3500821983e 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25528.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25528.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25528", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-08T17:15:07.513", - "lastModified": "2024-11-21T09:00:57.247", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T17:18:09.550", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ruvar:ruvaroa:6.01:*:*:*:*:*:*:*", + "matchCriteriaId": "0B7DDA46-A76B-462C-BB1E-41C2BB7082FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ruvar:ruvaroa:12.01:*:*:*:*:*:*:*", + "matchCriteriaId": "36982980-5612-4BC6-AA7D-BFB4AAA713F8" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_work_stat_settingaspx", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_work_stat_settingaspx", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25529.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25529.json index 0f8b9d58a84..bd4e2bb18db 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25529.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25529.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25529", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-08T16:15:08.570", - "lastModified": "2024-11-21T09:00:57.463", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T17:18:30.693", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ruvar:ruvaroa:6.01:*:*:*:*:*:*:*", + "matchCriteriaId": "0B7DDA46-A76B-462C-BB1E-41C2BB7082FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ruvar:ruvaroa:12.01:*:*:*:*:*:*:*", + "matchCriteriaId": "36982980-5612-4BC6-AA7D-BFB4AAA713F8" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_office_file_history_showaspx", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_office_file_history_showaspx", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25530.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25530.json index 1a6a26feb15..2636d59942e 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25530.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25530.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25530", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-08T16:15:08.623", - "lastModified": "2024-11-21T09:00:57.667", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T17:18:25.180", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ruvar:ruvaroa:6.01:*:*:*:*:*:*:*", + "matchCriteriaId": "0B7DDA46-A76B-462C-BB1E-41C2BB7082FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ruvar:ruvaroa:12.01:*:*:*:*:*:*:*", + "matchCriteriaId": "36982980-5612-4BC6-AA7D-BFB4AAA713F8" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#get_find_condictionaspx", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#get_find_condictionaspx", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25531.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25531.json index 2114abf4c60..5f9a0a470e5 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25531.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25531.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25531", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-08T16:15:08.680", - "lastModified": "2024-11-21T09:00:57.887", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T17:18:14.947", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ruvar:ruvaroa:6.01:*:*:*:*:*:*:*", + "matchCriteriaId": "0B7DDA46-A76B-462C-BB1E-41C2BB7082FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ruvar:ruvaroa:12.01:*:*:*:*:*:*:*", + "matchCriteriaId": "36982980-5612-4BC6-AA7D-BFB4AAA713F8" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#searchcondictionaspx", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#searchcondictionaspx", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25532.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25532.json index d41535ad449..1e690d39cff 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25532.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25532.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25532", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-08T17:15:07.567", - "lastModified": "2024-11-21T09:00:58.100", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T17:18:02.440", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ruvar:ruvaroa:6.01:*:*:*:*:*:*:*", + "matchCriteriaId": "0B7DDA46-A76B-462C-BB1E-41C2BB7082FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ruvar:ruvaroa:12.01:*:*:*:*:*:*:*", + "matchCriteriaId": "36982980-5612-4BC6-AA7D-BFB4AAA713F8" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#get_dictaspx", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#get_dictaspx", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25533.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25533.json index 1d9292e849f..dec790b67a6 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25533.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25533.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25533", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-08T17:15:07.620", - "lastModified": "2024-11-21T09:00:58.313", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T17:17:52.013", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ruvar:ruvaroa:6.01:*:*:*:*:*:*:*", + "matchCriteriaId": "0B7DDA46-A76B-462C-BB1E-41C2BB7082FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ruvar:ruvaroa:12.01:*:*:*:*:*:*:*", + "matchCriteriaId": "36982980-5612-4BC6-AA7D-BFB4AAA713F8" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#information-leakage-and-unauthorized-access-to-sensitive-data", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#information-leakage-and-unauthorized-access-to-sensitive-data", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-401xx/CVE-2024-40124.json b/CVE-2024/CVE-2024-401xx/CVE-2024-40124.json new file mode 100644 index 00000000000..b03c3df3337 --- /dev/null +++ b/CVE-2024/CVE-2024-401xx/CVE-2024-40124.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-40124", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-17T17:15:31.853", + "lastModified": "2025-04-17T17:15:31.853", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Pydio Core <= 8.2.5 is vulnerable to Cross Site Scripting (XSS) via the New URL Bookmark feature." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/Xib3rR4dAr/711195d5793bfbb4364dc179ecaae25d", + "source": "cve@mitre.org" + }, + { + "url": "https://pydio.com/en/community/releases/pydio-core/pydio-core-pydio-enterprise-825-hotfix-824", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41049.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41049.json index 2bfa3b1d6e9..19c6477e3d1 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41049.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41049.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41049", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-29T15:15:13.177", - "lastModified": "2024-11-21T09:32:08.363", - "vulnStatus": "Modified", + "lastModified": "2025-04-17T17:33:03.630", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -22,11 +22,11 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 7.8, + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.0, "baseSeverity": "HIGH", "attackVector": "LOCAL", - "attackComplexity": "LOW", + "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", @@ -34,7 +34,7 @@ "integrityImpact": "HIGH", "availabilityImpact": "HIGH" }, - "exploitabilityScore": 1.8, + "exploitabilityScore": 1.0, "impactScore": 5.9 } ] diff --git a/CVE-2024/CVE-2024-420xx/CVE-2024-42094.json b/CVE-2024/CVE-2024-420xx/CVE-2024-42094.json index 4b22c9f80c7..4f38f7925ec 100644 --- a/CVE-2024/CVE-2024-420xx/CVE-2024-42094.json +++ b/CVE-2024/CVE-2024-420xx/CVE-2024-42094.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42094", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-29T18:15:11.917", - "lastModified": "2024-11-21T09:33:35.180", - "vulnStatus": "Modified", + "lastModified": "2025-04-17T16:56:56.417", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -22,8 +22,8 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 7.8, + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 7.1, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", @@ -31,11 +31,11 @@ "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", + "integrityImpact": "NONE", "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, - "impactScore": 5.9 + "impactScore": 5.2 } ] }, diff --git a/CVE-2024/CVE-2024-421xx/CVE-2024-42108.json b/CVE-2024/CVE-2024-421xx/CVE-2024-42108.json index 645995ad24f..d38e6d88627 100644 --- a/CVE-2024/CVE-2024-421xx/CVE-2024-42108.json +++ b/CVE-2024/CVE-2024-421xx/CVE-2024-42108.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42108", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-30T08:15:03.333", - "lastModified": "2024-12-19T19:15:07.023", - "vulnStatus": "Modified", + "lastModified": "2025-04-17T16:56:53.877", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -22,20 +22,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 7.8, - "baseSeverity": "HIGH", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, - "impactScore": 5.9 + "impactScore": 3.6 } ] }, @@ -73,7 +73,10 @@ "references": [ { "url": "https://git.kernel.org/stable/c/4a41bb9f2b402469d425a1c13359d3b3ea4e6403", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/92cbbe7759193e3418f38d0d73f8fe125312c58b", diff --git a/CVE-2024/CVE-2024-552xx/CVE-2024-55238.json b/CVE-2024/CVE-2024-552xx/CVE-2024-55238.json new file mode 100644 index 00000000000..a127f1b55a9 --- /dev/null +++ b/CVE-2024/CVE-2024-552xx/CVE-2024-55238.json @@ -0,0 +1,52 @@ +{ + "id": "CVE-2024-55238", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-17T16:15:27.780", + "lastModified": "2025-04-17T16:15:27.780", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "OpenMetadata <=1.4.1 is vulnerable to SQL Injection. An attacker can extract information from the database in function listCount in the WorkflowDAO interface. The workflowtype and status parameters can be used to build a SQL query." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.2 + } + ] + }, + "references": [ + { + "url": "https://gist.github.com/javadk/68c597cdb94768dab31a3219c2ad9904", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/open-metadata/OpenMetadata/blob/98945cb2db87ebb325d3a72131f049abffcba345/openmetadata-service/src/main/java/org/openmetadata/service/jdbi3/CollectionDAO.java#L4243", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/open-metadata/OpenMetadata/blob/98945cb2db87ebb325d3a72131f049abffcba345/openmetadata-service/src/main/java/org/openmetadata/service/jdbi3/CollectionDAO.java#L4247", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-565xx/CVE-2024-56518.json b/CVE-2024/CVE-2024-565xx/CVE-2024-56518.json new file mode 100644 index 00000000000..1e902ccdbf9 --- /dev/null +++ b/CVE-2024/CVE-2024-565xx/CVE-2024-56518.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-56518", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-17T16:15:27.900", + "lastModified": "2025-04-17T16:15:27.900", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Hazelcast Management Center through 6.0 allows remote code execution via a JndiLoginModule user.provider.url in a hazelcast-client XML document (aka a client configuration file), which can be uploaded at the /cluster-connections URI." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://docs.hazelcast.com/management-center/6.0-snapshot/getting-started/install", + "source": "cve@mitre.org" + }, + { + "url": "https://gist.github.com/azraelxuemo/c3d42739aa3306a41111ef603dc65b4c", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57635.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57635.json index 0ca6575ecc7..ccf5202a196 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57635.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57635.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57635", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T01:15:12.047", - "lastModified": "2025-01-14T16:15:33.743", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T16:47:59.290", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*", + "matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/openlink/virtuoso-opensource/issues/1182", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57636.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57636.json index 685cd51c33d..4a50ae42862 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57636.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57636.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57636", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T01:15:12.167", - "lastModified": "2025-01-14T16:15:33.907", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T16:47:56.287", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*", + "matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/openlink/virtuoso-opensource/issues/1194", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57637.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57637.json index 4e2c06232f2..b62bd69f8d4 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57637.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57637.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57637", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T01:15:12.280", - "lastModified": "2025-01-14T16:15:34.070", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T16:47:53.007", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*", + "matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/openlink/virtuoso-opensource/issues/1192", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57638.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57638.json index 5c2e4bcb1a3..24a8d533038 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57638.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57638.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57638", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T01:15:12.390", - "lastModified": "2025-01-15T16:15:30.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T16:47:50.117", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*", + "matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/openlink/virtuoso-opensource/issues/1190", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57639.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57639.json index afb50381ba7..09214a5ae76 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57639.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57639.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57639", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T01:15:12.517", - "lastModified": "2025-01-15T16:15:30.393", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T16:47:46.833", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*", + "matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/openlink/virtuoso-opensource/issues/1185", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57640.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57640.json index bb1b683190e..d3b010fcaf0 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57640.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57640.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57640", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T01:15:12.627", - "lastModified": "2025-01-15T16:15:30.570", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T16:47:43.887", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*", + "matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/openlink/virtuoso-opensource/issues/1184", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57641.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57641.json index de5ed61e3a6..334fade8918 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57641.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57641.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57641", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T01:15:12.740", - "lastModified": "2025-01-15T16:15:30.750", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T16:47:41.460", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*", + "matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/openlink/virtuoso-opensource/issues/1183", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57642.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57642.json index f8c36b8c1ae..2985950a558 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57642.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57642.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57642", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T01:15:12.873", - "lastModified": "2025-01-17T18:15:30.030", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T16:47:38.257", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*", + "matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/openlink/virtuoso-opensource/issues/1191", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57643.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57643.json index 2e4a224bd74..dbc151747b2 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57643.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57643.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57643", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T01:15:12.980", - "lastModified": "2025-01-16T16:15:34.030", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T16:47:34.500", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*", + "matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/openlink/virtuoso-opensource/issues/1181", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57644.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57644.json index b930d82cae6..0a40f75ae7c 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57644.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57644.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57644", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T01:15:13.090", - "lastModified": "2025-01-15T16:15:30.943", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T16:47:28.370", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*", + "matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/openlink/virtuoso-opensource/issues/1193", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57645.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57645.json index 14c0025c6c6..0293b469951 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57645.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57645.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57645", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T01:15:13.200", - "lastModified": "2025-01-15T16:15:31.120", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T16:47:25.190", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*", + "matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/openlink/virtuoso-opensource/issues/1197", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57646.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57646.json index 9bd04088536..135cc4451ee 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57646.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57646.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57646", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T01:15:13.303", - "lastModified": "2025-01-15T16:15:31.293", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T16:47:22.387", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*", + "matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/openlink/virtuoso-opensource/issues/1199", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57647.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57647.json index 845bc7fbd2e..5d9a1ed2d1b 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57647.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57647.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57647", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T01:15:13.420", - "lastModified": "2025-01-15T16:15:31.473", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T16:47:19.220", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*", + "matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/openlink/virtuoso-opensource/issues/1207", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57648.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57648.json index 7afb57f2999..b7c166491dd 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57648.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57648.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57648", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T01:15:13.537", - "lastModified": "2025-01-15T16:15:31.640", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T16:47:16.813", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*", + "matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/openlink/virtuoso-opensource/issues/1195", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57649.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57649.json index 444e6c77091..7f36a7cfcc5 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57649.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57649.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57649", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T01:15:13.653", - "lastModified": "2025-01-15T16:15:31.813", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T16:47:14.280", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*", + "matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/openlink/virtuoso-opensource/issues/1206", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57650.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57650.json index 5b29373082e..69b082a769e 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57650.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57650.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57650", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T01:15:13.770", - "lastModified": "2025-01-15T16:15:31.993", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T16:47:11.903", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*", + "matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/openlink/virtuoso-opensource/issues/1204", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57651.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57651.json index 5f5d25a9b8e..910307eab85 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57651.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57651.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57651", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T01:15:13.890", - "lastModified": "2025-01-15T15:15:12.963", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T16:47:08.997", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*", + "matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/openlink/virtuoso-opensource/issues/1196", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57652.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57652.json index 1e49e38ca5d..efa38e25017 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57652.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57652.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57652", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T01:15:13.993", - "lastModified": "2025-01-15T15:15:13.130", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T16:47:05.030", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*", + "matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/openlink/virtuoso-opensource/issues/1198", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57653.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57653.json index 5d58117a88c..7940df76b10 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57653.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57653.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57653", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T01:15:14.100", - "lastModified": "2025-03-24T16:15:20.860", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T16:47:02.293", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*", + "matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/openlink/virtuoso-opensource/issues/1208", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57654.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57654.json index 21e398fbfa7..4c18fc94ab1 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57654.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57654.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57654", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T01:15:14.217", - "lastModified": "2025-01-14T17:15:20.233", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T16:46:58.967", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*", + "matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/openlink/virtuoso-opensource/issues/1205", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57655.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57655.json index f682f277a50..80096b12024 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57655.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57655.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57655", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T01:15:14.317", - "lastModified": "2025-03-18T19:15:47.213", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T16:46:19.117", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*", + "matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/openlink/virtuoso-opensource/issues/1216", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57656.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57656.json index 9fc4b84cc4f..882b699e8c4 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57656.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57656.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57656", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T01:15:14.417", - "lastModified": "2025-03-22T15:15:37.953", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T16:46:15.067", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*", + "matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/openlink/virtuoso-opensource/issues/1210", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57657.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57657.json index 40e66d0bbca..730a6fe1e72 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57657.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57657.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57657", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T01:15:14.530", - "lastModified": "2025-03-19T15:15:53.050", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T16:46:10.137", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*", + "matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/openlink/virtuoso-opensource/issues/1219", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57658.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57658.json index 7d7ee541a67..10eab3b89f0 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57658.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57658.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57658", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T01:15:14.650", - "lastModified": "2025-03-24T16:15:21.047", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T16:46:04.427", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*", + "matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/openlink/virtuoso-opensource/issues/1209", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57659.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57659.json index 775140ed6cf..ff633d9a1af 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57659.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57659.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57659", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T01:15:14.757", - "lastModified": "2025-01-15T15:15:13.450", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-17T16:45:57.270", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*", + "matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/openlink/virtuoso-opensource/issues/1212", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-15xx/CVE-2025-1566.json b/CVE-2025/CVE-2025-15xx/CVE-2025-1566.json index 0c7051c4b5c..a495481a130 100644 --- a/CVE-2025/CVE-2025-15xx/CVE-2025-1566.json +++ b/CVE-2025/CVE-2025-15xx/CVE-2025-1566.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1566", "sourceIdentifier": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f", "published": "2025-04-16T23:15:44.767", - "lastModified": "2025-04-16T23:15:44.767", + "lastModified": "2025-04-17T16:15:28.040", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "DNS Leak in Native System VPN in Google ChromeOS Dev Channel on ChromeOS 129.0.6668.36 allows network observers to expose plaintext DNS queries via failure to properly tunnel DNS traffic during VPN state transitions." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1319" + } + ] + } + ], "references": [ { "url": "https://issues.chromium.org/issues/b/342802975", diff --git a/CVE-2025/CVE-2025-15xx/CVE-2025-1568.json b/CVE-2025/CVE-2025-15xx/CVE-2025-1568.json index d5f1a13e045..0aef0962ffd 100644 --- a/CVE-2025/CVE-2025-15xx/CVE-2025-1568.json +++ b/CVE-2025/CVE-2025-15xx/CVE-2025-1568.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1568", "sourceIdentifier": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f", "published": "2025-04-16T23:15:44.853", - "lastModified": "2025-04-17T14:15:27.047", + "lastModified": "2025-04-17T16:15:28.170", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -18,19 +18,19 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 9.8, - "baseSeverity": "CRITICAL", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH" }, - "exploitabilityScore": 3.9, + "exploitabilityScore": 2.8, "impactScore": 5.9 } ] @@ -42,7 +42,7 @@ "description": [ { "lang": "en", - "value": "CWE-94" + "value": "CWE-284" } ] } diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1704.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1704.json index 364eb5281f4..98a174ee54b 100644 --- a/CVE-2025/CVE-2025-17xx/CVE-2025-1704.json +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1704.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1704", "sourceIdentifier": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f", "published": "2025-04-16T23:15:44.937", - "lastModified": "2025-04-17T14:15:27.207", + "lastModified": "2025-04-17T16:15:28.297", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -18,20 +18,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 9.8, - "baseSeverity": "CRITICAL", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", "availabilityImpact": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 5.9 + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2073.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2073.json index e5d5178f136..1044d76c7d2 100644 --- a/CVE-2025/CVE-2025-20xx/CVE-2025-2073.json +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2073.json @@ -2,7 +2,7 @@ "id": "CVE-2025-2073", "sourceIdentifier": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f", "published": "2025-04-16T23:15:45.610", - "lastModified": "2025-04-17T14:15:29.013", + "lastModified": "2025-04-17T16:15:38.750", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -18,20 +18,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", - "baseScore": 9.1, - "baseSeverity": "CRITICAL", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", - "integrityImpact": "NONE", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 5.2 + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22340.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22340.json new file mode 100644 index 00000000000..626b3cb50d2 --- /dev/null +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22340.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-22340", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:28.433", + "lastModified": "2025-04-17T16:15:28.433", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Think201 Data Dash allows Stored XSS. This issue affects Data Dash: from n/a through 1.2.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/data-dash/vulnerability/wordpress-data-dash-plugin-1-2-3-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22565.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22565.json new file mode 100644 index 00000000000..f49423993d2 --- /dev/null +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22565.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-22565", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:28.580", + "lastModified": "2025-04-17T16:15:28.580", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Bill Zimmerman vooPlayer v4 allows Reflected XSS. This issue affects vooPlayer v4: from n/a through 4.0.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/vooplayer/vulnerability/wordpress-vooplayer-v4-plugin-4-0-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22636.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22636.json new file mode 100644 index 00000000000..9271818c7c7 --- /dev/null +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22636.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-22636", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:28.727", + "lastModified": "2025-04-17T16:15:28.727", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Vicente Ruiz G\u00e1lvez VR-Frases allows Reflected XSS. This issue affects VR-Frases: from n/a through 3.0.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:L", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/vr-frases/vulnerability/wordpress-vr-frases-plugin-3-0-1-reflected-xss-to-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22651.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22651.json new file mode 100644 index 00000000000..4d4c4c60faf --- /dev/null +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22651.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-22651", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:28.867", + "lastModified": "2025-04-17T16:15:28.867", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wppluginboxdev Stylish Google Sheet Reader allows Reflected XSS. This issue affects Stylish Google Sheet Reader: from n/a through 4.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/stylish-google-sheet-reader/vulnerability/wordpress-stylish-google-sheet-reader-plugin-4-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22655.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22655.json new file mode 100644 index 00000000000..019ef224e15 --- /dev/null +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22655.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-22655", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:29.010", + "lastModified": "2025-04-17T16:15:29.010", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Caio Web Dev CWD \u2013 Stealth Links allows SQL Injection. This issue affects CWD \u2013 Stealth Links: from n/a through 1.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/cwd-stealth-links/vulnerability/wordpress-cwd-stealth-links-plugin-1-3-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22692.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22692.json new file mode 100644 index 00000000000..10e6159c144 --- /dev/null +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22692.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-22692", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:29.153", + "lastModified": "2025-04-17T16:15:29.153", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in rachanaS Sponsered Link allows Reflected XSS. This issue affects Sponsered Link: from n/a through 4.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/sponsered-link/vulnerability/wordpress-sponsered-link-plugin-4-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22771.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22771.json new file mode 100644 index 00000000000..c1d1420a9ad --- /dev/null +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22771.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-22771", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:29.297", + "lastModified": "2025-04-17T16:15:29.297", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Studio Hyperset The Great Firewords of China allows Stored XSS. This issue affects The Great Firewords of China: from n/a through 1.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/sensitive-chinese-words-scanner/vulnerability/wordpress-the-great-firewords-of-china-plugin-1-2-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22774.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22774.json new file mode 100644 index 00000000000..64a71860e8e --- /dev/null +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22774.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-22774", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:29.437", + "lastModified": "2025-04-17T16:15:29.437", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CRUDLab CRUDLab Scroll to Top allows Reflected XSS. This issue affects CRUDLab Scroll to Top: from n/a through 1.0.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/crudlab-scroll-to-top/vulnerability/wordpress-crudlab-scroll-to-top-plugin-1-0-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22796.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22796.json new file mode 100644 index 00000000000..74405254935 --- /dev/null +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22796.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-22796", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:29.577", + "lastModified": "2025-04-17T16:15:29.577", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in platcom WP-Asambleas allows Reflected XSS. This issue affects WP-Asambleas: from n/a through 2.85.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-asambleas/vulnerability/wordpress-wp-asambleas-plugin-2-85-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23007.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23007.json index d4ce6e542ba..1b31f6d7944 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23007.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23007.json @@ -2,7 +2,7 @@ "id": "CVE-2025-23007", "sourceIdentifier": "PSIRT@sonicwall.com", "published": "2025-01-30T10:15:09.283", - "lastModified": "2025-03-20T14:15:23.570", + "lastModified": "2025-04-17T16:15:29.720", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -22,20 +22,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 7.8, - "baseSeverity": "HIGH", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" + "integrityImpact": "NONE", + "availabilityImpact": "NONE" }, "exploitabilityScore": 1.8, - "impactScore": 5.9 + "impactScore": 3.6 } ] }, diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23009.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23009.json index d1151cd8f01..d569efaf8f7 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23009.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23009.json @@ -2,7 +2,7 @@ "id": "CVE-2025-23009", "sourceIdentifier": "PSIRT@sonicwall.com", "published": "2025-04-10T19:16:00.743", - "lastModified": "2025-04-11T15:39:52.920", + "lastModified": "2025-04-17T16:15:29.877", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -22,27 +22,27 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N", - "baseScore": 5.9, - "baseSeverity": "MEDIUM", - "attackVector": "LOCAL", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "PHYSICAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", - "confidentialityImpact": "NONE", + "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "NONE" + "availabilityImpact": "HIGH" }, - "exploitabilityScore": 1.5, - "impactScore": 4.0 + "exploitabilityScore": 0.5, + "impactScore": 6.0 } ] }, "weaknesses": [ { "source": "PSIRT@sonicwall.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23010.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23010.json index 5af63255ce5..573f8cb89a3 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23010.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23010.json @@ -2,7 +2,7 @@ "id": "CVE-2025-23010", "sourceIdentifier": "PSIRT@sonicwall.com", "published": "2025-04-10T19:16:00.933", - "lastModified": "2025-04-11T15:39:52.920", + "lastModified": "2025-04-17T16:15:30.047", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -22,20 +22,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", - "baseScore": 6.5, - "baseSeverity": "MEDIUM", - "attackVector": "LOCAL", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "PHYSICAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", - "userInteraction": "NONE", + "userInteraction": "REQUIRED", "scope": "CHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH" }, - "exploitabilityScore": 2.0, - "impactScore": 4.0 + "exploitabilityScore": 0.5, + "impactScore": 6.0 } ] }, diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23443.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23443.json new file mode 100644 index 00000000000..b4d7fada2e5 --- /dev/null +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23443.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23443", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:30.223", + "lastModified": "2025-04-17T16:15:30.223", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Claire Ryan Author Showcase allows Reflected XSS. This issue affects Author Showcase: from n/a through 1.4.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/author-showcase/vulnerability/wordpress-author-showcase-plugin-1-4-3-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23448.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23448.json new file mode 100644 index 00000000000..d532cf53f57 --- /dev/null +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23448.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23448", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:30.357", + "lastModified": "2025-04-17T16:15:30.357", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in dastan800 visualslider Sldier allows Reflected XSS. This issue affects visualslider Sldier: from n/a through 1.1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/visual-slider/vulnerability/wordpress-visualslider-sldier-plugin-1-1-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23773.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23773.json new file mode 100644 index 00000000000..eb2616d3318 --- /dev/null +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23773.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23773", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:30.493", + "lastModified": "2025-04-17T16:15:30.493", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in mingocommerce Delete All Posts allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Delete All Posts: from n/a through 1.1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/delele-all/vulnerability/wordpress-delete-all-posts-plugin-1-1-1-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23782.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23782.json new file mode 100644 index 00000000000..dfbfc9ac968 --- /dev/null +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23782.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23782", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:30.620", + "lastModified": "2025-04-17T16:15:30.620", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in TotalSuite TotalContest Lite allows Reflected XSS. This issue affects TotalContest Lite: from n/a through 2.8.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/totalcontest-lite/vulnerability/wordpress-totalcontest-lite-plugin-2-8-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23855.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23855.json new file mode 100644 index 00000000000..660a300cb24 --- /dev/null +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23855.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23855", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:30.773", + "lastModified": "2025-04-17T16:15:30.773", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in fyljp SpiderDisplay allows Reflected XSS. This issue affects SpiderDisplay: from n/a through 1.9.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/spiderdisplay/vulnerability/wordpress-spiderdisplay-plugin-1-9-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23858.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23858.json new file mode 100644 index 00000000000..1e458fd31d4 --- /dev/null +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23858.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23858", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:30.917", + "lastModified": "2025-04-17T16:15:30.917", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Hiren Patel Custom Users Order allows Reflected XSS. This issue affects Custom Users Order: from n/a through 4.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/custom-users-order/vulnerability/wordpress-custom-users-order-plugin-4-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23906.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23906.json new file mode 100644 index 00000000000..0f173dde05a --- /dev/null +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23906.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23906", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:31.040", + "lastModified": "2025-04-17T16:15:31.040", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in wpseek WordPress Dashboard Tweeter allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WordPress Dashboard Tweeter: from n/a through 1.3.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wordpress-dashboard-twitter/vulnerability/wordpress-wordpress-dashboard-tweeter-plugin-1-3-2-settings-change-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23958.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23958.json new file mode 100644 index 00000000000..980f1898c81 --- /dev/null +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23958.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23958", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:31.170", + "lastModified": "2025-04-17T16:15:31.170", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in FADI MED Editor Wysiwyg Background Color allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Editor Wysiwyg Background Color: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/editor-wysiwyg-background-color/vulnerability/wordpress-editor-wysiwyg-background-color-plugin-1-0-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24406.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24406.json index f3daedaab1b..e4c7b4d4c60 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24406.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24406.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24406", "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:41.300", - "lastModified": "2025-03-17T21:15:13.493", - "vulnStatus": "Modified", + "lastModified": "2025-04-17T16:09:35.413", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,19 +42,19 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", - "baseScore": 4.9, - "baseSeverity": "MEDIUM", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "HIGH", + "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "NONE" }, - "exploitabilityScore": 1.2, + "exploitabilityScore": 3.9, "impactScore": 3.6 } ] diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24539.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24539.json new file mode 100644 index 00000000000..39995c2dba3 --- /dev/null +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24539.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24539", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:31.300", + "lastModified": "2025-04-17T16:15:31.300", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in debounce DeBounce Email Validator allows Reflected XSS. This issue affects DeBounce Email Validator: from n/a through 5.6.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/debounce-io-email-validator/vulnerability/wordpress-debounce-email-validator-plugin-5-6-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24548.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24548.json new file mode 100644 index 00000000000..1f5c78e84e5 --- /dev/null +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24548.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24548", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:31.437", + "lastModified": "2025-04-17T16:15:31.437", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Autoglot Autoglot \u2013 Automatic WordPress Translation allows Reflected XSS. This issue affects Autoglot \u2013 Automatic WordPress Translation: from n/a through 2.4.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/autoglot/vulnerability/wordpress-autoglot-automatic-wordpress-translation-plugin-2-4-7-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24550.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24550.json new file mode 100644 index 00000000000..d052331ec9a --- /dev/null +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24550.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24550", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:31.563", + "lastModified": "2025-04-17T16:15:31.563", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in JobScore Job Manager allows Stored XSS. This issue affects Job Manager: from n/a through 2.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/job-manager-by-jobscore/vulnerability/wordpress-job-manager-plugin-2-2-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24553.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24553.json new file mode 100644 index 00000000000..e54e619f5fd --- /dev/null +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24553.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24553", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:31.697", + "lastModified": "2025-04-17T16:15:31.697", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Akadrama Shipping with Venipak for WooCommerce allows Reflected XSS. This issue affects Shipping with Venipak for WooCommerce: from n/a through 1.22.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wc-venipak-shipping/vulnerability/wordpress-shipping-with-venipak-for-woocommerce-plugin-1-22-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24577.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24577.json new file mode 100644 index 00000000000..6850fd5462f --- /dev/null +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24577.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24577", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:31.833", + "lastModified": "2025-04-17T16:15:31.833", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Ays Pro Poll Maker allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Poll Maker: from n/a through 5.5.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/poll-maker/vulnerability/wordpress-poll-maker-plugin-5-5-0-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24581.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24581.json new file mode 100644 index 00000000000..9483ddcc40f --- /dev/null +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24581.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24581", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:31.967", + "lastModified": "2025-04-17T16:15:31.967", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Themefic Instantio allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Instantio: from n/a through 3.3.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/instantio/vulnerability/wordpress-instantio-plugin-3-3-7-settings-change-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24583.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24583.json new file mode 100644 index 00000000000..17440f92851 --- /dev/null +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24583.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24583", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:32.097", + "lastModified": "2025-04-17T16:15:32.097", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in AA Web Servant 12 Step Meeting List allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects 12 Step Meeting List: from n/a through 3.16.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/12-step-meeting-list/vulnerability/wordpress-12-step-meeting-list-plugin-3-16-5-settings-change-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24586.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24586.json new file mode 100644 index 00000000000..59364a6fecb --- /dev/null +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24586.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24586", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:32.243", + "lastModified": "2025-04-17T16:15:32.243", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in bitsstech Shipment Tracker for Woocommerce allows Reflected XSS. This issue affects Shipment Tracker for Woocommerce: from n/a through 1.4.23." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/shipment-tracker-for-woocommerce/vulnerability/wordpress-shipment-tracker-for-woocommerce-plugin-1-4-23-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24619.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24619.json new file mode 100644 index 00000000000..fdb3fa1c5fe --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24619.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24619", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:32.810", + "lastModified": "2025-04-17T16:15:32.810", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in webheadcoder WP Log Action allows Reflected XSS. This issue affects WP Log Action: from n/a through 0.51." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-log-action/vulnerability/wordpress-wp-log-action-plugin-0-51-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24621.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24621.json new file mode 100644 index 00000000000..244ec01757e --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24621.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24621", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:32.947", + "lastModified": "2025-04-17T16:15:32.947", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in tychesoftwares Arconix Shortcodes allows Reflected XSS. This issue affects Arconix Shortcodes: from n/a through 2.1.15." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/arconix-shortcodes/vulnerability/wordpress-arconix-shortcodes-plugin-2-1-15-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24624.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24624.json new file mode 100644 index 00000000000..9d942b93602 --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24624.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24624", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:33.077", + "lastModified": "2025-04-17T16:15:33.077", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HasTech HT Event allows Reflected XSS. This issue affects HT Event: from n/a through 1.4.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/ht-event/vulnerability/wordpress-ht-event-wordpress-event-manager-plugin-for-elementor-plugin-1-4-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24637.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24637.json new file mode 100644 index 00000000000..c607d0621e3 --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24637.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24637", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:33.210", + "lastModified": "2025-04-17T16:15:33.210", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Syed Balkhi Beacon Lead Magnets and Lead Capture allows Reflected XSS. This issue affects Beacon Lead Magnets and Lead Capture: from n/a through 1.5.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/beacon-by/vulnerability/wordpress-beacon-lead-magnets-and-lead-capture-plugin-1-5-7-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24640.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24640.json new file mode 100644 index 00000000000..34b124da898 --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24640.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24640", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:33.343", + "lastModified": "2025-04-17T16:15:33.343", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Dan-Lucian Stefancu Empty Tags Remover allows Reflected XSS. This issue affects Empty Tags Remover: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/empty-tags-remover/vulnerability/wordpress-empty-tags-remover-plugin-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24645.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24645.json new file mode 100644 index 00000000000..410a7138e40 --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24645.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24645", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:33.470", + "lastModified": "2025-04-17T16:15:33.470", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rob Scott Eazy Under Construction allows Reflected XSS. This issue affects Eazy Under Construction: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/eazy-under-construction/vulnerability/wordpress-eazy-under-construction-plugin-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24651.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24651.json new file mode 100644 index 00000000000..1f7d6900af1 --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24651.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24651", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:33.600", + "lastModified": "2025-04-17T16:15:33.600", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insertion of Sensitive Information into Log File vulnerability in WebToffee WordPress Backup & Migration allows Retrieve Embedded Sensitive Data. This issue affects WordPress Backup & Migration: from n/a through 1.5.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-migration-duplicator/vulnerability/wordpress-webtoffee-wp-backup-and-migration-plugin-1-5-3-sensitive-data-exposure-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24655.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24655.json new file mode 100644 index 00000000000..8eb8a4dd658 --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24655.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24655", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:33.737", + "lastModified": "2025-04-17T16:15:33.737", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PickPlugins Wishlist allows Reflected XSS. This issue affects Wishlist: from n/a through 1.0.39." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wishlist/vulnerability/wordpress-wishlist-plugin-1-0-39-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24670.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24670.json new file mode 100644 index 00000000000..b60422766f9 --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24670.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24670", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:33.867", + "lastModified": "2025-04-17T16:15:33.867", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Dhanendran Rajagopal Term Taxonomy Converter allows Reflected XSS. This issue affects Term Taxonomy Converter: from n/a through 1.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/term-taxonomy-converter/vulnerability/wordpress-term-taxonomy-converter-plugin-1-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24737.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24737.json new file mode 100644 index 00000000000..1e72e17d0fc --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24737.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24737", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:33.997", + "lastModified": "2025-04-17T16:15:33.997", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Mat Bao Corporation WP Helper Premium allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects WP Helper Premium: from n/a through 4.6.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-helper-lite/vulnerability/wordpress-wp-helper-premium-plugin-4-6-1-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24745.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24745.json new file mode 100644 index 00000000000..a6d9433b393 --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24745.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24745", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:34.127", + "lastModified": "2025-04-17T16:15:34.127", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in RadiusTheme Classified Listing allows Reflected XSS. This issue affects Classified Listing: from n/a through 4.0.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/classified-listing/vulnerability/wordpress-classified-listing-plugin-4-0-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24752.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24752.json new file mode 100644 index 00000000000..6b6d79b403d --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24752.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24752", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:34.257", + "lastModified": "2025-04-17T16:15:34.257", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPDeveloper Essential Addons for Elementor allows Reflected XSS. This issue affects Essential Addons for Elementor: from n/a through 6.0.14." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/essential-addons-for-elementor-lite/vulnerability/wordpress-essential-addons-for-elementor-plugin-6-0-14-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-254xx/CVE-2025-25457.json b/CVE-2025/CVE-2025-254xx/CVE-2025-25457.json new file mode 100644 index 00000000000..ec41a9b9e2a --- /dev/null +++ b/CVE-2025/CVE-2025-254xx/CVE-2025-25457.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-25457", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-17T16:15:34.390", + "lastModified": "2025-04-17T16:15:34.390", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tenda AC10 V4.0si_V16.03.10.20 is vulnerable to Buffer Overflow in AdvSetMacMtuWan via cloneType2." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/xyqer1/f69ebbdec019cacf5870ea55e25780a4", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/xyqer1/Tenda-AC10-AdvSetMacMtuWan-cloneType2-StackOverflow", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-260xx/CVE-2025-26014.json b/CVE-2025/CVE-2025-260xx/CVE-2025-26014.json index 67b1647d135..1587445ac73 100644 --- a/CVE-2025/CVE-2025-260xx/CVE-2025-26014.json +++ b/CVE-2025/CVE-2025-260xx/CVE-2025-26014.json @@ -2,7 +2,7 @@ "id": "CVE-2025-26014", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-21T17:15:14.680", - "lastModified": "2025-02-21T17:15:14.680", + "lastModified": "2025-04-17T16:15:34.477", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) en Loggrove v.1.0 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro de ruta." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://gitee.com/olajowon/loggrove/", diff --git a/CVE-2025/CVE-2025-269xx/CVE-2025-26968.json b/CVE-2025/CVE-2025-269xx/CVE-2025-26968.json new file mode 100644 index 00000000000..23214be3245 --- /dev/null +++ b/CVE-2025/CVE-2025-269xx/CVE-2025-26968.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26968", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:34.613", + "lastModified": "2025-04-17T16:15:34.613", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in webbernaut Cloak Front End Email allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Cloak Front End Email: from n/a through 1.9.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/cloak-front-end-email/vulnerability/wordpress-cloak-front-end-email-1-9-5-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27282.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27282.json new file mode 100644 index 00000000000..e03a1aca814 --- /dev/null +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27282.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27282", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:34.753", + "lastModified": "2025-04-17T16:15:34.753", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Unrestricted Upload of File with Dangerous Type vulnerability in rockgod100 Theme File Duplicator allows Using Malicious Files. This issue affects Theme File Duplicator: from n/a through 1.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.9, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/theme-file-duplicator/vulnerability/wordpress-theme-file-duplicator-plugin-1-3-arbitrary-file-upload-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27283.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27283.json new file mode 100644 index 00000000000..5b9a493646a --- /dev/null +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27283.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27283", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:34.887", + "lastModified": "2025-04-17T16:15:34.887", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in rockgod100 Theme File Duplicator allows Path Traversal. This issue affects Theme File Duplicator: from n/a through 1.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/theme-file-duplicator/vulnerability/wordpress-theme-file-duplicator-plugin-1-3-arbitrary-file-download-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27284.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27284.json new file mode 100644 index 00000000000..ba87a4558cb --- /dev/null +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27284.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27284", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:35.010", + "lastModified": "2025-04-17T16:15:35.010", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in divspark Flagged Content allows Reflected XSS. This issue affects Flagged Content: from n/a through 1.0.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/flagged-content/vulnerability/wordpress-flagged-content-plugin-1-0-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27285.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27285.json new file mode 100644 index 00000000000..df7d087f0e7 --- /dev/null +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27285.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27285", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:35.143", + "lastModified": "2025-04-17T16:15:35.143", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ays Pro Easy Form by AYS allows Reflected XSS. This issue affects Easy Form by AYS: from n/a through 2.6.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/easy-form/vulnerability/wordpress-easy-form-by-ays-plugin-2-6-9-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27286.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27286.json new file mode 100644 index 00000000000..f73a6bb1c47 --- /dev/null +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27286.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27286", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:35.270", + "lastModified": "2025-04-17T16:15:35.270", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of Untrusted Data vulnerability in saoshyant1994 Saoshyant Slider allows Object Injection. This issue affects Saoshyant Slider: from n/a through 3.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/saoshyant-slider/vulnerability/wordpress-saoshyant-slider-plugin-3-0-php-object-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27287.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27287.json new file mode 100644 index 00000000000..cde58f180e9 --- /dev/null +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27287.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27287", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:35.403", + "lastModified": "2025-04-17T16:15:35.403", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of Untrusted Data vulnerability in ssvadim SS Quiz allows Object Injection. This issue affects SS Quiz: from n/a through 2.0.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/ssquiz/vulnerability/wordpress-ss-quiz-plugin-2-0-5-php-object-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27288.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27288.json new file mode 100644 index 00000000000..e6c6cf43fed --- /dev/null +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27288.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27288", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:35.533", + "lastModified": "2025-04-17T16:15:35.533", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in BjornW File Icons allows Reflected XSS. This issue affects File Icons: from n/a through 2.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/file-icons/vulnerability/wordpress-file-icons-plugin-2-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27289.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27289.json new file mode 100644 index 00000000000..aaf92c35594 --- /dev/null +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27289.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27289", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:35.667", + "lastModified": "2025-04-17T16:15:35.667", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Antoine Guillien Restrict Taxonomies allows Reflected XSS. This issue affects Restrict Taxonomies: from n/a through 1.3.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/restrict-taxonomies/vulnerability/wordpress-restrict-taxonomies-plugin-1-3-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27291.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27291.json new file mode 100644 index 00000000000..d26552fae97 --- /dev/null +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27291.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27291", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:35.800", + "lastModified": "2025-04-17T16:15:35.800", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in uxgallery WordPress Photo Gallery \u2013 Image Gallery allows Reflected XSS. This issue affects WordPress Photo Gallery \u2013 Image Gallery: from n/a through 2.0.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/photo-image-gallery/vulnerability/wordpress-photo-gallery-image-gallery-plugin-2-0-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27292.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27292.json new file mode 100644 index 00000000000..bbf74127576 --- /dev/null +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27292.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27292", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:35.933", + "lastModified": "2025-04-17T16:15:35.933", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPyog WPYog Documents allows Reflected XSS. This issue affects WPYog Documents: from n/a through 1.3.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wpyog-documents/vulnerability/wordpress-wpyog-documents-plugin-1-3-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27293.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27293.json new file mode 100644 index 00000000000..c867434448d --- /dev/null +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27293.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27293", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:36.067", + "lastModified": "2025-04-17T16:15:36.067", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in webparexapp Shipmozo Courier Tracking allows Reflected XSS. This issue affects Shipmozo Courier Tracking: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/webparex/vulnerability/wordpress-shipmozo-courier-tracking-plugin-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27295.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27295.json new file mode 100644 index 00000000000..7f5c7cc39b5 --- /dev/null +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27295.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27295", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:36.193", + "lastModified": "2025-04-17T16:15:36.193", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wpion Live css allows Stored XSS. This issue affects Live css: from n/a through 1.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/css-live/vulnerability/wordpress-live-css-plugin-1-3-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27299.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27299.json new file mode 100644 index 00000000000..3e6ba21645f --- /dev/null +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27299.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27299", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:36.327", + "lastModified": "2025-04-17T16:15:36.327", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in WP Asia MyTicket Events allows Path Traversal. This issue affects MyTicket Events: from n/a through 1.2.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/myticket-events/vulnerability/wordpress-myticket-events-plugin-1-2-4-non-arbitrary-file-read-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27302.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27302.json new file mode 100644 index 00000000000..a89213bd45a --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27302.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27302", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:36.450", + "lastModified": "2025-04-17T16:15:36.450", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Claudio Adrian Marrero CHATLIVE allows SQL Injection. This issue affects CHATLIVE: from n/a through 2.0.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/chatlive/vulnerability/wordpress-chatlive-plugin-2-0-1-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27308.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27308.json new file mode 100644 index 00000000000..ad36ff1aee5 --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27308.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27308", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:36.583", + "lastModified": "2025-04-17T16:15:36.583", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in cmstactics WP Video Posts allows Reflected XSS. This issue affects WP Video Posts: from n/a through 3.5.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-video-posts/vulnerability/wordpress-wp-video-posts-plugin-3-5-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27309.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27309.json new file mode 100644 index 00000000000..16b5b41c14c --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27309.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27309", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:36.720", + "lastModified": "2025-04-17T16:15:36.720", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jeannot Muller flickr-slideshow-wrapper allows Stored XSS. This issue affects flickr-slideshow-wrapper: from n/a through 5.4.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/flickr-slideshow-wrapper/vulnerability/wordpress-flickr-slideshow-wrapper-plugin-5-4-6-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27310.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27310.json new file mode 100644 index 00000000000..aa2abdbbd7d --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27310.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27310", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:36.850", + "lastModified": "2025-04-17T16:15:36.850", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Radius of Thought Page and Post Lister allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Page and Post Lister: from n/a through 1.2.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/page-and-post-lister/vulnerability/wordpress-page-and-post-lister-plugin-1-2-1-arbitrary-content-deletion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27313.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27313.json new file mode 100644 index 00000000000..f78127e8c63 --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27313.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27313", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:36.980", + "lastModified": "2025-04-17T16:15:36.980", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Bernd Altmeier Google Maps GPX Viewer allows Reflected XSS. This issue affects Google Maps GPX Viewer: from n/a through 3.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/google-maps-gpx-viewer/vulnerability/wordpress-google-maps-gpx-viewer-plugin-3-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27314.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27314.json new file mode 100644 index 00000000000..6fa81b8e7bb --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27314.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27314", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:37.113", + "lastModified": "2025-04-17T16:15:37.113", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Kush Sharma Kush Micro News allows Stored XSS. This issue affects Kush Micro News: from n/a through 1.6.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/kush-micro-news/vulnerability/wordpress-kush-micro-news-plugin-1-6-7-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27319.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27319.json new file mode 100644 index 00000000000..d12e813d9c2 --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27319.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27319", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:37.240", + "lastModified": "2025-04-17T16:15:37.240", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ivan82 User List allows Reflected XSS. This issue affects User List: from n/a through 1.5.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/user-list/vulnerability/wordpress-user-list-plugin-1-5-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27322.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27322.json new file mode 100644 index 00000000000..5030745289e --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27322.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27322", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:37.373", + "lastModified": "2025-04-17T16:15:37.373", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Bappa Mal QR Code for WooCommerce allows Reflected XSS. This issue affects QR Code for WooCommerce: from n/a through 1.2.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wc-qr-codes/vulnerability/wordpress-qr-code-for-woocommerce-plugin-1-2-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27324.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27324.json new file mode 100644 index 00000000000..db6080cb58f --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27324.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27324", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:37.503", + "lastModified": "2025-04-17T16:15:37.503", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in 17track 17TRACK for WooCommerce allows Reflected XSS. This issue affects 17TRACK for WooCommerce: from n/a through 1.2.10." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/17track/vulnerability/wordpress-17track-for-woocommerce-plugin-1-2-10-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27333.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27333.json new file mode 100644 index 00000000000..a1a39a8ebe4 --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27333.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27333", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:37.630", + "lastModified": "2025-04-17T16:15:37.630", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in alvego Protected wp-login allows Reflected XSS. This issue affects Protected wp-login: from n/a through 2.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/protected-wp-login/vulnerability/wordpress-protected-wp-login-plugin-2-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27337.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27337.json new file mode 100644 index 00000000000..a35bf6049a7 --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27337.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27337", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:37.780", + "lastModified": "2025-04-17T16:15:37.780", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in kontur Fontsampler allows Reflected XSS. This issue affects Fontsampler: from n/a through 0.4.14." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/fontsampler/vulnerability/wordpress-fontsampler-plugin-0-4-14-csrf-to-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27338.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27338.json new file mode 100644 index 00000000000..bb8f8d2eee9 --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27338.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27338", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:37.913", + "lastModified": "2025-04-17T16:15:37.913", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in graphems List Urls allows Reflected XSS. This issue affects List Urls: from n/a through 0.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/list-urls/vulnerability/wordpress-list-urls-plugin-0-2-csrf-to-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27343.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27343.json new file mode 100644 index 00000000000..f14c8a36fcf --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27343.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27343", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:38.030", + "lastModified": "2025-04-17T16:15:38.030", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Webilop WooCommerce HTML5 Video allows Reflected XSS. This issue affects WooCommerce HTML5 Video: from n/a through 1.7.10." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/woocommerce-html5-video/vulnerability/wordpress-woocommerce-html5-video-plugin-1-7-10-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27345.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27345.json new file mode 100644 index 00000000000..bc73ac5a125 --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27345.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27345", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:38.160", + "lastModified": "2025-04-17T16:15:38.160", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Deetronix Booking Ultra Pro allows Reflected XSS. This issue affects Booking Ultra Pro: from n/a through 1.1.19." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/booking-ultra-pro/vulnerability/wordpress-booking-ultra-pro-plugin-1-1-18-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27346.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27346.json new file mode 100644 index 00000000000..d885615a8d0 --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27346.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27346", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:38.293", + "lastModified": "2025-04-17T16:15:38.293", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in gerrygooner Rebuild Permalinks allows Reflected XSS. This issue affects Rebuild Permalinks: from n/a through 1.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/rebuild-permalinks/vulnerability/wordpress-rebuild-permalinks-plugin-1-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27354.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27354.json new file mode 100644 index 00000000000..e707653ccf8 --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27354.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27354", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:38.430", + "lastModified": "2025-04-17T16:15:38.430", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in phil88530 Simple Email Subscriber allows Reflected XSS. This issue affects Simple Email Subscriber: from n/a through 2.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/simple-email-subscriber/vulnerability/wordpress-simple-email-subscriber-plugin-2-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-290xx/CVE-2025-29039.json b/CVE-2025/CVE-2025-290xx/CVE-2025-29039.json new file mode 100644 index 00000000000..e91d95da783 --- /dev/null +++ b/CVE-2025/CVE-2025-290xx/CVE-2025-29039.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-29039", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-17T17:15:32.797", + "lastModified": "2025-04-17T17:15:32.797", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in dlink DIR 832x 240802 allows a remote attacker to execute arbitrary code via the function 0x41dda8" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/xyqer1/734fd1d93e4c08cea55dcb1e8b189a2b", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/xyqer1/Dlink-dir-823x-set_ntp-year-CommandInjection", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en/security-bulletin/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-290xx/CVE-2025-29042.json b/CVE-2025/CVE-2025-290xx/CVE-2025-29042.json new file mode 100644 index 00000000000..b1ce3cbca14 --- /dev/null +++ b/CVE-2025/CVE-2025-290xx/CVE-2025-29042.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-29042", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-17T16:15:38.560", + "lastModified": "2025-04-17T16:15:38.560", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in dlink DIR 832x 240802 allows a remote attacker to execute arbitrary code via the macaddr key value to the function 0x42232c" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/xyqer1/841e78a3c4029808dac8c439595a1358", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/xyqer1/Dlink-dir-823x-set_prohibiting-macaddr-CommandInjection", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en/security-bulletin/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-290xx/CVE-2025-29043.json b/CVE-2025/CVE-2025-290xx/CVE-2025-29043.json new file mode 100644 index 00000000000..39e2968d6b0 --- /dev/null +++ b/CVE-2025/CVE-2025-290xx/CVE-2025-29043.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-29043", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-17T16:15:38.657", + "lastModified": "2025-04-17T16:15:38.657", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in dlink DIR 832x 240802 allows a remote attacker to execute arbitrary code via the function 0x417234" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/xyqer1/d5a5b18743b7a2fcbc0f93001d8e2ad9", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/xyqer1/Dlink-dir-823x-diag_traceroute-target_addr-CommandInjection", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en/security-bulletin/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-291xx/CVE-2025-29180.json b/CVE-2025/CVE-2025-291xx/CVE-2025-29180.json new file mode 100644 index 00000000000..9e872d40bbb --- /dev/null +++ b/CVE-2025/CVE-2025-291xx/CVE-2025-29180.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-29180", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-17T17:15:32.953", + "lastModified": "2025-04-17T17:15:32.953", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In FOXCMS <=1.25, the installdb.php file has a time - based blind SQL injection vulnerability. The url_prefix, domain, and my_website POST parameters are directly concatenated into SQL statements without filtering." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/X1lyS/5075ba1e6bebff26fcd58609493fd5f2", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-291xx/CVE-2025-29181.json b/CVE-2025/CVE-2025-291xx/CVE-2025-29181.json new file mode 100644 index 00000000000..bbd47c69c4a --- /dev/null +++ b/CVE-2025/CVE-2025-291xx/CVE-2025-29181.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-29181", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-17T17:15:33.090", + "lastModified": "2025-04-17T17:15:33.090", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "FOXCMS <= V1.25 is vulnerable to SQL Injection via $param['title'] in /admin/util/Field.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/X1lyS/2b3f936437fb7c04b4f1e4b07468fd05", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-296xx/CVE-2025-29661.json b/CVE-2025/CVE-2025-296xx/CVE-2025-29661.json new file mode 100644 index 00000000000..cefe7ac25a5 --- /dev/null +++ b/CVE-2025/CVE-2025-296xx/CVE-2025-29661.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-29661", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-17T17:15:33.220", + "lastModified": "2025-04-17T17:15:33.220", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Litepubl CMS <= 7.0.9 is vulnerable to RCE in admin/service/run." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/litepubl/cms/issues/1", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-296xx/CVE-2025-29662.json b/CVE-2025/CVE-2025-296xx/CVE-2025-29662.json new file mode 100644 index 00000000000..25f8d8ea880 --- /dev/null +++ b/CVE-2025/CVE-2025-296xx/CVE-2025-29662.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-29662", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-17T17:15:33.350", + "lastModified": "2025-04-17T17:15:33.350", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A RCE vulnerability in the core application in LandChat 3.25.12.18 allows an unauthenticated attacker to execute system code via remote network access." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/landchat/LandChat/issues/5", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2947.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2947.json new file mode 100644 index 00000000000..d30404f973d --- /dev/null +++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2947.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-2947", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-04-17T17:15:33.490", + "lastModified": "2025-04-17T17:15:33.490", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM i 7.6\u00a0\n\ncontains a privilege escalation vulnerability due to incorrect profile swapping in an OS command. \u00a0A malicious actor can use the command to elevate privileges to gain root access to the host operating system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-278" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7231025", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31006.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31006.json new file mode 100644 index 00000000000..53a00bb8c4f --- /dev/null +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31006.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-31006", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:38.970", + "lastModified": "2025-04-17T16:15:38.970", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in arete-it Activity Reactions For Buddypress allows Reflected XSS. This issue affects Activity Reactions For Buddypress: from n/a through 1.0.22." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/activity-reactions-for-buddypress/vulnerability/wordpress-activity-reactions-for-buddypress-plugin-1-0-22-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31018.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31018.json new file mode 100644 index 00000000000..94e8d80d7ae --- /dev/null +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31018.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-31018", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:39.097", + "lastModified": "2025-04-17T16:15:39.097", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in FireDrum FireDrum Email Marketing allows Reflected XSS. This issue affects FireDrum Email Marketing: from n/a through 1.64." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/firedrum-email-marketing/vulnerability/wordpress-firedrum-email-marketing-plugin-1-64-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31030.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31030.json new file mode 100644 index 00000000000..1f2ffe1b796 --- /dev/null +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31030.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-31030", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:39.220", + "lastModified": "2025-04-17T16:15:39.220", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in jbhovik Ray Enterprise Translation allows PHP Local File Inclusion. This issue affects Ray Enterprise Translation: from n/a through 1.7.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/lingotek-translation/vulnerability/wordpress-ray-enterprise-translation-1-7-0-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-313xx/CVE-2025-31380.json b/CVE-2025/CVE-2025-313xx/CVE-2025-31380.json new file mode 100644 index 00000000000..7db0860ba9e --- /dev/null +++ b/CVE-2025/CVE-2025-313xx/CVE-2025-31380.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-31380", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:39.347", + "lastModified": "2025-04-17T16:15:39.347", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Weak Password Recovery Mechanism for Forgotten Password vulnerability in videowhisper Paid Videochat Turnkey Site allows Password Recovery Exploitation. This issue affects Paid Videochat Turnkey Site: from n/a through 7.3.11." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-640" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/ppv-live-webcams/vulnerability/wordpress-paid-videochat-turnkey-site-7-3-5-broken-authentication-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32415.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32415.json new file mode 100644 index 00000000000..bc46678c51d --- /dev/null +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32415.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32415", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-17T17:15:33.733", + "lastModified": "2025-04-17T17:15:33.733", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In libxml2 before 2.13.8 and 2.14.x before 2.14.2, xmlSchemaIDCFillNodeTables in xmlschemas.c has a heap-based buffer underflow. To exploit this, a crafted XML document must be validated against an XML schema with certain identity constraints, or a crafted XML schema must be used." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.4, + "impactScore": 5.8 + } + ] + }, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1284" + } + ] + } + ], + "references": [ + { + "url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/890", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32490.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32490.json new file mode 100644 index 00000000000..abcadc94f7d --- /dev/null +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32490.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32490", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:39.480", + "lastModified": "2025-04-17T16:15:39.480", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WebsiteDefender wp secure allows Stored XSS. This issue affects wp secure: from n/a through 1.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-secure-by-sitesecuritymonitorcom/vulnerability/wordpress-wp-secure-1-2-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32504.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32504.json new file mode 100644 index 00000000000..f812cdce839 --- /dev/null +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32504.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32504", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:39.610", + "lastModified": "2025-04-17T16:15:39.610", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in silvasoft Silvasoft boekhouden allows Reflected XSS. This issue affects Silvasoft boekhouden: from n/a through 3.0.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/silvasoft-boekhouden/vulnerability/wordpress-silvasoft-boekhouden-plugin-3-0-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32506.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32506.json new file mode 100644 index 00000000000..93dc7d724cb --- /dev/null +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32506.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32506", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:39.737", + "lastModified": "2025-04-17T16:15:39.737", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in BenDlz AT Internet SmartTag allows Reflected XSS. This issue affects AT Internet SmartTag: from n/a through 0.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/at-internet/vulnerability/wordpress-at-internet-smarttag-plugin-0-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32507.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32507.json new file mode 100644 index 00000000000..16a089aa8de --- /dev/null +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32507.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32507", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:39.863", + "lastModified": "2025-04-17T16:15:39.863", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Aakif Kadiwala Event Espresso \u2013 Custom Email Template Shortcode allows Reflected XSS. This issue affects Event Espresso \u2013 Custom Email Template Shortcode: from n/a through 1.0.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/email-shortcode/vulnerability/wordpress-event-espresso-plugin-1-0-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32508.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32508.json new file mode 100644 index 00000000000..a67e7a5e810 --- /dev/null +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32508.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32508", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:39.990", + "lastModified": "2025-04-17T16:15:39.990", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ComMotion Course Booking System allows Reflected XSS. This issue affects Course Booking System: from n/a through 6.0.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/course-booking-system/vulnerability/wordpress-course-booking-system-plugin-6-0-7-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32511.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32511.json new file mode 100644 index 00000000000..12bba8b667a --- /dev/null +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32511.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32511", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:40.120", + "lastModified": "2025-04-17T16:15:40.120", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Excellent Dynamics Make Email Customizer for WooCommerce allows Reflected XSS. This issue affects Make Email Customizer for WooCommerce: from n/a through 1.0.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/make-email-customizer-for-woocommerce/vulnerability/wordpress-make-email-customizer-for-woocommerce-plugin-1-0-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32512.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32512.json new file mode 100644 index 00000000000..457ca94b717 --- /dev/null +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32512.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32512", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:40.263", + "lastModified": "2025-04-17T16:15:40.263", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in revampcrm Revamp CRM for WooCommerce allows Reflected XSS. This issue affects Revamp CRM for WooCommerce: from n/a through 1.1.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/revampcrm-woocommerce/vulnerability/wordpress-revamp-crm-for-woocommerce-plugin-1-1-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32513.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32513.json new file mode 100644 index 00000000000..68416f9fd71 --- /dev/null +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32513.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32513", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:40.413", + "lastModified": "2025-04-17T16:15:40.413", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in totalprocessing Nomupay Payment Processing Gateway allows Reflected XSS. This issue affects Nomupay Payment Processing Gateway: from n/a through 7.1.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/totalprocessing-card-payments/vulnerability/wordpress-total-processing-card-payments-for-woocommerce-plugin-7-1-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32514.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32514.json new file mode 100644 index 00000000000..7b0406773e8 --- /dev/null +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32514.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32514", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:40.543", + "lastModified": "2025-04-17T16:15:40.543", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in cscode WooCommerce Estimate and Quote allows Reflected XSS. This issue affects WooCommerce Estimate and Quote: from n/a through 1.0.2.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wc-estimate-and-quote/vulnerability/wordpress-woocommerce-estimate-and-quote-plugin-1-0-2-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32515.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32515.json new file mode 100644 index 00000000000..827d3121866 --- /dev/null +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32515.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32515", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:40.690", + "lastModified": "2025-04-17T16:15:40.690", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in terminalafrica Terminal Africa allows Reflected XSS. This issue affects Terminal Africa: from n/a through 1.13.17." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/terminal-africa/vulnerability/wordpress-terminal-africa-plugin-1-13-17-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32516.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32516.json new file mode 100644 index 00000000000..975dc3733c3 --- /dev/null +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32516.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32516", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:40.827", + "lastModified": "2025-04-17T16:15:40.827", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ilGhera Related Videos for JW Player allows Reflected XSS. This issue affects Related Videos for JW Player: from n/a through 1.2.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/related-videos-for-jw-player/vulnerability/wordpress-related-videos-for-jw-player-plugin-1-2-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32520.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32520.json new file mode 100644 index 00000000000..c8c73ee1a28 --- /dev/null +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32520.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32520", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:40.960", + "lastModified": "2025-04-17T16:15:40.960", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in M. Ali Saleem WordPress Health and Server Condition \u2013 Integrated with Google Page Speed allows Reflected XSS. This issue affects WordPress Health and Server Condition \u2013 Integrated with Google Page Speed: from n/a through 4.1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-condition/vulnerability/wordpress-wordpress-health-and-server-condition-plugin-4-1-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32521.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32521.json new file mode 100644 index 00000000000..60bd2ee763e --- /dev/null +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32521.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32521", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:41.087", + "lastModified": "2025-04-17T16:15:41.087", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CoolHappy Cool Flipbox \u2013 Shortcode & Gutenberg Block allows Reflected XSS. This issue affects Cool Flipbox \u2013 Shortcode & Gutenberg Block: from n/a through 1.8.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/flip-boxes/vulnerability/wordpress-cool-flipbox-plugin-1-8-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32522.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32522.json new file mode 100644 index 00000000000..2ff748a8105 --- /dev/null +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32522.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32522", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:41.210", + "lastModified": "2025-04-17T16:15:41.210", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPExperts.io License Manager for WooCommerce allows Reflected XSS. This issue affects License Manager for WooCommerce: from n/a through 3.0.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/license-manager-for-woocommerce/vulnerability/wordpress-license-manager-for-woocommerce-plugin-3-0-9-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32526.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32526.json new file mode 100644 index 00000000000..3fc04b92c2c --- /dev/null +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32526.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32526", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:41.333", + "lastModified": "2025-04-17T16:15:41.333", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Dylan James Zephyr Project Manager allows Reflected XSS. This issue affects Zephyr Project Manager: from n/a through 3.3.101." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/zephyr-project-manager/vulnerability/wordpress-zephyr-project-manager-plugin-3-3-105-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32527.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32527.json new file mode 100644 index 00000000000..dee09132f3c --- /dev/null +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32527.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32527", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:41.463", + "lastModified": "2025-04-17T16:15:41.463", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in pey22 T&P Gallery Slider allows Stored XSS. This issue affects T&P Gallery Slider: from n/a through 1.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/tp-gallery-slider/vulnerability/wordpress-t-p-gallery-slider-plugin-1-2-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32528.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32528.json new file mode 100644 index 00000000000..96cbdcfb719 --- /dev/null +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32528.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32528", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:41.593", + "lastModified": "2025-04-17T16:15:41.593", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in maximevalette iCal Feeds allows Reflected XSS. This issue affects iCal Feeds: from n/a through 1.5.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/ical-feeds/vulnerability/wordpress-ical-feeds-plugin-1-5-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32529.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32529.json new file mode 100644 index 00000000000..863d0f8fe25 --- /dev/null +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32529.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32529", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:41.743", + "lastModified": "2025-04-17T16:15:41.743", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in iONE360 iONE360 configurator allows Reflected XSS. This issue affects iONE360 configurator: from n/a through 2.0.56." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/ione360-configurator/vulnerability/wordpress-ione360-configurator-plugin-2-0-56-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32530.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32530.json new file mode 100644 index 00000000000..85447f8682a --- /dev/null +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32530.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32530", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:41.873", + "lastModified": "2025-04-17T16:15:41.873", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Swings Wallet System for WooCommerce allows Reflected XSS. This issue affects Wallet System for WooCommerce: from n/a through 2.6.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wallet-system-for-woocommerce/vulnerability/wordpress-wallet-system-for-woocommerce-plugin-2-6-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32531.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32531.json new file mode 100644 index 00000000000..9c4faf4ea99 --- /dev/null +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32531.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32531", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:42.003", + "lastModified": "2025-04-17T16:15:42.003", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in tychesoftwares Arconix FAQ allows Reflected XSS. This issue affects Arconix FAQ: from n/a through 1.9.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/arconix-faq/vulnerability/wordpress-arconix-faq-plugin-1-9-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32532.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32532.json new file mode 100644 index 00000000000..8879a485c38 --- /dev/null +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32532.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32532", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:42.137", + "lastModified": "2025-04-17T16:15:42.137", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pei Yong Goh UXsniff allows Reflected XSS. This issue affects UXsniff: from n/a through 1.2.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/ux-sniff/vulnerability/wordpress-uxsniff-plugin-1-2-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32533.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32533.json new file mode 100644 index 00000000000..29347ca6c2d --- /dev/null +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32533.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32533", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:42.273", + "lastModified": "2025-04-17T16:15:42.273", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Matat Technologies Deliver via Shipos for WooCommerce allows Reflected XSS. This issue affects Deliver via Shipos for WooCommerce: from n/a through 2.1.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wc-shipos-delivery/vulnerability/wordpress-deliver-via-shipos-for-woocommerce-plugin-2-1-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32535.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32535.json new file mode 100644 index 00000000000..d27626c2304 --- /dev/null +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32535.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32535", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:42.410", + "lastModified": "2025-04-17T16:15:42.410", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in digireturn DN Shipping by Weight for WooCommerce allows Reflected XSS. This issue affects DN Shipping by Weight for WooCommerce: from n/a through 1.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/dn-shipping-by-weight/vulnerability/wordpress-dn-shipping-by-weight-for-woocommerce-plugin-1-1-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32540.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32540.json new file mode 100644 index 00000000000..ca160fb5357 --- /dev/null +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32540.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32540", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:42.550", + "lastModified": "2025-04-17T16:15:42.550", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in feedify Feedify \u2013 Web Push Notifications allows Reflected XSS. This issue affects Feedify \u2013 Web Push Notifications: from n/a through 2.4.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/push-notification-by-feedify/vulnerability/wordpress-feedify-web-push-notifications-plugin-2-4-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32544.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32544.json new file mode 100644 index 00000000000..e7a92069114 --- /dev/null +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32544.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32544", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:42.683", + "lastModified": "2025-04-17T16:15:42.683", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in The Right Software WooCommerce Loyal Customers allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects WooCommerce Loyal Customers: from n/a through 2.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/woocommerce-loyal-customer/vulnerability/wordpress-woocommerce-loyal-customers-plugin-2-6-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32545.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32545.json new file mode 100644 index 00000000000..b4661851d89 --- /dev/null +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32545.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32545", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:42.833", + "lastModified": "2025-04-17T16:15:42.833", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in SOFTAGON WooCommerce Products without featured images allows Reflected XSS. This issue affects WooCommerce Products without featured images: from n/a through 0.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/woocommerce-products-without-featured-images/vulnerability/wordpress-woocommerce-products-without-featured-images-plugin-0-1-csrf-to-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32546.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32546.json new file mode 100644 index 00000000000..44dd999cf0b --- /dev/null +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32546.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32546", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:42.973", + "lastModified": "2025-04-17T16:15:42.973", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in gtlwpdev All push notification for WP allows Reflected XSS. This issue affects All push notification for WP: from n/a through 1.5.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/all-push-notification/vulnerability/wordpress-all-push-notification-for-wp-plugin-1-5-3-csrf-to-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32548.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32548.json new file mode 100644 index 00000000000..4a0e1d4b3d8 --- /dev/null +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32548.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32548", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:43.117", + "lastModified": "2025-04-17T16:15:43.117", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in borisolhor Hamburger Icon Menu Lite allows Reflected XSS. This issue affects Hamburger Icon Menu Lite: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/hamburger-icon-menu-lite/vulnerability/wordpress-hamburger-icon-menu-lite-plugin-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32552.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32552.json new file mode 100644 index 00000000000..d908a0489b2 --- /dev/null +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32552.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32552", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:43.247", + "lastModified": "2025-04-17T16:15:43.247", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPFactory MSRP (RRP) Pricing for WooCommerce allows Reflected XSS. This issue affects MSRP (RRP) Pricing for WooCommerce: from n/a through 1.8.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/msrp-for-woocommerce/vulnerability/wordpress-msrp-rrp-pricing-for-woocommerce-plugin-1-7-12-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32554.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32554.json new file mode 100644 index 00000000000..9b034c3ea91 --- /dev/null +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32554.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32554", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:43.380", + "lastModified": "2025-04-17T16:15:43.380", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Raptive Raptive Ads allows Reflected XSS. This issue affects Raptive Ads: from n/a through 3.7.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/adthrive-ads/vulnerability/wordpress-raptive-ads-plugin-3-7-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32557.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32557.json new file mode 100644 index 00000000000..dc98e01d04e --- /dev/null +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32557.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32557", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:43.517", + "lastModified": "2025-04-17T16:15:43.517", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rico Macchi WP Featured Screenshot allows Reflected XSS. This issue affects WP Featured Screenshot: from n/a through 1.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-featured-screenshot/vulnerability/wordpress-wp-featured-screenshot-plugin-1-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32560.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32560.json new file mode 100644 index 00000000000..ef26028b6c8 --- /dev/null +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32560.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32560", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:43.653", + "lastModified": "2025-04-17T16:15:43.653", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mohammad I. Okfie WP-Hijri allows Reflected XSS. This issue affects WP-Hijri: from n/a through 1.5.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-hijri/vulnerability/wordpress-wp-hijri-plugin-1-5-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32561.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32561.json new file mode 100644 index 00000000000..1edde53f402 --- /dev/null +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32561.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32561", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:43.797", + "lastModified": "2025-04-17T16:15:43.797", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in plugins.club WP_DEBUG Toggle allows Reflected XSS. This issue affects WP_DEBUG Toggle: from n/a through 1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/enable-wp-debug-toggle/vulnerability/wordpress-wp-debug-toggle-plugin-1-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32562.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32562.json new file mode 100644 index 00000000000..2d2d7a73277 --- /dev/null +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32562.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32562", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:43.923", + "lastModified": "2025-04-17T16:15:43.923", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in aviplugins.com WP Easy Poll allows Reflected XSS. This issue affects WP Easy Poll: from n/a through 2.2.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-easy-poll-afo/vulnerability/wordpress-wp-easy-poll-plugin-2-2-9-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32564.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32564.json new file mode 100644 index 00000000000..7be0fa5297c --- /dev/null +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32564.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32564", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:44.057", + "lastModified": "2025-04-17T16:15:44.057", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in tomroyal Stop Registration Spam allows Reflected XSS. This issue affects Stop Registration Spam: from n/a through 1.24." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/stop-registration-spam/vulnerability/wordpress-stop-registration-spam-plugin-1-24-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32566.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32566.json new file mode 100644 index 00000000000..890a068a3c7 --- /dev/null +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32566.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32566", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:44.183", + "lastModified": "2025-04-17T16:15:44.183", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ashraful Sarkar Naiem License For Envato allows Reflected XSS. This issue affects License For Envato: from n/a through 1.0.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/license-envato/vulnerability/wordpress-license-for-envato-plugin-1-0-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32571.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32571.json new file mode 100644 index 00000000000..d37d4cfc4d3 --- /dev/null +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32571.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32571", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:44.317", + "lastModified": "2025-04-17T16:15:44.317", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of Untrusted Data vulnerability in turitop TuriTop Booking System allows Object Injection. This issue affects TuriTop Booking System: from n/a through 1.0.10." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/turitop-booking-system/vulnerability/wordpress-turitop-booking-system-plugin-1-0-10-php-object-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32572.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32572.json new file mode 100644 index 00000000000..dd5c6d0f5d3 --- /dev/null +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32572.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32572", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:44.443", + "lastModified": "2025-04-17T16:15:44.443", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of Untrusted Data vulnerability in Climax Themes Kata Plus allows Object Injection. This issue affects Kata Plus: from n/a through 1.5.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/kata-plus/vulnerability/wordpress-kata-plus-addons-for-elementor-widgets-extensions-and-templates-plugin-1-5-0-php-object-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32573.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32573.json new file mode 100644 index 00000000000..a5d619c90a0 --- /dev/null +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32573.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32573", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:44.577", + "lastModified": "2025-04-17T16:15:44.577", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Kiotviet KiotViet Sync allows SQL Injection. This issue affects KiotViet Sync: from n/a through 1.8.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/kiotvietsync/vulnerability/wordpress-kiotviet-sync-plugin-1-8-3-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32578.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32578.json new file mode 100644 index 00000000000..c575bbec215 --- /dev/null +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32578.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32578", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:44.703", + "lastModified": "2025-04-17T16:15:44.703", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mapro Collins Coming Soon Countdown allows Reflected XSS. This issue affects Coming Soon Countdown: from n/a through 2.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/coming-soon-countdown/vulnerability/wordpress-coming-soon-countdown-plugin-2-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32582.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32582.json new file mode 100644 index 00000000000..0fadd428719 --- /dev/null +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32582.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32582", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:44.837", + "lastModified": "2025-04-17T16:15:44.837", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in EXEIdeas International WP AutoKeyword allows Stored XSS. This issue affects WP AutoKeyword: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-autokeyword/vulnerability/wordpress-wp-autokeyword-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32583.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32583.json new file mode 100644 index 00000000000..0f24f874f74 --- /dev/null +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32583.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32583", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:44.967", + "lastModified": "2025-04-17T16:15:44.967", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Generation of Code ('Code Injection') vulnerability in termel PDF 2 Post allows Remote Code Inclusion. This issue affects PDF 2 Post: from n/a through 2.4.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.9, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/pdf2post/vulnerability/wordpress-pdf-2-post-plugin-2-4-0-remote-code-execution-rce-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32588.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32588.json new file mode 100644 index 00000000000..73011da69c7 --- /dev/null +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32588.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32588", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:45.100", + "lastModified": "2025-04-17T16:15:45.100", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Credova Financial Credova_Financial allows Reflected XSS. This issue affects Credova_Financial: from n/a through 2.4.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/credova-financial/vulnerability/wordpress-credova-financial-plugin-2-4-8-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32590.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32590.json new file mode 100644 index 00000000000..3a6014c6990 --- /dev/null +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32590.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32590", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:45.230", + "lastModified": "2025-04-17T16:15:45.230", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in tzin111 Web2application allows Reflected XSS. This issue affects Web2application: from n/a through 5.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/web2application/vulnerability/wordpress-web2application-plugin-5-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32592.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32592.json new file mode 100644 index 00000000000..2400ab1bab2 --- /dev/null +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32592.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32592", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:45.360", + "lastModified": "2025-04-17T16:15:45.360", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in RealMag777 TableOn \u2013 WordPress Posts Table Filterable allows Stored XSS. This issue affects TableOn \u2013 WordPress Posts Table Filterable: from n/a through 1.0.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/posts-table-filterable/vulnerability/wordpress-tableon-plugin-1-0-3-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32593.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32593.json new file mode 100644 index 00000000000..31ce49fe80d --- /dev/null +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32593.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32593", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:45.490", + "lastModified": "2025-04-17T16:15:45.490", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Bytes Technolab Add Product Frontend for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Add Product Frontend for WooCommerce: from n/a through 1.0.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/add-product-frontend-for-woocommerce/vulnerability/wordpress-add-product-frontend-for-woocommerce-plugin-1-0-6-arbitrary-content-deletion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32594.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32594.json new file mode 100644 index 00000000000..b857b883ad4 --- /dev/null +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32594.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32594", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:45.617", + "lastModified": "2025-04-17T16:15:45.617", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insertion of Sensitive Information Into Sent Data vulnerability in WPMinds Simple WP Events allows Retrieve Embedded Sensitive Data. This issue affects Simple WP Events: from n/a through 1.8.17." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-201" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/simple-wp-events/vulnerability/wordpress-simple-wp-events-plugin-1-8-17-sensitive-data-exposure-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32596.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32596.json new file mode 100644 index 00000000000..6850b50848a --- /dev/null +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32596.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32596", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:45.750", + "lastModified": "2025-04-17T16:15:45.750", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Generation of Code ('Code Injection') vulnerability in Rameez Iqbal Real Estate Manager allows Code Injection. This issue affects Real Estate Manager: from n/a through 7.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/real-estate-manager/vulnerability/wordpress-real-estate-manager-plugin-7-3-arbitrary-code-execution-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32602.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32602.json new file mode 100644 index 00000000000..22acbb01683 --- /dev/null +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32602.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32602", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:45.873", + "lastModified": "2025-04-17T16:15:45.873", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in aiiddqd WooMS allows Reflected XSS. This issue affects WooMS: from n/a through 9.12." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wooms/vulnerability/wordpress-wooms-plugin-9-12-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32604.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32604.json new file mode 100644 index 00000000000..f6a73347c7b --- /dev/null +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32604.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32604", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:46.010", + "lastModified": "2025-04-17T16:15:46.010", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Sajjad Aslani AWSA Shipping allows Reflected XSS. This issue affects AWSA Shipping: from n/a through 1.3.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/awsa-shipping/vulnerability/wordpress-awsa-shipping-plugin-1-3-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32605.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32605.json new file mode 100644 index 00000000000..b0221563d86 --- /dev/null +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32605.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32605", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:46.147", + "lastModified": "2025-04-17T16:15:46.147", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in expresstechsoftware MemberPress Discord Addon allows Reflected XSS. This issue affects MemberPress Discord Addon: from n/a through 1.1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/expresstechsoftwares-memberpress-discord-add-on/vulnerability/wordpress-memberpress-discord-addon-plugin-1-1-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32606.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32606.json new file mode 100644 index 00000000000..428c0044666 --- /dev/null +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32606.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32606", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:46.277", + "lastModified": "2025-04-17T16:15:46.277", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Deepak Khokhar Listings for Buildium allows Stored XSS. This issue affects Listings for Buildium: from n/a through 0.1.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/listings-for-buildium/vulnerability/wordpress-listings-for-buildium-plugin-0-1-4-csrf-to-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32608.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32608.json new file mode 100644 index 00000000000..bed8a77f628 --- /dev/null +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32608.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32608", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:46.407", + "lastModified": "2025-04-17T16:15:46.407", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Movylo Movylo Marketing Automation allows Reflected XSS. This issue affects Movylo Marketing Automation: from n/a through 2.0.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/movylo-widget/vulnerability/wordpress-movylo-marketing-automation-plugin-2-0-7-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32609.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32609.json new file mode 100644 index 00000000000..f889a09dc89 --- /dev/null +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32609.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32609", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:46.530", + "lastModified": "2025-04-17T16:15:46.530", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Picture-Planet GmbH Verowa Connect allows Reflected XSS. This issue affects Verowa Connect: from n/a through 3.0.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/verowa-connect/vulnerability/wordpress-verowa-connect-plugin-3-0-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32611.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32611.json new file mode 100644 index 00000000000..924bc6abb0e --- /dev/null +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32611.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32611", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:46.663", + "lastModified": "2025-04-17T16:15:46.663", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in We Are De WooCommerce TBC Credit Card Payment Gateway (Free) allows Reflected XSS. This issue affects WooCommerce TBC Credit Card Payment Gateway (Free): from n/a through 2.0.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/woo-tbc-payment-gateway/vulnerability/wordpress-woocommerce-tbc-credit-card-payment-gateway-free-plugin-2-0-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32613.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32613.json new file mode 100644 index 00000000000..d0075d36126 --- /dev/null +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32613.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32613", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:46.797", + "lastModified": "2025-04-17T16:15:46.797", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Bowo Debug Log Manager allows Stored XSS. This issue affects Debug Log Manager: from n/a through 2.3.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/debug-log-manager/vulnerability/wordpress-debug-log-manager-plugin-2-3-4-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32615.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32615.json new file mode 100644 index 00000000000..42d9aefa1a4 --- /dev/null +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32615.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32615", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:46.923", + "lastModified": "2025-04-17T16:15:46.923", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Clinked Clinked Client Portal allows Reflected XSS. This issue affects Clinked Client Portal: from n/a through 1.10." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/clinked-client-portal/vulnerability/wordpress-clinked-client-portal-plugin-1-9-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32620.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32620.json new file mode 100644 index 00000000000..c82344692fb --- /dev/null +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32620.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32620", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:47.053", + "lastModified": "2025-04-17T16:15:47.053", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in fromdoppler Doppler Forms allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Doppler Forms: from n/a through 2.4.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/doppler-form/vulnerability/wordpress-doppler-forms-plugin-2-4-5-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32622.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32622.json new file mode 100644 index 00000000000..5a13715491c --- /dev/null +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32622.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32622", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:47.187", + "lastModified": "2025-04-17T16:15:47.187", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in OTP-less OTP-less one tap Sign in allows Reflected XSS. This issue affects OTP-less one tap Sign in: from n/a through 2.0.58." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/otpless/vulnerability/wordpress-otp-less-one-tap-sign-in-plugin-2-0-57-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32625.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32625.json new file mode 100644 index 00000000000..491ac7ef408 --- /dev/null +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32625.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32625", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:47.317", + "lastModified": "2025-04-17T16:15:47.317", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in pootlepress Mobile Pages allows Reflected XSS. This issue affects Mobile Pages: from n/a through 1.0.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/mobile-pages/vulnerability/wordpress-mobile-blocks-plugin-1-0-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32626.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32626.json new file mode 100644 index 00000000000..86ccf70e3cd --- /dev/null +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32626.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32626", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:47.443", + "lastModified": "2025-04-17T16:15:47.443", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in JoomSky JS Job Manager allows SQL Injection. This issue affects JS Job Manager: from n/a through 2.0.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/js-jobs/vulnerability/wordpress-js-job-manager-plugin-2-0-2-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32628.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32628.json new file mode 100644 index 00000000000..3b82a72fc33 --- /dev/null +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32628.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32628", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:47.577", + "lastModified": "2025-04-17T16:15:47.577", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Wham Crowdfunding for WooCommerce allows Reflected XSS. This issue affects Crowdfunding for WooCommerce: from n/a through 3.1.12." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/crowdfunding-for-woocommerce/vulnerability/wordpress-crowdfunding-for-woocommerce-plugin-3-1-12-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32630.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32630.json new file mode 100644 index 00000000000..cfe64bef8d0 --- /dev/null +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32630.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32630", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:47.717", + "lastModified": "2025-04-17T16:15:47.717", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CMSJunkie - WordPress Business Directory Plugins WP-BusinessDirectory allows Reflected XSS. This issue affects WP-BusinessDirectory: from n/a through 3.1.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-businessdirectory/vulnerability/wordpress-wp-businessdirectory-plugin-3-1-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32634.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32634.json new file mode 100644 index 00000000000..3b4790f7747 --- /dev/null +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32634.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32634", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:47.860", + "lastModified": "2025-04-17T16:15:47.860", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in mdedev Run Contests, Raffles, and Giveaways with ContestsWP allows Reflected XSS. This issue affects Run Contests, Raffles, and Giveaways with ContestsWP: from n/a through 2.0.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/contest-code-checker/vulnerability/wordpress-run-contests-raffles-and-giveaways-plugin-2-0-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32635.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32635.json new file mode 100644 index 00000000000..74c9ddf9107 --- /dev/null +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32635.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32635", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:48.003", + "lastModified": "2025-04-17T16:15:48.003", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insertion of Sensitive Information Into Sent Data vulnerability in Hive Support Hive Support allows Retrieve Embedded Sensitive Data. This issue affects Hive Support: from n/a through 1.2.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-201" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/hive-support/vulnerability/wordpress-hive-support-plugin-1-2-2-sensitive-data-exposure-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32636.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32636.json new file mode 100644 index 00000000000..88d993afce5 --- /dev/null +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32636.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32636", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:48.133", + "lastModified": "2025-04-17T16:15:48.133", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in matthewrubin Local Magic allows SQL Injection. This issue affects Local Magic: from n/a through 2.6.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/local-magic/vulnerability/wordpress-local-magic-plugin-2-6-0-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32637.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32637.json new file mode 100644 index 00000000000..1366e305fc7 --- /dev/null +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32637.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32637", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:48.260", + "lastModified": "2025-04-17T16:15:48.260", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ketanajani WP Donate allows Stored XSS. This issue affects WP Donate: from n/a through 2.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-donate/vulnerability/wordpress-wp-donate-plugin-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32638.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32638.json new file mode 100644 index 00000000000..f3c81584547 --- /dev/null +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32638.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32638", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:48.383", + "lastModified": "2025-04-17T16:15:48.383", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in weptile ShopApper allows Stored XSS. This issue affects ShopApper: from n/a through 0.4.39." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/mobile-app-for-woocommerce/vulnerability/wordpress-shopapper-plugin-0-4-37-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32639.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32639.json new file mode 100644 index 00000000000..968dce1b732 --- /dev/null +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32639.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32639", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:48.513", + "lastModified": "2025-04-17T16:15:48.513", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wecantrack Affiliate Links Lite allows Reflected XSS. This issue affects Affiliate Links Lite: from n/a through 3.1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/affiliate-links/vulnerability/wordpress-affiliate-links-plugin-3-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32646.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32646.json new file mode 100644 index 00000000000..0f9f91e42a1 --- /dev/null +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32646.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32646", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:48.647", + "lastModified": "2025-04-17T16:15:48.647", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PickPlugins Question Answer allows Reflected XSS. This issue affects Question Answer: from n/a through 1.2.70." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/question-answer/vulnerability/wordpress-question-answer-plugin-1-2-70-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32647.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32647.json new file mode 100644 index 00000000000..0554a2570b7 --- /dev/null +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32647.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32647", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:48.770", + "lastModified": "2025-04-17T16:15:48.770", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of Untrusted Data vulnerability in PickPlugins Question Answer allows Object Injection. This issue affects Question Answer: from n/a through 1.2.70." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/question-answer/vulnerability/wordpress-question-answer-plugin-1-2-70-php-object-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32648.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32648.json new file mode 100644 index 00000000000..06825507b60 --- /dev/null +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32648.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32648", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:48.903", + "lastModified": "2025-04-17T16:15:48.903", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect Privilege Assignment vulnerability in Projectopia Projectopia allows Privilege Escalation. This issue affects Projectopia: from n/a through 5.1.16." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/projectopia-core/vulnerability/wordpress-projectopia-project-magement-plugin-5-1-15-privilege-escalation-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32649.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32649.json new file mode 100644 index 00000000000..559a8237e61 --- /dev/null +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32649.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32649", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:49.033", + "lastModified": "2025-04-17T16:15:49.033", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in gb-plugins GB Gallery Slideshow allows Reflected XSS. This issue affects GB Gallery Slideshow: from n/a through 1.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/gb-gallery-slideshow/vulnerability/wordpress-gb-gallery-slideshow-plugin-1-3-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32651.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32651.json new file mode 100644 index 00000000000..750e4a84cf5 --- /dev/null +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32651.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32651", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:49.167", + "lastModified": "2025-04-17T16:15:49.167", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in serpednet SERPed.net allows Reflected XSS. This issue affects SERPed.net: from n/a through 4.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/serped-net/vulnerability/wordpress-serped-net-plugin-4-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32652.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32652.json new file mode 100644 index 00000000000..983091a017d --- /dev/null +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32652.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32652", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:49.293", + "lastModified": "2025-04-17T16:15:49.293", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Unrestricted Upload of File with Dangerous Type vulnerability in solacewp Solace Extra allows Using Malicious Files. This issue affects Solace Extra: from n/a through 1.3.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.9, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/solace-extra/vulnerability/wordpress-solace-extra-plugin-1-3-1-arbitrary-file-upload-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32653.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32653.json new file mode 100644 index 00000000000..db87c1a1d08 --- /dev/null +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32653.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32653", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:49.427", + "lastModified": "2025-04-17T16:15:49.427", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Lee Blue Cart66 Cloud allows Reflected XSS. This issue affects Cart66 Cloud: from n/a through 2.3.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/cart66-cloud/vulnerability/wordpress-cart66-cloud-plugin-2-3-7-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32655.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32655.json new file mode 100644 index 00000000000..6ace6244198 --- /dev/null +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32655.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32655", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:49.560", + "lastModified": "2025-04-17T16:15:49.560", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in DevriX Restrict User Registration allows Stored XSS. This issue affects Restrict User Registration: from n/a through 1.0.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/restrict-user-registration/vulnerability/wordpress-restrict-user-registration-plugin-1-0-1-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32658.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32658.json new file mode 100644 index 00000000000..3d83815173e --- /dev/null +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32658.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32658", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:49.687", + "lastModified": "2025-04-17T16:15:49.687", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of Untrusted Data vulnerability in wpWax HelpGent allows Object Injection. This issue affects HelpGent: from n/a through 2.2.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/helpgent/vulnerability/wordpress-helpgent-plugin-2-2-4-php-object-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32660.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32660.json new file mode 100644 index 00000000000..07e5076459e --- /dev/null +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32660.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32660", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:49.817", + "lastModified": "2025-04-17T16:15:49.817", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Unrestricted Upload of File with Dangerous Type vulnerability in JoomSky JS Job Manager allows Upload a Web Shell to a Web Server. This issue affects JS Job Manager: from n/a through 2.0.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 10.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/js-jobs/vulnerability/wordpress-js-job-manager-plugin-2-0-2-arbitrary-file-upload-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32662.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32662.json new file mode 100644 index 00000000000..7c2d0c98194 --- /dev/null +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32662.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32662", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:49.950", + "lastModified": "2025-04-17T16:15:49.950", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of Untrusted Data vulnerability in Stylemix uListing allows Object Injection. This issue affects uListing: from n/a through 2.2.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/ulisting/vulnerability/wordpress-ulisting-plugin-2-1-9-deserialization-of-untrusted-data-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32665.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32665.json new file mode 100644 index 00000000000..7041247b4e3 --- /dev/null +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32665.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32665", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:50.080", + "lastModified": "2025-04-17T16:15:50.080", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WebbyTemplate Office Locator allows SQL Injection. This issue affects Office Locator: from n/a through 1.3.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/office-locator/vulnerability/wordpress-office-locator-plugin-1-3-0-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32666.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32666.json new file mode 100644 index 00000000000..e7addce66d2 --- /dev/null +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32666.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32666", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:50.207", + "lastModified": "2025-04-17T16:15:50.207", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Hive Support Hive Support allows Reflected XSS. This issue affects Hive Support: from n/a through 1.2.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/hive-support/vulnerability/wordpress-hive-support-plugin-1-2-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32670.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32670.json new file mode 100644 index 00000000000..4793cdda17a --- /dev/null +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32670.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32670", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:50.330", + "lastModified": "2025-04-17T16:15:50.330", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mark Parnell Spark GF Failed Submissions allows Reflected XSS. This issue affects Spark GF Failed Submissions: from n/a through 1.3.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/spark-gf-failed-submissions/vulnerability/wordpress-spark-gf-failed-submissions-plugin-1-3-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32674.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32674.json new file mode 100644 index 00000000000..e24cd38d897 --- /dev/null +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32674.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32674", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:50.480", + "lastModified": "2025-04-17T16:15:50.480", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPFactory Product Excel Import Export & Bulk Edit for WooCommerce allows Reflected XSS. This issue affects Product Excel Import Export & Bulk Edit for WooCommerce: from n/a through 4.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/webd-woocommerce-product-excel-importer-bulk-edit/vulnerability/wordpress-product-excel-import-export-bulk-edit-for-woocommerce-plugin-4-7-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32682.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32682.json new file mode 100644 index 00000000000..ce41645043a --- /dev/null +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32682.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32682", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:50.623", + "lastModified": "2025-04-17T16:15:50.623", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Unrestricted Upload of File with Dangerous Type vulnerability in RomanCode MapSVG Lite allows Upload a Web Shell to a Web Server. This issue affects MapSVG Lite: from n/a through 8.5.34." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.9, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/mapsvg-lite-interactive-vector-maps/vulnerability/wordpress-mapsvg-lite-plugin-8-5-32-arbitrary-file-upload-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32686.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32686.json new file mode 100644 index 00000000000..78155a6f326 --- /dev/null +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32686.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32686", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:50.750", + "lastModified": "2025-04-17T16:15:50.750", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of Untrusted Data vulnerability in WP Speedo Team Members allows Object Injection. This issue affects Team Members: from n/a through 3.4.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wps-team/vulnerability/wordpress-team-members-3-4-0-php-object-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-328xx/CVE-2025-32817.json b/CVE-2025/CVE-2025-328xx/CVE-2025-32817.json index 5ca6cc10033..aac7800109f 100644 --- a/CVE-2025/CVE-2025-328xx/CVE-2025-32817.json +++ b/CVE-2025/CVE-2025-328xx/CVE-2025-32817.json @@ -2,7 +2,7 @@ "id": "CVE-2025-32817", "sourceIdentifier": "PSIRT@sonicwall.com", "published": "2025-04-16T20:15:19.077", - "lastModified": "2025-04-16T21:15:47.780", + "lastModified": "2025-04-17T16:15:50.883", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -18,20 +18,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", - "baseScore": 7.3, - "baseSeverity": "HIGH", - "attackVector": "NETWORK", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "LOW", + "confidentialityImpact": "NONE", "integrityImpact": "LOW", - "availabilityImpact": "LOW" + "availabilityImpact": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 3.4 + "exploitabilityScore": 1.8, + "impactScore": 4.2 } ] }, diff --git a/CVE-2025/CVE-2025-36xx/CVE-2025-3651.json b/CVE-2025/CVE-2025-36xx/CVE-2025-3651.json index a16c1890491..ac22427100a 100644 --- a/CVE-2025/CVE-2025-36xx/CVE-2025-3651.json +++ b/CVE-2025/CVE-2025-36xx/CVE-2025-3651.json @@ -2,13 +2,13 @@ "id": "CVE-2025-3651", "sourceIdentifier": "5d978718-751a-428d-ac8e-4f9445ebfd11", "published": "2025-04-17T15:15:58.620", - "lastModified": "2025-04-17T15:15:58.620", + "lastModified": "2025-04-17T16:15:59.530", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Improper Verification of Source of a Communication Channel in Work Desktop for Mac versions below 10.8.2.33 allows attackers to execute arbitrary commands via unauthorized access to the Agent service." + "value": "Improper Verification of Source of a Communication Channel in Work Desktop for Mac versions 10.8.1.46 and earlier\n\n allows attackers to execute arbitrary commands via unauthorized access to the Agent service.\u00a0\n\nThis has been remediated in Work Desktop for Mac version 10.8.2.33." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-394xx/CVE-2025-39414.json b/CVE-2025/CVE-2025-394xx/CVE-2025-39414.json new file mode 100644 index 00000000000..9ee1d070e77 --- /dev/null +++ b/CVE-2025/CVE-2025-394xx/CVE-2025-39414.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39414", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:51.030", + "lastModified": "2025-04-17T16:15:51.030", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Mike spam-stopper allows Stored XSS. This issue affects spam-stopper: from n/a through 3.1.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/spam-stopper/vulnerability/wordpress-spam-stopper-plugin-3-1-3-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-394xx/CVE-2025-39415.json b/CVE-2025/CVE-2025-394xx/CVE-2025-39415.json new file mode 100644 index 00000000000..a4f1ff0707a --- /dev/null +++ b/CVE-2025/CVE-2025-394xx/CVE-2025-39415.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39415", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:51.167", + "lastModified": "2025-04-17T16:15:51.167", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Jayesh Parejiya Social Media Links allows Stored XSS. This issue affects Social Media Links: from n/a through 1.0.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/social-media-links/vulnerability/wordpress-social-media-links-plugin-1-0-3-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-394xx/CVE-2025-39416.json b/CVE-2025/CVE-2025-394xx/CVE-2025-39416.json new file mode 100644 index 00000000000..df61d105f13 --- /dev/null +++ b/CVE-2025/CVE-2025-394xx/CVE-2025-39416.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39416", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:51.290", + "lastModified": "2025-04-17T16:15:51.290", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Ichi translit it! allows Stored XSS. This issue affects translit it!: from n/a through 1.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/translit-it/vulnerability/wordpress-translit-it-plugin-1-6-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-394xx/CVE-2025-39417.json b/CVE-2025/CVE-2025-394xx/CVE-2025-39417.json new file mode 100644 index 00000000000..da53c2e0138 --- /dev/null +++ b/CVE-2025/CVE-2025-394xx/CVE-2025-39417.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39417", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:51.410", + "lastModified": "2025-04-17T16:15:51.410", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Eslam Mahmoud Redirect wordpress to welcome or landing page allows Stored XSS. This issue affects Redirect wordpress to welcome or landing page: from n/a through 2.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/redirect-to-welcome-or-landing-page/vulnerability/wordpress-redirect-wordpress-to-welcome-or-landing-page-plugin-2-0-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-394xx/CVE-2025-39418.json b/CVE-2025/CVE-2025-394xx/CVE-2025-39418.json new file mode 100644 index 00000000000..0ecc0986de6 --- /dev/null +++ b/CVE-2025/CVE-2025-394xx/CVE-2025-39418.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39418", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:51.537", + "lastModified": "2025-04-17T16:15:51.537", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in ajayver RSS Manager allows Stored XSS. This issue affects RSS Manager: from n/a through 0.06." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/rss-manager/vulnerability/wordpress-rss-manager-plugin-0-06-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-394xx/CVE-2025-39419.json b/CVE-2025/CVE-2025-394xx/CVE-2025-39419.json new file mode 100644 index 00000000000..e850ae29520 --- /dev/null +++ b/CVE-2025/CVE-2025-394xx/CVE-2025-39419.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39419", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:51.673", + "lastModified": "2025-04-17T16:15:51.673", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in David Miller Revision Diet allows Stored XSS. This issue affects Revision Diet: from n/a through 1.0.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/revision-diet/vulnerability/wordpress-revision-diet-plugin-1-0-1-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-394xx/CVE-2025-39420.json b/CVE-2025/CVE-2025-394xx/CVE-2025-39420.json new file mode 100644 index 00000000000..7227c25b2aa --- /dev/null +++ b/CVE-2025/CVE-2025-394xx/CVE-2025-39420.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39420", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:51.800", + "lastModified": "2025-04-17T16:15:51.800", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ruudkok WP Twitter Button allows Stored XSS. This issue affects WP Twitter Button: from n/a through 1.4.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-twitter-button/vulnerability/wordpress-wp-twitter-button-plugin-1-4-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-394xx/CVE-2025-39421.json b/CVE-2025/CVE-2025-394xx/CVE-2025-39421.json new file mode 100644 index 00000000000..c3ec024142a --- /dev/null +++ b/CVE-2025/CVE-2025-394xx/CVE-2025-39421.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39421", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:51.933", + "lastModified": "2025-04-17T16:15:51.933", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Mustafa KUCUK WP Sticky Side Buttons allows Stored XSS. This issue affects WP Sticky Side Buttons: from n/a through 2.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-sticky-side-buttons/vulnerability/wordpress-wp-sticky-side-buttons-plugin-2-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-394xx/CVE-2025-39422.json b/CVE-2025/CVE-2025-394xx/CVE-2025-39422.json new file mode 100644 index 00000000000..32a69f6d842 --- /dev/null +++ b/CVE-2025/CVE-2025-394xx/CVE-2025-39422.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39422", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:52.067", + "lastModified": "2025-04-17T16:15:52.067", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in PResponsive WP Social Bookmarking allows Stored XSS. This issue affects WP Social Bookmarking: from n/a through 3.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-social-bookmarking/vulnerability/wordpress-wp-social-bookmarking-plugin-3-6-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-394xx/CVE-2025-39423.json b/CVE-2025/CVE-2025-394xx/CVE-2025-39423.json new file mode 100644 index 00000000000..6025abd664d --- /dev/null +++ b/CVE-2025/CVE-2025-394xx/CVE-2025-39423.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39423", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:52.203", + "lastModified": "2025-04-17T16:15:52.203", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Jenst Add to Header allows Stored XSS. This issue affects Add to Header: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/add-to-header/vulnerability/wordpress-add-to-header-plugin-1-0-csrf-to-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-394xx/CVE-2025-39424.json b/CVE-2025/CVE-2025-394xx/CVE-2025-39424.json new file mode 100644 index 00000000000..ba04f69992e --- /dev/null +++ b/CVE-2025/CVE-2025-394xx/CVE-2025-39424.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39424", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:52.340", + "lastModified": "2025-04-17T16:15:52.340", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in simplemaps Simple Maps allows Stored XSS. This issue affects Simple Maps: from n/a through 0.98." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/interactive-maps/vulnerability/wordpress-simple-maps-plugin-0-98-csrf-to-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-394xx/CVE-2025-39425.json b/CVE-2025/CVE-2025-394xx/CVE-2025-39425.json new file mode 100644 index 00000000000..12abf67d7ae --- /dev/null +++ b/CVE-2025/CVE-2025-394xx/CVE-2025-39425.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39425", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:52.477", + "lastModified": "2025-04-17T16:15:52.477", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in pixelgrade Style Manager allows Cross Site Request Forgery. This issue affects Style Manager: from n/a through 2.2.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/style-manager/vulnerability/wordpress-style-manager-plugin-2-2-7-cross-site-request-forgery-csrf-to-settings-change-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-394xx/CVE-2025-39426.json b/CVE-2025/CVE-2025-394xx/CVE-2025-39426.json new file mode 100644 index 00000000000..6537032ce5d --- /dev/null +++ b/CVE-2025/CVE-2025-394xx/CVE-2025-39426.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39426", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:52.610", + "lastModified": "2025-04-17T16:15:52.610", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in illow illow \u2013 Cookies Consent allows Cross Site Request Forgery. This issue affects illow \u2013 Cookies Consent: from n/a through 0.2.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/lgpd-compliant-cookie-banner/vulnerability/wordpress-illow-cookies-consent-plugin-0-2-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-394xx/CVE-2025-39427.json b/CVE-2025/CVE-2025-394xx/CVE-2025-39427.json new file mode 100644 index 00000000000..c5408751c57 --- /dev/null +++ b/CVE-2025/CVE-2025-394xx/CVE-2025-39427.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39427", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:52.750", + "lastModified": "2025-04-17T16:15:52.750", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Beth Tucker Long WP Post to PDF Enhanced allows Stored XSS. This issue affects WP Post to PDF Enhanced: from n/a through 1.1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-post-to-pdf-enhanced/vulnerability/wordpress-wp-post-to-pdf-enhanced-plugin-1-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-394xx/CVE-2025-39428.json b/CVE-2025/CVE-2025-394xx/CVE-2025-39428.json new file mode 100644 index 00000000000..68937495eb0 --- /dev/null +++ b/CVE-2025/CVE-2025-394xx/CVE-2025-39428.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39428", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:52.890", + "lastModified": "2025-04-17T16:15:52.890", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Maros Pristas Gravity Forms CSS Themes with Fontawesome and Placeholders allows Stored XSS. This issue affects Gravity Forms CSS Themes with Fontawesome and Placeholders: from n/a through 8.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/gravity-forms-css-themes-with-fontawesome-and-placeholder-support/vulnerability/wordpress-gravity-forms-css-themes-with-fontawesome-and-placeholders-plugin-8-5-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-394xx/CVE-2025-39429.json b/CVE-2025/CVE-2025-394xx/CVE-2025-39429.json new file mode 100644 index 00000000000..eaa05f3b361 --- /dev/null +++ b/CVE-2025/CVE-2025-394xx/CVE-2025-39429.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39429", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:53.033", + "lastModified": "2025-04-17T16:15:53.033", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in F\u00f6ldesi, Mih\u00e1ly Sz\u00e9chenyi 2020 Logo allows PHP Local File Inclusion. This issue affects Sz\u00e9chenyi 2020 Logo: from n/a through 1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/szechenyi-2020-logo/vulnerability/wordpress-szechenyi-2020-logo-1-1-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-394xx/CVE-2025-39430.json b/CVE-2025/CVE-2025-394xx/CVE-2025-39430.json new file mode 100644 index 00000000000..2d7447ceaec --- /dev/null +++ b/CVE-2025/CVE-2025-394xx/CVE-2025-39430.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39430", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:53.167", + "lastModified": "2025-04-17T16:15:53.167", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Alexander Rauscha mLanguage allows Stored XSS. This issue affects mLanguage: from n/a through 1.6.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/mlanguage/vulnerability/wordpress-mlanguage-plugin-1-6-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-394xx/CVE-2025-39431.json b/CVE-2025/CVE-2025-394xx/CVE-2025-39431.json new file mode 100644 index 00000000000..bc074a0838d --- /dev/null +++ b/CVE-2025/CVE-2025-394xx/CVE-2025-39431.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39431", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:53.307", + "lastModified": "2025-04-17T16:15:53.307", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Aaron Forgue Amazon Showcase WordPress Plugin allows Stored XSS. This issue affects Amazon Showcase WordPress Plugin: from n/a through 2.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/amazon-showcase-wordpress-widget/vulnerability/wordpress-amazon-showcase-wordpress-plugin-plugin-2-2-csrf-to-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-394xx/CVE-2025-39432.json b/CVE-2025/CVE-2025-394xx/CVE-2025-39432.json new file mode 100644 index 00000000000..b3ae70b666d --- /dev/null +++ b/CVE-2025/CVE-2025-394xx/CVE-2025-39432.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39432", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:53.437", + "lastModified": "2025-04-17T16:15:53.437", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in antonchanning bbPress2 shortcode whitelist allows Stored XSS. This issue affects bbPress2 shortcode whitelist: from n/a through 2.2.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/bbpress2-shortcode-whitelist/vulnerability/wordpress-bbpress2-shortcode-whitelist-plugin-2-2-1-csrf-to-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-394xx/CVE-2025-39433.json b/CVE-2025/CVE-2025-394xx/CVE-2025-39433.json new file mode 100644 index 00000000000..c84a2befc56 --- /dev/null +++ b/CVE-2025/CVE-2025-394xx/CVE-2025-39433.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39433", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:53.560", + "lastModified": "2025-04-17T16:15:53.560", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in beke_ro Bknewsticker allows Stored XSS. This issue affects Bknewsticker: from n/a through 1.0.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/bknewsticker/vulnerability/wordpress-bknewsticker-plugin-1-0-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-394xx/CVE-2025-39434.json b/CVE-2025/CVE-2025-394xx/CVE-2025-39434.json new file mode 100644 index 00000000000..9ac4dc49495 --- /dev/null +++ b/CVE-2025/CVE-2025-394xx/CVE-2025-39434.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39434", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:53.683", + "lastModified": "2025-04-17T16:15:53.683", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Authorization Bypass Through User-Controlled Key vulnerability in Scott Taylor Avatar allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Avatar: from n/a through 0.1.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/avatar/vulnerability/wordpress-avatar-plugin-0-1-4-insecure-direct-object-references-idor-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-394xx/CVE-2025-39435.json b/CVE-2025/CVE-2025-394xx/CVE-2025-39435.json new file mode 100644 index 00000000000..5bdbed14531 --- /dev/null +++ b/CVE-2025/CVE-2025-394xx/CVE-2025-39435.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39435", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:53.813", + "lastModified": "2025-04-17T16:15:53.813", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in davidfcarr My Marginalia allows Stored XSS. This issue affects My Marginalia: from n/a through 1.0.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/my-marginalia/vulnerability/wordpress-my-marginalia-plugin-1-0-6-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-394xx/CVE-2025-39436.json b/CVE-2025/CVE-2025-394xx/CVE-2025-39436.json new file mode 100644 index 00000000000..b5230088e07 --- /dev/null +++ b/CVE-2025/CVE-2025-394xx/CVE-2025-39436.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39436", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:53.940", + "lastModified": "2025-04-17T16:15:53.940", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Unrestricted Upload of File with Dangerous Type vulnerability in aidraw I Draw allows Using Malicious Files. This issue affects I Draw: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/idraw/vulnerability/wordpress-i-draw-1-0-arbitrary-file-upload-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-394xx/CVE-2025-39437.json b/CVE-2025/CVE-2025-394xx/CVE-2025-39437.json new file mode 100644 index 00000000000..43f1dcc146f --- /dev/null +++ b/CVE-2025/CVE-2025-394xx/CVE-2025-39437.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39437", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:54.077", + "lastModified": "2025-04-17T16:15:54.077", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Boone Gorges Anthologize allows Cross Site Request Forgery. This issue affects Anthologize: from n/a through 0.8.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/anthologize/vulnerability/wordpress-anthologize-plugin-0-8-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-394xx/CVE-2025-39438.json b/CVE-2025/CVE-2025-394xx/CVE-2025-39438.json new file mode 100644 index 00000000000..6ea13edd970 --- /dev/null +++ b/CVE-2025/CVE-2025-394xx/CVE-2025-39438.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39438", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:54.210", + "lastModified": "2025-04-17T16:15:54.210", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in momen2009 Theme Changer allows Cross Site Request Forgery. This issue affects Theme Changer: from n/a through 1.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/theme-changer/vulnerability/wordpress-theme-changer-plugin-1-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-394xx/CVE-2025-39439.json b/CVE-2025/CVE-2025-394xx/CVE-2025-39439.json new file mode 100644 index 00000000000..ef79a70422f --- /dev/null +++ b/CVE-2025/CVE-2025-394xx/CVE-2025-39439.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39439", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:54.350", + "lastModified": "2025-04-17T16:15:54.350", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Markus Drubba wpLike2Get allows Retrieve Embedded Sensitive Data. This issue affects wpLike2Get: from n/a through 1.2.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-497" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wplike2get/vulnerability/wordpress-wplike2get-plugin-1-2-9-sensitive-data-exposure-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-394xx/CVE-2025-39440.json b/CVE-2025/CVE-2025-394xx/CVE-2025-39440.json new file mode 100644 index 00000000000..95e8813725f --- /dev/null +++ b/CVE-2025/CVE-2025-394xx/CVE-2025-39440.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39440", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:54.497", + "lastModified": "2025-04-17T16:15:54.497", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Rajesh Broken Links Remover allows Stored XSS. This issue affects Broken Links Remover: from n/a through 1.2.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/broken-links-remover/vulnerability/wordpress-broken-links-remover-plugin-1-2-2-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-394xx/CVE-2025-39441.json b/CVE-2025/CVE-2025-394xx/CVE-2025-39441.json new file mode 100644 index 00000000000..6da3ecd3cfa --- /dev/null +++ b/CVE-2025/CVE-2025-394xx/CVE-2025-39441.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39441", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:54.640", + "lastModified": "2025-04-17T16:15:54.640", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in swedish boy Dashboard Notepads allows Stored XSS. This issue affects Dashboard Notepads: from n/a through 1.2.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/dashboard-notepads/vulnerability/wordpress-dashboard-notepads-plugin-1-2-1-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-394xx/CVE-2025-39442.json b/CVE-2025/CVE-2025-394xx/CVE-2025-39442.json new file mode 100644 index 00000000000..3f8b53cc3bc --- /dev/null +++ b/CVE-2025/CVE-2025-394xx/CVE-2025-39442.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39442", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:54.770", + "lastModified": "2025-04-17T16:15:54.770", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in MessageMetric Review Wave \u2013 Google Places Reviews allows Stored XSS. This issue affects Review Wave \u2013 Google Places Reviews: from n/a through 1.4.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/review-wave-google-places-reviews/vulnerability/wordpress-review-wave-google-places-reviews-plugin-1-4-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-394xx/CVE-2025-39443.json b/CVE-2025/CVE-2025-394xx/CVE-2025-39443.json new file mode 100644 index 00000000000..16f6bf1901a --- /dev/null +++ b/CVE-2025/CVE-2025-394xx/CVE-2025-39443.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39443", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:54.910", + "lastModified": "2025-04-17T16:15:54.910", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Soft8Soft LLC Verge3D allows Cross Site Request Forgery. This issue affects Verge3D: from n/a through 4.9.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/verge3d/vulnerability/wordpress-verge3d-plugin-4-9-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-394xx/CVE-2025-39444.json b/CVE-2025/CVE-2025-394xx/CVE-2025-39444.json new file mode 100644 index 00000000000..f273a13e570 --- /dev/null +++ b/CVE-2025/CVE-2025-394xx/CVE-2025-39444.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39444", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:55.043", + "lastModified": "2025-04-17T16:15:55.043", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in maxfoundry MaxButtons allows Stored XSS. This issue affects MaxButtons: from n/a through 9.8.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/maxbuttons/vulnerability/wordpress-maxbuttons-plugin-9-8-3-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-394xx/CVE-2025-39452.json b/CVE-2025/CVE-2025-394xx/CVE-2025-39452.json new file mode 100644 index 00000000000..158f6c1e580 --- /dev/null +++ b/CVE-2025/CVE-2025-394xx/CVE-2025-39452.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39452", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:55.177", + "lastModified": "2025-04-17T16:15:55.177", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Themewinter WPCafe allows PHP Local File Inclusion. This issue affects WPCafe: from n/a through 2.2.32." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-cafe/vulnerability/wordpress-wpcafe-plugin-2-2-32-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-394xx/CVE-2025-39453.json b/CVE-2025/CVE-2025-394xx/CVE-2025-39453.json new file mode 100644 index 00000000000..14e78adf156 --- /dev/null +++ b/CVE-2025/CVE-2025-394xx/CVE-2025-39453.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39453", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:55.300", + "lastModified": "2025-04-17T16:15:55.300", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in algol.plus Advanced Dynamic Pricing for WooCommerce allows Cross Site Request Forgery. This issue affects Advanced Dynamic Pricing for WooCommerce: from n/a through 4.9.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/advanced-dynamic-pricing-for-woocommerce/vulnerability/wordpress-advanced-dynamic-pricing-for-woocommerce-plugin-4-9-3-cross-site-request-forgery-csrf-to-settings-change-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-394xx/CVE-2025-39455.json b/CVE-2025/CVE-2025-394xx/CVE-2025-39455.json new file mode 100644 index 00000000000..d90e93c014e --- /dev/null +++ b/CVE-2025/CVE-2025-394xx/CVE-2025-39455.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39455", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:55.430", + "lastModified": "2025-04-17T16:15:55.430", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in ip2location IP2Location Variables allows Reflected XSS. This issue affects IP2Location Variables: from n/a through 2.9.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/ip2location-variables/vulnerability/wordpress-ip2location-variables-plugin-2-9-5-csrf-to-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-394xx/CVE-2025-39456.json b/CVE-2025/CVE-2025-394xx/CVE-2025-39456.json new file mode 100644 index 00000000000..f1e98597ae8 --- /dev/null +++ b/CVE-2025/CVE-2025-394xx/CVE-2025-39456.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39456", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:55.557", + "lastModified": "2025-04-17T16:15:55.557", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in iTRON WP Logger allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WP Logger: from n/a through 2.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-data-logger/vulnerability/wordpress-wp-logger-plugin-2-2-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-394xx/CVE-2025-39457.json b/CVE-2025/CVE-2025-394xx/CVE-2025-39457.json new file mode 100644 index 00000000000..d359d7982ff --- /dev/null +++ b/CVE-2025/CVE-2025-394xx/CVE-2025-39457.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39457", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:55.690", + "lastModified": "2025-04-17T16:15:55.690", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in magepeopleteam Booking and Rental Manager allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Booking and Rental Manager: from n/a through 2.2.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/booking-and-rental-manager-for-woocommerce/vulnerability/wordpress-booking-and-rental-manager-plugin-2-2-8-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-394xx/CVE-2025-39461.json b/CVE-2025/CVE-2025-394xx/CVE-2025-39461.json new file mode 100644 index 00000000000..cf8439be030 --- /dev/null +++ b/CVE-2025/CVE-2025-394xx/CVE-2025-39461.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39461", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:55.830", + "lastModified": "2025-04-17T16:15:55.830", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Nawawi Jamili Docket Cache allows PHP Local File Inclusion. This issue affects Docket Cache: from n/a through 24.07.02." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/docket-cache/vulnerability/wordpress-docket-cache-plugin-24-07-02-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-394xx/CVE-2025-39462.json b/CVE-2025/CVE-2025-394xx/CVE-2025-39462.json new file mode 100644 index 00000000000..7e0e56c8eb1 --- /dev/null +++ b/CVE-2025/CVE-2025-394xx/CVE-2025-39462.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39462", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:55.960", + "lastModified": "2025-04-17T16:15:55.960", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in teamzt Smart Agreements allows PHP Local File Inclusion. This issue affects Smart Agreements: from n/a through 1.0.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/smart-agreements/vulnerability/wordpress-smart-agreements-plugin-1-0-3-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-394xx/CVE-2025-39464.json b/CVE-2025/CVE-2025-394xx/CVE-2025-39464.json new file mode 100644 index 00000000000..ef0b3f28994 --- /dev/null +++ b/CVE-2025/CVE-2025-394xx/CVE-2025-39464.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39464", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:56.103", + "lastModified": "2025-04-17T16:15:56.103", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in rtowebsites AdminQuickbar allows Reflected XSS. This issue affects AdminQuickbar: from n/a through 1.9.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/adminquickbar/vulnerability/wordpress-adminquickbar-plugin-1-9-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-395xx/CVE-2025-39519.json b/CVE-2025/CVE-2025-395xx/CVE-2025-39519.json new file mode 100644 index 00000000000..c3646435f80 --- /dev/null +++ b/CVE-2025/CVE-2025-395xx/CVE-2025-39519.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39519", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:56.230", + "lastModified": "2025-04-17T16:15:56.230", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in rtpHarry Bulk Page Stub Creator allows Reflected XSS. This issue affects Bulk Page Stub Creator: from n/a through 1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/bulk-page-stub-creator/vulnerability/wordpress-bulk-page-stub-creator-plugin-1-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-395xx/CVE-2025-39521.json b/CVE-2025/CVE-2025-395xx/CVE-2025-39521.json new file mode 100644 index 00000000000..20e9829f463 --- /dev/null +++ b/CVE-2025/CVE-2025-395xx/CVE-2025-39521.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39521", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:56.370", + "lastModified": "2025-04-17T16:15:56.370", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ashish Ajani Contact Form vCard Generator allows Reflected XSS. This issue affects Contact Form vCard Generator: from n/a through 2.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/contact-form-vcard-generator/vulnerability/wordpress-contact-form-vcard-generator-plugin-2-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-395xx/CVE-2025-39526.json b/CVE-2025/CVE-2025-395xx/CVE-2025-39526.json new file mode 100644 index 00000000000..1636e01e94e --- /dev/null +++ b/CVE-2025/CVE-2025-395xx/CVE-2025-39526.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39526", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:56.507", + "lastModified": "2025-04-17T16:15:56.507", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in nicdark Hotel Booking allows PHP Local File Inclusion. This issue affects Hotel Booking: from n/a through 3.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/nd-booking/vulnerability/wordpress-hotel-booking-plugin-3-6-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-395xx/CVE-2025-39527.json b/CVE-2025/CVE-2025-395xx/CVE-2025-39527.json new file mode 100644 index 00000000000..a5943d01785 --- /dev/null +++ b/CVE-2025/CVE-2025-395xx/CVE-2025-39527.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39527", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:56.637", + "lastModified": "2025-04-17T16:15:56.637", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of Untrusted Data vulnerability in bestwebsoft Rating by BestWebSoft allows Object Injection. This issue affects Rating by BestWebSoft: from n/a through 1.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/rating-bws/vulnerability/wordpress-rating-by-bestwebsoft-1-7-php-object-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-395xx/CVE-2025-39532.json b/CVE-2025/CVE-2025-395xx/CVE-2025-39532.json new file mode 100644 index 00000000000..d1165ae0d4e --- /dev/null +++ b/CVE-2025/CVE-2025-395xx/CVE-2025-39532.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39532", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:56.763", + "lastModified": "2025-04-17T16:15:56.763", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in spicethemes Spice Blocks allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Spice Blocks: from n/a through 2.0.7.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/spice-blocks/vulnerability/wordpress-spice-blocks-2-0-7-1-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-395xx/CVE-2025-39533.json b/CVE-2025/CVE-2025-395xx/CVE-2025-39533.json new file mode 100644 index 00000000000..1ff9fd7b5b4 --- /dev/null +++ b/CVE-2025/CVE-2025-395xx/CVE-2025-39533.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39533", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:56.893", + "lastModified": "2025-04-17T16:15:56.893", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Starfish Reviews Starfish Review Generation & Marketing allows Privilege Escalation. This issue affects Starfish Review Generation & Marketing: from n/a through 3.1.14." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/starfish-reviews/vulnerability/wordpress-starfish-review-generation-marketing-plugin-3-1-14-arbitrary-option-update-to-privilege-escalation-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-395xx/CVE-2025-39535.json b/CVE-2025/CVE-2025-395xx/CVE-2025-39535.json new file mode 100644 index 00000000000..cf073f774f3 --- /dev/null +++ b/CVE-2025/CVE-2025-395xx/CVE-2025-39535.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39535", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:57.017", + "lastModified": "2025-04-17T16:15:57.017", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Authentication Bypass Using an Alternate Path or Channel vulnerability in appsbd Vitepos allows Authentication Abuse. This issue affects Vitepos: from n/a through 3.1.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-288" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/vitepos-lite/vulnerability/wordpress-vitepos-3-1-7-broken-authentication-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-395xx/CVE-2025-39542.json b/CVE-2025/CVE-2025-395xx/CVE-2025-39542.json new file mode 100644 index 00000000000..7a705b4c9e1 --- /dev/null +++ b/CVE-2025/CVE-2025-395xx/CVE-2025-39542.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39542", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:57.147", + "lastModified": "2025-04-17T16:15:57.147", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect Privilege Assignment vulnerability in Jauhari Xelion Xelion Webchat allows Privilege Escalation. This issue affects Xelion Webchat: from n/a through 9.1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/xelion-webchat/vulnerability/wordpress-xelion-webchat-9-1-0-privilege-escalation-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-395xx/CVE-2025-39550.json b/CVE-2025/CVE-2025-395xx/CVE-2025-39550.json new file mode 100644 index 00000000000..c5cda4bec54 --- /dev/null +++ b/CVE-2025/CVE-2025-395xx/CVE-2025-39550.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39550", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:57.273", + "lastModified": "2025-04-17T16:15:57.273", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of Untrusted Data vulnerability in Shahjahan Jewel FluentCommunity allows Object Injection. This issue affects FluentCommunity: from n/a through 1.2.15." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/fluent-community/vulnerability/wordpress-fluentcommunity-1-2-15-php-object-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-395xx/CVE-2025-39551.json b/CVE-2025/CVE-2025-395xx/CVE-2025-39551.json new file mode 100644 index 00000000000..6a48a55cd09 --- /dev/null +++ b/CVE-2025/CVE-2025-395xx/CVE-2025-39551.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39551", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:57.397", + "lastModified": "2025-04-17T16:15:57.397", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of Untrusted Data vulnerability in Mahmudul Hasan Arif FluentBoards allows Object Injection. This issue affects FluentBoards: from n/a through 1.47." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/fluent-boards/vulnerability/wordpress-fluentboards-1-47-php-object-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-395xx/CVE-2025-39554.json b/CVE-2025/CVE-2025-395xx/CVE-2025-39554.json new file mode 100644 index 00000000000..7826c737531 --- /dev/null +++ b/CVE-2025/CVE-2025-395xx/CVE-2025-39554.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39554", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:57.520", + "lastModified": "2025-04-17T16:15:57.520", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Elliot Sowersby / RelyWP AI Text to Speech allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects AI Text to Speech: from n/a through 3.0.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/ai-text-to-speech/vulnerability/wordpress-ai-text-to-speech-plugin-3-0-3-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-395xx/CVE-2025-39558.json b/CVE-2025/CVE-2025-395xx/CVE-2025-39558.json new file mode 100644 index 00000000000..bb6dba887eb --- /dev/null +++ b/CVE-2025/CVE-2025-395xx/CVE-2025-39558.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39558", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:57.650", + "lastModified": "2025-04-17T16:15:57.650", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CRM Perks CRM Perks allows Reflected XSS. This issue affects CRM Perks: from n/a through 1.1.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/support-x/vulnerability/wordpress-crm-perks-plugin-1-1-7-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-395xx/CVE-2025-39559.json b/CVE-2025/CVE-2025-395xx/CVE-2025-39559.json new file mode 100644 index 00000000000..0f646ea00b9 --- /dev/null +++ b/CVE-2025/CVE-2025-395xx/CVE-2025-39559.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39559", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:57.780", + "lastModified": "2025-04-17T16:15:57.780", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Eivin Landa Bring Fraktguiden for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Bring Fraktguiden for WooCommerce: from n/a through 1.11.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/bring-fraktguiden-for-woocommerce/vulnerability/wordpress-bring-fraktguiden-for-woocommerce-plugin-1-11-4-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-395xx/CVE-2025-39562.json b/CVE-2025/CVE-2025-395xx/CVE-2025-39562.json new file mode 100644 index 00000000000..7dd1f93e2f0 --- /dev/null +++ b/CVE-2025/CVE-2025-395xx/CVE-2025-39562.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39562", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:57.903", + "lastModified": "2025-04-17T16:15:57.903", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in codepeople Payment Form for PayPal Pro allows Stored XSS. This issue affects Payment Form for PayPal Pro: from n/a through 1.1.72." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/payment-form-for-paypal-pro/vulnerability/wordpress-payment-form-for-paypal-pro-1-1-72-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-395xx/CVE-2025-39567.json b/CVE-2025/CVE-2025-395xx/CVE-2025-39567.json new file mode 100644 index 00000000000..1d2630cb0b9 --- /dev/null +++ b/CVE-2025/CVE-2025-395xx/CVE-2025-39567.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39567", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:58.050", + "lastModified": "2025-04-17T16:15:58.050", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Shamalli Web Directory Free allows Reflected XSS. This issue affects Web Directory Free: from n/a through 1.7.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/web-directory-free/vulnerability/wordpress-web-directory-free-plugin-1-7-8-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-395xx/CVE-2025-39568.json b/CVE-2025/CVE-2025-395xx/CVE-2025-39568.json new file mode 100644 index 00000000000..404bb37fca9 --- /dev/null +++ b/CVE-2025/CVE-2025-395xx/CVE-2025-39568.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39568", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:58.187", + "lastModified": "2025-04-17T16:15:58.187", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Arture B.V. StoreContrl Woocommerce allows Path Traversal. This issue affects StoreContrl Woocommerce: from n/a through 4.1.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/storecontrl-wp-connection/vulnerability/wordpress-storecontrl-woocommerce-4-1-3-arbitrary-file-download-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-395xx/CVE-2025-39569.json b/CVE-2025/CVE-2025-395xx/CVE-2025-39569.json new file mode 100644 index 00000000000..333d3dfa392 --- /dev/null +++ b/CVE-2025/CVE-2025-395xx/CVE-2025-39569.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39569", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:58.313", + "lastModified": "2025-04-17T16:15:58.313", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in taskbuilder Taskbuilder allows Blind SQL Injection. This issue affects Taskbuilder: from n/a through 4.0.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/taskbuilder/vulnerability/wordpress-taskbuilder-4-0-1-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-395xx/CVE-2025-39580.json b/CVE-2025/CVE-2025-395xx/CVE-2025-39580.json new file mode 100644 index 00000000000..85fcd85ce5d --- /dev/null +++ b/CVE-2025/CVE-2025-395xx/CVE-2025-39580.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39580", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:58.447", + "lastModified": "2025-04-17T16:15:58.447", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in jidaikobo Dashi allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects Dashi: from n/a through 3.1.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", + "baseScore": 5.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/dashi/vulnerability/wordpress-dashi-3-1-8-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-395xx/CVE-2025-39583.json b/CVE-2025/CVE-2025-395xx/CVE-2025-39583.json new file mode 100644 index 00000000000..622378335b0 --- /dev/null +++ b/CVE-2025/CVE-2025-395xx/CVE-2025-39583.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39583", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:58.580", + "lastModified": "2025-04-17T16:15:58.580", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in berthaai BERTHA AI allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects BERTHA AI: from n/a through 1.12.10.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/bertha-ai-free/vulnerability/wordpress-bertha-ai-1-12-10-2-arbitrary-content-deletion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-395xx/CVE-2025-39586.json b/CVE-2025/CVE-2025-395xx/CVE-2025-39586.json new file mode 100644 index 00000000000..8f6234b9347 --- /dev/null +++ b/CVE-2025/CVE-2025-395xx/CVE-2025-39586.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39586", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:58.710", + "lastModified": "2025-04-17T16:15:58.710", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Metagauss ProfileGrid allows SQL Injection. This issue affects ProfileGrid : from n/a through 5.9.4.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/profilegrid-user-profiles-groups-and-communities/vulnerability/wordpress-profilegrid-5-9-4-8-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-395xx/CVE-2025-39587.json b/CVE-2025/CVE-2025-395xx/CVE-2025-39587.json new file mode 100644 index 00000000000..43e1ae76ed9 --- /dev/null +++ b/CVE-2025/CVE-2025-395xx/CVE-2025-39587.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39587", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:58.830", + "lastModified": "2025-04-17T16:15:58.830", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Stylemix Cost Calculator Builder allows SQL Injection. This issue affects Cost Calculator Builder: from n/a through 3.2.65." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/cost-calculator-builder/vulnerability/wordpress-cost-calculator-builder-3-2-65-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-395xx/CVE-2025-39588.json b/CVE-2025/CVE-2025-395xx/CVE-2025-39588.json new file mode 100644 index 00000000000..c1063f05be4 --- /dev/null +++ b/CVE-2025/CVE-2025-395xx/CVE-2025-39588.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39588", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:58.953", + "lastModified": "2025-04-17T16:15:58.953", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of Untrusted Data vulnerability in bdthemes Ultimate Store Kit Elementor Addons allows Object Injection. This issue affects Ultimate Store Kit Elementor Addons: from n/a through 2.4.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/ultimate-store-kit/vulnerability/wordpress-ultimate-store-kit-elementor-addons-2-4-0-deserialization-of-untrusted-data-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-395xx/CVE-2025-39594.json b/CVE-2025/CVE-2025-395xx/CVE-2025-39594.json new file mode 100644 index 00000000000..3c24e9b19d6 --- /dev/null +++ b/CVE-2025/CVE-2025-395xx/CVE-2025-39594.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39594", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:59.093", + "lastModified": "2025-04-17T16:15:59.093", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Bob Arigato Autoresponder and Newsletter allows Reflected XSS. This issue affects Arigato Autoresponder and Newsletter: from n/a through 2.7.2.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/bft-autoresponder/vulnerability/wordpress-arigato-autoresponder-and-newsletter-plugin-2-7-2-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-395xx/CVE-2025-39595.json b/CVE-2025/CVE-2025-395xx/CVE-2025-39595.json new file mode 100644 index 00000000000..69bf5417998 --- /dev/null +++ b/CVE-2025/CVE-2025-395xx/CVE-2025-39595.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39595", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:59.220", + "lastModified": "2025-04-17T16:15:59.220", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Quentn.com GmbH Quentn WP allows SQL Injection. This issue affects Quentn WP: from n/a through 1.2.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/quentn-wp/vulnerability/wordpress-quentn-wp-1-2-8-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-395xx/CVE-2025-39596.json b/CVE-2025/CVE-2025-395xx/CVE-2025-39596.json new file mode 100644 index 00000000000..833b316beb8 --- /dev/null +++ b/CVE-2025/CVE-2025-395xx/CVE-2025-39596.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39596", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-17T16:15:59.350", + "lastModified": "2025-04-17T16:15:59.350", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Weak Authentication vulnerability in Quentn.com GmbH Quentn WP allows Privilege Escalation. This issue affects Quentn WP: from n/a through 1.2.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1390" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/quentn-wp/vulnerability/wordpress-quentn-wp-1-2-8-privilege-escalation-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-429xx/CVE-2025-42921.json b/CVE-2025/CVE-2025-429xx/CVE-2025-42921.json new file mode 100644 index 00000000000..0695a926f64 --- /dev/null +++ b/CVE-2025/CVE-2025-429xx/CVE-2025-42921.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-42921", + "sourceIdentifier": "cve@jetbrains.com", + "published": "2025-04-17T16:15:59.620", + "lastModified": "2025-04-17T16:15:59.620", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In JetBrains Toolbox App before 2.6 host key verification was missing in SSH plugin" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@jetbrains.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", + "baseScore": 4.2, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "cve@jetbrains.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-297" + } + ] + } + ], + "references": [ + { + "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", + "source": "cve@jetbrains.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-430xx/CVE-2025-43012.json b/CVE-2025/CVE-2025-430xx/CVE-2025-43012.json new file mode 100644 index 00000000000..77b3314ee3e --- /dev/null +++ b/CVE-2025/CVE-2025-430xx/CVE-2025-43012.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-43012", + "sourceIdentifier": "cve@jetbrains.com", + "published": "2025-04-17T16:15:59.777", + "lastModified": "2025-04-17T16:15:59.777", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In JetBrains Toolbox App before 2.6 command injection in SSH plugin was possible" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@jetbrains.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 8.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "cve@jetbrains.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", + "source": "cve@jetbrains.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-430xx/CVE-2025-43013.json b/CVE-2025/CVE-2025-430xx/CVE-2025-43013.json new file mode 100644 index 00000000000..1084bc4d5fc --- /dev/null +++ b/CVE-2025/CVE-2025-430xx/CVE-2025-43013.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-43013", + "sourceIdentifier": "cve@jetbrains.com", + "published": "2025-04-17T16:15:59.910", + "lastModified": "2025-04-17T16:15:59.910", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In JetBrains Toolbox App before 2.6 unencrypted credential transmission during SSH authentication was possible" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@jetbrains.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:L", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.1, + "impactScore": 5.3 + } + ] + }, + "weaknesses": [ + { + "source": "cve@jetbrains.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-319" + } + ] + } + ], + "references": [ + { + "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", + "source": "cve@jetbrains.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-430xx/CVE-2025-43014.json b/CVE-2025/CVE-2025-430xx/CVE-2025-43014.json new file mode 100644 index 00000000000..4044c103438 --- /dev/null +++ b/CVE-2025/CVE-2025-430xx/CVE-2025-43014.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-43014", + "sourceIdentifier": "cve@jetbrains.com", + "published": "2025-04-17T16:16:00.037", + "lastModified": "2025-04-17T16:16:00.037", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In JetBrains Toolbox App before 2.6 the SSH plugin established connections without sufficient user confirmation" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@jetbrains.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "cve@jetbrains.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-304" + } + ] + } + ], + "references": [ + { + "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", + "source": "cve@jetbrains.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-430xx/CVE-2025-43015.json b/CVE-2025/CVE-2025-430xx/CVE-2025-43015.json new file mode 100644 index 00000000000..60b094b5746 --- /dev/null +++ b/CVE-2025/CVE-2025-430xx/CVE-2025-43015.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-43015", + "sourceIdentifier": "cve@jetbrains.com", + "published": "2025-04-17T16:16:00.170", + "lastModified": "2025-04-17T16:16:00.170", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In JetBrains RubyMine before 2025.1 remote Interpreter overwrote ports to listen on all interfaces" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@jetbrains.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", + "baseScore": 8.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "cve@jetbrains.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1188" + } + ] + } + ], + "references": [ + { + "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", + "source": "cve@jetbrains.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 9e93cc109b4..048528d4917 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-04-17T16:00:20.439175+00:00 +2025-04-17T18:00:20.440624+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-04-17T15:44:59.330000+00:00 +2025-04-17T17:59:06.210000+00:00 ``` ### Last Data Feed Release @@ -33,54 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -290513 +290753 ``` ### CVEs added in the last Commit -Recently added CVEs: `10` +Recently added CVEs: `240` -- [CVE-2022-26323](CVE-2022/CVE-2022-263xx/CVE-2022-26323.json) (`2025-04-17T15:15:45.547`) -- [CVE-2025-25234](CVE-2025/CVE-2025-252xx/CVE-2025-25234.json) (`2025-04-17T15:15:54.120`) -- [CVE-2025-29015](CVE-2025/CVE-2025-290xx/CVE-2025-29015.json) (`2025-04-17T14:15:27.997`) -- [CVE-2025-29040](CVE-2025/CVE-2025-290xx/CVE-2025-29040.json) (`2025-04-17T15:15:54.387`) -- [CVE-2025-29041](CVE-2025/CVE-2025-290xx/CVE-2025-29041.json) (`2025-04-17T15:15:54.520`) -- [CVE-2025-29044](CVE-2025/CVE-2025-290xx/CVE-2025-29044.json) (`2025-04-17T15:15:54.717`) -- [CVE-2025-29045](CVE-2025/CVE-2025-290xx/CVE-2025-29045.json) (`2025-04-17T15:15:54.877`) -- [CVE-2025-29046](CVE-2025/CVE-2025-290xx/CVE-2025-29046.json) (`2025-04-17T15:15:55.013`) -- [CVE-2025-29047](CVE-2025/CVE-2025-290xx/CVE-2025-29047.json) (`2025-04-17T15:15:55.140`) -- [CVE-2025-3651](CVE-2025/CVE-2025-36xx/CVE-2025-3651.json) (`2025-04-17T15:15:58.620`) +- [CVE-2025-39533](CVE-2025/CVE-2025-395xx/CVE-2025-39533.json) (`2025-04-17T16:15:56.893`) +- [CVE-2025-39535](CVE-2025/CVE-2025-395xx/CVE-2025-39535.json) (`2025-04-17T16:15:57.017`) +- [CVE-2025-39542](CVE-2025/CVE-2025-395xx/CVE-2025-39542.json) (`2025-04-17T16:15:57.147`) +- [CVE-2025-39550](CVE-2025/CVE-2025-395xx/CVE-2025-39550.json) (`2025-04-17T16:15:57.273`) +- [CVE-2025-39551](CVE-2025/CVE-2025-395xx/CVE-2025-39551.json) (`2025-04-17T16:15:57.397`) +- [CVE-2025-39554](CVE-2025/CVE-2025-395xx/CVE-2025-39554.json) (`2025-04-17T16:15:57.520`) +- [CVE-2025-39558](CVE-2025/CVE-2025-395xx/CVE-2025-39558.json) (`2025-04-17T16:15:57.650`) +- [CVE-2025-39559](CVE-2025/CVE-2025-395xx/CVE-2025-39559.json) (`2025-04-17T16:15:57.780`) +- [CVE-2025-39562](CVE-2025/CVE-2025-395xx/CVE-2025-39562.json) (`2025-04-17T16:15:57.903`) +- [CVE-2025-39567](CVE-2025/CVE-2025-395xx/CVE-2025-39567.json) (`2025-04-17T16:15:58.050`) +- [CVE-2025-39568](CVE-2025/CVE-2025-395xx/CVE-2025-39568.json) (`2025-04-17T16:15:58.187`) +- [CVE-2025-39569](CVE-2025/CVE-2025-395xx/CVE-2025-39569.json) (`2025-04-17T16:15:58.313`) +- [CVE-2025-39580](CVE-2025/CVE-2025-395xx/CVE-2025-39580.json) (`2025-04-17T16:15:58.447`) +- [CVE-2025-39583](CVE-2025/CVE-2025-395xx/CVE-2025-39583.json) (`2025-04-17T16:15:58.580`) +- [CVE-2025-39586](CVE-2025/CVE-2025-395xx/CVE-2025-39586.json) (`2025-04-17T16:15:58.710`) +- [CVE-2025-39587](CVE-2025/CVE-2025-395xx/CVE-2025-39587.json) (`2025-04-17T16:15:58.830`) +- [CVE-2025-39588](CVE-2025/CVE-2025-395xx/CVE-2025-39588.json) (`2025-04-17T16:15:58.953`) +- [CVE-2025-39594](CVE-2025/CVE-2025-395xx/CVE-2025-39594.json) (`2025-04-17T16:15:59.093`) +- [CVE-2025-39595](CVE-2025/CVE-2025-395xx/CVE-2025-39595.json) (`2025-04-17T16:15:59.220`) +- [CVE-2025-39596](CVE-2025/CVE-2025-395xx/CVE-2025-39596.json) (`2025-04-17T16:15:59.350`) +- [CVE-2025-42921](CVE-2025/CVE-2025-429xx/CVE-2025-42921.json) (`2025-04-17T16:15:59.620`) +- [CVE-2025-43012](CVE-2025/CVE-2025-430xx/CVE-2025-43012.json) (`2025-04-17T16:15:59.777`) +- [CVE-2025-43013](CVE-2025/CVE-2025-430xx/CVE-2025-43013.json) (`2025-04-17T16:15:59.910`) +- [CVE-2025-43014](CVE-2025/CVE-2025-430xx/CVE-2025-43014.json) (`2025-04-17T16:16:00.037`) +- [CVE-2025-43015](CVE-2025/CVE-2025-430xx/CVE-2025-43015.json) (`2025-04-17T16:16:00.170`) ### CVEs modified in the last Commit -Recently modified CVEs: `117` +Recently modified CVEs: `121` -- [CVE-2025-2926](CVE-2025/CVE-2025-29xx/CVE-2025-2926.json) (`2025-04-17T14:31:21.250`) -- [CVE-2025-29651](CVE-2025/CVE-2025-296xx/CVE-2025-29651.json) (`2025-04-17T14:15:28.157`) -- [CVE-2025-29652](CVE-2025/CVE-2025-296xx/CVE-2025-29652.json) (`2025-04-17T14:15:28.330`) -- [CVE-2025-29653](CVE-2025/CVE-2025-296xx/CVE-2025-29653.json) (`2025-04-17T14:15:28.537`) -- [CVE-2025-29708](CVE-2025/CVE-2025-297xx/CVE-2025-29708.json) (`2025-04-17T14:15:28.707`) -- [CVE-2025-29709](CVE-2025/CVE-2025-297xx/CVE-2025-29709.json) (`2025-04-17T14:15:28.860`) -- [CVE-2025-30215](CVE-2025/CVE-2025-302xx/CVE-2025-30215.json) (`2025-04-17T15:15:55.317`) -- [CVE-2025-31723](CVE-2025/CVE-2025-317xx/CVE-2025-31723.json) (`2025-04-17T14:53:54.407`) -- [CVE-2025-31724](CVE-2025/CVE-2025-317xx/CVE-2025-31724.json) (`2025-04-17T14:50:40.210`) -- [CVE-2025-31725](CVE-2025/CVE-2025-317xx/CVE-2025-31725.json) (`2025-04-17T14:47:55.160`) -- [CVE-2025-31726](CVE-2025/CVE-2025-317xx/CVE-2025-31726.json) (`2025-04-17T14:45:33.123`) -- [CVE-2025-31727](CVE-2025/CVE-2025-317xx/CVE-2025-31727.json) (`2025-04-17T14:38:18.480`) -- [CVE-2025-31728](CVE-2025/CVE-2025-317xx/CVE-2025-31728.json) (`2025-04-17T14:35:36.063`) -- [CVE-2025-32783](CVE-2025/CVE-2025-327xx/CVE-2025-32783.json) (`2025-04-17T14:15:29.620`) -- [CVE-2025-32787](CVE-2025/CVE-2025-327xx/CVE-2025-32787.json) (`2025-04-17T14:15:29.723`) -- [CVE-2025-32789](CVE-2025/CVE-2025-327xx/CVE-2025-32789.json) (`2025-04-17T14:15:29.823`) -- [CVE-2025-3619](CVE-2025/CVE-2025-36xx/CVE-2025-3619.json) (`2025-04-17T14:15:30.067`) -- [CVE-2025-3620](CVE-2025/CVE-2025-36xx/CVE-2025-3620.json) (`2025-04-17T14:15:30.223`) -- [CVE-2025-3665](CVE-2025/CVE-2025-36xx/CVE-2025-3665.json) (`2025-04-17T14:15:30.387`) -- [CVE-2025-3676](CVE-2025/CVE-2025-36xx/CVE-2025-3676.json) (`2025-04-17T14:15:30.570`) -- [CVE-2025-3725](CVE-2025/CVE-2025-37xx/CVE-2025-3725.json) (`2025-04-17T14:15:30.697`) -- [CVE-2025-3726](CVE-2025/CVE-2025-37xx/CVE-2025-3726.json) (`2025-04-17T14:15:30.857`) -- [CVE-2025-3727](CVE-2025/CVE-2025-37xx/CVE-2025-3727.json) (`2025-04-17T15:15:58.773`) -- [CVE-2025-3729](CVE-2025/CVE-2025-37xx/CVE-2025-3729.json) (`2025-04-17T14:15:30.987`) -- [CVE-2025-3730](CVE-2025/CVE-2025-37xx/CVE-2025-3730.json) (`2025-04-17T14:15:31.133`) +- [CVE-2024-57646](CVE-2024/CVE-2024-576xx/CVE-2024-57646.json) (`2025-04-17T16:47:22.387`) +- [CVE-2024-57647](CVE-2024/CVE-2024-576xx/CVE-2024-57647.json) (`2025-04-17T16:47:19.220`) +- [CVE-2024-57648](CVE-2024/CVE-2024-576xx/CVE-2024-57648.json) (`2025-04-17T16:47:16.813`) +- [CVE-2024-57649](CVE-2024/CVE-2024-576xx/CVE-2024-57649.json) (`2025-04-17T16:47:14.280`) +- [CVE-2024-57650](CVE-2024/CVE-2024-576xx/CVE-2024-57650.json) (`2025-04-17T16:47:11.903`) +- [CVE-2024-57651](CVE-2024/CVE-2024-576xx/CVE-2024-57651.json) (`2025-04-17T16:47:08.997`) +- [CVE-2024-57652](CVE-2024/CVE-2024-576xx/CVE-2024-57652.json) (`2025-04-17T16:47:05.030`) +- [CVE-2024-57653](CVE-2024/CVE-2024-576xx/CVE-2024-57653.json) (`2025-04-17T16:47:02.293`) +- [CVE-2024-57654](CVE-2024/CVE-2024-576xx/CVE-2024-57654.json) (`2025-04-17T16:46:58.967`) +- [CVE-2024-57655](CVE-2024/CVE-2024-576xx/CVE-2024-57655.json) (`2025-04-17T16:46:19.117`) +- [CVE-2024-57656](CVE-2024/CVE-2024-576xx/CVE-2024-57656.json) (`2025-04-17T16:46:15.067`) +- [CVE-2024-57657](CVE-2024/CVE-2024-576xx/CVE-2024-57657.json) (`2025-04-17T16:46:10.137`) +- [CVE-2024-57658](CVE-2024/CVE-2024-576xx/CVE-2024-57658.json) (`2025-04-17T16:46:04.427`) +- [CVE-2024-57659](CVE-2024/CVE-2024-576xx/CVE-2024-57659.json) (`2025-04-17T16:45:57.270`) +- [CVE-2025-1566](CVE-2025/CVE-2025-15xx/CVE-2025-1566.json) (`2025-04-17T16:15:28.040`) +- [CVE-2025-1568](CVE-2025/CVE-2025-15xx/CVE-2025-1568.json) (`2025-04-17T16:15:28.170`) +- [CVE-2025-1704](CVE-2025/CVE-2025-17xx/CVE-2025-1704.json) (`2025-04-17T16:15:28.297`) +- [CVE-2025-2073](CVE-2025/CVE-2025-20xx/CVE-2025-2073.json) (`2025-04-17T16:15:38.750`) +- [CVE-2025-23007](CVE-2025/CVE-2025-230xx/CVE-2025-23007.json) (`2025-04-17T16:15:29.720`) +- [CVE-2025-23009](CVE-2025/CVE-2025-230xx/CVE-2025-23009.json) (`2025-04-17T16:15:29.877`) +- [CVE-2025-23010](CVE-2025/CVE-2025-230xx/CVE-2025-23010.json) (`2025-04-17T16:15:30.047`) +- [CVE-2025-24406](CVE-2025/CVE-2025-244xx/CVE-2025-24406.json) (`2025-04-17T16:09:35.413`) +- [CVE-2025-26014](CVE-2025/CVE-2025-260xx/CVE-2025-26014.json) (`2025-04-17T16:15:34.477`) +- [CVE-2025-32817](CVE-2025/CVE-2025-328xx/CVE-2025-32817.json) (`2025-04-17T16:15:50.883`) +- [CVE-2025-3651](CVE-2025/CVE-2025-36xx/CVE-2025-3651.json) (`2025-04-17T16:15:59.530`) ## Download and Usage diff --git a/_state.csv b/_state.csv index f652bb50c97..a45f5260993 100644 --- a/_state.csv +++ b/_state.csv @@ -234,7 +234,7 @@ CVE-1999-0232,0,0,b7bf841547db08189bda2b82563318c18ddcf9100b179924b10939e10bb33c CVE-1999-0233,0,0,fc3f5ebc8f64f19e630eda9493fb4d96bf3f528ab3ec15b4ba1bccbdecd1e8ae,2025-04-03T01:03:51.193000 CVE-1999-0234,0,0,09a6dae7c2e2f311c70486e907420ce05491091fda07aab0105ebd89e8c9ae1d,2025-04-03T01:03:51.193000 CVE-1999-0235,0,0,c173fa7b3cd6638b72538ba027772b0929e55d20f54e98c3b2da878981e195e3,2025-04-03T01:03:51.193000 -CVE-1999-0236,0,0,3826a2801bf4d630d3717ff77d84b243b25de92141a235909420300d76192baa,2025-04-03T01:03:51.193000 +CVE-1999-0236,0,1,e5e426174e91b64beeb393d292784d09a0155ed5f53e144d5bf212d41b11bf16,2025-04-17T17:14:30.760000 CVE-1999-0237,0,0,a9e863b938d1c091f0de982285ef969608f0af1f6a680f1864ad516dcad3d101,2025-04-03T01:03:51.193000 CVE-1999-0238,0,0,2c6fe6d15f298dd7888893ada26d988e66ee508bfce6a85fe15d4648f0f1071f,2025-04-03T01:03:51.193000 CVE-1999-0239,0,0,f076a08bb3508db4e172ca4d526e1c554b41e5e2cd41b2cd82c288918772f8b1,2025-04-03T01:03:51.193000 @@ -133154,7 +133154,7 @@ CVE-2019-15115,0,0,523a09ddc6f256da19f5be4a644dc09baabd5df5e94f4dfd6e36397b5b1a9 CVE-2019-15116,0,0,c42166c1c80887a1011a9f1709f0b3ea9a6d29288fa4d1ce4348e86e935be68a,2025-02-07T19:44:53.660000 CVE-2019-15117,0,0,5fe8b33c7c1239841b2215456604b8812d719a5deb7265a6c9c0a1fc48a786a6,2024-11-21T04:28:05.287000 CVE-2019-15118,0,0,41a40ed71fa32f626de06f3b573d61dfb2d0f2d1cd457cc0149cb681807317d5,2024-11-21T04:28:05.460000 -CVE-2019-15119,0,1,3fc9ba7165c811b454bf329778c03a49d814b461fee466110b3c3b0ac0d6286d,2025-04-17T14:56:06.227000 +CVE-2019-15119,0,0,3fc9ba7165c811b454bf329778c03a49d814b461fee466110b3c3b0ac0d6286d,2025-04-17T14:56:06.227000 CVE-2019-1512,0,0,ef60a194ad55301e6f0b90fa57780e75596acbaf74c9bd30e476ce02f2465617,2023-11-07T03:08:17.607000 CVE-2019-15120,0,0,8331c25589a3cbaf886b4ec9fb3afdda6095c378b9820e2a8966e183781afd2c,2024-11-21T04:28:05.817000 CVE-2019-15123,0,0,c030aaef2d3ec05c55722ee50e01e4e0b770f04c3d6abb722df28d1cdd6c166c,2024-11-21T04:28:05.983000 @@ -155844,7 +155844,7 @@ CVE-2020-26627,0,0,c151567ab1b42a63633a3d00517a56eb92c009b907461770e1f713f8ac586 CVE-2020-26628,0,0,4bd8fc6faf7cbc587d496d53268fae79ceb010e9b3aa4d7dc06728be5812e026,2024-11-21T05:20:09.997000 CVE-2020-26629,0,0,10c9c64a615aa1ee58500074a2d3608119389be9d6301b6ba34dd3a5f5823479,2024-11-21T05:20:10.140000 CVE-2020-2663,0,0,3118638803c8403be12951765b6c6469d49e159b376e18af70a045e3472dee0e,2024-11-21T05:25:56.130000 -CVE-2020-26630,0,0,30871a3ca7d8582201da6f48884b6e202d7947cf05b5e79bf1714e6739249bf4,2024-11-21T05:20:10.273000 +CVE-2020-26630,0,1,fa4d4ed90782045196176ca8c999b2c8e20220d46e6dedbc1fe5e1c50e82be1a,2025-04-17T16:15:20.770000 CVE-2020-2664,0,0,759ee431cc21869764ff9d7f04ce49f4a6215770a861b0235e13ebb570cd995d,2024-11-21T05:25:56.283000 CVE-2020-26641,0,0,1a247f95f29b119ea325d14ba8cc346d62ed424503c63b03a5382c381c0d1705,2024-11-21T05:20:10.740000 CVE-2020-26642,0,0,c478696655e61d11820105f6d51a1439aa562441bfbd25ff6b941f76c1bffd9f,2024-11-21T05:20:11.157000 @@ -162386,7 +162386,7 @@ CVE-2020-6994,0,0,b05dbb99c79ea8455b3bf4e160a03243d064409e311717e763747d4944a8a8 CVE-2020-6995,0,0,2dfb6b5e87953d25f97fdc2be79fa5cae41d7a33a4c1da1bc1087036201f726d,2024-11-21T05:36:27.387000 CVE-2020-6996,0,0,d8aec7a1a0baa17606fe3a09db23aaa73e6b03414b76d603166cf91eb0e55f3d,2024-11-21T05:36:27.533000 CVE-2020-6997,0,0,7c3b558c77b55a91ed3e2e81f216d7150202c0306fe3689645d04a10f211081d,2024-11-21T05:36:27.640000 -CVE-2020-6998,0,0,1e4613a1ab1df994043542014b9e7cdee1feada979801a4e9f4e1af1e70965e6,2024-11-21T05:36:27.750000 +CVE-2020-6998,0,1,f521bb7cd26159ee5da85202f5bd285dbdfbe95c8b0fe981192d6b13496dbb10,2025-04-17T16:15:21.730000 CVE-2020-6999,0,0,8f3f46164c538d3dfde76aec573d53829c515d4ac27f870e307aad38eea9ce1b,2024-11-21T05:36:27.883000 CVE-2020-7000,0,0,78c628789393227e5f3e73df5741d0acf6f9239ea2e0cf2a2b5b829c52381fcb,2024-11-21T05:36:27.990000 CVE-2020-7001,0,0,2b6c7e991ff4a29e4aa157df570813a5aa283d799738fd821a991a7cfef78d44,2024-11-21T05:36:28.103000 @@ -169140,17 +169140,17 @@ CVE-2021-22637,0,0,aa00404686341118bc126124fdd32cddd14eee64d78ae7a5d810ffb95a71f CVE-2021-22638,0,0,07cd6db14b474a073a60dc405c35ab87a080f2ceada2adeb8ad6e0b11c4f2fe0,2024-11-21T05:50:21.830000 CVE-2021-22639,0,0,57f6dde48aa6bbfc7abc61270a92b5357a0ea36fb5d7170c88e25b9f0fc571cb,2024-11-21T05:50:21.947000 CVE-2021-2264,0,0,7c6a00c6fe53059f9b4216b6e87ea70aa5797417f2c001fa8c51bccb476d8e8b,2024-11-21T06:02:45.463000 -CVE-2021-22640,0,0,617d363adf338d1ef62d9b9a457534abc9e0d65d278623071297cdeb0e520ba1,2024-11-21T05:50:22.060000 +CVE-2021-22640,0,1,0dad5eefba8b4db0b46b79b4a5e2304f15961538a7c309d7aa38bf17ceb25fb0,2025-04-17T16:15:21.933000 CVE-2021-22641,0,0,61ade3c6f8a64cb2741b8dd154fa17184a4a0d835ef5993ee97871d5299bff3a,2024-11-21T05:50:22.220000 -CVE-2021-22642,0,0,a8be33f6c6283969f3af66fe0375e53244dd445970e748a2f88429362b4fb80a,2024-11-21T05:50:22.347000 +CVE-2021-22642,0,1,a1c68f1ee4cb8810c67ec93a2cacd19e84928d96f289856cb912073b8bc6dca3,2025-04-17T16:15:22.093000 CVE-2021-22643,0,0,c5d0052a1ab7bfcc17c7e8ecb262948b088d2dfd07007cbab14502826b25bf29,2024-11-21T05:50:22.470000 -CVE-2021-22644,0,0,1b619cdb22e26177a81a418abd2fd47c36ae1cfa4b50cc7510544a45caf34f72,2024-11-21T05:50:22.600000 +CVE-2021-22644,0,1,cff907cfdd306762cf5c4d8e07c267fe604f77c4e748c29292819bca6deeb5d6,2025-04-17T16:15:22.230000 CVE-2021-22645,0,0,ee4820eda8a1fd821281e6e69a9db42d392e439aa5563094541b302bd20d61bc,2024-11-21T05:50:22.727000 -CVE-2021-22646,0,0,6e538f273e4ed65eaa0204dcfc4fd7b83327f6a75444e315d4ff0c0f10a7fc82,2024-11-21T05:50:22.847000 +CVE-2021-22646,0,1,035e8074e38b6ea930c45105585099d570a366a5987692ca8973afa8639a9f36,2025-04-17T16:15:22.370000 CVE-2021-22647,0,0,d5270c4e0d88448e25eeea4a4a93e1720965486cac741310a715696a9ee91cd6,2024-11-21T05:50:22.973000 -CVE-2021-22648,0,0,abcbc77e189bae75caa0c7c1a9afe257f427411c397bec24e5e821a367a4228f,2024-11-21T05:50:23.107000 +CVE-2021-22648,0,1,597e63352c986bd890eb93c7452faf813a9a68b945cdb04b0aab82f2a2559f29,2025-04-17T16:15:22.503000 CVE-2021-22649,0,0,4c455065239adf7ba329af0603bc3817948e06c408a3b9aede4a42ee48c7d76a,2024-11-21T05:50:23.230000 -CVE-2021-22650,0,0,e33c9276b05ce18d2e660cfd26beb5bb12da110db05f1e24c6f6bfa8c01b7425,2024-11-21T05:50:23.373000 +CVE-2021-22650,0,1,6b2697909e01c201ee9cecc78674009012dd27693e3f6406bb01c7e7a3fa4aa9,2025-04-17T16:15:22.643000 CVE-2021-22651,0,0,d6143e62c4b9699284d143ca120cbb0d71581ca2adc4fcc9b0bb42c2ed8500e0,2024-11-21T05:50:23.497000 CVE-2021-22652,0,0,cf17a9547a0228cec4770972d3f515ff251799f46d62d499fef598ebff8d4d96,2024-11-21T05:50:23.640000 CVE-2021-22653,0,0,0af4b136027dd5ec607d69ebc8cd9fd351257c719325595273333e5a8a600e83,2024-11-21T05:50:24.550000 @@ -172060,7 +172060,7 @@ CVE-2021-26259,0,0,fb7e1027dad3e31d268ae51caff246a45d47d50d54da729381d389d3012d2 CVE-2021-26260,0,0,186a893d87f4252dea28ec7e4d46f1d49046fc96ed532fb932f4f6e512904cce,2024-11-21T05:55:59.940000 CVE-2021-26262,0,0,04faf655ecfe2843fb6ad4f0a9ac273b36d9999925446bdaf288d43152d4840c,2024-11-21T05:56:00.063000 CVE-2021-26263,0,0,bb890e818d593028fe05eefae2c4127c21fd2ec8d00df1166d86b0ee026bda4d,2024-11-21T05:56:00.197000 -CVE-2021-26264,0,0,693e2498675aa9ba77c5a7ab9f641a134e73fae7e2c5667b966a461a54fe42cb,2024-11-21T05:56:00.323000 +CVE-2021-26264,0,1,9a93a90f4095cd2e2b2adfa851da75f588e60d4cec45efb14f9a8a7b80ab5a09,2025-04-17T16:15:22.780000 CVE-2021-26266,0,0,2a4196adc38211b1201d18c665c35175dd3984681f900fd355d1ef23a59c687a,2024-11-21T05:56:00.433000 CVE-2021-26267,0,0,4ff1e35cf9b0875d17e2364307635fdb44b0ce5a138a09204109daa7130fdbec,2024-11-21T05:56:00.570000 CVE-2021-26271,0,0,02d590fb0be62d9b1444895d8a70ea1c4c5188c2d90f05f709198a384f149624,2024-11-21T05:56:00.720000 @@ -172944,11 +172944,11 @@ CVE-2021-27489,0,0,ea41099ab13d42bb50ec27361dbba801cec1aed3c899e16b9185311dda15e CVE-2021-27490,0,0,fff4163db10295d2cdcfd256dc4a381e0b268611acd92d7502b94a0fbc430a92,2024-11-21T05:58:05.760000 CVE-2021-27491,0,0,e0b5389e2611b2f453f8a7d27f98366130cfd934fdf87e4f1f04f1bf5a696765,2024-11-21T05:58:05.880000 CVE-2021-27492,0,0,fb072b549217b23bb6045338c79a1096017c288f5284ce8123f6e440397dd7cd,2024-11-21T05:58:05.993000 -CVE-2021-27493,0,0,1c11f930d96db14c3091da3fbb5a165f9bee22c711944898569a3260c1bcb980,2024-11-21T05:58:06.113000 +CVE-2021-27493,0,1,7960c0557d003711e98532719a495fc1704a0200a0971380838dcbff768909d9,2025-04-17T16:15:22.950000 CVE-2021-27494,0,0,8e6f281dff8f9ecc765a8c660f76775c3cc960dd706e3ef650c39918bc64b5ab,2024-11-21T05:58:06.240000 CVE-2021-27495,0,0,a82b1204a3428652628ae480d1ad05b0cc77be28a78f434a2ce640b151764c69,2024-11-21T05:58:06.370000 CVE-2021-27496,0,0,771fc5888120fdd2dad19b37a237b48b2aaf023e34c22f4735b85dd0980ecef1,2024-11-21T05:58:06.480000 -CVE-2021-27497,0,0,6355990b20f9d8fc9266e11dfdd5d7e0273af17e13408fcd60a3de827ccbe49f,2024-11-21T05:58:06.597000 +CVE-2021-27497,0,1,dc80811f616f6a1e11af3b82b0e87ad31a9cdf8a215563311d6235e8054bcccd,2025-04-17T16:15:23.113000 CVE-2021-27498,0,0,ad5806b5d37bbbdc8c5971efe4541f7353f3524699feb9a7e183503d094a4993,2024-11-21T05:58:06.727000 CVE-2021-27499,0,0,1da32b0bf9ed6438c84dae94e4b4b3d364617581622550e7667616dac8597936,2024-11-21T05:58:06.843000 CVE-2021-27500,0,0,75171c142f0f6f51431a2ebc5963ceb66f20c538a18407bb128431af19292885,2024-11-21T05:58:06.953000 @@ -173693,7 +173693,7 @@ CVE-2021-28650,0,0,99c6eb47e1a295335cbde647bf87f857c1defedc2d98d794e4a16cdf0413d CVE-2021-28651,0,0,29692802c62c3127862795e3a702650452baf16c7410be0b0917da4bdaac48af,2024-11-21T06:00:01.677000 CVE-2021-28652,0,0,2dd1528d6acc4143a8a581feac783cfd0fd299526d271d0f7e66418c3a2a65bf,2024-11-21T06:00:01.900000 CVE-2021-28653,0,0,542db028ec781e36406b9beb45352a46667d72806928b03a3941bebaa4dc3988,2024-11-21T06:00:02.120000 -CVE-2021-28655,0,0,a54157c90c0d91aa582344be56620e71843220aa9eeb4887b771073affd0879d,2024-11-21T06:00:02.277000 +CVE-2021-28655,0,1,b62f6fca6055d16dc2d814eb9178c060737f51291d9cf73bca46c380f16e15ee,2025-04-17T16:15:23.250000 CVE-2021-28656,0,0,818a0eccc8c86ef8f4c264a146bebd524d42e2cfabe62c766f34a6f2d00ccce8,2024-11-21T06:00:02.420000 CVE-2021-28657,0,0,7bba244489588d286985d30c08383e7b7926103c96a2db45e7f4898bbe7ebe8e,2024-11-21T06:00:02.613000 CVE-2021-28658,0,0,2e2c72909aff60bd6e3ca99ab0b0cf929e00df5fb983c569f10734b8b1022791,2024-11-21T06:00:02.827000 @@ -176937,7 +176937,7 @@ CVE-2021-32956,0,0,c1168175ae4295b69fcf80e6cda043568b95cd445950a900f168afe085f3b CVE-2021-32957,0,0,fb75d0f2880d6695768d8bd3667373b603a2eedb461c4ab11575eede9a079699,2024-11-21T06:08:00.263000 CVE-2021-32958,0,0,48cd0e60be9a42428bcc33d9f529e25b4c500b504c60eff1ebcf51e1e9f69437,2024-11-21T06:08:00.390000 CVE-2021-32959,0,0,265b3a260074928026d4705fd0b1503ad16117e3100737b8dbaaa3d000e7eef4,2024-11-21T06:08:00.513000 -CVE-2021-32960,0,0,547183355c4dc9c8afc256928b14712291adec3ad9b30af2cb2107c6d32f2363,2024-11-21T06:08:00.637000 +CVE-2021-32960,0,1,ac538a5ae69d20ae9daf5fac81defdc66294ffdb3bb4810eeb2e38ac251dac8d,2025-04-17T16:15:23.433000 CVE-2021-32961,0,0,8288a148fed1266b9238d8a89061af97e97013c740ad7e1c16f12ef6408d8ce6,2024-11-21T06:08:00.753000 CVE-2021-32962,0,0,86dad0dbf1f364bfb6742245c756b43ef193efef44cb54444ef8e0e40938991d,2024-11-21T06:08:00.883000 CVE-2021-32963,0,0,4f33c836d33817733d6b636b53a49b7e419d734ae9190f6913128c4a7c5dda01,2024-11-21T06:08:01.010000 @@ -178079,7 +178079,7 @@ CVE-2021-34522,0,0,76cb3b9f961b7fa625a706c179c3aa44635bd6ab1f6378c9aea69512c07be CVE-2021-34523,0,0,b394a5d8e9f94641d6383c499001ed9cd91ebee199977abcc86c4fdd2823e923,2025-03-07T20:16:42.750000 CVE-2021-34524,0,0,14217f656e46490b7b99f1d06acb14915698fe81e852b6649eadd5b0e72122b0,2024-11-21T06:10:36.140000 CVE-2021-34525,0,0,f2eb365a183ccf3725ad9aa4bfcef667ce84e13fdeb29b2c958fc5feb3f53a5f,2024-11-21T06:10:36.267000 -CVE-2021-34527,0,0,fa9b352a2902279410649cbe75566686d9b3f1b855ace0842f958f9d4f3dd9dc,2025-04-16T16:15:18.007000 +CVE-2021-34527,0,1,5a86916c16836aceee1f493883d2e90e24cad7c5bc0c8456cca067ab74c03d2d,2025-04-17T17:59:06.210000 CVE-2021-34528,0,0,6b44be6737bc27ae22c0992e1518de44382b9209aaa7b5608299ebf2a18c382e,2024-11-21T06:10:36.563000 CVE-2021-34529,0,0,fefb732ca1552d74a0d5e731b8eb615f91bfcebc28cf432a9cef4ce1d926f547,2024-11-21T06:10:36.697000 CVE-2021-3453,0,0,8dfa4efb734defb0cc6a9845941e8509aee85624413f066e3915eb5c99f049e0,2024-11-21T06:21:34.380000 @@ -180957,13 +180957,13 @@ CVE-2021-38407,0,0,33e2e9801bab52630d9c70e90a5c25cd149369ba148536bfc5ef30d1479f9 CVE-2021-38408,0,0,1fe64e91cb330546d69190a93a7fe755053c83fa4c4e5989043ae91afacf4169,2024-11-21T06:17:01.487000 CVE-2021-38409,0,0,13662e204d03e6db762b8bc0b42c789b9fa8166df1c6faa644b25cf1c3b11209,2024-11-21T06:17:01.630000 CVE-2021-3841,0,0,e85421f47656fd7a9993dbfde77410e624c2ae5520144ece4cb9c629f4724c5a,2024-11-19T17:11:49.017000 -CVE-2021-38410,0,0,6d57981084a1b97ff71eeb87343ec9c003beab7d6e4d6eb408b9a29a5e54fcb3,2024-11-21T06:17:01.790000 +CVE-2021-38410,0,1,7d0a62ef25d1dc1e89631abb0ff9ead4b238132431a59b01bd8f5dcc856935f4,2025-04-17T16:15:23.570000 CVE-2021-38411,0,0,9830ec91d1ff71652f6d2a41baa313af829a78a2803fbd81abee802ffda6eaf6,2024-11-21T06:17:01.970000 CVE-2021-38412,0,0,93e46bb81b33f6a91e0a2db4597488796700b3992831e9943df1b58cd4d1c7d9,2024-11-21T06:17:02.130000 CVE-2021-38413,0,0,4166cc1c2c8c3dbb53e66ce05f10d8fa7424c30f50cd928ac88b78520bd70b22,2024-11-21T06:17:02.293000 CVE-2021-38415,0,0,f053aa962e16a1a7bc45e55f12bc99fcef27d016f95594e67f86e4a3a9a2dc18,2024-11-21T06:17:02.447000 CVE-2021-38416,0,0,95a42dd0d96c840ddd5010ca5633ea93d6b698f64311b03564a9e1a77d483535,2024-11-21T06:17:02.640000 -CVE-2021-38417,0,0,c14ecb6374b9379c77093177ab3e182c96ae1bec1b7b5c5e53615310ff25ee09,2024-11-21T06:17:02.813000 +CVE-2021-38417,0,1,23a24c560127ae0fc0df4c4af00f8a31dc973ec272c2367622e9b75812fb7816,2025-04-17T16:15:23.727000 CVE-2021-38418,0,0,6250f9c56d58949cde3899963e1ce10252eb67ca99253f735ac72876d5f6292d,2024-11-21T06:17:02.970000 CVE-2021-38419,0,0,b17af42c438ad0e633dadd7a910650346870f7cadc24463af2aaf77f24e0c297,2024-11-21T06:17:03.123000 CVE-2021-3842,0,0,58fafa173aa16d11ac06309bdd1bb95f457586db17cf51a3e1698072e5f5f857,2024-11-21T06:22:36.753000 @@ -184189,9 +184189,9 @@ CVE-2021-42531,0,0,f114fd20658385239a3fe0b78d51289b422ef893d02d7aff4b498233c683e CVE-2021-42532,0,0,db00d0d0388d176fa467d2c6b6c73db69f513f1d961eece3af27262a8c51c12b,2024-11-21T06:27:45.060000 CVE-2021-42533,0,0,c8d270b69f0681726c2189b66530ee27ba38f18275106403f589098b13b0babf,2024-11-21T06:27:45.183000 CVE-2021-42534,0,0,d3b2964bfa837245fd80e13ad98cbce658f349f5f6fb282ab66cb7afc12f8498,2024-11-21T06:27:45.320000 -CVE-2021-42535,0,0,a6ec7f55d104af9c8d8402f103c6d663511bf4c1a0c11fcfe8fca2a99ff0ff28,2024-11-21T06:27:45.453000 +CVE-2021-42535,0,1,fbb93c64fbee21ba20cf0e0bdcf685636523cd0797cecf59bba325c6a3523452,2025-04-17T16:15:23.857000 CVE-2021-42536,0,0,c7cd77c9bcfcaa9c57c1406ec1b6347175d1c29256cc1ffc34fe1fd14ebcebc9,2024-11-21T06:27:45.577000 -CVE-2021-42537,0,0,6dec041ef8e3e42012b3caa60672e927f54e0be51c22a5a83e2f952d753b4ae7,2024-11-21T06:27:45.703000 +CVE-2021-42537,0,1,6ee1d4dc4e71bb601b219c18ea44c8003f07265ca35edb199fc89472d4b50357,2025-04-17T16:15:23.990000 CVE-2021-42538,0,0,3530fb82e08bee3cd943c010e19dced7e6a4a15eb40a1702a7a6bb61e3c2c34f,2024-11-21T06:27:45.823000 CVE-2021-42539,0,0,6ddafe5b7136622ed9c961c05938d271c7633b8f2e7918abf5f906c1a669b5b4,2024-11-21T06:27:45.957000 CVE-2021-4254,0,0,be64d75b254d742d2d58dea88672bfd043bd1966d6a8edfe1ba44d5031f81535,2024-11-21T06:37:14.727000 @@ -185654,7 +185654,7 @@ CVE-2021-4446,0,0,fc600d102e4efffc5b4f3dbfa3240a392aea976863fe29ddd959e229228250 CVE-2021-44460,0,0,a69e89211633952e61608b5a9514bf5af38fbb780ec06e9ace0705cfaf6c9f48,2024-11-21T06:31:01.170000 CVE-2021-44461,0,0,acc58e28fdc527e49ddf12b5a8172b5a546a00f1f68f323bd2547a4f3c57aa75,2024-11-21T06:31:01.323000 CVE-2021-44462,0,0,2b52ddb9d5ed6c813d39bc902442cf8a78ae7687d145e0c566feff9614cdd4e4,2024-11-21T06:31:01.483000 -CVE-2021-44463,0,0,75d5f4cd2e15ce76616db543de6b4ce4af7b1151a87c381fcd08d9940283d0fb,2024-11-21T06:31:01.623000 +CVE-2021-44463,0,1,4cc10f29c7466f17b9e82b7eff8abb035994a228284e2262ca74f19a84fc18d7,2025-04-17T16:15:24.120000 CVE-2021-44464,0,0,097c2c496a79baf595a839b9658c642899762eb048cae9ff7daaa61f41ab2c39,2024-11-21T06:31:01.760000 CVE-2021-44465,0,0,10ef8ce844e0b30b60d363cf3b91e3d0f72045ce9d16b483c2754bf3e17bc1a8,2025-02-03T18:15:27.513000 CVE-2021-44466,0,0,ed333b2898add6f907be4eb4d08607833c850890069282b2d73ae7ab66da838e,2024-11-21T06:31:02.027000 @@ -187173,7 +187173,7 @@ CVE-2021-46851,0,0,6cecbe8acc29fc82a6081f1633d57d9cbe591d771645daf1889daaa3ef31f CVE-2021-46852,0,0,8ccf025953a95b95cf17f544db7ea1b0c6370df1a164132f011f691db3776fd0,2024-11-21T06:34:48.583000 CVE-2021-46853,0,0,584321f4125de6f26f178a9a570f2fec5891c881a8434007af451daed8523276,2024-11-21T06:34:48.690000 CVE-2021-46854,0,0,aa00373d9c0cbbb910d324fbcf8b7b043129b3f21cfd64005dc5e6852d7808fa,2024-11-21T06:34:48.847000 -CVE-2021-46856,0,1,c343aae2884d63668d219012a270463847beb43cfdd8c1d8b51289c303bc1723,2025-04-17T14:15:19.187000 +CVE-2021-46856,0,0,c343aae2884d63668d219012a270463847beb43cfdd8c1d8b51289c303bc1723,2025-04-17T14:15:19.187000 CVE-2021-46867,0,0,3b9245057f38ad51f062cc7f44b94fdcabd578b0de99fa150e2281c87b7e1c46,2025-04-10T14:15:20.953000 CVE-2021-46868,0,0,c473b299e085b8588dd13295e8bc761d62b4f9c633815f8f908c991821aab581,2025-04-10T14:15:21.570000 CVE-2021-46871,0,0,b16edf6318dbacf9097c58cffb8074dd1aa41ef5425a3e34f8f1316ff51e3fe2,2025-04-09T18:15:44.107000 @@ -188930,17 +188930,17 @@ CVE-2022-1055,0,0,dfaf80ca9a477a3fa6599ce08e07f6c6bb51dbd74c40b1ca53979ca100b5f0 CVE-2022-1056,0,0,4028746578dc1aaeb5b9cae25e0044d08eeecd2909e0d85377a003664e2306c9,2024-11-21T06:39:56.823000 CVE-2022-1057,0,0,8cbe4facf5391721c389fa8a4cbf9bd50f6a3a23ab906584255d1b772f4048c7,2024-11-21T06:39:56.973000 CVE-2022-1058,0,0,03d17c9e495627202bc2d0a1a15a2a3503f4a4afe20304f6d7acadeb337a75e8,2024-11-21T06:39:57.097000 -CVE-2022-1059,0,0,f028e4b5125ce98cd11a19f04d9fc5739228461962d95c2eb3279d33624224ad,2024-11-21T06:39:57.217000 +CVE-2022-1059,0,1,43a53f3ccf4b235d714cfebc5546e4f1c998712733cafa11d5bdd77b221058d9,2025-04-17T16:15:24.267000 CVE-2022-1061,0,0,e3903716e4577845bdda63abc9434a41714d6966fa066b5a4a7ac9504dd9b503,2024-11-21T06:39:57.340000 CVE-2022-1062,0,0,92c61601afe24b168343c9a5f5603af7b447d6f58670e0bc371565616724271a,2024-11-21T06:39:57.450000 CVE-2022-1063,0,0,dd09ead1716f9d1f134d24169af05d4ed279d017bf923bc55adb1fc9362a599c,2024-11-21T06:39:57.563000 CVE-2022-1064,0,0,18f5183952dde0b0a29f1a572bdceb709cd0c279c222d254eccf6d684c8fbdfc,2024-11-21T06:39:57.673000 CVE-2022-1065,0,0,6ff3d826086c7b4ff8f6bf6baab07b458c7826cafc2b3f2f87f7f81f1a4b528e,2024-11-21T06:39:57.797000 -CVE-2022-1066,0,0,849936a11a94be61c52ce34d66c8f8f0883d971287f010bdc3cb303ead95ff4e,2024-11-21T06:39:57.923000 +CVE-2022-1066,0,1,4a78855c03f1d8c9aac11c4b01ce611b3574bb1637c160a34008a5e3a52bfbce,2025-04-17T16:15:24.417000 CVE-2022-1067,0,0,ba21fe2e34bfe4d6c3bd0fa62c031be8aa6fe8e1a47607fc4305e7e6f260ea77,2024-11-21T06:39:58.037000 CVE-2022-1068,0,0,e2e6b7dd4004f200e79432677783e21816e94ebd985c265128e930e77bbdad70,2024-11-21T06:39:58.160000 CVE-2022-1069,0,0,81f68190eb7c42cc5db9ccd61d212663ba7e50a1eb908db189b0e1f81a05ef00,2024-11-21T06:39:58.277000 -CVE-2022-1070,0,0,5689c215e254a7c6407073ee765ec621f1c2153d15d999769c58d79d3e54af4e,2024-11-21T06:39:58.407000 +CVE-2022-1070,0,1,12893aefb5dcecd3868f98dc755e38dcc0bd9991c65ac1eb5d1e1b59d31faa44,2025-04-17T16:15:24.543000 CVE-2022-1071,0,0,d45a7887ce82c149f879f33879f167cde169d3e5b4671018b97131ebf16c87c7,2024-11-21T06:39:58.517000 CVE-2022-1072,0,0,2c898bc831c92a632db1fd1a6b085fbc48ae07d34e0d02dca6e8f190596a7de2,2023-11-07T03:41:43.957000 CVE-2022-1073,0,0,890e0407256a1794922f249892f9904b3161152578b7fc28f7c25d7730318297,2024-11-21T06:39:58.650000 @@ -195601,7 +195601,7 @@ CVE-2022-26318,0,0,30041f5e9a4822da4d6e3ce474b508bd262fd054cff46c59113e7c7776f21 CVE-2022-26319,0,0,aae94c99a197b8535bde1116c111360146fe08e202aa001adccde9bf2212a6ff,2024-11-21T06:53:44.863000 CVE-2022-26320,0,0,f546cbedbd1df24d241d15972b832f4c24e0d4ba512c0b3e93a69f4b283ef02a,2024-11-21T06:53:44.970000 CVE-2022-26322,0,0,157099110b7fa8e1790850b4d29e23cf6ec05bfe85652c2f81e2885205b91c31,2024-10-02T15:03:41.997000 -CVE-2022-26323,1,1,fdeba7c0d6b84cf06b74dd3f3f6c5bfa4484371c121a239c7a20db9ded5ef132,2025-04-17T15:15:45.547000 +CVE-2022-26323,0,0,fdeba7c0d6b84cf06b74dd3f3f6c5bfa4484371c121a239c7a20db9ded5ef132,2025-04-17T15:15:45.547000 CVE-2022-26324,0,0,f17a183a69da7bfa7321588963d1cf2bcf1154098a4fe24026a0bffc35a55536,2025-04-10T19:54:25.537000 CVE-2022-26325,0,0,73e03d9338e44fdad4e3d598ad13c3ab5be01b7d6c1a5fb36a34c8c0837e99a4,2024-11-21T06:53:45.253000 CVE-2022-26326,0,0,7198aa067f5918a03bc61451615cd097c2a5738c0a3f83c4ef572143e84f1476,2024-11-21T06:53:45.367000 @@ -195687,7 +195687,7 @@ CVE-2022-26419,0,0,60c458c8f72efdaf99c17f7084c3313e9eb94021d8512ef42b573e9e6e134 CVE-2022-2642,0,0,b6c0505844f2e1d4b8c2f18b4da6be52244bb81aaca30ba8eb646dd60195b6a2,2024-11-21T07:01:25.697000 CVE-2022-26420,0,0,41f1654d44d598ce4f89c8687143d8f9925c7054fff09568873e8a8bd9deb8f2,2024-11-21T06:53:54.983000 CVE-2022-26421,0,0,889c05f552e632f76c032267a758444d186c2a5bd7a84a5c3b05f8f74835ccb7,2024-11-21T06:53:55.097000 -CVE-2022-26423,0,0,60a1a8339d987ea4e19cc3111dd9eb0aa9026b5952593fbf71bab1b60390a251,2024-11-21T06:53:55.210000 +CVE-2022-26423,0,1,8df1218b3bfeda3747889fbbe45f9de84d53d81168e834de0a3c83fcaebb79b0,2025-04-17T16:15:24.677000 CVE-2022-26425,0,0,daffc7ec0e02a47b8dbbcb5c0158014158e882277029c1859c1f9225b08e7ede,2024-11-21T06:53:55.313000 CVE-2022-26426,0,0,08ad20534cd00378db6091c08e4cacc8fb2176ab58cfb5b1d6c5a2e23efbafca,2024-11-21T06:53:55.420000 CVE-2022-26427,0,0,ea1054d59fa917c9466377241851610d607e599b6aa142e541090a325f2bc7e4,2024-11-21T06:53:55.530000 @@ -196540,7 +196540,7 @@ CVE-2022-27490,0,0,caa845b0bc3c21e72ec430c1bb91d0947629956b0eead13ce1096d9d7ae09 CVE-2022-27491,0,0,8a7d2a569689762339050e1db2eba7ddc2305665c61fafc0e8565e91ee3fb10b,2024-11-21T06:55:49.903000 CVE-2022-27492,0,0,ced91e0048ca7c83b66693a736c13d17d779d0f9b27c488111d6615fa1e551b6,2024-11-21T06:55:50.043000 CVE-2022-27493,0,0,574b83e21bd3e183e90bfdb529f2c8e271fcb46c3853eec91fb6a4fd3817419b,2025-02-18T16:15:09.020000 -CVE-2022-27494,0,0,b5e4c7775e0d6176d23b0fb12b6a970b96dbce2c8884f72b3a008868b3622bc6,2024-11-21T06:55:50.290000 +CVE-2022-27494,0,1,fe079544a225b21f317f69c0c849a2c6bfd503e4f60f1487a98a3b50fa04830f,2025-04-17T16:15:24.810000 CVE-2022-27495,0,0,71ecb2cc76801c85c8467f4395a420002118e2b27be3cfb1821a32679e396cc2,2024-11-21T06:55:50.420000 CVE-2022-27496,0,0,525472f4d923f606f377ed6195861e6894790651b972bda97b2d24b4e96f84ab,2024-11-21T06:55:50.550000 CVE-2022-27497,0,0,73fd6fac24ea96adc9a9b1bd6ce98b1e8d8fc5fe94d7df3709120acf11c25823,2025-02-05T21:15:16.263000 @@ -200919,7 +200919,7 @@ CVE-2022-32745,0,0,98e5b01a1bc3518cdb5cd1ce9f6d38449e8d6e15e91c9b9a935ab37363f1f CVE-2022-32746,0,0,8256db33ddfe3e9501a99e5b089db29d87be53e15394381cc4802218bcecc3b0,2024-11-21T07:06:52.830000 CVE-2022-32747,0,0,bf0b5159f7134f87dfefa1ad1d843b13aee599dd17e0362fbfacba27098d0dbe,2024-11-21T07:06:52.950000 CVE-2022-32748,0,0,72a5e88646a7c17ab0488d1b947b17426503435f9b34cdd6482878f22e466004,2024-11-21T07:06:53.077000 -CVE-2022-32749,0,1,2f86fff116489e00172f2c2e60b5dbdca9e70f07aaf0e481f85c07aaaaf11386,2025-04-17T15:15:46.167000 +CVE-2022-32749,0,0,2f86fff116489e00172f2c2e60b5dbdca9e70f07aaf0e481f85c07aaaaf11386,2025-04-17T15:15:46.167000 CVE-2022-3275,0,0,eceb42e539fcbe6ddda201bd15ed8b28abe1233474827fb2e768c6403723079b,2024-11-21T07:19:11.697000 CVE-2022-32750,0,0,b8eae0b61be29a52f14a4bc45dfa83eb1a42269626e5e68d13191c05f3472c5f,2024-11-21T07:06:53.310000 CVE-2022-32751,0,0,df5d3fed44a29f6767e4bb5733e18cd46436c6a695fe61e629d17fe33e31606b,2024-11-21T07:06:53.430000 @@ -204661,7 +204661,7 @@ CVE-2022-37389,0,0,e59e1ba41a4e71b5dbcdabf71337f2017a7ddbf4e43c7927aa748fec37bce CVE-2022-3739,0,0,6e48c6c076ed145daa5cb6760a5ccb812a050ec0f171a9e4b9a1634109658ea0,2024-11-21T07:20:08.650000 CVE-2022-37390,0,0,c07100876566f0eff6b0e7a2bf33b52907abbe139707c0bdffe138908b6c30de,2024-11-21T07:14:54.220000 CVE-2022-37391,0,0,2272ee3d942a589984f99d66c2844cb4a68e13d51eebc933777249dc861546e1,2024-11-21T07:14:54.380000 -CVE-2022-37392,0,1,8ceff584e5533015489b8374e6c90b407441e1dff91a98b2c4622e42ba117a34,2025-04-17T15:15:46.340000 +CVE-2022-37392,0,0,8ceff584e5533015489b8374e6c90b407441e1dff91a98b2c4622e42ba117a34,2025-04-17T15:15:46.340000 CVE-2022-37393,0,0,c3181b517a237bf1a0de5a492f637fdb9ea7b01dc4f4c646cc820f5ef10bb566,2024-11-21T07:14:54.630000 CVE-2022-37394,0,0,21367e57f4d8c66d441cb63ab048d468b4e423ce7885fd8e12b1a8a1096ef56e,2024-11-21T07:14:54.783000 CVE-2022-37395,0,0,376d36dbd471113b37a87cf4607937a3a907fdf4dcf21953d3d01f2bc885032d,2024-11-21T07:14:54.943000 @@ -205283,7 +205283,7 @@ CVE-2022-38311,0,0,edf4c524f4b3b4766fab2dfe3272c54df888ee510433242ad7f7363ef49b0 CVE-2022-38312,0,0,9180aedab589aba05e0f781706ff46b1357d18f29131316cac546e53c50d9d83,2024-11-21T07:16:15.160000 CVE-2022-38313,0,0,ad753203f9385f4f90a924ac9465e4ec074a3182953e5766e1334caef647637f,2024-11-21T07:16:15.380000 CVE-2022-38314,0,0,7227b50bdc696837bf9d2cdc4ab1b705adfa3509dc801e67ea57e93718d2f5c7,2024-11-21T07:16:15.593000 -CVE-2022-3832,0,1,d31b9e01f12ee4063b1eb877e5c17df9592798af866aa187cc678cd9bee40ddc,2025-04-17T15:15:46.503000 +CVE-2022-3832,0,0,d31b9e01f12ee4063b1eb877e5c17df9592798af866aa187cc678cd9bee40ddc,2025-04-17T15:15:46.503000 CVE-2022-38322,0,0,b570471af3ac3da045db7127371f2f749811c7638f1312d2f0b9ea2e13584889,2024-08-12T13:38:09.530000 CVE-2022-38323,0,0,a59aa796c66304243a913448227bd84dfae16a322d88dfa5c15f131a7b9c60b7,2024-11-21T07:16:15.833000 CVE-2022-38325,0,0,f05814fdb2faeaa1a16993e9c3e4d8b593360da26da02c45383df8aed9d115bf,2024-11-21T07:16:16.047000 @@ -205538,7 +205538,7 @@ CVE-2022-38655,0,0,7bc5c2e3d1bd49fc665c549161cb0b3967ec7afcc2efdba5b1b4049f5bc72 CVE-2022-38656,0,0,9969c33f07a47a3ebf924ea86ef69bfda74e6c65e80c6debe3dfc08177355232,2024-11-21T07:16:52.520000 CVE-2022-38657,0,0,c811d80f9a3565d582a61b36a5eb1520d084c2b77edfa2735d3cc764284bc4f1,2025-03-26T15:15:39.237000 CVE-2022-38658,0,0,794175fdf236dc5f51c33fd597938691905eba9e5d2f6a359ea3c20fc690763a,2025-04-15T15:15:58.707000 -CVE-2022-38659,0,0,3c4c7ada7c8331675426d8c943bf1478b882da00fa63c088203946a32b296485,2024-11-21T07:16:52.910000 +CVE-2022-38659,0,1,58e5b237d3c07629b4367918e82fa9594c14bfe3e19dc4ea2557b5739ee2ed14,2025-04-17T16:15:24.940000 CVE-2022-3866,0,0,3d970fd80f6c1be267c4c8388bb1f4b67e77a430b208ca935a260ec59b874a6f,2024-11-21T07:20:23.823000 CVE-2022-38660,0,0,d40786455fed96cc2932b580aeea77bcb4a57573df74880f97f370ab5b61f293,2024-11-21T07:16:53.040000 CVE-2022-38661,0,0,899e093edf2520f846c936ca0282ce76cecc92c0c05e4f8533a7bfb7d5906f7c,2024-11-21T07:16:53.177000 @@ -205704,7 +205704,7 @@ CVE-2022-38868,0,0,a329e5aa5f67a0e1f151d9c71d61b4d476d8a4b5fcbcfd6d9c7a6c8fe931c CVE-2022-3887,0,0,06c658cfbdd81eef4d6500a637650189da6a52b1e7f7631d7ae6ba5ec9938709,2024-11-21T07:20:26.720000 CVE-2022-38870,0,0,e70b6b96c4141983a674b240e16125c6a6a7f9ff2f0a05dd5d6b5a6c0a0c5ece,2024-11-21T07:17:12.687000 CVE-2022-38871,0,0,653879fc9609700ed09ec778b9771c266a8d9b487aa13665630d7387a356abe3,2024-11-21T07:17:12.870000 -CVE-2022-38873,0,1,b5054676743f28620381e7d6efb1cc1ba6e73f7d8c8e58c775f25ee22de1d1a8,2025-04-17T14:15:20.023000 +CVE-2022-38873,0,0,b5054676743f28620381e7d6efb1cc1ba6e73f7d8c8e58c775f25ee22de1d1a8,2025-04-17T14:15:20.023000 CVE-2022-38877,0,0,4701a43015b4cb4d459803d0517c56aaad73426435129e2d43405fd1bdba4c12,2024-11-21T07:17:13.210000 CVE-2022-38878,0,0,dcbbdd56e6aab13167b0694bbaf8f09085e228dc467c626e7970da6bb7e050bc,2024-11-21T07:17:13.353000 CVE-2022-3888,0,0,5c3814367af59748757c4077b6c754e04eb08ad64777da953869d2d198ed2f06,2024-11-21T07:20:26.950000 @@ -206161,7 +206161,7 @@ CVE-2022-39366,0,0,d8704d9146cdda472126fc6e79404279145ed974c00994fa57ec929b93de4 CVE-2022-39367,0,0,7396a2f275a74dbd415c404c9d94eb1199e3fae11804ea0463549958568a8896,2024-11-21T07:18:08.767000 CVE-2022-39368,0,0,5deadaa09c3b6bc8ab95e21971cdd2d20b79d14b16a433ad32b41ffbaa0ed19d,2024-11-21T07:18:08.903000 CVE-2022-39369,0,0,f5d4b05ed21e5afa1b755527de7a2d782c4846a60cf88aa64a9e9be288ccee9d,2024-11-21T07:18:09.047000 -CVE-2022-3937,0,1,c1e072c8996e9655ea9112ee3b3430e5c01d2aa5ce299ac645861c9d73b963cc,2025-04-17T15:15:46.650000 +CVE-2022-3937,0,0,c1e072c8996e9655ea9112ee3b3430e5c01d2aa5ce299ac645861c9d73b963cc,2025-04-17T15:15:46.650000 CVE-2022-39370,0,0,e28ea5a159787130b81b962f69abd9503ceb0817f36df53f0b2110caefa4fbfd,2024-11-21T07:18:09.193000 CVE-2022-39371,0,0,ba0def1155505f825fdc462f4a0996e00866f2f2c8e2afdc8d13071401f7814e,2024-11-21T07:18:09.313000 CVE-2022-39372,0,0,375b17c7bee06eb16b5d844a48278fd9ed99f8e0b6a9ecb3226a5b37f78f2f49,2024-11-21T07:18:09.450000 @@ -206237,7 +206237,7 @@ CVE-2022-3957,0,0,0d3ba3fbf2933dae76f736e46a00ebfe9184e90863760202111cc9a3d7e0c5 CVE-2022-3958,0,0,7b700196dbef58358789bbd80e64a729132e3eff4f954c8efe14989bb2d41c3f,2024-11-21T07:20:36.960000 CVE-2022-3959,0,0,04474632f361e0b3d5d068c8e641cf3c2b23c7d69f0a1380a4c03d344b0486c3,2024-11-21T07:20:37.077000 CVE-2022-3960,0,0,6f6e1c498392786ffaa0f49d89e523804aedc29ac5b3da91a90b22517164f0d7,2024-11-21T07:20:37.233000 -CVE-2022-3961,0,1,2c3add5ef269d56ba1f0cd2abfb634722b67f10552bec7c0a0514f4837cdcddf,2025-04-17T14:15:20.300000 +CVE-2022-3961,0,0,2c3add5ef269d56ba1f0cd2abfb634722b67f10552bec7c0a0514f4837cdcddf,2025-04-17T14:15:20.300000 CVE-2022-3962,0,0,e0cc1686fdf1321df64ab1cd498fb5f198eb65e0e402ec28ad900929ea877575,2024-11-21T07:20:37.480000 CVE-2022-3963,0,0,a9cd746f621cf51752043e66e43b5f6176eab1439e7aec6c42fb15aa00cec692,2024-11-21T07:20:37.623000 CVE-2022-3964,0,0,f9c2b44949c561dd53f4db100945459cd978b8e54065d6f9e85b72bd64c2f8b2,2024-11-21T07:20:37.760000 @@ -206287,7 +206287,7 @@ CVE-2022-39823,0,0,a298f3a9612b6e7b0fad618adc8d5ebaf95246a4704e19cbc55113021e146 CVE-2022-39824,0,0,d5590230b3c7d79eeaab3cf94d050f0a608a950c1161159ca002f184a4c89322,2024-11-21T07:18:20.117000 CVE-2022-39828,0,0,c7a4ce92b08d9f922353a498acc01f1b3e94149ae53016043b56f1d5b3d26016,2024-11-21T07:18:20.267000 CVE-2022-39829,0,0,e451ee3c18d70ff71344a9a3d8e2d4b0da7c9012d472b40c2ea9d18d1ca119fc,2024-11-21T07:18:20.437000 -CVE-2022-3983,0,1,d794e6315c6722e59435044d411199ec69d62851b751651d7ab37c60dd7942d6,2025-04-17T14:15:20.467000 +CVE-2022-3983,0,0,d794e6315c6722e59435044d411199ec69d62851b751651d7ab37c60dd7942d6,2025-04-17T14:15:20.467000 CVE-2022-39830,0,0,1a53f9a0c805070d08317c3198c3ce648a69604b98996270e41e5401dfdbed0d,2024-11-21T07:18:20.593000 CVE-2022-39831,0,0,6647cab5a7afffc101f38a386b2a1d7c05ddd3f627430f15d5bc270e4eabdfe7,2024-11-21T07:18:20.743000 CVE-2022-39832,0,0,959c51b3e9de6b599e2bb223c7b48847396771ef68be3e4116dcd0ae97d10669,2024-11-21T07:18:20.907000 @@ -206298,7 +206298,7 @@ CVE-2022-39836,0,0,a2ec779c3d6c742b4e24b5d92d8949f5c8c5c86acbb8fe8d5d0b5361fa79e CVE-2022-39837,0,0,06af063c8524f75c1864084cbaeb935bf3fce1e47a495219f0f6d1e87ec30a73,2024-11-21T07:18:21.687000 CVE-2022-39838,0,0,2df55a201c16a27b908d4717b23df788c67f9c15d0d495e884d66e5696eab0dc,2024-11-21T07:18:21.837000 CVE-2022-39839,0,0,f9ae2aabb83b21c46835948c3d880e070b83a7a78a78ed2101cda009dbb3f1ad,2024-11-21T07:18:21.997000 -CVE-2022-3984,0,1,6f2069aaa1df928eea864182e08d0743bbc0045f3c6da6e40295e00a2962758f,2025-04-17T14:15:20.613000 +CVE-2022-3984,0,0,6f2069aaa1df928eea864182e08d0743bbc0045f3c6da6e40295e00a2962758f,2025-04-17T14:15:20.613000 CVE-2022-39840,0,0,476d692e0f0e2944c010118da033d20a7693ac8219b21ef27aa2236579fdbe2a,2024-11-21T07:18:22.150000 CVE-2022-39842,0,0,c95db10a5eab826896c629b80a09c08943f0ac451f338d693af5071b3bb46c94,2024-11-21T07:18:22.310000 CVE-2022-39843,0,0,998e065aa9b2d2cb697dfe3777907dd6c9dca910214b555408ed5d1af0c020a6,2024-11-21T07:18:22.500000 @@ -206308,7 +206308,7 @@ CVE-2022-39846,0,0,7082980fa68e1b42b7a535402045cbe8d2d33a8f5b11b64d11e49d0837d77 CVE-2022-39847,0,0,8ff7615cfbeb2278c81b5f47cbfaf5b6526cbe7d4fb6ccec137db741a03cadd3,2024-11-21T07:18:23.030000 CVE-2022-39848,0,0,eff5409ff20d79a4bee2e3581452da49f353be4fa7142f8151bb7e2bc7def4f4,2024-11-21T07:18:23.147000 CVE-2022-39849,0,0,3747b91676fe8b3dc2911f7012aab9a75fe59c2a4b4653b7949ff02fb580296a,2024-11-21T07:18:23.270000 -CVE-2022-3985,0,1,2a428460c01c5ea97faf320e805dfe6008f63da749493dc389a6fbbd42d462e8,2025-04-17T15:15:46.790000 +CVE-2022-3985,0,0,2a428460c01c5ea97faf320e805dfe6008f63da749493dc389a6fbbd42d462e8,2025-04-17T15:15:46.790000 CVE-2022-39850,0,0,30f7b5c5bc38522f5105e4953aae6cde1ec74b1e04b09ddd9d2811e93a4550f8,2024-11-21T07:18:23.387000 CVE-2022-39851,0,0,299a369717e25f0395429e4bdd44e7b9bea497653a38f241c5937ea73cc8076d,2024-11-21T07:18:23.500000 CVE-2022-39852,0,0,d6127a3b28788b8da8d78514a9ab28da60ab2060dd6193e27fceef369efbeeb3,2024-11-21T07:18:23.640000 @@ -206319,7 +206319,7 @@ CVE-2022-39856,0,0,997841deb1cb686590e9259baeeac654266fecad0da0db05eb12395fd1ca5 CVE-2022-39857,0,0,9dcfcda993bf8bc6c2667b08177a5f0384c619e1541ea31cc02271262e0ff7c5,2024-11-21T07:18:24.273000 CVE-2022-39858,0,0,910f8b9f8c685bd3e65727debcffb7b54b7b265f73e287c6bf47411f7aef85d9,2024-11-21T07:18:24.393000 CVE-2022-39859,0,0,e2bd1205c211e228db7c71624c771040e1e488b1349c7c73a1d582fd927564c3,2024-11-21T07:18:24.510000 -CVE-2022-3986,0,1,8cff77a426ef5b495828dc20cc4bb65c4a3b5dbe506e6ad60ef93449412ec90b,2025-04-17T14:15:20.763000 +CVE-2022-3986,0,0,8cff77a426ef5b495828dc20cc4bb65c4a3b5dbe506e6ad60ef93449412ec90b,2025-04-17T14:15:20.763000 CVE-2022-39860,0,0,2badc5bfd0609927209f9c69df8a0da3574d0cdcd00c5604b51bfa579e4cfb99,2024-11-21T07:18:24.617000 CVE-2022-39861,0,0,65753265e28c9d2f3513ab499836cd6dd16e10646bc4de60b07881464bee5358,2024-11-21T07:18:24.730000 CVE-2022-39862,0,0,293f4098ac7c946cd8bb5d7993e52468d90aaaf314c73170a0a1b430e6bce024,2024-11-21T07:18:24.850000 @@ -206330,7 +206330,7 @@ CVE-2022-39866,0,0,f49570c0813d1cb7e5a54aff5c18a129a7b4eea44982239e94a4adcd304b4 CVE-2022-39867,0,0,6d791da05a6fce321e4414c3c51b67cf3553706dbede29f481970f06b9081efc,2024-11-21T07:18:25.470000 CVE-2022-39868,0,0,aceba2a0635dbab60dedba57ff4a145bec13b36d13a9bc3ea88efc392e1ee3d0,2024-11-21T07:18:25.610000 CVE-2022-39869,0,0,bcd0de191262d546eed98fd0acfd5b71d3af1433dc2af1211437d530dd4b2cb7,2024-11-21T07:18:25.730000 -CVE-2022-3987,0,1,cd011b3d41270dbdb8af4c00f5b31574663e1d10681869158de9d418e019d3b8,2025-04-17T14:15:20.927000 +CVE-2022-3987,0,0,cd011b3d41270dbdb8af4c00f5b31574663e1d10681869158de9d418e019d3b8,2025-04-17T14:15:20.927000 CVE-2022-39870,0,0,78597b5cd5a4c21b6b205ead3df6f9ed9dee7e608b318aca378d8f7f4f1c475b,2024-11-21T07:18:25.850000 CVE-2022-39871,0,0,bf254f888cd2c48d54f139cd09e2b3a4cdc43aeaeddab9b101fefecc6ee18f5c,2024-11-21T07:18:25.967000 CVE-2022-39872,0,0,6e661a9d0df7f1a780b67f5e74d55d71226c9c741c4c554ccfd11c16c94e86ae,2024-11-21T07:18:26.080000 @@ -206653,7 +206653,7 @@ CVE-2022-40234,0,0,dc7276e915eb0303fb56fee661cb9db75c69ec2c8c0623c1b72baefa92f86 CVE-2022-40235,0,0,cfc9dd173da69bfc4f50328128cfdb007f8d9c1bb4d6e0006e147081f1f6dff6,2024-11-21T07:21:07.570000 CVE-2022-40237,0,0,4954862238d12dc4bc4cb258e88279ea6067126cfef55c1eeb2e48b36bc1f719,2024-11-21T07:21:07.697000 CVE-2022-40238,0,0,ea0ebac2280b869384fcc3d3fae7ead6a738b2f69f44acdf164de28cec22fb00,2024-11-21T07:21:07.830000 -CVE-2022-4024,0,1,4eca4d1c63f526ea20c2626c77c85a8f21406c3f683d77743f7c4f68c356be66,2025-04-17T15:15:53.687000 +CVE-2022-4024,0,0,4eca4d1c63f526ea20c2626c77c85a8f21406c3f683d77743f7c4f68c356be66,2025-04-17T15:15:53.687000 CVE-2022-40242,0,0,2c1b13da988148c6f82b45e0835eeeaafc13b92f8b85ab48e54e195d7e3447c0,2024-11-21T07:21:07.970000 CVE-2022-40246,0,0,d5df95078a00694e6a3731903cf29104c819d0dc2d2748ec21e638eaa17b4504,2024-11-21T07:21:08.107000 CVE-2022-40248,0,0,151eb18a52e58c4d240c0eaf6c9201d5529e20792217a71ce3ce09c5dc412abc,2024-11-21T07:21:08.253000 @@ -206767,8 +206767,8 @@ CVE-2022-40430,0,0,310d09c5add76f593811ccc7256b2a899f5f395bc960bc9d2867bf32d059f CVE-2022-40431,0,0,7d181a4fe7495500ea55621afae0ce9c1f741bc868c74ee7e9197816aa1278b5,2024-11-21T07:21:23.713000 CVE-2022-40432,0,0,0c8839fc8a5caa64379f48265b8a2b73b874ec04a216c560f76c08f5b84fe75f,2024-11-21T07:21:23.880000 CVE-2022-40433,0,0,da87aae521fde5bdb8c58039760720130599663230659833b65a6ce7d4d9fcb4,2024-02-17T00:15:08.577000 -CVE-2022-40434,0,0,ef69cda7d70bdcccd38594891b2bd93d6f62322966f9dce2345473b82605a968,2024-11-21T07:21:24.060000 -CVE-2022-40435,0,1,0ce4a8ebef9bbdf8194c366e112f8498fbfc4ab5244a9a954ed062a413afa2a8,2025-04-17T15:15:46.940000 +CVE-2022-40434,0,1,b111f28f08aaf9b0e03d270b506090a9c8deab5ece16288e1c37c6101b42e50c,2025-04-17T16:15:25.137000 +CVE-2022-40435,0,0,0ce4a8ebef9bbdf8194c366e112f8498fbfc4ab5244a9a954ed062a413afa2a8,2025-04-17T15:15:46.940000 CVE-2022-40438,0,0,b737c44621da9c65d67b8659985b6008eb2f13ff5eb2002faa31d452b81db317,2024-11-21T07:21:24.377000 CVE-2022-40439,0,0,74155762f72cbfe6688d93d01f5fcef8b47b096a1deeca94c0622ac0c2373026,2024-11-21T07:21:24.537000 CVE-2022-4044,0,0,8956c85e0b23af5ec5d727de342185a2d88bba42891597660e6efb60727c249a,2024-11-21T07:34:30.123000 @@ -206799,9 +206799,9 @@ CVE-2022-40488,0,0,3a8a60e130cf17ecdc391d08fa8819ea901ca1525bde3b2f0bba2c689d09f CVE-2022-40489,0,0,e743d656669d32e037781e2d73364c483b588e68b764611e48cdeec3098fcd14,2024-11-21T07:21:27.823000 CVE-2022-4049,0,0,8181e06dd3fae450f77160dbe4fb34cd4ca2f899d214ff5c70369731169816a6,2025-04-10T19:15:50.447000 CVE-2022-40490,0,0,027201e4ca2289999a83d7c21c75a857240923a9abc577ba189f3c2b7fe68a7d,2025-02-06T21:15:17.307000 -CVE-2022-40494,0,1,2971ee2f1e72df00356bdff7594516fce15b8044e554c8c19d239c8ee018a141,2025-04-17T14:55:58.350000 +CVE-2022-40494,0,0,2971ee2f1e72df00356bdff7594516fce15b8044e554c8c19d239c8ee018a141,2025-04-17T14:55:58.350000 CVE-2022-40497,0,0,718b25a3e9ff61f82c28c3226d1972f3ae3dd1d71111e6da5c3dcfb3038a8996,2024-11-21T07:21:28.137000 -CVE-2022-4050,0,1,f734c989b98140121ecbe08d2650e22afdb3198a353dfc75862be1c15ed08add,2025-04-17T14:15:24.787000 +CVE-2022-4050,0,0,f734c989b98140121ecbe08d2650e22afdb3198a353dfc75862be1c15ed08add,2025-04-17T14:15:24.787000 CVE-2022-40502,0,0,0c7b693db05d13c2cafd12a984b917e6e2dab77b24414bce042eb9a334c3208b,2024-11-21T07:21:28.307000 CVE-2022-40503,0,0,6771bb616f65e66219daee3ebd6ba0a915f9cc17e6cbba158f7bab7715db1638,2024-11-21T07:21:28.610000 CVE-2022-40504,0,0,690745f829348884b61393bddd29fd4208d8d6b693c0c3f7370603e698d62338,2024-11-21T07:21:29.013000 @@ -206914,7 +206914,7 @@ CVE-2022-40606,0,0,666393e635c26f7408092e355a36614f60941686f1be1bd8cc0b44c0bd760 CVE-2022-40607,0,0,b4f93720a3bd40cef34a7e7bd17c6fa8a62dbd0cf2c8aa1f7039212c3888d78a,2024-11-21T07:21:42.760000 CVE-2022-40608,0,0,8a6a89b45826e11f095323695e350574143546932cce6f68f0a03c1b1c6c4a42,2024-11-21T07:21:42.890000 CVE-2022-40609,0,0,7c0507913b6db5317f517683ff6222fd271247fb69b3eeca7a203b56241e6cf2,2024-11-21T07:21:43.020000 -CVE-2022-4061,0,1,14a5575f7b6c4b58fb951b39fea40b472144806d61f0b24be24ace2af34e1898,2025-04-17T14:15:24.983000 +CVE-2022-4061,0,0,14a5575f7b6c4b58fb951b39fea40b472144806d61f0b24be24ace2af34e1898,2025-04-17T14:15:24.983000 CVE-2022-40615,0,0,35ae07dcd6c9c405362fe6ff8ce5e53f46822d0280ed7da80afe1f7bfec3d238,2024-11-21T07:21:43.173000 CVE-2022-40616,0,0,6042cc0ef08a68bfe6929859c057582c92847eb59820105a8a9850a631ddaebe,2024-11-21T07:21:43.303000 CVE-2022-40617,0,0,7ba27f395fe250070d5ed53a3e1e9fe7a127869f71e22ce3225ea607e883a50c,2024-11-21T07:21:43.427000 @@ -206922,11 +206922,11 @@ CVE-2022-4062,0,0,f923318958c71db061b0f62a3ed11ac62f531e86eeb0606e15ce826a3b3e10 CVE-2022-40621,0,0,ca333566d8658c5d877a8b8cee88d77953767ccf5e6457893cc5c5fa908a7a9f,2024-11-21T07:21:43.593000 CVE-2022-40622,0,0,461bc2d0c86275ca1cadba0d616211789e34c5530ffe61ba561ccf96c08e5007,2024-11-21T07:21:43.800000 CVE-2022-40623,0,0,68fb497749d976378cdeeb8c58768a454a733a64a3e568f5d8afbf372d7f4e6f,2024-11-21T07:21:43.923000 -CVE-2022-40624,0,1,995ed9d3c9b090d6db62f91f773c20138bb54ea840b4830ae4d695a8b7bdc3bf,2025-04-17T14:15:21.143000 +CVE-2022-40624,0,0,995ed9d3c9b090d6db62f91f773c20138bb54ea840b4830ae4d695a8b7bdc3bf,2025-04-17T14:15:21.143000 CVE-2022-40626,0,0,905cd1f479180f0baca1d807c2a5f968706ef4091276be8c98b839be0aa620f3,2024-11-21T07:21:44.230000 CVE-2022-40628,0,0,c44c82c5a591640b45460a70b8de67cd9a4eb4740b5380f3716b7f58d729e6ec,2024-11-21T07:21:44.373000 CVE-2022-40629,0,0,f31f3bc282638cb6515720c8759698fd8c492b25334488f644b2c4a7f45b03fa,2024-11-21T07:21:44.513000 -CVE-2022-4063,0,1,669f1a6c9402be1d43ffcc46f8a9d998f712817d4f375dd4a4a4318fec0033ad,2025-04-17T14:15:25.173000 +CVE-2022-4063,0,0,669f1a6c9402be1d43ffcc46f8a9d998f712817d4f375dd4a4a4318fec0033ad,2025-04-17T14:15:25.173000 CVE-2022-40630,0,0,27154720c2f65a9ab1d7019a7dadebdd723234d03a6892aa623e3115ce42f115,2024-11-21T07:21:44.650000 CVE-2022-40631,0,0,1cab6f89a0a16f36a479b0c66c7e6f586ade7ff36056e79a6272fdb7189a508e,2024-11-21T07:21:44.787000 CVE-2022-40632,0,0,2db3276ec5e3ad600471c995b66de2baf9eb225871fa1306467dcfee1424a2c3,2024-11-21T07:21:44.977000 @@ -207041,7 +207041,7 @@ CVE-2022-4074,0,0,4d4184150461689d86579f3bbc64f7f57ec66ef12a1a297b28758aa4fae54c CVE-2022-40740,0,0,1b2aaa8b06aa0af54f254fb8dd6815b478d1e8b1c5fe103739ba27446e6c916d,2024-11-21T07:21:57.663000 CVE-2022-40741,0,0,e308302221acf84fce68267a88a68c982cabc765beefae8b583eedc7f5f6610f,2024-11-21T07:21:57.787000 CVE-2022-40742,0,0,c20decbb6fad53821c7d463b7a433cb521b3df6cdaeee38480c3e1cf2f9924fe,2024-11-21T07:21:57.907000 -CVE-2022-40743,0,1,7feb38899dd8dbe36e4b9a919c02ef7fcade234085c01f4769546eb0ac653c75,2025-04-17T15:15:47.180000 +CVE-2022-40743,0,0,7feb38899dd8dbe36e4b9a919c02ef7fcade234085c01f4769546eb0ac653c75,2025-04-17T15:15:47.180000 CVE-2022-40744,0,0,617bc9aafbf5eca396913dd0a01599fb43b645c996093e50fad9c5920b76d70f,2024-11-21T07:21:58.160000 CVE-2022-40745,0,0,a06431569ea158f12afdd8c1cfddd13dbd7a572db65305c6e25068c7c625339f,2024-11-21T07:21:58.323000 CVE-2022-40746,0,0,614dfac73528451d8689aa28036626a78782a12d1335f4ff67b3521123db03d3,2024-11-21T07:21:58.473000 @@ -207349,7 +207349,7 @@ CVE-2022-41115,0,0,5f2fa42e511c06e846c035504fad0bc47ece12afb3bfee1366974056ea131 CVE-2022-41116,0,0,1602c7ac189392391670e2f6b05c3416baecdfd168d918479a26c0b4b0c03fc9,2024-11-21T07:22:39.220000 CVE-2022-41118,0,0,2598f10dc252db05f260d2c92469a0eca4d4af325f3b0f2dc368233b7be47b13,2024-11-21T07:22:39.337000 CVE-2022-41119,0,0,9712b6447171728c5f6b73123f73d73b6f5b879466ee2ad1391a8d90e6d99237,2024-11-21T07:22:39.473000 -CVE-2022-4112,0,1,88d2ea1e0f86e436739b6037327ad14dc01ef5f16f355d6a7f8f3d2d848f245b,2025-04-17T14:15:25.353000 +CVE-2022-4112,0,0,88d2ea1e0f86e436739b6037327ad14dc01ef5f16f355d6a7f8f3d2d848f245b,2025-04-17T14:15:25.353000 CVE-2022-41120,0,0,84857395e75383ab804a670dc49a3d8950fdb1fef0ab47fbd83e5999ee279f2a,2024-11-21T07:22:39.590000 CVE-2022-41121,0,0,4e594b1edf648c1fb0fe39657ca551c3229e2ba56f66b60b38dbff70d860305b,2025-01-02T22:15:27.007000 CVE-2022-41122,0,0,133e8735e10ecae83fee6579759d253bb3c7ca5d683d17cc0c179ed130908ba1,2024-11-21T07:22:39.850000 @@ -207614,7 +207614,7 @@ CVE-2022-41414,0,0,4e804d1d1b1bbe131efbad970cf9085c3aa2ef10ff08643bd7f5b63ccb70f CVE-2022-41415,0,0,028687059fa0a5072c7a9779c3fac74cdcd851721b43e40926dcd35d702a82d5,2024-11-21T07:23:11.133000 CVE-2022-41416,0,0,19cabab2c1e0b064775a064dd5e45de17f03747225956a457ad5ccae7d2d462d,2024-11-21T07:23:11.273000 CVE-2022-41417,0,0,a965ce11e41a13d54ad0dbd1bd808f0c80c5e52cc6f27499cd9a4bda05aff7cd,2025-04-03T19:15:37.693000 -CVE-2022-41418,0,1,6ab7a2ab2274e59ff7f3eef29c21b88665d575e9a75772389ea071b4a299a1e6,2025-04-17T15:15:47.413000 +CVE-2022-41418,0,0,6ab7a2ab2274e59ff7f3eef29c21b88665d575e9a75772389ea071b4a299a1e6,2025-04-17T15:15:47.413000 CVE-2022-41419,0,0,0790d25a5739b42c631048d574b819ca23c2ae0ccafa9d282079175984117171,2024-11-21T07:23:11.690000 CVE-2022-4142,0,0,fa695c413705276ffd57675bdabd788189d4987c5ed112a2b640c8f2b7bf66a2,2025-04-10T19:15:51.237000 CVE-2022-41420,0,0,555694ef145b8e4017ad5f8f9aa7f75b18148e17df6283229ed854da629358a3,2024-11-21T07:23:11.827000 @@ -208136,7 +208136,7 @@ CVE-2022-4199,0,0,8b8cb6f26913146eae8f4d383a7199fd571a97aa9421e484ed9ac74cb04901 CVE-2022-41990,0,0,bfa1a664966e687b1b7d9c1a7112089c069a86283470e17769f3db13cf03e02f,2024-11-21T07:24:13.673000 CVE-2022-41991,0,0,e4ea4badcae344ac3deba47ad7f1c2c52bdd96180e60fbc09ee63244e40f2377,2024-11-21T07:24:13.800000 CVE-2022-41992,0,0,9af5debdbb8547495eb35771bdcc53c9cf3d19aebfd0a9a3fe4bdb74f12874ee,2024-11-21T07:24:13.920000 -CVE-2022-41993,0,1,a1404c32fe6160f6e4e03f4b93daae48e7dddc42f4608bd55d4831ede6fc5268,2025-04-17T15:15:47.630000 +CVE-2022-41993,0,0,a1404c32fe6160f6e4e03f4b93daae48e7dddc42f4608bd55d4831ede6fc5268,2025-04-17T15:15:47.630000 CVE-2022-41994,0,0,01fce682d67f0935842632f92484e8161d893b90749b04c1fcd6315d6635adc2,2024-11-21T07:24:14.170000 CVE-2022-41995,0,0,b6c98acbfd6f6b11b7c875dfbbb99d28f9d988636a3e49f944d6611716c0b0fb,2025-01-02T15:15:17.737000 CVE-2022-41996,0,0,fddac9112e3e0ee4d7383dd36488923ee61324ca438a707d6aa46adf4a763c3d,2024-11-21T07:24:14.280000 @@ -208168,7 +208168,7 @@ CVE-2022-42042,0,0,b6f8880c3baeb163d71d0d6267fac206b231fadf023c30633d102ec82c98f CVE-2022-42043,0,0,1b51443ece4dfde737b521577d49f701611603ea6b4ff4950a7b3424589458e7,2024-11-21T07:24:17.557000 CVE-2022-42044,0,0,4b003b79d52c535b15980d22035b09add42a881d46b97e131b92acf23be4c665,2024-11-21T07:24:17.700000 CVE-2022-42045,0,0,fa00602f5cacf506918aa2a538c073f64bc94c453b34f187b7f24627ad627bc3,2024-11-21T07:24:17.850000 -CVE-2022-42046,0,1,d1626a93ad5f917ee334e5d45b00485ffaab2dd7cc24ce92d44ec6b61d6477a9,2025-04-17T14:15:21.323000 +CVE-2022-42046,0,0,d1626a93ad5f917ee334e5d45b00485ffaab2dd7cc24ce92d44ec6b61d6477a9,2025-04-17T14:15:21.323000 CVE-2022-4205,0,0,e891f9dad69dda63da83ad9de4923fd4fbc6a08687e2f527445106dd9a27f918,2025-03-27T21:15:40.837000 CVE-2022-42053,0,0,f84a20c57a710046a5921125f009eeb322bba75b83b8298d0d45d35581efe069,2024-11-21T07:24:18.170000 CVE-2022-42054,0,0,1fbb4b57f03684db196fe4e0f7bcc23fb563b88cf54c3ba3d883f33a3d523443,2024-11-21T07:24:18.310000 @@ -208504,7 +208504,7 @@ CVE-2022-42447,0,0,aba9a1675e23e43716c7f0e4b39304b4f640b1d80afcf5e6a33292e368a33 CVE-2022-4245,0,0,7305d9be07f9487c1c925b80efa0a1de65c9ce2ebf2d82dff49a350744824522,2024-11-21T07:34:51.700000 CVE-2022-42451,0,0,fac5780b2589fa4e5302e0f3e43b95825686711085e3865819f7625dc438191a,2024-11-21T07:24:59.253000 CVE-2022-42452,0,0,4ae9a6da3248cc6cafa82d3fd707633ac3bc6886f08fe893b6abcd86f029c3f8,2025-02-12T15:15:10.903000 -CVE-2022-42453,0,1,c0b68c9c51c45d671491116048557bb626c91b585c4923b45b1e7d47ab4ec828,2025-04-17T15:15:47.790000 +CVE-2022-42453,0,0,c0b68c9c51c45d671491116048557bb626c91b585c4923b45b1e7d47ab4ec828,2025-04-17T15:15:47.790000 CVE-2022-42454,0,0,d578d617a818fba522ef3f0d71645a4c20ceb127d8ebe7a0a7b971c927ed2f3f,2025-04-16T19:15:46.647000 CVE-2022-42455,0,0,783e43b392fc9b0141bc2ada0d100faa85e098adba36bac49e4324cff507e3bf,2025-03-19T18:15:17.673000 CVE-2022-42457,0,0,82d873c661a8575b44de78424c67708dae961f1b72619f778c431037c082ca72,2024-11-21T07:24:59.960000 @@ -208595,7 +208595,7 @@ CVE-2022-42540,0,0,5b04b6f881d540e22b01d0a86265a539bd84e45fbab74ab20cc7a08a25420 CVE-2022-42541,0,0,69c543e2c6416e94d3b46ed3ba5945b02ce4c2d3e75d396c75e4dda1373e05ea,2024-11-21T07:25:10.230000 CVE-2022-42542,0,0,d34e44e1aa49ee6c2ed7a027515edd570d1d06286578312030ed9a0abaeb6661,2024-11-21T07:25:10.357000 CVE-2022-42543,0,0,50beaee361f0d57f17cb36a9b3cee48ed2dd4c73725d712aff442be609a39c7c,2024-11-21T07:25:10.477000 -CVE-2022-42544,0,0,ecf4cf06cd0877c9dea93347d449bc7eca103a266663ddba78e4a7eec1f5ecce,2024-11-21T07:25:10.607000 +CVE-2022-42544,0,1,2e6db3d9af99ebe44e5c933ee170686e38b5b5d24405e7cbf1326511e254262b,2025-04-17T16:15:25.493000 CVE-2022-4255,0,0,5a010163634f58a88c098e51ad0acb73aecce68eeaf8c4a4778cdfd10b89dc62,2024-11-21T07:34:53.020000 CVE-2022-4256,0,0,3734b0f7d544fc345ebfee9c81441cbfbdf48896490fa3ecd199dc85b5dee4bc,2025-04-10T19:15:52.033000 CVE-2022-4257,0,0,cda5b88d6f29ecd73cdde1a2ebc6e59597b93cd1f9ce4ffa79ef690479939787,2024-11-21T07:34:53.267000 @@ -208747,7 +208747,7 @@ CVE-2022-42834,0,0,7cc72717124f49509300124985c6b62b511e7b7ebf1230231ee662ec8d15b CVE-2022-42835,0,0,34bac917090ddc63215055da666f1dfea60d81961d5293909944173ff834242a,2023-11-07T03:53:37.373000 CVE-2022-42837,0,0,f397441da386c78dad85e51bbc8c789251e248773cda5ff89216d01ef21715e3,2024-11-21T07:25:26.617000 CVE-2022-42838,0,0,cf64ba8da1b8f4aa6a29aea4419be05020ed9f4ac01fe862828092310044f81b,2024-11-21T07:25:26.787000 -CVE-2022-42839,0,0,2c9ceba5a85cfcbb94e5df2cd062739a1ce05d1c6328cb60506b63bb4eb09da3,2024-11-21T07:25:26.900000 +CVE-2022-42839,0,1,178b055f70f0ab66f140130e7a6f3976a591a968012996c927663753a74e7b65,2025-04-17T16:15:25.663000 CVE-2022-4284,0,0,9060d650bc4d3cd13597dd3540a66e3bd6aafec1e308b9e97a5a419a42e8e79c,2023-11-07T03:57:25.193000 CVE-2022-42840,0,0,8693b921a352be7c214bbb0c30c7f9b5d5f3745ea879506256b7313dcb38e7e8,2024-11-21T07:25:27.027000 CVE-2022-42841,0,0,d6e203906ebfaa432d1d40d645cf219aaaf2e9dd8a813b2c900f1ad7045cfd96,2024-11-21T07:25:27.167000 @@ -208839,11 +208839,11 @@ CVE-2022-42941,0,0,d09186d60cee1b3b90b253a46203f46faecaf11da893d056a370e4c864da8 CVE-2022-42942,0,0,b9b87c94105f1362b80e5b54f51d1f614e3eaafb65509d50dd1a1c606a80193f,2024-11-21T07:25:38.647000 CVE-2022-42943,0,0,fb1ea4e41d6c19ffcaf492c38207d66990c12383f6dc4024d4286bd48da91333,2024-11-21T07:25:38.793000 CVE-2022-42944,0,0,70202151aebb74d9aac796ec66983f9f0f8f63e2fef365b3c1ee0751442a53de,2024-11-21T07:25:38.937000 -CVE-2022-42945,0,1,5ddd7ef98a4d87f28eff537b28087a31e45c559219520c3b1dc2e1b5bf5ed041,2025-04-17T15:15:47.923000 -CVE-2022-42946,0,1,ad7dba46a98b5851eea714416a734c98cfda6fe41e201b16c15f21052f15a8c3,2025-04-17T15:15:48.070000 -CVE-2022-42947,0,1,57d17f890f103d0a045d72ab9e56e1e9e8eb5aab28ea44d0fe663e8ca936c7be,2025-04-17T15:15:48.210000 +CVE-2022-42945,0,0,5ddd7ef98a4d87f28eff537b28087a31e45c559219520c3b1dc2e1b5bf5ed041,2025-04-17T15:15:47.923000 +CVE-2022-42946,0,0,ad7dba46a98b5851eea714416a734c98cfda6fe41e201b16c15f21052f15a8c3,2025-04-17T15:15:48.070000 +CVE-2022-42947,0,0,57d17f890f103d0a045d72ab9e56e1e9e8eb5aab28ea44d0fe663e8ca936c7be,2025-04-17T15:15:48.210000 CVE-2022-42948,0,0,bc162c9d27c19d3d222508b9c51e1ae06585c13a85fa9e4510b6807401a58fa5,2025-02-07T14:53:43.630000 -CVE-2022-42949,0,1,dbd5fa04a66a40caf465365961bb30c458244089059b7c3c92fa2350c2829218,2025-04-17T14:15:21.513000 +CVE-2022-42949,0,0,dbd5fa04a66a40caf465365961bb30c458244089059b7c3c92fa2350c2829218,2025-04-17T14:15:21.513000 CVE-2022-4295,0,0,573cb5aa4fa5b5d665188bd5a0544e652e5b3ca9e959d43dfd6b585cf785b324,2025-04-08T21:15:45.300000 CVE-2022-42950,0,0,20d4082bffbc77fa3560921770930640b675e908f7bc2394264650dd258e0603,2025-03-26T15:15:39.937000 CVE-2022-42951,0,0,1c030da7f5ff30312033b2bc3d23eeed5ac1b7e402a7fea4ff36f2ef213b6a3f,2025-03-26T15:15:40.167000 @@ -209072,7 +209072,7 @@ CVE-2022-43284,0,0,1d0261640a5c8d76eea4c172be95b8e8a8c9982cc5220f98307d0671913cf CVE-2022-43285,0,0,a38f47c7f286aca0332f3b5d470f94e61f2c6e02fb2c01077f87e68d79c33440,2024-11-21T07:26:12.410000 CVE-2022-43286,0,0,84c06c9b9740b1519b98887cad863b661d460678942506430a235d75f7409de4,2024-11-21T07:26:12.583000 CVE-2022-43288,0,0,d3eaf0388bb057c7496d43794eb14a0f26b8db090ca2becd22446d6244d2aa65,2024-11-21T07:26:12.743000 -CVE-2022-43289,0,1,5b79061624e7bb40df8acbc5d7156f6d314515aec72842afe7caf6b8b6349c8d,2025-04-17T15:15:48.353000 +CVE-2022-43289,0,0,5b79061624e7bb40df8acbc5d7156f6d314515aec72842afe7caf6b8b6349c8d,2025-04-17T15:15:48.353000 CVE-2022-4329,0,0,938d014f05c72a629949dfa56b69a5f213f5f9802617c168b3a7af6d7680600b,2025-04-10T18:15:45.340000 CVE-2022-43290,0,0,79398f378a635e1d4c4b837b454234ed77f68974874a1a955831a4f639460171,2024-11-21T07:26:13.077000 CVE-2022-43291,0,0,d791d8960285108d8b6f3ce7e1b186250c8ebd5e6acb6de0848fe3948765554d,2024-11-21T07:26:13.290000 @@ -209197,7 +209197,7 @@ CVE-2022-4344,0,0,5fca97d375158c20f5e158df765dd947cf020aaa48975ae35675fecd4c3c58 CVE-2022-43440,0,0,ebc92c2158b4284a6bca3af22ea1696f971414d73ec1681cd72c35ed8ed3c1ba,2024-11-21T07:26:29.553000 CVE-2022-43441,0,0,433c689e463232920d2f8046a14398a3607cdd61e0b598d3be24b67e859debed,2024-11-21T07:26:29.727000 CVE-2022-43442,0,0,f4ad65661a110ccad4b9336b063fef7575616f0f1b617e7297db1d099c0a94e6,2024-11-21T07:26:29.883000 -CVE-2022-43443,0,1,40c07f748fbb955c6afda8997d2c08300444d939552e4f5d5e011a85811d378e,2025-04-17T15:15:48.553000 +CVE-2022-43443,0,0,40c07f748fbb955c6afda8997d2c08300444d939552e4f5d5e011a85811d378e,2025-04-17T15:15:48.553000 CVE-2022-43447,0,0,4cec51b45994c962aa7ad64df34427ffa601d6d4fb59ffcc6a09b25585e8bf27,2024-11-21T07:26:30.160000 CVE-2022-43448,0,0,413aed8efb8f557b2a0aa98865131589d1638a3fd95efc22258a1cc64633f943,2025-04-10T18:15:44.190000 CVE-2022-43449,0,0,f0b066899da1ce8299cb386e353d72a56aaf08b082cdda3c007310f8d3d35331,2024-11-21T07:26:30.443000 @@ -209219,7 +209219,7 @@ CVE-2022-43462,0,0,896fb3b7472d90310ccf79e45fe7f43c374229204c3743172d3ca2307487b CVE-2022-43463,0,0,2ea392e0398c8d12d1b65e683728d7516d50bda9ab45eead2531c615c08c7ed6,2024-11-21T07:26:32.340000 CVE-2022-43464,0,0,fc7ea28145a5d62fd331d076530dd528e0968538625f95b0d9fb596e18fc4fa4,2024-11-21T07:26:32.470000 CVE-2022-43465,0,0,296e3b1e1407d6b1aa193bcb28747c9108814c479598bc3cd251fe50ec7be9a9,2024-11-21T07:26:32.607000 -CVE-2022-43466,0,1,4bf32d2da0a9ad6f5aa8b5f450e36ef698b072d56ff04117522580907d0e27ba,2025-04-17T15:15:48.733000 +CVE-2022-43466,0,0,4bf32d2da0a9ad6f5aa8b5f450e36ef698b072d56ff04117522580907d0e27ba,2025-04-17T15:15:48.733000 CVE-2022-43467,0,0,c65cc6a735bd6724467c640236029efb028f9251b72276982136f407e82f2974,2024-11-21T07:26:32.887000 CVE-2022-43468,0,0,9ceca0e9e025c4b615ddd1abc6dc410a3c0c47d2b22e9876aa4b8454cf78d7c3,2024-11-21T07:26:33.050000 CVE-2022-43469,0,0,7e8f0e5256540f006e97e7efda276d93a26d53dbdad51181e85b2f61555e8379,2024-11-21T07:26:33.203000 @@ -209239,7 +209239,7 @@ CVE-2022-43482,0,0,378251bac881c5352fb763832ca0ca3b5af551de21ba5eb1bb264436d72ed CVE-2022-43483,0,0,e9f65cf82f01d7e36141841486d6e81094264a502bafb598342b6e4072f4cc3e,2024-11-21T07:26:34.713000 CVE-2022-43484,0,0,0306ab5c2228c4822e33c19dafa2f04e07421b2519992f4cef699033402d8358,2024-11-21T07:26:34.847000 CVE-2022-43485,0,0,4a9c74089a4e87556e8718637f083fc436846627890221b26f4362430df01dee,2024-11-21T07:26:34.957000 -CVE-2022-43486,0,1,25eaf690757189f83151b0bafa80942ce29b14b45ba569e1e29da24f779583e9,2025-04-17T15:15:48.890000 +CVE-2022-43486,0,0,25eaf690757189f83151b0bafa80942ce29b14b45ba569e1e29da24f779583e9,2025-04-17T15:15:48.890000 CVE-2022-43487,0,0,ab028b9ea889deebe0cd396cd9546f51a7567f3356344648195e14cbaed68392,2024-11-21T07:26:35.263000 CVE-2022-43488,0,0,1b1d3b5eb26e0d90996ffd898b539c698c1d39cd633691e57061db2127364c41,2024-11-21T07:26:35.410000 CVE-2022-4349,0,0,0d1ce49d3e43a60b9a6c4599e871a039d894adf55cca3081fe9792f56f82534d,2024-11-21T07:35:06.440000 @@ -209758,8 +209758,8 @@ CVE-2022-4409,0,0,d0bc837111287072a7c07728723929cf9c354b7b41a96199e43fbb9c53250d CVE-2022-44096,0,0,4dcd9982dd6ab15a1ac4c3a92611415280558b01bb4c3738c24970129b86c490,2024-11-21T07:27:38.020000 CVE-2022-44097,0,0,303a25bf2e178645d9a73f986ddcd400cd908ff7afc3376218195e5576c2034c,2024-11-21T07:27:38.163000 CVE-2022-4410,0,0,ac37b87ecb818b8ad9950dbba076719aaaa7e0dca0e40a43f3b4ad06e732d8fc,2024-11-21T07:35:13.063000 -CVE-2022-44108,0,1,facd5ad5f95c1b33da6f692999d7562212d2983fa0084da573d9aa142d066d2e,2025-04-17T15:15:49.053000 -CVE-2022-44109,0,1,4eca5a7931777502ab3b6158bd784b5a1d9bcdc212f9aac2e4b056752743df25,2025-04-17T15:15:49.260000 +CVE-2022-44108,0,0,facd5ad5f95c1b33da6f692999d7562212d2983fa0084da573d9aa142d066d2e,2025-04-17T15:15:49.053000 +CVE-2022-44109,0,0,4eca5a7931777502ab3b6158bd784b5a1d9bcdc212f9aac2e4b056752743df25,2025-04-17T15:15:49.260000 CVE-2022-4411,0,0,935e961667e5bbfc5229bd7e471de00a3d7a23d2adf64bbae75cc4258616bd67,2024-08-19T16:15:06.773000 CVE-2022-44117,0,0,fdbb14944545e9252e2145d0231d2226875c0759493b545557272e405532098a,2024-11-21T07:27:38.600000 CVE-2022-44118,0,0,c72ad75b840a4599aedfd7d51c335bf7712367cdff7899db0ee376c564d3c362,2024-11-21T07:27:38.743000 @@ -209960,7 +209960,7 @@ CVE-2022-44449,0,0,4a4f4cdc062d3f29854d1ece4f90ff2796955d916c82230d7a97a81cc93a2 CVE-2022-4445,0,0,cedca36b9b879b049e03157ad890d2870ba90bb1afe63e410a0ea538ec3aa62a,2025-03-21T15:15:38.497000 CVE-2022-44451,0,0,88ff513a50262d6c08f63eeb08dcc8ac12e57100481f0cda5bace6b6ce4ed782,2024-11-21T07:28:02.837000 CVE-2022-44455,0,0,caaec9a1c6a516d2eb328a8ab89408344ba8e11b0492593fb2f08013274d61a3,2024-11-21T07:28:02.960000 -CVE-2022-44456,0,1,ff0595ad58a974386954b8f9b2199132f89a7be8cb4b1c31a08af64b223e3aa6,2025-04-17T15:15:49.467000 +CVE-2022-44456,0,0,ff0595ad58a974386954b8f9b2199132f89a7be8cb4b1c31a08af64b223e3aa6,2025-04-17T15:15:49.467000 CVE-2022-44457,0,0,2f0beb7edb78f06bda820a580846d26293b970925b3ef1e3a5a6bbc5bba372db,2024-11-21T07:28:03.203000 CVE-2022-4446,0,0,8c2425071f39685764da1196fea5b8540e69f6f98eb2045cf6064774e0ed3d11,2024-11-21T07:35:16.730000 CVE-2022-44462,0,0,090c03bc74d2ccf3ac759f3a136430e3ac02355172e3933a56a5b61592eaaa82,2024-11-21T07:28:03.333000 @@ -210183,12 +210183,12 @@ CVE-2022-44747,0,0,de79aebf302fa9cc1cbaa57e9e4625f922551b1637e8e7e808cfe45859e47 CVE-2022-44748,0,0,b2653d772df17c1dad34c3a2008412806229786022b4a970236cfe7821abef1a,2024-11-21T07:28:25.270000 CVE-2022-44749,0,0,e82035da6885a55cc5a68521f8e61fe5902fb41cc43e224afda0dc63cd02e351,2024-11-21T07:28:25.400000 CVE-2022-4475,0,0,d1086468d409f7532bccd00a4c4756eddf25bc4337cca2a460a7781e83342764,2025-04-02T16:15:25.160000 -CVE-2022-44750,0,0,4f04d02597bc3fe93853e9670daf07405dfcf90247d328cd07d1e1a9e2d721da,2024-11-21T07:28:25.523000 -CVE-2022-44751,0,1,f937b4edff0988e640e26cc384fa42f6adc11ad52d2eddd6f9db05135f7e58fa,2025-04-17T15:15:49.640000 -CVE-2022-44752,0,0,26a7eeb51db6879d67bbefeb0429f5e33e9f559bbeecf39b88969d3765e857bc,2024-11-21T07:28:25.810000 -CVE-2022-44753,0,1,5871919c918abedd6728f00ba466fed7329f0f9331bcf0a52105314fe78d7e01,2025-04-17T15:15:49.783000 -CVE-2022-44754,0,0,d14afff573d0aca00af7c9aebfd36f3a130f7b4b43b93236a09486a6611fa4d2,2024-11-21T07:28:26.060000 -CVE-2022-44755,0,1,75133161688f47cc67befe3acc86b7b8574d923a13b32d2c86f2001487d0ea92,2025-04-17T15:15:49.913000 +CVE-2022-44750,0,1,f02e96da9ffec6c76152b2a7759b6a76eb9cf4d0cf7f96cd26b710ddcec6aec1,2025-04-17T16:15:25.840000 +CVE-2022-44751,0,0,f937b4edff0988e640e26cc384fa42f6adc11ad52d2eddd6f9db05135f7e58fa,2025-04-17T15:15:49.640000 +CVE-2022-44752,0,1,bbe8f054eb7d3195646021596f00b8b8936a99e1776260ee25577217ed7971cf,2025-04-17T16:15:25.970000 +CVE-2022-44753,0,0,5871919c918abedd6728f00ba466fed7329f0f9331bcf0a52105314fe78d7e01,2025-04-17T15:15:49.783000 +CVE-2022-44754,0,1,7d5b784cb1d5e76410f2219817a8c602fab4c562bf6aa48721bf4654aa9d32bc,2025-04-17T16:15:26.100000 +CVE-2022-44755,0,0,75133161688f47cc67befe3acc86b7b8574d923a13b32d2c86f2001487d0ea92,2025-04-17T15:15:49.913000 CVE-2022-44756,0,0,42885a1713d229d0c6a5781dd2e94dfd95ef1a4c758802fa2dcd309721deeeed,2025-04-16T19:15:46.783000 CVE-2022-44757,0,0,6b570b672d1d9bfe44c45c0bb24adac244645df35c4fdcf8a62ac1d537d14b56,2024-11-21T07:28:26.430000 CVE-2022-44758,0,0,6739bafbdcba12503a739f5dc296c878ab8377bde595c0009a0a4de1be4b6b1d,2024-11-21T07:28:26.567000 @@ -210255,7 +210255,7 @@ CVE-2022-44937,0,0,b21a23ce3fef68191ff20b52488115b80049e9416cfb9ad02fd1faf3f35a6 CVE-2022-44938,0,0,6b3923e2d1437bc460bd1802e089017f4388957316d06a36349749818388c756,2024-11-21T07:28:32.927000 CVE-2022-44939,0,0,c3bdadbca4375b62cd46bb34499c0a496ecdd72902f6042a06d7f62a44b59dd0,2025-04-09T21:15:42.533000 CVE-2022-4494,0,0,5ca116f3cf04e044bfbf882eab45e20f83382b01002983385e6a10d6f685e2c7,2024-11-21T07:35:22.483000 -CVE-2022-44940,0,1,f7d0b081f0e7ab379b523783ed767308853f431a398c15408b736acfa6aa4477,2025-04-17T15:15:50.040000 +CVE-2022-44940,0,0,f7d0b081f0e7ab379b523783ed767308853f431a398c15408b736acfa6aa4477,2025-04-17T15:15:50.040000 CVE-2022-44942,0,0,ecf216f29365d7162161e668bbf0a3966d21c68f41f7c313291bcb7b7bcc7e6b,2024-11-21T07:28:33.370000 CVE-2022-44944,0,0,b983ca4ab00215ee9e13d830c057c661b02e78850ad8fb9370bf4c6d6dfef786,2024-11-21T07:28:33.510000 CVE-2022-44945,0,0,696b5660285c38789840ed22c36e20ad79d24b57dc1493ceab92851708b82d13,2024-11-21T07:28:33.650000 @@ -210309,7 +210309,7 @@ CVE-2022-45038,0,0,8082acb7b14695d94a89af443661cec3f9c5be6e50a62b38d0d1ed92560d9 CVE-2022-45039,0,0,8d247e2dbe5a174bf700c14e14bd0ac17a8055c933299de463994d0cfae98371,2024-11-21T07:28:39.400000 CVE-2022-4504,0,0,b27eff37d4e7abb720eed93fbe05e69d563cdca4548519b6b195855e489cbdf5,2024-11-21T07:35:23.717000 CVE-2022-45040,0,0,7f873037a4786798898c146da01c230a02bee3ed298acbb4a79b18a72b6c5e6a,2024-11-21T07:28:39.550000 -CVE-2022-45041,0,1,ef1949d1460233572fdfb2716287baf4a2f8389968f29ef424eb0bc8fc8e4d4c,2025-04-17T15:15:50.250000 +CVE-2022-45041,0,0,ef1949d1460233572fdfb2716287baf4a2f8389968f29ef424eb0bc8fc8e4d4c,2025-04-17T15:15:50.250000 CVE-2022-45043,0,0,733f48237f269d4d7809d5dfd9b028bd3cf8c1aebe895df45a72bf7428aaa2fe,2024-11-21T07:28:39.833000 CVE-2022-45044,0,0,d8f9472e9417b70caae34cc756800e14625bdcd45f0866e663decb76d4c1825a,2024-11-21T07:28:39.987000 CVE-2022-45045,0,0,fa1138deea95f80bd7ab086cb329bf613ccf3268dca0e85de5e3280673b9bc50,2024-11-21T07:28:40.217000 @@ -210768,8 +210768,8 @@ CVE-2022-45660,0,0,0794202a4bfc8c8cc5404e4a888842cc80f6cd693b3638982e9241b7a55b5 CVE-2022-45661,0,0,b91d05e98d30dcb4930c3ab62da1d4deb23865a4e66f6968393c84e2503231f9,2024-11-21T07:29:33.197000 CVE-2022-45663,0,0,2df70ba6e99fb5e21d67ae1dce42dd932bd2968fba7b88fd150149cb7c89ab65,2024-11-21T07:29:33.353000 CVE-2022-45664,0,0,776dfad96f709d58cdfae78f5f262649d041f2a9336411755b29c5043476f730,2024-11-21T07:29:33.510000 -CVE-2022-45665,0,1,8eaf86cb4745ce0331972e428a540f5767ba4ac97cf70e751b2d4ee1d75b8ec9,2025-04-17T14:15:21.747000 -CVE-2022-45666,0,1,e91282ecefdcc563569d831d507d85e92046ff469d0882e69155ccd845cdb43d,2025-04-17T14:15:21.927000 +CVE-2022-45665,0,0,8eaf86cb4745ce0331972e428a540f5767ba4ac97cf70e751b2d4ee1d75b8ec9,2025-04-17T14:15:21.747000 +CVE-2022-45666,0,0,e91282ecefdcc563569d831d507d85e92046ff469d0882e69155ccd845cdb43d,2025-04-17T14:15:21.927000 CVE-2022-45667,0,0,5590a0b5050fe9a29e243248c370f15bd517a593e3f5ed362cb7a6b58b691b10,2024-11-21T07:29:33.973000 CVE-2022-45668,0,0,5c438759991894a2bf2d7478db594538d8d2c267c104d2a5a7fde904a72f5510,2024-11-21T07:29:34.120000 CVE-2022-45669,0,0,1370a19ac155b1715b3df97eef901e71162beffe1aa2c68f08e0c17f3833b1d4,2024-11-21T07:29:34.277000 @@ -210986,7 +210986,7 @@ CVE-2022-45937,0,0,47315c9d43c79b2922c077c6a985073909f30d82387fb62bb70aa6dd010f8 CVE-2022-45938,0,0,42bfe1ed0e2389cd89bd79fb11a7537d4900c3c6e9f1b3ac70f9168368a13506,2025-01-10T19:15:30.380000 CVE-2022-45939,0,0,9f2d0eb61d012e0718ca37900aa590dca21df4c3a352cefbd70dd796868216ac,2024-11-21T07:30:00.373000 CVE-2022-4594,0,0,1ded1ffb5f24f4fd9602ac76d2af6019f3b9406e1610dbf1b4d9339d35ac8850,2024-11-21T07:35:33.683000 -CVE-2022-45942,0,1,a718cdda7b73433bdf500bb401174f39caafecc8055ba94280a42b0294802f0e,2025-04-17T14:15:22.090000 +CVE-2022-45942,0,0,a718cdda7b73433bdf500bb401174f39caafecc8055ba94280a42b0294802f0e,2025-04-17T14:15:22.090000 CVE-2022-4595,0,0,645b0789fddde7dbf888bbd16bf87e81c21ffd9bc28d1d13b9c0dcc18ec745ef,2024-11-21T07:35:33.850000 CVE-2022-45956,0,0,8e9f5c00ceef59acec81137e7bc64348869dd735f814cce0c7487a3483ea6bfa,2024-11-21T07:30:00.703000 CVE-2022-45957,0,0,83d82ac3c27398aa12e2a84c70565621193c5d8e50f5d7191ff980e9e9a49a9e,2024-11-21T07:30:00.860000 @@ -211012,7 +211012,7 @@ CVE-2022-45997,0,0,6c300128e93ec1ae822d7c2835fe5f4320feef87144dabc7622be53fbd6de CVE-2022-4600,0,0,f87320d86892641cf066544e58ceea65fbd753484a0d9292859d9010d922933e,2024-11-21T07:35:34.457000 CVE-2022-4601,0,0,f089e381b7899be6421b7ec38b819948e316e0b782e8afd7e01319c7c5e0638e,2024-11-21T07:35:34.560000 CVE-2022-4602,0,0,87207cf91ad56ef288904fdf3120f4ec800df92d4d7ce34661a8eb13dc6caa6b,2024-11-21T07:35:34.677000 -CVE-2022-46020,0,1,87c7c57188aedc803fb9c908fd5c1bd7654e9674e4e0614a75bef57c29b09660,2025-04-17T14:15:22.270000 +CVE-2022-46020,0,0,87c7c57188aedc803fb9c908fd5c1bd7654e9674e4e0614a75bef57c29b09660,2025-04-17T14:15:22.270000 CVE-2022-46021,0,0,de363721c25a4499f34dc24ef8182fc5846be800e41385c821c878a6d4b8f51a,2025-02-18T19:15:10.930000 CVE-2022-46025,0,0,fb87909a50274888cb952a531e37e238790ce29adbfdc98f2c0f61341a167cf0,2024-11-21T07:30:03.940000 CVE-2022-4603,0,0,3ae9bc688ef79af8f63f39d896eaee85f7870996ba97b8e376697d5795fb133c,2024-11-21T07:35:34.797000 @@ -211031,7 +211031,7 @@ CVE-2022-46071,0,0,06cf0e32005ad54f36d222eeb16cca6c3917a030164eb8f9f5163922d4fbb CVE-2022-46072,0,0,d199b9b426f95fca22764d2c7a4018cbfd5ebb97ad2e453676da34511f390dd8,2024-11-21T07:30:05.583000 CVE-2022-46073,0,0,80d36d822ef62e78f23e7654145243718f1e9d79fb4a38713545ed8b8dc300e8,2024-11-21T07:30:05.753000 CVE-2022-46074,0,0,cef2b2808e50ea89d69e7fabb2a41df61d021dafa1447e45b450fd5bd67ef529,2024-11-21T07:30:05.910000 -CVE-2022-46076,0,1,d8ca5395c9172594a40906a90b11f75fe055db1008b3fe8b60e625ee8e935c68,2025-04-17T14:15:22.443000 +CVE-2022-46076,0,0,d8ca5395c9172594a40906a90b11f75fe055db1008b3fe8b60e625ee8e935c68,2025-04-17T14:15:22.443000 CVE-2022-4608,0,0,be843af6d4396743b51db58c72f2505739c01d27b14e0bce118248260ba2d980,2024-11-21T07:35:35.383000 CVE-2022-46080,0,0,68b2b59d09c84516563c3e52ea8ae348c5f72254930a31286339a3a247d9946b,2024-11-21T07:30:06.260000 CVE-2022-46081,0,0,3c2d8eaab492f71922ade4ece0d9e697744f5481c9be44a4665da1af516f2c20,2025-04-10T15:15:55.123000 @@ -211064,7 +211064,7 @@ CVE-2022-46128,0,0,04b0677fd7aaf9ce005af6c9c4547b9a3141657231b4de2b107b2c216cb3a CVE-2022-4613,0,0,2fed28102e0918c2dcdebcf90df65e52fc431733b958c9c252299027351afd47,2024-11-21T07:35:36.013000 CVE-2022-46135,0,0,634d8b6cd7aae9fdad643b2b7a4ac731289a6a884c872b0de36e1ec61ae82cb9,2024-11-21T07:30:10.090000 CVE-2022-46137,0,0,993a065d055cf1614cc31334b5a427321f80c170ac781a17bfdbe28686d480f8,2024-11-21T07:30:10.233000 -CVE-2022-46139,0,1,8ab6264cadb34479c6a544a4d6e6f6bc168e2001962adb41c5cb909be4513171,2025-04-17T14:15:22.640000 +CVE-2022-46139,0,0,8ab6264cadb34479c6a544a4d6e6f6bc168e2001962adb41c5cb909be4513171,2025-04-17T14:15:22.640000 CVE-2022-4614,0,0,aa347227c1cb2a8317d94d41d3f7c69ad55279871720d36a489acf11ebc70546,2024-11-21T07:35:36.133000 CVE-2022-46140,0,0,aa532009289e43dd5410a2c3bd34ea7e380355131ed0ab4d938db90fb07264b8,2025-01-14T11:15:10.960000 CVE-2022-46141,0,0,0de5aa29c707908ab4db17d2412ae0953f4f660138caa36cbd0a2d5ff259c142,2024-11-21T07:30:10.817000 @@ -211195,8 +211195,8 @@ CVE-2022-46282,0,0,10bf7a05c8db3c1d9b502da8f852b9241e63a21fbcca5197ff4351f38d4f4 CVE-2022-46283,0,0,b247500b853cf395378b13cd1f25e54747fc9dd4cb7f533a5948eb27e756ce3f,2025-02-19T20:15:33.260000 CVE-2022-46285,0,0,1878a5786e1b98d48320c8143dd9e9bfb487736ee784629e0df484d1594b1aa4,2025-03-25T15:15:16.490000 CVE-2022-46286,0,0,cbe51ec8707537edac370be593bedbfd387955a9bad13447559576eb38b6b947,2025-01-17T19:15:26.120000 -CVE-2022-46287,0,1,1e5e4cff9d906880e70b42b647b08c09b4918a5b1fe14b68b648ac3efdf05638,2025-04-17T15:15:50.440000 -CVE-2022-46288,0,1,21d4a2e9ba2730440938ef0538164f1796c6a6bdc7e290e98ef9dcf9014b1469,2025-04-17T15:15:50.600000 +CVE-2022-46287,0,0,1e5e4cff9d906880e70b42b647b08c09b4918a5b1fe14b68b648ac3efdf05638,2025-04-17T15:15:50.440000 +CVE-2022-46288,0,0,21d4a2e9ba2730440938ef0538164f1796c6a6bdc7e290e98ef9dcf9014b1469,2025-04-17T15:15:50.600000 CVE-2022-46289,0,0,68fe438812fa3dc83afea63191a2a290a06c3e87ab7c9255e9ab7bbfd73b0b2b,2024-11-21T07:30:19.077000 CVE-2022-4629,0,0,0e20f7b98ec93c90900a4eb58d9667244c1bbdb3a448a65482c95bf82db91ab0,2025-04-02T16:15:26.573000 CVE-2022-46290,0,0,f38174b9ec5869bff6ca7c2982c27ef4ada6d86a231f3e362173360673542052,2024-11-21T07:30:19.200000 @@ -211219,13 +211219,13 @@ CVE-2022-46307,0,0,05eddf4c771df11d9a03cd49b5bb60bcf2fcffe189062eaa36cc62e104b1d CVE-2022-46308,0,0,1449d3c8b8f040c49af72508c1bda904aaf503769e7414f6c47e125df1c678e9,2024-11-21T07:30:21.387000 CVE-2022-46309,0,0,8c8e7ba2cbb28e9c3190baa34e4ce2f0a3da1cd5d64b72943c56141ea70ee407,2024-11-21T07:30:21.503000 CVE-2022-4631,0,0,b2d25dbfe155b321bad2b8d9dbedb36ecd5949721adde68c1035d8a55148fc5f,2024-11-21T07:35:37.970000 -CVE-2022-46310,0,1,a3f6671e96f040089cc895d56f51c20eef4134c571b175359034e955139cfd70,2025-04-17T14:15:22.820000 -CVE-2022-46311,0,1,236cf672d24afb10496d871208f00842fe28fa47b5987de7cffa8e91006a5d78,2025-04-17T15:15:50.743000 +CVE-2022-46310,0,0,a3f6671e96f040089cc895d56f51c20eef4134c571b175359034e955139cfd70,2025-04-17T14:15:22.820000 +CVE-2022-46311,0,0,236cf672d24afb10496d871208f00842fe28fa47b5987de7cffa8e91006a5d78,2025-04-17T15:15:50.743000 CVE-2022-46312,0,0,61054ff5820a89604841ce562cf98cb60110175b6c213449214d2bd502b7ca19,2024-11-21T07:30:21.907000 -CVE-2022-46313,0,1,81a640dec55daf88b785670fc858417f46949d27005968ceefba63cf10abfebe,2025-04-17T14:15:22.993000 -CVE-2022-46314,0,1,4e75ff3690500b8a564f523b6e854bc40b2d7f6f69b33262ba21ce08e5e22088,2025-04-17T14:15:23.163000 -CVE-2022-46315,0,1,9f6176f8dd1be3ddf7686589ae5f03dfaf97d136361d0ca060b2995fe00b0cc8,2025-04-17T14:15:23.330000 -CVE-2022-46316,0,1,6878d6f17ae851970edf3f2b765cf2daaa37d23f6688a7fe14bc49aa09a6b7ca,2025-04-17T14:15:23.493000 +CVE-2022-46313,0,0,81a640dec55daf88b785670fc858417f46949d27005968ceefba63cf10abfebe,2025-04-17T14:15:22.993000 +CVE-2022-46314,0,0,4e75ff3690500b8a564f523b6e854bc40b2d7f6f69b33262ba21ce08e5e22088,2025-04-17T14:15:23.163000 +CVE-2022-46315,0,0,9f6176f8dd1be3ddf7686589ae5f03dfaf97d136361d0ca060b2995fe00b0cc8,2025-04-17T14:15:23.330000 +CVE-2022-46316,0,0,6878d6f17ae851970edf3f2b765cf2daaa37d23f6688a7fe14bc49aa09a6b7ca,2025-04-17T14:15:23.493000 CVE-2022-46317,0,0,7e84a1f7d9ded0c08dc1e4087988ac38448358343d10bb984c6b5a2221666262,2025-04-16T19:15:46.917000 CVE-2022-46318,0,0,07cbcb378ef1aeba614bdf81ce1aabb767e9290b4db859c1204ffb4c011cd827,2025-04-16T19:15:47.067000 CVE-2022-46319,0,0,a1bde5659cc9566bafba7ae5d34bbd7fd97ed61bb11decf386622b0f28608961,2025-04-16T19:15:47.207000 @@ -211237,8 +211237,8 @@ CVE-2022-46323,0,0,637b670a49096235ef6e270fc25c52f9625502d3254123b1e4dcb8e268660 CVE-2022-46324,0,0,15fed7c6ec89212d6ec6a6563bb8087c4d0b1f9f6910606ce868d19e271d5439,2025-04-16T19:15:47.950000 CVE-2022-46325,0,0,6fb4cc91d73d4efc82afc430d18bca4bee198efb81a85ecd0fcd388d1f65b9c3,2025-04-16T19:15:48.100000 CVE-2022-46326,0,0,e948edfe6c02e1c6c8afb576b4db2e8e8653863a6499374d28b81f6f82ce56d9,2025-04-16T19:15:48.243000 -CVE-2022-46327,0,1,de93e9523c38f79998cba8dc556c6e5bac60a3185af7a1b20ff655dd6666c64c,2025-04-17T14:15:23.660000 -CVE-2022-46328,0,1,35bee3fa62b532a277113acbc99fb3c94dc115832e60ead38aaa266483ece31e,2025-04-17T14:15:23.837000 +CVE-2022-46327,0,0,de93e9523c38f79998cba8dc556c6e5bac60a3185af7a1b20ff655dd6666c64c,2025-04-17T14:15:23.660000 +CVE-2022-46328,0,0,35bee3fa62b532a277113acbc99fb3c94dc115832e60ead38aaa266483ece31e,2025-04-17T14:15:23.837000 CVE-2022-46329,0,0,0f66ca1416337cd932f56ad3cececa7276712c4dc206efb7f7ee975d955a08ae,2024-11-21T07:30:23.953000 CVE-2022-4633,0,0,34ecd229419d8f40875c97d499c7f973356f449a559adb4dd3d63b5900f27b15,2024-11-21T07:35:38.237000 CVE-2022-46330,0,0,fb70279747c328d5360959d78a1e706c664a27a24161a992cad8782a546cc1d0,2025-04-16T16:15:25.163000 @@ -211301,12 +211301,12 @@ CVE-2022-46394,0,0,5e5426ef302809263ec7e5581a2cc817e2c88594fb42e1f1b8694b6cb4a05 CVE-2022-46395,0,0,219ad3b4f9624d34b9d70567c4582107fee436c5cd53ac43301d04b95b2e92dc,2024-11-21T07:30:30.913000 CVE-2022-46396,0,0,79126e060499e4cb027f3964577f73c1565abacbfb6ec8e9a9f8c4fcfbbeedad,2025-02-11T18:15:20.450000 CVE-2022-46397,0,0,28539785d12ea6f2f72214e068a422a2c2ab230d3773bc45641acb5b99cabec0,2025-02-19T19:15:11.217000 -CVE-2022-46399,0,1,526a5aada4297e27d1337e95b7aceb0a0af8f81d862a9a331c945cdc6ab87d49,2025-04-17T15:15:50.917000 +CVE-2022-46399,0,0,526a5aada4297e27d1337e95b7aceb0a0af8f81d862a9a331c945cdc6ab87d49,2025-04-17T15:15:50.917000 CVE-2022-4640,0,0,26dcf0967506951f35cc34de64c2c84ad5b9b92a3d0210c7d0678c6b754542ba,2024-11-21T07:35:39.063000 -CVE-2022-46400,0,1,8272b5f4d6fb25b8a2405d6ccf20232381e4b293431dc835435e86dc02874358,2025-04-17T15:15:51.150000 -CVE-2022-46401,0,1,77d5644189a94adf77d3dc4e5f332eff613c32e57083795fee0263c832d2c706,2025-04-17T15:15:51.693000 -CVE-2022-46402,0,1,61f3103fe1ed9f9c7967524794298ecae290888253a91fcdbdc7a881cd5c9337,2025-04-17T15:15:51.913000 -CVE-2022-46403,0,1,c566cd1dd7684a37027c87db7b53558a3a2850f0f4ebd0b3ba9c6ca70e4e4aec,2025-04-17T15:15:52.123000 +CVE-2022-46400,0,0,8272b5f4d6fb25b8a2405d6ccf20232381e4b293431dc835435e86dc02874358,2025-04-17T15:15:51.150000 +CVE-2022-46401,0,0,77d5644189a94adf77d3dc4e5f332eff613c32e57083795fee0263c832d2c706,2025-04-17T15:15:51.693000 +CVE-2022-46402,0,0,61f3103fe1ed9f9c7967524794298ecae290888253a91fcdbdc7a881cd5c9337,2025-04-17T15:15:51.913000 +CVE-2022-46403,0,0,c566cd1dd7684a37027c87db7b53558a3a2850f0f4ebd0b3ba9c6ca70e4e4aec,2025-04-17T15:15:52.123000 CVE-2022-46404,0,0,fd629043e20328c3e8b322682cc6a46eb2738132ab8a08d3427bee294ca7460e,2024-11-21T07:30:32.277000 CVE-2022-46405,0,0,c4973a944778c4cc8cd8c5d7cb82f6404c734971f440b363b9d3522f04fd87eb,2024-11-21T07:30:32.440000 CVE-2022-46407,0,0,b8ba94a0a84ee71a638a9e126b33294f251846229e546358c5bfd3dfb4f6d284,2024-11-21T07:30:32.600000 @@ -211321,8 +211321,8 @@ CVE-2022-46415,0,0,9ad86ee29adc0c915d82e01ef84b62fcb234ace0e680423ae1771530eaddf CVE-2022-46416,0,0,91c92452e2fa3d0c72a7b07d5a5eb6af5138c4ce785c6782502fed73ab09bd80,2024-11-21T07:30:33.843000 CVE-2022-4642,0,0,d2f9d594a9b47c81d601e0c78418fba7b2ff9d792f8aaaf5295fe7bd3c22035f,2024-11-21T07:35:39.313000 CVE-2022-46421,0,0,7e38af8fe0ffe8b2f0af4243ce2f3af5ca96d6e8592ccc5aef1c6d56377181cd,2025-04-16T18:15:58.347000 -CVE-2022-46422,0,1,8cf190ea78eb41822dfc5d193dfa36b0ccfdbccb3252fb1b9bcecad4efc86323,2025-04-17T14:15:24.010000 -CVE-2022-46423,0,1,c97ec97dd9e456a159b1be6ffeff6557184a20388932441f9617a7db951beccd,2025-04-17T14:15:24.220000 +CVE-2022-46422,0,0,8cf190ea78eb41822dfc5d193dfa36b0ccfdbccb3252fb1b9bcecad4efc86323,2025-04-17T14:15:24.010000 +CVE-2022-46423,0,0,c97ec97dd9e456a159b1be6ffeff6557184a20388932441f9617a7db951beccd,2025-04-17T14:15:24.220000 CVE-2022-46424,0,0,41744f341176f1924056821973d4de9e5e3b9633fe56f641c9f3f9b5da831a38,2025-04-16T19:15:48.390000 CVE-2022-46428,0,0,7430cf940deb69e8841fe482caa039eff509416597a95c34503d1db02c80c8fd,2025-04-16T19:15:48.560000 CVE-2022-4643,0,0,f2198f12db82bd2808223c7ef6c0d571b28d7166505c221f66ae352c0da3b86e,2024-11-21T07:35:39.450000 @@ -211662,7 +211662,7 @@ CVE-2022-46867,0,0,e5e5f85d79348c8534f51864f25f53a4f29eb5af03b1a9ac0a29b47a6c381 CVE-2022-46868,0,0,3c8512a56cf97f3e89416eae57cdc4a19ac36b22b02f977aff7d36dfde88e5ce,2024-11-21T07:31:12.540000 CVE-2022-46869,0,0,71e400b356686c741aff96ea562aec3717c6dac99f8cf4b2e4c9bed30a4b2c4e,2024-11-21T07:31:12.670000 CVE-2022-4687,0,0,b0cdf931279477cb80bf56e92f0c2cdb2feb3598a95d08cda9739c24c5b8930e,2024-11-21T07:35:44.133000 -CVE-2022-46870,0,0,5543be9594f58e23af5935c6861cd7c0f9f4f412f29a42b20c99bfe6c4c1d43d,2024-11-21T07:31:12.807000 +CVE-2022-46870,0,1,dd91ed9c5987454afb978f2603d03248fa36be131b4eeeb1ec7ffcbfce6e15d9,2025-04-17T16:15:26.343000 CVE-2022-46871,0,0,4e71a15f729d4b19a17d28c6cfa76cae9581dcf28d0a2bccb56c96946d473a87,2025-04-15T15:16:05.927000 CVE-2022-46872,0,0,b4321966214f77bccd426848ccdc59de4a78d4ce94c512aa3d061c0cdd4c3612,2025-04-15T14:15:37.270000 CVE-2022-46873,0,0,56294c84c453ef5d8c35c3a570a4cb467bf5cc3376bdb93b69568c16f2c87ca9,2025-04-15T14:15:37.457000 @@ -212094,7 +212094,7 @@ CVE-2022-47497,0,0,c6876bd2bc636606405893c533035d007a54722c753535208072f07b7cba1 CVE-2022-47498,0,0,b54d51000093628c2d110249db494227cd7a005468009673751812bcbd768bb3,2025-01-28T21:15:11.707000 CVE-2022-47499,0,0,4f002514991db5df8058b7d31d105816e83940c12296ec588e8ba362df92d783,2025-01-28T21:15:11.863000 CVE-2022-4750,0,0,f246e5edc422b0662a030fb74d0d9bbf332bd6a84089398ae30ef739e69373e4,2024-11-21T07:35:52.167000 -CVE-2022-47500,0,1,591b90829ccf2f295eac86a8aad1470f2c971d9a863e6c1375e65171ea8e63d4,2025-04-17T15:15:52.387000 +CVE-2022-47500,0,0,591b90829ccf2f295eac86a8aad1470f2c971d9a863e6c1375e65171ea8e63d4,2025-04-17T15:15:52.387000 CVE-2022-47501,0,0,97daaedd69d6bbeee9ad12fa658b84683a05ab74eb2de49a99ec76669652d428,2025-02-13T17:15:49.330000 CVE-2022-47502,0,0,fc45952fc7c38ea040fe0002008437f9f6e0496c96f121999fa8196ea3665b51,2025-02-13T17:15:49.510000 CVE-2022-47503,0,0,dca25377cab1ad6b6c415381dd084e36bcdb9646e56675b10e97cd9f2595fa2c,2024-11-21T07:32:05.913000 @@ -212107,13 +212107,13 @@ CVE-2022-47509,0,0,5eddac783b82ee07f860e64ca0d4bc7788ff1a7c5c3af2bc0d0fbe8ebac94 CVE-2022-4751,0,0,b9b5162c0e556ec0f4c2e03cbc38b309040c7943a524bb26e28e863eedb913bc,2025-04-03T13:15:42.123000 CVE-2022-47512,0,0,e0cce48898f3104e221cce4ed20ed250821a9c37894ff7ef63c26c2cea69d412,2024-11-21T07:32:06.990000 CVE-2022-47514,0,0,0e4af83224a07ff712db912c3500091eabf96b63fbf29a1872fe8ee316e076f4,2024-11-21T07:32:07.153000 -CVE-2022-47515,0,1,4d09af940a0269ca6b905ef1c85b7bea6af3ac6cd2beeb21df1100f921bc9eec,2025-04-17T15:15:52.553000 +CVE-2022-47515,0,0,4d09af940a0269ca6b905ef1c85b7bea6af3ac6cd2beeb21df1100f921bc9eec,2025-04-17T15:15:52.553000 CVE-2022-47516,0,0,627df9c474bdf49caa72484157fd7249a0325feab72694e450d264c4139ac8af,2024-11-21T07:32:07.457000 CVE-2022-47517,0,0,d92c3143f078a6d36079d7a5f8047c6ad8219bc781825d4029d9c8abd5ddd475,2024-11-21T07:32:07.610000 -CVE-2022-47518,0,1,b9a2661f435c013182572a5615295cc576dfad3468f07d0a5c1045515b92185c,2025-04-17T15:15:52.760000 -CVE-2022-47519,0,1,bb8381ab483eec9fba1179a69919d651d6b3cb8c1485350b2fa493868ccbba28,2025-04-17T15:15:52.987000 +CVE-2022-47518,0,0,b9a2661f435c013182572a5615295cc576dfad3468f07d0a5c1045515b92185c,2025-04-17T15:15:52.760000 +CVE-2022-47519,0,0,bb8381ab483eec9fba1179a69919d651d6b3cb8c1485350b2fa493868ccbba28,2025-04-17T15:15:52.987000 CVE-2022-4752,0,0,30e7544de09061701b4dc60c2a7c242087a4f9966e0d1b6f0493eb46cb487e2a,2025-03-13T20:15:13.973000 -CVE-2022-47520,0,1,0fb5338a351413725f295f611af00abd6b09f0a4aff1044618d228e2fd669bcb,2025-04-17T15:15:53.203000 +CVE-2022-47520,0,0,0fb5338a351413725f295f611af00abd6b09f0a4aff1044618d228e2fd669bcb,2025-04-17T15:15:53.203000 CVE-2022-47521,0,0,aaf843fad8bdb5c8958ac3f72b5eedeb608ba4f59d22de3066a02680cd0b7c6c,2024-11-21T07:32:08.273000 CVE-2022-47522,0,0,71017cfd7ed3366e0acbf531e7033d07ae3d23f62d5fc2e414ec0bf513fa8220,2025-02-06T16:15:31.443000 CVE-2022-47523,0,0,ad91d37ade9217ec7d7e761645430cf8cea0386deb945aa175145ea985daa9f2,2025-04-09T21:15:43.870000 @@ -212128,10 +212128,10 @@ CVE-2022-4754,0,0,3ff4168b84270398ab1e96e28614eb3ecb42418ff0d83bc00538d787d58852 CVE-2022-47542,0,0,c7f0f00e24b3d4d151ac441abd2627b710ab27d7b2438866cc95d591300dbe49,2025-02-18T19:15:11.147000 CVE-2022-47543,0,0,dd6261e99e66c8b9289be4a362b6c513b42bec5b99a748c888d07ffbac9e4677,2025-04-10T15:15:57.440000 CVE-2022-47544,0,0,ba51be2e49d388de9ad6971b14426ed9eea27127863940477e1ded118443fc58,2025-04-10T15:15:57.660000 -CVE-2022-47547,0,1,69fb7c4574897300c67552c7ff0d2e28719ae9c22454e56b6c2805cdc0d88b69,2025-04-17T14:15:24.400000 -CVE-2022-47549,0,1,3f635c72d2d2a09ca6b033e9cb185e71c5b0626b2cf313f8c0a0ef3add6f8605,2025-04-17T14:15:24.600000 +CVE-2022-47547,0,0,69fb7c4574897300c67552c7ff0d2e28719ae9c22454e56b6c2805cdc0d88b69,2025-04-17T14:15:24.400000 +CVE-2022-47549,0,0,3f635c72d2d2a09ca6b033e9cb185e71c5b0626b2cf313f8c0a0ef3add6f8605,2025-04-17T14:15:24.600000 CVE-2022-4755,0,0,f685bcc3eacdb19f4fb9ad5b550e6bc2608e752a7c307dcceff9d425dd11562b,2024-11-21T07:35:52.737000 -CVE-2022-47551,0,1,d51e04287eb249118442de9565f67d8a4a848028293652af034dde6b9bc7d9e7,2025-04-17T15:15:53.467000 +CVE-2022-47551,0,0,d51e04287eb249118442de9565f67d8a4a848028293652af034dde6b9bc7d9e7,2025-04-17T15:15:53.467000 CVE-2022-47553,0,0,3a2c73b5858d977485724a2eda0ade5ac3f05ec336ade36752ff6dea2a54de74,2024-11-21T07:32:10.783000 CVE-2022-47554,0,0,9ce6bb1a8f39f842a972d605027f7cafebdcb304fb7674418c3cf4d842f1c91d,2024-11-21T07:32:10.940000 CVE-2022-47555,0,0,404b7b44eb2053f1b7d53473fa237f3c7faff2cc6e3a663c963872180497a94d,2024-11-21T07:32:11.083000 @@ -226038,7 +226038,7 @@ CVE-2023-32373,0,0,baf19a27c54c416ea4f031b5229e672209b66abb2f0ef2d9ede60a2a4dd4c CVE-2023-32375,0,0,363d658b705a2905988a4381992e7e285988cfbbe26cd1b6b8bb78ee269b1a27,2024-12-05T22:15:19.837000 CVE-2023-32376,0,0,95a529e4063990411c2ca53ecf165580bab43c05d8c5d78dd3562ccd8e98cd87,2024-11-21T08:03:13.820000 CVE-2023-32377,0,0,ba36bd37b2f7c1e17d958e1f4d12ab4bfd5e2df22ada13420271f58cb2eaa905,2024-11-21T08:03:13.940000 -CVE-2023-32378,0,0,9eb136dcdc6013cc4e1f6d43d45880900999beab969c96d973a27047bd39afc8,2024-11-21T08:03:14.050000 +CVE-2023-32378,0,1,f54c67e8e0b2a33a016cfad22ffcebe8d6c3b8cf66a297c08f57a19a2256dc18,2025-04-17T16:15:26.570000 CVE-2023-32379,0,0,223f8f4e369a5cc5760451695cf10034f949a649e540d2e810f9d2f13e976e4f,2024-11-21T08:03:14.163000 CVE-2023-3238,0,0,d28201073e1a00b996af838080d16d78f68f379c0277d3f17d97e64a237de326,2024-11-21T08:16:46.277000 CVE-2023-32380,0,0,550b50fc4a2b4f8c97b09f5bb401aacef0dfd77a03c20914d23db0cc88d9f584,2024-11-21T08:03:14.290000 @@ -233818,35 +233818,35 @@ CVE-2023-4220,0,0,9c1be8bd25968ff0526566a2b1027c997b88a77c0d8dcefa1a6433b8fd36ac CVE-2023-4221,0,0,bf8e9d99dcab730735c20f4580310bef2ff1b13f53334623245631c526c7205b,2024-11-21T08:34:39.177000 CVE-2023-4222,0,0,36229eb8ca311b7badaa947ea221e1d7e3bb7ab89a2604de2876b4d338768ec1,2024-11-21T08:34:39.323000 CVE-2023-42222,0,0,ae94da32ff59921e807938d15425cb115800cda785c3c70e925ffd51050b89cf,2024-11-21T08:22:22.720000 -CVE-2023-42225,0,0,82d54ac0c08805fd30151501df1953244bb942907012b0239f68449433ff56c9,2025-01-23T18:15:28.787000 -CVE-2023-42226,0,0,97f76215aa2bf63d0c621ad9ab9dbd013f8476f98eebe51bd271f3c5c5650f6c,2025-01-23T18:15:28.997000 -CVE-2023-42227,0,0,fc4f4eaa31e3df91437978a3c27364124e370fb20c56d9b1bcac61879965d720,2025-01-23T18:15:29.260000 -CVE-2023-42228,0,0,51249efc513ba70f3c0b81f4463055da6c7aa3e654f242d717633111b2e50361,2025-01-23T18:15:29.450000 -CVE-2023-42229,0,0,9e36a843e732fc321496ee01f66ca78c970fd0afa7413da796fcf3001a61ca92,2025-01-23T18:15:29.657000 +CVE-2023-42225,0,1,fbf8c1d118c52150c67cdd722434281e0e61d59a263ced8623bd762e07178397,2025-04-17T17:43:15.710000 +CVE-2023-42226,0,1,8973e4180bdffb5178023ea5075519c847d02b20a25980959819597a1ead5726,2025-04-17T17:43:43.210000 +CVE-2023-42227,0,1,92f1a11d1c14b0507fda56860c248adfaa67fa13c75b79b7bf9b8e64f55a8e2b,2025-04-17T17:43:48.100000 +CVE-2023-42228,0,1,1ace2a672006a745c4ce72495a0389c1d7cb69a2510e69828b192906fab1109f,2025-04-17T17:43:54.063000 +CVE-2023-42229,0,1,c3758a92b6e2f85ecda4174adc974c30780e79762b4f0a8ede2ee158961f3f25,2025-04-17T17:43:58.597000 CVE-2023-4223,0,0,af5ff20be5d1517ff6700858d84ba65eb96375a0c029cc2d302d3763216fd7e2,2024-11-21T08:34:39.457000 -CVE-2023-42230,0,0,a27cd39883b0aa87ed9da74388e020439f1f705309294234881c5df5124a5cac,2025-01-14T15:15:11.633000 -CVE-2023-42231,0,0,4f1f9fef9e80ae22acdfbc6add56780d88da483e465358ebb92145f0da58aaac,2025-01-23T17:15:12.523000 -CVE-2023-42232,0,0,fa2d9124c7c65a485edd8978845f7b84ad24baa786bf8a8a20b9645de5b7810d,2025-01-23T17:15:12.693000 -CVE-2023-42233,0,0,0ef765427d2c364bfe6113d71a0ecf990a7a966648b3ce549ce24f50c68a4a66,2025-01-14T15:15:12 -CVE-2023-42234,0,0,c0dc51cc0039010a8c12b5e5b547fe57f0f39a5f3877a3d854be3ca0f8196055,2025-02-03T14:15:36.287000 -CVE-2023-42235,0,0,92233c5635fac4a80ca7c920ec3549a2b8f4c787ec74c75df0ad60a20977d8fe,2025-01-31T19:15:15.320000 -CVE-2023-42236,0,0,1cb7200d71e5a2a678f2d005b05e2be575a7e3797c2aaa683390e01ff07d3cf4,2025-01-31T19:15:15.497000 -CVE-2023-42237,0,0,50da78ef2c69b06622e097bf8c5854521f0af8d00206e662c197bb1d4fd4bf63,2025-01-31T19:15:15.673000 -CVE-2023-42238,0,0,6ee12844fd5094ff643231c8546b8b352d0582e9014b86b057bb8dbd7bf9d89b,2025-01-31T19:15:15.837000 -CVE-2023-42239,0,0,6acc9072bdab12dee3eeec772e0621230cda1a85f3805b004d23b60bb08077ca,2025-01-31T19:15:16.003000 +CVE-2023-42230,0,1,2bed6717c48057f980708bdd32ec42935f7cabfce503936fe314f4888f5e0c00,2025-04-17T17:44:01.577000 +CVE-2023-42231,0,1,9bb8732b4ae516c72a306347add85cabf544180e41fa89948b2ab3cd0a67e521,2025-04-17T17:44:04.820000 +CVE-2023-42232,0,1,18ae4ec5e864f2232b8648bf56cf39dcaad2974682c1dae065e3c67022ff2c9d,2025-04-17T17:44:08.917000 +CVE-2023-42233,0,1,9b0244213ebb6ca3b5b61b5a22003f90c035925681c0537cdb274d4c1fe48578,2025-04-17T17:44:11.843000 +CVE-2023-42234,0,1,c1c74e758c62821e31014374eaed49c89e1f81e4811df44735b73109a21c5250,2025-04-17T17:44:15.430000 +CVE-2023-42235,0,1,d10003b0cdca5fa502541883e3be84d3de2c2c353a16d07451fc0346352e305d,2025-04-17T16:35:22.003000 +CVE-2023-42236,0,1,5c53cab5fd1704b57ee8044d03e6f2932ea63faa9efd2aa628a96d1eaeef1f85,2025-04-17T16:35:10.180000 +CVE-2023-42237,0,1,1ce498e8769d7839330f7107f5709a77d69b10cff61c6f24d699c050a8171682,2025-04-17T16:35:07.840000 +CVE-2023-42238,0,1,cd698b0783a3834a5eda04da1848d85df323b49156745227d3f7dea593ac98ca,2025-04-17T16:35:05.157000 +CVE-2023-42239,0,1,3960345dedc9ddd160d613221dca6a5d9cf053951e5134a5e8d47218ce2ab9b3,2025-04-17T16:35:01.600000 CVE-2023-4224,0,0,f1b6668534bf40a17d723024299108e58758b217bced5525ade83799d795b963,2024-11-21T08:34:39.590000 -CVE-2023-42240,0,0,d88cd99dc7237fb4e26dfb0e468db3c8d3cc5b096744e0e2caccd7960ad8bd9b,2025-01-31T19:15:16.180000 -CVE-2023-42241,0,0,3bf233e27f7754936569eb357dbef60ffd32b1fc259fc80fae9b3b6ce095a93e,2025-01-31T19:15:16.347000 -CVE-2023-42242,0,0,fb11f30fae71f90327865d57cfd89b708f2fe25c6ec217aa4251e6b3f8f347fe,2025-01-31T19:15:16.510000 -CVE-2023-42243,0,0,58718faeac5d2ecd9c2a11bbb81df8ce622db1951fd63df5d4b66791394419c9,2025-01-31T19:15:16.677000 -CVE-2023-42244,0,0,fb953b3a8f7f82fd919dea0bdf187d66a37679a9578bb3f5fe95de0b7443148d,2025-01-14T17:15:11.847000 -CVE-2023-42245,0,0,17499c4977088f01727e72e25dbbfe974fc0ec2f368a5616efe7b131bba77dfe,2025-01-14T15:15:12.170000 -CVE-2023-42246,0,0,fe7b78d8b9b334e858f6adbfdcc1b7197b6c936781ce42ccf854f68285ef6965,2025-01-14T15:15:12.317000 -CVE-2023-42247,0,0,37f2b84a8eb1b2726d485612742d8bb00716a453f5fd764c0128b35c3085c8eb,2025-01-14T15:15:12.470000 -CVE-2023-42248,0,0,7540541ee9a48c8c00c6aab9f2cf9dcbe28ca49ba5f467153f624a7679ea8287,2025-01-31T17:15:11.570000 -CVE-2023-42249,0,0,71428716e48bd9bdd971621d7fedc33b4c21785e5f35b051641c0b53373e7029,2025-01-14T15:15:12.610000 +CVE-2023-42240,0,1,6b5bba9ec453cc4d1679dc574bc61655a368a1f77c64d79fd9fe09b85bb2d3c6,2025-04-17T16:34:58.637000 +CVE-2023-42241,0,1,f31cbdfe9e8309a21958b02e382198e86072afd337f72c2f92d46667ec147335,2025-04-17T16:34:55.850000 +CVE-2023-42242,0,1,5eb3c857dc257cff803d64150f67cbbafe71a8680be9cf14f7e35b93d3ca1e23,2025-04-17T16:34:52.450000 +CVE-2023-42243,0,1,c7a899c4618f5779f427be6cc480b004766bd8ad1ce3d550e37384ecdb49a8c4,2025-04-17T16:34:49.190000 +CVE-2023-42244,0,1,a7c36feb341cc0ca06dd71a74fa47f9c6ae1e96ee1833ba74132d704290721ea,2025-04-17T16:34:45.740000 +CVE-2023-42245,0,1,3684524e3d65368d43b834abb2aab49af21530033eb8db4d4dcb99453f9bc27a,2025-04-17T16:34:42.030000 +CVE-2023-42246,0,1,8342e3371c876c572c57c31b914f9203ebf49d6fd030dce2c4a43d389dc4d6dd,2025-04-17T16:34:38.627000 +CVE-2023-42247,0,1,df79c1391eaa3eb8a6dae144a155847ef9f60ff5b8f9ca9ec591030b8844355d,2025-04-17T16:34:34.370000 +CVE-2023-42248,0,1,bd9917da599f77721d4489f407d058322beaeb1b0158f614dbdb39ae992f7114,2025-04-17T16:34:29.350000 +CVE-2023-42249,0,1,b7099f2bf1cf12872874f96b7147e10c70f3fc4191c0765b7b0e0391fba94589,2025-04-17T16:34:22.640000 CVE-2023-4225,0,0,cfb7cf232768a57c39d2e30da55c945a1f14958fd024250973de670337ea7bfe,2024-11-21T08:34:39.723000 -CVE-2023-42250,0,0,0b37b3fbb3c7f0bac2c312a0576b53ac7049f613b7d87ed487b7b4a15b2895ed,2025-01-14T15:15:12.760000 +CVE-2023-42250,0,1,da0e0b80aae4206fea218a8079bb7a64488188e7d449e8919e07d15616057fae,2025-04-17T16:34:15.420000 CVE-2023-42253,0,0,b04aeb7fb924e616cd7cc46de112d2f76a03dfa83986f286e07ef232f0c3e263,2024-11-21T08:22:22.867000 CVE-2023-4226,0,0,006e286645299d618e1e63c2a59dea3ea574d63652982ccb49b33fb73257fbea,2024-11-21T08:34:39.870000 CVE-2023-42261,0,0,35a3f257c867a2ba33190a0c6068e120a199ec31b279e7dddfaf91aa7cf86651,2024-11-21T08:22:23.020000 @@ -240227,7 +240227,7 @@ CVE-2023-51335,0,0,8f031692f711e1bf12853d84fafb89c0dc1f19a86e134cf9e243569a3b05c CVE-2023-51336,0,0,6b1aba112399547b45efce51c762c182c7e7cbb1d7419363b7bec19bb49e615b,2025-04-10T19:35:06.937000 CVE-2023-51337,0,0,89f4086f6e07d1fa46582811c2506d19d8afa76d2dff1c8dfe78ae0c7978ff3d,2025-04-10T19:32:46.327000 CVE-2023-51338,0,0,c9efeab7a12c50ca6d595de64b030ef68d8c1567afde0c37b66a16d530a0690c,2025-04-10T19:31:02.920000 -CVE-2023-51339,0,0,46130be144d70d7717f34638d17bcb922ba5bdffc38788d706d1125b8b9b37c8,2025-02-21T18:15:15.993000 +CVE-2023-51339,0,1,3076b76c1f86d1462d06dcb43c9c47e972cff1f73a20893a9845d1e4d74382f8,2025-04-17T17:59:04.733000 CVE-2023-5134,0,0,4883dceb94c3f0cc4b1b00f2283b580de20b785803ef8febb697d90c06bd591d,2024-11-21T08:41:07.850000 CVE-2023-5135,0,0,877454aba62f703a281ed8cbe6f67c849efb5f5f63261252e74d9df5c2c3773f,2024-11-21T08:41:07.980000 CVE-2023-51350,0,0,3e6b1a93404e3494b28f6f9c928c88f04bb91fa7582d839166c6383b89c1b64d,2024-11-21T08:37:56.867000 @@ -240753,11 +240753,11 @@ CVE-2023-51955,0,0,5f78dd931fba7ab7497e17e4dfd1de6af1617d08da87d818625e30d5879ec CVE-2023-51956,0,0,2eca512dd68f217da788f293c3eb827769d1449f935d497ac5cd4c38e22a9237,2024-11-21T08:38:58.467000 CVE-2023-51957,0,0,76e7b32685a00f4369bdf2c6a596ac0c87298633fbf5a80d5facb022abc68579,2024-11-21T08:38:58.610000 CVE-2023-51958,0,0,e40fe21fa221ac8f194540f4f239f90de6fe1826c8d380d968a5794f965ba175,2024-11-21T08:38:58.840000 -CVE-2023-51959,0,0,8480f7a3c7f63bd7f7f5c7d58c093a08cb336f1aa0b20ec83ed0a01a6c5d4503,2024-11-21T08:38:59.080000 +CVE-2023-51959,0,1,2d44c13e4c787a6cecef943c2eed674bc93a171c71d5831b10b6164f2b3b6797,2025-04-17T16:15:26.863000 CVE-2023-5196,0,0,3dabf1d787c4f73274df244601170fc7b85535ad070383068bda9da52342371d,2024-11-21T08:41:16.843000 CVE-2023-51960,0,0,d99170c489c547d3f83ff1a6674b088067c6a2aefdb730351d8853530cde0a53,2024-11-21T08:38:59.233000 CVE-2023-51961,0,0,3b00fb3276b49f9fffdfcb1925c3f545d044a2352a24f879d34feb252d4dfc0a,2024-11-21T08:38:59.380000 -CVE-2023-51962,0,0,63bddb370d3bb4c008bd3b9496341dad1a01977f750ade5c1d1b621ba4108930,2024-11-21T08:38:59.613000 +CVE-2023-51962,0,1,5e316a09319d989b7564bcb691d5efbe3b784c220dcd2970d39c1209d338f73c,2025-04-17T16:15:27.027000 CVE-2023-51963,0,0,2438d815c3cde583ba6c318825935c352dcbdd28acd5472281ef2006903f9338,2024-11-21T08:38:59.760000 CVE-2023-51964,0,0,388eb3809f0ad90ba5bdbaf93339d12567e0a6beecf80b76284b0fad60d8781f,2024-11-21T08:38:59.907000 CVE-2023-51965,0,0,fe8c5776a709014a13cb758504a6626529037e76e045bc9ae2dc9b36c2231459,2024-11-21T08:39:00.060000 @@ -245171,7 +245171,7 @@ CVE-2024-10676,0,0,6887bcf7e7ad4dff7b3acb5ccb4703ef99e151f3c3b6329edf86e56346e5b CVE-2024-10678,0,0,2d4c7c0dbf73a0febb64fcb95cf96aa0969f22be17ad5704c54158d8b7b8b392,2024-12-16T19:15:05.907000 CVE-2024-10679,0,0,6031e8f0ed489a1fd714c3ee41c8f59bb6f216bd86d1989d37ded7c87ab84db5,2025-03-27T16:45:46.410000 CVE-2024-1068,0,0,19fff8aed0f63e6149ffcd4b412aacdd7ffcb6468d1d60a7391f61d942a540cd,2024-11-21T08:49:43.460000 -CVE-2024-10680,0,1,206446026560e47f39b1233a576a753da51cb58700f29d60c0ad6dff73deb7b5,2025-04-17T14:15:25.537000 +CVE-2024-10680,0,0,206446026560e47f39b1233a576a753da51cb58700f29d60c0ad6dff73deb7b5,2025-04-17T14:15:25.537000 CVE-2024-10681,0,0,b8f17934b6825994f779df09ece3578475b75ad6fb261f72f1afc8dc3363b0f0,2024-12-06T10:15:04.533000 CVE-2024-10682,0,0,a7e8df655c8e75ce2215a7ec3bf41218b640524758c0db7f945bc19c5ad286f0,2024-11-21T13:57:24.187000 CVE-2024-10683,0,0,4d3a70daf30fbf2f2ba33971b3daca0cfdf2ea629fdbab703b0dff039ae72ac0,2024-11-12T13:56:24.513000 @@ -246434,7 +246434,7 @@ CVE-2024-11918,0,0,f7031582b21494aaa2ccab4dd4ab92d52bf9f67c1445d9fb72b363b717cfc CVE-2024-1192,0,0,5063d16699b3db058d0f99170ded601d82fcfc6f39ec66d01e8a7cebfd42903d,2025-01-08T14:35:22.633000 CVE-2024-11921,0,0,8d14fd5ac89466ae906ad741ca0367246b772d6837be889940ee25bf6694b61d,2024-12-27T19:15:07.850000 CVE-2024-11923,0,0,4d6a80e3f288fbe3ed1bd4a1feabd18394fd01e27066d6fff1deb3858322387f,2025-01-18T00:15:25.823000 -CVE-2024-11924,0,0,3cb63d7102a51f351af80ac973c3bf0a577e40162dfeabcbc4fecbf2598ae88b,2025-04-17T06:15:42.460000 +CVE-2024-11924,0,1,0620612dc19f9ce5a4e564c48a166194bdc89415283402c2762ead0ad5a23f59,2025-04-17T16:15:27.233000 CVE-2024-11925,0,0,77043a2dc07077ec38aa584033543217cc9fb39ce00751159aa83ba0aa54cc6b,2024-11-28T07:15:05.267000 CVE-2024-11926,0,0,12ad1d9fc49995c8eb92feee3b52ec9fafd14557b209a764d700401682560722,2024-12-18T12:15:09.107000 CVE-2024-11928,0,0,4eb81c3b991253e17b093831750d2f60d8030675796e16e7e29cc29429037a0b,2024-12-10T11:15:07.220000 @@ -247044,6 +247044,7 @@ CVE-2024-12527,0,0,a734fa6fae374e1f78bf0ed5836acb2d88c39ac4a4907ac1228b4122e65ad CVE-2024-12528,0,0,f4af9cf65ffcc6bdde0559258762f791c056b91239412bbfffbf03d13aedbfde,2025-01-07T04:15:08.543000 CVE-2024-12529,0,0,c0a2490d2000b1b21f26fd41b92b9a7ec26eb3de5cfae86c46ddfc21d025bec1,2025-01-25T08:15:07.973000 CVE-2024-1253,0,0,a598e10fa6d530af6148de164d99995412d597f7142ead42d62b85e905a98949,2024-11-21T08:50:09.843000 +CVE-2024-12530,1,1,1f4bbbe483ffb29ab92223c7bf20d1ebf2726254d1b8814b7f4cacc56900090f,2025-04-17T16:15:27.360000 CVE-2024-12532,0,0,199fed046db6fc1b5b34521e2b9548b73238ea6ea9f77361d16a8dbec2a817f0,2025-01-07T12:15:24.363000 CVE-2024-12534,0,0,86d4f2fbb45384342c3c827ebc32e05f6f346d6613df716282fe0b76b0db9598,2025-03-20T10:15:29.003000 CVE-2024-12535,0,0,783cbd5e17eda49b126d7013b7661e75fb62741f3c668d86577a16b9b9c20d52,2025-01-07T06:15:17.220000 @@ -248995,7 +248996,7 @@ CVE-2024-20006,0,0,123690fda6d54b98716f1dcc2adbe49f785d535a185fe9b4159c2360ed88a CVE-2024-20007,0,0,ab19a2494b1d096e2862ed93f193d718b58535b709bff75d63ca0c55cebc750e,2024-11-21T08:51:47.180000 CVE-2024-20009,0,0,4a58a52b68097964e7e1bcf696d9da3d868e5ffe4b53e991be80fb6a46e280b2,2024-11-21T08:51:47.310000 CVE-2024-2001,0,0,f5610a49aa6867587b18b206efbbb2440b5d379e00610c0831925a33275cd194,2025-03-04T12:38:22.580000 -CVE-2024-20010,0,0,8edbf766ae1c5f4665b2af7523fb7a6f5200cb0332f487369daeca619902a2ec,2024-11-21T08:51:47.437000 +CVE-2024-20010,0,1,2ac4458a51ddbbb07cc575bababa737fe197d26c27854f77cfa94fea79ccf784,2025-04-17T16:15:27.490000 CVE-2024-20011,0,0,87bce25997d86bdef96305e83059e8ef24e00ebd023828f1663236af9db940d9,2024-11-21T08:51:47.577000 CVE-2024-20012,0,0,032eaf44b99fe882a34e6aba7f568f377b39ce8e6869d2f3e491b4a94d24d9c9,2024-11-21T08:51:47.703000 CVE-2024-20013,0,0,aa6383699ae95ba1779043fefd85395a485e40788b6ef64d08f3b84398e34dac,2024-11-21T08:51:47.850000 @@ -253285,25 +253286,25 @@ CVE-2024-25512,0,0,f88a1a1dd3d97eb96427dcf0d830d982338e29e9b3421888bb326e3806794 CVE-2024-25513,0,0,33d9abdd7a6635d7b9db210b78cd39e7f8026aaf7bdd4b39d85d5f51d9339fff,2025-04-16T19:02:43.507000 CVE-2024-25514,0,0,5bbcdbf97d360b9d8b34ef0b78a8bf8dfde1addd86680e180102fd21b5b21ff6,2025-04-16T19:02:34.187000 CVE-2024-25515,0,0,bc42b6631f4b1404bf1c204339b0b07c5901969cedf6ef6ce0c5bf315dba3384,2025-04-16T19:02:22.390000 -CVE-2024-25517,0,0,7b2cb83aafad7b6071344c5946ae488491fb26c2ebef9e68b6df4f0888ce2420,2024-11-21T09:00:54.813000 -CVE-2024-25518,0,0,4cb317decfcfaf4255d5f51287437d15cd0df33ab197dad7a3fbf21ce3f3bd38,2024-11-21T09:00:55.037000 -CVE-2024-25519,0,0,0a91b08bad19e0fdbaaa75835b391d59df452a42edd620ce62fa3db0b15f6e6f,2024-11-21T09:00:55.263000 +CVE-2024-25517,0,1,72b4dd34d889237f598a27da3a8c74c68c67bfff735cd2c29a58ae044a8494b5,2025-04-17T17:20:09.337000 +CVE-2024-25518,0,1,559bd545fd62c99414c1479af19d528bfddb1614517bc298a4f4030388b57569,2025-04-17T17:20:04.510000 +CVE-2024-25519,0,1,c10a62cf85710981bc77aefb68f870b17eff76f05c631911d919150bab4091b6,2025-04-17T17:20:01.370000 CVE-2024-2552,0,0,78ad620b98c95781984d6a9c4ad7080d3e2e1471a71fd0feb7fa09d788069808,2025-01-24T16:04:14.430000 -CVE-2024-25520,0,0,a042afc7146d2009d90a801983c0709f5132afaabcb5d2ca82f1fb2a77ed3c12,2024-11-21T09:00:55.510000 -CVE-2024-25521,0,0,083c1f1eb4798ffdb4595c966aa895d7396995d2d4ba0cc9823f1dd5e3910e90,2024-11-21T09:00:55.743000 -CVE-2024-25522,0,0,7e799b51e7c62296447ba9d773094e12c4d4d2ce84aff929f4a3c4d9a1ead2cf,2024-11-21T09:00:55.970000 -CVE-2024-25523,0,0,b9ba8bddbbf4453c4921fe0896baad048cb4537bf75d963b5980264972a7a5a7,2024-11-21T09:00:56.200000 -CVE-2024-25524,0,0,6307bd0e4807423d4cfa2b04a66e2429d53d2f6673af764ff76d7d6672b7c1ec,2024-11-21T09:00:56.413000 -CVE-2024-25525,0,0,5ab6d5f614d7f5fb51f5952bd4fa93b772b245d1d8b90520455100101f3b066c,2024-11-21T09:00:56.637000 -CVE-2024-25526,0,0,65dd892c17e24b21c743b2957fe12a5da977f57606051a8d155e608c03a52fdc,2024-11-21T09:00:56.860000 -CVE-2024-25527,0,0,e7c4a87524ad8622d10b4018d9d79a3709f15ff410a198c9fa05312a45dd19ba,2025-03-13T19:15:43.220000 -CVE-2024-25528,0,0,dd2239ad068e7da7d722a64493efa5e226739bdacd085ed884b938c870e36392,2024-11-21T09:00:57.247000 -CVE-2024-25529,0,0,8f10be39f9da45d79933953178d2cdb7ce2e7a6a31718f75640d627862035de2,2024-11-21T09:00:57.463000 +CVE-2024-25520,0,1,3abbaa6fc2d3bf374ab5c116489b7ea84fbf74a5a12ae0549641b35735d477e3,2025-04-17T17:19:58.233000 +CVE-2024-25521,0,1,3a1f082b7b7d81348ecad92d6cbdce79a6fe818b5412b1ebe18f1889e3e92fef,2025-04-17T17:19:53.447000 +CVE-2024-25522,0,1,889d1a151324fe18d966c9245e6a4e05ea49e10a78fd3f25bc31a41610600d0a,2025-04-17T17:19:48.983000 +CVE-2024-25523,0,1,caabdc4ae578420e65dda8297c53ca0fa3f8a0baf530b897f6e94ef1e59aca21,2025-04-17T17:19:45.957000 +CVE-2024-25524,0,1,3de6e357ec3c4b390ef169e00542829dbf649782d63f9e5db5a0cc774b131bae,2025-04-17T17:19:41.527000 +CVE-2024-25525,0,1,44116eaadcdb8146bec09ad2c94f7342f80fd6d40cd02fc1ae7866f71fbcc29f,2025-04-17T17:19:08.510000 +CVE-2024-25526,0,1,c7974a255c01ef070b2fd012ef5632b177a917adf4736fc102c7773f4c7a79d4,2025-04-17T17:19:03.610000 +CVE-2024-25527,0,1,b18d4038c56983d0bd624fcb3df3cbcaadf13afc008f02254928e50b3a3c52bf,2025-04-17T17:18:59.457000 +CVE-2024-25528,0,1,0237d2a35b3abf173cbe9d3adc39ba4e1cb418b38c93d55b9b75120bca093125,2025-04-17T17:18:09.550000 +CVE-2024-25529,0,1,9b6f157f270787472fc457c7562a8f0b6ea519502e598d8e1cbad4f3c1672848,2025-04-17T17:18:30.693000 CVE-2024-2553,0,0,06ab3e62aed39039b1ff9e148fb242b9e0d6710cf32ada9b741daa500b4e0ef8,2025-02-18T16:24:04.587000 -CVE-2024-25530,0,0,bad1dceeff66963138afb5c427403d06fa9f9506913610f53b9d36432779c8c6,2024-11-21T09:00:57.667000 -CVE-2024-25531,0,0,7566a3a5b4b76b898f0d21a259cb6c08a99d40a16aabd4e9e1b49acc0e799b6d,2024-11-21T09:00:57.887000 -CVE-2024-25532,0,0,879b9ad4d2b1e39a1e1dd7a52ebaa5a9a18e705e9acd54875e736198e26fb1a7,2024-11-21T09:00:58.100000 -CVE-2024-25533,0,0,a5571190d8ae1edce6fb036db178d91c19debdb8ca0e08d6186d18e2ecd0ad98,2024-11-21T09:00:58.313000 +CVE-2024-25530,0,1,ae8774cf60386581d7a433cb17a234bd865618753f45fcfb9d221ab9c134f1ed,2025-04-17T17:18:25.180000 +CVE-2024-25531,0,1,3ddbd802eb083bffcbec9f9b205c1d617f842f0e58686831b528e870d0968195,2025-04-17T17:18:14.947000 +CVE-2024-25532,0,1,b9b1c258ee5a4d3215d1a4482b545facb558b860de150776d9ea7d039c6a7d2a,2025-04-17T17:18:02.440000 +CVE-2024-25533,0,1,d51610b27eb8d0cdbef25d8e97ef522fa00abebd508dbc7f34f9730034817790,2025-04-17T17:17:52.013000 CVE-2024-2554,0,0,545b9265ad35645c6a011473b636b553d62a1801ec2a7b52393efa6ea1313d22,2025-03-06T17:23:53.683000 CVE-2024-25545,0,0,f63725e164070cc7f9aa69b32e1a33bf2cfbc32fe50065463242eb8374c7b6e3,2024-11-21T09:00:58.537000 CVE-2024-2555,0,0,a65b97d56e0416e97c53b2705b7e25608fe585480164b53adbc8869bb0a8eeed,2025-02-18T16:52:50.603000 @@ -264765,6 +264766,7 @@ CVE-2024-40116,0,0,19134811427fbe9dee5753b9d0c099a969fd07ce07ff2e8eb545bbcd0f670 CVE-2024-40117,0,0,2a65d8ca9f0e21ab04eb67f5b55ddbb907f00fc8747a1174398adffad7e2c4b6,2024-11-21T09:30:57.700000 CVE-2024-40119,0,0,350b537a9703bb479d3aeed53ee034530a7a303e34e5836f5efa11a1efa4ddeb,2024-11-21T09:30:57.907000 CVE-2024-4012,0,0,072e2e877b4c908d6a63775f432a4c14231de854a8f0ac87700711aa9cb1d6cc,2025-02-11T02:15:34.820000 +CVE-2024-40124,1,1,62d331fd8bbaec5e81918f10be9ec527076de75e5b7372d8d1107599aaf79736,2025-04-17T17:15:31.853000 CVE-2024-40125,0,0,57e8115a80c9b9f12fd5deace805e359b1c0496310a714f1357da458e7b0ab1c,2024-09-25T14:46:52.523000 CVE-2024-40129,0,0,7c740ef58e2f8edbf4cfbf5628c1b2c6225d3dfa101d000fcff834181790eea7,2024-11-21T09:30:58.343000 CVE-2024-4013,0,0,8556aeeea1e36569486b525769c885cb61d42521e2f43cf44889bf303d52aa93,2024-11-21T09:42:01.980000 @@ -265357,7 +265359,7 @@ CVE-2024-41045,0,0,f0c9dda71d81a7a92356054cf80f3d8e5ef4d3bfffa0d8cea4fbdece4da80 CVE-2024-41046,0,0,fe8aa73d597f0ff625f0320ffc962902a6f54203db2c8e8f437cb2b0471cb19f,2024-11-21T09:32:07.970000 CVE-2024-41047,0,0,62b4391126cc73b37148d1c0a42fb848c049539ca7960b26b6db5d7e8100e65c,2024-11-21T09:32:08.113000 CVE-2024-41048,0,0,b52e0942d9a8c9b2e92f7a35f9f072e34051da005fcf162543f493ba820f9cc3,2025-02-03T15:44:16.613000 -CVE-2024-41049,0,0,02c9cfeae7c33e0a5697a2e82ae84f2c3a6ffe00fb073aaf111ab53514c7b44f,2024-11-21T09:32:08.363000 +CVE-2024-41049,0,1,b1f9484250e55d3f3a136cacd62de2f5929e06159553d395954556da8ece885f,2025-04-17T17:33:03.630000 CVE-2024-4105,0,0,521868927e3bacd7befbdd7e5675a9b60e42a9c6e2af3e835a832e6083530e42,2024-11-21T09:42:12.100000 CVE-2024-41050,0,0,188a1400f3d2245f0d611173626edfbaf1cabf9b1c597cd9de1dabc38248c47e,2024-11-21T09:32:08.500000 CVE-2024-41051,0,0,ff17b110267dff5248f404f274c0ec53543d405028ca6f2fb6a7da33df953b54,2024-11-21T09:32:08.613000 @@ -266120,7 +266122,7 @@ CVE-2024-42090,0,0,1ed36ef6ca031090e7d53c07bfa7aa0cc25e23809ef28216357adcb81fc3f CVE-2024-42091,0,0,780abd2a6513a50b905097212f47654d7d2b3bd4140482c21de2667066c32da9,2024-11-21T09:33:34.770000 CVE-2024-42092,0,0,f752fbbb8177a98e0948bd3883c7bf3867457b830fe31a1e5dff4fc54e50c44e,2024-11-21T09:33:34.900000 CVE-2024-42093,0,0,60560efd85399613d402251168537c9ff9ab79dbc6de6b65fe9b1251fa92fb13,2024-11-21T09:33:35.027000 -CVE-2024-42094,0,0,040235f98f28913922be1a39185ff5e9d6c75725a798f192da2eb8202c6084dc,2024-11-21T09:33:35.180000 +CVE-2024-42094,0,1,12f2f74ea265f17f27c96cf534ac5f3b5665d8f8c30c0ec545f0091a3717f53f,2025-04-17T16:56:56.417000 CVE-2024-42095,0,0,d187eafc1814da2d7a4ffcd45e3b5a53a66294aa84897c8466d702d83501d5ca,2024-11-21T09:33:35.347000 CVE-2024-42096,0,0,0ad26ba3c54a07792099d3e95d54ebedba57486712c7e4b3e1a3c1e4289c7425,2024-11-21T09:33:35.473000 CVE-2024-42097,0,0,3f391653096e066f29f0cef8fc582fbf9b1a72ca4f7566f82f31cd238ce5e961,2024-11-21T09:33:35.620000 @@ -266135,7 +266137,7 @@ CVE-2024-42104,0,0,37643f8ca9c0f5ea248c66fc49683931b4d627367cd8eddcfc0ca016c3bf1 CVE-2024-42105,0,0,03e955b522490db0edaa227d4d15e3601e0044286b6517c93bbbdcc4c8e9fb6b,2024-11-21T09:33:36.693000 CVE-2024-42106,0,0,9d05f6cdbdce4e2e2ac4c390d35c10ca87515ce905bcd0b9174e080b274f8c83,2025-02-03T15:23:42.150000 CVE-2024-42107,0,0,7dfe60daa7c3bd6e1edb30da6d94fb531f783127afbef2ae222dadb30efd2cf7,2025-01-08T21:32:03.527000 -CVE-2024-42108,0,0,d5a469d5957316edbae938180a1d5e1c7bf006df0a49a7319d022d93a92d5108,2024-12-19T19:15:07.023000 +CVE-2024-42108,0,1,f2bd8aa42a482fc9bb3b1907f190f373d44780e342b3685b2fa50d33ea1f5c46,2025-04-17T16:56:53.877000 CVE-2024-42109,0,0,b37ad7c335453468153db5a09c0eff792186c290c2f1d13a1164b459f17bf15c,2024-11-21T09:33:37.223000 CVE-2024-4211,0,0,a5dde39aa5bcef0f7815c14cd1655a3a7413afa7e3f7b9ae6954c0ecc8e1196b,2024-10-21T16:15:09.963000 CVE-2024-42110,0,0,7485e71868500742c483f6745fb6d9b52dad705e77036fca0bc8a472f4199dc0,2024-11-21T09:33:37.363000 @@ -274523,7 +274525,7 @@ CVE-2024-53295,0,0,b8e985a8e27bd0c49159e8a0c89472687e5b7e5449b7c5ba70064bf994d36 CVE-2024-53296,0,0,be682d3eb2a02cb859d07bb38fd2cdf79c5c9c446624f27b1fefa1f7d7732c2c,2025-02-07T19:54:50.490000 CVE-2024-53299,0,0,2311d06f0f8179bedcf518ce1bde420954fcc87b5db6c467bb518cf92e75888f,2025-02-04T19:15:31.877000 CVE-2024-5330,0,0,d644a32144d291678dd5bb7f21b934bb851a049e1a1dcad7ed14bbc2171615fb,2024-11-21T22:46:26.800000 -CVE-2024-53303,0,1,0fbd7f62aaf2a2f6e459bf1fb2d12ce050bee3b48e17678ffc53cd83ce02d74e,2025-04-17T15:15:53.857000 +CVE-2024-53303,0,0,0fbd7f62aaf2a2f6e459bf1fb2d12ce050bee3b48e17678ffc53cd83ce02d74e,2025-04-17T15:15:53.857000 CVE-2024-53304,0,0,2318bd92e15e2309c0bc84c12f501093b2199420a9844e4905b82191a8dd877a,2025-04-16T21:15:45.497000 CVE-2024-53305,0,0,b764fd9aa197b516e0394c3a3a3a9ee4af1cfff7c69a2a0fea095f72e6f16c4c,2025-04-16T21:15:45.643000 CVE-2024-53307,0,0,137df246312787bed916a2ce1770dc53fefd470e50062bf21518e03aff4776e9,2025-03-10T18:15:29.373000 @@ -275704,6 +275706,7 @@ CVE-2024-55228,0,0,eecb7530d030d8ee385f7f9d91b0f88ebc1f92238de3682fd2d3a79e15c48 CVE-2024-5523,0,0,0b2c43ef384781b0113b9be6f2b000f9de2199a81d337c7e51164ef3b409e6ae,2024-11-21T09:47:51.940000 CVE-2024-55231,0,0,0f2879a830bf65ca740c9104d0f5b7cf06ebbf48cb12754d4e2775c0b62dda8b,2025-03-27T16:30:14.617000 CVE-2024-55232,0,0,0ca7947c8f20ab530f6ef9f382dd1a93ea84b85960cc7132226746574ebf3ddb,2025-03-28T16:21:59.560000 +CVE-2024-55238,1,1,a9301c58b38c9ed16622f1955cabb00937ec948d2575af19a20e479e7e3110ee,2025-04-17T16:15:27.780000 CVE-2024-55239,0,0,cbfed4e5dffe1c92f805fb83f4f8a51e197e12f93a7416bc9c5ac9864cc8d243,2024-12-25T03:15:19.813000 CVE-2024-5524,0,0,96c1a4bf81cf964718431dd9c92394b3c99d70800d36b6797c2485b5f853cce6,2024-11-21T09:47:52.060000 CVE-2024-55241,0,0,187ea8b2ce4e3d344bad396027a912baec6f3e2b9e5b42839c08917307b0c3f3,2025-02-11T15:15:18.593000 @@ -275727,8 +275730,8 @@ CVE-2024-55355,0,0,2bb36a027cfc17a18c27f2dfa7ccd1dd7e44d92fe7cc55df027cf0c874369 CVE-2024-55356,0,0,24a1f90c25942035af99f5d3d7ecc4294dd5cf67c67caa2d1d5b1544ce44efca,2025-01-08T01:15:07.370000 CVE-2024-5536,0,0,1f54d5f4d84e17ea150621a726d470a096ebe102b1b2c9727888baf5a5215c0e,2024-11-21T09:47:53.307000 CVE-2024-5537,0,0,dc964262ed4087ff313c4be3be100753a858d893c6319a531383572e591004b1,2024-05-30T17:15:34.583000 -CVE-2024-55371,0,1,e6ac9da342d47816cc091c0bdc82620c6d2e6f0feeb76bc4a46bf2b3ddfb87e8,2025-04-17T14:15:25.700000 -CVE-2024-55372,0,1,1458a273c0787859cc1a77057fd9ddf1e738f5085784091fd37f374d2b248f4f,2025-04-17T14:15:26.120000 +CVE-2024-55371,0,0,e6ac9da342d47816cc091c0bdc82620c6d2e6f0feeb76bc4a46bf2b3ddfb87e8,2025-04-17T14:15:25.700000 +CVE-2024-55372,0,0,1458a273c0787859cc1a77057fd9ddf1e738f5085784091fd37f374d2b248f4f,2025-04-17T14:15:26.120000 CVE-2024-5538,0,0,349018b8a831720930f224f86428ace57b32dfb3177832784fb8b5e53a9e5993,2024-05-31T11:15:09.923000 CVE-2024-55407,0,0,556b85e1087b7070a9c561b1629c1e863de59c432206201377d38b83402acd89,2025-01-07T16:15:36.480000 CVE-2024-55408,0,0,8039c7c557373745154d588f7a6e9302bbcff3813cc276ec09ae1bbee5edf7a3,2025-02-11T01:15:09.410000 @@ -276383,6 +276386,7 @@ CVE-2024-56514,0,0,03c513636a790023028c6faa50589cc350b03d2dba1eb97ec6199430a6c46 CVE-2024-56515,0,0,4a07e3e4d2a1308e0588ce8b7f05a8f9d332299ec2e52c6ef14eab15d40c8073,2025-01-16T20:15:33.197000 CVE-2024-56516,0,0,deb0078fb48b30046dee2e7c49991c12c9c4ce85a49510afdbad84b1e34b7c18,2024-12-30T17:15:09.687000 CVE-2024-56517,0,0,ebc4a8439ab89dec6c01da536e2da46e01c5afa35edd8eda7900d77b4b428d40,2024-12-30T17:15:09.840000 +CVE-2024-56518,1,1,dc99e5050b65e86ae82734982dd8e15d2abb07225becb436f85b85e7c8997927,2025-04-17T16:15:27.900000 CVE-2024-56519,0,0,3c5a6d8f19f54d6c861bfc224498ef149ba17c594e43f18b02fc8f106d9f1bb2,2025-01-02T20:16:07.080000 CVE-2024-5652,0,0,da5e0aba357bd8fa7b5b0e931bc848bd0b9a30a1c28d30b4f779d7d557418851,2025-03-19T16:15:28.967000 CVE-2024-56520,0,0,ff4fb3d2adb6c71c503d044fa0b3b3389f24638650ec092efa0e72e1ef66ddd5,2025-01-02T20:16:07.280000 @@ -277035,39 +277039,39 @@ CVE-2024-57631,0,0,dbbf18570e6bcb93aac8e1976e69b7c33798803aa53d729e1f8450a66dd43 CVE-2024-57632,0,0,4cee3f60bf477a236476dccef877a075a1788e431ff8cb8ef4cc48b4d93fadc3,2025-04-10T18:13:15.497000 CVE-2024-57633,0,0,9e52557f96479a74a3c5e132140e4823f872206c7f63da05d02dbe84b4984e1b,2025-04-10T18:13:09.283000 CVE-2024-57634,0,0,10e757d7be94ed8d30c630810b397267fb6767493336b564a0dc559b26d99dbd,2025-04-10T18:13:02.053000 -CVE-2024-57635,0,0,f351bd908929b784a223a91a5f6aa6b9b1c4fe415f7ae2bcd1ab08fd42c516aa,2025-01-14T16:15:33.743000 -CVE-2024-57636,0,0,d0e565c0dff72c6ea0982391b44fdf984e106fd5d6b59b0760addd9cfe969217,2025-01-14T16:15:33.907000 -CVE-2024-57637,0,0,9fa5d278af6a43348f247912d387e7524744efc37b49adea3d619cf820c579e9,2025-01-14T16:15:34.070000 -CVE-2024-57638,0,0,9dd4e57860ccfdc983aca2e95a17223bfff96883ce295e272db263c7f46ad3b0,2025-01-15T16:15:30.220000 -CVE-2024-57639,0,0,81c18119d0796036207b52600fc301d317795cf7d5d03a2144ee581f0cbebd4f,2025-01-15T16:15:30.393000 +CVE-2024-57635,0,1,c0bcacb6dac1b85715f40b449ee81b0fa694f76d6b426c47a056b72f202b8235,2025-04-17T16:47:59.290000 +CVE-2024-57636,0,1,51225fd88353b0c053632c29c9122b23e6238ac2b730aaf2ab4165cb44766ed2,2025-04-17T16:47:56.287000 +CVE-2024-57637,0,1,f59f4b86661236ec0859eb770e946bc587b3fa073b354865718739e8972ca18f,2025-04-17T16:47:53.007000 +CVE-2024-57638,0,1,5e741c14db03f22c6f8397b4f1d6a49dcdfd125a213323d534ed9cb0e5afc2f2,2025-04-17T16:47:50.117000 +CVE-2024-57639,0,1,a8a6bc5a8bacd980a595b686b27f0de0ba8279cadb7044fdb02faa12bc82c964,2025-04-17T16:47:46.833000 CVE-2024-5764,0,0,30b78b7841798018ef3b188c416c2f69034effe1020f507fccf579257f76a1b8,2024-11-06T16:41:00.277000 -CVE-2024-57640,0,0,823f369a4e2512904de0df496d9844ebefb1caff102a1b29f5249371b8eb5e9b,2025-01-15T16:15:30.570000 -CVE-2024-57641,0,0,6e122f8000b5036a35ba9684cd03b685662827038107eaaf29a6c154497ed980,2025-01-15T16:15:30.750000 -CVE-2024-57642,0,0,071107a624b8ce997fd26421425efc402383b312771c18eeb873b78aa96ffdfa,2025-01-17T18:15:30.030000 -CVE-2024-57643,0,0,ba698b452eaa8706043a8e92fd8ea179cc020ce88d0d466280f0183a4e4e911c,2025-01-16T16:15:34.030000 -CVE-2024-57644,0,0,914574fe0b7a114777c2567fd96e73785d33e0046c4e449438fad7358a5594a5,2025-01-15T16:15:30.943000 -CVE-2024-57645,0,0,e6113a0ab42f5baeb6ef1e12e65104eacf5948c5f09dd54b54f3011c787894d1,2025-01-15T16:15:31.120000 -CVE-2024-57646,0,0,c296ef72c3c2135d014b6d1d2cac1bac339d2bfb5cc198d7a150d1c1c33b4f3b,2025-01-15T16:15:31.293000 -CVE-2024-57647,0,0,46d2a5b3678f30532f65aefad67cdcc586d8452d022b80bf4f79e439a3ca30c5,2025-01-15T16:15:31.473000 -CVE-2024-57648,0,0,372dc9c1be30a132046cba3bb52688881dbf93308cacaba5a1680e24723e8273,2025-01-15T16:15:31.640000 -CVE-2024-57649,0,0,b2778526d8ef35f6f127fef17ee66364dcf65d343b6240c03de19776ec8602a9,2025-01-15T16:15:31.813000 +CVE-2024-57640,0,1,0625ba75dd3a6b6ff9e24a2aa8a6e25e578fb48acb93f648c3ca83fe92ab4858,2025-04-17T16:47:43.887000 +CVE-2024-57641,0,1,deb40e05767bab827cef9ac379a3ea29ca51cf9d126052a59a4d8ba3a7220827,2025-04-17T16:47:41.460000 +CVE-2024-57642,0,1,525d7ca529117fa0c3f5a9271f982fdfb88d0a9652f033511f5aaaeee94e9f5c,2025-04-17T16:47:38.257000 +CVE-2024-57643,0,1,da79971ee3fb78150025318c5ff401b5b6c3b23b230811327273bc64decf3cbf,2025-04-17T16:47:34.500000 +CVE-2024-57644,0,1,e027faaf8205e3442f18947f2c8b142749d1e795ca17eca02bc26e4f9ce5f78c,2025-04-17T16:47:28.370000 +CVE-2024-57645,0,1,9fbd7ef644753b4957e405feba53298ceebb71c57e4e3da74a7eea145bb31a49,2025-04-17T16:47:25.190000 +CVE-2024-57646,0,1,a888cdd5365c2b8dea460aeb56378a7623ae682bc07a8d0f9dec38273c3622bb,2025-04-17T16:47:22.387000 +CVE-2024-57647,0,1,d3984558393252e3df3fb667ed5c80aa1b991a2d6bc9d98908f75cf9cd4397fa,2025-04-17T16:47:19.220000 +CVE-2024-57648,0,1,b7c7dc7ebc32322874d38b1745b034b539148709438f93be252e21212efcaa79,2025-04-17T16:47:16.813000 +CVE-2024-57649,0,1,a90ba56c8166c25edf0ef2f87243dc95641782e6dd10bd8cd0ce7bb7dd78c660,2025-04-17T16:47:14.280000 CVE-2024-5765,0,0,e5003ba3f530e37b105db973fc0ab01852d52d4c3a3d40c99dc1f996aa54e21e,2024-11-21T09:48:18.090000 -CVE-2024-57650,0,0,299e46e3abc171811e439efcdb7f787c46c9d18dbb03cc5ec582088c052dcba5,2025-01-15T16:15:31.993000 -CVE-2024-57651,0,0,5e8dc54af74efb76238cdd0ddf66365828c5c6ae77832d24a8a6fc6b71203e63,2025-01-15T15:15:12.963000 -CVE-2024-57652,0,0,d73e7be12017c8f1cd68a94beba6a947fa401580f763e064115069718c3a2579,2025-01-15T15:15:13.130000 -CVE-2024-57653,0,0,b95a5dc8ec046dc0170044ca7547b49c4d3f764747f03d44bbe619b0b5c261b4,2025-03-24T16:15:20.860000 -CVE-2024-57654,0,0,7f766ad02bc18df38721852911dbcc4b021e73b25a35d8fd990c3fd3aec04d8e,2025-01-14T17:15:20.233000 -CVE-2024-57655,0,0,1be0c1177e28b1a1bb7b680ab7109b0c840777062bda07d33388651769ea2a54,2025-03-18T19:15:47.213000 -CVE-2024-57656,0,0,7b7715aae3ceb9667d61aefc67555704c00401b1a12be6d6fc65e5dc49bd312b,2025-03-22T15:15:37.953000 -CVE-2024-57657,0,0,b09c438a14c3db4fe411704529d496d2bb6233f86346a91943c98c21994b6176,2025-03-19T15:15:53.050000 -CVE-2024-57658,0,0,c90174962e4e0fef4cad5cbb6bc2c2de57dd4ce548d00cd72a393eb31cd1978e,2025-03-24T16:15:21.047000 -CVE-2024-57659,0,0,f32b1ab826823776ca0c8a17c8694a17edb2ecd676fd6e2f2814340b2ca52fc0,2025-01-15T15:15:13.450000 +CVE-2024-57650,0,1,d5ed05d0d2ef6d6244f24ea302a427ad0877aa33635ccb941889bd4ce3686559,2025-04-17T16:47:11.903000 +CVE-2024-57651,0,1,62b1065be744d99f48fea1a3e7658cb0a92f791d0c8c9d29d94c4ab0ff0cc35a,2025-04-17T16:47:08.997000 +CVE-2024-57652,0,1,8f20d5782dd9506a7196df3ec7850b57fabff337caf79c5adae6fcd0cd231a9e,2025-04-17T16:47:05.030000 +CVE-2024-57653,0,1,7582a476b4eb94d8015610e6a6283a4f7ce03addaef0eb5a02a080a5f709c72f,2025-04-17T16:47:02.293000 +CVE-2024-57654,0,1,790af144ee0005af7f28718102808f837b1b23cbf4a742e4d821f4be450608c6,2025-04-17T16:46:58.967000 +CVE-2024-57655,0,1,ca0553d5d177bba7dce85cfbfd364b54e35f11a1d01fa6557a4ab8ed1a414ce8,2025-04-17T16:46:19.117000 +CVE-2024-57656,0,1,e8170eb8a8edb67e50813027e198a18cc1337834562c75334c18ca2d2829bb7c,2025-04-17T16:46:15.067000 +CVE-2024-57657,0,1,2b065d5b78e211764db83e1139c1067ee715728be2e2a444d50ca283140b86c9,2025-04-17T16:46:10.137000 +CVE-2024-57658,0,1,bb64bb20cad49991aa103073faa15fda0ec9c87bc89a3dcd93d3c39a26f8d537,2025-04-17T16:46:04.427000 +CVE-2024-57659,0,1,59a9bb2df25aa5fd7d3da32620edf6ac4787de0ac0eaa6685a37a59c541cf2b2,2025-04-17T16:45:57.270000 CVE-2024-5766,0,0,67725e17649b0f8972fafe3ef5c9865eb73f6e4c38e03fd4908cab0e675ef8cc,2024-11-21T09:48:18.263000 -CVE-2024-57660,0,1,327bbf13fd9ea6bfd46a43a4bbe62d5bfec9ae054dd94d3ff08341d4f48d3cbd,2025-04-17T15:32:30.093000 -CVE-2024-57661,0,1,64b46af65e5abdff7cd35d43d9ea01e1f1e57164ba291504116f709df3a1cf44,2025-04-17T15:30:26.570000 -CVE-2024-57662,0,1,5899742ad676d51edd478b47915a506fd0fad6bb8bfe9e22b1610e387c06df4d,2025-04-17T15:27:48.260000 -CVE-2024-57663,0,1,1949f288cb3c1ca27585ceff1050debe8126c90d1fbf209f580f354db351e6a1,2025-04-17T15:27:22.853000 -CVE-2024-57664,0,1,47f27b31ca7df85399d291d94c44b37671b1722f10c5f85f80db4fee2ee270d1,2025-04-17T15:22:00.407000 +CVE-2024-57660,0,0,327bbf13fd9ea6bfd46a43a4bbe62d5bfec9ae054dd94d3ff08341d4f48d3cbd,2025-04-17T15:32:30.093000 +CVE-2024-57661,0,0,64b46af65e5abdff7cd35d43d9ea01e1f1e57164ba291504116f709df3a1cf44,2025-04-17T15:30:26.570000 +CVE-2024-57662,0,0,5899742ad676d51edd478b47915a506fd0fad6bb8bfe9e22b1610e387c06df4d,2025-04-17T15:27:48.260000 +CVE-2024-57663,0,0,1949f288cb3c1ca27585ceff1050debe8126c90d1fbf209f580f354db351e6a1,2025-04-17T15:27:22.853000 +CVE-2024-57664,0,0,47f27b31ca7df85399d291d94c44b37671b1722f10c5f85f80db4fee2ee270d1,2025-04-17T15:22:00.407000 CVE-2024-57665,0,0,809d5e38d9875ce8f564eef43bf055ef7a18d727db5a6a5c84b4ec0d4427f2c8,2025-02-03T20:15:34.787000 CVE-2024-57668,0,0,6f321cda73040cf73bf295b23929186d4ed960cfa7a79684cd741fcaef7d989d,2025-03-13T20:15:24.613000 CVE-2024-57669,0,0,87899ccbd34646b3b6caeac8f72ed276a8eeea44e46d38da3287be37e70981c5,2025-03-18T16:15:25.960000 @@ -282173,7 +282177,7 @@ CVE-2025-1282,0,0,09bbe8fbf6ad958ee527dda55af05e43520fd8fabad49e275c5ad8ac54adbc CVE-2025-1283,0,0,a4d93a77d81ec07731b68bab3e1d00afd05dc0ae7fee050881be213abacce036,2025-04-10T18:55:23.537000 CVE-2025-1285,0,0,3182990c1bc942ab8f686c8030ea96842badd7c599b496272a03f16c99f15c97,2025-03-14T05:15:41.977000 CVE-2025-1287,0,0,c1d2e5c86643fd051f72a870384be2d364cc20de377757abb01837028348772f,2025-03-24T18:19:22.993000 -CVE-2025-1290,0,1,ff08cd18d325dd2ab14ee5f70b93a0d9ea1f9b0562ae87ae04bae546e26815be,2025-04-17T14:15:26.893000 +CVE-2025-1290,0,0,ff08cd18d325dd2ab14ee5f70b93a0d9ea1f9b0562ae87ae04bae546e26815be,2025-04-17T14:15:26.893000 CVE-2025-1291,0,0,8a62a97f45d265e09336f40212a9e842d191a55f47481ae3892da3a9dec0674e,2025-03-01T09:15:09.710000 CVE-2025-1292,0,0,b9f7d536241f3baa1c04be5bc5ac1488aaf6190b9ad93d706ec8157e4e9b52da,2025-04-16T13:25:59.640000 CVE-2025-1293,0,0,60a11b51b89461cf0f7c120de5ab3c93294ee5f6a5e19d6ba8d0bb06e8828d44,2025-02-20T01:15:09.950000 @@ -282357,8 +282361,8 @@ CVE-2025-1559,0,0,709a243835f3c6ce0779a28711cc25be41f0a8c4f301b124730fe9903567f9 CVE-2025-1560,0,0,5806fdd5d9f8e8a09704d33fd8caadc121e4fbb048f372fad8d43065a1e4a103,2025-03-06T16:15:42.753000 CVE-2025-1561,0,0,c0dd475a880b302ad58d5da65215c03a4b2329b9f43fd50459164bc801594e00,2025-03-13T05:15:27.890000 CVE-2025-1564,0,0,9d62e5431da133f133499b29bcb96aa13e41c1b673396891299a0b15aab9c828,2025-03-01T08:15:34.007000 -CVE-2025-1566,0,0,131deec3f77b04f991ebb90ff9acb0b1a12b81048eced026f09c31fc85d18cc5,2025-04-16T23:15:44.767000 -CVE-2025-1568,0,1,f4933be4b1666208ee8e7fb0ef1741767fdc84934d43f1fb52c6892b52832277,2025-04-17T14:15:27.047000 +CVE-2025-1566,0,1,9abdc80b7a837c5fd57da8033434031198419e84b6c2874f7a3b1fbf7a288350,2025-04-17T16:15:28.040000 +CVE-2025-1568,0,1,ba1baee18a1d734c155dbe451c4eca99f4ccc7527cac48243d401e697df46079,2025-04-17T16:15:28.170000 CVE-2025-1570,0,0,e2c8a697fd328cfac1cb14bcdda0501641702037da6bc6d3e9d43d7d6e474d73,2025-03-06T15:35:59.507000 CVE-2025-1571,0,0,4a5ce435e807c5b239e456baa952536949a7ac8152f73e9932b99f88f9a0505f,2025-03-07T17:29:48.903000 CVE-2025-1572,0,0,d28a5728a56447e48ca8ae17f33703e0f0c8651ed23960a40cc6c85b9a58b7d9,2025-03-06T17:52:25.813000 @@ -282464,7 +282468,7 @@ CVE-2025-1695,0,0,ebd84bb280e3b0fb2974535e719ca217464c50c1c49a0c471a25d6dd4b8516 CVE-2025-1696,0,0,a4ebe2093d6db003a81772653e3b8096038d292b86e17d8021513423bef33f12,2025-03-06T12:15:36.293000 CVE-2025-1702,0,0,8350c512bb427a18e75fe369e7c514680d305e4b55cc00b262ae74877fe4e9d9,2025-03-05T12:15:35.420000 CVE-2025-1703,0,0,50c927778c00387d209f1db495acb3fcdf772388903cfdf917baab839124a719,2025-03-27T16:45:27.850000 -CVE-2025-1704,0,1,228c1325785fb2abb002ea475afad8a4ee932d3aa0b516254195be684d4922ee,2025-04-17T14:15:27.207000 +CVE-2025-1704,0,1,fbcdcb88461d71ebcfb7265db7e09bfd1eaaf37bca522059bd649e0ae886f22e,2025-04-17T16:15:28.297000 CVE-2025-1705,0,0,269e355c7cfca537a526c588669165c0e79ec506469175122c59352a58fa4621,2025-03-28T18:11:40.180000 CVE-2025-1707,0,0,eb806af042366277371dce5ba4e4d20eb3821597874c2eb4040b48171f171ef9,2025-03-11T22:15:12.583000 CVE-2025-1714,0,0,6e67e5fe1ad7d1f8ea60e413f9fa7e7e2f63bd8d4c4369040436660c144fa80c,2025-03-07T05:15:16.233000 @@ -282871,7 +282875,7 @@ CVE-2025-20664,0,0,4219106895903f3d40c45e3fe22a99bb379c7467ce7ddab134c6f372463f3 CVE-2025-2067,0,0,e336b7e791e3fd3cb322ecbc1c5f69ca2b6e5c18fb1ce058eaa6d863ecf3dcd2,2025-03-07T05:15:17.527000 CVE-2025-2071,0,0,f72741a6a8cd10ef9b626183eff7ab8b6e66837ba6759a6a57e284a984d113e1,2025-04-01T20:26:30.593000 CVE-2025-2072,0,0,8e644488e83c18f58cc5036e9fa9ebc749bbf6017963c3bc2cbe7baae1385ee2,2025-04-01T20:26:30.593000 -CVE-2025-2073,0,1,8852904bb7b5ebd12a0da18ebbc9689e80d883f53c39ef0799ee411538375879,2025-04-17T14:15:29.013000 +CVE-2025-2073,0,1,3f4f9b1001703dab6304020e2b98702aa4ca30db8c2355b646a541fefe749446,2025-04-17T16:15:38.750000 CVE-2025-2074,0,0,ca58bf592b5066d06227c815801f5f95341e4e9e4e43bd9476138e9763d951e8,2025-03-28T18:11:40.180000 CVE-2025-2075,0,0,ab55a51247ee2850d4e2152336537ca54db9312a277429beb604e88703e48472,2025-04-07T14:18:15.560000 CVE-2025-2076,0,0,97b36f1e6f07a313a2c81becc36dc64919123b61205ecb45483897067337e6f1,2025-04-07T20:51:08.497000 @@ -284129,6 +284133,7 @@ CVE-2025-22336,0,0,e498264d94897dc70f78e05983d91aacc96a48160550b893d84ce97145124 CVE-2025-22337,0,0,5d41c59b533e15a90ac0eb04123ef238c192c67fdf1a3a5a9bc7681f9252fc36,2025-01-13T14:15:10.440000 CVE-2025-22338,0,0,7129ea122c6554e3c515c55738d8d6c2390b8b27bae9ff6ebda6d0b32cd44085,2025-01-07T16:15:44.117000 CVE-2025-22339,0,0,e3b226b5bf5a3cbff8aebc6d88bcb4fc118cdad6ece13f47708a7ca8d8f13135,2025-01-07T11:15:17.463000 +CVE-2025-22340,1,1,a2adca8c0bb4a58f516415304cf8b78e5a8708f2271b5dc84642284b67430b66,2025-04-17T16:15:28.433000 CVE-2025-22341,0,0,25b7672aed0335ce3ecf8f528f810677c4ba2ddd1b8f90b731f0360e4733a3f6,2025-01-31T09:15:07.470000 CVE-2025-22342,0,0,541f867dbda194731b8a18481f8f88aab54d4c9b69e4847a11ff394e4e7ae36c,2025-01-07T11:15:17.610000 CVE-2025-22343,0,0,5a249d51bc1bb83b765cbc47fc56c527973dc8aee76835d7267eeba7cb4b3587,2025-01-07T11:15:17.743000 @@ -284284,6 +284289,7 @@ CVE-2025-22561,0,0,623f2eb2c761c9d3d25a004f777db613fa6e7b7a5c670c04365fe632627b5 CVE-2025-22562,0,0,5434b49fc7631b7fa2baab733e275c32c8bcafb45eb3bbd6810cf2008467fe71,2025-01-07T16:15:52.540000 CVE-2025-22563,0,0,08641cc3ce798be612ccd7e4c4a75bb78413c6f046999167e72153c276a54042,2025-01-07T16:15:52.940000 CVE-2025-22564,0,0,c6bcdc2f84aa39c7ba65ae760aaf069d1367d782297729876d0295b371334f83,2025-01-31T09:15:07.627000 +CVE-2025-22565,1,1,a28067db2694819f746bde6983578d8b8d21b880d8f25f8e43005cbb98d36692,2025-04-17T16:15:28.580000 CVE-2025-22566,0,0,1ee3261a54270cb3b8d151a749d1a0de637d9169a00783bcb470b242f42071e2,2025-03-28T18:11:40.180000 CVE-2025-22567,0,0,7640327e90d13935406fda5e46326035dce8768c7ac08f762a301197dc23d3c0,2025-01-13T14:15:11.460000 CVE-2025-22568,0,0,f3a337c9bc58a10967a71c972b3d36d20f02e69abf28f2da99dbae5c50742b4f,2025-01-13T14:15:11.610000 @@ -284357,6 +284363,7 @@ CVE-2025-22632,0,0,a00ccfb79a24fc13a5dc854108dab7b330a127a143f3348ecdc06f096bf01 CVE-2025-22633,0,0,02df1f9c4167b5004d9e46deb61bcc6f164b0d8af25621032bfff352c06f6449,2025-02-23T23:15:10.573000 CVE-2025-22634,0,0,b03277bebcdc7f5286619f4e6ff60ea64ce0d2eaabaacad77766dce67b417bc8,2025-03-27T16:45:12.210000 CVE-2025-22635,0,0,09e419c8f16726a5ee91c4fc6dc7331c581a4170004efdf2c30917789f693c93,2025-02-23T23:15:10.720000 +CVE-2025-22636,1,1,34655a03a4e13bedbc10e77cfc6cbdf290e73ef3647dfff2160eb61bbd089be3,2025-04-17T16:15:28.727000 CVE-2025-22637,0,0,6a9cff62b9581e23d01b6405fb8b76f6c4b4d3585406e82a25ce549de6d228e0,2025-03-27T16:45:12.210000 CVE-2025-22638,0,0,c8f27dd00b7ba55c8743424014743e114bb69ee621dd7d69f2c27b705bc53bbc,2025-03-27T16:45:12.210000 CVE-2025-22639,0,0,be7302f0496784c815dda454f246bcda7231f0fd624159bb2f829ea5a8a5cc86,2025-02-18T20:15:26.010000 @@ -284373,9 +284380,11 @@ CVE-2025-22648,0,0,55738e627b4f9c06dda2d2ebadc9d38e4826e76f1492f66a5be9f04deb54a CVE-2025-22649,0,0,4f6afdd07a29f280d9ca9b47c589e62a29bb960468d641471f5297ee4f2b67d6,2025-04-10T15:17:19.167000 CVE-2025-2265,0,0,c4fe07c25b6ee7493f2087c46370c497d720b57d923cc3d537d197899fc734c6,2025-03-13T17:15:38.967000 CVE-2025-22650,0,0,6fea642700a750486c5548c0e02b82ceeb34b715192d7f1e0337ba66322d17a1,2025-02-18T20:15:26.720000 +CVE-2025-22651,1,1,b9f5d877c6aa9cd47a24e31a1f2222d9522bd6fa00877ab1af709ade69b14960,2025-04-17T16:15:28.867000 CVE-2025-22652,0,0,eefe232f3e397501caa11bafe0521cc0388fdb49008519e36f19bc4ef50181a0,2025-03-27T16:45:12.210000 CVE-2025-22653,0,0,9c567e055653dafad6942fd8b868f59c075bd7f242efd581fde5462b3a64169a,2025-02-18T19:15:25.627000 CVE-2025-22654,0,0,619689232e1f1160eee83e01e9214201ad5c0f239f29990515b2bea94e59408e,2025-02-18T20:15:26.877000 +CVE-2025-22655,1,1,9ef3f84e1c89be9ec3bdad2e5ee9bbb1fe8ef77e8b5186ff202adb2e7678edd0,2025-04-17T16:15:29.010000 CVE-2025-22656,0,0,ad37e68103bde51d08c5db387780e1b721fcccf1a0761aa29f30889aabd90e9b,2025-02-18T20:15:27.037000 CVE-2025-22657,0,0,df4be7d8b190b0d420249b9a05b34c5cbc047e57208d54d7b91afd066e81706c,2025-02-18T20:15:27.190000 CVE-2025-22658,0,0,9dfb3a54bee9230fd14a9a19f7d7d5326e8f45c7bc64398130b3eac9128245b1,2025-03-27T16:45:12.210000 @@ -284413,6 +284422,7 @@ CVE-2025-22689,0,0,a6bb71e4967076b3f540b3610fafcb785c5a34d17d73ce5496d44ac029c93 CVE-2025-2269,0,0,48fe2926e51b3bf22496c8e98885116bddfc21f976ce1cbbf4a9875bc41705d0,2025-04-15T18:39:43.697000 CVE-2025-22690,0,0,15f7912d818373c9c9ee9191f4c491841a741afc5dc5b966749a324d18e0fcb6,2025-02-03T15:15:19.150000 CVE-2025-22691,0,0,d28916fc3dd8ee07125059b5bcbacce6b8b0e15a257991053ddc23a703d8c5ba,2025-02-03T15:15:19.307000 +CVE-2025-22692,1,1,c25760ef1c98a0edfe3edf22c570446cedc982de6caf071c0d62cd4fae83b3e5,2025-04-17T16:15:29.153000 CVE-2025-22693,0,0,863d4d7bd4e9e2375a097e245df44521e304d0a19a473bda52d238a92bc39ed5,2025-04-15T19:58:46.530000 CVE-2025-22694,0,0,96b1bc67077d6724bed157ad909e382f421512dbde661698a81e8882d1d6a676,2025-02-03T15:15:19.597000 CVE-2025-22695,0,0,0a8a71d8bc1a4d3051f4475b36e68c6610b345ec6ee024bc91b765df5cb592ec,2025-02-03T15:15:19.770000 @@ -284486,8 +284496,10 @@ CVE-2025-22768,0,0,d67e24e3bb095b6fc3cdd1ddf309e20d3ead32546acca77b1e796ad170199 CVE-2025-22769,0,0,4e6d679e63f8fe706c18670ecdd89233f779b3c6dadefbabc9659ff336c0b4a9,2025-01-15T16:15:39.860000 CVE-2025-2277,0,0,a8bc5cd0b16e309d43e095ac49658b66e2986d9cb52a0ffd2f162d5b8eec71aa,2025-03-28T16:22:58.023000 CVE-2025-22770,0,0,9a151362435bd9d8c4bbd128307ca9249a359d573f4c6c9322ea798c07df98b4,2025-03-27T16:45:12.210000 +CVE-2025-22771,1,1,4522f885f1592f9b3be4c2ed82aaf65eac1644f9f6bfb5f7f747700ded892875,2025-04-17T16:15:29.297000 CVE-2025-22772,0,0,a49a7641398a6c78abf7bdcb1538e84ecbf25664c0b69cb2fc2516de3178101d,2025-01-22T15:15:14.990000 CVE-2025-22773,0,0,fcf097b5a8bf8f017de7fe5f8a18a77369aacf0486c55459d6bb76d657f29d3d,2025-01-15T16:15:40.027000 +CVE-2025-22774,1,1,42bdd28d424327a92d1762168edbee646673eaefa58a435d46528f72e42b9610,2025-04-17T16:15:29.437000 CVE-2025-22775,0,0,7d2a06197d6a9d775e8fbcfc5379bbce7f2f443442e1d2178247e5bcb0b27213,2025-03-13T15:15:52.570000 CVE-2025-22776,0,0,3a44d2ed038c8fcf2a82ed573a85678c06e1f13008a49c36e4d4a59c650fa83c,2025-01-15T16:15:40.193000 CVE-2025-22777,0,0,6e361a5228daa020e40ee58c141da823e7968148e70048924a6df32b9ceb16ce,2025-01-13T18:15:22 @@ -284507,6 +284519,7 @@ CVE-2025-2279,0,0,28e158e283f84d6a51b53860f0700d64924445ab6d3ee7b9f87c27573ad26f CVE-2025-22793,0,0,1e0903441186396148f438dd4c5bf609b6c2892614e2b8eb44fcfefd5125737c,2025-01-15T16:15:41.897000 CVE-2025-22794,0,0,29518117e4a1792c4e052772321e6d0937ed1ba46c8e343f64999407bc634a6a,2025-02-18T19:15:26.560000 CVE-2025-22795,0,0,6ef875d457c8e19bcf577814595be38d790143627f91775ea895c88416ac9b7c,2025-01-15T16:15:42.053000 +CVE-2025-22796,1,1,3b86673049ed33662205941b53ceeac9977d60e8d14186471bc29f888ae0fa40,2025-04-17T16:15:29.577000 CVE-2025-22797,0,0,bfb6494fa60ec5385c83095c381eb3d371c5ac04e9a0e3e98e9fb531b781c320,2025-01-15T16:15:42.200000 CVE-2025-22798,0,0,4bb5a9aaf24c54efe5fc5f3912b846eb9cce5d1ee04c046662973251c02694d2,2025-01-15T16:15:42.343000 CVE-2025-22799,0,0,6e8872882381d68d869db15147218f1df6746b9c043b33787660b5e87e5fc5e6,2025-01-15T16:15:42.490000 @@ -284632,10 +284645,10 @@ CVE-2025-22996,0,0,c50cf62284cf751584047e7a98111e31ae9d7e05423e0e28a6dfeca6772a6 CVE-2025-22997,0,0,cbf89797792d4ad66a4f37050995306b66d6d3563ae5ce9db2b5b27779f4d42b,2025-01-15T17:15:22.193000 CVE-2025-23001,0,0,a661c9ff25c543dcf089dc4c4188fedb40f499aceeca183680e7eb66234e4f62,2025-02-21T17:15:14.103000 CVE-2025-23006,0,0,7a5bf6bad719976a640fb90f39e240f5ae9344d4363a556047b151d1633075a7,2025-04-02T20:32:48.097000 -CVE-2025-23007,0,0,d1b5ee041d1da4d5d9b473dbebc56e99161baeac6a945869046b5f76008d432c,2025-03-20T14:15:23.570000 +CVE-2025-23007,0,1,b858739c0629c57e2ce2431efc2bf426967345a22234bf6ec786c1aa91b1ae0f,2025-04-17T16:15:29.720000 CVE-2025-23008,0,0,7992fda4f94cdf9e6801e521a4952e93a4d7898bac40bb5177c6b8a6dbc8c8da,2025-04-11T15:39:52.920000 -CVE-2025-23009,0,0,a1aae974467eef8553c9951ce1461210f85128b5cb2e264ba665ddac6dba9a72,2025-04-11T15:39:52.920000 -CVE-2025-23010,0,0,2811a0c779b526dba68ef84e875af3e0a148831916142ca4a01182150086e86e,2025-04-11T15:39:52.920000 +CVE-2025-23009,0,1,231594838ba89ed611e9db857c899a8cad9cbdbd11847d61707ca1ba9d6c3a37,2025-04-17T16:15:29.877000 +CVE-2025-23010,0,1,5f020240afbb12c118279b9928369859a6dd500c592d06b68f77c4c0a5c34232,2025-04-17T16:15:30.047000 CVE-2025-23011,0,0,cefe33a46d0161bb6c6a24c1c3d6c06bd96db41dbbf7220897035ad8b05d8820,2025-02-03T20:15:36.823000 CVE-2025-23012,0,0,21902a51089bbb86496843888942542af88455b4e3e34d54286f2fa9da81320e,2025-02-03T20:15:36.977000 CVE-2025-23013,0,0,3fec3cd2c5a637941d673cd3a30388d6eceae58c49f808dfa1c8d532c5060c57,2025-02-03T10:15:09.250000 @@ -284869,10 +284882,12 @@ CVE-2025-2344,0,0,90a0a82926317c6f04a8161104644136cd230508832df4295d0ff01e39732d CVE-2025-23440,0,0,beff568a4a345f14aabca3baf637ba469d0ee24b5f969b032dde5cd35e74773a,2025-03-03T14:15:35.217000 CVE-2025-23441,0,0,fb1bd9fbb669ae04cc0d28d5b88102ee89f1552c510147295df2b7f610bbe58b,2025-03-03T14:15:35.360000 CVE-2025-23442,0,0,ff778f6541faf895ad64165d80b689e528bc89a7807a8adddefabde77d4edffa,2025-01-16T20:15:35.210000 +CVE-2025-23443,1,1,f64d79bd6ac437b18d38fe62bc0adb48bfb5c161ce69894d2e9ea4a9934962b2,2025-04-17T16:15:30.223000 CVE-2025-23444,0,0,bd139aa5f0d5452b293e56da4268a8dc616b5f5ec3a0335035b071fc8609deb1,2025-01-16T20:15:35.360000 CVE-2025-23445,0,0,641133bc0863203a2790eaa4ca8b7599bd8c7c6922be0e426f2e225feec309f9,2025-01-16T20:15:35.513000 CVE-2025-23446,0,0,e6f9e978833a7871e5161c7568ac19d4275eea8b1b6a93cc3e1abd71a8d20aed,2025-03-03T14:15:35.500000 CVE-2025-23447,0,0,eb5ca7ad3f4a8ae4ae11ec7bdaa46eb4cce3b1511628fa2b58ed43f7b495f6df,2025-03-03T14:15:35.637000 +CVE-2025-23448,1,1,f265c97dd0346b2d2ded228f2cae6116e4e3714834fb6741ccd561bac6e77810,2025-04-17T16:15:30.357000 CVE-2025-23449,0,0,9861de2bb02130e19fdbef202b482545d141110bfd57643033355d06e9dabdca,2025-01-22T15:15:15.650000 CVE-2025-2345,0,0,19ae3b12b564a0d797c5a8d07dcfb45dd24e1379a721370709683f5c69850c1b,2025-03-16T19:15:36.510000 CVE-2025-23450,0,0,ffde507d42dc6c5721d5d8f203b57f84d570a6fa59f6007c92ef432b218ca44b,2025-03-03T14:15:35.780000 @@ -285219,6 +285234,7 @@ CVE-2025-2377,0,0,e175aa65a4fb9fcfd2cfc997635d1d671a9a2a7c92393331f67c53e579250b CVE-2025-23770,0,0,b107f9a81729d03ca29a129f8fa439c6c2e86696ac80ab6dc074436a78cb1d5b,2025-01-22T15:15:23.303000 CVE-2025-23771,0,0,65f02e079325c59eeccdf702e1503351ea70607dbcc194f06ae27108336d1453,2025-02-14T13:15:46.727000 CVE-2025-23772,0,0,982ec2219b56005812368f626d4b56d161e9940f6a430166e5a95ac8a677bf4d,2025-01-16T21:15:18.860000 +CVE-2025-23773,1,1,66bb215708de350ef8b4b4185e189d0ac3f1651360c9001d95f5dc63c81ed74d,2025-04-17T16:15:30.493000 CVE-2025-23774,0,0,25f03790ef1a65d4e7ed495f6611d37faf391b93f8f6bdc23573d19f85630a1b,2025-01-22T15:15:23.440000 CVE-2025-23775,0,0,881e3af0467c920e3a0da1ed882de028f641d7f31ac26735099153067f58bff2,2025-01-16T21:15:19.007000 CVE-2025-23776,0,0,37de3b2b14e271fcfbb20da8692ccd78a75aacda39d2827a4094c19b2c20520c,2025-01-16T21:15:19.160000 @@ -285228,6 +285244,7 @@ CVE-2025-23779,0,0,529f2e7055a40628327b34353ab55d9e33e7bfdf9dee62cd6c79168055437 CVE-2025-2378,0,0,ebb1edf963cf3eb9a9e9c2270d476c569cf7ba6ac8f545e04f9066ddace27a9a,2025-04-02T12:31:09.610000 CVE-2025-23780,0,0,8e8a5a259b47149e41183320f4a6badd26f64cf46f39776b5541a103424e4292,2025-01-16T21:15:19.800000 CVE-2025-23781,0,0,cd0c15df451a42164f1d2898bc0c8ae13644ba06ec604b656c9b563ada24e3a5,2025-01-22T15:15:23.573000 +CVE-2025-23782,1,1,31acff0cd56acdb34cd7aa14a48defb1c2135cd1340b4dab26473f5a9740d25d,2025-04-17T16:15:30.620000 CVE-2025-23783,0,0,87e60e041b1b360cdc15ef5034f69c2a2df8e80bf19196341df29f91771cdf1c,2025-01-16T20:15:47.100000 CVE-2025-23784,0,0,8849c29c56fc0e766cbf1f375ec984601e4c88563ce3850301d1477aae092371,2025-01-22T15:15:23.713000 CVE-2025-23785,0,0,8fa57e244fde111a8cf011b78b0ec1aa32722f2ffac730a959e493b1a51f13a5,2025-01-16T21:15:19.967000 @@ -285307,8 +285324,10 @@ CVE-2025-23851,0,0,45cd563fd26573e18f7597f8a91796eb4d7bea4673dae9c99c4f2ca6dc5df CVE-2025-23852,0,0,af6161c2e1eaf6dc31b7ef696e3d279f110159ada7f456a1b82062ece30ffff6,2025-03-03T14:15:48.013000 CVE-2025-23853,0,0,ef0cda26dc0e79d1c47dc7e28d69e1254f0dace4fced367382184e4831286f9c,2025-02-14T13:15:47.700000 CVE-2025-23854,0,0,d260b02665c562e6c59db554faa1d37d019f8ad115df9a55a6f95eb87b662a62,2025-01-16T21:15:25.357000 +CVE-2025-23855,1,1,67465f5fa5ef6ea4b748cc9ea1598256bfc91c9c1df12473ff7f83914fd866e5,2025-04-17T16:15:30.773000 CVE-2025-23856,0,0,a5c5728227279c4b26e1b13f4ba8f4d185c4e16a374fd50014963dfe066d3a3b,2025-01-16T21:15:25.507000 CVE-2025-23857,0,0,16b41278d0e154e1d93caa42d1d4df0d1bd52da4931e55f8dc1cb6d650507d88,2025-02-25T19:41:41.857000 +CVE-2025-23858,1,1,2e2496bc04abb4e1a4b4d3ed06808a58ec209f1932f401aad8e07ef99fb96f98,2025-04-17T16:15:30.917000 CVE-2025-23859,0,0,a1c51c1c52968719b42e86176997a2a2b50c7736a939e2e16e5640ee70ac9861,2025-01-16T21:15:25.667000 CVE-2025-2386,0,0,d2a9d2ae9ad0529c2484a2850f26f2d440dc3d4f3c2589f5f514994c3f0828a7,2025-03-27T18:14:37.427000 CVE-2025-23860,0,0,68c2fb44fb8ada24220e6a3afa3fc47dfedf0ddacb9f55359fb799e87e5c89d1,2025-01-16T21:15:25.810000 @@ -285361,6 +285380,7 @@ CVE-2025-23902,0,0,991c47a865a929869add2c8c1b94dc787e70c9818f90cecd06fc91fb70230 CVE-2025-23903,0,0,b4be5761c29453bbb1be8ab650c68d1adbf43690b2b0f40f5f520796a30a8cf6,2025-03-03T14:15:48.573000 CVE-2025-23904,0,0,c3ed18231b1cb7881c9bdb6b8f59dd936d9fdcbc15fd05e38bba4158006e34b7,2025-03-03T14:15:48.720000 CVE-2025-23905,0,0,e6df51fd666e2c8113ce848afa63ebc2d7c3d50c4fb01b44668236357fa834a0,2025-02-14T13:15:47.973000 +CVE-2025-23906,1,1,03408c646e2e2c84d32f719ee62880ce88d014492193ee8becfb33f3c521db94,2025-04-17T16:15:31.040000 CVE-2025-23907,0,0,62f2d830555983225c93d67a33766339f0b5f5b8104b470ef809680dd862709a,2025-01-16T21:15:32.333000 CVE-2025-23908,0,0,4b396a8852131d43d79fe1137cb49df2e0d52a86fdb32e54e4afe34ce1d8d3d5,2025-01-16T21:15:32.480000 CVE-2025-23909,0,0,076770cf61637e2194048d503e6efbb5af30e3d945de88d9df8b24a008808b14,2025-01-16T21:15:32.637000 @@ -285416,6 +285436,7 @@ CVE-2025-23954,0,0,c0b532e328dfa85d7de261ede6d898c1c93d187c5ff87f67c3d88a90ff144 CVE-2025-23955,0,0,b35ff47ed4400b2edb51393bc234d7c4ad9797e847fec68985488245984a054d,2025-01-16T21:15:37.277000 CVE-2025-23956,0,0,15f2dcb32df35e2b8473f6870c5d0b4c83cc77afd7741dc7fb30f1d524230e01,2025-03-03T14:15:49.010000 CVE-2025-23957,0,0,40b759ae20a341b30b3caf9db81dbe00398828638d81ba3346ad7f7cf25fc424,2025-01-16T21:15:37.420000 +CVE-2025-23958,1,1,1f37425c2f7fa7f7d57c357e8f10588f437fc478b197f278980ca73cb3a5b3cc,2025-04-17T16:15:31.170000 CVE-2025-23959,0,0,4d3ba4ca608a53eb6870e6e5b2be4b542170ae3caec5feb8a182291e655509aa,2025-01-22T15:15:26.810000 CVE-2025-2396,0,0,a1089f5d9b452663468528f9e7ca954cc57f8349df33c95acd3dfb7b279d16c6,2025-03-17T06:15:26.113000 CVE-2025-23960,0,0,fef5413834349b73f28bcc0fec0108a4368773674c1a2ae5d7728e978b8298e8,2025-01-23T16:15:40.777000 @@ -285729,7 +285750,7 @@ CVE-2025-24400,0,0,688f55c8434b6d75b2a47eeaaca4c2596bd1613b0ce146b7759d1b11639da CVE-2025-24401,0,0,4fb172772de67515fa4267387a9c7f60995cf88b73e8f04e780d1435e4b66f20,2025-01-23T16:15:41.050000 CVE-2025-24402,0,0,f4550d563ce08a51c6e77d15a75001488a90ae02ca9b5c4a4edceb8828b16ab8,2025-01-23T16:15:41.190000 CVE-2025-24403,0,0,68e26c7f774f1a67deb809321d2f4df1ab6809fd06c2450b0641f4bec4c46098,2025-01-23T16:15:41.333000 -CVE-2025-24406,0,0,43a537765b1b35f99016af34dc21ef25efe5f10a237190905c9086e583349f9a,2025-03-17T21:15:13.493000 +CVE-2025-24406,0,1,55b38a9a782570d25f0dd9252bd984ef2e8dc00604f63408c13131ebd4f3c2a2,2025-04-17T16:09:35.413000 CVE-2025-24407,0,0,3b977bafe2e9861c9c4bd60245b869e34b61582d07ef80a1ffadb0e0f79b2b66,2025-04-16T17:18:13.710000 CVE-2025-24408,0,0,71a175d541d32cdbc570ab7f6d7c743997d1db2eb1cbb0ffc69c37b66d235758,2025-03-05T17:43:13.783000 CVE-2025-24409,0,0,7741750f18e40a5a90162075aba78d8dec7bc0beb756fcb33a13b50d86eda6e7,2025-04-16T17:18:10.117000 @@ -285746,13 +285767,13 @@ CVE-2025-24418,0,0,0b9e05d200d3572fa40b73de6ce7cb0a74c0ccc71a55a2519fc8f76ce03aa CVE-2025-24419,0,0,0dff8daac36e461e8338325349b5de4746cdbc5f9cbaad6fc9787efbaaff8022,2025-04-16T17:17:01.200000 CVE-2025-2442,0,0,4190cd9f490d0cbc14aa7b27b97f63f4216090124f0a62ddf28f2664d24ac2c5,2025-04-09T20:02:41.860000 CVE-2025-24420,0,0,b7284458a856bbe258fa5ccb45ddb789ad78b44c296ba6e8a8c672c9a7711993,2025-04-16T17:16:51.277000 -CVE-2025-24421,0,1,70738a02ad645ba2ffaa3c1fae60580320824c4623bfe6249e7b0938f838de35,2025-04-17T15:44:51.770000 +CVE-2025-24421,0,0,70738a02ad645ba2ffaa3c1fae60580320824c4623bfe6249e7b0938f838de35,2025-04-17T15:44:51.770000 CVE-2025-24422,0,0,6b8096e72f934f64c5925e489b4e3f03640c514d9fe890dff8b87672bc735ade,2025-04-16T17:16:43.853000 CVE-2025-24423,0,0,bfd9d82bede896d4cb5f22dc83da35beda5e880014994c0510a23aa20fba7396,2025-04-16T17:16:37.320000 CVE-2025-24424,0,0,e55cb3328000bae616509b5a3ca2e3ab08ceda2c9fb430a2bf6e9fa851cfdde3,2025-04-16T17:16:10.380000 CVE-2025-24425,0,0,544e24fb5861c08f50241c0900b75732f7ace8ae9fb499ef3f2243360578a7fd,2025-03-05T18:32:12.530000 CVE-2025-24426,0,0,03bec720441a3a673238f11ac31be6c9efb917575e7a75f14c8f68935f723c76,2025-04-16T17:16:04 -CVE-2025-24427,0,1,b8629d1fb7475a9dd2b96b196d37e16e6cee3c3707fe2da04f7187a220174d15,2025-04-17T15:44:59.330000 +CVE-2025-24427,0,0,b8629d1fb7475a9dd2b96b196d37e16e6cee3c3707fe2da04f7187a220174d15,2025-04-17T15:44:59.330000 CVE-2025-24428,0,0,d362fd3d6b3216dc8e7bd86c697cdb90a903d9c76b342cb6299162b6ab48e211,2025-03-03T15:51:40.090000 CVE-2025-24429,0,0,3890fb9af95ea402a42f76d7522e17fb69a860e6735ccd8adf88141b140813e6,2025-04-16T14:27:27.770000 CVE-2025-24430,0,0,2d690f4c808e65333c8d6be4dc029f0fb527153402d8560e01c5c3848f8480f7,2025-04-16T14:25:10.510000 @@ -285822,6 +285843,7 @@ CVE-2025-24535,0,0,8413f0f6501de25a4ea76a1029f3db27442b81948ea285c9b214dd8685020 CVE-2025-24536,0,0,967423c680cf009db2559039171bae0a4171153a3529da30bc782d8115eb7e12,2025-02-03T15:15:23.640000 CVE-2025-24537,0,0,3535a27bc634f4e8e5322e2d71e557eae6bd91778e65e8b3518c05a8b3e3cd14,2025-01-27T15:15:13.440000 CVE-2025-24538,0,0,1d20718e8c7fa8ff17954abb8106cce2dbfc04456603d5117273dc106ec8895f,2025-01-27T15:15:13.607000 +CVE-2025-24539,1,1,a52025e9f4e2cfa7e1d3cc8f98ef0fb40462c012aa88fb7a9f2c5eed96bbfc66,2025-04-17T16:15:31.300000 CVE-2025-24540,0,0,d0faf64ac8f36a77dbad07877c3103051b1abeb29480ff1259a6cba2a76cb4e6,2025-01-27T15:15:13.753000 CVE-2025-24541,0,0,1a002ead1aa4092b5cfd2f8330fae03d8f8276ed8bab9f28b7ecf0ed9e920dde,2025-02-03T15:15:23.810000 CVE-2025-24542,0,0,4b0f63e0d926fe5e09a7ed0a0d0f082f2f9b9971c5591e81feb5087d2f9e9514,2025-01-24T18:15:32.550000 @@ -285830,9 +285852,12 @@ CVE-2025-24544,0,0,0c5953b4c0b30e15ec25a54cd5cfca6fc171cada103175983edde9e888694 CVE-2025-24545,0,0,d903b50b641c8b1ad5df3dbb119c76a4e4faf3489a6bd15d04b2eef5ceca9d22,2025-02-03T15:15:24.177000 CVE-2025-24546,0,0,d43b7a39ecf4903cfdf8155cb1994671e73c77d23a900df69d6ad326beecbe4d,2025-01-24T18:15:32.893000 CVE-2025-24547,0,0,9bbbbb0170cdf42c7de6ad37f0762f4ac79a39517bc2a7a976e9bfd241d0f5a9,2025-01-24T18:15:33.063000 +CVE-2025-24548,1,1,029f7f640eca64be91c030e9cec0c465a0a864cc8e6816e22aefe5b215723538,2025-04-17T16:15:31.437000 CVE-2025-24549,0,0,cc40b6e26688d19744c9ccf5aa4c960233861d1a46718a8675844d0dfee836e3,2025-01-31T09:15:10.027000 +CVE-2025-24550,1,1,88546166933cd03028de7c9d8fd8986ede62c1553001a2f2ee03e1ed23792ea7,2025-04-17T16:15:31.563000 CVE-2025-24551,0,0,d775a091c05a4cd23de74d357ab793fc5cd8516ad1919b9c63ca6b0683b031d3,2025-01-31T09:15:10.170000 CVE-2025-24552,0,0,596feaaeabace159c1f5102fbb31f50177633fabd1b603a34028a9791861e2c4,2025-01-24T18:15:33.257000 +CVE-2025-24553,1,1,af3dd136b1a20db0d8400a8354e1f5232a38de5006c9fb8f27873b80ad3aaef9,2025-04-17T16:15:31.697000 CVE-2025-24554,0,0,c76cba34a2f263ec006d351353178853b31a1581f1263730a61dae9551266fe3,2025-02-14T13:15:48.113000 CVE-2025-24555,0,0,948444e837e33ec5e61cf9d8b68736658e42eabc8f745ab714b850383f1d6168,2025-01-24T18:15:33.440000 CVE-2025-24556,0,0,6ea5e8a5447bcc14ba5473102f123444dde32621fa8b8e2054b21cc654544ca0,2025-02-03T15:15:24.360000 @@ -285856,12 +285881,16 @@ CVE-2025-24573,0,0,56d0d64dff037f658f0c767f6aad192ed4cc48ff77cf44250998dad4e3bc1 CVE-2025-24574,0,0,c33ac486c050e3e57ec517b763df987799e73ad8e1160b69b1646685a1bb4361,2025-02-03T15:15:26.013000 CVE-2025-24575,0,0,025389a169c496ef6d6fedb8e1d36b112ee89d07ab0bebfab560187cfa1b9353,2025-01-24T18:15:34.793000 CVE-2025-24576,0,0,2765bf68fdca59f5678eccf28012221f8f65e8cc8e6ad593abf3e9e803ba44a9,2025-02-03T15:15:26.310000 +CVE-2025-24577,1,1,32419c8d188e19c9e7be35fbf01685a318636f98660158ed2aa8aabe137a7916,2025-04-17T16:15:31.833000 CVE-2025-24578,0,0,914a6e710d55d7d90fce9a447f730d92cb971f04629ed29e0eb025bc4c31db88,2025-03-06T19:42:13.700000 CVE-2025-24579,0,0,1ff118a80031f6e9188c9c18ca66942b92452beb89610750f176f36b429de4b2,2025-01-24T18:15:35.090000 CVE-2025-24580,0,0,3ac0c4c6045678b72e87005384f5e6de52eb3bd6459338ea250229c9d3171372,2025-01-24T18:15:35.247000 +CVE-2025-24581,1,1,591edd24920c60814df4ebfaeef74c5b554c06d6cc0daf3128a81b4f1f2e66a3,2025-04-17T16:15:31.967000 CVE-2025-24582,0,0,62063760b35cdff28e72d2d925dca694f2a36a877c07ea2ef7d309664ff448e6,2025-01-24T18:15:35.397000 +CVE-2025-24583,1,1,49f09485a69a4f94b6daaaeca050c3ffd3e17bf2f65db78129b0183199917cfb,2025-04-17T16:15:32.097000 CVE-2025-24584,0,0,cf8df7ac6e79f26dfa942776e4d95cc7083b2b6b01a1cf63595fb2ed87b3acb5,2025-01-27T14:15:28.797000 CVE-2025-24585,0,0,fc8881e7c465c3fc36c965e7dac9050906b9fc087b92fc8662702f8eb452d229,2025-01-24T18:15:35.550000 +CVE-2025-24586,1,1,c9ec712de36e06bdd23a17697adead3191b68cabd83fbce4803a40584897b288,2025-04-17T16:15:32.243000 CVE-2025-24587,0,0,cdbb8061e1f61beafef8c11244b1f0f3cf5d180e5bc7005af8284dd778fa5374,2025-01-24T18:15:35.697000 CVE-2025-24588,0,0,1faf1db2c22cba9af693fe3cbaa545e96089409d18ce5347c551a8624facf360,2025-01-24T18:15:35.867000 CVE-2025-24589,0,0,b85c10bc35bda6003444da3a1e9b4af85d2fcdc02f9c52178826de0f932d0894,2025-01-24T18:15:36.013000 @@ -285894,9 +285923,12 @@ CVE-2025-24615,0,0,bb9f2133a024bd838182b13bd2e45367b2874f171a39a46fd748cdfc70a69 CVE-2025-24616,0,0,a8d2738b549251a0111881423e505a3fd396277d11679b465dd06c3c95a1da92,2025-02-14T13:15:49.490000 CVE-2025-24617,0,0,972fde5763d796b483e656605f6360dc4b09c7f8adea8ff2b5a23cc35b8e7092,2025-02-14T13:15:49.633000 CVE-2025-24618,0,0,e850ef0e738e94e52c896a59bc967e5de6b2209213aa96f211dd34d5779f5d94,2025-03-06T19:46:14.123000 +CVE-2025-24619,1,1,d17d8269cabe9d4e9fd9c8e974be3a60bcdf283693c6861ca9ecb3799ed75221,2025-04-17T16:15:32.810000 CVE-2025-24620,0,0,b444442cc1b23af3af8ae533f2aed8473d4d75a376ebfe4727e41bd7d72161cb,2025-02-03T15:15:26.697000 +CVE-2025-24621,1,1,2002fe7d80761e7e37cc3cbfe69daa8d7b7455115c1fe6790ae8c1c730d1be70,2025-04-17T16:15:32.947000 CVE-2025-24622,0,0,40b10bf41ce4b777512f2bfa275634ecc97858c1be10f89ac72c62de5b5c8685,2025-01-24T18:15:37.577000 CVE-2025-24623,0,0,e2efe38ad89c57e398c055c1350e8dcbae99221a204ae29654fb946b0f963965,2025-01-24T18:15:37.727000 +CVE-2025-24624,1,1,9914e78630bd4be55b3e14bd84101fa9ab1adcc384898dc9cb698136cbb9e44d,2025-04-17T16:15:33.077000 CVE-2025-24625,0,0,fa17cf2d07b46624f19d54aa942418716e44081a723d72bc194f182325b28266,2025-01-24T18:15:37.897000 CVE-2025-24626,0,0,75505013673d56d32fec25b94543cac72ed439d007230e472b81935ffb810ae4,2025-01-27T15:15:14.777000 CVE-2025-24627,0,0,628ee3f40d753682d05c11fab0f7f29185f54a9d7c697d04ed695dc163d43b5e,2025-01-24T18:15:38.050000 @@ -285909,20 +285941,25 @@ CVE-2025-24633,0,0,702993d0a68d37905531a12131b16c43d90468fbd9d9758548b378011c530 CVE-2025-24634,0,0,ad1ea2729993b18260176b082a1fdbbd1b40c6cd43264561203160f131678a79,2025-01-24T18:15:38.350000 CVE-2025-24635,0,0,8e4daee5d6abd4b07f5297619a43f9752ba41f45d1919dad64440f82e4b51154,2025-01-31T09:15:11.190000 CVE-2025-24636,0,0,725d94dc13d3e626545af0422430a59e8b7442528fd0fd9293d44daee9239f59,2025-01-24T18:15:38.507000 +CVE-2025-24637,1,1,a65bb51e2f9a147c70b771fbcffa85d45c55cbfe3f87156ab4d88c672fdc7b55,2025-04-17T16:15:33.210000 CVE-2025-24638,0,0,e48134150970030c3cb3060c0d946973b40396a1f1098b9d2fc1d7177d027eab,2025-01-24T18:15:38.670000 CVE-2025-24639,0,0,f981277e6e45c4921c865d8fe7730f9502c0912e737af8a13ba2ec373c1a232b,2025-02-03T15:15:28.190000 +CVE-2025-24640,1,1,f5326e1a01a616ac5e48928da572ce16368627e1010107419d60d5906641a0cc,2025-04-17T16:15:33.343000 CVE-2025-24641,0,0,571a7f6eec68323fed1b52f7b0726caea3841922d6602f35906eee61b509e6e0,2025-02-14T13:15:49.773000 CVE-2025-24642,0,0,4dc479a9530b981fc4c0621da7e2f61c3cc6c221fc2dc01e78e812f5fb0cfe1f,2025-02-03T15:15:28.370000 CVE-2025-24643,0,0,c39f8417362e7fa071c7af10f3262cdab1baa88c1f3bef487d5e04ac68d6b843,2025-02-03T15:15:28.537000 CVE-2025-24644,0,0,0bdd39e9b2500320fc6b4f440934d0f58b6da41428daa2df1308fcb73162baca,2025-02-11T19:53:56.887000 +CVE-2025-24645,1,1,4f3978cf77d5d1995d77de1f40c4b802008d71c597b54994f397868bb7c85bf6,2025-04-17T16:15:33.470000 CVE-2025-24646,0,0,9388133f7bfc92c4d35737c7541c675078edf57c24edd4a38f49619fc52d65ec,2025-02-03T15:15:28.703000 CVE-2025-24647,0,0,200e1fd220d6ce976e575d1a5dcf67ce623f0f65910f4be6feef3f2960ad4866,2025-01-24T18:15:39.007000 CVE-2025-24648,0,0,f1268c518aeb67aef0edd3f5701e0a28913074bfde4371631d72573de1cdc88a,2025-02-04T15:15:23.460000 CVE-2025-24649,0,0,023d2bd5a44406bd68c3c4645a1c6ced5cfeeb799618a8ff0129cf3c8fd99b85,2025-01-24T18:15:39.167000 CVE-2025-24650,0,0,5c9fc38112d5e5a4629a3f2853c55d07f73189509eb8ba11355a608cb20e8521,2025-01-24T18:15:39.347000 +CVE-2025-24651,1,1,a4ba2326d2a7fe678191217a5cf46f89cc19c17a70a45505fec7840eece9e557,2025-04-17T16:15:33.600000 CVE-2025-24652,0,0,125bd9607cb5ca27355c57c1e03dde9d03a473f27327fc2bf3ba8ab8fcc2bcac,2025-01-24T18:15:39.517000 CVE-2025-24653,0,0,98339226f3f5cbf33f9e3597a502d8cd262e3f8166ecb0e8b1f8d1c7b5a57572,2025-01-27T15:15:15.070000 CVE-2025-24654,0,0,87efa84617357e8a5988b2522876ee6ff65f514979e86e30ff574f8f0953c213,2025-04-04T14:48:15.770000 +CVE-2025-24655,1,1,0b0848a7c063bc3e76bd559de7507bb705a829aa07caea01fa8acddbe6352045,2025-04-17T16:15:33.737000 CVE-2025-24656,0,0,e3f8f37e20f1a0138b24c493e5230c4d8fc92553c1f4e874e0ae9d9e3d7c636e,2025-02-03T15:15:28.880000 CVE-2025-24657,0,0,a8222e0bd7505ef553e92de5bb8cc85de0450bfc3b5409fc8a3f31db56fdcc0c,2025-01-24T18:15:39.680000 CVE-2025-24658,0,0,998dc8b87f0bb72c992e3106285f00f7037efa9c383eaa222321a76f3e0f2d46,2025-01-24T18:15:39.853000 @@ -285937,6 +285974,7 @@ CVE-2025-24666,0,0,e6dfdc0799fed60ef3cccd6d34dc71569c3b64a8e7acac5a453f72b00c332 CVE-2025-24667,0,0,e5a0994628c0dd3fcf431b584d253da3a84187470cac60c6f9b13938fad00cae,2025-01-27T15:15:15.563000 CVE-2025-24668,0,0,efd3de92a0d4dd672645e279da2adea225c10670e6d1790c19fdae6d2cafdeee,2025-01-24T18:15:40.563000 CVE-2025-24669,0,0,ccbcfd967629b2fc9d0f55cbe92ae819c52c6370911252a5c698eab01fe8ccf3,2025-01-24T18:15:40.730000 +CVE-2025-24670,1,1,972abbfe44ca6ad75d417409960b0ce138c7db0a9ae7f490e4516a76bb644a15,2025-04-17T16:15:33.867000 CVE-2025-24671,0,0,a34982cd37463a6a8d71085101c970385da38e709d82f7322f20fe11d40f1cec,2025-01-27T15:15:15.703000 CVE-2025-24672,0,0,ecb79a49d69bbe3adde17dcda3331fbda213520d7f13c03a8c50b0609ec5e6f1,2025-01-24T18:15:40.890000 CVE-2025-24673,0,0,b66a7a3d066a2525d2405fb1d08e267ca2003a81e02203b4a9c4fc98b4e1a4fc,2025-01-24T18:15:41.033000 @@ -286006,6 +286044,7 @@ CVE-2025-24732,0,0,c415d1fd5de8703d180e448901772f07d2bcadd6548313af1a4bf127cb6f5 CVE-2025-24733,0,0,482529fa2b7bbfe9a050ce130c1ea97f7205963e7cf55257d87837a232f77835,2025-01-24T18:15:47.697000 CVE-2025-24734,0,0,d7ca2e9810757851f82f80aff63b50dafd3642d61fd1c2dc810bbf398284d5d2,2025-01-27T15:15:16.390000 CVE-2025-24736,0,0,f36f49eb7e10d9c6261a4fcb2acf851db703d0327adf9585d4281e13c3af13e1,2025-01-24T18:15:47.850000 +CVE-2025-24737,1,1,5410ce048c48e23a4398843022893b741ebfec60e6db2059c1fba694e217ef59,2025-04-17T16:15:33.997000 CVE-2025-24738,0,0,ff824e93f081ca47b8768807ed6baf0479ca4ae475620ff9b3eabc39fddae9c1,2025-01-24T18:15:48.017000 CVE-2025-24739,0,0,2511d2bc15670f2f05a63c18d4ca8980ee5ac36501cd02fafaa675bb11e9da2e,2025-01-24T18:15:48.177000 CVE-2025-24740,0,0,6625bfe56de6b3a16927dfe5b854d7fd1ba6fb38ee1b7183ea2974f9f55a36a3,2025-01-27T15:15:16.537000 @@ -286013,12 +286052,14 @@ CVE-2025-24741,0,0,ff6450b1af6908df2e44b6535e5b24a0380c0174fb20cfb2b978f741b76c5 CVE-2025-24742,0,0,6ef73fa0e67e6dadbcd7b6ade881469cccf34ee6f1ad4930d0628185680e8f85,2025-02-11T15:53:48.107000 CVE-2025-24743,0,0,e3226a4226b885b57e7fe87d47003c943d1cba3a103c4aeb09f57ab8a3e6b284,2025-01-27T15:15:16.977000 CVE-2025-24744,0,0,bc8bbe894f88fed69b4bb24f69d681e27c01e6147c3768ca6f1adf789040aabc,2025-01-27T15:15:17.117000 +CVE-2025-24745,1,1,4ecf845d6f051b2b49a1cac1cf22a85d2a047463cd74ca56718d065d1b3ec931,2025-04-17T16:15:34.127000 CVE-2025-24746,0,0,e640d68193c997efe97249e6f1cee0e9ce9f97ddc69dd52467ca15646a5683b0,2025-03-28T19:15:14.553000 CVE-2025-24747,0,0,d8d5879f141d02ac440b19c8b796e44b06e3fcae6bfd445bce644f72bd561c9d,2025-01-27T15:15:17.253000 CVE-2025-24749,0,0,7e56b04f2f502be4c647ffa52a0c1f2e91f2bc25e979a1ff629db670a4b544fb,2025-01-31T09:15:11.760000 CVE-2025-2475,0,0,c0a0336fb403efb898458fa5072cfe904fb815c7e89b5030a20878b1fe124799,2025-04-15T18:39:27.967000 CVE-2025-24750,0,0,6398f7b1e29d3519e65e0864494e38f2a68b8317a82c560542e0c4814ca79359,2025-01-24T18:15:48.663000 CVE-2025-24751,0,0,d999066b9fc4be710f419f3d363e7444c778eaf47794160a144b74e633cf7720,2025-01-24T18:15:48.810000 +CVE-2025-24752,1,1,abb2bc389898e05eb2183bd7989d6c3f199e1d4fbddc6a60485aaa8e28ef6d71,2025-04-17T16:15:34.257000 CVE-2025-24753,0,0,a2c1331499f1ee93474d032a5492134141c22dfbef3d88782211f0652176fefc,2025-02-07T14:39:27.320000 CVE-2025-24754,0,0,df5b30a971ad3afa753fa5100ea4ce4a8eeffe0cded00f62df24aa224b1825d8,2025-01-27T14:15:29.477000 CVE-2025-24755,0,0,817a6f4676c47a1165c3ef71cf774d5099a4b3fffe7ab21f2fd661b2cbf35fed,2025-01-24T18:15:49.160000 @@ -286357,8 +286398,8 @@ CVE-2025-25224,0,0,a4f44e8389415111624e6d3b431cded203f069a8e58de6c5b5f4eb5c08d09 CVE-2025-25225,0,0,50e1db0214d749384eee9692d10836c10107d4550447d640f020938a4553ed14,2025-03-18T17:15:45.920000 CVE-2025-25226,0,0,c1d011e8e7ba6b6c9f469aa960fb7064e4361a6d4416d3477e347671e561cfd3,2025-04-09T15:16:01.923000 CVE-2025-25227,0,0,14dde9d48b40850eb1a2d705436b8ead1fc46d2a4e1905b71e2c6de779c3c0c1,2025-04-08T19:15:47.290000 -CVE-2025-25230,0,1,88d4d38e160b3f3264647812e858a073a4aefbf3fb8df02470c8ad2d5d82278e,2025-04-17T14:15:27.613000 -CVE-2025-25234,1,1,2bcbafb2c55b98357ca90c63e969a3923988acb1bd80e94a668af2c39e504586,2025-04-17T15:15:54.120000 +CVE-2025-25230,0,0,88d4d38e160b3f3264647812e858a073a4aefbf3fb8df02470c8ad2d5d82278e,2025-04-17T14:15:27.613000 +CVE-2025-25234,0,0,2bcbafb2c55b98357ca90c63e969a3923988acb1bd80e94a668af2c39e504586,2025-04-17T15:15:54.120000 CVE-2025-25241,0,0,f70d628c4466ad6abe844cd65a2579f5c9e5af240d0c56eadc1f05ff31a52618,2025-02-18T18:15:34.967000 CVE-2025-25242,0,0,9434714e72888d1a52e5bad48430408baa107619f6e4dcba8f508d71d8cfd58f,2025-03-11T01:15:34.777000 CVE-2025-25243,0,0,906f44310c3cdd164cd7aafcd2415e522d55d23269db0ed5b7f0708c0da72aa0,2025-02-18T18:15:35.160000 @@ -286450,6 +286491,7 @@ CVE-2025-25451,0,0,4c60686324e8dfbebc3bac09932f9dca9715cd901e8b055c1d7eb1acd46fa CVE-2025-25452,0,0,f8ac00e705c69600b7bd756ffd6640407ab44891503ee6108f0e991980324498,2025-03-07T17:15:21.947000 CVE-2025-25453,0,0,e5360a815205405e553950e961a0173770e9dd04d7fe12b9db9c1bfb32744f4e,2025-04-16T19:15:53.603000 CVE-2025-25456,0,0,a1b3b079ee0b91935af9297ed233566efc332deaf5d328e0327228d7b8a4343c,2025-04-16T13:25:59.640000 +CVE-2025-25457,1,1,6d6737ba7974e65f3a73ce20ea1450eb0f61d0ec76cb551f535b4a40e6122405,2025-04-17T16:15:34.390000 CVE-2025-25458,0,0,8cfd317446d79c4dd00d59ce26ab1ec1dcea8a036d9f2db03e5653d3976f973e,2025-04-16T19:15:53.750000 CVE-2025-2546,0,0,c3027dbe34196254c0063ed1c57ce0360ffc141678360f958c71a638a14495ad,2025-03-20T15:15:46.420000 CVE-2025-25460,0,0,82c83de72621855fac95e9c964cfbdf72c297a15a88fc1d2ee5a87f0355f72e3,2025-02-24T17:15:13.900000 @@ -286696,7 +286738,7 @@ CVE-2025-2601,0,0,bb4ab67a180a6e1341b2b88a558c82b8f32cf6c25aace2c02315e518aec786 CVE-2025-26010,0,0,cf5a04d9860ec5e77e2e34e26dd6be3079064fe7b613efd3b5c093d4f0e21516,2025-04-01T16:33:40.410000 CVE-2025-26011,0,0,7d295bbc36362f782172277753f7e055d256a1db3b7bed76509ca8e09eca8473,2025-04-01T15:42:54.437000 CVE-2025-26013,0,0,724f265adcd738220ed4a776fa09e1541bc1e63c38f068763e12781ff127fa8e,2025-02-21T21:15:24.470000 -CVE-2025-26014,0,0,0e63db03b12de770f19f2e4a205d81f3b9f22e3b31412c31dff023e0922eccf1,2025-02-21T17:15:14.680000 +CVE-2025-26014,0,1,3fd6cd6dd917138a861694a718ed3751b21b87121bf787ef1fcabe642792a021,2025-04-17T16:15:34.477000 CVE-2025-2602,0,0,f21f7a13afb87817a81932c2f26ab3138383049280693ea8598e02fc6dc0ffdc,2025-03-21T20:15:15.863000 CVE-2025-2603,0,0,a0feb4bca9b6519be46ecbe149f7a5ee127179d1f75da77a10aae8aaa23b5249,2025-04-01T20:28:42.917000 CVE-2025-2604,0,0,e75cd0b194a020065e4073d6e30a4bfdc2dcd331c1b113d864b29601f6499c1d,2025-04-01T20:26:24.393000 @@ -287220,6 +287262,7 @@ CVE-2025-26964,0,0,ea0080d8ce2ecb3373a085eceb32e90ea95cb761f82deb76b39a1124e96a2 CVE-2025-26965,0,0,93c337cc3eb3f8fc92e5ddc9ffc0898aaa0f0aad24f5399c878678a39f5616ad,2025-02-25T15:15:29.703000 CVE-2025-26966,0,0,684880e8c3573c6260a708640641c019d80d69ea6fd25ee44630d6bbd77dd883,2025-02-25T15:15:29.870000 CVE-2025-26967,0,0,1a7a106d6ee491b35434e26aaa6e1b88970dc79d29cc8355f7132163cfdb6020,2025-03-08T03:18:24.350000 +CVE-2025-26968,1,1,cb9e95a975e771f105e16165d76c9b81fd31e4dd67724566555d6b257ef0c6b7,2025-04-17T16:15:34.613000 CVE-2025-26969,0,0,968b03e1dced102829e053f4d22c25446d36342404f281e00568c05ebfb80301,2025-03-15T22:15:15.120000 CVE-2025-26970,0,0,a8e0d0ff0e2a1b9693c4f8e89f7a431bd52cc1ff2cea1c6d72b3d4b595d64f6c,2025-04-14T09:15:14.433000 CVE-2025-26971,0,0,e0eab267b5fe828b40a07ebbc4ca96ca688836c7dc0a336c224f3b128e48119a,2025-02-25T15:15:30.017000 @@ -287420,31 +287463,53 @@ CVE-2025-27279,0,0,e02d4da30ee7c46005e2dd222aff84182ec72114143ea7720d0988b2b719c CVE-2025-2728,0,0,c4108d420d85db5587e0dcf73439571eb7dcbb31ecfed883d872b2c28f87df29,2025-04-11T20:15:23.313000 CVE-2025-27280,0,0,8676dde15db79bd7dff4cf239425e3f3d950b17aa3701d636d0a7bd0e166a35e,2025-02-24T15:15:15.007000 CVE-2025-27281,0,0,9fdda88ecd2274c6eff1c09bae76e3a303f46955141b83096a7ba9176ec09e80,2025-03-15T22:15:15.697000 +CVE-2025-27282,1,1,7a91bf6a88737b03c8ed10e348912d2af25d971d0aa9456d875f66699a4b81a8,2025-04-17T16:15:34.753000 +CVE-2025-27283,1,1,dfe592999a5911d6067fa595576522493f7c220d8ae72cf813d8285d3f69c36f,2025-04-17T16:15:34.887000 +CVE-2025-27284,1,1,fe6b484dcaa57d8225f5e1da6417762e999073ca51d4a5aa2f7e9b17fd200dc1,2025-04-17T16:15:35.010000 +CVE-2025-27285,1,1,93f636ab5fe6ca1204e41f911ae3514c513492a6f5c4dd2be9062b14e9c2d2a8,2025-04-17T16:15:35.143000 +CVE-2025-27286,1,1,54855646856adc1a7310d06ff1af87355cea7a0fd991291f44e9dd0c5a43c352,2025-04-17T16:15:35.270000 +CVE-2025-27287,1,1,de0b47127e435f4d00756d42052864b8973a114b0e0d9d72d7e44d2317b9dd6b,2025-04-17T16:15:35.403000 +CVE-2025-27288,1,1,5ba9ed18bb5b0f79e9353c951e048efdb264917cbfe05fccb9aa9d7bbb509cb7,2025-04-17T16:15:35.533000 +CVE-2025-27289,1,1,18cd643cb744a63dd37d499875b16fdce7a65272d071698d078fa376dc3e99cb,2025-04-17T16:15:35.667000 CVE-2025-2729,0,0,633dfa254e44c8067de3f0b5884c2812f55b08dcc7835e5d70f07a154269caf1,2025-04-11T20:15:23.433000 CVE-2025-27290,0,0,aa628d5cea07d5d297c7ccfde23ff70de2a1958791da61d5415ca3597f031c14,2025-02-24T15:15:15.153000 +CVE-2025-27291,1,1,feaeda8504c9f059b95ad7a3a4e11892c19f20059b0f861baeeca83d340ebe55,2025-04-17T16:15:35.800000 +CVE-2025-27292,1,1,88d32f40213e9eaeaaf0a6c85dde72cbfe3cf312802986e6094c281034f3bc3d,2025-04-17T16:15:35.933000 +CVE-2025-27293,1,1,d419d416afa1e9db7d742283ec663605c354e03825fb13679df9d414f6bde555,2025-04-17T16:15:36.067000 CVE-2025-27294,0,0,c0b6fc5af6ea72ce95deb09b1966be2a148292fc28e45c7d495dbcb943cd9ee4,2025-02-24T15:15:15.287000 +CVE-2025-27295,1,1,17dd4df1a55197838757cecd326cbb64f06e8c147f50cb3c63aea99a1477302d,2025-04-17T16:15:36.193000 CVE-2025-27296,0,0,f7aed2bd994db7600652c28570e7742995619d861eb9e40b04a8a3c93de0a4f5,2025-02-24T15:15:15.423000 CVE-2025-27297,0,0,95db9906477d52c2de1a8a456daf46e161b9abe5a8e730d3f29b26be2dd97704,2025-02-24T15:15:15.567000 CVE-2025-27298,0,0,9960151b7da8df7d6db69029a962ee932aee7b76aba6ce4658ecfc21ab71df47,2025-02-24T15:15:15.703000 +CVE-2025-27299,1,1,e509748bb2163f13da40991f2dfd18e6ae617a26621f009e35c1fa6b051636ec,2025-04-17T16:15:36.327000 CVE-2025-2730,0,0,79dab41cf2c97130e14f30923b3ec0febfb05f98e79bf94ba6795796a409c7f6,2025-04-11T20:15:23.557000 CVE-2025-27300,0,0,d66647b7f71200d1677535353b3d6824f3bc7339b0da601cd7547880b84dbd6f,2025-02-24T15:15:15.853000 CVE-2025-27301,0,0,64f043779c78c2ed84c27b8523770671a1fb6421af68da8a432cb4c7bf0ebc7c,2025-02-24T15:15:15.983000 +CVE-2025-27302,1,1,23a3efe65fe871459cf00b68ceaed3ba1ea96ddf94bcbbaaa692833cd3bbbb76,2025-04-17T16:15:36.450000 CVE-2025-27303,0,0,a7a6d6c25ce6950b41fb76e8348a73edf41cf16dfbeb4a8d683f81caa1910109,2025-02-24T15:15:16.123000 CVE-2025-27304,0,0,9d2160199dafe840e771986f204c061835c7ed7add0f4ae4cf8c99555b7a3daa,2025-02-24T15:15:16.260000 CVE-2025-27305,0,0,bf074d91fed5e21564acaf77c0028ab2d84637020401d70d2a04e7068101daf4,2025-02-24T15:15:16.387000 CVE-2025-27306,0,0,80702ad22c275e37a0cbac8c8257049e2cc59528c7889d8099c083916777eab3,2025-02-24T15:15:16.523000 CVE-2025-27307,0,0,51f2191ce96fb79adb3f67c48699c360eaca5adb32f81b1526864b04b25e65bf,2025-02-24T15:15:16.653000 +CVE-2025-27308,1,1,562eb0d060f2348694e7f9748eb09543654996b2f924263f6ca7102a0abc068e,2025-04-17T16:15:36.583000 +CVE-2025-27309,1,1,f8efb05aa3b70d675c30adb3faf609d480fec3c2965b4a78695cb91a8c9d33a2,2025-04-17T16:15:36.720000 CVE-2025-2731,0,0,febe4920dde8cc8d5dd78bbc47bfecf52e8fafaf30d7b64cf83ef4c45b0dcf79,2025-04-11T20:15:23.677000 +CVE-2025-27310,1,1,3ea2fc0768eaab70ad06bec6490bd2bdb869290aa64434ed9c2dc0475763d05c,2025-04-17T16:15:36.850000 CVE-2025-27311,0,0,887daf3ca5e659c3544c21201f804fbc1bf8b2cd8c00da7ecaf2899ee756ead7,2025-02-24T15:15:16.783000 CVE-2025-27312,0,0,b581bf2145bb64186de8cfc506dddf34a2209eb697269956dc9c4e9722d7a127,2025-02-24T15:15:16.917000 +CVE-2025-27313,1,1,c16d005d80b404c481b7f0108eb413e1177b56e6b1233b4427d296bdf9c9d87d,2025-04-17T16:15:36.980000 +CVE-2025-27314,1,1,99c134a263618546ef532530d6c52114b134ce8709868cd75659c2f198e44da4,2025-04-17T16:15:37.113000 CVE-2025-27315,0,0,6e14eabdb3c0e89a0edb103c9452c91b7720a99d50fe2048c64c3b2ac69e2725,2025-02-24T15:15:17.047000 CVE-2025-27316,0,0,78a664ed18e2a3f09c84cff8eafbb3e667c271b347b6c49cb4057c71b6fb2f84,2025-02-24T15:15:17.193000 CVE-2025-27317,0,0,6890f6ed99867285ecccef44abce2bb31cd702302b365d74843fb1b631d8a7e0,2025-02-24T15:15:17.353000 CVE-2025-27318,0,0,01062c1cc7b69a94a4b00c3bba687232094c6f37680977c56572c43c965cbcbe,2025-02-24T15:15:17.487000 +CVE-2025-27319,1,1,20c49784a6d69e5fbb4e123e60e73a9330a59bbbdaaab143a61eb077322b60b2,2025-04-17T16:15:37.240000 CVE-2025-2732,0,0,91eb64f3a8bcc02556b497e701ba65aee1eded4ed4ab5df1bac85e8bed0cb9b0,2025-04-11T20:15:23.793000 CVE-2025-27320,0,0,8ddde046a5073fb57db51ac32c278ea72fd103a7b6698e137a1a5af8558b1579,2025-02-24T15:15:17.620000 CVE-2025-27321,0,0,57e789f06d16f73e5a359b61adef9f6f0ec207245e4ca47b20a61f61292b4b5b,2025-02-24T15:15:17.753000 +CVE-2025-27322,1,1,302445d00aa6ff8b9b86f423ddaf6060c33aa1ea03287fbc4ba64ef29c35c7ca,2025-04-17T16:15:37.373000 CVE-2025-27323,0,0,6b3c8bfca9a52e8e86879d19ce880fdf9f7a54b902cbc68d3d2a6df3d91b39a9,2025-02-24T15:15:17.887000 +CVE-2025-27324,1,1,53593def717159140478d535a6035ea713815edc7dabcff6bfa66591d43f4750,2025-04-17T16:15:37.503000 CVE-2025-27325,0,0,2feca2633771fc2778abc5f38ebcc551352c349ceee670498f95fc6c1e87006f,2025-02-24T15:15:18.033000 CVE-2025-27327,0,0,73e4ff5d75ca094725c80bbb276cee17166e5d6bda85688614f42774de023689,2025-02-24T15:15:18.180000 CVE-2025-27328,0,0,9ac63c0efda7e823e787a6bf7f7ca2b667f253a4b196d2b6272f78f509f1a1e3,2025-02-24T15:15:18.337000 @@ -287453,14 +287518,20 @@ CVE-2025-2733,0,0,bf46e5614f09ae90fa642018137089329f243636a5a5948b5f74683a7d94b9 CVE-2025-27330,0,0,4a3c85d3300acf7aeaf7b9136a8c923fd2dc64428bd25f55706a41ce24fe482d,2025-02-24T15:15:18.660000 CVE-2025-27331,0,0,b4f05d00e2bf569314c912b0764177d1d8d47d5773915702f8e641cd511221ec,2025-02-24T15:15:18.827000 CVE-2025-27332,0,0,31f402611a17073c1bbfd3334e06d7e83c5cff349ececd07e578c8e2f6a2bec4,2025-02-24T15:15:18.997000 +CVE-2025-27333,1,1,836dd3f143f4e679b178b887201f78f1d0aab1f84c6b8e3e887517bb3acffc95,2025-04-17T16:15:37.630000 CVE-2025-27335,0,0,8e94c1ffe8876148eec211931a18f6febc6227f42459f0d9f02eb41d45dd74d0,2025-02-24T15:15:19.137000 CVE-2025-27336,0,0,153624018536172f913b4775b44367fbae99b550f8c3629f5fcfb3cbba878970,2025-02-24T15:15:19.283000 +CVE-2025-27337,1,1,7da0ea98f5e97a59e06eadc04f2a918f9093c2a8aa97a471533f26bfcbbfbef9,2025-04-17T16:15:37.780000 +CVE-2025-27338,1,1,baeaa7c614c640e50cedaf67a8ab07092cc7b22f09e2159b966a43656353dc6b,2025-04-17T16:15:37.913000 CVE-2025-27339,0,0,3fbd3aa4d372f3fc4f2dff6ee0bfc45e8bfde18beafc209811c6553c3c94b8b6,2025-02-24T15:15:19.430000 CVE-2025-2734,0,0,62cf513d5a8c0ed02c1d49875504a2e6cc42b1f633fe0cf69a517b8b60a36aef,2025-03-27T16:45:46.410000 CVE-2025-27340,0,0,6168e54bc786e77b29b91c7c3b80e9b9398f09c620662550160cde5b77c134ae,2025-02-24T15:15:19.567000 CVE-2025-27341,0,0,e05e7beaf389b5a40855730fab894049c892bea0f24014e97cee6db4357b506f,2025-02-24T15:15:19.703000 CVE-2025-27342,0,0,99a7f013ad0dba5c2ee3e71d6e9e0ab050d3772e40fc2a54c4fe001fe44e84ce,2025-02-24T15:15:19.833000 +CVE-2025-27343,1,1,a59fb2ded11806c258731642659ee5a5edb1343b53c8e4be957bec18d176905d,2025-04-17T16:15:38.030000 CVE-2025-27344,0,0,1925125d1b67ee584116bdf7bb9722a8cf9c9e5407f38ffb5c92c8c041e3e009,2025-02-24T15:15:19.963000 +CVE-2025-27345,1,1,350bd014325d1d3e36f0329e73ce0f31690c07ebd7018b97c4ddabaeefff018e,2025-04-17T16:15:38.160000 +CVE-2025-27346,1,1,65a84abb64e018a1ff089fdfd80a92ffb4af23f41d1cc296a8861ab5e147bab5,2025-04-17T16:15:38.293000 CVE-2025-27347,0,0,3fdbce57cbd7cf9b851b9749f5fd4da47fb732dc78c83a918bad725aaa5a94c8,2025-02-24T15:15:20.097000 CVE-2025-27348,0,0,3686c4d4f42e07032d88980aee28e858de101bf7a08266196762e9d8b82190d3,2025-02-24T15:15:20.230000 CVE-2025-27349,0,0,e565e2e7ab823e8ce368b7ce159ee5c9e5e2d4b6fffbb00c33c3f2c793cedd78,2025-02-24T15:15:20.363000 @@ -287469,6 +287540,7 @@ CVE-2025-27350,0,0,48b847269b0df07eb4726331264fe30a4e555f2caa359be16a7bfc9690419 CVE-2025-27351,0,0,9657ca223cec84786da24feeeaeda53aea8b5d50584170f4a11add562ce066bc,2025-02-24T15:15:20.503000 CVE-2025-27352,0,0,9ab0d9fa36fc0dcad2f4106dc12e198c4472bb7fe0be465b550fb73236bf2fbf,2025-02-24T15:15:20.643000 CVE-2025-27353,0,0,24ac6ebce3848378b1344a6468f91efd03d707d9d99a1f55a994a6db165def0e,2025-02-24T15:15:20.780000 +CVE-2025-27354,1,1,d09d52049805f89f89840de50394990b41dc0d5ec5e248e3ff4cc3858b233023,2025-04-17T16:15:38.430000 CVE-2025-27355,0,0,caa62ce9bbf1bb76cf121e6e89f446abe3d40a89991436a920bab478df84b04e,2025-02-24T15:15:20.917000 CVE-2025-27356,0,0,c6532ae1cc5e3e40abfb75187df6e9c621394ebd78da8fba75994511b24c76a9,2025-02-24T15:15:21.077000 CVE-2025-27357,0,0,906169a569eb5a8ab170c576da5f537f983e8f3b76fbc6f0db581847c8ddd5b6,2025-02-24T15:15:21.233000 @@ -287827,7 +287899,7 @@ CVE-2025-2803,0,0,e47ecd50bab8435762f20a0360685d74e0ceaca5cc3e5df3e0509ccc4da5c5 CVE-2025-2804,0,0,05befb6a988325f06e55dd5b0c814f5549862889b3223abfcf82e08eebaa0244,2025-03-28T18:11:40.180000 CVE-2025-2805,0,0,880e5f81bed603812ce823b5a2b526104be41586e76c7f27af893f077e49d084,2025-04-11T15:39:52.920000 CVE-2025-2807,0,0,f8faf57b374faab8743fa15c01545fe02708770c7c9d6b7c7888f61e54c92b92,2025-04-08T18:13:53.347000 -CVE-2025-28072,0,1,c1c315f88482748c5bf799650bcd2a6c3cf743e3c69bbd24041fcfb3bc463cd7,2025-04-17T14:15:27.840000 +CVE-2025-28072,0,0,c1c315f88482748c5bf799650bcd2a6c3cf743e3c69bbd24041fcfb3bc463cd7,2025-04-17T14:15:27.840000 CVE-2025-2808,0,0,2d9ef6fcbe323df90c90b4e91a51bb82e8f5ef9746894b9f5e9c32273a3c6988,2025-04-08T18:13:53.347000 CVE-2025-28087,0,0,1a24fc8fa031815998ab3cec95d83c4ceea417049d18cb4b484e469d0233d5a6,2025-04-07T14:22:33.160000 CVE-2025-28089,0,0,67dcb00b253159ea36147dba2ae48f5f5632d8f7c0e820c0f6cd1525d263b4dd,2025-04-07T14:20:46.543000 @@ -288017,7 +288089,7 @@ CVE-2025-28941,0,0,d1dc35fbe2a033c04e261359b97e6eb5a7f518fa1842a2a100fc7c3dd1630 CVE-2025-28942,0,0,13661206a69e4d0b8a31139510417b818a8d6f6daa40fe60ee4e3d972c089172,2025-03-27T16:45:27.850000 CVE-2025-28943,0,0,f13533c6ec40779f6c4eb31c17c71b8bf7e67bb9305109da8899c164336e7b7c,2025-03-11T21:15:52.187000 CVE-2025-2901,0,0,0f9760d041f8cccc36ccbc275a992ee13e955e366948eb261a1d4c80f4291825,2025-03-28T18:11:40.180000 -CVE-2025-29015,1,1,02e47932fd6cdd56a133d143ccfe7e56d7ee7786419bff6134ef71c354cf7096,2025-04-17T14:15:27.997000 +CVE-2025-29015,0,0,02e47932fd6cdd56a133d143ccfe7e56d7ee7786419bff6134ef71c354cf7096,2025-04-17T14:15:27.997000 CVE-2025-29017,0,0,91377a5dec7f4c859977641f157a48185a056d6868f195347a73b619d0d865de,2025-04-11T15:39:52.920000 CVE-2025-29018,0,0,bd72c59170866522bd5f75aaac840c425073014b0df106adab360beabfb9c791,2025-04-11T15:40:10.277000 CVE-2025-29029,0,0,39541c2aec3ae7c63f9d62e0a3860448d6ebc46233cbb2f267704a4d9534c15a,2025-03-18T18:15:28.817000 @@ -288027,12 +288099,15 @@ CVE-2025-29031,0,0,fc79f4214f85e8c2dc7f22a3d332d338110c9a0fc6645f125dc5ea2077bde CVE-2025-29032,0,0,12b1441dc9358c5c16def012730045c4192ae6bcec0473634ec29643cb1836c3,2025-04-03T15:46:23.280000 CVE-2025-29033,0,0,5eca366ad2f6b7bc48c9c10555d9d4de9f98752ea608be3c325a7269b2a18fae,2025-04-04T21:15:44.653000 CVE-2025-29036,0,0,1cfdba0275e788d67daeea9f29674422f2b95f026fe7bf91e23dbade8cbd52ae,2025-04-04T21:15:44.813000 -CVE-2025-29040,1,1,1554c54c8dd7f050168c40dec79caf596b37068f2dcbc75edd5ec78512b84cd0,2025-04-17T15:15:54.387000 -CVE-2025-29041,1,1,deb47a1791636308736f2b6556d349a828df4311d262978d203e4cca77cea274,2025-04-17T15:15:54.520000 -CVE-2025-29044,1,1,36dc65876b4972d9418ab2c170874495bc694da742c89ea072a136cf1b31bacd,2025-04-17T15:15:54.717000 -CVE-2025-29045,1,1,03a47e4e2473f071ae45dfc0226446844a87c0c00ca33c09d9fc31979a07328d,2025-04-17T15:15:54.877000 -CVE-2025-29046,1,1,f055d4702d09bbd15f7f3b71e3a5dcc0cef680ccb2077b9cb481a41fdf14f66a,2025-04-17T15:15:55.013000 -CVE-2025-29047,1,1,6a931409e344f205e3a347cf1114dc9273dfdbc2f5e4e2727cce2c3447caf676,2025-04-17T15:15:55.140000 +CVE-2025-29039,1,1,515775ed38704271043b6313044429b2dccd82b29af2d6b9e493851d5b329bce,2025-04-17T17:15:32.797000 +CVE-2025-29040,0,0,1554c54c8dd7f050168c40dec79caf596b37068f2dcbc75edd5ec78512b84cd0,2025-04-17T15:15:54.387000 +CVE-2025-29041,0,0,deb47a1791636308736f2b6556d349a828df4311d262978d203e4cca77cea274,2025-04-17T15:15:54.520000 +CVE-2025-29042,1,1,df553505e18fc0fe818334e0577f68f2ffb1092079dc477b74b3cb2b7a60c538,2025-04-17T16:15:38.560000 +CVE-2025-29043,1,1,2bdd75891ab5f8bed1816fbf611e61f957790799a9877bd181e272a0d4a32939,2025-04-17T16:15:38.657000 +CVE-2025-29044,0,0,36dc65876b4972d9418ab2c170874495bc694da742c89ea072a136cf1b31bacd,2025-04-17T15:15:54.717000 +CVE-2025-29045,0,0,03a47e4e2473f071ae45dfc0226446844a87c0c00ca33c09d9fc31979a07328d,2025-04-17T15:15:54.877000 +CVE-2025-29046,0,0,f055d4702d09bbd15f7f3b71e3a5dcc0cef680ccb2077b9cb481a41fdf14f66a,2025-04-17T15:15:55.013000 +CVE-2025-29047,0,0,6a931409e344f205e3a347cf1114dc9273dfdbc2f5e4e2727cce2c3447caf676,2025-04-17T15:15:55.140000 CVE-2025-29049,0,0,5d330c70d7d31103316e937aa271bd3496ea507fadb908ea97bf504a0ca30485,2025-04-02T14:58:07.527000 CVE-2025-2906,0,0,a9a7d8b41557888835e1c79dd2617916cc6b4f3c0d6d09861e305343a3b52d6a,2025-04-01T20:26:11.547000 CVE-2025-29062,0,0,8b038be77d187e96d12580474b403cb7fa145ff3ea4b7563c5f09cb9c8bff2e3,2025-04-07T14:18:49.830000 @@ -288062,11 +288137,13 @@ CVE-2025-2915,0,0,70cc8be03dfb35b9ef84c0237ac359de350c3b4b4245e9a89d1955b7eff260 CVE-2025-29150,0,0,830ae278210dc8950b4025bdf811095dc9ceda7da749b4d24c53ea4d187bdb2f,2025-04-15T13:50:15.537000 CVE-2025-2916,0,0,a9d32a009c2c479d4d99380c6f5c7dc74ee32d7bcd65aba7c50dbefe66cc315d,2025-03-28T18:11:40.180000 CVE-2025-2917,0,0,456c071352ee17bf9505ffdef668916785181adeea61153a444057728f3de9f2,2025-04-14T13:53:30.877000 +CVE-2025-29180,1,1,8b69d0bef5186294819db02c2909a7d280a190128fc49eac7dbaf27182c6d039,2025-04-17T17:15:32.953000 +CVE-2025-29181,1,1,6962811acba042deea6694d4c7d7dde37f392a00db1bfe294f4588e9a2b7e9bc,2025-04-17T17:15:33.090000 CVE-2025-29189,0,0,8f05af4418320348346691aa7f962df7a836889ea838607875b166fe868cccb7,2025-04-09T20:02:41.860000 -CVE-2025-2919,0,1,1d818e3cdb60bc40bbb8474c5c52d97f9dd37ab065859a371a6909ea5f7a7aa2,2025-04-17T14:06:09.157000 +CVE-2025-2919,0,0,1d818e3cdb60bc40bbb8474c5c52d97f9dd37ab065859a371a6909ea5f7a7aa2,2025-04-17T14:06:09.157000 CVE-2025-2920,0,0,2401864f099a711f30f8b2d38398a72d7195f85541e7f19ba35b8b1ff663c52a,2025-04-01T20:26:39.627000 CVE-2025-29208,0,0,67e2605039ee3d1f3c5ea9f6fc4b9f6bb3ff72ecfc77443b4593d17db1d38ecf,2025-04-14T18:15:29.100000 -CVE-2025-2921,0,1,9699494d9e2188360f8bb70978c1473b6fd42ed7b51cafd5be6de03ad5519768,2025-04-17T14:21:41.600000 +CVE-2025-2921,0,0,9699494d9e2188360f8bb70978c1473b6fd42ed7b51cafd5be6de03ad5519768,2025-04-17T14:21:41.600000 CVE-2025-29213,0,0,172733fea2fc22e3f19419035c42769bf9f62e27d9750138e6e34cfe0f4283d7,2025-04-16T19:15:54.063000 CVE-2025-29214,0,0,2f3c93fd24943456f370bfa5c5d58e2eb2d54f2259ee734aa123f6beaa43463e,2025-03-25T17:37:42.507000 CVE-2025-29215,0,0,96e2f565718ae35623a5dad2291d2bb27d05c2c10bebe7c06ba56599d76124a9,2025-03-25T17:38:20.710000 @@ -288080,7 +288157,7 @@ CVE-2025-2923,0,0,0127ed7eb29b6408a9d060a0a3c5fc22e3f1952b120dab3b5645aa8d85c685 CVE-2025-29230,0,0,a96d6f25884fce83e2e6e66d008df496713f73ab7711eea3506888e7dec9bf9e,2025-04-01T20:28:51.790000 CVE-2025-2924,0,0,035b342e4739e959d11faebc838ea9c953beab2ad201da68f4190d4779a05c84,2025-04-17T13:13:27.960000 CVE-2025-2925,0,0,6e6057af1505bd2aca9814f533b29610886f80d850b5e22863ae1d8118c6e560,2025-04-17T13:11:07.250000 -CVE-2025-2926,0,1,ff1a3a2f56ae22a8e0a529aaa06dacf663678ee8cc312c431a50a47697b395d6,2025-04-17T14:31:21.250000 +CVE-2025-2926,0,0,ff1a3a2f56ae22a8e0a529aaa06dacf663678ee8cc312c431a50a47697b395d6,2025-04-17T14:31:21.250000 CVE-2025-29266,0,0,ebe0e382c4a5abdfbad4d36c3a40b9356ea4b38f02b497fb84326608368d7b76,2025-04-01T20:26:30.593000 CVE-2025-2927,0,0,7f5ccbf74e8614d1ffa159b8af7772e0f2741b8003c2ff25a8317d72824fcb99,2025-04-14T17:09:19.427000 CVE-2025-29280,0,0,3791042cc6babca68a5c51080adf7ec6abebfb061e5cf8f6357f5c61c91ab18c,2025-04-15T18:39:27.967000 @@ -288126,6 +288203,7 @@ CVE-2025-29431,0,0,d467a56b9c5c57e54c01aff6a53ffdd59b78e3e6577e8a72af651975cfade CVE-2025-2945,0,0,5701c477425c2a81bc66d944f3bb97a7255b4c935bf92c67bb01910b6829ab38,2025-04-07T14:18:34.453000 CVE-2025-2946,0,0,d1b6bc216dd9866fedcefbedd5d27e2a55560ea3e179cb5e876100bee6cdba81,2025-04-07T14:18:34.453000 CVE-2025-29462,0,0,2dbf51a848bf77ad433e707ac24330b357114ddd7a825b863e5708fee007dbfd,2025-04-07T15:15:43.373000 +CVE-2025-2947,1,1,84237bccb398283a00d02af635a4c8eda536544a16e27efd812f78951fd25b6e,2025-04-17T17:15:33.490000 CVE-2025-29471,0,0,37360b40d1334d250de2869160d5d1252a70dd4ab4c4cab76bc32fe760f5efc7,2025-04-16T19:15:54.220000 CVE-2025-29476,0,0,3010ae735c879d92a342e7748811b3946ae8287c6c80f89374bb498690e8bd18,2025-04-07T19:15:55.790000 CVE-2025-29477,0,0,2b1c163b57b7284c39b710b65fa772d27c2dfad0127610dec2abcbdeeac4b145,2025-04-07T19:15:55.950000 @@ -288172,17 +288250,19 @@ CVE-2025-29648,0,0,3da34d143cb76b9e6cdc7f07c5a45cdfc6673e59bed4a387a91eee3a985ae CVE-2025-29649,0,0,7ee42729c8da140fc26bbe04aabbcdc7696a5ad9859c7d032fbea5ba895dc252,2025-04-16T21:15:47.147000 CVE-2025-2965,0,0,b1d83303c83fa5c453f89d281c2631e556dad3281735af3c32f95354d255295b,2025-04-04T01:15:39.727000 CVE-2025-29650,0,0,12ba4c5d3b709b2e4a7aaf3779615fbf88a7cfa9742f4a27b3b6f2ad14e3f87c,2025-04-16T21:15:47.307000 -CVE-2025-29651,0,1,d626ab872b7901373534108cbf038ec3cc2f2bac408ddc67604bedab51e3b7f7,2025-04-17T14:15:28.157000 -CVE-2025-29652,0,1,246cbedde40a2fdae7e5bc3bf81706b83323d4d129e86823e79a5cb50fef8f75,2025-04-17T14:15:28.330000 -CVE-2025-29653,0,1,0f0c7c2bbe8acfc1fc1489f7fb45039a9a5f9c44dcbb7bca536995eea2ae9797,2025-04-17T14:15:28.537000 +CVE-2025-29651,0,0,d626ab872b7901373534108cbf038ec3cc2f2bac408ddc67604bedab51e3b7f7,2025-04-17T14:15:28.157000 +CVE-2025-29652,0,0,246cbedde40a2fdae7e5bc3bf81706b83323d4d129e86823e79a5cb50fef8f75,2025-04-17T14:15:28.330000 +CVE-2025-29653,0,0,0f0c7c2bbe8acfc1fc1489f7fb45039a9a5f9c44dcbb7bca536995eea2ae9797,2025-04-17T14:15:28.537000 CVE-2025-2966,0,0,4b9026ccd40e00fcfd51a7652f6490239e965ca285425fe097bdd2da5faa6bb0,2025-04-04T01:15:39.793000 +CVE-2025-29661,1,1,ff451eb175945a0d5a47750e9c20d65668d3d4a8ea340c217f8c58b462794338,2025-04-17T17:15:33.220000 +CVE-2025-29662,1,1,6ff0ad3cf42976d4f461d5128796f4a2ef4417cf3f124a5d39b3f1860f199fdc,2025-04-17T17:15:33.350000 CVE-2025-2967,0,0,14b33c1f634d82e0ee8f6eba9d8900eb26f8e5ef6b28fe9846307dc0432895cc,2025-04-04T01:15:39.857000 CVE-2025-2968,0,0,2f5310773b41e32a0609f9013ca63505bab1761feb2b83c508abd214cd1156b1,2025-04-04T01:15:39.930000 CVE-2025-2969,0,0,2c92f9aaf929a695828188a9354c9039b1da27ec28571736050e209bd0423cad,2025-04-04T01:15:40 CVE-2025-2970,0,0,67c007e67877a94fb703f9d730b81129ea1f6387e2e40954ff831fd4807254f0,2025-04-04T01:15:40.067000 CVE-2025-29705,0,0,d50bc7403680eaf9635e360140860dd9bb945ed47cbe680766215a624ae6d64d,2025-04-15T19:16:07.783000 -CVE-2025-29708,0,1,f00a65509dceece6c16cb9548d7fec658d4188a4f2cbf056f52c39d8b4c3e0b3,2025-04-17T14:15:28.707000 -CVE-2025-29709,0,1,fb17569faa7a8171e3237d6481f1b1177b984a8518f4ceed9fdda9bdb770650c,2025-04-17T14:15:28.860000 +CVE-2025-29708,0,0,f00a65509dceece6c16cb9548d7fec658d4188a4f2cbf056f52c39d8b4c3e0b3,2025-04-17T14:15:28.707000 +CVE-2025-29709,0,0,fb17569faa7a8171e3237d6481f1b1177b984a8518f4ceed9fdda9bdb770650c,2025-04-17T14:15:28.860000 CVE-2025-2971,0,0,2706995c55a7dbc3fec5708d9b29d92444bde85b5e349db5ecc56094ac7bd4d7,2025-04-07T23:15:43.050000 CVE-2025-29710,0,0,dee2aeeefd0cbcfd27cec824c1f69b3a17aead5c60c2a7ae2f11b184679dbfa4,2025-04-16T21:15:47.673000 CVE-2025-29719,0,0,8e7057a22540e0bc6e719ee80087d1e3317b2b2e7c0e51bfcdcdafe3f5440328,2025-04-10T14:27:50.553000 @@ -288415,7 +288495,7 @@ CVE-2025-30211,0,0,6f934d1391ac57ee0e441fec63067c5b8a66d2fe9be5fdffdfe7b65e836f0 CVE-2025-30212,0,0,972410e2716e8f2e53ffd488d4d423564ff98176b3c1d36a04eac762d7cbcb18,2025-03-27T16:45:46.410000 CVE-2025-30213,0,0,9bc622ae8e82b32e191467dd2fc76643485ad29790111a6b5bc5c8f5ed285211,2025-03-27T16:45:46.410000 CVE-2025-30214,0,0,18b0a8e5b0aa52930309829b5c50a4314f3b9445c89b2192f63b40d54ef90591,2025-03-27T16:45:46.410000 -CVE-2025-30215,0,1,480c3a7617ec16fa868e2edbc3504d996bb7edba5c7b10c94e633733180d83d1,2025-04-17T15:15:55.317000 +CVE-2025-30215,0,0,480c3a7617ec16fa868e2edbc3504d996bb7edba5c7b10c94e633733180d83d1,2025-04-17T15:15:55.317000 CVE-2025-30216,0,0,4a4e5b54f04495c4df1b80922555eeaa5f35ae1f03a9f789985b2bdeebb439d3,2025-03-27T16:45:46.410000 CVE-2025-30217,0,0,255ed4a5f5d331010e4f8f80bb9c804fc57df9c07f06a9ea33aa8ab1adac0ffe,2025-03-31T13:15:45.683000 CVE-2025-30218,0,0,0938dca1e8d47564f064f28410796b8b85eb62ded957e7109b8e0c2e3158457f,2025-04-07T14:18:34.453000 @@ -288959,6 +289039,7 @@ CVE-2025-31002,0,0,ba99c9096fdd3939df3ca31d43466912b766252202b3b421440a181cc386f CVE-2025-31003,0,0,2736549923e37a730c5262e14427e9b35cc896f7bc1fcf03b2ef999e90bcf5cb,2025-04-09T20:02:41.860000 CVE-2025-31004,0,0,1c721c90a5d8c7fe897d860ac0ad025214a2363df8206f71c0b40013d946b7cc,2025-04-09T20:02:41.860000 CVE-2025-31005,0,0,ceb79a2f36fcb390061964b11e10127964f5604b0d6b95191e77fe9337f633e8,2025-04-09T20:02:41.860000 +CVE-2025-31006,1,1,27d311c4aa6f5ee82b7d2e4ab229e22abb896b7f75bd2bcfe61c2749bc671f0b,2025-04-17T16:15:38.970000 CVE-2025-31008,0,0,574e1cf42f8a16e13e787c6fb8ae3504d667cff8301f5b3817d1be7163f33d9b,2025-04-09T20:02:41.860000 CVE-2025-31009,0,0,00ef1dcb50827d398a2f6c01ffba26a90073ce49541136b216e5baa33ed8b4e8,2025-04-09T20:02:41.860000 CVE-2025-31010,0,0,c1f5ed11290de791a7c3fbb3f13d7b367feca7817eca67ce914a4ef488ac6cf5,2025-03-28T18:11:40.180000 @@ -288968,6 +289049,7 @@ CVE-2025-31014,0,0,05a65cf1c53aaa3729696e93139ef997043ba9893b8c9b11b54bf89e71367 CVE-2025-31015,0,0,cc9d5bb58bd9acbdec8dd13e2813c11ba30f9d64e279f9a8cd7570dbb05b8b09,2025-04-11T15:39:52.920000 CVE-2025-31016,0,0,9f9353b55280d52026be79b202ae8bc2b442e0024607fdee2a6c539bec9857cb,2025-04-01T20:26:30.593000 CVE-2025-31017,0,0,4d15e426e44fc80241be23dec538166170b7e58fdf6f1e6ffe3f4a6bbdf70361,2025-04-09T20:02:41.860000 +CVE-2025-31018,1,1,abcdaa137428373a8b06f06d8296b7aa95f64f856cee5d394ce741250c17321a,2025-04-17T16:15:39.097000 CVE-2025-3102,0,0,9c4ff38556bcdb14ac2775e48a2e31e8e52dc53cbe7c5d18a0dcd91a18882777,2025-04-11T15:40:10.277000 CVE-2025-31020,0,0,7e2e00eca59f243d0beec980806f16099342ab07866da05064b3c4742d7e81ef,2025-04-09T20:02:41.860000 CVE-2025-31021,0,0,5e198c1f2cf0cbdc7790475dda4dcc0a1f65322a9e0fb3a2fc32c0ec4cdae5d7,2025-04-11T15:39:52.920000 @@ -288975,6 +289057,7 @@ CVE-2025-31023,0,0,b2b6dfb4fff9d3759d0e8242dd466693eb363f1c7ae0a1b9a5f68a061dc5a CVE-2025-31024,0,0,f13bb7564e2d955fe9c74ce3d5d82196ceac98ae0a3fb4b1ae7d33aec0a3a8af,2025-04-01T20:26:11.547000 CVE-2025-31026,0,0,254b219c6491f5a7e38a4af9c5c74d846ca2f862f1957eae5acb00be5bfdce97,2025-04-09T20:02:41.860000 CVE-2025-31028,0,0,ebad35846cd78b12d03c51b6b71e44d0624e34aa5a05101e27fce9486d87ebd4,2025-04-11T15:39:52.920000 +CVE-2025-31030,1,1,e8a257e44f82a0aefd0a93c58ecd09b336f83b16de25800599f81204700c2d50,2025-04-17T16:15:39.220000 CVE-2025-31031,0,0,151d32b9da3d458fb821a908a76d8bafa5c8bbe7678b62350f41abb290ba4283,2025-03-28T18:11:40.180000 CVE-2025-31032,0,0,e4c20395a033e95e16a3cd7eee015003ddb05f299ac311a0b4dd4c07da3ce0e6,2025-04-09T20:02:41.860000 CVE-2025-31033,0,0,840a89b6a6fca121cfba44c8138c52066a8fe2d84b54cf8217e967669e52c58c,2025-04-09T20:02:41.860000 @@ -289133,6 +289216,7 @@ CVE-2025-31377,0,0,ded8881679c5020d0df6dc7ae355735962f8a4ba87ddf5677ef0f7b94038b CVE-2025-31378,0,0,5d8a1bb2245acc51e6a6ef8d8dc56ddc0a089171a287963f68684bca4ec62143,2025-04-11T15:39:52.920000 CVE-2025-31379,0,0,b14ef66902d1a6ebb9237bc69982d51c1cea06fae11df03e3a6df897650f5fb7,2025-04-11T15:39:52.920000 CVE-2025-3138,0,0,3a391b3973806b7c959b34db1fd6ebd0ddc97a57ffcf6e3917f0522b59cc1954,2025-04-09T20:17:06.037000 +CVE-2025-31380,1,1,d875e6381ef83fd34fb0da2d107e5cc8fc718c27e0404bcacf97dbe4e0f1e7eb,2025-04-17T16:15:39.347000 CVE-2025-31381,0,0,ef752b2c9c7c29a3c84fb86d4ef143cb9b4c68b6405ca16b3456144622287ed5,2025-04-07T14:18:15.560000 CVE-2025-31382,0,0,72868a42f74c64c3416a52f6144b8bdd077c31ef3b9e95b1383174e5a95f206c,2025-04-09T20:02:41.860000 CVE-2025-31383,0,0,dc0ac9a6c594802e6b2cb9fa26312c2fe646b29b40c26cfb5b5a580972bacd9d,2025-04-09T20:02:41.860000 @@ -289414,12 +289498,12 @@ CVE-2025-3172,0,0,30e87904870fb7281a65c37665525acd4a3d1c12b0e1b13d031a33e5fa50c5 CVE-2025-31720,0,0,7112e2000d0afc3538061e21db44fdb2bdaa7fa3f0fba7fa752331c2a5227d90,2025-04-07T14:18:49.830000 CVE-2025-31721,0,0,1e46c70477074f73bf7362f9c1b949d6e28f21df06309eb1de8fb770ff7082d4,2025-04-07T14:18:49.830000 CVE-2025-31722,0,0,7f20d939901461325ec66d9c31b10327b410b3f828097defeb6ad4e5e7dd62ab,2025-04-07T14:18:49.830000 -CVE-2025-31723,0,1,30b5e88e8d99eb1db5cb0a8a5050603ecaba420c5c15ac5355e1cd26f8adf563,2025-04-17T14:53:54.407000 -CVE-2025-31724,0,1,a5a771509d718c1d4ac828aad58a78980e8af3bb9aad0e7d4915737683f42b52,2025-04-17T14:50:40.210000 -CVE-2025-31725,0,1,c0d02b62de87ae968353379bd3225ede448dd6e0f557889acebb2f4f5de8ab57,2025-04-17T14:47:55.160000 -CVE-2025-31726,0,1,085930b7fafed945ffec03ca15b0ac4ebb5140c023f3cf130c50afcb4d4d4e45,2025-04-17T14:45:33.123000 -CVE-2025-31727,0,1,d54d8919bb69581c42bd0032ac7f0a551ecf6684d5ee9394afecf87ed99cae62,2025-04-17T14:38:18.480000 -CVE-2025-31728,0,1,1fbc4227e0f3e5379c63b0fc0b740ff21e27bbe6ae33f662074ca1ebefe6b010,2025-04-17T14:35:36.063000 +CVE-2025-31723,0,0,30b5e88e8d99eb1db5cb0a8a5050603ecaba420c5c15ac5355e1cd26f8adf563,2025-04-17T14:53:54.407000 +CVE-2025-31724,0,0,a5a771509d718c1d4ac828aad58a78980e8af3bb9aad0e7d4915737683f42b52,2025-04-17T14:50:40.210000 +CVE-2025-31725,0,0,c0d02b62de87ae968353379bd3225ede448dd6e0f557889acebb2f4f5de8ab57,2025-04-17T14:47:55.160000 +CVE-2025-31726,0,0,085930b7fafed945ffec03ca15b0ac4ebb5140c023f3cf130c50afcb4d4d4e45,2025-04-17T14:45:33.123000 +CVE-2025-31727,0,0,d54d8919bb69581c42bd0032ac7f0a551ecf6684d5ee9394afecf87ed99cae62,2025-04-17T14:38:18.480000 +CVE-2025-31728,0,0,1fbc4227e0f3e5379c63b0fc0b740ff21e27bbe6ae33f662074ca1ebefe6b010,2025-04-17T14:35:36.063000 CVE-2025-31729,0,0,7457d8f244e08a81065167dca8f1fca6ecac1a98fe22f98a99dbb76a55f24385,2025-04-07T14:18:34.453000 CVE-2025-3173,0,0,8f8b841ba1e2f348266a5dff302d72d6ceab97ad01e9763c51d8621075cf2ebf,2025-04-07T14:18:34.453000 CVE-2025-31730,0,0,c46a9ab7d120c9ef66f21af38b1495f6e4beb4d8fa314019709e6a65f9fc57dc,2025-04-01T20:26:11.547000 @@ -289905,6 +289989,7 @@ CVE-2025-32409,0,0,90c935eaf5e08e3e6a0e3e6e3bd5188faa5a2fd80d7fe835b9b19800e46d3 CVE-2025-3241,0,0,594a540ab13070f27db4ae33cd1a92be4d81e360e241a5ce3cde519f3dcc5218,2025-04-07T14:18:15.560000 CVE-2025-32413,0,0,264a0d1d6affdc64cee850b499944750da36d787f6454e6724a671c6b9cc8e84,2025-04-08T18:13:53.347000 CVE-2025-32414,0,0,2fcec998435005e0d1d3c8610833b216e4c5fa674ee9df013c153e6a84f337eb,2025-04-09T15:16:03.163000 +CVE-2025-32415,1,1,343329633d7a2eef578e4cd457ccb55414c1e5c364ff7bf9528bdcfc26ca717b,2025-04-17T17:15:33.733000 CVE-2025-3242,0,0,7a3796558c3172b29f1754f0aa43f7d570abcefa6f88716250c661d5fd24e293,2025-04-07T14:18:15.560000 CVE-2025-32426,0,0,97f7719ef42c67257e2006b52ab9747f51788ff83c926fc892139743aec5a5b7,2025-04-11T15:39:52.920000 CVE-2025-32427,0,0,0416426b54022f69535fafb066a105f3453a61c3cc047d8982deab84a0710a9d,2025-04-11T15:39:52.920000 @@ -289937,6 +290022,7 @@ CVE-2025-32487,0,0,c4a61a7cb9dfb6a8be1ecdde613eb72a3ae196518a9ac12c07fd1657a7639 CVE-2025-32488,0,0,2d89331aac2029ae581b68f375e8a0456b559e8a079fe44dfa383e53ba42dbb4,2025-04-09T20:02:41.860000 CVE-2025-32489,0,0,a8c9c6b52675f172504cba113597ca1113b27ac7e08ac671a750191beccf02e8,2025-04-09T20:02:41.860000 CVE-2025-3249,0,0,733737203692403dc364c9398a90d84cb34e7925fec94f7c4725b719e6f271e1,2025-04-07T14:18:15.560000 +CVE-2025-32490,1,1,96c0d9774ebdd37d48dc10a38fba95bcc5f59e1d4a45cb4012d47a18d294c84b,2025-04-17T16:15:39.480000 CVE-2025-32491,0,0,7ca25a36af00963f97ad2f9328447a993025bc16b08623b955e1c4ad52154f7f,2025-04-11T15:39:52.920000 CVE-2025-32492,0,0,8777f4129f9365ebca81234313a2859ddc6169e4ed8a91658a3200ff4e1b6912,2025-04-09T20:02:41.860000 CVE-2025-32493,0,0,b8d6d0ac660c953509a5b2eaab559380f4c6beb74ababf1f6bb316990dc45d16,2025-04-09T20:02:41.860000 @@ -289951,100 +290037,183 @@ CVE-2025-32500,0,0,d76f4b016c4143b5675175d800eae3709f59a84a0723480b653df8f8abdea CVE-2025-32501,0,0,8ea0b9de76cc778a3d29cf82cd71b628cbc4f922d519dca3c2a1eea411745051,2025-04-09T20:02:41.860000 CVE-2025-32502,0,0,f9af112ce58f5ab3be4860166d630b2963f580c6cce584418ad208614511ef77,2025-04-09T20:02:41.860000 CVE-2025-32503,0,0,2e1433747861ed8ce62fe1171f5dcafc2208210b27da1f97e8c0c8b8e64dc0b9,2025-04-09T20:02:41.860000 +CVE-2025-32504,1,1,39022d31ed3a2d1d1dfcddeb2d6ce992b364ba7ce3719520fa5006635529a697,2025-04-17T16:15:39.610000 CVE-2025-32505,0,0,32f43fca3d5100e5f79824fce97e90e8ff3da234aa5d4f43fd8adbfe63b1f25e,2025-04-09T20:02:41.860000 +CVE-2025-32506,1,1,84648b21fe8c5d404e28a1e686a0ce5f5c8a332bbf33427d0b5dd5831a666ca4,2025-04-17T16:15:39.737000 +CVE-2025-32507,1,1,e920e408a24161eef0db8457e278a0c7c43fc5f75efebf715cdf6f487b94ed98,2025-04-17T16:15:39.863000 +CVE-2025-32508,1,1,0b677949879036a11f06487169f21cb29a6bf61d792f4f5dfd7d1270be20716b,2025-04-17T16:15:39.990000 CVE-2025-32509,0,0,ecb483df86b066705aa236b66cf761eb622f1d1fe441630337ff9d3bb84d04e9,2025-04-11T15:39:52.920000 CVE-2025-3251,0,0,40d0b8ce477fd906963245c3f47c46ed7c4260a43feb20789c6a6db271395106,2025-04-07T14:18:15.560000 +CVE-2025-32511,1,1,3d1cdeebfeed0b73ac995936a9d569185bcfbe26697b5f8ddc00d3e24bfb54eb,2025-04-17T16:15:40.120000 +CVE-2025-32512,1,1,0991a38ebae73ec0117eefedc80653cdd2ef01746375d6735f0fe0b7a54db902,2025-04-17T16:15:40.263000 +CVE-2025-32513,1,1,a713f2db81c76ff4b087fca16155a7a90fb9165625a60b2439c3295c7849da18,2025-04-17T16:15:40.413000 +CVE-2025-32514,1,1,bbe3d389e84cf17305dccc446789810a76a2c47b2b903e208fd4aece025d4b60,2025-04-17T16:15:40.543000 +CVE-2025-32515,1,1,c4aeeb0af7c3d3ecf3ef335c3f49193e112cfa61b680fd9a4ad5ef972446e8dc,2025-04-17T16:15:40.690000 +CVE-2025-32516,1,1,3ccb5079c7a5744989fd17372ec06048f966cd53ba28f9372672125733bfd177,2025-04-17T16:15:40.827000 CVE-2025-32517,0,0,858d88a0ab16e0761aa3e0ff0f31512fd584c83d5434f991538af030f180767c,2025-04-11T15:39:52.920000 CVE-2025-32518,0,0,c5d18b032b88d7705ae4139538571a594e6c803fcfcb9dd18df6c82edde16c88,2025-04-09T20:02:41.860000 CVE-2025-32519,0,0,5190b2cc892e9a70904204ff0411530bb734a8920b365dc77f459d2852496121,2025-04-11T15:39:52.920000 CVE-2025-3252,0,0,4c10de8b3cb60d5dfb9be1c6a515e4b2cff1e60b913ad0965a444629ee6bbad5,2025-04-07T14:17:50.220000 +CVE-2025-32520,1,1,955c6d87541c4be9456aa353188d28a6822b91a4156d251f70dbf1b629141c42,2025-04-17T16:15:40.960000 +CVE-2025-32521,1,1,1daf327fe203618be82a052b123ac4895ab7efa547358ac9b5ef6965788fbd93,2025-04-17T16:15:41.087000 +CVE-2025-32522,1,1,46053b509e6149ad71fa538fb9e67cb212fac7867f066fb6fb764666ffbed278,2025-04-17T16:15:41.210000 CVE-2025-32523,0,0,1fc7b3071ad2c634ef30f406d059623be1c186baa1f7468cb08df43e1272df3f,2025-04-11T15:39:52.920000 CVE-2025-32524,0,0,654369fa344f722c6f1f5c4c36ecaf296f2d3f07a1784adfb3994ad5eb5d0200,2025-04-11T15:39:52.920000 CVE-2025-32525,0,0,d7895870d047a8cc8dbee0604b4140c057835248635c142ee9b53012a7963265,2025-04-11T15:39:52.920000 +CVE-2025-32526,1,1,3b7dcccdb89a7130aeff6520681f24b7cd9717fa71d87f697feecfbb9684044d,2025-04-17T16:15:41.333000 +CVE-2025-32527,1,1,ed19a9590a9773c64eb8b1fdc4a65bb307ba5194f22f9fd96bdab839c9908154,2025-04-17T16:15:41.463000 +CVE-2025-32528,1,1,4c0d75a2e3c00a7fd0cfff0f9a4555442f94a43e4f16808729496b5b9fb71d50,2025-04-17T16:15:41.593000 +CVE-2025-32529,1,1,9ec5e1e5fc8cb450aa886e958b1e013100eafa701a825ca92fbbd57a9590ab78,2025-04-17T16:15:41.743000 CVE-2025-3253,0,0,d3540ac43febefad545d964abd58e6d161a99b9640be648524f895f9994fc100,2025-04-07T14:17:50.220000 +CVE-2025-32530,1,1,a68fabac888434c88946c82bc55f8a586486398211a93929df731b081f2ec45c,2025-04-17T16:15:41.873000 +CVE-2025-32531,1,1,b3410d45ec260c7bd58e2f25ac4fe574e91251e6df06b71b5648a32e8b4e8b4d,2025-04-17T16:15:42.003000 +CVE-2025-32532,1,1,eb98eaae7d997f133908fa6c01ace2a3aefa33efd8c21b32cd1296a6617e2b01,2025-04-17T16:15:42.137000 +CVE-2025-32533,1,1,a31c66f74bf77cefd14466f26714bf3ea5e8ee738c6aeee8d38176eb8af722a4,2025-04-17T16:15:42.273000 CVE-2025-32534,0,0,c5ae22e17ae98a490e5b8a0693657471a74bc8722823562bb4c8a036f75075f6,2025-04-11T15:39:52.920000 +CVE-2025-32535,1,1,becf4b288fc7267427fdd9aa9cee3411f0db8d262be5e54afa4d8f5cdfa44088,2025-04-17T16:15:42.410000 CVE-2025-32536,0,0,8fbcd87f2652c9479b9969718bb4b5ec01ba55e94909bcd760f8385408f5652d,2025-04-11T15:39:52.920000 CVE-2025-32537,0,0,fdbb52830447a8b0fd284fbdd6ae3fb99bd2b5ecbbf2583d4955bca4d34f2c9b,2025-04-11T15:39:52.920000 CVE-2025-32538,0,0,06c420eeb1f8470d426b44e879a6f0d2b61584a8d3c509259a095a027d5a5609,2025-04-11T15:39:52.920000 CVE-2025-32539,0,0,e5bf8d78a20b7dffea7527a3592bcb554cb1f9054399bbed0f41e50b228141ca,2025-04-11T15:39:52.920000 CVE-2025-3254,0,0,48928c45868aa81d54aac82548f85d57c79f7bb7f98d123408d27256cf914e0c,2025-04-07T14:17:50.220000 +CVE-2025-32540,1,1,c991c11a2bca01baded552a1aea7bb72b3a35d7ec2f963facd088aee18153440,2025-04-17T16:15:42.550000 CVE-2025-32541,0,0,9d6860f84c7d5d94ae5a97177fa1e753ece982d78ef0a7232a4af47d1e600af7,2025-04-11T15:39:52.920000 CVE-2025-32542,0,0,a8a2c4d462d81473af5ae5571f0a81079d1c7981d5018aabdd03267d242aacb5,2025-04-11T15:39:52.920000 CVE-2025-32543,0,0,a0ec98623149f1faf000ff90071d5a44b21fe39e340fceafd35caf07c20ca884,2025-04-09T20:02:41.860000 +CVE-2025-32544,1,1,07654341569c5d02bae0d6a058e3475b19df0e7b7f1f0ce0e7c4ad2e59e8dc48,2025-04-17T16:15:42.683000 +CVE-2025-32545,1,1,745ded9a1b80b3a1c3b8f4748f0a5910146cab5f1c83897d1d7f46f504970d44,2025-04-17T16:15:42.833000 +CVE-2025-32546,1,1,e6288376dfc149fdb8f8af980ea4f6c47a2f615d074bec0caf8141e646fb38c9,2025-04-17T16:15:42.973000 CVE-2025-32547,0,0,5c89f4f081a50da795aed38cf58a1893dffebbf046663f20795b9a5873e64eb2,2025-04-09T20:02:41.860000 +CVE-2025-32548,1,1,23f79d728dec5a408e8c8b148d515571018e49baf19bd292bf2991a39488b222,2025-04-17T16:15:43.117000 CVE-2025-3255,0,0,d5353c58983edc47cfd68b6813d92152b05623ed0e06ed0dacfb65f3d812b06b,2025-04-07T14:17:50.220000 CVE-2025-32550,0,0,0d4c615097256a13cc479ea60d0d4d2caeab929e7fcd6b0932b9a19b45f1a275,2025-04-09T20:02:41.860000 CVE-2025-32551,0,0,28cd9e7a2983ff8ec815d18ebb86efac9600b285820b5afab7a5b6c87d080cd5,2025-04-11T15:39:52.920000 +CVE-2025-32552,1,1,3fdc8fb9dcf1703d339a965e5d6a7204b1879934a10b03fa41d65e746a60be05,2025-04-17T16:15:43.247000 CVE-2025-32553,0,0,2f7156823ec5258b0cc23b3c1513fada4e8842975bbfecc511e99e8fe15f2bb2,2025-04-11T15:39:52.920000 +CVE-2025-32554,1,1,2b848e1a2b4618882b48296dc2e0c18d90d37c90863918a484f5a21ac176b815,2025-04-17T16:15:43.380000 CVE-2025-32555,0,0,0a7c9e2c1c845d6198d5b4f9f837e1ae7878e89b18294ef15dbb0aaea928178a,2025-04-09T20:02:41.860000 CVE-2025-32556,0,0,11f6b21408a67b77be665e8d5a60c7dff1e3179fa92e048ba402b95b4905efc2,2025-04-09T20:02:41.860000 +CVE-2025-32557,1,1,fd31330da6b808fbba24a3497cf71b6f3721e0d453381708c0c1fab4fad9953c,2025-04-17T16:15:43.517000 CVE-2025-32558,0,0,cfd0da4f08b10f84bfd1ff4df90206170eaaa9077e48a7337e358049cd93d097,2025-04-11T15:39:52.920000 CVE-2025-32559,0,0,44534358b3bdacf0a15d17ec0dc2bcf5f03de48f15cb4acab01891d94e681177,2025-04-09T20:02:41.860000 CVE-2025-3256,0,0,cba4962816ca9028f309f7d49dc62bb1e7562a0c6842a2b632328c7e8082b66d,2025-04-07T14:17:50.220000 +CVE-2025-32560,1,1,1afef3295cd8904e5be739308687596c7bdf0c5498423476ed30154126604e98,2025-04-17T16:15:43.653000 +CVE-2025-32561,1,1,d5b494ce875546b8b3265c78d858a06e4f3cd840e3da886e5ab4403835377614,2025-04-17T16:15:43.797000 +CVE-2025-32562,1,1,ad46be463356a3996869cb21e88abc06179517034e6407d45e06443962f9e528,2025-04-17T16:15:43.923000 CVE-2025-32563,0,0,20d8af6efd9413fcc0a758d9147bf9be8014b979df7435a0a5eeea273d9083bb,2025-04-09T20:02:41.860000 +CVE-2025-32564,1,1,4262dabbfe897ddc7e15f16176836e913e8caa591f76a1c6603f0406f883e415,2025-04-17T16:15:44.057000 CVE-2025-32565,0,0,d45a3e51a0e03ec513853e7c4c24b1fee2564bd0fb3e3a7df6b1dac1eeaf5ff1,2025-04-11T15:39:52.920000 +CVE-2025-32566,1,1,e348bc20e9b00da1f224cf202cd8b1cce07e87f494fd875b9a2d8f8b4d345b8e,2025-04-17T16:15:44.183000 CVE-2025-32567,0,0,34d62116ffabe56dafbc306f269930a343738562d337f554da088047a262ca14,2025-04-11T15:39:52.920000 CVE-2025-32568,0,0,bbcccaa757bc480c308a08abdee2efd19a89e86e66d409755954b789b388ebce,2025-04-11T15:39:52.920000 CVE-2025-32569,0,0,2e20f28428ace98ef4089ff7b40b962e3ae506f272e00a7ff3ae4333dfa9d7f9,2025-04-11T15:39:52.920000 CVE-2025-3257,0,0,d0dbe0934bee18c46d2eb221ac503819fe8076798dceb149ed2cab72d50f437a,2025-04-07T14:17:50.220000 CVE-2025-32570,0,0,af08789ee25aaf69b20b46d400a50332d17ca87fa93d745cbc7a58dd5b3b17f5,2025-04-09T20:02:41.860000 +CVE-2025-32571,1,1,04e0a7bfa29c4f77b7f3eb1e0ed4ed8af4e2a87134cdcd78bb14c97018047837,2025-04-17T16:15:44.317000 +CVE-2025-32572,1,1,c284e96fe0386af9d3f719fd1ac94892cd426d4743c11de5d642e49396f46871,2025-04-17T16:15:44.443000 +CVE-2025-32573,1,1,ad97d180172ec24d417cf99cc8b2c892fb2b87920baaeba3477f89ec8a3a8974,2025-04-17T16:15:44.577000 CVE-2025-32575,0,0,69bb9f98ff6a6129f348d9ad9a926d1203cf521b2dd9ef8bd68b9f530896aeaf,2025-04-09T20:02:41.860000 CVE-2025-32576,0,0,ffe27a600e858356a861f93503e6d772ecbaa7838fe71d5614aabcbed9ffb406,2025-04-09T20:02:41.860000 CVE-2025-32577,0,0,0f080877e2f41d6d6c0f07a397e0ceb897a2e6d27d190efc0486ec12ea4d5d93,2025-04-11T15:39:52.920000 +CVE-2025-32578,1,1,eaee8ace064530f848a4d0cbc205f53b6ee99cddc31a966a77820667c5f36ef8,2025-04-17T16:15:44.703000 CVE-2025-32579,0,0,4488ee3852fa0c6cb4f2ae168d9681e4637b4bd3b2fa1a20129a1d03a81a563a,2025-04-11T15:39:52.920000 CVE-2025-3258,0,0,3615f8f7ebcf8c8b7786ba6b57f5dc9d63bf8e77b09fe3537a64410ab7050162,2025-04-07T14:17:50.220000 CVE-2025-32580,0,0,d418c714451dca743193e90b7004cf9b97091be2a270cd8c017077f92dc411d3,2025-04-09T20:02:41.860000 CVE-2025-32581,0,0,e24d8871b8feb37ffa356b93972082d0619310ad8ca519e03bb498a4315e23e2,2025-04-09T20:02:41.860000 +CVE-2025-32582,1,1,16871a901f32fe45af14c40536f6fe9d478d06fdc051f8cfbd1072af876a9a5b,2025-04-17T16:15:44.837000 +CVE-2025-32583,1,1,2e42a585d9872aca5c4e500205a1dcf699c45cfb70eddca20e487c62459cd92d,2025-04-17T16:15:44.967000 CVE-2025-32584,0,0,a0422078682d2bb2a020bdf57d1d057dfa8f823a6d5935a4865db70656dce7cd,2025-04-09T20:02:41.860000 CVE-2025-32585,0,0,d60501b5eac7238a6e4fbbb5aa27c4b02e43211423f06ca48cd5b24add3108ae,2025-04-11T15:39:52.920000 CVE-2025-32586,0,0,568c68d078f8b39d27913a05c0d577a07c508917cef4288a94cef978879b6384,2025-04-11T15:39:52.920000 CVE-2025-32587,0,0,abdbce43f67286246b6ed9267c47d0d04bcc7f881e0367fad5ed30af19c9fc16,2025-04-11T15:39:52.920000 +CVE-2025-32588,1,1,713be33822d71dd7ba14d9e8e08c1c325baf921755e2ca5cd9cab6f5dd86b4bb,2025-04-17T16:15:45.100000 CVE-2025-32589,0,0,d52a7c889387b7588bff725d5613fb4cdf91c47aaafe68663e122f2804f2aed3,2025-04-11T15:39:52.920000 CVE-2025-3259,0,0,e705e50caf2174f59dfb699e4aa759ceb69dcda3b3d546c93e1b05690cc687ca,2025-04-07T18:19:20.090000 +CVE-2025-32590,1,1,ca076fc522175dc12a9b236203cb972211f6339239fad3a3ccaaeff21d1ed88f,2025-04-17T16:15:45.230000 CVE-2025-32591,0,0,1887d5992cae09a24596028d383d3f28ff6066f40b63e68f60c03fd2c0bcc865,2025-04-09T20:02:41.860000 +CVE-2025-32592,1,1,24966c55a898fc2a642b9951678b1fbce0392a4c52b1183f663ef6572cb9c484,2025-04-17T16:15:45.360000 +CVE-2025-32593,1,1,1f97351948346eeb0752c46bf6173953dc0880597220fb800c438797c902ad75,2025-04-17T16:15:45.490000 +CVE-2025-32594,1,1,8394cf4d4f7131d646f4d7237ee0b33bda4a9e292677e425825362da850f7937,2025-04-17T16:15:45.617000 +CVE-2025-32596,1,1,ba65e6073a3d0c2c000964292ca3877d8990444d05a8cebb8aa20a6678bcb627,2025-04-17T16:15:45.750000 CVE-2025-32597,0,0,55ab5ca6ed3d8b6cf0931426c8147ebabb322fbbc0aae4fae4f5b3289fb12ce9,2025-04-09T20:02:41.860000 CVE-2025-32598,0,0,6637888a854b8af89691a149a7cdf951cb642062abf60cb10c619918f92134c6,2025-04-15T15:16:09.180000 CVE-2025-32599,0,0,2831ce4b5b42e6325ce283503c26f9c21788129405d17dc22b338c3d4b2bbf42,2025-04-11T15:39:52.920000 CVE-2025-32600,0,0,083cfb813b0e4faf3c70b5e5f02105068f0caedfb180899d4577e64e9ef1444f,2025-04-11T15:39:52.920000 CVE-2025-32601,0,0,684526a644a2d5bc9b83c4eb6c253fb64f18b24d4f5112267400e5345b8fc15c,2025-04-11T15:39:52.920000 +CVE-2025-32602,1,1,9add7e58a0d50662c712408bf40145cb2ecaf9cee56237a70d9436dc203b22b1,2025-04-17T16:15:45.873000 CVE-2025-32603,0,0,8385616a4c5ff327375aef17c0bc8f885670c8a6ca5e0493841c9313fe8f8ac6,2025-04-11T15:39:52.920000 +CVE-2025-32604,1,1,0c4ad7ca51c2870cc241b76730f0661ddca294c82edd0b8958247713882dd9f2,2025-04-17T16:15:46.010000 +CVE-2025-32605,1,1,88f819a4acf6fd9d369aeed5a433b0affd8cc15d49f3cc2313e085a1703ada5f,2025-04-17T16:15:46.147000 +CVE-2025-32606,1,1,2a706604d8de9f6300d23ecc36bcecac5ccbb888a03c64aebb5bc9e4ff8e64f1,2025-04-17T16:15:46.277000 CVE-2025-32607,0,0,38265bc8bf31e950ce0d9eddaae6c331e6d40d95828b1da783164822fca5392c,2025-04-11T15:39:52.920000 +CVE-2025-32608,1,1,07b2d737de94c0a5e87dec712abf7e2429d41fefecce685112aa21328b3c29b5,2025-04-17T16:15:46.407000 +CVE-2025-32609,1,1,749271e57b06b47f6ca0ae26ada2a6c1038d667d03c23927328954ec29065df5,2025-04-17T16:15:46.530000 CVE-2025-32610,0,0,a25ad45796b5f5acd8ab3402331ea34b381a9f321b1c6d3cdae0171ab188d6c3,2025-04-09T20:02:41.860000 +CVE-2025-32611,1,1,01fce04e52560493ce7e962c09e04e03656682c20be1e5209341bfb098ef1681,2025-04-17T16:15:46.663000 CVE-2025-32612,0,0,efa99a2dabb352d1a38ccde079a19aeda5059b5f0692fc1193c5fbb5935c1e14,2025-04-09T20:02:41.860000 +CVE-2025-32613,1,1,d3f6b1b62d87ea6ab0523809bf260b750befc06bcfdfe5a087217866eaf7ec56,2025-04-17T16:15:46.797000 CVE-2025-32614,0,0,0c267d6fcb12c4fc9947a4387c716851781dc5b6af0dad0c590e672b67c059ed,2025-04-11T15:39:52.920000 +CVE-2025-32615,1,1,95bfdd4571357b6198d272dcad8f89b89c95ca7a32bb685e98ea049bc0e0b5c0,2025-04-17T16:15:46.923000 CVE-2025-32616,0,0,60896a25617451753658cf2cd6019c47ed9948e1a164f38e18b95e9ff80206a5,2025-04-09T20:02:41.860000 CVE-2025-32617,0,0,9661b5a949800c62844427fa5e646378c73c47d1848559445bcbac54968a81d7,2025-04-09T20:02:41.860000 CVE-2025-32618,0,0,3e2dffa868b047a20340a7319c6706a3dde352ae7874207c3d70a1597ad9a558,2025-04-11T15:39:52.920000 CVE-2025-32619,0,0,04b1be8036bf1c25a4e2653334fbdb6d637490b7f9c97555a40f71ef05d59815,2025-04-09T20:02:41.860000 +CVE-2025-32620,1,1,6a878d847c86d7eb4fb1e577b8b37bba80468b6936cc22da0e094ece342fe843,2025-04-17T16:15:47.053000 CVE-2025-32621,0,0,9afac0f9430fb7aa06a88042a84e3d0fdf6ad0626a0d9442f17bea6025ffa1ae,2025-04-09T20:02:41.860000 +CVE-2025-32622,1,1,a866d5887200631179d5edeef11f8015af48f1dc87bee69628dbb41a1b44e0b5,2025-04-17T16:15:47.187000 CVE-2025-32623,0,0,a19ab0e664b534d2592451cb5de87da1f7935b58975458209ce84e50abe97bd2,2025-04-09T20:02:41.860000 CVE-2025-32624,0,0,2d99316e1e4efab56b5c02b7a21808d35b3190975142ba1f83cd2a781aec51a0,2025-04-09T20:02:41.860000 +CVE-2025-32625,1,1,6689edf9ec54d66955c2353bba9c83ce81acd32fed326226060e2447e5a40388,2025-04-17T16:15:47.317000 +CVE-2025-32626,1,1,b8ff4992792475abb079aea5da732f797cea0d262c23a3f0cc252d6f7c968135,2025-04-17T16:15:47.443000 CVE-2025-32627,0,0,2ce05adac593c463246ee439e6e044a763c1c4fc0542c6bc6722a701c6ebfac4,2025-04-11T15:39:52.920000 +CVE-2025-32628,1,1,29539b7edb0b33d2c72b0f836cf30e351011587bfc3e740a8f559c4006a836dc,2025-04-17T16:15:47.577000 CVE-2025-32629,0,0,a92f9907d30b0b6db2afce1e3db24313c9b35b2708ccf75f8c93c0c10a9249d1,2025-04-11T15:39:52.920000 +CVE-2025-32630,1,1,5f3808d8d5a03fc7208130e9428a6cb3889b87ccc15511340ba5edfcb2aaee8d,2025-04-17T16:15:47.717000 CVE-2025-32631,0,0,98a4a957df97acffc58c06a08d29807a3e2ddf6d4d4dfbf07dcb3cd84a59cb05,2025-04-11T15:39:52.920000 CVE-2025-32632,0,0,26e39bc54319c3de0a0c10d557b9f9955da9030c6dcde1ffebb8eaee6fe7bfaa,2025-04-11T15:39:52.920000 CVE-2025-32633,0,0,4511b96ee939e61d3f20938de8db535603d07e2e1f7c857a29d2da3ed618a891,2025-04-11T15:39:52.920000 +CVE-2025-32634,1,1,82ff938191b2874a0964f3f7361dad37aef16a0c16619c7554e6bd1837360e10,2025-04-17T16:15:47.860000 +CVE-2025-32635,1,1,280f9e7a1fb4a0ad7f2ac54ef64d0cfbd074e9617d3cf22add6bdd1426597366,2025-04-17T16:15:48.003000 +CVE-2025-32636,1,1,879fd4e0c3d812d12cfd15fdb39ec3b9d4715ad058f57f78e184cf0f0d96f10e,2025-04-17T16:15:48.133000 +CVE-2025-32637,1,1,553fb58c4bce292b8d977e2ef683ef64c8208d97614e9c9551fd0412d9e48481,2025-04-17T16:15:48.260000 +CVE-2025-32638,1,1,d1e644d92b04c1570b4a11cbbe9bf81a49fa077b9c9f510950617ab00c5cd88c,2025-04-17T16:15:48.383000 +CVE-2025-32639,1,1,90485c758d2a473dd1e531c346d5d2eb3200aec749249255eea1168d491fa24e,2025-04-17T16:15:48.513000 CVE-2025-32640,0,0,cf49f8ad76a904999cf27486d117c795b1de02a1d0b705263cab94cab97b30be,2025-04-09T20:02:41.860000 CVE-2025-32641,0,0,d04a6f9084570cae3bdbe21b3d3e6cbeacbb39d50f117e6bae39942bd0102f2b,2025-04-09T20:02:41.860000 CVE-2025-32642,0,0,aa532dd331e1bd53f2e3ad431d5751486f9683adee9f60d6fbaabda798c828d0,2025-04-09T20:02:41.860000 CVE-2025-32644,0,0,a8b5c6deaaa33a247e29a30ae12d5a0ed896af93ae59fcf06602b2311ea32835,2025-04-09T20:02:41.860000 CVE-2025-32645,0,0,8037d68896c131632a8e2cff649d68359b8cea9c000bc77c2416246a22591d10,2025-04-09T20:02:41.860000 +CVE-2025-32646,1,1,9944be6831405bc745e69aca90e0e171c32bf269e04461a449c169cc01805680,2025-04-17T16:15:48.647000 +CVE-2025-32647,1,1,1847e76fe18b17b971fe926507d3d8eb6f5b4eb28b72c4fe9e3486039092d509,2025-04-17T16:15:48.770000 +CVE-2025-32648,1,1,abab737277aa5a1fcd0e76ebf92374b27de8a94e3fc281308c62e5f9ffd5ca45,2025-04-17T16:15:48.903000 +CVE-2025-32649,1,1,6f746ed3f9b439cac2dcf5065c7db1e6334cf82b0592ae0d42a905a5a2ddeba7,2025-04-17T16:15:49.033000 CVE-2025-3265,0,0,1b08405cf7862a0d70f0211001bee004fe3d504e775eb888b6c2102dc0c554e7,2025-04-07T18:19:07.777000 CVE-2025-32650,0,0,2253df9d6db542766ebb245b55048147fbc35dd9b1adfc6a1c5afc95c8017415,2025-04-11T15:39:52.920000 +CVE-2025-32651,1,1,c911dce89bdb17c8660156d1c2474db3d4215e5c709560826335f3f861204201,2025-04-17T16:15:49.167000 +CVE-2025-32652,1,1,21553b2c5ed038f14e8281a2388297861ecefa7d08e0fd1b8cc2940d9c5741eb,2025-04-17T16:15:49.293000 +CVE-2025-32653,1,1,bee50db64ab031424a7175a417f97b189e6109c5595bbbd6d3b39be223545e4a,2025-04-17T16:15:49.427000 CVE-2025-32654,0,0,112b25e433b99a7584fad0c05ac3ddf191218f57c077c655570df70d13ef099b,2025-04-11T15:39:52.920000 +CVE-2025-32655,1,1,280cc59730b4bed7597e841d3c82090e20ff8376ba42388d3fb65657595fee4d,2025-04-17T16:15:49.560000 CVE-2025-32656,0,0,f78d451c9cc8ba03e960f053f1149961135101a940f08c9977cabd6ee6246bb5,2025-04-11T15:39:52.920000 +CVE-2025-32658,1,1,c8c55e6d84bf2d0ac94cf0a9f71376cceedfb1e466bf9bdb1472662f8f2e964a,2025-04-17T16:15:49.687000 CVE-2025-32659,0,0,66310045ef3f9234d128da05ad843397fa2e56b3874a7141374ea700ac6b90be,2025-04-09T20:02:41.860000 CVE-2025-3266,0,0,72c61d5f89eeb94b30f634ae19d189745b893dd05829140f6047e84fafa81bf8,2025-04-07T18:18:56.247000 +CVE-2025-32660,1,1,8c719dd0c69d504a7976d22feed8ac791f665f93732024a0d2396b41637407b0,2025-04-17T16:15:49.817000 CVE-2025-32661,0,0,9341c4bc9606fa47b2bcbd94f68672289bd63cc1a4a7f44741e54a69c2fab811,2025-04-09T20:02:41.860000 +CVE-2025-32662,1,1,8c0713aaebb1d83af47085cc0768a6b78e372f75e16d7ec0b474e1f403cd2148,2025-04-17T16:15:49.950000 CVE-2025-32663,0,0,b0d8523ff6751b4be4d65bca3491c6f7bca2d1bc35acb6483867fb4827391cce,2025-04-11T15:39:52.920000 CVE-2025-32664,0,0,8321365ed43b5b654a4f8309fdf2412d26e01c7df00f99c6a02dcb93b06851e2,2025-04-09T20:02:41.860000 +CVE-2025-32665,1,1,3cf3cd3df40595575fb615006e8e8d75798be26158c4b5dcad0d8d37e0e72e99,2025-04-17T16:15:50.080000 +CVE-2025-32666,1,1,6321bb3a77dd9acafe9f702920bfccf0b8ac4ac59cb2d76873e6716c858a8ba5,2025-04-17T16:15:50.207000 CVE-2025-32667,0,0,6e3acab76d981cba160f75b36598b3966b235b7469aa7f71f5081c3426350239,2025-04-09T20:02:41.860000 CVE-2025-32668,0,0,757b85de6a07e907d3afe54fe1d4d4e6c2d15a036ec8c1d1a9caa38457897713,2025-04-11T15:39:52.920000 CVE-2025-32669,0,0,2a7fdc1c148e808891cb022354ae46588131d55f9acb8b725ee06fe9802de7f1,2025-04-09T20:02:41.860000 CVE-2025-3267,0,0,5957e45c3f258189da3aec49a626cf5736069fd66df3c72b04267cdc97a2b74c,2025-04-07T18:18:41.523000 +CVE-2025-32670,1,1,35990d457205cd7815440ebe74209159f83daa0801bcb600fcbd11d196f53a81,2025-04-17T16:15:50.330000 CVE-2025-32671,0,0,3f4addf34bbd623f6a2176cbf1ca339d8ca0f972f87f1e70949526f484b21662,2025-04-11T15:39:52.920000 CVE-2025-32672,0,0,4cb45793faa20687804201b43fe37c0540fbd03771cd92fd2b56c9015c9da363,2025-04-11T15:39:52.920000 CVE-2025-32673,0,0,9f7b948558fad9139b9bffb7b7f7f5f978b9ba1d0445a709d9c2bf74cf08de50,2025-04-09T20:02:41.860000 +CVE-2025-32674,1,1,ce61b52ac29c34812365a434aeb282851e10ca03d2dd8bfea348093318f2a25a,2025-04-17T16:15:50.480000 CVE-2025-32675,0,0,a6db5e48e42f4d41fa425ed9017708708d49574166f59c8b547023bcdc6200d0,2025-04-09T20:02:41.860000 CVE-2025-32676,0,0,edda31a85e1e80659335a7efad0b821388c6101e9c57483f203af2d11a96043c,2025-04-09T20:02:41.860000 CVE-2025-32677,0,0,0b939f0f09bcf370798b3499511e1cd5b67829e82339dbf16d6568ab4594c213,2025-04-09T20:02:41.860000 @@ -290053,9 +290222,11 @@ CVE-2025-32679,0,0,bbacc21ac08d6f239be64c42a4ea3343b4ba4c7e91e4c5b5d593c74f30e94 CVE-2025-3268,0,0,13ebb75f155606fc18a6c469dfd2e1dc92481b7d2a4b4f437c20095a77a45083,2025-04-07T16:15:26.430000 CVE-2025-32680,0,0,bc0affb980c692e69e1b16cd9ed3b08eb8a8e88380b613fe1b873470370c2164,2025-04-09T20:02:41.860000 CVE-2025-32681,0,0,b73a09092179362c2d35eeda6d2b86a162194059b3bd047b5c27fcf6d5113deb,2025-04-11T15:39:52.920000 +CVE-2025-32682,1,1,8ef2231dd944d899a1bf167d988bb0648814a5d324a59c15d463fd3d34086251,2025-04-17T16:15:50.623000 CVE-2025-32683,0,0,71df892e31c90ddca338a0ce6ee84a7c1953f8dfb51683093e291d7f70cdbd8e,2025-04-09T20:02:41.860000 CVE-2025-32684,0,0,dfb4225c2c4be07452b77013b7ae7311cec98258ec99abea9378583b537d5bd9,2025-04-09T20:02:41.860000 CVE-2025-32685,0,0,710fee57ff8bce91dcfc691dce8ab6341cf17f7f891549aaee17cdf6f7306ba6,2025-04-09T20:02:41.860000 +CVE-2025-32686,1,1,fadf20845e626df4ec0a68b3f76692b3801a32cdc56904140b6a04ef5cd0cd67,2025-04-17T16:15:50.750000 CVE-2025-32687,0,0,f86bdd2c773d6895ee601fe15f63817568cb85f8c3a968335caffa628947d382,2025-04-11T15:39:52.920000 CVE-2025-32690,0,0,7fbb45150f9ca61163034b8e092b6a5fa472ca63b481236b3b6e149a7dc3a91e,2025-04-09T20:02:41.860000 CVE-2025-32691,0,0,1e68a30c62b2482023e6169f8574206a21acc26827cccf23f4dd537548ffc2c2,2025-04-09T20:02:41.860000 @@ -290098,16 +290269,16 @@ CVE-2025-32778,0,0,93333c106bade1942d189295a57ca8b886e6e79a18429247cda3fa2e156f8 CVE-2025-32779,0,0,9b0c0f3e1679aa6a29c07a0230230eddd75bcf03028ff914fcc18fd0552bd825,2025-04-15T18:39:27.967000 CVE-2025-32780,0,0,66c032871841ee8f1135c9a708f1264f3edee13154b2ee90fcea8f285386936f,2025-04-15T18:39:27.967000 CVE-2025-32782,0,0,ea3e82903e807a520de4c91c10f7d08fd70839175e235aa475d1b12f4a8b1338,2025-04-16T13:25:37.340000 -CVE-2025-32783,0,1,b3c881ebab0c2fb36eccc75bbcebad4f382a99c923585041b5b1f98933a8eef6,2025-04-17T14:15:29.620000 +CVE-2025-32783,0,0,b3c881ebab0c2fb36eccc75bbcebad4f382a99c923585041b5b1f98933a8eef6,2025-04-17T14:15:29.620000 CVE-2025-32784,0,0,f07e1bae891c8076c2e74beba24dfa0a792bdc8c6b542f23984d9697f06bd191,2025-04-16T13:25:37.340000 -CVE-2025-32787,0,1,f802eb678e52f968f83e505d2ab747b8b8604c3948eb2ff0df2aec5f5ad99a4a,2025-04-17T14:15:29.723000 -CVE-2025-32789,0,1,e8902e8c7d122cce4dfbca56874201c563eec3feaa888235897126381afb3e0c,2025-04-17T14:15:29.823000 +CVE-2025-32787,0,0,f802eb678e52f968f83e505d2ab747b8b8604c3948eb2ff0df2aec5f5ad99a4a,2025-04-17T14:15:29.723000 +CVE-2025-32789,0,0,e8902e8c7d122cce4dfbca56874201c563eec3feaa888235897126381afb3e0c,2025-04-17T14:15:29.823000 CVE-2025-32791,0,0,cce811760929409bbc0164cd7083266c1ecce2c2b4b86cf82e6643b37c8fea15,2025-04-16T22:15:14.943000 CVE-2025-32807,0,0,791ea9650394de4a3c6a4bce28448af084ce5e8fb834d69b1769b35b955fdca4,2025-04-11T15:39:52.920000 CVE-2025-32808,0,0,4460b802a312298836218e51f145ee69f847802ae0b680f0631fd4c9d767af72,2025-04-11T16:15:20.673000 CVE-2025-32809,0,0,ca90ff3ced06efa4e939486b48b76783f1482c86186847921ab08cd5bd99e3d5,2025-04-11T16:15:20.807000 CVE-2025-32816,0,0,7146ab229fea4de6245a9faadeb60513e017f27b734755baaf195d3f55011510,2025-04-11T15:39:52.920000 -CVE-2025-32817,0,0,2ce554c565fb4e62b3c662311b1ce451f78c307581785975384122d9afebc7f3,2025-04-16T21:15:47.780000 +CVE-2025-32817,0,1,ed95e586c37f899e24dcab168965c3fccf06290dda81d2ea038a823102a49f4a,2025-04-17T16:15:50.883000 CVE-2025-3282,0,0,4f7d1b48e17ccd00afeee2e7a595ed2b28190fc5a8aec67b855d00f5d80e0bc2,2025-04-15T18:39:27.967000 CVE-2025-32822,0,0,367ecfacf3c74140480293afb0501d7a53327500a3de5132d335460df99583f3,2025-04-16T18:16:07.973000 CVE-2025-32823,0,0,d69c9859ee28ca28e054ef2b051867a5f7aaf3609eea5ca6dfa5f7794f4d36be,2025-04-16T18:16:08.120000 @@ -290398,19 +290569,19 @@ CVE-2025-3613,0,0,9c314abbc6473987a4462c7f86d0ede7026d1a1d89f3e10127913343b31eed CVE-2025-3615,0,0,55402eb8103671fbd8944245d79b71856cd518c10c14e38bcdbc92d383752b13,2025-04-17T08:15:12.730000 CVE-2025-3617,0,0,8b166380afe19241854c65e4319a7a4bf7fa4a3b21b435fec16e6239c6e67cc8,2025-04-15T18:39:27.967000 CVE-2025-3618,0,0,eda45473138c6808735db2df162e6171a422dd9195142056b67b3d52202066c7,2025-04-15T18:39:27.967000 -CVE-2025-3619,0,1,a0d6f97da0860a23e2fab0f8847e23f12681bafb5970e70b7dd57411d3fa24fd,2025-04-17T14:15:30.067000 -CVE-2025-3620,0,1,e4a06f478aa8f6f6572fd3060488d16b20a7206a81ea019d1f960288223e45cf,2025-04-17T14:15:30.223000 +CVE-2025-3619,0,0,a0d6f97da0860a23e2fab0f8847e23f12681bafb5970e70b7dd57411d3fa24fd,2025-04-17T14:15:30.067000 +CVE-2025-3620,0,0,e4a06f478aa8f6f6572fd3060488d16b20a7206a81ea019d1f960288223e45cf,2025-04-17T14:15:30.223000 CVE-2025-3622,0,0,6b7db9933e6b248f0000367113483a5e806bad53678214380c37af6b793ac885,2025-04-15T18:39:27.967000 -CVE-2025-3651,1,1,4c4f092b532cb2bd99a297392cc3971861f03adf28d24d5d89e4fccd9d724928,2025-04-17T15:15:58.620000 +CVE-2025-3651,0,1,4ddd7afdcc3fd37ae3194e1a107c77a7a022522ffc0405708561758b2846f525,2025-04-17T16:15:59.530000 CVE-2025-3663,0,0,1ce80bfc94e480b50f27d0432deca8fffb2ad8de6b84f90469934d90488bc703,2025-04-16T13:25:37.340000 CVE-2025-3664,0,0,1768dbec432a631292ab0792b91b23e446ed218ac7ee245b57fd6eb101bb8145,2025-04-16T14:15:27.827000 -CVE-2025-3665,0,1,54d623b587211dbf0de521743df877018868a1b349d783091fafdc2cd19a751e,2025-04-17T14:15:30.387000 +CVE-2025-3665,0,0,54d623b587211dbf0de521743df877018868a1b349d783091fafdc2cd19a751e,2025-04-17T14:15:30.387000 CVE-2025-3666,0,0,11f0717691c44660d377020e8670753fb9ac124ff3c41ff932c3f2c8ca720d93,2025-04-16T13:25:37.340000 CVE-2025-3667,0,0,147dc9ec0f7d051a58f891a00e5828585be2c1b227adf90918800cd3730a48b6,2025-04-16T13:25:37.340000 CVE-2025-3668,0,0,68848a711c240fe066a88f5f6c585c7d62fe74fb2114fe02a179a57e777edb10,2025-04-16T13:25:37.340000 CVE-2025-3674,0,0,883f9651935374b46fe0495febf76672371e131355951e01f98c71ab33bc0bfb,2025-04-16T14:15:28.150000 CVE-2025-3675,0,0,8fc64576d9408584769dca7b251b2811cba19ed1b29b0a5e250c895856174a97,2025-04-16T13:25:37.340000 -CVE-2025-3676,0,1,a752df5d612acace447e03200cc7d53da68841fdd3904c9ce137314b0f59a0d5,2025-04-17T14:15:30.570000 +CVE-2025-3676,0,0,a752df5d612acace447e03200cc7d53da68841fdd3904c9ce137314b0f59a0d5,2025-04-17T14:15:30.570000 CVE-2025-3677,0,0,d0b4158217f3756823f68a8901374ac1abc98276cdc21fdc8b5cbe01ac5c1b87,2025-04-16T13:25:37.340000 CVE-2025-3678,0,0,fe7f9b10b498ab4c4118f8e6f6b85a631558210b3c32871c50930a944540940a,2025-04-16T13:25:37.340000 CVE-2025-3679,0,0,9bcb800b5750e50910dcb692b53ba75fe416d21db6bb5123a1610ed36ae21b8e,2025-04-16T20:15:19.250000 @@ -290434,12 +290605,12 @@ CVE-2025-3697,0,0,8d41cda9f6cb466619110c3390fbf369e5e587d610bb308b7d6acf4a2a9ce4 CVE-2025-3698,0,0,06aad761edbce101a35f9e95ce891a7c8bf2c6f046c74b9a4ac2fd5d41b56e3f,2025-04-16T14:15:29.060000 CVE-2025-3723,0,0,5516734ea7b429349db8183353c9a6cae93c902d21883c623672896a15824d8e,2025-04-16T20:15:19.777000 CVE-2025-3724,0,0,b85ef0c50063e0bc0a94629cd54a3778b9c0b8cb45af733f3dc605edb78eb841,2025-04-16T20:15:19.960000 -CVE-2025-3725,0,1,f1e16c71753e48b457d25d6f0cade34317447fe5d6125500417e44deaf55bbb0,2025-04-17T14:15:30.697000 -CVE-2025-3726,0,1,b64bc4ca82f8e11971075b9ebb29f3f2cc545c236613ec19e23d78a8e4d711f3,2025-04-17T14:15:30.857000 -CVE-2025-3727,0,1,a814d85d3af6396d2b65425dedcc1c776954510585a906ee3fabe8d2299e5f3c,2025-04-17T15:15:58.773000 +CVE-2025-3725,0,0,f1e16c71753e48b457d25d6f0cade34317447fe5d6125500417e44deaf55bbb0,2025-04-17T14:15:30.697000 +CVE-2025-3726,0,0,b64bc4ca82f8e11971075b9ebb29f3f2cc545c236613ec19e23d78a8e4d711f3,2025-04-17T14:15:30.857000 +CVE-2025-3727,0,0,a814d85d3af6396d2b65425dedcc1c776954510585a906ee3fabe8d2299e5f3c,2025-04-17T15:15:58.773000 CVE-2025-3728,0,0,d227904395147b87ad7d649add61aa5661016d64da3169ef547e709d8ac74dd4,2025-04-16T21:15:48.363000 -CVE-2025-3729,0,1,e36fc395bb98d091b9aba9c6a4ca25d9443731dc0d272d5c15e86e898ae925ac,2025-04-17T14:15:30.987000 -CVE-2025-3730,0,1,6e15d80df899a7337a6b23904c944771f557f5f54fc97015859dd9c153487ab9,2025-04-17T14:15:31.133000 +CVE-2025-3729,0,0,e36fc395bb98d091b9aba9c6a4ca25d9443731dc0d272d5c15e86e898ae925ac,2025-04-17T14:15:30.987000 +CVE-2025-3730,0,0,6e15d80df899a7337a6b23904c944771f557f5f54fc97015859dd9c153487ab9,2025-04-17T14:15:31.133000 CVE-2025-3733,0,0,b7ac17b7c057f630b68a81a505102cdcfef6e13156a11c36cc53f363146b133e,2025-04-16T21:15:48.873000 CVE-2025-3734,0,0,08cd08d68803ebc3e247bc1dda5293ff05ed4a522f0928f26aaf66ccad8a7816,2025-04-16T18:16:19.783000 CVE-2025-3735,0,0,c1ccc9a6fec3403e3777364d2dc3fbbbbb4b443b6d4510a9318f951740e87950,2025-04-16T17:15:50.030000 @@ -290448,6 +290619,45 @@ CVE-2025-3737,0,0,35ef6e8f2a42d71a4fd629018f2a34f66136cd1d5698c7f6e583093f6b7112 CVE-2025-3738,0,0,25a120e70b108a1107338fc22d89908c6f6e4f62a900899a59c731afea93d918,2025-04-16T17:15:50.273000 CVE-2025-3739,0,0,8f4318c477e6ef78cfbb477f16fa8d12b0c83a2a9a65573ec61aaf6c0bbeb8e9,2025-04-16T17:15:50.360000 CVE-2025-3760,0,0,173c992d0c99fb49006ca5bb129574853b986417b687a5401f75a7095864d16d,2025-04-17T13:15:41.147000 +CVE-2025-39414,1,1,6e1073a906c661064bcf92477694fb3dda3a2a33cc0654a1f2bdf8849c9768a6,2025-04-17T16:15:51.030000 +CVE-2025-39415,1,1,75e500ebd8358c008bec3fd6cbbc50d0dc5efefefdb325e4d063878fbeb903cb,2025-04-17T16:15:51.167000 +CVE-2025-39416,1,1,b75553f9efc73b4a6667b9046aa96b9e685ea5415c1e0d8c174118c250b641d9,2025-04-17T16:15:51.290000 +CVE-2025-39417,1,1,8312bc0f0ce5898763f8935bcf13a831e7e4ddab2e4f2473f0f2b3536667d4cd,2025-04-17T16:15:51.410000 +CVE-2025-39418,1,1,4a9a39fb2e601e6c1db5ea244014b19ac64a6b048c5921cafe965e975a373d4a,2025-04-17T16:15:51.537000 +CVE-2025-39419,1,1,03ae2c70cbd2e59b934c290fdb6ed872d9609ed125cafe2d6d97b5380a70af87,2025-04-17T16:15:51.673000 +CVE-2025-39420,1,1,6daaa1c6a566249579ef9b1a7b03561f3a1cef2235a5ecc4ce2e5073396e0624,2025-04-17T16:15:51.800000 +CVE-2025-39421,1,1,c89d6aa7a7b7a04584933f80d890edd5edcd359c1122adac11bcd10ad6328c17,2025-04-17T16:15:51.933000 +CVE-2025-39422,1,1,c2223fbcc020f01be892a86b951d7e78f196d4c7e0451b927be5300e9d593919,2025-04-17T16:15:52.067000 +CVE-2025-39423,1,1,82720bf6d3bea5564b810c47be82397fb544ef21b8926eff10eb41f76db1c0ba,2025-04-17T16:15:52.203000 +CVE-2025-39424,1,1,d469412108498e710d72ffd469d57bba5144f14126b243d9bf3f5e2c6e74a545,2025-04-17T16:15:52.340000 +CVE-2025-39425,1,1,ef1368b13d6752cea968aac9d723787e4b5a825884fb8f517126f3cf24872faf,2025-04-17T16:15:52.477000 +CVE-2025-39426,1,1,ef419dd612074225621d837054a1cd30e1e864ea8d343156de05b9526a63d15b,2025-04-17T16:15:52.610000 +CVE-2025-39427,1,1,7b9a1a1051f50aa25f8a640324a305b0aa202f01d941fda97c0ad306a42dd23d,2025-04-17T16:15:52.750000 +CVE-2025-39428,1,1,f5568b50d692542117e6fba8f3875a5868dd0844c2b7bc1e549e7ff0c91295e8,2025-04-17T16:15:52.890000 +CVE-2025-39429,1,1,b9e68fc7bf44ca46831ea5009debb089d8035adca6d3009e4d61adb755f9a12d,2025-04-17T16:15:53.033000 +CVE-2025-39430,1,1,b93f25926980ce70eba42bcf19d72f9eac8407b84ceaffea39eef46529d8727f,2025-04-17T16:15:53.167000 +CVE-2025-39431,1,1,e296a5cb0ba480789bf34ead79265794cdf76fb286fad731a0a3050e5c3e52ec,2025-04-17T16:15:53.307000 +CVE-2025-39432,1,1,19150301b2928691e41cb67a019d460dbb8c2d9ec734e74560c8af075ab2c2e1,2025-04-17T16:15:53.437000 +CVE-2025-39433,1,1,95300a40c3bc60acdfcb7176cc02e087ac2edef2c9346726f228e61d7e217818,2025-04-17T16:15:53.560000 +CVE-2025-39434,1,1,2a2395c76d21f51a0d45a7fea0b20358601d30ee31578520e412f50da92f5895,2025-04-17T16:15:53.683000 +CVE-2025-39435,1,1,07ab76cf8348586f8765b8f32caf481a3485747ab5e43040b5e0c68cce131c67,2025-04-17T16:15:53.813000 +CVE-2025-39436,1,1,6d15829fb0adfc4635c11dd9075233b2f87614a5b271e459d2e7662f6600e494,2025-04-17T16:15:53.940000 +CVE-2025-39437,1,1,d8006bb911aa698fb89983f74cfb5213d76bc4b5a3d6cfe9dc3b5cddf2d87cf5,2025-04-17T16:15:54.077000 +CVE-2025-39438,1,1,371986e3b128903565e41c5fcc12c5e607b59032c58c0723b5d52fe8124ee254,2025-04-17T16:15:54.210000 +CVE-2025-39439,1,1,d667ed74a0fb31c7b5acdb947198c34c7e61bf47ab905f12cf07d7e31a59113d,2025-04-17T16:15:54.350000 +CVE-2025-39440,1,1,230d12eedcc85a2d77971a6c3a0d6140d9a6dc2a79fe860871be7f339b7aafee,2025-04-17T16:15:54.497000 +CVE-2025-39441,1,1,926af8840db6f7e7708ce9fc807ec5fa0cad17921ee4a842b72fbef4eb23db6f,2025-04-17T16:15:54.640000 +CVE-2025-39442,1,1,be95bd1fcd27f8a93adfbf94e4944ff55b9b314a8fc4f07cd7f7992446416bef,2025-04-17T16:15:54.770000 +CVE-2025-39443,1,1,ccfd8ec9bb15a283fbb4d1126f9db84fa7a0cc65deeedd15a1e8b6df7385e4f3,2025-04-17T16:15:54.910000 +CVE-2025-39444,1,1,2fc889c771db030731a625524515439f75f17c1c35673dce803bd69981ac1d26,2025-04-17T16:15:55.043000 +CVE-2025-39452,1,1,2890b6b6f968f700a2849989689a248c3c70b228c57560515b74a3f8b188b8ef,2025-04-17T16:15:55.177000 +CVE-2025-39453,1,1,07860880399cf63ccc9a53d7e02879204db13605aa49659027b37de5a0c8ac6e,2025-04-17T16:15:55.300000 +CVE-2025-39455,1,1,ea5970e17970d8e04c0293b93063fa606f2652589f3e8bc2f28baf59e69c1007,2025-04-17T16:15:55.430000 +CVE-2025-39456,1,1,4fc8531493450fbb428ebf8a890375466cbcbb2447f63c259bee6a18436f936e,2025-04-17T16:15:55.557000 +CVE-2025-39457,1,1,a3d3ae568d92ec16c0a90a5dabd7741a2d84ccc3cccee017a1e2224cff9b1837,2025-04-17T16:15:55.690000 +CVE-2025-39461,1,1,100143e4f023059e679195ea56f0633bfada2aca980af85b32a99cb4d9dcbb72,2025-04-17T16:15:55.830000 +CVE-2025-39462,1,1,bc1bd418cbbc688562695e4fdb0cad7691bd87ab4770d0e35820095d38250760,2025-04-17T16:15:55.960000 +CVE-2025-39464,1,1,4110e5e265dc231fce738c4e198564084047c30077123a326d811bfa1ba907a2,2025-04-17T16:15:56.103000 CVE-2025-39472,0,0,f877ee59d4634387f8954acae2dec15eae960a462413f02036f322a3f69ccc35,2025-04-16T18:16:19.610000 CVE-2025-39512,0,0,30e6c9aa53398b93f238c977dd94d763073bc9afd9ceab721695d171a8dade76,2025-04-16T13:25:37.340000 CVE-2025-39513,0,0,e63086a6d242a225a037b014e92b4880238a63e6b65c770949ab086ff1bcbafb,2025-04-16T13:25:37.340000 @@ -290456,16 +290666,24 @@ CVE-2025-39515,0,0,0f679e70648dc6588952b68cd65b0e41179ab5227b783f8086dbada3d7fb5 CVE-2025-39516,0,0,1be65405a0c43dae3fb2b4ac9a6dacde2dbe78e3e010e551ecc411391eee2839,2025-04-16T13:25:37.340000 CVE-2025-39517,0,0,275156a06a26dc947361ebc4de250d9473b673e14441db1199697c01ae711588,2025-04-16T13:25:37.340000 CVE-2025-39518,0,0,7ae418211f60485b131fe053fa5f5130693dbef0904d86cb15596f35858a1099,2025-04-16T13:25:37.340000 +CVE-2025-39519,1,1,f1435f8bb47f508350dcca5825be9b75da5cab43002582dd97e5c8f4fe00f781,2025-04-17T16:15:56.230000 CVE-2025-39520,0,0,2ec59d4967eacfa5712cbc01be175e1e6d39361b0bc17ef6e6ef55157a268573,2025-04-16T13:25:37.340000 +CVE-2025-39521,1,1,db5517a25a2ddd2780b54d078254a8b086120f087591b23cc85f2ac965745fcd,2025-04-17T16:15:56.370000 CVE-2025-39522,0,0,1bdda88d8f861e939cef3917fc42be7370e6c9d03b39476fb076bc2b95775591,2025-04-16T13:25:37.340000 CVE-2025-39524,0,0,bbd2d0bfef7100bba44827c36195e2dc8b5e56a1d34c7a66e3698063baa935ac,2025-04-16T13:25:37.340000 CVE-2025-39525,0,0,6fc9fe636f2bb8a820e27d9abc4ddc8c7bcbc22e07a7f78fc55252c010601b7b,2025-04-16T13:25:37.340000 +CVE-2025-39526,1,1,b4d909dfcf2107f37a00f9c56f25bf242ab736d8f5dfa48cfbbda80211cb4d96,2025-04-17T16:15:56.507000 +CVE-2025-39527,1,1,a4f84fcaf08726aa8934f3340ac115ad384187f61de5a8d2755f8c43a77373e0,2025-04-17T16:15:56.637000 CVE-2025-39528,0,0,946a7561f773e851fa3bf2f3c2a9fa317caed2cd3423985e34d4443e7c66130a,2025-04-16T13:25:37.340000 CVE-2025-39529,0,0,90673ab1f565189e2d1f1c2c856fb28df509ab89e65f524024f8255955a27dfc,2025-04-16T13:25:37.340000 CVE-2025-39530,0,0,d3576b494c094a7c386f62747623c1b849ea77e160876c8ab301c812c6ec4878,2025-04-16T13:25:37.340000 CVE-2025-39531,0,0,eb458df012b0419d928c6e62b5f0daca5b1a5da79dbe999cc73f4002781c9a40,2025-04-16T13:25:37.340000 +CVE-2025-39532,1,1,bfd7b0d0b8551090006333fe73e94f6acb30c26c314411aed25e0070604f9671,2025-04-17T16:15:56.763000 +CVE-2025-39533,1,1,f0415b01ad27b39000714d0d08320e8e42ba82ac2d8121c8512a4136702b4e1e,2025-04-17T16:15:56.893000 +CVE-2025-39535,1,1,7a9dc9e7548b3c60b8e35124efc33055219993d1c08777f03a7902ac42d6eb5b,2025-04-17T16:15:57.017000 CVE-2025-39538,0,0,4bfcc20da76b32e65d5449286920be8768943b840a93ffd6cb2692528a1ff836,2025-04-16T13:25:37.340000 CVE-2025-39540,0,0,2a111e0eedc96801ab60e2869c59e05055ee86f6ea5e8d7e1795e06cd53cc951,2025-04-16T13:25:37.340000 +CVE-2025-39542,1,1,9c732e4a138e9763b5ab2d479f2b8695bbe4bf9f172944d18fbdc690b53354bc,2025-04-17T16:15:57.147000 CVE-2025-39543,0,0,7bfb5a7c4e3c114612dbaf2d71938854e74b3f6f57155c7c337239b13ec2a0ca,2025-04-16T13:25:37.340000 CVE-2025-39544,0,0,6f95537e1256d4ec49905c17dd8139d41e8d79dc1ac4b08d04d5dadae5a663f4,2025-04-16T13:25:37.340000 CVE-2025-39545,0,0,e815e21a13c4e605e41d2781280a877d45338f89edbca7949225653a8850a906,2025-04-16T13:25:37.340000 @@ -290473,15 +290691,24 @@ CVE-2025-39546,0,0,dde5420343cdb09c2074655e19dd0f4a74e9c62b1bcd7b7c4acf147c18ffb CVE-2025-39547,0,0,c81e320499e7091b27d71f62d608e45796b928a73c3a2ff9c4a5ab56a3288a30,2025-04-16T13:25:37.340000 CVE-2025-39548,0,0,69ff74a29c926bb8dcf8caf2d370316bcf2cb78169adfd6f436158ab566e58f3,2025-04-16T13:25:37.340000 CVE-2025-39549,0,0,d96f363e8720702fdaade6ec716f4912f39a034c831b6c545d000c8a09ed33a4,2025-04-16T13:25:37.340000 +CVE-2025-39550,1,1,803b21514d921c13e388ee6d45a2e17eb7660f2f61c2c99ed4676e8204398779,2025-04-17T16:15:57.273000 +CVE-2025-39551,1,1,aa7a4e9a0546035b39ee825e3fa3661e9151d252b4dd3e9f94cea4600be6bed0,2025-04-17T16:15:57.397000 CVE-2025-39552,0,0,a64dd5ccc26cd5cc10559823a5b67f9c6de1daecee92c4acd2407c57cc66d97f,2025-04-16T13:25:37.340000 +CVE-2025-39554,1,1,e186538019785303b3441ef8e685ade8a52b5eb1c093e86cdb022eb8e94f65dc,2025-04-17T16:15:57.520000 CVE-2025-39555,0,0,7577b39b898e7e3a07a92ecd21684a26ef1f0a9507599eb18a520e7d359bf314,2025-04-16T13:25:37.340000 CVE-2025-39556,0,0,3e1795964e5a4e566585390a011b7ac3f244e4ce5bd6af042ff85c9893aecea8,2025-04-16T13:25:37.340000 CVE-2025-39557,0,0,cd64668a2131e647035bbf03afb8d6ce348a2262ac03c8cf894e30b352d725f5,2025-04-16T13:25:37.340000 +CVE-2025-39558,1,1,785daf68870b8b380de956910feb960067fca1fe46693ec4ad7d2e7a7ada1850,2025-04-17T16:15:57.650000 +CVE-2025-39559,1,1,3b06de2cdf12737ade425b5823d68c0af8ead0cca8bec24966e09e0862cc2f10,2025-04-17T16:15:57.780000 CVE-2025-39560,0,0,f0aa32be8ce8516fa9947fff0227e9990e71557cc34178f4c5f4c92c824fad99,2025-04-16T13:25:37.340000 +CVE-2025-39562,1,1,68d71bee213f7900180f141eba89ec1b7f344703c0d2047455d2dda4b222c2e5,2025-04-17T16:15:57.903000 CVE-2025-39563,0,0,79f536f44ca79f5af174f0ce5fe907ad490ada92928f5885ff6dd5140b553cb3,2025-04-16T13:25:37.340000 CVE-2025-39564,0,0,d7742f02b3faaffbebda67b676ffca494a033b1bcc32d0de23aa03428c34f97c,2025-04-16T13:25:37.340000 CVE-2025-39565,0,0,38306dd5cbb8d022ac42a065544ed286d828509ecbd27f05f04d20a50639e64b,2025-04-16T13:25:37.340000 CVE-2025-39566,0,0,5be6dff6480197c61b6388b62d9440b6051821ff7c822377815a03d7b4cad3a9,2025-04-16T13:25:37.340000 +CVE-2025-39567,1,1,e3e29dcd53b50183d9c5d57b651fea74092b6961cf5abf2d6f592c90e117a0f5,2025-04-17T16:15:58.050000 +CVE-2025-39568,1,1,2c9efc5f4c0d46a20c7cb855901d13b7cdbbef817c466f9f9345ec31d5fb1d49,2025-04-17T16:15:58.187000 +CVE-2025-39569,1,1,b8b9a57070d0f328c7eb397e87e88ad5804fb4081600718234809275a7fd1671,2025-04-17T16:15:58.313000 CVE-2025-39570,0,0,66761c752a98f0beae571f2ac8302bae95275c36786d4767d23829d3d870d1dc,2025-04-16T13:25:37.340000 CVE-2025-39571,0,0,7286c428fcc5dabe0790091bcd909498e9d27cffa25986c11181c90d8775afcc,2025-04-16T13:25:37.340000 CVE-2025-39572,0,0,fd6eabbe1da98427f3aff3b3d3aaca441fec58e691f97eefdf8a1d16c7967d48,2025-04-16T13:25:37.340000 @@ -290492,21 +290719,34 @@ CVE-2025-39576,0,0,6a525b02d9a7ff2f7cd6249e17d0345cbbedd26176b8103bcc1e6d488e46f CVE-2025-39577,0,0,01e8587528191547a2e3e13f29e5aa9f7e38c98a55cf3db63710a3e300554b5a,2025-04-16T13:25:37.340000 CVE-2025-39578,0,0,75554fb5757a22255bcac284fe850698da7815b97a1b16000f3c2aa1b4f06b88,2025-04-16T13:25:37.340000 CVE-2025-39579,0,0,fa8405755770fae24b97e80cb36a9c3b2fa72fc1fa2ea68f58c7f94ea992346f,2025-04-16T13:25:37.340000 +CVE-2025-39580,1,1,d2bb6563465bdda98a6536c73ab2c2b1e2c2049d2bcb56cec795fc2a95217503,2025-04-17T16:15:58.447000 CVE-2025-39581,0,0,252c7290e144f02b158f3bf2a5fed8a796e11c70aab6c293064b4670640acec6,2025-04-16T13:25:37.340000 CVE-2025-39582,0,0,29f80499fe0a8ef07c30d0fe55239af8fbda0fd4f9392976f66e4802bb7f8971,2025-04-16T13:25:37.340000 +CVE-2025-39583,1,1,68e510c91ee736ae57c9a667419c0ff0fcb4743de6264658f900a3852370028c,2025-04-17T16:15:58.580000 CVE-2025-39584,0,0,0fb669b53d7c9628b931dd90e3f2fd533b5290a6c3a4165e625e7166dad6ce18,2025-04-16T13:25:37.340000 CVE-2025-39585,0,0,9005349c01cef9b77091e99ddcbe7df09c999efec892b8d7c2e1c4cb8dbac4fa,2025-04-16T13:25:37.340000 +CVE-2025-39586,1,1,9edee7cac0fb2033ecfb9382f93c34fdd627e8802610fd7a51de173a6824c7b9,2025-04-17T16:15:58.710000 +CVE-2025-39587,1,1,b05f5d87e617f43b4c7df559de154a35a089198fa6ea421afb4486a7c6bcacb7,2025-04-17T16:15:58.830000 +CVE-2025-39588,1,1,a9866221c320c25fca06e17f799279e407b75d5f9f36c0100a9d35c2c042ca81,2025-04-17T16:15:58.953000 CVE-2025-39589,0,0,3199bcb00d228f55a80672e6727ec3b358747c5bd770f5f7d195fda24a79db38,2025-04-16T13:25:37.340000 CVE-2025-39590,0,0,2480835c2a31947ae52163a7b3d998cbf7c56df5090b79aa774c6395fefcc7c1,2025-04-16T13:25:37.340000 CVE-2025-39591,0,0,dda14e67fa405b52d761ea5d67284009dfa5a9f2ff9e796fc18cbe75483c02fc,2025-04-16T13:25:37.340000 CVE-2025-39592,0,0,530d9e2291917f70853822141758e135ba6902c813b10741276106503fb1568a,2025-04-16T13:25:37.340000 CVE-2025-39593,0,0,8ee558aab1ae90d0d4b9e2520b4c394eeecf587b672273be8a34d36af10c9b40,2025-04-16T13:25:37.340000 +CVE-2025-39594,1,1,7ae6991c96b08aa02c7a59438f3123ee7c27e024085b1f442b69dd334ac73bd7,2025-04-17T16:15:59.093000 +CVE-2025-39595,1,1,d127bcf21abd1f1b01176054da4e1a729f2796b96c9b27fc7d88f4edf47e8b12,2025-04-17T16:15:59.220000 +CVE-2025-39596,1,1,d91151f71ea6d3bef1720f7e9d4cd975a8156e46db61132abe2159f40a5ed19c,2025-04-17T16:15:59.350000 CVE-2025-39597,0,0,fc2155885e0a15a80b9a041c233e7563ef733942cbdc7b9e2039b6d34e541576,2025-04-16T13:25:37.340000 CVE-2025-39598,0,0,a8b31c601155a7abe0afa05f80127860fccca6f3d3f28f42b4924f9c6cd99a8f,2025-04-16T13:25:37.340000 CVE-2025-39599,0,0,b32165e9ac35cddc8365b5382966b3cdc907609baee89eedf472d2eeabdae9db,2025-04-16T13:25:37.340000 CVE-2025-39600,0,0,ff53b226229c137b254fd094b41c03f9992afdd195d414242990f0faaac29b77,2025-04-16T13:25:37.340000 CVE-2025-39601,0,0,7f3568c982e2cbdfe236a2b826bbacce5227350e296ed75f61b4bbcedef35537,2025-04-16T13:25:37.340000 CVE-2025-39602,0,0,df27de5ee22e5ec9d9d74c987812c0381cd04ef064c0d9455c3c07c5309a9403,2025-04-16T13:25:37.340000 +CVE-2025-42921,1,1,228a341c92a9c3beab97283dbfd2bcbb14fe61e387a23007b1d43990771210c2,2025-04-17T16:15:59.620000 +CVE-2025-43012,1,1,da420583a612f75d25ba8e2dccb804edb4e4ae21584c634da350c9dc9f7949eb,2025-04-17T16:15:59.777000 +CVE-2025-43013,1,1,c0ec365436e5d1faf272adaac67df74d8d6ce08764d80ba2b77b99649895a8ca,2025-04-17T16:15:59.910000 +CVE-2025-43014,1,1,ce155eb753061e9c201d755d7e305946eba9680fb40e486f4d5187d4890ab980,2025-04-17T16:16:00.037000 +CVE-2025-43015,1,1,f6eae3839aec330a35191c9f847380eb1dcd02551494e0bf71366b483b58d01a,2025-04-17T16:16:00.170000 CVE-2025-43703,0,0,316b9a83c3b6dc513c619095e9530484f6e664a6d636deeaf4e977dce37bdf17,2025-04-16T22:15:15.083000 CVE-2025-43704,0,0,4cfc0104734e3f2a02f1a096d88581f78932e3288ecf4dc711d8c50bc120846e,2025-04-16T23:15:45.770000 CVE-2025-43708,0,0,f7d60b063ecce5d37fc03a48f1ed04e5a14ace39cc082f6e23e26b02f16174c0,2025-04-17T01:15:46.707000