Auto-Update: 2025-06-13T02:00:20.569928+00:00

This commit is contained in:
cad-safe-bot 2025-06-13 02:03:56 +00:00
parent 8088fcd1bd
commit 077aa39db9
22 changed files with 1010 additions and 138 deletions

View File

@ -2,13 +2,13 @@
"id": "CVE-2021-20587",
"sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"published": "2021-02-19T20:15:12.833",
"lastModified": "2024-11-21T05:46:49.637",
"lastModified": "2025-06-13T00:15:20.230",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Heap-based buffer overflow vulnerability in Mitsubishi Electric FA Engineering Software (CPU Module Logging Configuration Tool versions 1.112R and prior, CW Configurator versions 1.011M and prior, Data Transfer versions 3.44W and prior, EZSocket versions 5.4 and prior, FR Configurator all versions, FR Configurator SW3 all versions, FR Configurator2 versions 1.24A and prior, GT Designer3 Version1(GOT1000) versions 1.250L and prior, GT Designer3 Version1(GOT2000) versions 1.250L and prior, GT SoftGOT1000 Version3 versions 3.245F and prior, GT SoftGOT2000 Version1 versions 1.250L and prior, GX Configurator-DP versions 7.14Q and prior, GX Configurator-QP all versions, GX Developer versions 8.506C and prior, GX Explorer all versions, GX IEC Developer all versions, GX LogViewer versions 1.115U and prior, GX RemoteService-I all versions, GX Works2 versions 1.597X and prior, GX Works3 versions 1.070Y and prior, iQ Monozukuri ANDON (Data Transfer) all versions, iQ Monozukuri Process Remote Monitoring (Data Transfer) all versions, M_CommDTM-HART all versions, M_CommDTM-IO-Link versions 1.03D and prior, MELFA-Works versions 4.4 and prior, MELSEC WinCPU Setting Utility all versions, MELSOFT EM Software Development Kit (EM Configurator) versions 1.015R and prior, MELSOFT Navigator versions 2.74C and prior, MH11 SettingTool Version2 versions 2.004E and prior, MI Configurator versions 1.004E and prior, MT Works2 versions 1.167Z and prior, MX Component versions 5.001B and prior, Network Interface Board CC IE Control utility versions 1.29F and prior, Network Interface Board CC IE Field Utility versions 1.16S and prior, Network Interface Board CC-Link Ver.2 Utility versions 1.23Z and prior, Network Interface Board MNETH utility versions 34L and prior, PX Developer versions 1.53F and prior, RT ToolBox2 versions 3.73B and prior, RT ToolBox3 versions 1.82L and prior, Setting/monitoring tools for the C Controller module (SW4PVC-CCPU) versions 4.12N and prior and SLMP Data Collector versions 1.04E and prior) allows a remote unauthenticated attacker to cause a DoS condition of the software products, and possibly to execute a malicious program on the personal computer running the software products although it has not been reproduced, by spoofing MELSEC, GOT or FREQROL and returning crafted reply packets."
"value": "Heap-based buffer overflow vulnerability in Mitsubishi Electric FA Engineering Software (CPU Module Logging Configuration Tool versions 1.112R and prior, CW Configurator versions 1.011M and prior, Data Transfer versions 3.44W and prior, EZSocket versions 5.4 and prior, FR Configurator all versions, FR Configurator SW3 all versions, FR Configurator2 versions 1.24A and prior, GT Designer3 Version1(GOT1000) versions 1.250L and prior, GT Designer3 Version1(GOT2000) versions 1.250L and prior, GT SoftGOT1000 Version3 versions 3.245F and prior, GT SoftGOT2000 Version1 versions 1.250L and prior, GX Configurator-DP versions 7.14Q and prior, GX Configurator-QP all versions, GX Developer versions 8.506C and prior, GX Explorer all versions, GX IEC Developer all versions, GX LogViewer versions 1.115U and prior, GX RemoteService-I all versions, GX Works2 versions 1.597X and prior, GX Works3 versions 1.070Y and prior, iQ Monozukuri ANDON (Data Transfer) versions 1.003D and prior, iQ Monozukuri Process Remote Monitoring (Data Transfer) versions 1.002C and prior, M_CommDTM-HART all versions, M_CommDTM-IO-Link versions 1.03D and prior, MELFA-Works versions 4.4 and prior, MELSEC WinCPU Setting Utility all versions, MELSOFT EM Software Development Kit (EM Configurator) versions 1.015R and prior, MELSOFT Navigator versions 2.74C and prior, MH11 SettingTool Version2 versions 2.004E and prior, MI Configurator versions 1.004E and prior, MT Works2 versions 1.167Z and prior, MX Component versions 5.001B and prior, Network Interface Board CC IE Control utility versions 1.29F and prior, Network Interface Board CC IE Field Utility versions 1.16S and prior, Network Interface Board CC-Link Ver.2 Utility versions 1.23Z and prior, Network Interface Board MNETH utility versions 34L and prior, PX Developer versions 1.53F and prior, RT ToolBox2 versions 3.73B and prior, RT ToolBox3 versions 1.82L and prior, Setting/monitoring tools for the C Controller module (SW4PVC-CCPU) versions 4.12N and prior, and SLMP Data Collector versions 1.04E and prior) allows a remote unauthenticated attacker to cause a DoS condition on the software products, and possibly to execute a malicious code on the personal computer running the software products although it has not been reproduced, by spoofing MELSEC, GOT or FREQROL and returning crafted reply packets."
},
{
"lang": "es",
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
@ -66,8 +86,18 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -316,26 +346,16 @@
],
"references": [
{
"url": "https://jvn.jp/vu/JVNVU92330101/index.html",
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"tags": [
"Third Party Advisory"
]
"url": "https://jvn.jp/vu/JVNVU92330101",
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"
},
{
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-049-02",
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-049-02",
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"
},
{
"url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-021_en.pdf",
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"tags": [
"Vendor Advisory"
]
"url": "https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2020-021_en.pdf",
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"
},
{
"url": "https://jvn.jp/vu/JVNVU92330101/index.html",

View File

@ -2,13 +2,13 @@
"id": "CVE-2021-20588",
"sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"published": "2021-02-19T20:15:13.023",
"lastModified": "2024-11-21T05:46:49.790",
"lastModified": "2025-06-13T00:15:22.797",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper handling of length parameter inconsistency vulnerability in Mitsubishi Electric FA Engineering Software(CPU Module Logging Configuration Tool versions 1.112R and prior, CW Configurator versions 1.011M and prior, Data Transfer versions 3.44W and prior, EZSocket versions 5.4 and prior, FR Configurator all versions, FR Configurator SW3 all versions, FR Configurator2 versions 1.24A and prior, GT Designer3 Version1(GOT1000) versions 1.250L and prior, GT Designer3 Version1(GOT2000) versions 1.250L and prior, GT SoftGOT1000 Version3 versions 3.245F and prior, GT SoftGOT2000 Version1 versions 1.250L and prior, GX Configurator-DP versions 7.14Q and prior, GX Configurator-QP all versions, GX Developer versions 8.506C and prior, GX Explorer all versions, GX IEC Developer all versions, GX LogViewer versions 1.115U and prior, GX RemoteService-I all versions, GX Works2 versions 1.597X and prior, GX Works3 versions 1.070Y and prior, iQ Monozukuri ANDON (Data Transfer) all versions, iQ Monozukuri Process Remote Monitoring (Data Transfer) all versions, M_CommDTM-HART all versions, M_CommDTM-IO-Link versions 1.03D and prior, MELFA-Works versions 4.4 and prior, MELSEC WinCPU Setting Utility all versions, MELSOFT EM Software Development Kit (EM Configurator) versions 1.015R and prior, MELSOFT Navigator versions 2.74C and prior, MH11 SettingTool Version2 versions 2.004E and prior, MI Configurator versions 1.004E and prior, MT Works2 versions 1.167Z and prior, MX Component versions 5.001B and prior, Network Interface Board CC IE Control utility versions 1.29F and prior, Network Interface Board CC IE Field Utility versions 1.16S and prior, Network Interface Board CC-Link Ver.2 Utility versions 1.23Z and prior, Network Interface Board MNETH utility versions 34L and prior, PX Developer versions 1.53F and prior, RT ToolBox2 versions 3.73B and prior, RT ToolBox3 versions 1.82L and prior, Setting/monitoring tools for the C Controller module (SW4PVC-CCPU) versions 4.12N and prior and SLMP Data Collector versions 1.04E and prior) allows a remote unauthenticated attacker to cause a DoS condition of the software products, and possibly to execute a malicious program on the personal computer running the software products although it has not been reproduced, by spoofing MELSEC, GOT or FREQROL and returning crafted reply packets."
"value": "Improper Handling of Length Parameter Inconsistency vulnerability in Mitsubishi Electric FA Engineering Software (CPU Module Logging Configuration Tool versions 1.112R and prior, CW Configurator versions 1.011M and prior, Data Transfer versions 3.44W and prior, EZSocket versions 5.4 and prior, FR Configurator all versions, FR Configurator SW3 all versions, FR Configurator2 versions 1.24A and prior, GT Designer3 Version1(GOT1000) versions 1.250L and prior, GT Designer3 Version1(GOT2000) versions 1.250L and prior, GT SoftGOT1000 Version3 versions 3.245F and prior, GT SoftGOT2000 Version1 versions 1.250L and prior, GX Configurator-DP versions 7.14Q and prior, GX Configurator-QP all versions, GX Developer versions 8.506C and prior, GX Explorer all versions, GX IEC Developer all versions, GX LogViewer versions 1.115U and prior, GX RemoteService-I all versions, GX Works2 versions 1.597X and prior, GX Works3 versions 1.070Y and prior, iQ Monozukuri ANDON (Data Transfer) versions 1.003D and prior, iQ Monozukuri Process Remote Monitoring (Data Transfer) versions 1.002C and prior, M_CommDTM-HART all versions, M_CommDTM-IO-Link versions 1.03D and prior, MELFA-Works versions 4.4 and prior, MELSEC WinCPU Setting Utility all versions, MELSOFT EM Software Development Kit (EM Configurator) versions 1.015R and prior, MELSOFT Navigator versions 2.74C and prior, MH11 SettingTool Version2 versions 2.004E and prior, MI Configurator versions 1.004E and prior, MT Works2 versions 1.167Z and prior, MX Component versions 5.001B and prior, Network Interface Board CC IE Control utility versions 1.29F and prior, Network Interface Board CC IE Field Utility versions 1.16S and prior, Network Interface Board CC-Link Ver.2 Utility versions 1.23Z and prior, Network Interface Board MNETH utility versions 34L and prior, PX Developer versions 1.53F and prior, RT ToolBox2 versions 3.73B and prior, RT ToolBox3 versions 1.82L and prior, Setting/monitoring tools for the C Controller module (SW4PVC-CCPU) versions 4.12N and prior, and SLMP Data Collector versions 1.04E and prior) allows a remote unauthenticated attacker to cause a DoS condition on the software products, and possibly to execute a malicious code on the personal computer running the software products although it has not been reproduced, by spoofing MELSEC, GOT or FREQROL and returning crafted reply packets."
},
{
"lang": "es",
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
@ -66,8 +86,18 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-130"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -316,22 +346,16 @@
],
"references": [
{
"url": "https://jvn.jp/vu/JVNVU92330101/index.html",
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"tags": [
"Third Party Advisory"
]
"url": "https://jvn.jp/vu/JVNVU92330101",
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-049-02",
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"
},
{
"url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-021_en.pdf",
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"tags": [
"Vendor Advisory"
]
"url": "https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2020-021_en.pdf",
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"
},
{
"url": "https://jvn.jp/vu/JVNVU92330101/index.html",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30799",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-22T01:15:47.340",
"lastModified": "2024-11-22T19:15:06.147",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-12T23:57:54.350",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,14 +71,42 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dronecode:px4_drone_autopilot:*:-:*:*:*:*:*:*",
"versionEndIncluding": "1.14.0",
"matchCriteriaId": "A79109AD-F542-464E-966C-D63AA3C9EFE4"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/PX4/PX4-Autopilot/issues/22428",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://github.com/PX4/PX4-Autopilot/issues/22428",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40553",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-15T16:15:03.147",
"lastModified": "2024-11-21T09:31:18.923",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-13T00:04:08.850",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:project_team:tmall_demo:2024-07-03:*:*:*:*:*:*:*",
"matchCriteriaId": "176324F3-942B-42FA-9456-63FCAE6C3AF1"
}
]
}
]
}
],
"references": [
{
"url": "https://gitee.com/project_team/Tmall_demo/issues/IAANVC",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://gitee.com/project_team/Tmall_demo/issues/IAANVC",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40554",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-15T16:15:03.223",
"lastModified": "2024-11-21T09:31:19.117",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-13T00:06:59.700",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:project_team:tmall_demo:2024-07-03:*:*:*:*:*:*:*",
"matchCriteriaId": "176324F3-942B-42FA-9456-63FCAE6C3AF1"
}
]
}
]
}
],
"references": [
{
"url": "https://gitee.com/project_team/Tmall_demo/issues/IAANYB",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://gitee.com/project_team/Tmall_demo/issues/IAANYB",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40555",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-15T16:15:03.283",
"lastModified": "2024-11-22T19:15:06.943",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-13T00:08:19.140",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,49 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:project_team:tmall_demo:2024-07-03:*:*:*:*:*:*:*",
"matchCriteriaId": "176324F3-942B-42FA-9456-63FCAE6C3AF1"
}
]
}
]
}
],
"references": [
{
"url": "https://gitee.com/project_team/Tmall_demo/issues/IAAO1T",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://gitee.com/project_team/Tmall_demo/issues/IAAO1T",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40560",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-15T16:15:03.347",
"lastModified": "2024-11-21T09:31:19.433",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-13T00:14:13.620",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:project_team:tmall_demo:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2024-07-03",
"matchCriteriaId": "7FDC0F03-8FF0-49CE-B503-51AF1119B344"
}
]
}
]
}
],
"references": [
{
"url": "https://gitee.com/project_team/Tmall_demo/issues/IAAOT1",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://gitee.com/project_team/Tmall_demo/issues/IAAOT1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46213",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-16T21:15:12.947",
"lastModified": "2024-10-18T12:53:04.627",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-13T00:28:54.280",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,10 +39,43 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redaxo:redaxo:2.11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "391C22A0-B15A-4A3A-A6FD-ECB6B3344A88"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Purposex7/Vulns4Study/blob/main/REDAXO%20Cronjobs%20%20AddOns%20RCE.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-48052",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-04T23:15:04.337",
"lastModified": "2024-11-06T20:35:29.830",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-13T00:21:58.573",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gradio_project:gradio:*:*:*:*:*:python:*:*",
"versionEndIncluding": "4.42.0",
"matchCriteriaId": "C7A81F18-50C6-4DFF-A396-A479DF256198"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/AfterSnows/45ffc23797f9127e00755376cc610e12",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://rumbling-slice-eb0.notion.site/FULL-SSRF-in-gr-DownloadButton-in-gradio-app-gradio-870b21e0908b48cbafd914719ac1a4e6?pvs=4",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-48241",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-30T18:15:07.490",
"lastModified": "2024-11-01T12:57:03.417",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-13T00:24:27.273",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,18 +51,48 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.8.0",
"versionEndIncluding": "5.9.4",
"matchCriteriaId": "E0CC14C5-C9E0-46A6-9D94-522D1BD39942"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/St-Andrews-Bug-Busters/Vuln_info/blob/main/radare2/CVE-2024-48241.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/radareorg/radare2/issues/23317",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://github.com/radareorg/radare2/pull/23318",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-48900",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-11-13T15:15:07.577",
"lastModified": "2024-11-21T18:15:10.460",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-13T00:33:54.370",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,12 +49,44 @@
"value": "CWE-200"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.4.0",
"versionEndExcluding": "4.4.4",
"matchCriteriaId": "8E1F89F0-D04C-41A0-89D2-C45C94F29967"
}
]
}
]
}
],
"references": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318818",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4977",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-07-13T06:15:03.440",
"lastModified": "2024-11-21T09:43:59.597",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-13T00:02:24.623",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:plumislandmedia:index_wp_mysql_for_speed:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.4.18",
"matchCriteriaId": "5E29B7C4-9C6A-44F5-810D-FC70405B8DBD"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/89791a80-5cff-4a1a-8163-94b5be4081a5/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/89791a80-5cff-4a1a-8163-94b5be4081a5/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50677",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-06T16:15:21.117",
"lastModified": "2024-12-06T17:15:10.180",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-13T00:35:28.157",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oroinc:oroplatform:5.1.0:-:*:*:*:*:*:*",
"matchCriteriaId": "2D3C48DF-69E6-4651-A90A-5CF55518502C"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ZumiYumi/CVE-2024-50677",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/oroinc/orocommerce-application",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6766",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-08-06T06:15:36.047",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-13T00:16:33.187",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,10 +39,44 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:getshortcodes:shortcodes_ultimate:*:*:*:*:pro:wordpress:*:*",
"versionEndExcluding": "7.2.1",
"matchCriteriaId": "39C2E1D6-CC20-4013-BE9F-E6A1107BD9F8"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/77bb1dcf-4e84-497a-955e-f3c0b649ad1c/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-4228",
"sourceIdentifier": "psirt@paloaltonetworks.com",
"published": "2025-06-13T00:15:23.233",
"lastModified": "2025-06-13T00:15:23.233",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An incorrect privilege assignment vulnerability in Palo Alto Networks Cortex\u00ae XDR Broker VM allows an authenticated administrative user to execute certain files available within the Broker VM and escalate their privileges to root."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "psirt@paloaltonetworks.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:D/RE:M/U:Amber",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NO",
"Recovery": "USER",
"valueDensity": "DIFFUSE",
"vulnerabilityResponseEffort": "MODERATE",
"providerUrgency": "AMBER"
}
}
]
},
"weaknesses": [
{
"source": "psirt@paloaltonetworks.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-266"
}
]
}
],
"references": [
{
"url": "https://security.paloaltonetworks.com/CVE-2025-4228",
"source": "psirt@paloaltonetworks.com"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-4230",
"sourceIdentifier": "psirt@paloaltonetworks.com",
"published": "2025-06-13T00:15:23.380",
"lastModified": "2025-06-13T00:15:23.380",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A command injection vulnerability in Palo Alto Networks PAN-OS\u00ae software enables an authenticated administrator to bypass system restrictions and run arbitrary commands as a root user. To be able to exploit this issue, the user must have access to the PAN-OS CLI.\n\nThe security risk posed by this issue is significantly minimized when CLI access is restricted to a limited group of administrators. \n\nCloud NGFW and Prisma\u00ae Access are not affected by this vulnerability."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "psirt@paloaltonetworks.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:U/V:D/RE:X/U:Amber",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "USER",
"valueDensity": "DIFFUSE",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "AMBER"
}
}
]
},
"weaknesses": [
{
"source": "psirt@paloaltonetworks.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://security.paloaltonetworks.com/CVE-2025-4230",
"source": "psirt@paloaltonetworks.com"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-4231",
"sourceIdentifier": "psirt@paloaltonetworks.com",
"published": "2025-06-13T00:15:23.533",
"lastModified": "2025-06-13T00:15:23.533",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A command injection vulnerability in Palo Alto Networks PAN-OS\u00ae enables an authenticated administrative user to perform actions as the root user.\n\nThe attacker must have network access to the management web interface and successfully authenticate to exploit this issue.\n\nCloud NGFW and Prisma Access are not impacted by this vulnerability."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "psirt@paloaltonetworks.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:C/RE:M/U:Amber",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NO",
"Recovery": "USER",
"valueDensity": "CONCENTRATED",
"vulnerabilityResponseEffort": "MODERATE",
"providerUrgency": "AMBER"
}
}
]
},
"weaknesses": [
{
"source": "psirt@paloaltonetworks.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://security.paloaltonetworks.com/CVE-2025-4231",
"source": "psirt@paloaltonetworks.com"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-4232",
"sourceIdentifier": "psirt@paloaltonetworks.com",
"published": "2025-06-13T00:15:23.697",
"lastModified": "2025-06-13T00:15:23.697",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An improper neutralization of wildcards vulnerability in the log collection feature of Palo Alto Networks GlobalProtect\u2122 app on macOS allows a non administrative user to escalate their privileges to root."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "psirt@paloaltonetworks.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:D/RE:M/U:Amber",
"baseScore": 8.5,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NO",
"Recovery": "USER",
"valueDensity": "DIFFUSE",
"vulnerabilityResponseEffort": "MODERATE",
"providerUrgency": "AMBER"
}
}
]
},
"weaknesses": [
{
"source": "psirt@paloaltonetworks.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-155"
}
]
}
],
"references": [
{
"url": "https://security.paloaltonetworks.com/CVE-2025-4232",
"source": "psirt@paloaltonetworks.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5593",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-04T16:15:36.613",
"lastModified": "2025-06-05T20:12:23.777",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-13T01:00:11.693",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -63,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,28 +142,76 @@
"value": "CWE-120"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:freefloat:freefloat_ftp_server:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A9C3D4BD-07C8-4E11-8B6C-6CBBA66F0725"
}
]
}
]
}
],
"references": [
{
"url": "https://fitoxs.com/exploit/exploit-9e0f802ba8eab46db6ff5f0c634f96412286b66b33c50a420dd57c1329e3a20d1.txt",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.311079",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.311079",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.587000",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry",
"Exploit"
]
},
{
"url": "https://vuldb.com/?submit.587000",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Third Party Advisory",
"VDB Entry",
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5594",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-04T16:15:36.807",
"lastModified": "2025-06-05T20:12:23.777",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-13T00:58:21.617",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -63,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,28 +142,74 @@
"value": "CWE-120"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:freefloat:freefloat_ftp_server:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A9C3D4BD-07C8-4E11-8B6C-6CBBA66F0725"
}
]
}
]
}
],
"references": [
{
"url": "https://fitoxs.com/exploit/exploit-79d290eb2c875b417f7a91769b3bb07a64f2562b57484473ef0f92808bb7dbe2.txt",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.311080",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.311080",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.587009",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry",
"Exploit"
]
},
{
"url": "https://fitoxs.com/exploit/exploit-79d290eb2c875b417f7a91769b3bb07a64f2562b57484473ef0f92808bb7dbe2.txt",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit"
]
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-06-12T23:55:18.942650+00:00
2025-06-13T02:00:20.569928+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-06-12T23:54:58.770000+00:00
2025-06-13T01:00:11.693000+00:00
```
### Last Data Feed Release
@ -27,36 +27,45 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain
2025-06-12T00:00:04.304975+00:00
2025-06-13T00:00:04.319101+00:00
```
### Total Number of included CVEs
```plain
297837
297841
```
### CVEs added in the last Commit
Recently added CVEs: `3`
Recently added CVEs: `4`
- [CVE-2025-41233](CVE-2025/CVE-2025-412xx/CVE-2025-41233.json) (`2025-06-12T22:15:20.560`)
- [CVE-2025-41234](CVE-2025/CVE-2025-412xx/CVE-2025-41234.json) (`2025-06-12T22:15:21.090`)
- [CVE-2025-4233](CVE-2025/CVE-2025-42xx/CVE-2025-4233.json) (`2025-06-12T23:15:21.983`)
- [CVE-2025-4228](CVE-2025/CVE-2025-42xx/CVE-2025-4228.json) (`2025-06-13T00:15:23.233`)
- [CVE-2025-4230](CVE-2025/CVE-2025-42xx/CVE-2025-4230.json) (`2025-06-13T00:15:23.380`)
- [CVE-2025-4231](CVE-2025/CVE-2025-42xx/CVE-2025-4231.json) (`2025-06-13T00:15:23.533`)
- [CVE-2025-4232](CVE-2025/CVE-2025-42xx/CVE-2025-4232.json) (`2025-06-13T00:15:23.697`)
### CVEs modified in the last Commit
Recently modified CVEs: `8`
Recently modified CVEs: `16`
- [CVE-2024-2260](CVE-2024/CVE-2024-22xx/CVE-2024-2260.json) (`2025-06-12T23:48:17.817`)
- [CVE-2024-29460](CVE-2024/CVE-2024-294xx/CVE-2024-29460.json) (`2025-06-12T23:54:58.770`)
- [CVE-2024-2996](CVE-2024/CVE-2024-29xx/CVE-2024-2996.json) (`2025-06-12T23:33:11.550`)
- [CVE-2024-2997](CVE-2024/CVE-2024-29xx/CVE-2024-2997.json) (`2025-06-12T23:28:31.310`)
- [CVE-2024-2998](CVE-2024/CVE-2024-29xx/CVE-2024-2998.json) (`2025-06-12T23:24:56.703`)
- [CVE-2024-3013](CVE-2024/CVE-2024-30xx/CVE-2024-3013.json) (`2025-06-12T23:23:13.000`)
- [CVE-2024-31759](CVE-2024/CVE-2024-317xx/CVE-2024-31759.json) (`2025-06-12T23:43:02.223`)
- [CVE-2025-47977](CVE-2025/CVE-2025-479xx/CVE-2025-47977.json) (`2025-06-12T23:15:21.750`)
- [CVE-2021-20587](CVE-2021/CVE-2021-205xx/CVE-2021-20587.json) (`2025-06-13T00:15:20.230`)
- [CVE-2021-20588](CVE-2021/CVE-2021-205xx/CVE-2021-20588.json) (`2025-06-13T00:15:22.797`)
- [CVE-2024-30799](CVE-2024/CVE-2024-307xx/CVE-2024-30799.json) (`2025-06-12T23:57:54.350`)
- [CVE-2024-40553](CVE-2024/CVE-2024-405xx/CVE-2024-40553.json) (`2025-06-13T00:04:08.850`)
- [CVE-2024-40554](CVE-2024/CVE-2024-405xx/CVE-2024-40554.json) (`2025-06-13T00:06:59.700`)
- [CVE-2024-40555](CVE-2024/CVE-2024-405xx/CVE-2024-40555.json) (`2025-06-13T00:08:19.140`)
- [CVE-2024-40560](CVE-2024/CVE-2024-405xx/CVE-2024-40560.json) (`2025-06-13T00:14:13.620`)
- [CVE-2024-46213](CVE-2024/CVE-2024-462xx/CVE-2024-46213.json) (`2025-06-13T00:28:54.280`)
- [CVE-2024-48052](CVE-2024/CVE-2024-480xx/CVE-2024-48052.json) (`2025-06-13T00:21:58.573`)
- [CVE-2024-48241](CVE-2024/CVE-2024-482xx/CVE-2024-48241.json) (`2025-06-13T00:24:27.273`)
- [CVE-2024-48900](CVE-2024/CVE-2024-489xx/CVE-2024-48900.json) (`2025-06-13T00:33:54.370`)
- [CVE-2024-4977](CVE-2024/CVE-2024-49xx/CVE-2024-4977.json) (`2025-06-13T00:02:24.623`)
- [CVE-2024-50677](CVE-2024/CVE-2024-506xx/CVE-2024-50677.json) (`2025-06-13T00:35:28.157`)
- [CVE-2024-6766](CVE-2024/CVE-2024-67xx/CVE-2024-6766.json) (`2025-06-13T00:16:33.187`)
- [CVE-2025-5593](CVE-2025/CVE-2025-55xx/CVE-2025-5593.json) (`2025-06-13T01:00:11.693`)
- [CVE-2025-5594](CVE-2025/CVE-2025-55xx/CVE-2025-5594.json) (`2025-06-13T00:58:21.617`)
## Download and Usage

View File

@ -167243,8 +167243,8 @@ CVE-2021-20583,0,0,dfd854c02ad80c4c9284a76c0af83c54e1738f2e8aae523b7f5a4ccfe029a
CVE-2021-20584,0,0,7897d41094c6ff1461b26c002b6d4c8576d5a8e6df5725789071ab85866a5742,2024-11-21T05:46:49.220000
CVE-2021-20585,0,0,0c648813b80991df88b16a534e1d1a30b2a06e2a780d25718b3870c9ffc1384e,2024-11-21T05:46:49.350000
CVE-2021-20586,0,0,e4ff2a8eb090e820504069de95096d9b2f8f7d19251df9137fdf64649af1862b,2024-11-21T05:46:49.483000
CVE-2021-20587,0,0,2213532b8218e894b82aba8f7c0b83318adba38468a4fc4381a72562e6d74b92,2024-11-21T05:46:49.637000
CVE-2021-20588,0,0,00252f17d0d01117cfb84f99ea42a5cefa325ffc6bf5c68d2f8340228e2309b8,2024-11-21T05:46:49.790000
CVE-2021-20587,0,1,9aea705926a1212757620375df92fc5b8cef2c2f1b9b8597cc4b05345a5fb0d6,2025-06-13T00:15:20.230000
CVE-2021-20588,0,1,b3cb9ecdf54a6c4ba0ec56971428d0b0700d8cfa3088c92869b82df056078a88,2025-06-13T00:15:22.797000
CVE-2021-20589,0,0,bfc5f7f0760bbae45f8f582555ee425a5ae4ae77e0859c27cce5e52a8fd93d07,2024-11-21T05:46:49.930000
CVE-2021-2059,0,0,572e4d9069bca8402dc4833f53a165543bca262aba15a93719dc84f4b9037612,2024-11-21T06:02:17.323000
CVE-2021-20590,0,0,1b3e9561d0d4ed6e5ed9f739bea4481d1bb1c0b799358400e664c3f826cd51a4,2024-11-21T05:46:50.060000
@ -252024,7 +252024,7 @@ CVE-2024-22590,0,0,c61f02103dabd4fe4ee1e4744aa85defca93b5aa3ffb20a4fea1a1e022feb
CVE-2024-22591,0,0,abf87faca2359544afd8aae57da6b1b3c01d4b19e553631d37daefe27f471c8a,2024-11-21T08:56:28.613000
CVE-2024-22592,0,0,593835b284e3483f81fda6f64e50c2a2a17d0fc8e64e321aa4ccb98ae21d9cc9,2025-06-02T15:15:31.233000
CVE-2024-22593,0,0,5096bdfca51e45974ccf7b3375156b8687c264919ecbeeea17fc6ebd6a05be56,2024-11-21T08:56:28.923000
CVE-2024-2260,0,1,46f4ae053783a8eb33543c3d74b8dc9e5f7eee826bd500ac1e9d5e0de52f90fc,2025-06-12T23:48:17.817000
CVE-2024-2260,0,0,46f4ae053783a8eb33543c3d74b8dc9e5f7eee826bd500ac1e9d5e0de52f90fc,2025-06-12T23:48:17.817000
CVE-2024-22601,0,0,911fc06c53591b52a66c4d8b85d7ec2c09891cf909bb76b2114fd8c5524918d1,2024-11-21T08:56:29.163000
CVE-2024-22603,0,0,5c9726a11a96b0648c53639b35fdd408a890f7fc7c068b8dcae9441c85f8ab89,2024-11-21T08:56:29.310000
CVE-2024-2261,0,0,4f6d5c9fdf0e5875b684235a52067972acad631b950e5c276c5014b4f1a0e5a5,2024-11-21T09:09:22.330000
@ -257148,7 +257148,7 @@ CVE-2024-29452,0,0,8e1bfc2abfc91b5ca6aaff5eaf1d9a62e09db612bd6386c944cc6eed8e948
CVE-2024-29454,0,0,1c893aa9fc261c831d35b219df714ee3ff6151f3ab4ae74ce0e7125ab45089bf,2024-05-27T01:15:15.473000
CVE-2024-29455,0,0,c5766b7ace224fe7d010005c23caa8535593f35607a7498893863c39faace774,2024-05-27T01:15:15.573000
CVE-2024-2946,0,0,997d6b53bb745a8fe904139e2791e2c813b08bddcde7c3f57e212bb43a8941f1,2024-11-21T09:10:54.347000
CVE-2024-29460,0,1,13f8eceffcee3d05acc96b208d8560083e02a8fddaa09f7082a0f77809cb469e,2025-06-12T23:54:58.770000
CVE-2024-29460,0,0,13f8eceffcee3d05acc96b208d8560083e02a8fddaa09f7082a0f77809cb469e,2025-06-12T23:54:58.770000
CVE-2024-29461,0,0,350d0443897e6abf7e760f551fa90e7e40a7de57ad6f6e7e048339ab4a0daf3b,2025-05-27T16:03:16.460000
CVE-2024-29466,0,0,d1c8dd4175f772e9684f7c0531d839c45304893b8eb7f47c0e48698c58964c2e,2025-03-20T20:15:31.863000
CVE-2024-29469,0,0,c185a691753b377e74e3ffa745c574e83b0f5b88bb3c96fe75965fbcc7484a3a,2025-03-28T16:45:49.587000
@ -257460,7 +257460,7 @@ CVE-2024-29956,0,0,0acd6540b410ec634d0c036a7eeea01b052653cb803090a763826c83babb0
CVE-2024-29957,0,0,70ba4c896cc1ffca005fbeb10bbf5df4d60eaee4a0adcce9c75dd93712bd8bb4,2025-02-04T15:57:57.087000
CVE-2024-29958,0,0,e451fe567cd476c43bc0f0630db35e30ff6017050f5d4cceb89cf67b8326ee25,2025-02-04T15:57:10.910000
CVE-2024-29959,0,0,fcae3e199197e6c5910135052d31e093b695f8ecbf2a65ef23567c27c9ed0128,2025-02-04T15:54:42.997000
CVE-2024-2996,0,1,29ca11a16c9186ba1f89cf012da379c18652d939d22a1e5bbff8ba56601f8d81,2025-06-12T23:33:11.550000
CVE-2024-2996,0,0,29ca11a16c9186ba1f89cf012da379c18652d939d22a1e5bbff8ba56601f8d81,2025-06-12T23:33:11.550000
CVE-2024-29960,0,0,c1ac4f728db0ce56b35b4096e294772b54c42cd7d34b664e438e3aa514ef1c44,2025-02-04T15:53:21.440000
CVE-2024-29961,0,0,23b6afc8546223d4c28a4d906fa3a4016e878e0ad63d9dbdb7ca8764ee1f0b1f,2025-02-04T15:52:04.420000
CVE-2024-29962,0,0,dbf23890b1871d3bb9db2a3ca3cc9d48d287d20d52088c8149445002c4144fa4,2025-02-04T15:48:07.963000
@ -257471,7 +257471,7 @@ CVE-2024-29966,0,0,9817630004e4f9d4a0e0a788b7bffbfdf7f4d5d460d7b6913dfd628a37f88
CVE-2024-29967,0,0,7fb2da47e3e9971d0eb77a91de49cb0c3c56d22f08b4aa2f3abe35d5ef7326c4,2025-02-04T15:43:15.313000
CVE-2024-29968,0,0,76c0dcb3b20e0f30760f0738161c4405206b9ed109fb79f494d7a7769292f0e2,2025-02-04T15:41:56.900000
CVE-2024-29969,0,0,00af3b0cb31f5ed33b88c85d289859989a5d43b77c909cbc5f0dadf2c52baacb,2025-02-04T15:41:14.437000
CVE-2024-2997,0,1,cceb838f5edf102a8560e0b8ec9e40306737e8577c51377a77438a62adb0cec4,2025-06-12T23:28:31.310000
CVE-2024-2997,0,0,cceb838f5edf102a8560e0b8ec9e40306737e8577c51377a77438a62adb0cec4,2025-06-12T23:28:31.310000
CVE-2024-29970,0,0,30ccfc672dbcc68f9e9c530abc2a318b021327a43912d1a8fe68035e6eb0947c,2025-01-14T15:15:14.973000
CVE-2024-29971,0,0,d6ed4ef29e7bc64c3c722e51c9009928cc19e29fe2b4f6b6879ff10e2eada349,2025-01-14T15:15:15.167000
CVE-2024-29972,0,0,4a108514d84c100eb493dfdf5c25347376ba464486c11a65e2d8fef62b531d49,2025-01-22T22:39:02.917000
@ -257482,7 +257482,7 @@ CVE-2024-29976,0,0,789fd8071a28cdb2be901c9428939891f0d07c8ed3cca40edb2767ffbebe4
CVE-2024-29977,0,0,bc0b0c3f00512826d3afc15c878e90557d1e530cdf0900ad20154e5fd854b006,2024-08-23T14:52:19.923000
CVE-2024-29978,0,0,eae448edc2ea3a52a4ea4b11b5efbbaddb66df9b1fe4c50de1f98d83d8337b9f,2024-11-26T08:15:05.353000
CVE-2024-29979,0,0,2ba88bbf68a5c6eeb590333f3bddf141b97757456435e31074be547e5e781221,2025-01-14T16:15:28.423000
CVE-2024-2998,0,1,4820dabf195e0b621affb228dccca196dfad539c5408102e333cbef94a09ad77,2025-06-12T23:24:56.703000
CVE-2024-2998,0,0,4820dabf195e0b621affb228dccca196dfad539c5408102e333cbef94a09ad77,2025-06-12T23:24:56.703000
CVE-2024-29980,0,0,143f2e3d7074e60173fc131618c6a699cc502fd9f45595d11d23a3cb92549894,2025-01-14T16:15:28.600000
CVE-2024-29981,0,0,d16fc1d1360856640e375dcb1119eb72495ab67c989f65978267cc9feda18cf9,2025-01-06T18:38:04.080000
CVE-2024-29982,0,0,b7498c81fb2ff5d455f3e540c394e67eb9ab63a8f012ca2dcb7099c8b4039f32,2025-01-15T19:07:20.527000
@ -257642,7 +257642,7 @@ CVE-2024-30126,0,0,4a84f5c7cb55ea0a206c0843b0dd1c4e1cb6614b564e199815c0fb67b370e
CVE-2024-30127,0,0,c2c8bc07d2be439d9efb756dbc4b2460e3dd939346c2dc8fce9c4c0b55385fad,2025-04-29T13:52:28.490000
CVE-2024-30128,0,0,f765dd0aaf2938a4ad73aeccf94f4003876d55e95a48ff57410e71dbc6342846,2024-09-26T13:32:02.803000
CVE-2024-30129,0,0,8c3dfa243fe3d9fcbf8608c332b7786f7ea3753d97eb09d24501ef00ef461d78,2024-12-06T16:15:20.777000
CVE-2024-3013,0,1,5dcd0fd431e7a484de89cdae26abefbb32a2798133a9ebd51c713b33dc379f4d,2025-06-12T23:23:13
CVE-2024-3013,0,0,5dcd0fd431e7a484de89cdae26abefbb32a2798133a9ebd51c713b33dc379f4d,2025-06-12T23:23:13
CVE-2024-30130,0,0,e25a8585937a7a3bfca4585089d126deeae8aa49e27e42698ea13a1ebdef6cab,2024-11-21T09:11:18.623000
CVE-2024-30132,0,0,54d98f7843dea94372252c73cd7990d839c54a6dd19fa7023c76c99fef58d5c6,2024-10-29T21:35:05.643000
CVE-2024-30133,0,0,e08425978db173a70b5a5b6cbb9315d57d44524a2c8d71711218342162ea4294,2024-11-13T17:01:58.603000
@ -258219,7 +258219,7 @@ CVE-2024-3076,0,0,9c25a9fc980ba47dd8ff33a0dda6a4a7aeba692a5023e5a085194957609e21
CVE-2024-3077,0,0,fcbdd34b10368896e2c3c22301b222fc061a71cd9d47f461bb0e75567c8c2976,2025-01-23T19:21:44.207000
CVE-2024-3078,0,0,f23febdf123fb1167e6d15c44d9f90ae5c695a87735eb2afb067ff82e8b10873,2025-05-07T16:29:10.603000
CVE-2024-3079,0,0,1bb74d40e37f82d88a8767e40d33c9e3ded28d80bc3a1cc49cb882442f6d019c,2024-11-21T09:28:51.060000
CVE-2024-30799,0,0,ca56593e05e1d1f711233eff9f777b2bfcf4346690318103f9bbe32f925593d1,2024-11-22T19:15:06.147000
CVE-2024-30799,0,1,bdbe1dfef54b6cb848cb627899b53a6c6beea052ef9c864c72e8c525873ef8b3,2025-06-12T23:57:54.350000
CVE-2024-3080,0,0,070aacb71b634d12e4ba0fafb4ce67c446ce6fd55213f6bff03a7449066b3ede,2024-11-21T09:28:51.213000
CVE-2024-30800,0,0,88d325047f6af6b8e6cb9e48693b94ef112e1ee0e71f463cccc6a18f5927bfea,2024-11-21T09:12:25.323000
CVE-2024-30801,0,0,e570de42f0e688c69f7fb21f607c38cea88e0f782d8d60315b701902099d0ffc,2024-11-21T09:12:25.543000
@ -258894,7 +258894,7 @@ CVE-2024-31750,0,0,f96eb8e3bbed78e55e09766d655b63a754ae5a7049972e728e16ce77deb48
CVE-2024-31755,0,0,71bb3aeb22181c517b85e9c0b60741c7bd35507479d56fe5a7b173dda191453a,2024-11-21T09:13:50.943000
CVE-2024-31756,0,0,0934d41af4d2a8096bf6b79ceb165d1d21a8cb15b32982d5c5355673185c396f,2024-11-21T09:13:51.160000
CVE-2024-31757,0,0,827ecdaa9dc7f88a37dfd8f4c09903a5f5a9992b64bc40c5e964ac858799f717,2024-11-21T09:13:51.390000
CVE-2024-31759,0,1,05e1f4131e61d4f0ada0c5e7d6b8aab829a17b3404edb68b414001697214f750,2025-06-12T23:43:02.223000
CVE-2024-31759,0,0,05e1f4131e61d4f0ada0c5e7d6b8aab829a17b3404edb68b414001697214f750,2025-06-12T23:43:02.223000
CVE-2024-3176,0,0,27a04eebf265d5fa44ca459fa9ee91294b6639de28ee4ae4e04d02d9ff474005,2025-03-17T18:15:17.473000
CVE-2024-31760,0,0,846edb2553b07f2b445cf5a1e8b93556b5dd0398d01eaf96f4b7929dfecd0756,2024-11-21T09:13:51.833000
CVE-2024-3177,0,0,5bf72b0bc06971896d316946ec2a45f35a4b8a5d69e19bb6025aca04738c4b7c,2024-11-21T09:29:05.083000
@ -265722,11 +265722,11 @@ CVE-2024-40549,0,0,71c3a5884cf17c3b292c0c7d286869bbc97b2576bff775ffd252aa8bf9aac
CVE-2024-40550,0,0,a13954525ea3f13e0e64b2179d0e02870dcf760eb3ad45f4b98498ef695c9c99,2024-11-21T09:31:18.393000
CVE-2024-40551,0,0,e53419336a3d2c393845f5829ecc41733ce5d4b798a82e0e65d6e268030c2d9a,2024-11-21T09:31:18.603000
CVE-2024-40552,0,0,ae4f61ed4aa8d7c5fa333dae45cde375a2549b7a662e9b346bf709302a1e9db8,2025-03-26T20:15:20.707000
CVE-2024-40553,0,0,ef316f1d56715054a491a30c2db5feaeee5b52fe9d91e10e7e5b78aaa0cba4e1,2024-11-21T09:31:18.923000
CVE-2024-40554,0,0,39ceb4b2e282d5c17582588a81700778a32dcdc63f2657146966bb85c962c7a5,2024-11-21T09:31:19.117000
CVE-2024-40555,0,0,290d00135c3882fd8b96f06a86389c021b8eb7bf68d142326425cf7d97032ba4,2024-11-22T19:15:06.943000
CVE-2024-40553,0,1,7eea52c2f8e439d2a264ad8548723958806e8137610d6f514e4d52102597995c,2025-06-13T00:04:08.850000
CVE-2024-40554,0,1,5d5c5c2cf162fb9ebc25ddd204c2e4ac2ba23b7c425e13967cbf659595b188e1,2025-06-13T00:06:59.700000
CVE-2024-40555,0,1,4f6aca333b540d8e0a75160dc56aff1ebfd02c6fcf0650f8c968a0e07d9b22ae,2025-06-13T00:08:19.140000
CVE-2024-4056,0,0,d578d896482bad42a689f24bb727d093d89b4e4ad9a16137115268e371c35506,2024-11-21T09:42:05.970000
CVE-2024-40560,0,0,4df2ceb4f41adf8cf666410bb966237766648fac71bacffbfa433d4c66c2109b,2024-11-21T09:31:19.433000
CVE-2024-40560,0,1,5660f8017263b57237c32db3371c0082be9a5828de973f81d34560f70ae95cbe,2025-06-13T00:14:13.620000
CVE-2024-40568,0,0,c12c8f080192deabb173a3181ef7b218c84c4523adbfc6eb7f73c288b6931903,2024-09-20T12:30:17.483000
CVE-2024-4057,0,0,ba7fe553b438d2b224d9d6e5f235b3ee1bb06fdbaf87fbbf24de464c203e2672,2025-05-21T19:10:32.567000
CVE-2024-40575,0,0,8f8f60ae0654b2cb189f518e1a74f4f9151a1448954bee799fbc3bd704a3ffa6,2025-03-18T14:15:39.260000
@ -270073,7 +270073,7 @@ CVE-2024-46209,0,0,d3bbc915447ec1fe735ec63d5553d0fa25a7e9df2ec6f6285302779d3f6b2
CVE-2024-4621,0,0,b9797f219d024d908699660241169113490d175831cdc6cf05e0f2b4b5428339,2025-05-01T19:46:27.260000
CVE-2024-46210,0,0,dd0259ca7d3b357c4120cf4dc5f3010d93adc7f5a3403c8d9782eaa71d816fad,2025-01-31T17:15:13.950000
CVE-2024-46212,0,0,9fb6a248b9aee6c6623aaaed9592269e8faf25b72106f535b7602ba05dd43c74,2024-10-18T12:53:04.627000
CVE-2024-46213,0,0,14e6aca58c78f4091257ec1bdfcf4f32aabc7fd46f373f1f42d1b8882c20a13c,2024-10-18T12:53:04.627000
CVE-2024-46213,0,1,e8d005be929efffbf7a3a6d4dc420a10859e47c5da743f0b11ad04b5e7652201,2025-06-13T00:28:54.280000
CVE-2024-46215,0,0,fe5702e9b51c58e432fa7fecc93685ecce003d70c9e7155da8f03da1e9c41964,2024-10-15T21:35:30.590000
CVE-2024-4622,0,0,23626a2d23de89416eb6f3e5f72e3392ef600a48bdf20a3fbfd212329cf56b8e,2025-03-27T16:15:27.163000
CVE-2024-46226,0,0,c0cdc9f66887753e84142ab4c1bfeab26a435bd0ec33b3255c2d522705ad303c,2025-04-07T18:52:11.070000
@ -271583,7 +271583,7 @@ CVE-2024-48048,0,0,a97f7ada1c5aaf8df54082eb88b9dfacd58ec4c81aca77d5cdf908f50642b
CVE-2024-48049,0,0,44d628a1eb8f855e4d625cdaa49c33b7e84051ea78a51483f0e723cb2dcbe66a,2024-10-23T16:12:12.127000
CVE-2024-4805,0,0,93a656f3ef0420cc8656281fbe063af8c1d24a62891b64e6c9034267d927db57,2025-02-11T18:29:28.423000
CVE-2024-48050,0,0,2526aa2b45f0900ba490f81f2aae96cf98ae8e11e46739550d124ed38d03df73,2024-11-06T21:35:07.863000
CVE-2024-48052,0,0,9fba2065f46f7e67be083b8d8efce9358fc327a0292fa98dcbc32b7499d176c1,2024-11-06T20:35:29.830000
CVE-2024-48052,0,1,6e0e10a7a1e22c19ee55cbdb4219ebc5987fc86d75fe8beb78a54cd39203285f,2025-06-13T00:21:58.573000
CVE-2024-48057,0,0,854d29e18299ec9a1432f3ae60c1d2f8a2a34c19fade5fa224384e18ef65d8b1,2024-11-05T18:35:10.987000
CVE-2024-48059,0,0,e3f8f61737f0f9774697a61977452d4dae1cbee369a51fc5b18151dbe27d571a,2024-11-05T22:35:11.853000
CVE-2024-4806,0,0,c24a2ce3dd8e70c6a1052478b7de9c33f0214d0df368bae6e15d075a67c1b546,2025-02-11T18:29:14.440000
@ -271675,7 +271675,7 @@ CVE-2024-48237,0,0,0c77a24001e55d3115e663aa0aaa2117eada9184bbe35e280e7227bad6fdf
CVE-2024-48238,0,0,369469fb90866b16e049137a96b36fde2d8ada2e645c31012efe26d150a3ca76,2025-04-17T18:59:35.273000
CVE-2024-48239,0,0,150999466b9913bb39d725025f345b709775b852cf8ae7b1e5357c6269e9f116,2025-04-17T18:56:59.167000
CVE-2024-4824,0,0,99e5c25e3efbae2d6155cb78a769b081c4e63979dfca195378dce1a55688edc2,2024-11-21T09:43:41.940000
CVE-2024-48241,0,0,942b4afc357baeaceadf6e602d4d8e3bfa0474bc4cebfcbfe23fbed098a739b4,2024-11-01T12:57:03.417000
CVE-2024-48241,0,1,117d0e0a3ba0b329464213b66039261a0e77180dc4e5934e73fdd19266cb9118,2025-06-13T00:24:27.273000
CVE-2024-48245,0,0,24922a2d7e07e6658bda8116d06f7d7a042d2aff2acd1eb5bf13301caf6d9893,2025-05-14T16:06:12.270000
CVE-2024-48246,0,0,9e54d8ae569997b2da7f9b0bd6618b2d7111ed51e20372574de285e89a2b6c23,2025-05-21T15:34:19.317000
CVE-2024-48248,0,0,bfaaa427608ee7a1887b41f59bd89b64643bcbb880eb573595b1a553986426d5,2025-03-25T18:48:31.753000
@ -271988,7 +271988,7 @@ CVE-2024-48897,0,0,f3182141722d6be3bdc9aba61fbb38fd1908803d90d823ef2ab33a0e64cdc
CVE-2024-48898,0,0,2bbe84de4ba6be3ab03f78825e1f154bca82574585a617dc37898b47a2165c1c,2024-11-20T14:46:16.237000
CVE-2024-48899,0,0,eb76319bd18f01b7503dd2a2f3856ff3104244a68e1129e9428c69469b9ae487,2025-06-02T15:36:03.710000
CVE-2024-4890,0,0,6e589fdb6077c4e188ee9995a9f88a600abbe14c9e8cdba14f2d7418747caae1,2024-11-21T09:43:48.113000
CVE-2024-48900,0,0,906a3971f953f9efb237a78dcf4f276b0eb327f92bdc6728147ee1acc8f7a2f1,2024-11-21T18:15:10.460000
CVE-2024-48900,0,1,e5741ed69add8f97d4353b5f138e2f391b7c60e7336735fcd26a443e0d30a4ad,2025-06-13T00:33:54.370000
CVE-2024-48901,0,0,71a32a44c0ef4ae7be4ebee83c1da9cd9051ae7f4725178587fe5cc4d9f33740,2024-11-20T14:45:10.380000
CVE-2024-48902,0,0,fac907ba592985cedbc6c7d62d6399de126c11c59cc432f7434b088369952c3f,2024-10-16T16:57:23.463000
CVE-2024-48903,0,0,49fdfa095e9ba18ef9d33ae5dbb85500094116df8d52da97c48eb1a137b560a0,2025-03-13T14:15:32.560000
@ -272690,7 +272690,7 @@ CVE-2024-49766,0,0,9293ee2c0e977752a03fa95c9f6ffc14dfd362cad2bd4e82d4b3e3936ed5b
CVE-2024-49767,0,0,65633cbaa7e1575f6d90b96e625045f51346ad943fc9deac02f5dce675e8675b,2025-01-03T12:15:26.257000
CVE-2024-49768,0,0,f42149a947b9e6a9df44e097df1a7cbc9a84f232e5092fba26854faae247d400,2024-11-07T17:28:02.853000
CVE-2024-49769,0,0,236a5de10e245676abd4e56a87000acf7227e0ad3f0804fa300b288d259df1fe,2024-11-21T09:41:49.443000
CVE-2024-4977,0,0,21af71e7a2cf26f44bedd7736257ef5f1632363146a389d63b714b5416af507f,2024-11-21T09:43:59.597000
CVE-2024-4977,0,1,d821244fa6a2f69003ca3ba16e6e54dfd89961d1ae22eb872f024d5dc29caa70,2025-06-13T00:02:24.623000
CVE-2024-49770,0,0,8616f0e6e6f5ee633f90ccf399fc35ba693a589bdcd4054ddef0f3c8ec957161,2024-11-01T20:24:53.730000
CVE-2024-49771,0,0,8c6be80f6c66464327581fe20dca305196ea80220132086a57a1f206da8b3bfd,2024-10-29T14:34:50.257000
CVE-2024-49772,0,0,32b7e95857890df8c85cd4e02aad79ee44554209662330cf7f8cc7a1c9ccfb02,2024-11-13T20:19:54.597000
@ -273609,7 +273609,7 @@ CVE-2024-50667,0,0,3b2228d5805eb7f24398eb0494f5bf949bcc12d73d945bfde4b91a49f82fd
CVE-2024-5067,0,0,1b5c70fd6aa8a713385c4f1e29f8c71eeaa98648b5736e6e39376f75e3abb922,2024-11-21T09:46:53.810000
CVE-2024-50671,0,0,99782c17088a8d91d172d01f5a082085329526fd6f7189288ae0f91a8aaa1a9a,2024-12-04T17:15:14.860000
CVE-2024-50672,0,0,a506f4d2b4e62571040ff3dd4b935bbaea397a7aabe2668687c8152c3cc151d7,2024-11-27T17:15:12.563000
CVE-2024-50677,0,0,5f636a99c7704b7aa1bd0744ae40d212a5ec12b70cab5081ae39c2cc98943598,2024-12-06T17:15:10.180000
CVE-2024-50677,0,1,723fb15f9de6b325f3887ee4e5c3bf4eff6d2c38d5cbfe8a7194feab4a03ee93,2025-06-13T00:35:28.157000
CVE-2024-50684,0,0,cb4ec550b06395fe76d03028f59046b8ca95e5449f0c8b23214661474b2ea854,2025-04-07T18:51:59.260000
CVE-2024-50685,0,0,d1f6c86d98cb742624cc284cb8052fd9cb180286a11d2d3ca0ab743823da9fa2,2025-04-07T18:51:55.053000
CVE-2024-50686,0,0,52e4157c3eb30e685fb9ee416f9fca289dd7b41a5c8cadd1bcef667a01098287,2025-04-07T18:51:50.390000
@ -279390,7 +279390,7 @@ CVE-2024-6761,0,0,f38b3ccdc89aa0093bd659ba31741817a9ff74cb3bee1ce8404957bf0a35b5
CVE-2024-6762,0,0,18690a6aa399969d81c352c88449cf6232694cd617037dfea2e7d34ee651a81a,2024-11-08T21:29:51.237000
CVE-2024-6763,0,0,fbb7a9fc4e7fc1b130680cf78a7623e5b6152c7321412c2f0ae8446694405210,2025-03-07T01:15:11.793000
CVE-2024-6765,0,0,582116fb1612a7c43e0b570dc3dd773f185a6bed827d147d00793764d2f2774e,2024-07-17T14:15:04.327000
CVE-2024-6766,0,0,dc8ecbb0b1e47eec3565e2404db269c00a7800abc0dcce313d6dc0483691a1de,2024-08-06T16:30:24.547000
CVE-2024-6766,0,1,2a7fe79e277d1967138e7a13c233b8c4a45a1957231f1b18a2385a738f052530,2025-06-13T00:16:33.187000
CVE-2024-6767,0,0,f769e30490d66d8fac295ebcef2fe317bfce217d66064d303b66800281e266c9,2024-08-21T12:30:33.697000
CVE-2024-6768,0,0,c9b849fa2708028c983ea26f499bccf85a66f3b6f4293085d3d2f94306290631,2024-08-13T12:58:25.437000
CVE-2024-6769,0,0,0ac0cfe1e10010a7138bf316346b2b55c6552382ac5f9f38dcfd36dab99a6396,2024-11-21T09:50:16.560000
@ -294476,8 +294476,8 @@ CVE-2025-4123,0,0,b273a1b485cb3feb197a6a9855fd98a99a47d7d21e024b2df7154800bc33c4
CVE-2025-41230,0,0,0c25a26a651e10ec85f6e769a1a9cc82bb8d12716df24840e46d82d1d274c1bc,2025-05-21T20:25:16.407000
CVE-2025-41231,0,0,e30b6f8b7576282583867252dd43d1bf6e7ecb42918ca5f72a9a1aca432764d0,2025-06-12T16:22:47.783000
CVE-2025-41232,0,0,517310e679218fd1f22e7e0fd08cf56e44290e9febf8e46b848de21769620f54,2025-05-21T20:24:58.133000
CVE-2025-41233,1,1,6b8247cb02fbf912230c4061bdcbca5c903b79312c9696c12091ffa56735653a,2025-06-12T22:15:20.560000
CVE-2025-41234,1,1,49e580f1b467749711b12e94dfd5ceaa9e4f722e6c04db5dbd1603fbd5bb0cd3,2025-06-12T22:15:21.090000
CVE-2025-41233,0,0,6b8247cb02fbf912230c4061bdcbca5c903b79312c9696c12091ffa56735653a,2025-06-12T22:15:20.560000
CVE-2025-41234,0,0,49e580f1b467749711b12e94dfd5ceaa9e4f722e6c04db5dbd1603fbd5bb0cd3,2025-06-12T22:15:21.090000
CVE-2025-41235,0,0,d4d8945eb1b378e0ed66f8c1428c86eda4f61188221c7cba9d8ecf68b09b94fa,2025-05-30T16:31:03.107000
CVE-2025-4124,0,0,2116d33601d18584d8ff86788e21befdf79ee067b30d9afca370ae97d0f6cb63,2025-05-16T16:56:49.807000
CVE-2025-4125,0,0,9ce360e53c445df2b459e99f4cc1a32fbf05cb06f761d7887ca2ad1edf5cdba7,2025-05-16T16:56:47.173000
@ -294613,7 +294613,11 @@ CVE-2025-4222,0,0,0ac402cc845bab4a30e9252ea588813619c6f19618452a717b52c67067208b
CVE-2025-4223,0,0,956f48551f11f91b052ecedb14a153aceab464c078b4bc0b79be148ceb74f438,2025-05-28T14:58:52.920000
CVE-2025-4224,0,0,1207737d79a1e90fb6c077a6a1097540732fecbc5b6d096024f04eb01ab32d8d,2025-06-04T14:54:33.783000
CVE-2025-4226,0,0,553848fc8965850ce01d7354687a65a57c667ad58d4e47460cbb85b0387517fd,2025-05-30T10:15:23.343000
CVE-2025-4233,1,1,029195bf86c0a284db68d98fa17451ac3fdbea3e5c1a40c505f5236175313bb3,2025-06-12T23:15:21.983000
CVE-2025-4228,1,1,554b1a6f1624f5ff21aabcc2ba5fe6664bfd45b472d87eab77b50fd6cdf9b337,2025-06-13T00:15:23.233000
CVE-2025-4230,1,1,3bc7d43f6ed17d0222050d5e2a8c149fcb80dc001be4c3f44b9fc2d5f7403e5e,2025-06-13T00:15:23.380000
CVE-2025-4231,1,1,9f35b2b6570c87e4ea9cfe7424c6a624299304be5429d17ab099d4079abf7e0b,2025-06-13T00:15:23.533000
CVE-2025-4232,1,1,7c0d7848e06aeb2ed299e7649a2baf502414476df4b217dd96bdb218f0ad26fa,2025-06-13T00:15:23.697000
CVE-2025-4233,0,0,029195bf86c0a284db68d98fa17451ac3fdbea3e5c1a40c505f5236175313bb3,2025-06-12T23:15:21.983000
CVE-2025-4236,0,0,4a998b3d009e2e5b8d6c745dec0a05483fadfb16e9111b778387c6694f340a68,2025-05-16T15:04:03.170000
CVE-2025-4237,0,0,6e9102316b2d9622f5dbc1640c375fa9a5bfea77a1257bb79b559d426c098991,2025-05-16T15:03:54.820000
CVE-2025-4238,0,0,4c32d3f4362fe39e2d2da40a1702743e497b428c81eff7b7cd5a815f44e86b4b,2025-05-16T17:31:59.303000
@ -296453,7 +296457,7 @@ CVE-2025-47966,0,0,9af6a33a751a4e930e5be1495300477ca1b17cde2c86ba4e4a2e9e219bcd8
CVE-2025-47968,0,0,9873a05770c354442bf3bf27c8a92251f359bb37d069f641052bb9259afd6d63,2025-06-12T16:06:29.520000
CVE-2025-47969,0,0,0e0e7b75223041c5dbcc523eb2d30156bba76ff3a1b7b7da0774106a4c0a4009,2025-06-12T16:06:29.520000
CVE-2025-4797,0,0,7955c65d02ae59cf8e91f669d1ef33f935d7dc4278caacac2c860c6a07f32d1d,2025-06-04T14:54:33.783000
CVE-2025-47977,0,1,d894bcd678ce2e1999caa77e733bd06366307de4085e92553562af309f75f38a,2025-06-12T23:15:21.750000
CVE-2025-47977,0,0,d894bcd678ce2e1999caa77e733bd06366307de4085e92553562af309f75f38a,2025-06-12T23:15:21.750000
CVE-2025-4798,0,0,5a239835fd6b5e28a8ee62e1d59407fcaa00b3515f6181c70d072abba12c6641,2025-06-12T16:06:20.180000
CVE-2025-4799,0,0,e64652d71ac1ccd82a0f39bce94f4578f980ed5ddbfde3f8e1c7d8e5c6d31bc4,2025-06-12T16:06:20.180000
CVE-2025-4800,0,0,9318c6df70d36b773d7fc889153c4ccced0bd2fc6ace455b4d54f9e1c185a4a9,2025-05-28T15:01:30.720000
@ -297550,8 +297554,8 @@ CVE-2025-5583,0,0,b2ce656eeaab700a8a0873a3d565fbebe88a85c216d85c69e76524b9646991
CVE-2025-5584,0,0,554122312ccf631b36ad0ef789707a593ded0bc038e2cac6c090436b66fd53f2,2025-06-10T15:10:06.207000
CVE-2025-5586,0,0,b91049de82efb55ef679cf10931aa4f56290c24a8f2fbf45be0281fcede07341,2025-06-06T14:07:28.330000
CVE-2025-5592,0,0,36c388f33c323490a93ebd79d5f124d5f4fdc10d946cc1144d6e587fb6694158,2025-06-09T15:02:45.030000
CVE-2025-5593,0,0,2fc870a522f11936dac0dea9ff39b04ab227f9c952baf080bcd9f5e32f30e2b0,2025-06-05T20:12:23.777000
CVE-2025-5594,0,0,b27966499bfacb8dd28a0b76f2459af0a87ee57098cc25d08139feded7c76259,2025-06-05T20:12:23.777000
CVE-2025-5593,0,1,6df395e5fe3476beb67761792da6574eda83b6d9a337db7d77d384194417b8ee,2025-06-13T01:00:11.693000
CVE-2025-5594,0,1,83e7fdcfac2ba201d4fe551d7608819296af218dfeb5718bd91a2cdb5f7cbdd0,2025-06-13T00:58:21.617000
CVE-2025-5595,0,0,6fd2895568ff74e54f1725927ad75de212a244c65c2887bf2aa1787076195717,2025-06-05T20:12:23.777000
CVE-2025-5596,0,0,82e23e549f21aaf09e5e1c4b088111b178830006f56637c5b165470eaca69f89,2025-06-05T20:12:23.777000
CVE-2025-5597,0,0,c6542e113819d36b9ca3595ae5f78250394d8b05f7ccd0ada2c6c9bddae0ce68,2025-06-04T14:54:33.783000

Can't render this file because it is too large.