diff --git a/CVE-2022/CVE-2022-203xx/CVE-2022-20388.json b/CVE-2022/CVE-2022-203xx/CVE-2022-20388.json index dcd8667bd25..117a1af1a7f 100644 --- a/CVE-2022/CVE-2022-203xx/CVE-2022-20388.json +++ b/CVE-2022/CVE-2022-203xx/CVE-2022-20388.json @@ -2,7 +2,7 @@ "id": "CVE-2022-20388", "sourceIdentifier": "security@android.com", "published": "2022-09-13T20:15:09.217", - "lastModified": "2024-11-21T06:42:43.420", + "lastModified": "2025-06-05T19:15:21.330", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2022/CVE-2022-203xx/CVE-2022-20389.json b/CVE-2022/CVE-2022-203xx/CVE-2022-20389.json index f2c04cbff71..8e964a5be3d 100644 --- a/CVE-2022/CVE-2022-203xx/CVE-2022-20389.json +++ b/CVE-2022/CVE-2022-203xx/CVE-2022-20389.json @@ -2,7 +2,7 @@ "id": "CVE-2022-20389", "sourceIdentifier": "security@android.com", "published": "2022-09-13T20:15:09.257", - "lastModified": "2024-11-21T06:42:43.527", + "lastModified": "2025-06-05T19:15:22.960", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2022/CVE-2022-203xx/CVE-2022-20392.json b/CVE-2022/CVE-2022-203xx/CVE-2022-20392.json index 349aba38f66..322fc98c116 100644 --- a/CVE-2022/CVE-2022-203xx/CVE-2022-20392.json +++ b/CVE-2022/CVE-2022-203xx/CVE-2022-20392.json @@ -2,7 +2,7 @@ "id": "CVE-2022-20392", "sourceIdentifier": "security@android.com", "published": "2022-09-13T20:15:09.390", - "lastModified": "2024-11-21T06:42:43.887", + "lastModified": "2025-06-05T19:15:23.130", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-26xx/CVE-2022-2654.json b/CVE-2022/CVE-2022-26xx/CVE-2022-2654.json index 481b4e25e9a..cff7c9997e0 100644 --- a/CVE-2022/CVE-2022-26xx/CVE-2022-2654.json +++ b/CVE-2022/CVE-2022-26xx/CVE-2022-2654.json @@ -2,7 +2,7 @@ "id": "CVE-2022-2654", "sourceIdentifier": "contact@wpscan.com", "published": "2022-09-16T09:15:10.727", - "lastModified": "2024-11-21T07:01:27.060", + "lastModified": "2025-06-05T19:15:23.347", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,13 +36,33 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, "weaknesses": [ { "source": "contact@wpscan.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-26xx/CVE-2022-2669.json b/CVE-2022/CVE-2022-26xx/CVE-2022-2669.json index e16ea1a1871..8d9aa78a94a 100644 --- a/CVE-2022/CVE-2022-26xx/CVE-2022-2669.json +++ b/CVE-2022/CVE-2022-26xx/CVE-2022-2669.json @@ -2,7 +2,7 @@ "id": "CVE-2022-2669", "sourceIdentifier": "contact@wpscan.com", "published": "2022-09-16T09:15:10.847", - "lastModified": "2024-11-21T07:01:28.930", + "lastModified": "2025-06-05T19:15:23.580", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,13 +36,33 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, "weaknesses": [ { "source": "contact@wpscan.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-29xx/CVE-2022-2989.json b/CVE-2022/CVE-2022-29xx/CVE-2022-2989.json index 41196027766..68879827a58 100644 --- a/CVE-2022/CVE-2022-29xx/CVE-2022-2989.json +++ b/CVE-2022/CVE-2022-29xx/CVE-2022-2989.json @@ -2,7 +2,7 @@ "id": "CVE-2022-2989", "sourceIdentifier": "secalert@redhat.com", "published": "2022-09-13T14:15:08.687", - "lastModified": "2024-11-21T07:02:02.567", + "lastModified": "2025-06-05T19:15:23.780", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,13 +36,33 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 } ] }, "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-325xx/CVE-2022-32555.json b/CVE-2022/CVE-2022-325xx/CVE-2022-32555.json index d8efa1edc25..6dbf25e3e27 100644 --- a/CVE-2022/CVE-2022-325xx/CVE-2022-32555.json +++ b/CVE-2022/CVE-2022-325xx/CVE-2022-32555.json @@ -2,7 +2,7 @@ "id": "CVE-2022-32555", "sourceIdentifier": "cve@mitre.org", "published": "2022-09-13T20:15:09.750", - "lastModified": "2024-11-21T07:06:37.393", + "lastModified": "2025-06-05T19:15:24.040", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-336xx/CVE-2022-33631.json b/CVE-2022/CVE-2022-336xx/CVE-2022-33631.json index 3902fddb130..e9476a33165 100644 --- a/CVE-2022/CVE-2022-336xx/CVE-2022-33631.json +++ b/CVE-2022/CVE-2022-336xx/CVE-2022-33631.json @@ -2,7 +2,7 @@ "id": "CVE-2022-33631", "sourceIdentifier": "secure@microsoft.com", "published": "2022-08-09T20:15:09.977", - "lastModified": "2024-11-21T07:08:12.750", + "lastModified": "2025-06-05T19:15:24.277", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-693" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-336xx/CVE-2022-33640.json b/CVE-2022/CVE-2022-336xx/CVE-2022-33640.json index 8b6e38c6ec1..900eef0a558 100644 --- a/CVE-2022/CVE-2022-336xx/CVE-2022-33640.json +++ b/CVE-2022/CVE-2022-336xx/CVE-2022-33640.json @@ -2,7 +2,7 @@ "id": "CVE-2022-33640", "sourceIdentifier": "secure@microsoft.com", "published": "2022-08-09T20:15:10.097", - "lastModified": "2024-11-21T07:08:13.927", + "lastModified": "2025-06-05T19:15:24.473", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-336xx/CVE-2022-33646.json b/CVE-2022/CVE-2022-336xx/CVE-2022-33646.json index 7e99376410b..e9bc3ac1a81 100644 --- a/CVE-2022/CVE-2022-336xx/CVE-2022-33646.json +++ b/CVE-2022/CVE-2022-336xx/CVE-2022-33646.json @@ -2,7 +2,7 @@ "id": "CVE-2022-33646", "sourceIdentifier": "secure@microsoft.com", "published": "2022-08-09T20:15:10.157", - "lastModified": "2024-11-21T07:08:14.673", + "lastModified": "2025-06-05T19:15:24.637", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-346xx/CVE-2022-34691.json b/CVE-2022/CVE-2022-346xx/CVE-2022-34691.json index af85fffbc2d..7c529d03073 100644 --- a/CVE-2022/CVE-2022-346xx/CVE-2022-34691.json +++ b/CVE-2022/CVE-2022-346xx/CVE-2022-34691.json @@ -2,7 +2,7 @@ "id": "CVE-2022-34691", "sourceIdentifier": "secure@microsoft.com", "published": "2022-08-09T20:15:10.617", - "lastModified": "2024-11-21T07:09:59.673", + "lastModified": "2025-06-05T19:15:24.820", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-346xx/CVE-2022-34692.json b/CVE-2022/CVE-2022-346xx/CVE-2022-34692.json index f3186a8699c..c1032a3db15 100644 --- a/CVE-2022/CVE-2022-346xx/CVE-2022-34692.json +++ b/CVE-2022/CVE-2022-346xx/CVE-2022-34692.json @@ -2,7 +2,7 @@ "id": "CVE-2022-34692", "sourceIdentifier": "secure@microsoft.com", "published": "2022-08-09T20:15:10.673", - "lastModified": "2024-11-21T07:09:59.810", + "lastModified": "2025-06-05T19:15:25.033", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-346xx/CVE-2022-34696.json b/CVE-2022/CVE-2022-346xx/CVE-2022-34696.json index 9337251a65a..b9a9a964c21 100644 --- a/CVE-2022/CVE-2022-346xx/CVE-2022-34696.json +++ b/CVE-2022/CVE-2022-346xx/CVE-2022-34696.json @@ -2,7 +2,7 @@ "id": "CVE-2022-34696", "sourceIdentifier": "secure@microsoft.com", "published": "2022-08-09T20:15:10.730", - "lastModified": "2024-11-21T07:09:59.943", + "lastModified": "2025-06-05T19:15:25.203", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", @@ -49,6 +49,16 @@ "value": "CWE-362" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-346xx/CVE-2022-34699.json b/CVE-2022/CVE-2022-346xx/CVE-2022-34699.json index f4066f1c8c3..22acd569bdc 100644 --- a/CVE-2022/CVE-2022-346xx/CVE-2022-34699.json +++ b/CVE-2022/CVE-2022-346xx/CVE-2022-34699.json @@ -2,7 +2,7 @@ "id": "CVE-2022-34699", "sourceIdentifier": "secure@microsoft.com", "published": "2022-08-09T20:15:10.787", - "lastModified": "2024-11-21T07:10:00.077", + "lastModified": "2025-06-05T19:15:25.383", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-391xx/CVE-2022-39151.json b/CVE-2022/CVE-2022-391xx/CVE-2022-39151.json index b5bdcbcf7db..79c1d72952c 100644 --- a/CVE-2022/CVE-2022-391xx/CVE-2022-39151.json +++ b/CVE-2022/CVE-2022-391xx/CVE-2022-39151.json @@ -2,7 +2,7 @@ "id": "CVE-2022-39151", "sourceIdentifier": "productcert@siemens.com", "published": "2022-09-13T10:15:11.770", - "lastModified": "2024-11-21T07:17:40.647", + "lastModified": "2025-06-05T19:15:25.560", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,13 +36,33 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "productcert@siemens.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-128xx/CVE-2024-12842.json b/CVE-2024/CVE-2024-128xx/CVE-2024-12842.json index 8e52af05ee9..4026f91625a 100644 --- a/CVE-2024/CVE-2024-128xx/CVE-2024-12842.json +++ b/CVE-2024/CVE-2024-128xx/CVE-2024-12842.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12842", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-20T20:15:21.880", - "lastModified": "2024-12-24T17:15:08.800", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-05T19:43:22.453", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -122,24 +142,69 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:*", + "versionEndExcluding": "2.4.1", + "matchCriteriaId": "B449A14E-7C7E-4541-95AB-C2E55846E4D3" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/emlog/emlog/issues/305", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.289078", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.289078", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/emlog/emlog/issues/305", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13192.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13192.json index 68536ae8965..4c80f2c4319 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13192.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13192.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13192", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-08T23:15:09.017", - "lastModified": "2025-01-09T17:15:11.420", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-05T19:44:22.500", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -122,32 +142,83 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zerowdd:myblog:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "61F46EB8-93D0-4634-A9D1-5823309AA2F5" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/ZeroWdd/myblog/issues/4", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://github.com/ZeroWdd/myblog/issues/4#issue-2759845658", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.290784", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.290784", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.469232", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/ZeroWdd/myblog/issues/4", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13194.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13194.json index 0c8eef33ca1..1321024f004 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13194.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13194.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13194", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T00:15:25.357", - "lastModified": "2025-01-09T17:15:11.690", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-05T19:45:03.537", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,75 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sucms_project:sucms:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "54E4EEF5-A773-4381-AAC6-ECA5936AB714" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/Upgradeextension/Sucms-v1.0SQLinjection/blob/main/README.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.290786", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.290786", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.469566", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/Upgradeextension/Sucms-v1.0SQLinjection/blob/main/README.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22027.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22027.json index 06ceaf00f80..bbb4f52d822 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22027.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22027.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22027", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-01-12T07:15:12.243", - "lastModified": "2024-11-21T08:55:25.607", + "lastModified": "2025-06-05T19:15:25.847", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-240xx/CVE-2024-24014.json b/CVE-2024/CVE-2024-240xx/CVE-2024-24014.json index a0dedaf82fa..c32c4275d30 100644 --- a/CVE-2024/CVE-2024-240xx/CVE-2024-24014.json +++ b/CVE-2024/CVE-2024-240xx/CVE-2024-24014.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24014", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-08T02:15:07.840", - "lastModified": "2024-11-21T08:58:49.353", + "lastModified": "2025-06-05T19:15:26.040", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-240xx/CVE-2024-24019.json b/CVE-2024/CVE-2024-240xx/CVE-2024-24019.json index cf71fe25503..fe12b7af6f2 100644 --- a/CVE-2024/CVE-2024-240xx/CVE-2024-24019.json +++ b/CVE-2024/CVE-2024-240xx/CVE-2024-24019.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24019", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-07T01:15:08.653", - "lastModified": "2024-11-21T08:58:50.063", + "lastModified": "2025-06-05T19:15:26.293", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-241xx/CVE-2024-24131.json b/CVE-2024/CVE-2024-241xx/CVE-2024-24131.json index 11fff0620ac..b1faac8b174 100644 --- a/CVE-2024/CVE-2024-241xx/CVE-2024-24131.json +++ b/CVE-2024/CVE-2024-241xx/CVE-2024-24131.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24131", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-07T14:15:52.770", - "lastModified": "2024-11-21T08:58:57.127", + "lastModified": "2025-06-05T19:15:26.497", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-241xx/CVE-2024-24135.json b/CVE-2024/CVE-2024-241xx/CVE-2024-24135.json index 9fc3f23f85e..a668f93e4c6 100644 --- a/CVE-2024/CVE-2024-241xx/CVE-2024-24135.json +++ b/CVE-2024/CVE-2024-241xx/CVE-2024-24135.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24135", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-29T19:15:08.990", - "lastModified": "2024-11-21T08:58:57.643", + "lastModified": "2025-06-05T19:15:26.727", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-242xx/CVE-2024-24254.json b/CVE-2024/CVE-2024-242xx/CVE-2024-24254.json index 63bab36ccdd..13453a67095 100644 --- a/CVE-2024/CVE-2024-242xx/CVE-2024-24254.json +++ b/CVE-2024/CVE-2024-242xx/CVE-2024-24254.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24254", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-06T22:16:15.010", - "lastModified": "2024-11-21T08:59:03.540", + "lastModified": "2025-06-05T19:15:27.000", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 2.5 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 4.2, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.6, + "impactScore": 2.5 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-362" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-242xx/CVE-2024-24258.json b/CVE-2024/CVE-2024-242xx/CVE-2024-24258.json index a0efbfd5b90..811fb2058ce 100644 --- a/CVE-2024/CVE-2024-242xx/CVE-2024-24258.json +++ b/CVE-2024/CVE-2024-242xx/CVE-2024-24258.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24258", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-05T18:15:52.083", - "lastModified": "2024-11-21T08:59:04.247", + "lastModified": "2025-06-05T19:15:27.210", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-401" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-242xx/CVE-2024-24266.json b/CVE-2024/CVE-2024-242xx/CVE-2024-24266.json index 9758ab3baf6..d708360047a 100644 --- a/CVE-2024/CVE-2024-242xx/CVE-2024-24266.json +++ b/CVE-2024/CVE-2024-242xx/CVE-2024-24266.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24266", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-05T18:15:52.380", - "lastModified": "2024-11-21T08:59:05.313", + "lastModified": "2025-06-05T19:15:27.480", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-243xx/CVE-2024-24311.json b/CVE-2024/CVE-2024-243xx/CVE-2024-24311.json index bbb9a80879e..b427156fb79 100644 --- a/CVE-2024/CVE-2024-243xx/CVE-2024-24311.json +++ b/CVE-2024/CVE-2024-243xx/CVE-2024-24311.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24311", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-07T09:15:16.053", - "lastModified": "2024-11-21T08:59:09.177", + "lastModified": "2025-06-05T19:15:27.690", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-243xx/CVE-2024-24388.json b/CVE-2024/CVE-2024-243xx/CVE-2024-24388.json index c93e697c79a..015f5b270ab 100644 --- a/CVE-2024/CVE-2024-243xx/CVE-2024-24388.json +++ b/CVE-2024/CVE-2024-243xx/CVE-2024-24388.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24388", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-02T10:15:08.870", - "lastModified": "2024-11-21T08:59:13.680", + "lastModified": "2025-06-05T19:15:27.903", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-243xx/CVE-2024-24399.json b/CVE-2024/CVE-2024-243xx/CVE-2024-24399.json index 7f2d00a22e6..d1ea9d0de1e 100644 --- a/CVE-2024/CVE-2024-243xx/CVE-2024-24399.json +++ b/CVE-2024/CVE-2024-243xx/CVE-2024-24399.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24399", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-25T21:15:09.563", - "lastModified": "2024-11-21T08:59:14.690", + "lastModified": "2025-06-05T19:15:28.127", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24488.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24488.json index 1756aae1cb5..904eae2c2f0 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24488.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24488.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24488", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-07T20:15:49.467", - "lastModified": "2024-11-21T08:59:20.560", + "lastModified": "2025-06-05T19:15:28.363", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-312" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-312" + } + ] } ], "configurations": [ diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1216.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1216.json index 2fc5a0b15aa..cf36bb87104 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1216.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1216.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1216", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T19:15:10.427", - "lastModified": "2025-02-12T20:15:39.907", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-05T19:46:48.060", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,24 +142,70 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:yimihome:ywoa:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.07.04", + "matchCriteriaId": "5A824C24-F668-47E1-8E22-22A4071E244F" + } + ] + } + ] } ], "references": [ { "url": "https://gitee.com/r1bbit/yimioa/issues/IBI74K", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.295175", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.295175", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://gitee.com/r1bbit/yimioa/issues/IBI74K", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1224.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1224.json index 525f101df3b..3e8cc02ccce 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1224.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1224.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1224", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T20:15:40.030", - "lastModified": "2025-02-13T15:15:20.500", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-05T19:47:07.900", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,24 +142,70 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:yimihome:ywoa:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.07.04", + "matchCriteriaId": "5A824C24-F668-47E1-8E22-22A4071E244F" + } + ] + } + ] } ], "references": [ { "url": "https://gitee.com/r1bbit/yimioa/issues/IBI731", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.295210", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.295210", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://gitee.com/r1bbit/yimioa/issues/IBI731", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1225.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1225.json index 0b2d24d78ea..6cb373618e0 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1225.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1225.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1225", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T20:15:40.203", - "lastModified": "2025-02-12T20:15:40.203", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-05T19:47:35.927", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -122,20 +122,61 @@ "value": "CWE-611" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:yimihome:ywoa:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.07.04", + "matchCriteriaId": "5A824C24-F668-47E1-8E22-22A4071E244F" + } + ] + } + ] } ], "references": [ { "url": "https://gitee.com/r1bbit/yimioa/issues/IBI81R", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.295211", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.295211", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1226.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1226.json index 0f19304be05..747d6904012 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1226.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1226.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1226", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T21:15:20.470", - "lastModified": "2025-02-12T21:15:20.470", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-05T19:50:14.263", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,20 +142,61 @@ "value": "CWE-285" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:yimihome:ywoa:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.07.04", + "matchCriteriaId": "5A824C24-F668-47E1-8E22-22A4071E244F" + } + ] + } + ] } ], "references": [ { "url": "https://gitee.com/r1bbit/yimioa/issues/IBI7PG", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.295216", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.295216", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1227.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1227.json index 03e7956aa40..d4922f770db 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1227.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1227.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1227", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T21:15:20.657", - "lastModified": "2025-02-12T22:15:41.383", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-05T19:50:47.190", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,24 +142,70 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:yimihome:ywoa:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.07.04", + "matchCriteriaId": "5A824C24-F668-47E1-8E22-22A4071E244F" + } + ] + } + ] } ], "references": [ { "url": "https://gitee.com/r1bbit/yimioa/issues/IBI7XH", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.295217", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.295217", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://gitee.com/r1bbit/yimioa/issues/IBI7XH", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1812.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1812.json index 79395d5d8d3..a93096b42bd 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1812.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1812.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1812", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-02T09:15:10.903", - "lastModified": "2025-03-03T21:15:17.640", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-05T19:52:43.550", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,77 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zframeworks:zz:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024-8", + "matchCriteriaId": "A5C7A823-BB3D-4566-8921-70E33154D2FB" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/A7cc/cve/issues/3", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.298080", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.298080", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.504273", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/A7cc/cve/issues/3", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1840.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1840.json index 394de7cfee0..6450145597c 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1840.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1840.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1840", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-03T00:15:42.857", - "lastModified": "2025-03-03T20:15:45.073", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-05T19:55:58.760", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,74 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:esafenet:cdg:5.6.3.154.205:*:*:*:*:*:*:*", + "matchCriteriaId": "53AB2E5C-D018-44CE-B686-718995388DCF" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/Rain1er/report/blob/main/CDG/dXBkYXRlb3JnLmpzcA%3D%3D.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.298106", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.298106", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.504384", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/Rain1er/report/blob/main/CDG/dXBkYXRlb3JnLmpzcA%3D%3D.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-202xx/CVE-2025-20286.json b/CVE-2025/CVE-2025-202xx/CVE-2025-20286.json index ec797dc3cc9..84a061d790c 100644 --- a/CVE-2025/CVE-2025-202xx/CVE-2025-20286.json +++ b/CVE-2025/CVE-2025-202xx/CVE-2025-20286.json @@ -2,13 +2,17 @@ "id": "CVE-2025-20286", "sourceIdentifier": "psirt@cisco.com", "published": "2025-06-04T17:15:28.427", - "lastModified": "2025-06-04T21:15:37.940", + "lastModified": "2025-06-05T19:15:28.590", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability in Amazon Web Services (AWS), Microsoft Azure, and Oracle Cloud Infrastructure (OCI) cloud deployments of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to access sensitive data, execute limited administrative operations, modify system configurations, or disrupt services within the impacted systems.\r\n\r This vulnerability exists because credentials are improperly generated when Cisco ISE is being deployed on cloud platforms, resulting in different Cisco ISE deployments sharing the same credentials. These credentials are shared across multiple Cisco ISE deployments as long as the software release and cloud platform are the same. An attacker could exploit this vulnerability by extracting the user credentials from Cisco ISE that is deployed in the cloud and then using them to access Cisco ISE that is deployed in other cloud environments through unsecured ports. A successful exploit could allow the attacker to access sensitive data, execute limited administrative operations, modify system configurations, or disrupt services within the impacted systems.\r\n\r Note: If the Primary Administration node is deployed in the cloud, then Cisco ISE is affected by this vulnerability. If the Primary Administration node is on-premises, then it is not affected." + "value": "A vulnerability in Amazon Web Services (AWS), Microsoft Azure, and Oracle Cloud Infrastructure (OCI) cloud deployments of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to access sensitive data, execute limited administrative operations, modify system configurations, or disrupt services within the impacted systems.\r\n\r\nThis vulnerability exists because credentials are improperly generated when Cisco ISE is being deployed on cloud platforms, resulting in different Cisco ISE deployments sharing the same credentials. These credentials are shared across multiple Cisco ISE deployments as long as the software release and cloud platform are the same. An attacker could exploit this vulnerability by extracting the user credentials from Cisco ISE that is deployed in the cloud and then using them to access Cisco ISE that is deployed in other cloud environments through unsecured ports. A successful exploit could allow the attacker to access sensitive data, execute limited administrative operations, modify system configurations, or disrupt services within the impacted systems.\r\nNote: If the Primary Administration node is deployed in the cloud, then Cisco ISE is affected by this vulnerability. If the Primary Administration node is on-premises, then it is not affected." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en las implementaciones en la nube de Cisco Identity Services Engine (ISE) de Amazon Web Services (AWS), Microsoft Azure y Oracle Cloud Infrastructure (OCI) podr\u00eda permitir que un atacante remoto no autenticado acceda a datos confidenciales, ejecute operaciones administrativas limitadas, modifique la configuraci\u00f3n del sistema o interrumpa los servicios de los sistemas afectados. Esta vulnerabilidad se debe a que las credenciales se generan incorrectamente al implementar Cisco ISE en plataformas en la nube, lo que provoca que diferentes implementaciones de Cisco ISE compartan las mismas credenciales. Estas credenciales se comparten entre m\u00faltiples implementaciones de Cisco ISE siempre que la versi\u00f3n de software y la plataforma en la nube sean las mismas. Un atacante podr\u00eda explotar esta vulnerabilidad extrayendo las credenciales de usuario de Cisco ISE implementado en la nube y us\u00e1ndolas para acceder a Cisco ISE implementado en otros entornos de nube a trav\u00e9s de puertos no seguros. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante acceder a datos confidenciales, ejecutar operaciones administrativas limitadas, modificar la configuraci\u00f3n del sistema o interrumpir los servicios de los sistemas afectados. Nota: Si el nodo de administraci\u00f3n principal est\u00e1 implementado en la nube, Cisco ISE se ve afectado por esta vulnerabilidad. Si el nodo de administraci\u00f3n principal est\u00e1 local, no se ver\u00e1 afectado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2914.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2914.json index bb3ff7df2b3..65f546ed1fe 100644 --- a/CVE-2025/CVE-2025-29xx/CVE-2025-2914.json +++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2914.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2914", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-28T17:15:30.510", - "lastModified": "2025-03-28T18:11:40.180", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-05T19:21:11.357", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", @@ -122,24 +122,69 @@ "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hdfgroup:hdf5:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.14.6", + "matchCriteriaId": "F9158517-069A-4BE6-98F2-EBFDE3437236" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/HDFGroup/hdf5/issues/5379", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.301887", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.301887", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.520880", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2923.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2923.json index 6cfaf36ad2c..9839b77b1c5 100644 --- a/CVE-2025/CVE-2025-29xx/CVE-2025-2923.json +++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2923.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2923", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-28T19:15:24.003", - "lastModified": "2025-04-01T20:26:39.627", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-05T19:21:58.263", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", @@ -122,24 +122,69 @@ "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hdfgroup:hdf5:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.14.6", + "matchCriteriaId": "182E217E-3979-463D-91D3-1028EB9F9725" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/HDFGroup/hdf5/issues/5381", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.301898", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.301898", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.521151", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-35xx/CVE-2025-3536.json b/CVE-2025/CVE-2025-35xx/CVE-2025-3536.json index 78379bacabb..599ed08ca69 100644 --- a/CVE-2025/CVE-2025-35xx/CVE-2025-3536.json +++ b/CVE-2025/CVE-2025-35xx/CVE-2025-3536.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3536", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-13T12:15:15.533", - "lastModified": "2025-04-15T18:39:27.967", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-05T19:26:38.817", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -122,24 +122,64 @@ "value": "CWE-285" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tutorials-website:employee_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "61BBBA88-B561-4438-8255-A2D6D768C48E" + } + ] + } + ] } ], "references": [ { "url": "https://vuldb.com/?ctiid.304574", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.304574", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.545810", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry" + ] }, { "url": "https://www.websecurityinsights.my.id/2025/03/tutorials-website-employee-management.html", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-35xx/CVE-2025-3537.json b/CVE-2025/CVE-2025-35xx/CVE-2025-3537.json index 94f696a7b8e..5996a770ea3 100644 --- a/CVE-2025/CVE-2025-35xx/CVE-2025-3537.json +++ b/CVE-2025/CVE-2025-35xx/CVE-2025-3537.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3537", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-13T12:15:15.713", - "lastModified": "2025-04-15T18:39:27.967", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-05T19:27:31.170", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -122,24 +122,67 @@ "value": "CWE-285" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tutorials-website:employee_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "61BBBA88-B561-4438-8255-A2D6D768C48E" + } + ] + } + ] } ], "references": [ { "url": "https://vuldb.com/?ctiid.304575", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.304575", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.545859", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.websecurityinsights.my.id/2025/03/tutorials-website-employee-management_28.html", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-35xx/CVE-2025-3587.json b/CVE-2025/CVE-2025-35xx/CVE-2025-3587.json index 93deb267b23..877fa7e623b 100644 --- a/CVE-2025/CVE-2025-35xx/CVE-2025-3587.json +++ b/CVE-2025/CVE-2025-35xx/CVE-2025-3587.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3587", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-14T20:15:19.800", - "lastModified": "2025-04-15T18:39:27.967", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-05T19:28:11.513", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,76 @@ "value": "CWE-285" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zerowdd:studentmanager:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2375E47D-661D-4707-AC3E-A71C23BEF7FB" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/buluorifu/Vulnerability-recurrence/blob/main/Refer/ZeroWdd-studentmanager-authority.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.304642", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.304642", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.550129", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/buluorifu/Vulnerability-recurrence/blob/main/Refer/ZeroWdd-studentmanager-authority.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-462xx/CVE-2025-46257.json b/CVE-2025/CVE-2025-462xx/CVE-2025-46257.json new file mode 100644 index 00000000000..7e75c07d9a9 --- /dev/null +++ b/CVE-2025/CVE-2025-462xx/CVE-2025-46257.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-46257", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-05T18:15:21.753", + "lastModified": "2025-06-05T18:15:21.753", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in BdThemes Element Pack Pro allows Cross Site Request Forgery.This issue affects Element Pack Pro: from n/a before 8.0.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/bdthemes-element-pack/vulnerability/wordpress-element-pack-pro-plugin-7-18-12-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-462xx/CVE-2025-46258.json b/CVE-2025/CVE-2025-462xx/CVE-2025-46258.json new file mode 100644 index 00000000000..8600123f33a --- /dev/null +++ b/CVE-2025/CVE-2025-462xx/CVE-2025-46258.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-46258", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-05T18:15:22.163", + "lastModified": "2025-06-05T18:15:22.163", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in BdThemes Element Pack Pro allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Element Pack Pro: from n/a before 8.0.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/bdthemes-element-pack/vulnerability/wordpress-element-pack-pro-plugin-7-18-12-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-476xx/CVE-2025-47616.json b/CVE-2025/CVE-2025-476xx/CVE-2025-47616.json index 157b041b51a..0cb67e4d7ab 100644 --- a/CVE-2025/CVE-2025-476xx/CVE-2025-47616.json +++ b/CVE-2025/CVE-2025-476xx/CVE-2025-47616.json @@ -2,13 +2,13 @@ "id": "CVE-2025-47616", "sourceIdentifier": "audit@patchstack.com", "published": "2025-05-07T15:16:14.773", - "lastModified": "2025-05-08T14:39:09.683", + "lastModified": "2025-06-05T19:15:28.853", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tushar Imran aBlocks allows Stored XSS. This issue affects aBlocks: from n/a through 1.9.1." + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tushar Imran aBlocks allows Stored XSS.This issue affects aBlocks: from n/a through 1.9.2." }, { "lang": "es", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-47xx/CVE-2025-4770.json b/CVE-2025/CVE-2025-47xx/CVE-2025-4770.json index 32d74d27f9b..1ab6539733e 100644 --- a/CVE-2025/CVE-2025-47xx/CVE-2025-4770.json +++ b/CVE-2025/CVE-2025-47xx/CVE-2025-4770.json @@ -2,8 +2,8 @@ "id": "CVE-2025-4770", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-16T11:15:46.150", - "lastModified": "2025-05-16T14:42:18.700", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-05T19:35:54.267", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,75 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:park_ticketing_management_system:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "033F3C02-8BD6-4644-8A6B-D3351806F60C" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/f1rstb100d/myCVE/issues/2", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.309071", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.309071", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.572134", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-47xx/CVE-2025-4780.json b/CVE-2025/CVE-2025-47xx/CVE-2025-4780.json index e1df330c984..8247bddfb08 100644 --- a/CVE-2025/CVE-2025-47xx/CVE-2025-4780.json +++ b/CVE-2025/CVE-2025-47xx/CVE-2025-4780.json @@ -2,8 +2,8 @@ "id": "CVE-2025-4780", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-16T14:15:34.887", - "lastModified": "2025-05-16T14:42:18.700", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-05T19:36:06.897", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,73 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:park_ticketing_management_system:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "033F3C02-8BD6-4644-8A6B-D3351806F60C" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/f1rstb100d/myCVE/issues/5", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.309077", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.309077", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.572163", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-48xx/CVE-2025-4894.json b/CVE-2025/CVE-2025-48xx/CVE-2025-4894.json index 17b392d2883..9ad9fe87fd5 100644 --- a/CVE-2025/CVE-2025-48xx/CVE-2025-4894.json +++ b/CVE-2025/CVE-2025-48xx/CVE-2025-4894.json @@ -2,8 +2,8 @@ "id": "CVE-2025-4894", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-18T20:15:18.803", - "lastModified": "2025-05-19T13:35:20.460", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-05T19:39:01.520", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -122,20 +142,60 @@ "value": "CWE-326" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-326" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:calmkart:django-sso-server:*:*:*:*:*:*:*:*", + "matchCriteriaId": "81391B2C-C30E-41D4-838B-60B868BB7EBB" + } + ] + } + ] } ], "references": [ { "url": "https://vuldb.com/?ctiid.309448", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.309448", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.578019", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry", + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-49xx/CVE-2025-4936.json b/CVE-2025/CVE-2025-49xx/CVE-2025-4936.json index 93795d1c92a..4a90f44e3e2 100644 --- a/CVE-2025/CVE-2025-49xx/CVE-2025-4936.json +++ b/CVE-2025/CVE-2025-49xx/CVE-2025-4936.json @@ -2,8 +2,8 @@ "id": "CVE-2025-4936", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-19T15:15:36.650", - "lastModified": "2025-05-21T20:25:33.823", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-05T19:39:27.940", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,24 +142,68 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:projectworlds:online_food_ordering_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "EC5341DF-BF6E-450B-B216-A427E5FE8F98" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/sknadklasdls/CVE/issues/3", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.309498", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.309498", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.579823", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-49xx/CVE-2025-4937.json b/CVE-2025/CVE-2025-49xx/CVE-2025-4937.json index e28a110f6c9..6e688b6112b 100644 --- a/CVE-2025/CVE-2025-49xx/CVE-2025-4937.json +++ b/CVE-2025/CVE-2025-49xx/CVE-2025-4937.json @@ -2,8 +2,8 @@ "id": "CVE-2025-4937", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-19T15:15:36.827", - "lastModified": "2025-05-21T20:25:33.823", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-05T19:42:48.337", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,74 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:apartment_visitor_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "301F4327-9B9E-4624-BDFD-B0482CD517D5" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/Angel12345623/CVE/blob/main/CVE_3.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.309499", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.309499", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.579830", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5668.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5668.json index ae313305b0f..cbf97e6c2e6 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5668.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5668.json @@ -2,7 +2,7 @@ "id": "CVE-2025-5668", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-05T17:15:29.730", - "lastModified": "2025-06-05T17:15:29.730", + "lastModified": "2025-06-05T18:15:22.447", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +140,10 @@ { "url": "https://vuldb.com/?submit.590064", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/f1rstb100d/myCVE/issues/50", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5669.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5669.json index 4c6e7ab1513..847e811bff7 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5669.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5669.json @@ -2,7 +2,7 @@ "id": "CVE-2025-5669", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-05T17:15:29.917", - "lastModified": "2025-06-05T17:15:29.917", + "lastModified": "2025-06-05T18:15:22.627", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +140,10 @@ { "url": "https://vuldb.com/?submit.590065", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/f1rstb100d/myCVE/issues/51", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5670.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5670.json index 02b58d44b8c..379bdf11104 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5670.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5670.json @@ -2,7 +2,7 @@ "id": "CVE-2025-5670", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-05T17:15:30.117", - "lastModified": "2025-06-05T17:15:30.117", + "lastModified": "2025-06-05T18:15:22.790", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +140,10 @@ { "url": "https://vuldb.com/?submit.590066", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/f1rstb100d/myCVE/issues/52", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5671.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5671.json new file mode 100644 index 00000000000..b44345c42b6 --- /dev/null +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5671.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-5671", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-05T18:15:22.947", + "lastModified": "2025-06-05T18:15:22.947", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in TOTOLINK N302R Plus up to 3.4.0-B20201028. Affected is an unknown function of the file /boafrm/formPortFw of the component HTTP POST Request Handler. The manipulation of the argument service_type leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/byxs0x0/cve2/blob/main/530/1.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.311160", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.311160", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.590093", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.totolink.net/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5672.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5672.json new file mode 100644 index 00000000000..44de912255b --- /dev/null +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5672.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-5672", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-05T18:15:23.220", + "lastModified": "2025-06-05T18:15:23.220", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in TOTOLINK N302R Plus up to 3.4.0-B20201028 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /boafrm/formFilter of the component HTTP POST Request Handler. The manipulation of the argument url leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/byxs0x0/cve2/blob/main/530/2.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.311161", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.311161", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.590094", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.totolink.net/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5674.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5674.json new file mode 100644 index 00000000000..85a003bae97 --- /dev/null +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5674.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-5674", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-05T19:15:29.627", + "lastModified": "2025-06-05T19:15:29.627", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in code-projects Patient Record Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file urinalysis_form.php. The manipulation of the argument urinalysis_id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/yuyuchenchen/vuln-pdf/blob/main/0603CVE.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.311162", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.311162", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.590120", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5675.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5675.json new file mode 100644 index 00000000000..d5b669865f6 --- /dev/null +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5675.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-5675", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-05T19:15:29.993", + "lastModified": "2025-06-05T19:15:29.993", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Campcodes Online Teacher Record Management System 1.0. It has been classified as critical. This affects an unknown part of the file /trms/admin/bwdates-reports-details.php. The manipulation of the argument fromdate/todate leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/modestHonK/cve/issues/1", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.311163", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.311163", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.590124", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.campcodes.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5676.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5676.json new file mode 100644 index 00000000000..810efd403fe --- /dev/null +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5676.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-5676", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-05T19:15:30.247", + "lastModified": "2025-06-05T19:15:30.247", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Campcodes Online Recruitment Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/ajax.php?action=login. The manipulation of the argument Username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/hyx123123/cve/issues/2", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.311164", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.311164", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.590134", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.campcodes.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5677.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5677.json new file mode 100644 index 00000000000..82103a6d3cd --- /dev/null +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5677.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-5677", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-05T19:15:30.487", + "lastModified": "2025-06-05T19:15:30.487", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Campcodes Online Recruitment Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/ajax.php?action=save_application. The manipulation of the argument position_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/hyx123123/cve/issues/1", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.311165", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.311165", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.590135", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.campcodes.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5679.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5679.json new file mode 100644 index 00000000000..05ddc50963d --- /dev/null +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5679.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-5679", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-05T19:15:30.697", + "lastModified": "2025-06-05T19:15:30.697", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in Shenzhen Dashi Tongzhou Information Technology AgileBPM up to 2.5.0. Affected is the function parseStrByFreeMarker of the file /src/main/java/com/dstz/sys/rest/controller/SysToolsController.java. The manipulation of the argument str leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + }, + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://gitee.com/agile-bpm/agile-bpm-basic/issues/ICAQWG", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.311166", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.311166", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.585127", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5683.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5683.json index cf2346bc0de..36992e831c9 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5683.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5683.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5683", "sourceIdentifier": "a59d8014-47c4-4630-ab43-e1b13cbe58e3", "published": "2025-06-05T06:15:27.517", - "lastModified": "2025-06-05T06:15:27.517", + "lastModified": "2025-06-05T19:15:30.890", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "When loading a specifically crafted ICNS format image file in QImage then it will trigger a crash.\u00a0This issue affects Qt from versions 6.3.0 through 6.5.9, from 6.6.0 through 6.8.4, 6.9.0. This is fixed in 6.5.10, 6.8.5 and 6.9.1." + }, + { + "lang": "es", + "value": "Al cargar un archivo de imagen con formato ICNS especialmente manipulado en QImage, se produce un bloqueo. Este problema afecta a Qt desde la versi\u00f3n 6.3.0 hasta la 6.5.9, desde la 6.6.0 hasta la 6.8.4 y la 6.9.0. Se ha corregido en las versiones 6.5.10, 6.8.5 y 6.9.1." } ], "metrics": { @@ -57,6 +61,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], "references": [ { "url": "https://codereview.qt-project.org/c/qt/qtimageformats/+/644548", diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5702.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5702.json new file mode 100644 index 00000000000..958bd3e89b6 --- /dev/null +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5702.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-5702", + "sourceIdentifier": "3ff69d7a-14f2-4f67-a097-88dee7810d18", + "published": "2025-06-05T19:15:31.073", + "lastModified": "2025-06-05T19:15:31.073", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33056", + "source": "3ff69d7a-14f2-4f67-a097-88dee7810d18" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 473ae3f210d..727e4624336 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-05T18:00:19.082029+00:00 +2025-06-05T20:00:20.540905+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-06-05T17:15:30.117000+00:00 +2025-06-05T19:55:58.760000+00:00 ``` ### Last Data Feed Release @@ -33,51 +33,54 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -296591 +296601 ``` ### CVEs added in the last Commit -Recently added CVEs: `7` +Recently added CVEs: `10` -- [CVE-2025-48493](CVE-2025/CVE-2025-484xx/CVE-2025-48493.json) (`2025-06-05T17:15:29.377`) -- [CVE-2025-49009](CVE-2025/CVE-2025-490xx/CVE-2025-49009.json) (`2025-06-05T17:15:29.570`) -- [CVE-2025-5666](CVE-2025/CVE-2025-56xx/CVE-2025-5666.json) (`2025-06-05T16:15:27.470`) -- [CVE-2025-5667](CVE-2025/CVE-2025-56xx/CVE-2025-5667.json) (`2025-06-05T16:15:27.683`) -- [CVE-2025-5668](CVE-2025/CVE-2025-56xx/CVE-2025-5668.json) (`2025-06-05T17:15:29.730`) -- [CVE-2025-5669](CVE-2025/CVE-2025-56xx/CVE-2025-5669.json) (`2025-06-05T17:15:29.917`) -- [CVE-2025-5670](CVE-2025/CVE-2025-56xx/CVE-2025-5670.json) (`2025-06-05T17:15:30.117`) +- [CVE-2025-46257](CVE-2025/CVE-2025-462xx/CVE-2025-46257.json) (`2025-06-05T18:15:21.753`) +- [CVE-2025-46258](CVE-2025/CVE-2025-462xx/CVE-2025-46258.json) (`2025-06-05T18:15:22.163`) +- [CVE-2025-5671](CVE-2025/CVE-2025-56xx/CVE-2025-5671.json) (`2025-06-05T18:15:22.947`) +- [CVE-2025-5672](CVE-2025/CVE-2025-56xx/CVE-2025-5672.json) (`2025-06-05T18:15:23.220`) +- [CVE-2025-5674](CVE-2025/CVE-2025-56xx/CVE-2025-5674.json) (`2025-06-05T19:15:29.627`) +- [CVE-2025-5675](CVE-2025/CVE-2025-56xx/CVE-2025-5675.json) (`2025-06-05T19:15:29.993`) +- [CVE-2025-5676](CVE-2025/CVE-2025-56xx/CVE-2025-5676.json) (`2025-06-05T19:15:30.247`) +- [CVE-2025-5677](CVE-2025/CVE-2025-56xx/CVE-2025-5677.json) (`2025-06-05T19:15:30.487`) +- [CVE-2025-5679](CVE-2025/CVE-2025-56xx/CVE-2025-5679.json) (`2025-06-05T19:15:30.697`) +- [CVE-2025-5702](CVE-2025/CVE-2025-57xx/CVE-2025-5702.json) (`2025-06-05T19:15:31.073`) ### CVEs modified in the last Commit -Recently modified CVEs: `32` +Recently modified CVEs: `53` -- [CVE-2024-12329](CVE-2024/CVE-2024-123xx/CVE-2024-12329.json) (`2025-06-05T16:05:14.507`) -- [CVE-2024-22021](CVE-2024/CVE-2024-220xx/CVE-2024-22021.json) (`2025-06-05T17:15:26.977`) -- [CVE-2024-22075](CVE-2024/CVE-2024-220xx/CVE-2024-22075.json) (`2025-06-05T17:15:27.147`) -- [CVE-2024-22108](CVE-2024/CVE-2024-221xx/CVE-2024-22108.json) (`2025-06-05T17:15:27.387`) -- [CVE-2024-22365](CVE-2024/CVE-2024-223xx/CVE-2024-22365.json) (`2025-06-05T17:15:27.617`) -- [CVE-2024-22380](CVE-2024/CVE-2024-223xx/CVE-2024-22380.json) (`2025-06-05T16:15:24.747`) -- [CVE-2024-22491](CVE-2024/CVE-2024-224xx/CVE-2024-22491.json) (`2025-06-05T17:15:27.837`) -- [CVE-2024-22496](CVE-2024/CVE-2024-224xx/CVE-2024-22496.json) (`2025-06-05T17:15:28.053`) -- [CVE-2024-22519](CVE-2024/CVE-2024-225xx/CVE-2024-22519.json) (`2025-06-05T16:15:25.883`) -- [CVE-2024-22548](CVE-2024/CVE-2024-225xx/CVE-2024-22548.json) (`2025-06-05T17:15:28.270`) -- [CVE-2024-22699](CVE-2024/CVE-2024-226xx/CVE-2024-22699.json) (`2025-06-05T16:15:26.100`) -- [CVE-2024-22720](CVE-2024/CVE-2024-227xx/CVE-2024-22720.json) (`2025-06-05T16:15:26.310`) -- [CVE-2024-22773](CVE-2024/CVE-2024-227xx/CVE-2024-22773.json) (`2025-06-05T17:15:28.480`) -- [CVE-2024-22795](CVE-2024/CVE-2024-227xx/CVE-2024-22795.json) (`2025-06-05T16:15:26.540`) -- [CVE-2024-22817](CVE-2024/CVE-2024-228xx/CVE-2024-22817.json) (`2025-06-05T17:15:28.713`) -- [CVE-2024-22851](CVE-2024/CVE-2024-228xx/CVE-2024-22851.json) (`2025-06-05T17:15:28.920`) -- [CVE-2024-22895](CVE-2024/CVE-2024-228xx/CVE-2024-22895.json) (`2025-06-05T16:15:26.750`) -- [CVE-2024-22911](CVE-2024/CVE-2024-229xx/CVE-2024-22911.json) (`2025-06-05T16:15:26.963`) -- [CVE-2024-22919](CVE-2024/CVE-2024-229xx/CVE-2024-22919.json) (`2025-06-05T17:15:29.160`) -- [CVE-2024-4892](CVE-2024/CVE-2024-48xx/CVE-2024-4892.json) (`2025-06-05T16:23:47.540`) -- [CVE-2024-6704](CVE-2024/CVE-2024-67xx/CVE-2024-6704.json) (`2025-06-05T16:38:43.267`) -- [CVE-2024-9531](CVE-2024/CVE-2024-95xx/CVE-2024-9531.json) (`2025-06-05T16:56:56.240`) -- [CVE-2024-9940](CVE-2024/CVE-2024-99xx/CVE-2024-9940.json) (`2025-06-05T16:40:26.147`) -- [CVE-2024-9943](CVE-2024/CVE-2024-99xx/CVE-2024-9943.json) (`2025-06-05T16:57:08.370`) -- [CVE-2025-5214](CVE-2025/CVE-2025-52xx/CVE-2025-5214.json) (`2025-06-05T16:00:18.113`) +- [CVE-2024-24399](CVE-2024/CVE-2024-243xx/CVE-2024-24399.json) (`2025-06-05T19:15:28.127`) +- [CVE-2024-24488](CVE-2024/CVE-2024-244xx/CVE-2024-24488.json) (`2025-06-05T19:15:28.363`) +- [CVE-2025-1216](CVE-2025/CVE-2025-12xx/CVE-2025-1216.json) (`2025-06-05T19:46:48.060`) +- [CVE-2025-1224](CVE-2025/CVE-2025-12xx/CVE-2025-1224.json) (`2025-06-05T19:47:07.900`) +- [CVE-2025-1225](CVE-2025/CVE-2025-12xx/CVE-2025-1225.json) (`2025-06-05T19:47:35.927`) +- [CVE-2025-1226](CVE-2025/CVE-2025-12xx/CVE-2025-1226.json) (`2025-06-05T19:50:14.263`) +- [CVE-2025-1227](CVE-2025/CVE-2025-12xx/CVE-2025-1227.json) (`2025-06-05T19:50:47.190`) +- [CVE-2025-1812](CVE-2025/CVE-2025-18xx/CVE-2025-1812.json) (`2025-06-05T19:52:43.550`) +- [CVE-2025-1840](CVE-2025/CVE-2025-18xx/CVE-2025-1840.json) (`2025-06-05T19:55:58.760`) +- [CVE-2025-20286](CVE-2025/CVE-2025-202xx/CVE-2025-20286.json) (`2025-06-05T19:15:28.590`) +- [CVE-2025-2914](CVE-2025/CVE-2025-29xx/CVE-2025-2914.json) (`2025-06-05T19:21:11.357`) +- [CVE-2025-2923](CVE-2025/CVE-2025-29xx/CVE-2025-2923.json) (`2025-06-05T19:21:58.263`) +- [CVE-2025-3536](CVE-2025/CVE-2025-35xx/CVE-2025-3536.json) (`2025-06-05T19:26:38.817`) +- [CVE-2025-3537](CVE-2025/CVE-2025-35xx/CVE-2025-3537.json) (`2025-06-05T19:27:31.170`) +- [CVE-2025-3587](CVE-2025/CVE-2025-35xx/CVE-2025-3587.json) (`2025-06-05T19:28:11.513`) +- [CVE-2025-47616](CVE-2025/CVE-2025-476xx/CVE-2025-47616.json) (`2025-06-05T19:15:28.853`) +- [CVE-2025-4770](CVE-2025/CVE-2025-47xx/CVE-2025-4770.json) (`2025-06-05T19:35:54.267`) +- [CVE-2025-4780](CVE-2025/CVE-2025-47xx/CVE-2025-4780.json) (`2025-06-05T19:36:06.897`) +- [CVE-2025-4894](CVE-2025/CVE-2025-48xx/CVE-2025-4894.json) (`2025-06-05T19:39:01.520`) +- [CVE-2025-4936](CVE-2025/CVE-2025-49xx/CVE-2025-4936.json) (`2025-06-05T19:39:27.940`) +- [CVE-2025-4937](CVE-2025/CVE-2025-49xx/CVE-2025-4937.json) (`2025-06-05T19:42:48.337`) +- [CVE-2025-5668](CVE-2025/CVE-2025-56xx/CVE-2025-5668.json) (`2025-06-05T18:15:22.447`) +- [CVE-2025-5669](CVE-2025/CVE-2025-56xx/CVE-2025-5669.json) (`2025-06-05T18:15:22.627`) +- [CVE-2025-5670](CVE-2025/CVE-2025-56xx/CVE-2025-5670.json) (`2025-06-05T18:15:22.790`) +- [CVE-2025-5683](CVE-2025/CVE-2025-56xx/CVE-2025-5683.json) (`2025-06-05T19:15:30.890`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 0eb9ebd4fee..1afdb1dc81e 100644 --- a/_state.csv +++ b/_state.csv @@ -47847,7 +47847,7 @@ CVE-2011-10003,0,0,6412423cbcc1d2918013fc1df3cebbbcb3b7584426cce9ea1b9953240234b CVE-2011-10004,0,0,ec3da51d090457791c200e7f71e78a08f52c2aec5e3aab2bdb5915aa68bee988,2024-11-21T01:25:17.503000 CVE-2011-10005,0,0,627c8d48b59c9d04a5be3ca9721abb26f33a91af30259ed758e346cc8b2645eb,2024-11-21T01:25:17.667000 CVE-2011-10006,0,0,dd734ea71adfdfffdfb5628f909ca34f56f35c648e0de9eca7d4ff5e5f1df3de,2025-04-11T12:51:20.457000 -CVE-2011-10007,0,1,a8ee12775bd2eaa61214d6007438a33c4167b09e627f15d0449696ab2f3e0f4d,2025-06-05T17:15:25.990000 +CVE-2011-10007,0,0,a8ee12775bd2eaa61214d6007438a33c4167b09e627f15d0449696ab2f3e0f4d,2025-06-05T17:15:25.990000 CVE-2011-1001,0,0,11839c7b8e84067f9cb7b0fb6341ae801683b41bcddc1fb61a0d4d9d0b6749f0,2025-04-11T00:51:21.963000 CVE-2011-1002,0,0,d33347c721e3b89d36f002b1fe6013c7e41d667ea328068299497443349dd1dd,2025-04-11T00:51:21.963000 CVE-2011-1003,0,0,d7e1f3fe9a186593ca7a3a72b1b932ddf10706cfcc913dbcaa45bff48d214fa4,2025-04-11T00:51:21.963000 @@ -190279,12 +190279,12 @@ CVE-2022-20384,0,0,35e06eb303fc627c1ef149a4f431897f7d77ba5ba4cd40fc6a13edba6f884 CVE-2022-20385,0,0,e2c1186dbfc643cbfaa62c0ead535ae0517873c6966e54937d73e4dd2813aa90,2024-11-21T06:42:43.090000 CVE-2022-20386,0,0,d1cf92873c6b418dae0c0d78fef0bc939ae3204b5ac1230a3a5250d5480bec2a,2024-11-21T06:42:43.203000 CVE-2022-20387,0,0,746566ed640803bbef46b4f6b64e03e760cd336cdee8e59a5f13400e28018239,2024-11-21T06:42:43.310000 -CVE-2022-20388,0,0,9b1f7aaa00f206c0a5e3e726250cee6b973c2f349bfeeeb38b0b073b4da7c4e8,2024-11-21T06:42:43.420000 -CVE-2022-20389,0,0,b2b9bd27cdab51670f59fec52983d5fc3d85ee2d8c6e9453a8725dc6da27476a,2024-11-21T06:42:43.527000 +CVE-2022-20388,0,1,9a1d5e7a0199964698e598673ade93a15d0b2f2c2a860522974a5b649c7922b2,2025-06-05T19:15:21.330000 +CVE-2022-20389,0,1,9267787ceeabf089c8354abb5353a85c462d6ca63c05af274d8db1a05dfa6f7b,2025-06-05T19:15:22.960000 CVE-2022-2039,0,0,590d5cb3e44b098d4219f1e3142ba97efb6dcb5aa9d225f1fa577906af3e42d7,2024-11-21T07:00:13 CVE-2022-20390,0,0,f9d64becfca90c1403dfc61670c18934d90ee221eb29c58d9cccf0bc619d6f2b,2024-11-21T06:42:43.633000 CVE-2022-20391,0,0,1b5cd3d9aff0cfe6b0eaff4280a1a334454e30d6be0a3dc00c5a660eaa712e5d,2024-11-21T06:42:43.757000 -CVE-2022-20392,0,0,de17eb60e6b885ea2307b24fffdf9995c3e42b0e7a28cedea5459907b3e42f17,2024-11-21T06:42:43.887000 +CVE-2022-20392,0,1,7abadec4c92cc99c35f17c55abe9dcd352b700bb9b58170d1c07fcf0a8deef9d,2025-06-05T19:15:23.130000 CVE-2022-20393,0,0,91dbd99333d0d3ccf5d948e8c924b85b799ff907f9d75263fbae6e7929f793bb,2024-11-21T06:42:43.990000 CVE-2022-20394,0,0,38af25026800ba902fcdfc0b528cf7770a01f4470c2b93ff8a98494ff347e05e,2024-11-21T06:42:44.103000 CVE-2022-20395,0,0,a171f2c9b9c8ab678cbce86f5a28450748be4e5ef955c9c7de9ce87b81e3a00c,2024-11-21T06:42:44.210000 @@ -195859,7 +195859,7 @@ CVE-2022-26532,0,0,b82eef4958d012871dfa1b24313771a9936cc8638d2af5c7c3f5bd6b4ae42 CVE-2022-26533,0,0,7d258b41083ca4a5b0b77fef26b74e9b51497b34afbb69708ba2bcdedca89a4a,2024-11-21T06:54:07.843000 CVE-2022-26534,0,0,1c2cdb4096107940473434c769b2a3e3bfe863498df1dcf61802684e1b028205,2024-11-21T06:54:07.977000 CVE-2022-26536,0,0,7d779a7f81fe406633d0f08e70c0381fcfa49c47a673fa8eae8718dd640e52fb,2024-11-21T06:54:08.113000 -CVE-2022-2654,0,0,c6cfcbde1b2e92bf1db4a35cb6975eed171117088342a0f9cf747a44052877db,2024-11-21T07:01:27.060000 +CVE-2022-2654,0,1,0af21277fc069e25f0a575bed9b5e31f01d5cb2b6a90ce69ecb4b7ef253ccd18,2025-06-05T19:15:23.347000 CVE-2022-26546,0,0,2a537dc9806e5964ebba34e8bb06a252e742921653ca4c065d55000238b5e881,2024-11-21T06:54:08.250000 CVE-2022-2655,0,0,43f9a1e291b3cc06fd8ec5cec141e0db9dd39cab6a82b2b24b88b19a7737d37b,2024-11-21T07:01:27.193000 CVE-2022-26555,0,0,5859763716f4c180deca0a19d94e0b6cfe83bfc6164f8960a0ac43f394062a5f,2024-11-21T06:54:08.387000 @@ -195950,7 +195950,7 @@ CVE-2022-26676,0,0,8adf1f8af1a73a2e1276c75952f750619976c82b50b14d54c291b5482543c CVE-2022-2668,0,0,5c8f0b42c1406fec80806416138736fc85faf5a17771a24d88997af54db37dc7,2024-11-21T07:01:28.817000 CVE-2022-26688,0,0,3ffed6077291f18ab9399ab0a5259ee6974767f12950f8fa65d6733b50f81d0a,2024-11-21T06:54:19.403000 CVE-2022-26689,0,0,deaedd8a58eca4d07c9fbdbfd0c0915fa63ea5b5f78512802e0c62bbea4cd74e,2023-11-07T03:45:07.027000 -CVE-2022-2669,0,0,4cca57f47494fbc98147aa500cd42881b91e09a65095c717a52dda296d04c003,2024-11-21T07:01:28.930000 +CVE-2022-2669,0,1,41d2566596417d8f8fb5f54d4b4828883eeee3a89ae8622ef9340b9694467317,2025-06-05T19:15:23.580000 CVE-2022-26690,0,0,54c9e43cec1a117539f5af1508bf5669528bbd342948f37b46bc188475cf84b9,2024-11-21T06:54:19.550000 CVE-2022-26691,0,0,dfa7835fabbbf582a36b3516338ce1c7914a142419b6d7ef28adaeaa3f24e53f,2024-11-21T06:54:19.673000 CVE-2022-26692,0,0,9c1b476f3a9dc681b185c0b87bedd4e9f2e9762298630db043d5f30c95a01d50,2023-11-07T03:45:08.050000 @@ -198581,7 +198581,7 @@ CVE-2022-29886,0,0,e6d3840c9f2f86a3d4478eeaabf57edd24cadf53d2d8be7da83416f20122c CVE-2022-29887,0,0,ac22ec06d9ff1c9ea2219424fd2069a01b39744835c1e0d9099e4bce047d4ff7,2024-11-21T06:59:54.570000 CVE-2022-29888,0,0,ea4dfa2b79981cfa2c77f5db69c45837ea2030b32bca774e3c72b90e449f9b5c,2024-11-21T06:59:54.693000 CVE-2022-29889,0,0,8ba99339c82b532d12e51563ff04dd341e38118cab53bcaf85cf0c792da5cd15,2024-11-21T06:59:54.807000 -CVE-2022-2989,0,0,d506cba189f970f15df41782d4da48e53239d6d86b76fc54f4f4abfc543bd203,2024-11-21T07:02:02.567000 +CVE-2022-2989,0,1,a5667d8d1305342f9fbeeb9f4be1ba55bb854655200e9da28bbdd1628df9861b,2025-06-05T19:15:23.780000 CVE-2022-29890,0,0,5030b13e6373d80760df0fb588cc34171bafa21cefc78e4c7d52c26fd1568912,2024-11-21T06:59:54.920000 CVE-2022-29891,0,0,cae907f253ec1469f7f3670a9c8e3612cfce6c905f5b2731069a7dc5551e921f,2024-11-21T06:59:55.037000 CVE-2022-29892,0,0,ac1ecb06f499e7cc7623dc9504513c104504ede66501eb38ca32d59f49196e9c,2024-11-21T06:59:55.153000 @@ -200802,7 +200802,7 @@ CVE-2022-32551,0,0,e8b56596192cf90bbe70fbecc4e3f485e65ede24b24845dc336e667a1b97a CVE-2022-32552,0,0,08dd4697bc7a3037a6e557c98468b9164bf9d02a5f04699cca3cdb0b6ed369dd,2024-11-21T07:06:36.953000 CVE-2022-32553,0,0,6991cff87d6ed3e51805e4c7e97c1aac961f7940f09120db3d2218ebb1dc3204,2024-11-21T07:06:37.100000 CVE-2022-32554,0,0,3352f33235fcdc9a9e23b099973c69a739cee9872f9c56e53f44f314e48b1137,2024-11-21T07:06:37.240000 -CVE-2022-32555,0,0,e4de7c0bafddc927204e949de9b87840bd56a9a0680410275abe5cf4dc76dc35,2024-11-21T07:06:37.393000 +CVE-2022-32555,0,1,eaad4773ef1da86f81f9ed83b3fc7c50e9e1e1c6dfe55846b5db1a12a1f1c831,2025-06-05T19:15:24.040000 CVE-2022-32556,0,0,e6e301ba9d00a1199864aee1f9eaf891ebe5c5de0465d2f00aa39646f9350bca,2024-11-21T07:06:37.533000 CVE-2022-32557,0,0,d8a0747b458e47c9ffc5902bb28dd4699e7bbf41b429deeb0b6b91a71fb3e321,2024-11-21T07:06:37.683000 CVE-2022-32558,0,0,1d5101db393eb69816434bdecef41fc2ba4d4589d5ddf267fce2323b9f155446,2024-11-21T07:06:37.830000 @@ -201573,7 +201573,7 @@ CVE-2022-3360,0,0,9d75e252df51b2c5b1e5e885b585075338d05e688eff32fcab2b846f80a8b4 CVE-2022-3361,0,0,673440507d463bac799b27de862a1e0ad14d5cdec3dbef09bb9458f1a54b72b9,2024-11-21T07:19:22.360000 CVE-2022-3362,0,0,fa3c85c78075a5b23404fdf0b4d624d34b6a473a82a2cdd4464495179acf966c,2024-11-21T07:19:22.487000 CVE-2022-3363,0,0,29743f39bcb5bc694e582fb02454906ee8bccb0df4b6981c2f0105a9193c9133,2025-05-07T19:16:05.753000 -CVE-2022-33631,0,0,a9607c981c0a9fb46801735337549412bd131562cbab74957081eee7844141b8,2024-11-21T07:08:12.750000 +CVE-2022-33631,0,1,b98c483b538a002d11da59ecfa8c14346432be286e4a4f32e3049e71fa539fb1,2025-06-05T19:15:24.277000 CVE-2022-33632,0,0,2d5701cdc42f201c2433fb655509c4d2a1defcda100427b44020705bbb936adb,2024-11-21T07:08:12.893000 CVE-2022-33633,0,0,fef725eb13c393831b5dbb62dd8fec4a0e534d3260f0274ca793099b1e337544,2024-11-21T07:08:13.023000 CVE-2022-33634,0,0,1dfe9695b9e550c027b75e0a390dfa54c6a2109b703d65bf90d5819e30e3598f,2025-01-02T22:15:08.940000 @@ -201583,13 +201583,13 @@ CVE-2022-33637,0,0,779febcbab98162c76b6ec463230e5fc34868ff3a3dcc5a9fab77810e7d58 CVE-2022-33638,0,0,0eecdfb7405c847be7e8eda462ff1a2a6b3623c97651ac886a152f749e4ce916,2025-01-02T19:16:22.737000 CVE-2022-33639,0,0,98b84b2f3cdaee0a8e1bd846d2c3f7c04234364254ddd88312755ea62747ebf8,2025-01-02T19:16:22.877000 CVE-2022-3364,0,0,dd4c407f031cb9b9c49d3371609695761320debb49469eb58b1198a34ae105ad,2024-11-21T07:19:22.757000 -CVE-2022-33640,0,0,89a0d961ea376c9d193140978fd96f8908caf1f8aa80a9e0d9956f469674621f,2024-11-21T07:08:13.927000 +CVE-2022-33640,0,1,bb35988757ef2646954c7507c8dc5d2b6c971bc1696738798757d431b0c6b28c,2025-06-05T19:15:24.473000 CVE-2022-33641,0,0,318881ea1b50d7310c93c9ffdac2eaf18504877678fd8e052b56a3a1dceaa97e,2024-11-21T07:08:14.047000 CVE-2022-33642,0,0,a7a480dbe6276f162cbaf4a7b95a7ef51b29c38f8cbf4ca18680818654776f35,2024-11-21T07:08:14.193000 CVE-2022-33643,0,0,47b44c8f88d31e82c74f7cec9dcd27957458dda6b9400efcbfe6894a68134f4f,2024-11-21T07:08:14.310000 CVE-2022-33644,0,0,9142403ea74bf872e3b0ee89f6b304d39dd3d9d6e3d19bd9969a9fe6293aa847,2024-11-21T07:08:14.417000 CVE-2022-33645,0,0,d9eb7feb61490f8806217bc8e13f400a1ee5841901ede1bb733f493f7be8ebb4,2025-01-02T22:15:09.210000 -CVE-2022-33646,0,0,a925c07ce65ac2d0e9d211e2b2398ad1e57da525d523e15541a83f12df881fe5,2024-11-21T07:08:14.673000 +CVE-2022-33646,0,1,56aad0d93134844ca7a5e39c30d1e3842954776bb0d53ebf07325162faa5bc32,2025-06-05T19:15:24.637000 CVE-2022-33647,0,0,5feaf3e010cc5e97535d4d65fbae2bcc87803779c2e96b8fade981b7b9313e94,2024-11-21T07:08:14.783000 CVE-2022-33648,0,0,bae79337c5e892df17da958d9ae52fb1686becdac8f975642c755225e29a4d86,2024-11-21T07:08:14.930000 CVE-2022-33649,0,0,591f61d96d2d65dbce03b14161fcac0fbabc7445443fe2e93a52054518a13ee0,2024-11-21T07:08:15.037000 @@ -202446,10 +202446,10 @@ CVE-2022-34687,0,0,2b66e6e48713f193838e1e3175617e3f479951db6200d541b21a1cdeea604 CVE-2022-34689,0,0,db21f78b3afaedd2575289f6fd8bf0f1c10969a8069015eb080e1d5a826cc32d,2025-01-02T22:15:09.340000 CVE-2022-3469,0,0,98ecc65b35685ab3e96ea3b6c45fea08392f7a3d1ded3d3183cc5c97b1064a13,2025-05-05T16:15:19.680000 CVE-2022-34690,0,0,5e3f87530474c6f7c234aae46cb9569a96dd48c7023f237d61ff86b0bfc52811,2024-11-21T07:09:59.527000 -CVE-2022-34691,0,0,60948b269e191dd67b146e3518cd5627992b9459b66b24be6aa452dafcdb1f5b,2024-11-21T07:09:59.673000 -CVE-2022-34692,0,0,22c94034553643d46e5ee07aefb318c4d36521097d6b41ede5334de708c90465,2024-11-21T07:09:59.810000 -CVE-2022-34696,0,0,f9e0d3afad546ac99a392470f5ff015af812bc4749f94c9e5116ee6f3f4b2ab0,2024-11-21T07:09:59.943000 -CVE-2022-34699,0,0,6a5a8c69a8b7c6c8ed3b8248efce85f059ae11bea74b030f22c0f7d94de5b8a0,2024-11-21T07:10:00.077000 +CVE-2022-34691,0,1,aa651a39fee435c033abd2783d103fe0ea70c69329eced09f01a5c0c1998f073,2025-06-05T19:15:24.820000 +CVE-2022-34692,0,1,50f1b0cdb006ca3e5296207948719da21c5f9b0c51291fce662afef0e38f2666,2025-06-05T19:15:25.033000 +CVE-2022-34696,0,1,3fcda9495f540896a64848d6e1168620d654a645b266a43b94c4c03792ee3246,2025-06-05T19:15:25.203000 +CVE-2022-34699,0,1,79ccaf5b12cb869f601cf1a59701e5c23397ad882fe85d16622c15e3e55dbaf7,2025-06-05T19:15:25.383000 CVE-2022-3470,0,0,6b70323dd8a65a812f10a8f5c605b87f2826655f9d33b767c741c021e15ce04d,2024-11-21T07:19:36.163000 CVE-2022-34700,0,0,41a45300ea949c0a1460904beed7f685410746696b8c090e89295661c979c0e8,2024-11-21T07:10:00.193000 CVE-2022-34701,0,0,129c27111e2334ee94a0bcf698c38ffb3b4c8d6770974480be50f8380465cadf,2025-06-04T16:15:27.477000 @@ -206078,7 +206078,7 @@ CVE-2022-39148,0,0,047f1bac7687b1b6009187320e2581fb3f3f6e99c9c5d9eb2dd5bace15e67 CVE-2022-39149,0,0,81d2e2b6f92fbefa64ab8c9c263a6a1d9eee3400f3fdbd9aacaea134a0af76d7,2024-11-21T07:17:40.430000 CVE-2022-3915,0,0,ba7e5818c5d78d197bc5ddf71f6d363fc94da960d56643a76404cf3a0fca44ae,2025-04-22T15:16:00.967000 CVE-2022-39150,0,0,1357c673c1b0f0d7e5cd7c45e9b0dd29b2298adaa06cb8854cb0054d3101aeda,2024-11-21T07:17:40.533000 -CVE-2022-39151,0,0,d3b665cc7d95929a7e1978d4ce1d24284d85aa7f6e54d230ee26385bdf3a68c3,2024-11-21T07:17:40.647000 +CVE-2022-39151,0,1,a1f99900231a0ddc12f25eaffbf7509ffe616144bd1e4f4ef72fcd2779352240,2025-06-05T19:15:25.560000 CVE-2022-39152,0,0,3983f862863c3bc81b35ae8184c705cce5e74e1f9ad2bbe72bc6ebc92ddf7387,2024-11-21T07:17:40.760000 CVE-2022-39153,0,0,b04b61943a57e21aa1bc668b41defc93bd288829f40d8430e8ac3a980c0382a9,2024-11-21T07:17:40.873000 CVE-2022-39154,0,0,8fa675cabe41a4d9298e179767fa201eadf198f3643d00b86779347bc7f73a6c,2024-11-21T07:17:40.987000 @@ -245689,7 +245689,7 @@ CVE-2024-10623,0,0,6e237096fbd094bbf3471247b87238053c5a778164061b5929cdb16711f26 CVE-2024-10624,0,0,927595352e64f31ce5c368d0a868cde7fa7c5ad330de0d5c34e1b2683ffa0390,2025-03-20T10:15:17.880000 CVE-2024-10625,0,0,8994abd06eb088d4d6bebe5c7df8566fe6e9598c9dcb6ae5c9f2822ed990b189,2025-05-28T20:49:53.980000 CVE-2024-10626,0,0,969aa11116039a64d08ea1a4fa2459bb97ed16e2a96d85494d04576d212b4fc1,2025-05-28T20:48:34.957000 -CVE-2024-10627,0,1,506b6d42bd6452e47d271f9a383b48ed8fe18aef4ca82197319cbce9e44a4842,2025-06-05T16:59:15.687000 +CVE-2024-10627,0,0,506b6d42bd6452e47d271f9a383b48ed8fe18aef4ca82197319cbce9e44a4842,2025-06-05T16:59:15.687000 CVE-2024-10628,0,0,fe3648bb198d97e4edbe93780d5b1a58e72b60d604c379b076d62a96f2c50036,2025-06-05T14:23:17.177000 CVE-2024-10629,0,0,1f9c9c5683a42ffc8dadeffeff3f612e74f207dcf5dcd96d8c7fa679d62c2730,2024-11-13T17:01:16.850000 CVE-2024-1063,0,0,33b4f1a2d0cd96333caf63788d2cf890d1ebab138b3c91da9285726ecbf447d1,2024-11-21T08:49:42.713000 @@ -245876,7 +245876,7 @@ CVE-2024-10799,0,0,a3e741d61d491954c7b8ad3a6ef2fd3de6ba712693b6fa3c5266865be162b CVE-2024-1080,0,0,d419649d3c046728f86e0db4ac875d93585cb28b1dc1d2ccb108b64b9ccaec06,2025-01-02T16:41:30.747000 CVE-2024-10800,0,0,7c09a66fe19ec81d72fb3dd0d5d6c10275f9b97966090fbd36ca1fbb77eb71bd,2024-11-19T17:08:44.767000 CVE-2024-10801,0,0,2fc64baaadc32ead3d741647c105d1e5f90766977df6a21cbb5fc7403bd4ac96,2024-11-12T13:56:24.513000 -CVE-2024-10802,0,1,195545a172957b3b6b9d55fbd9a8c6e9d10ea86c0aa8163e5f8f7494e0feb138,2025-06-05T17:00:18.303000 +CVE-2024-10802,0,0,195545a172957b3b6b9d55fbd9a8c6e9d10ea86c0aa8163e5f8f7494e0feb138,2025-06-05T17:00:18.303000 CVE-2024-10803,0,0,9af0bc02a023809c570b91b39f544b58f190424cc5b458e31af90eaf403aa364,2024-11-23T08:15:03.413000 CVE-2024-10804,0,0,c829b70e6175adde946dfc695f0ee88db10c55c3f5a8a5193864bce1581dec85,2025-03-07T09:15:13.340000 CVE-2024-10805,0,0,2dc6a50e2e5435811e45bd9587f57ddf8b9be0610ab96cbbf1bcea689c9000fa,2024-11-07T17:09:07.057000 @@ -246097,7 +246097,7 @@ CVE-2024-11020,0,0,970da6d298c307a33bad19d27786a9e0b5c15413245f8a9316a9d57c88d1c CVE-2024-11021,0,0,dfa8e0362d5308751463d7a3b7f074db5d7cb50c3c83fb93cc46c0a12f922a00,2024-11-18T19:00:03.487000 CVE-2024-11022,0,0,121bdebd234c31567a9334100118b4552206a5be58d7f013a9a38c342f5911be,2024-12-06T13:15:06.267000 CVE-2024-11023,0,0,f7b174881a277fb4c81e0fe54307aea57f0362604857fb8a6b45aafb8e505821,2024-11-18T17:11:17.393000 -CVE-2024-11024,0,1,b99b49f0eb3a94e210f240403721f258b7d7e91239e622c2e9b5883aa35ab7cc,2025-06-05T17:01:36.433000 +CVE-2024-11024,0,0,b99b49f0eb3a94e210f240403721f258b7d7e91239e622c2e9b5883aa35ab7cc,2025-06-05T17:01:36.433000 CVE-2024-11025,0,0,3f6e108019cd6982fd5b3c54f07c198819fe40cc0972828c5e5b6725a3c4dc5a,2024-11-27T11:17:41.740000 CVE-2024-11026,0,0,319f686d9e1816aec56a50d3ae71f2580939b84056c0eacccd7bc237a6bd6112,2024-11-23T01:44:05.947000 CVE-2024-11028,0,0,be5701b1791efbf2de8ae4ea20b2a6d8d846ef340e5e6b5f9a4b779b0ccd543b,2024-11-19T15:38:19.023000 @@ -246158,7 +246158,7 @@ CVE-2024-11079,0,0,4429678b1338007ef95bc9554c7c9cf15512d4d01927364e7ca6363e4b713 CVE-2024-1108,0,0,41de46f3dcaf9533283bc7e75a781616c5054e3d3c6e5f547b16c496a7c97db1,2025-01-28T02:43:57.227000 CVE-2024-11081,0,0,868ddada0bf262c198b91d0f6dc5cc082627c1fafb1bc6c0669f2cc02fb00c28,2024-11-20T18:15:22.340000 CVE-2024-11082,0,0,2068f4ddbc0d21e33db6ba3989176bd5aedcb5da6f30a07d96e2944d8ba88bcb,2024-11-28T10:15:05.973000 -CVE-2024-11083,0,1,bba15626c68cc6432c9d7ae1a027a809dab21000480c2570d3d389b89fd5f047,2025-06-05T17:02:09.960000 +CVE-2024-11083,0,0,bba15626c68cc6432c9d7ae1a027a809dab21000480c2570d3d389b89fd5f047,2025-06-05T17:02:09.960000 CVE-2024-11084,0,0,60bb4e40862a0490035e7537a06200966a71d749ca9df62534a699dfe8e8033f,2025-04-15T18:39:27.967000 CVE-2024-11085,0,0,997988ac78259b1ae8db8c6e9651c22f46fbbaea4f307171e6fff12e9b424710,2024-11-18T17:11:17.393000 CVE-2024-11086,0,0,f4d7f35e95dad05e023fed49ac9e59da09a947f51bc79e0e10dc6b97e93d7482,2024-11-20T13:15:04.020000 @@ -246277,7 +246277,7 @@ CVE-2024-11195,0,0,38f89ced51d5d7ebaa9e00a92f402dea0edb5ff89308af26875e5645b6fcf CVE-2024-11196,0,0,86073d672062faceb084c20cbe17a461a555aa7cdb4bc7856e7e10151f683d68,2024-12-21T07:15:04.723000 CVE-2024-11197,0,0,3740e434f528bbbd61234dede2b4a36fd46292349d79d4749d70c21ad64992c9,2024-11-21T13:57:24.187000 CVE-2024-11198,0,0,fc0b00a2733ca1e8fff2fe360f2e4cb1494fa8044fb680aa8d0f8cfd928aecc9,2024-11-19T21:57:32.967000 -CVE-2024-11199,0,1,448e4028ba6741700a2565bf5ba2267263ffa0b3b642651bba683f57af020348,2025-06-05T17:00:39.570000 +CVE-2024-11199,0,0,448e4028ba6741700a2565bf5ba2267263ffa0b3b642651bba683f57af020348,2025-06-05T17:00:39.570000 CVE-2024-1120,0,0,2ccfcd2155bf9a9467148924a471395325bce483982858dc5d93d716f1be8160,2025-03-11T16:46:21.947000 CVE-2024-11200,0,0,7a5014fc24dac51453395d7130a599729868592263e54cecb121b499d8896404,2024-12-03T14:15:19.923000 CVE-2024-11201,0,0,95ced2cef5a51b7fa14517c64bac4bc07296789d71763b16f225669a1035af34,2024-12-06T06:15:22.533000 @@ -246822,7 +246822,7 @@ CVE-2024-11717,0,0,5cf1e8d1659d0c0acb342b4666ea0ce46f2794e2d3168fb945db1a1190a19 CVE-2024-11718,0,0,0bed3b3038ae5a1fdd1ea46800c93191f624f222f828f42d9de60c5c5dd790aa,2025-05-20T20:15:30.280000 CVE-2024-11719,0,0,e4cfdc6ea6b72d016d4a7c18750188bc8c7d1be79bc69faa46c316653109b34d,2025-05-20T20:15:30.420000 CVE-2024-1172,0,0,8a47d65ba883be6f9330fb72413995c12492cc02775718de218760ba1f704a52,2025-01-08T19:08:16.787000 -CVE-2024-11720,0,1,4cff87eaa9b0bc632fe14ca9e7875a08281d9bd63641e0bdf5f7effc5ab49311,2025-06-05T16:13:39.850000 +CVE-2024-11720,0,0,4cff87eaa9b0bc632fe14ca9e7875a08281d9bd63641e0bdf5f7effc5ab49311,2025-06-05T16:13:39.850000 CVE-2024-11721,0,0,a74d08a5a2d9f12fdf43567e71a5d2a87ca46e38fcbaf50f78778ec35e274d4d,2025-06-05T15:29:36.250000 CVE-2024-11722,0,0,36060c4a1b06d9d2dc11dd80a8bcf5758e5cc38a595154dd7a12fcdd19b1b092,2025-06-05T15:31:37.450000 CVE-2024-11723,0,0,d555056e56adae6d2817421636f03f202df11e8bc291dc8225ccc2e718d1c709,2024-12-12T05:15:09.247000 @@ -247452,7 +247452,7 @@ CVE-2024-12325,0,0,46c6dbf8ab48a9529900a473106f832e082cd9f7d718e64a5c9e5edd2c3d1 CVE-2024-12326,0,0,6214bd8c3b6441929fb143e430a818a70c0eda117c1da1c1d4092fdb062e916b,2024-12-06T21:15:05.957000 CVE-2024-12327,0,0,e8e81366bd93f2cbafbb479a06376db44215f2cd9c6251c0ebac4883f30daea1,2025-01-07T05:15:18.470000 CVE-2024-12328,0,0,34661052bfc4345d9d8ebac2e6c28c5ef38cb920ac58fb144c97623104a72269,2025-01-08T09:15:06.780000 -CVE-2024-12329,0,1,71e750a9973a9c0c890f57927fe84490b7903cbe24882faf71ad402678f38f5f,2025-06-05T16:05:14.507000 +CVE-2024-12329,0,0,71e750a9973a9c0c890f57927fe84490b7903cbe24882faf71ad402678f38f5f,2025-06-05T16:05:14.507000 CVE-2024-1233,0,0,9d758d75169c31056a2dd99a6ff761ac0a3c179827b3dc598c6fb0d83614dada,2024-11-21T08:50:07.317000 CVE-2024-12330,0,0,dd38f32a8fe1201123bcdc5b82b5d883712c2acc7974b9580df0e29bb65620cf,2025-01-09T11:15:13.090000 CVE-2024-12331,0,0,6c6e9b90da53ab4f2635b2c568c68cfa4d017be1088f155d7e21d426ea9a2f4e,2025-03-05T19:16:29.907000 @@ -247969,7 +247969,7 @@ CVE-2024-12839,0,0,4b3b3f59193ccbe4e75ecac88630587384ac9969398e35c448d95021f6750 CVE-2024-1284,0,0,262cb3f49eb877f50074ffb33c93e32706988eb751467b62ee180e101a9782f9,2025-05-15T20:15:40.967000 CVE-2024-12840,0,0,743b0423cfafac2e38430453992cc260d6ea4d0de81fab1bf75267290a9d61ab,2025-05-12T21:15:46.300000 CVE-2024-12841,0,0,24a6b65a1931d3226bcce2fe27cbcf10bbee4e0d0965b3b5540746ecc7731100,2025-01-07T18:58:10.143000 -CVE-2024-12842,0,0,072ad5f2675314dbca068a3088dab3c4af042c7765e7a7f0aa73f7f3e14db586,2024-12-24T17:15:08.800000 +CVE-2024-12842,0,1,e7b1aaa191afaa7eb1766e8fc89b34ebb0ce73ea17e3511e7b8d2b3e3e62b2d1,2025-06-05T19:43:22.453000 CVE-2024-12843,0,0,fd7557e365f1279a203962fe47a2da20ef4b036009d10dbcf81fd8fbe148f4a5,2025-01-07T18:56:52.100000 CVE-2024-12844,0,0,0405c35f7d084de26bb371db3ce6ee0878eb608e20c08cb62e569f5aa033d6a8,2025-01-07T18:45:15.590000 CVE-2024-12845,0,0,8a55ef16d01ed853090508f11e865486ac3e4a19f3e5f3d24da04712be187e9c,2025-01-07T18:35:19.607000 @@ -248321,9 +248321,9 @@ CVE-2024-13189,0,0,a7b43dff7e015afd26a09926b1e44360bd832a7fdbe0d4eb55af9dbcecfbf CVE-2024-1319,0,0,a592496a2c658b679a2101b8015055457bb434afa8045e33335d297f46860265,2025-04-24T15:15:11.847000 CVE-2024-13190,0,0,ee48fcb8370dfe5bdd3e0e59033d930db3dd1bfee1b55444a21f3aea6a2911a6,2025-01-08T21:15:12.303000 CVE-2024-13191,0,0,b509e9f2c0471d080d679f2912738e83088d83086893fe11d0d48e4d305e4844,2025-05-28T20:11:52.477000 -CVE-2024-13192,0,0,1dad289064220f575001a055f516c6b2389962fea90cd9967564052320e1e52c,2025-01-09T17:15:11.420000 +CVE-2024-13192,0,1,264383d98aefd587e1cd26f1656ec904bc31ac3d9433dac89359b38fca080118,2025-06-05T19:44:22.500000 CVE-2024-13193,0,0,d32b08d959174c43b1fe3441ba026097abfa1bfe9b57e9f9418723438179a2c7,2025-04-04T16:59:31.217000 -CVE-2024-13194,0,0,c93c17407059ada39600fa29bdf31930d60eb87dfa4cb1db797b96f62695000b,2025-01-09T17:15:11.690000 +CVE-2024-13194,0,1,d2919d69d524a29eb7b4e1a1d7b39153c52d844da23f50a58006ade98e279ca2,2025-06-05T19:45:03.537000 CVE-2024-13195,0,0,d99bb77228f5b8439ced2df5cb9ba3e79a4e4c6d15cc632d4d5f2a7481ac8986,2025-01-09T17:15:11.827000 CVE-2024-13196,0,0,d1f1d5b45343ce572f2e5d279b42d1fb45fc7100a597fee19e22248ff242186d,2025-01-09T17:15:11.957000 CVE-2024-13197,0,0,08b42fc0b1794dab55034bc81c9f23a2ecbb64e6e27956fbbe10ebbf9cefaea9,2025-01-09T00:15:25.973000 @@ -251517,13 +251517,13 @@ CVE-2024-22018,0,0,8700bac6e1b1883a1148f7705e0358edaff43b84a71887101c6658d35b8d8 CVE-2024-22019,0,0,e56f1ec5d063edfaaf953a7037172cce296bac566ceb03a66408d7b9e3f53320,2025-04-02T20:10:16.543000 CVE-2024-2202,0,0,b32d19529765bbc51553683d248204aefff37fb40b548ddd6c8de1e89f9356ac,2025-02-13T16:48:25.923000 CVE-2024-22020,0,0,ac0c791ce864da82d8a7b218093278c5feeb845d8151ecc0ab58447fff809aa8,2025-03-14T19:15:44.700000 -CVE-2024-22021,0,1,797501f9a56f9a1f3c95b82f99fd131e5ceb61cb5d5a8261420d8a99b895504e,2025-06-05T17:15:26.977000 +CVE-2024-22021,0,0,797501f9a56f9a1f3c95b82f99fd131e5ceb61cb5d5a8261420d8a99b895504e,2025-06-05T17:15:26.977000 CVE-2024-22022,0,0,c85c000f996b3d387fc7f2e37a70268bb210c2a22944bce58e8587dfa6213aa2,2025-06-03T19:15:37.243000 CVE-2024-22023,0,0,7a1e38aa2ab90e08d875d3e998baadbe14cbd71bbb76ea784df0509f7639d5ac,2024-11-21T08:55:25 CVE-2024-22024,0,0,93165f8fe2064fd12244d65b0ff1d38fd1b104a54c3868e2f94817da6f11e108,2025-05-09T19:15:59.813000 CVE-2024-22025,0,0,87aa7a5c474a1100d38041a0ee3808e7b8e61bab104dc2e3bd348952332c62d3,2024-11-21T08:55:25.347000 CVE-2024-22026,0,0,fc1af49b9ec4afa79ee72a8c6a6d4423ef8d1a7b1b37296b5d1f6a1651e2a40a,2025-03-13T17:15:28.180000 -CVE-2024-22027,0,0,a7c9d5934453bf5491b14a748b6f63eed219ee655c259739b4569f7e9106ab3b,2024-11-21T08:55:25.607000 +CVE-2024-22027,0,1,56a3d2ed4fb304fcb785aa0c059c26c63ef3aee3f2dea885394c680aa039bc4f,2025-06-05T19:15:25.847000 CVE-2024-22028,0,0,ea8978580ea9bd87813ebb4ed4d29fd2f16b6337dfe99bd528d2c80dfd0ad8c6,2025-06-03T14:15:45.720000 CVE-2024-22029,0,0,c36e7c91b129030370bcc538c88e9a98c9f8acc0097f342d0f3d7ad0afd31d0c,2025-01-27T18:15:37.237000 CVE-2024-2203,0,0,a1dbf17e8623e342c5dbc7964579ef9e95cc5b4f168448d3f20b2a34388d28be,2025-01-28T19:35:13.377000 @@ -251565,7 +251565,7 @@ CVE-2024-22068,0,0,dbfd312dea7863e58e293401668e2c1ceda6a7351589ac7472fe4d3d38f02 CVE-2024-22069,0,0,2589bf56dffdf4ef29eab8695fc269ca81c308524ec8bece7dc0674ae5676c84,2024-08-20T17:22:39.500000 CVE-2024-2207,0,0,8ea6ed342e7acaef1c3218ac0166f216837d9139fa465e9658495103208688f2,2024-11-13T17:01:16.850000 CVE-2024-22074,0,0,8ce1416a2a2c2062f8a4515755c7506139d9261992e4df0985ed7bb84eb5f26f,2025-03-18T21:15:23.753000 -CVE-2024-22075,0,1,6dc0dd67a1731f80576b4eb68aefe5391b243a762942cc9a93f563c5e6243aa8,2025-06-05T17:15:27.147000 +CVE-2024-22075,0,0,6dc0dd67a1731f80576b4eb68aefe5391b243a762942cc9a93f563c5e6243aa8,2025-06-05T17:15:27.147000 CVE-2024-22076,0,0,21a4530da33e3bbfe45eac97ca96bfa62b7e645e33a45111dc73f1c2deead9cb,2024-11-21T08:55:30.577000 CVE-2024-22077,0,0,8d56db529de03b85ebd97acb9333cc2ed26899ac306cf0acec7262d040dc588a,2025-04-16T18:20:36.067000 CVE-2024-22078,0,0,46ee7f1461ed88577c888e3c7fb500abb803e96986ad6800d0492878c6e910de,2025-04-16T18:20:45.887000 @@ -251597,7 +251597,7 @@ CVE-2024-22104,0,0,f7ff32e7e1e96b051122bb26df5e27628d7f5d0c5085d81ea1aacc226d401 CVE-2024-22105,0,0,c3e49e4e5daf52387190128b0def861d8bea08f1b064bab66990fc03aabb7dbd,2025-03-13T20:15:17.547000 CVE-2024-22106,0,0,35e91e3f474b85bd80a83fe3d1d970e8a813175b4f4bba58f2d1c60cd55ddd04,2024-11-21T08:55:36.177000 CVE-2024-22107,0,0,c5f1d3d56a2712f9022c6c7f6f81f48552befef0464157bd417bd538c5a7b4d9,2025-05-15T20:15:42.553000 -CVE-2024-22108,0,1,6c969e338189862d71382fb13557d75ac4c0632e92071ed31c2357df62f7e96a,2025-06-05T17:15:27.387000 +CVE-2024-22108,0,0,6c969e338189862d71382fb13557d75ac4c0632e92071ed31c2357df62f7e96a,2025-06-05T17:15:27.387000 CVE-2024-2211,0,0,7a4e2ccb6324d42c91170e5aebd455b3ff37d70cfb36eab558184fc284d9330d,2025-02-26T16:48:03.047000 CVE-2024-22113,0,0,df8bb42f4d1350ee6a0f038ff918a43ce08f3173766cfa9c78783e1f0ff2f63a,2024-11-21T08:55:36.803000 CVE-2024-22114,0,0,b98aec6151fc366c3b669a552c78744585fb46223fe45a4b12b56beb46fb5169,2024-12-04T15:28:53.450000 @@ -251848,7 +251848,7 @@ CVE-2024-22360,0,0,fab17ad358e8bf5b5b25c934476ec1adecf6f1558c6c4a249f4a2b62d2154 CVE-2024-22361,0,0,7da1b3ff78b187fc29c0a22d2c7d69af79b706d9e5175ed62fe731040a8e466b,2024-11-21T08:56:07.240000 CVE-2024-22362,0,0,705f53d7ba8da6e617c593b50e91059ca5aaea304adfd35e91b92257da6c438d,2024-11-21T08:56:07.387000 CVE-2024-22363,0,0,5d981d34e499a40dd74e46e831c996b8cc8dc776c7d18bde043e34f03135f439,2024-11-21T08:56:07.530000 -CVE-2024-22365,0,1,f5a723b53985968c810213209da18ac7606048cb15d37ff0dfd338df14e5b2d0,2025-06-05T17:15:27.617000 +CVE-2024-22365,0,0,f5a723b53985968c810213209da18ac7606048cb15d37ff0dfd338df14e5b2d0,2025-06-05T17:15:27.617000 CVE-2024-22366,0,0,c9d4eac273888b8ed913f9e915823a299a656b6afa80a9997d2f8e6593e55a53,2024-11-21T08:56:07.920000 CVE-2024-22368,0,0,4962d052924d2b2dcaf8fef7c405c31bd171b02dbbc7f1ab1a6d924c3ef5d04a,2025-06-03T15:15:57.437000 CVE-2024-22369,0,0,25a54f5eeb18cbdc2e924f131f0d3183c031ad520a18106efbe880eefbb69d70,2025-04-02T20:17:04.160000 @@ -251863,7 +251863,7 @@ CVE-2024-22377,0,0,2bff56888b73307167108c33c72a8c0fb3a6df49d0f611e0fbd542aa18073 CVE-2024-22378,0,0,de1a2adc6461512be74e50b99576e64845ae7a360e6295a55c1c3e2ca3aeb667,2024-08-14T17:49:14.177000 CVE-2024-22379,0,0,3d7dbb444a66aef27ebc7c2d53ef8a8c7cbed341f2d516396d40c20e87ea4ac3,2024-11-21T08:56:09.467000 CVE-2024-2238,0,0,01f88d2ba769d26a929ee59e06ebef9224ab201e0aa64603f42fae3141b43eb2,2025-01-23T16:34:00.867000 -CVE-2024-22380,0,1,7632404bf785a9de83546df08ac5c6676a30c9e9f102aaa94e4a457a058c69b4,2025-06-05T16:15:24.747000 +CVE-2024-22380,0,0,7632404bf785a9de83546df08ac5c6676a30c9e9f102aaa94e4a457a058c69b4,2025-06-05T16:15:24.747000 CVE-2024-22382,0,0,33e56b9a14e5953744774c56c2afbe73291445f87f7c93152f6213f3a5cbbc20,2024-11-21T08:56:09.747000 CVE-2024-22383,0,0,8514514a74b7723238bc430917d3b0b6df07ceba43c72d1f9b0105b8648fd273,2024-11-21T08:56:09.863000 CVE-2024-22384,0,0,cdd23fe585be32ab9b7bc6de19a1b122467f640d810280bc3087f09419df3079,2024-11-21T08:56:09.987000 @@ -251954,17 +251954,17 @@ CVE-2024-22477,0,0,b8509029d5ec6a4381b6e6bd33da7f50735c23e01284aa814f384a92dcb70 CVE-2024-2248,0,0,128b03ee143838230434475acf9988ac8d0fdb2e64239ea0133c82e2fa239752,2024-11-21T09:09:20.790000 CVE-2024-2249,0,0,b7479f791c44ab2d743eb04162d89712e9af7b6acd224caaf8514c7a95cb2cf5,2024-11-21T09:09:20.920000 CVE-2024-22490,0,0,66a82b0e51a88056ee4e8dc9f25a0a6cdc86338bb5341bd044469b861097582d,2024-11-21T08:56:21.247000 -CVE-2024-22491,0,1,ac7a14fe4c650b7e0be11f951792835ce9c63cbb77752479a49bd5fd2d244461,2025-06-05T17:15:27.837000 +CVE-2024-22491,0,0,ac7a14fe4c650b7e0be11f951792835ce9c63cbb77752479a49bd5fd2d244461,2025-06-05T17:15:27.837000 CVE-2024-22492,0,0,ed6de9697d3c906be7c158fd443e2bb6e676d19d1e729007bba5d9124eec42ed,2025-06-03T14:15:45.907000 CVE-2024-22493,0,0,d1de2606acc42e9246a369eac46d44910ba2e76842dbf24e36a84134fb92547b,2024-11-21T08:56:21.833000 CVE-2024-22494,0,0,7fbb8a11ee1bbf88d2756d28c0b8ac308ed852b26511ea038c2d543b1972b9be,2025-06-03T14:15:46.107000 -CVE-2024-22496,0,1,e96ae6dca1b358c80ac98f4e12ec87b759894d90b531f316a09fa18cb1f323ae,2025-06-05T17:15:28.053000 +CVE-2024-22496,0,0,e96ae6dca1b358c80ac98f4e12ec87b759894d90b531f316a09fa18cb1f323ae,2025-06-05T17:15:28.053000 CVE-2024-22497,0,0,ff572cda88166cf6585a584534a7d1d7bbdcd92ab60805918e3f5eff37ca88e5,2025-05-30T15:15:32.113000 CVE-2024-2250,0,0,a87c6f56d5dd84af04d11000c391d5a607a245dd07e99e9b67f0a55566cf4dab,2024-11-21T09:09:21.053000 CVE-2024-22513,0,0,27b062d137410e427ab265348c8e99fb253512a92989aef4887a62782af3cac7,2024-11-21T08:56:22.537000 CVE-2024-22514,0,0,5ac69cdf27e4525f386bde824c99462208faf9b3eba91ccaec76ec5924b62901,2024-11-21T08:56:22.763000 CVE-2024-22515,0,0,c71e932883c0aa2e05451deab0c5ae34f2722f39d9dab1a84b0331ae3bee84fe,2025-05-08T19:15:58.107000 -CVE-2024-22519,0,1,86bb5dae2af7c478cabf767639d87f23bc3b00c54444817ab4fcd7c08c362d84,2025-06-05T16:15:25.883000 +CVE-2024-22519,0,0,86bb5dae2af7c478cabf767639d87f23bc3b00c54444817ab4fcd7c08c362d84,2025-06-05T16:15:25.883000 CVE-2024-2252,0,0,f8b57c312f6f19268d4bca869e740a5fbb6730c139364507b27b9b965c25ea87,2024-11-21T09:09:21.180000 CVE-2024-22520,0,0,bebbed9775bd568a59797690df0299901ade86b1ad601d19bc0e54c45e451d87,2025-05-15T20:15:43.150000 CVE-2024-22523,0,0,6e5964ba2742903a94d6ed6e7d813b2cb962e78d9d72ebf5a21537964e4c33d8,2024-11-21T08:56:24.053000 @@ -251981,7 +251981,7 @@ CVE-2024-22544,0,0,5c859c6b12795b2200448f24ca9a6011d7687074cfe2e34dadb24dd7fd544 CVE-2024-22545,0,0,b250d13aa437c0c2d56ea5e40ae33890c863f33ebcb2b35acecf2f2371521253,2025-05-29T16:15:34.440000 CVE-2024-22546,0,0,be29c28c6404f6f71a65e07123518d4aecb0cb37d40fde4951cc800e0a944e3e,2025-04-01T15:11:17.547000 CVE-2024-22547,0,0,50185b74401353c45761c13ff093e3fabf9462fb2d8944ab8c9616c3856a71e0,2025-04-03T13:18:29.913000 -CVE-2024-22548,0,1,67700d89d07a30c4fa62f5736d9e796640b255ab7ad56ca7fda0bfac195bd8d2,2025-06-05T17:15:28.270000 +CVE-2024-22548,0,0,67700d89d07a30c4fa62f5736d9e796640b255ab7ad56ca7fda0bfac195bd8d2,2025-06-05T17:15:28.270000 CVE-2024-22549,0,0,675ffdd8f168a9762f5a79b4cbe36a992bd2d143f3ddef6a0f310cd9c0117265,2024-11-21T08:56:26.580000 CVE-2024-2255,0,0,c38a1053c701220d5e01bbcf68bc70dfa4b5faf3090ba50a446a2c7b031db66d,2025-01-27T15:26:09.810000 CVE-2024-22550,0,0,ed96f0a80d539bcb01e0ab9294d11d1f803860b0b0bab7c55b1fed5ab75147a5,2024-11-21T08:56:26.723000 @@ -252040,7 +252040,7 @@ CVE-2024-2267,0,0,146a68e8c974bf1fe2a1896be2a5d484d82af8e3d85c42d653d86b50d3d238 CVE-2024-2268,0,0,023bcb8b8b824fc0e9c60564b6897c913d15834021647964c37337c7683fcfdc,2025-03-12T13:27:16.610000 CVE-2024-22682,0,0,5a340c1b31b6e259c63ff9afdb9ddfaa7ba2e6d870ae0776db25aa39ef718055,2024-07-19T19:15:08.093000 CVE-2024-2269,0,0,7fb9af7c9d2979a4ac8a39c6eeeb6bac7497c02cb4838657872aa315f3d84ae1,2025-03-12T13:27:08.787000 -CVE-2024-22699,0,1,5fb284b56ff235d4ea8dfa65db8f4dcc4014e7a41878b559a94f3ec6aec0c03f,2025-06-05T16:15:26.100000 +CVE-2024-22699,0,0,5fb284b56ff235d4ea8dfa65db8f4dcc4014e7a41878b559a94f3ec6aec0c03f,2025-06-05T16:15:26.100000 CVE-2024-2270,0,0,63f47cce2a740edf0c481afdd5ce6e5ecc0c75e4aa3fa14036247d4b5d8bf0c4,2025-03-12T13:26:53.800000 CVE-2024-22705,0,0,b5730313ce283f0037a29d05fbf12407fd5741147a3640022b0e10c6bc4e4651,2024-11-21T08:56:33.720000 CVE-2024-2271,0,0,4db8a47b8173de9214eb8ceec91175982a50723c590a10b220067bbb8385cb67,2025-03-12T13:26:56.810000 @@ -252050,7 +252050,7 @@ CVE-2024-22717,0,0,a7b151c6e31c95a4df5fc44b6dbdcf1029b8439937cd6cbe8d9f63db9fc26 CVE-2024-22718,0,0,5cd08764483bc730ff3f8f4ddec0daf7c4e39ed239b45833708f6c21b588af25,2025-04-08T15:20:32.500000 CVE-2024-22719,0,0,1db638ed526c73068c95686bec7db79a61b88aebc0e4e0ff15fdb90f445a6f66,2025-04-08T15:20:41.183000 CVE-2024-2272,0,0,43367df530a487894a93e5f6136a364a8d65aa80ad2cb2b0c7a182466dd67f52,2025-03-12T13:26:32.857000 -CVE-2024-22720,0,1,ced8e9498dda9d0b6520dcb54b6d4601d9935c2ff070d85c84ff5e17fb9aee93,2025-06-05T16:15:26.310000 +CVE-2024-22720,0,0,ced8e9498dda9d0b6520dcb54b6d4601d9935c2ff070d85c84ff5e17fb9aee93,2025-06-05T16:15:26.310000 CVE-2024-22721,0,0,d65e8b48a2b38e89fb21cd524e004ad80ee473c585bc71d76ab768f65ebe62a2,2025-04-08T15:20:50.123000 CVE-2024-22722,0,0,b52b3ea4f13cfa5524c524b96d16ace3a07bc5602ec4988ddb0bfba4fde7c250,2025-04-08T15:20:57.363000 CVE-2024-22723,0,0,590504d6ddbcfe59132e37aee995b9e0b4e9718bb7fbd1999a65e80b0cef714a,2025-01-21T18:31:46.820000 @@ -252073,7 +252073,7 @@ CVE-2024-2277,0,0,fb26e5203af69769b09593f650804e1cb7b1ca2d753f5f73c9a8e66efb21f2 CVE-2024-22770,0,0,56e8e397e43e9a8bf026122817588e842440f0bef4a69e553c14f3b76e272cf5,2024-11-21T08:56:37.617000 CVE-2024-22771,0,0,7617e8b0c6fda881a2255f1c01157125766b59da1dde7549613282f406c1f363,2024-11-21T08:56:37.750000 CVE-2024-22772,0,0,6e8dcc0f3ba13d7faed0c0b32e429861dfb883dcd31116729c58831e9e06cf69,2024-11-21T08:56:37.907000 -CVE-2024-22773,0,1,4119b14fce8207ef6ece7323023d859d3c4a6e427e21dd80d103b44560506cf3,2025-06-05T17:15:28.480000 +CVE-2024-22773,0,0,4119b14fce8207ef6ece7323023d859d3c4a6e427e21dd80d103b44560506cf3,2025-06-05T17:15:28.480000 CVE-2024-22774,0,0,bf99e95ba77966932ead4482e007477f567af9449f7b58c442b7bc149d68a0d2,2024-11-21T08:56:38.250000 CVE-2024-22776,0,0,ac97c16d22417af4ad2e5b6a94863a309580579998c043682a4e721adb21bb91,2025-06-03T15:02:52.760000 CVE-2024-22778,0,0,a19e88b93f3a20f6985aafecb50988a912c284a2e54ec0c0867139360136dc20,2025-05-06T12:26:00.203000 @@ -252081,7 +252081,7 @@ CVE-2024-22779,0,0,4b2529eb2a537ec4153614b263ea5bd6cc064ff2067dc5f922966e4462096 CVE-2024-2278,0,0,f074ce15da8dc9e3375db8894f9d7d715eb941b2a9deb7fc4da96933fdcaa115,2025-05-07T01:07:01.500000 CVE-2024-22780,0,0,e7c9e53b53c73f14641469ac17c6a267c6ae51b4da23d85d4748bd237084cc7c,2024-12-04T21:15:21.567000 CVE-2024-2279,0,0,15594de242362166ba4fcc677c674c35e566adb6da76d65bb4bb570b8c49add8,2024-12-11T19:29:27.377000 -CVE-2024-22795,0,1,f19725fa2e7a5074049c1a2a2a5368c4c5366b3f445ffaaebea6ce3552c02e56,2025-06-05T16:15:26.540000 +CVE-2024-22795,0,0,f19725fa2e7a5074049c1a2a2a5368c4c5366b3f445ffaaebea6ce3552c02e56,2025-06-05T16:15:26.540000 CVE-2024-2280,0,0,0418f1241bdb21ee444f3adcb24933ad219004bf634a535637b79ccf56c262f6,2025-03-06T15:02:35.070000 CVE-2024-22807,0,0,c63e56e80af4c58ae1f7129e86f946e6c72bfda64cfef4929c6ab6ca5fc4096d,2024-11-21T08:56:39.420000 CVE-2024-22808,0,0,b7e1e2d1bde9d89678abdad137c019036d81abaecf559d82e47aac2d5b04907e,2024-11-21T08:56:39.650000 @@ -252090,7 +252090,7 @@ CVE-2024-2281,0,0,c6a45030377391385f4e5a7e01504d1db578e67b118787b633fe12ddbf1897 CVE-2024-22811,0,0,95b770bca91a81d3413433c3550c707a1eaa1f3371b1cdc1ada7b1a0ac3fb4c4,2025-03-13T16:15:17.533000 CVE-2024-22813,0,0,fde04cad36ea7ed6da5592badd051abcc370fc34b9e00641beabb2629ce4cd9c,2024-11-21T08:56:40.320000 CVE-2024-22815,0,0,bf7286714cb17cb76e21dc0bc91848ea894410859ccb42c29106c27e54a4b4d1,2024-11-21T08:56:40.553000 -CVE-2024-22817,0,1,43c32f1370cdffa5bd88e4ddaefa0558a582e3feebfece45d85f3af984753216,2025-06-05T17:15:28.713000 +CVE-2024-22817,0,0,43c32f1370cdffa5bd88e4ddaefa0558a582e3feebfece45d85f3af984753216,2025-06-05T17:15:28.713000 CVE-2024-22818,0,0,ae07f7c9f23d3ccaa5209ac1c54f9755e1e9817fbfc817996581e36100b284f5,2024-11-21T08:56:40.953000 CVE-2024-22819,0,0,7e298a92c78d234d5ab0ca56f880a0108a23b6be265e0dee3a64531ce6e0dcf7,2025-06-02T15:15:31.413000 CVE-2024-2282,0,0,f65d975fa959d79e35fd81da556b5cbe68cb3b1111b3d61a39d139eaf08fcba0,2025-03-12T13:24:34.817000 @@ -252100,7 +252100,7 @@ CVE-2024-22830,0,0,0c3577472d24092a4784e16866215f66774a8a19fc4b93b032edbc9653f52 CVE-2024-22836,0,0,1ab6e71ed2f8cdeeb0f518448ec347189f34be9aed8cd7e63f7283d5e1e33c4c,2024-11-21T08:56:41.727000 CVE-2024-2284,0,0,8048874eec22892088a6456d8c15c99e09f431b8184d775407ca7541bd967bf6,2025-03-12T13:23:53.410000 CVE-2024-2285,0,0,ff2b16cef3376f19cc39f889117164d7888b698f7db120875eb7c677dae46767,2025-03-12T13:23:39.810000 -CVE-2024-22851,0,1,76d4bcdf5e13ef4b4c40954a9b67722c902952f941ba46c61c1d3b9f5cce3d17,2025-06-05T17:15:28.920000 +CVE-2024-22851,0,0,76d4bcdf5e13ef4b4c40954a9b67722c902952f941ba46c61c1d3b9f5cce3d17,2025-06-05T17:15:28.920000 CVE-2024-22852,0,0,0b6cd58217784a5ec25e9d6382d35459d9eb6bca19a9e1816db76b42f63bcded,2025-05-15T20:15:43.533000 CVE-2024-22853,0,0,569a83947ec74ebfa9eb6846d290452781f936e173da49be8b02d4b29abd2926,2024-11-21T08:56:42.197000 CVE-2024-22854,0,0,20ef868342a0c80c3c6ce8ae432f79bfc261c8cf42cc8dcbda1f3275a134827c,2025-01-13T14:37:55.830000 @@ -252125,7 +252125,7 @@ CVE-2024-22891,0,0,a60262184c3c29b0e0c7f3fe22f6adcbb2816519fa464ccdba3d14fcd28d2 CVE-2024-22892,0,0,ab4685bd3e54af7b091a985b4e2bd0ce232ea37ad229896d47c941f92093c96e,2025-03-14T16:15:29.140000 CVE-2024-22893,0,0,c15a8e4daedb1b587bbdd4afc7a3262ee257bc5bc12862b5646b68c245079a97,2024-09-26T14:35:12.920000 CVE-2024-22894,0,0,42f5b44dcbf5f726764f56c5b153b80c427e59c7fdf8f4595198f383354dc3bc,2024-11-21T08:56:45.447000 -CVE-2024-22895,0,1,b8c14c65b8853d2c945aa08790c67740a5056848181492d7c8902cda3d48dd78,2025-06-05T16:15:26.750000 +CVE-2024-22895,0,0,b8c14c65b8853d2c945aa08790c67740a5056848181492d7c8902cda3d48dd78,2025-06-05T16:15:26.750000 CVE-2024-22899,0,0,e0b1270af06adae37849d6178e4aceee74c98c48605efe5906b7249773cb3736,2025-06-04T21:15:37.730000 CVE-2024-2290,0,0,9d1c9ebac87a4153137b27026706ecff54dacd80661ace88cd79b9e6caec7807,2024-11-21T09:09:26.507000 CVE-2024-22900,0,0,a6cf4dccbb4086d0140c6a89c699c9a0b37cc44314234bc884861be28bedd9aa,2024-11-21T08:56:46.100000 @@ -252135,14 +252135,14 @@ CVE-2024-22903,0,0,f03d3409124dee699a8824200879f5bb07df35f51b7ef94e62bbd5481e177 CVE-2024-22905,0,0,af861a89b31b1cd519cf02c39e78baf454e4f374e5027f26c4ee555cf353373b,2024-11-21T08:56:46.740000 CVE-2024-2291,0,0,619d761e61f944fc6b549132505892b7a31cc16bd266518c53fa8681dacbbe93,2025-01-16T18:02:45.747000 CVE-2024-22910,0,0,8c467bd6905f47328179bbf1d802932c88b496fc8de8231d42c1b81ba98e84e0,2024-12-04T17:15:12.300000 -CVE-2024-22911,0,1,c5c45760e04e38e3f527d6abede56871d14899fdbce1f2fceed9a671affb60a8,2025-06-05T16:15:26.963000 +CVE-2024-22911,0,0,c5c45760e04e38e3f527d6abede56871d14899fdbce1f2fceed9a671affb60a8,2025-06-05T16:15:26.963000 CVE-2024-22912,0,0,5ea775660d89bfc8062a1a2e64de2f4dcb16849b1db5073b4dff385a0b1fad2c,2024-11-21T08:56:47.240000 CVE-2024-22913,0,0,ac1aca178c5689a84a4fe1d3de2822fdbc55949d87e5fc11519420261810c862,2025-05-30T15:15:33.337000 CVE-2024-22914,0,0,62b78c42de78eae9ec85357ee373b76ca654492c7be19bbe9e95f2da85fae82b,2024-11-21T08:56:47.543000 CVE-2024-22915,0,0,32a8402524c28738ba5c982871940dfede8bd85f6704a228ce9b9ff3d1f4db69,2025-05-30T15:15:33.513000 CVE-2024-22916,0,0,dc6e6dd1de65a53d75ba394bc7e599a4dc619dc2005fa334e489df67375de233,2024-11-21T08:56:47.923000 CVE-2024-22917,0,0,5dc97677d5637b8c93ae6363792ebfbbd65b3bd87e7df4c274e6739509ee871a,2025-05-08T15:07:37.577000 -CVE-2024-22919,0,1,6072dfb63e932d68691a9f3e3cc2f74de20bca994dbf8a0fa9527fa77618f485,2025-06-05T17:15:29.160000 +CVE-2024-22919,0,0,6072dfb63e932d68691a9f3e3cc2f74de20bca994dbf8a0fa9527fa77618f485,2025-06-05T17:15:29.160000 CVE-2024-2292,0,0,456ca10d707e4bab1681a8f348e451b4c7e5812faea70f8784757c6398afe5c2,2025-03-20T10:15:32.340000 CVE-2024-22920,0,0,2cb66f94468eec9fedec18126fbe216bba0b632eb7a0d63f08f9dbf5b8974cf0,2024-11-21T08:56:48.570000 CVE-2024-22922,0,0,5b54c415def3bf9eb39c85aa178ff01a006a91dfa9aa9128f69f1cbe40482745,2025-06-04T22:15:25.727000 @@ -253067,11 +253067,11 @@ CVE-2024-24003,0,0,c2fdb96f74336a58f073e3d6e5342a558c6ba9447262facf2d4bd3275b229 CVE-2024-24004,0,0,1af396ffe576b58bd7d5c2263568eb18988ccf768f92ad925bac44bd318a1e78,2024-11-21T08:58:48.950000 CVE-2024-2401,0,0,4e38002be4f0651c9a9f05d68a6881530ac696a28b7a908e2323c00c03877685,2024-11-21T09:09:40.530000 CVE-2024-24013,0,0,2a34af1025f24c4132129b4ff4f43bd6d740f5d624d3c16eb96a399e64c443ed,2024-11-21T08:58:49.200000 -CVE-2024-24014,0,0,7a19143ccfb751b6a902be163e96def71297465d5ab962fc6380207d28c9048d,2024-11-21T08:58:49.353000 +CVE-2024-24014,0,1,24e69431252a835005fb699e7773ddf8b1b5ee75122c2dcced36583adc1e4d44,2025-06-05T19:15:26.040000 CVE-2024-24015,0,0,b9318301270b854339d3ee5442f67844b960e3883dca2b24a3618a27c70f2043,2024-11-21T08:58:49.523000 CVE-2024-24017,0,0,c4d2b0da9bcf72d62c30eae5dd55c83d282703f49ff537c35eb3b58e1015df47,2024-11-21T08:58:49.680000 CVE-2024-24018,0,0,f05f236b35fe0cd2cdabacd1c39850bd4cc0c002e7998df93397855c741a34f3,2025-05-15T20:15:45.407000 -CVE-2024-24019,0,0,abcbc45504d3322473e54b3ccf90d96e2e4fbf8819e9394a16fc12c867d75c6e,2024-11-21T08:58:50.063000 +CVE-2024-24019,0,1,c03741bce6b0161ad8704d2096d29737565e48e5af6de6090410ba0ac54a2b64,2025-06-05T19:15:26.293000 CVE-2024-2402,0,0,688734248091b27aff84b6615386cccb61e0e8c77d7e5d170ef01495d5f440b5,2025-05-08T19:11:11.243000 CVE-2024-24021,0,0,a401464578cd8772e7a44b662653d888d3432918f388c5ab659d827696cdc8b5,2024-11-21T08:58:50.210000 CVE-2024-24023,0,0,3ee9e259451a221bd1226a86ab24cca18a0427c8accf85594b7fe8589f86fd50,2024-11-21T08:58:50.370000 @@ -253121,10 +253121,10 @@ CVE-2024-2412,0,0,68eb681b0fa4a4498fa14048430f94f9fe1b3cee4b03260c689eaea8c72d78 CVE-2024-24122,0,0,247eb2b1a1ec57d0c51c2a9372cb7b02e321f9443f3d4b6a685cf05d4f14555c,2024-11-21T08:58:56.470000 CVE-2024-2413,0,0,d82104708d4b956cc742211b85a729547d4498a8859153094f9b1f8c2ba96790,2024-11-21T09:09:42.080000 CVE-2024-24130,0,0,61b89b1091ed34c2a6247446e6fc623150e02324d85165f1acb02667eb36ecb3,2024-11-21T08:58:56.903000 -CVE-2024-24131,0,0,fbd07b13940f6eb92873263a3ce2b80bb1df03df6ffde1656261d9d019ff03fe,2024-11-21T08:58:57.127000 +CVE-2024-24131,0,1,effeaf004ecee6eccd7a3540d45a94db2d623bba59d46d6056adfa77a0f7f0d7,2025-06-05T19:15:26.497000 CVE-2024-24133,0,0,4253d0827f054649c3c100773249f49b3affc1dd1708c7be5814d1c022638e57,2024-11-21T08:58:57.280000 CVE-2024-24134,0,0,e37620cc2ef82aa1c0c013b04690ea81dfac68aa1b0a8f1bdb9f9e2c8f149710,2025-05-29T16:15:38.477000 -CVE-2024-24135,0,0,85d530b3e82dce372d31e0d41be1ca6335efa4384064428a7fa6a716141e7b92,2024-11-21T08:58:57.643000 +CVE-2024-24135,0,1,e067ab4a4ace0d71286467bac2682e4b25a1353d1ce35504660331271faf9729,2025-06-05T19:15:26.727000 CVE-2024-24136,0,0,d8bab72d0f6caae1296357639967ad53f9242424e445afcbc70db557f000fc15,2024-11-21T08:58:57.783000 CVE-2024-24139,0,0,e048da5d9a48edd988fc156657053e9aec3fc7a06da29a9ac91b208e0bf22c50,2024-11-21T08:58:57.927000 CVE-2024-2414,0,0,288cf1f5e7eea41678bd1847649e8873794525f431b2560f43d693c15049f16c,2024-11-21T09:09:42.200000 @@ -253167,18 +253167,18 @@ CVE-2024-2424,0,0,d38b413147578102258baaf4608c239ad65c34e87612768e40d89d9702993e CVE-2024-24245,0,0,b3d3873bbaca26fb2c131ecfbb7ed35f909142b8888b006b2e7a43cfd5eab2cf,2025-05-13T15:26:15.033000 CVE-2024-24246,0,0,aee375bd384f6f6525ecaf7c72a242d761df287a727d4bd73ac8a34a8fb0ec3f,2024-11-21T08:59:03.260000 CVE-2024-2425,0,0,819d6b5e41a9ad08d75b1d0f90a9bd716fe340d9aa9a5f5644e10d03953f24ea,2025-01-31T15:41:54.357000 -CVE-2024-24254,0,0,77cd5073ec47da62650b382fff6d9c4b9e4c378bfed34b209f24fe2e17fe7934,2024-11-21T08:59:03.540000 +CVE-2024-24254,0,1,0acae52a17b34b928e8010832139045a0156a5e123e812e3eac585be0fb47b8c,2025-06-05T19:15:27 CVE-2024-24255,0,0,067b1951b4b56ac88e17305f5d4f5f6f79b6ba0fa933cc002ff369c87705e540,2025-05-08T19:15:59.257000 CVE-2024-24256,0,0,2ffd820a3ea61d557ba957f141c2c58830e7859eac6ef3893ee4c352ae12d6d0,2024-11-25T18:15:10.727000 CVE-2024-24257,0,0,13a73f5842f4571d2e22339c5383aaa27569e6214fd7fff88e31b104653acb62,2024-11-21T08:59:04.017000 -CVE-2024-24258,0,0,74667016fcefde53b5915f5e07452a132b2532e02264e8bac072cf0c9419bfa7,2024-11-21T08:59:04.247000 +CVE-2024-24258,0,1,ae929359bad07124420ea8a15b0a80d2fe2ce690e619327a2ecb004486a92ef3,2025-06-05T19:15:27.210000 CVE-2024-24259,0,0,2b8c4eb1c6109c3751b77f24f6178b32fd1d734aee15867954b330e896c4ea9c,2025-05-15T20:15:45.760000 CVE-2024-2426,0,0,6e4c7667e348763035bdec9da1887f8edb47f0ce9fdd774523849ccba3fbc09e,2025-01-31T15:41:55.917000 CVE-2024-24260,0,0,c423ee7007521cec109068d9ab43a1b4a2645aac9f153db8551c66a880da5c62,2024-11-21T08:59:04.580000 CVE-2024-24262,0,0,88092845f03ef8da70f7d772fd5c58e05f5b661d467dba7dcdf80cdcd31e9258,2024-11-21T08:59:04.840000 CVE-2024-24263,0,0,939e88aba2abfd29b0449c22c0abfea9ce9ce2d3724d8bf3c4c278eafd5e33d7,2024-11-21T08:59:05.010000 CVE-2024-24265,0,0,6e9c18a10ed665d0971c17b8d66c12683e1c03339bff964445be562bd85c003d,2025-05-09T18:16:03.527000 -CVE-2024-24266,0,0,b01052a1d09473422313197c1d95155ec7dc292e2d5aa99b904a2b4b6a5b2f36,2024-11-21T08:59:05.313000 +CVE-2024-24266,0,1,af02336efcfa0543c3e97f34d9dba916b482a01f48e05fd35bbfc898afb8622c,2025-06-05T19:15:27.480000 CVE-2024-24267,0,0,b362a573ae53d8b792a146f9eedf896751146ced822e7e1d5dd56d0a6c4993bf,2024-11-21T08:59:05.483000 CVE-2024-2427,0,0,1004d0a0def7c6cef3083eef72f06901103dddd8dc2669fb276e8dd287d1d79d,2025-01-31T15:41:57.463000 CVE-2024-24272,0,0,11fb412eb83c0a2aa1fd2ad772f5b73042c54fabd3e8078b95ce1c85c48de32e,2025-03-27T20:15:23.717000 @@ -253203,7 +253203,7 @@ CVE-2024-24308,0,0,606388f06c429a7fd55170d325cf78a59c162f34183a28be3e3e5908cb178 CVE-2024-24309,0,0,e79427c6a9e2f3cd1729bc966988cc7423d248923027fd4457bcc817e82244a0,2025-05-08T13:48:36.583000 CVE-2024-2431,0,0,ee9f8d1ae722ac1062b2154b1fa021af57b6dba016bb5c8d3898f27874cbc924,2024-11-21T09:09:44.550000 CVE-2024-24310,0,0,6c0d01b2dc07394fe2d02a5e8e8afe4b0349bec86c8eaf95a37e3b217fe0a7cd,2025-05-08T13:50:07.047000 -CVE-2024-24311,0,0,0a89dbe220e1990e95427a53542237b1dc196720a8cd6716cc07ddb200ea74a2,2024-11-21T08:59:09.177000 +CVE-2024-24311,0,1,5ea26b67dc237e5bbd20f297b578b5aa85c8c3fb1b7e32ef6dbbac5d2bcd986a,2025-06-05T19:15:27.690000 CVE-2024-24312,0,0,8b3a6d93a1dfe68291477da62c2d1b88140ebb8d3eeccda7b83797d822f25bfe,2024-11-21T08:59:09.337000 CVE-2024-24313,0,0,a38a2a53ead6c0d7bb6f557a21419e96db9bf2a8d97bf8168ef8b779f3b3a255,2024-11-21T08:59:09.547000 CVE-2024-2432,0,0,325cfbb37d9d09c07004aab2c2990057639ca218150b1224dcf8bf3266b7cd54,2024-11-21T09:09:44.680000 @@ -253234,14 +253234,14 @@ CVE-2024-24375,0,0,2ec8cc8458c767b854b4065d5df2cf76b30129c147e3cc417cdf6fafed3a8 CVE-2024-24377,0,0,c3571d591fdd08eb6fe4c53e100023da606530fd66732a886bbbbe622f3d1b3b,2025-01-13T15:14:32.837000 CVE-2024-2438,0,0,9df80e59305d069e4c0bafdf7501833f48e0be776a335419dde3462ed16ce96a,2024-03-14T09:15:47.820000 CVE-2024-24386,0,0,dbf74fd10c547c8cbf3809c05783d8ff93602c40d0c6a081660b110834e3bf8c,2024-11-21T08:59:13.463000 -CVE-2024-24388,0,0,6f376eff214f4516d6e0ec88f3f524e9e4f4b0ac369baf5c6f6e0100e4db6ef5,2024-11-21T08:59:13.680000 +CVE-2024-24388,0,1,b5b9a9c932d5ea0074a6bfa07b09bff2aed0814a7338d511485d6fe446028b47,2025-06-05T19:15:27.903000 CVE-2024-24389,0,0,2d7ff37174d9dbb9492b1a442673e426580708c5a1303fb8d0266900f0ba1dba,2025-03-27T21:15:46.297000 CVE-2024-2439,0,0,0f8039336127c52c54ab5acd7c47352bf568be3c16c9d5d6a53d62d569133673,2025-04-14T14:18:39.200000 CVE-2024-24393,0,0,533784798f5b3d915b4ebebb8e152f8dd31f7ee87957856dd85b0c6643a7f85c,2025-05-15T20:15:45.950000 CVE-2024-24396,0,0,3439b8f9d42f52499fc3498a2bdf9d27d33a987106aaad6527a13387ca9dd891,2024-11-21T08:59:14.147000 CVE-2024-24397,0,0,3501920d62c738b549e4fe694cac4cc134b8a3677ddb914004cc38d0f75b79bb,2025-05-15T20:15:46.120000 CVE-2024-24398,0,0,c86501b22f4ff480bb0270c1a5e71e6cae2cca0a1f831c1449ad442be12187cf,2025-05-15T20:15:46.310000 -CVE-2024-24399,0,0,bb2eddb994e88bfdb604ce903ad2971bf2fe285b9c97350eea6bcc5df32e4306,2024-11-21T08:59:14.690000 +CVE-2024-24399,0,1,2f3ad87b190792fadc9b11dd70802b52f52e0fdb50c1703cefa598e8f0771412,2025-06-05T19:15:28.127000 CVE-2024-2440,0,0,83378454086363d7ca4f57beb9690f64458469c3707996c259c9c7cf2668d08e,2024-11-21T09:09:45.437000 CVE-2024-24401,0,0,71e4ae3c681bf9b1d76b85f2490244760ec98ea3c8d8cb9c503af1362e66c9be,2024-11-21T08:59:14.860000 CVE-2024-24402,0,0,7f458a8af3fe0b9a45e7a437cbf857eb25ac5b2d4389714ce9b7162d41f6a675,2025-03-24T20:15:17.830000 @@ -253302,7 +253302,7 @@ CVE-2024-24482,0,0,12f9ca99fe14b8dda09119e5a9c90e05dba78cd2403be2772decceaf915ff CVE-2024-24485,0,0,8b3bc69501fdccb37483d3dad8b2008e6c17d56923656298965f794c72758f89,2025-04-10T13:39:04.063000 CVE-2024-24486,0,0,edf4c4082ecf075b163f0a734e3b03d9e81a9a3ce6788f50621186f7694f47d3,2025-04-10T13:39:57.420000 CVE-2024-24487,0,0,6336ce0210f6b19b06f24f3022017cb316f38b4c761c734f0dffcfce0a4fe08a,2025-04-10T13:39:33.260000 -CVE-2024-24488,0,0,bf27efb75bde32f281cfc397e5872b525b860bf9883f0dd43f8ff534d29e927f,2024-11-21T08:59:20.560000 +CVE-2024-24488,0,1,d1f837eb6d5785575508ba7513b8fcc1763262d83fe72b6f636d50cd9131373e,2025-06-05T19:15:28.363000 CVE-2024-2449,0,0,81d8209e3a4b4be2ff45b2d18df08ecaeeaf5bbb2c00601fbdbf659de2857374,2025-02-10T19:33:51.660000 CVE-2024-24494,0,0,85b42e348e5e5905e41947f429b45e0f36e259ee4fd6ef7d45e99cf59382c1cf,2025-05-15T20:15:46.657000 CVE-2024-24495,0,0,d9038119e10c686060f002d1373fad59c5867a5d55e2b623cdae5ab6c145dfc1,2025-05-15T20:15:46.847000 @@ -271964,7 +271964,7 @@ CVE-2024-48915,0,0,22b831e4b76f3ff1bbf21dd69a4b74295f2c021ffd6565d2fbc637ebd54bb CVE-2024-48917,0,0,cbe4a7ce537127ff54eb604789bfae67e90e3547c74f710b6175a0ea1e584f81,2025-03-07T17:07:54.800000 CVE-2024-48918,0,0,cfae4446d62adc80a48f2ad18619403b9e405854ec4cb3c0b0fcd077c6f1add6,2024-10-18T12:53:04.627000 CVE-2024-48919,0,0,16efdb2b06ecb55d9885e13fd3da6695a4858f71e0605b88abf088c1c21e44e2,2024-10-23T15:12:34.673000 -CVE-2024-4892,0,1,8ec239c34232ec4792f14a8f1387f23ae89afda61c6064e487f4297c39577848,2025-06-05T16:23:47.540000 +CVE-2024-4892,0,0,8ec239c34232ec4792f14a8f1387f23ae89afda61c6064e487f4297c39577848,2025-06-05T16:23:47.540000 CVE-2024-48920,0,0,25b3c3e2b92fac9b9ccbf12e20ef4be721fe253175055ffeb6893f0b1913e275,2024-10-18T12:52:33.507000 CVE-2024-48921,0,0,5f5b362511bded165ed66ad2aa6eea76438ebb3ede733b9d5f6bee96ccb81c58,2024-11-07T17:20:34.160000 CVE-2024-48924,0,0,77bac0758d919479be79c66b736b700fcf68da155199aa8dd6fee549a73c583e,2024-10-18T12:52:33.507000 @@ -279271,7 +279271,7 @@ CVE-2024-6700,0,0,409ab3c91e44011855a21d30373ec03de7918b1550584d03fe35b2d76fab36 CVE-2024-6701,0,0,b11215b1cd0f3496a31e5835026526ed1f664a6a440daee8c25423da4f65a744,2024-09-13T16:08:43.407000 CVE-2024-6702,0,0,31ae7b0d02f15bc6e94f2583111f260bbd885063942a49ff7a6b4b6dab070588,2024-09-13T16:07:22.420000 CVE-2024-6703,0,0,a961a3d3db30f881afff3f629b75b80722347a4018e21f51f7d6136105cb372f,2025-02-10T16:13:16.443000 -CVE-2024-6704,0,1,4066bfd62ab3e2c56dd3154b9f53ee1e38e7f7a1ffab98619bf5fb8d7f4b35bd,2025-06-05T16:38:43.267000 +CVE-2024-6704,0,0,4066bfd62ab3e2c56dd3154b9f53ee1e38e7f7a1ffab98619bf5fb8d7f4b35bd,2025-06-05T16:38:43.267000 CVE-2024-6705,0,0,44dc9cc67853da80020e3159d89e61e2953b5a07fd227ceb6f6c695d3a3737f7,2024-11-21T09:50:09.370000 CVE-2024-6706,0,0,84671454775dde79ed78cf9a88d03e049da529ab8f19c88357984fca4748e308,2024-11-21T09:50:09.480000 CVE-2024-6707,0,0,329427c8ea01aca18626eb8ed91b615765294ff8fef9da0930ca4b77f71a396a,2024-11-21T09:50:09.680000 @@ -281932,7 +281932,7 @@ CVE-2024-9526,0,0,acc606f8e9195e546a271d256c6ec9cc804f4a841580ecb828b473fe7b0b33 CVE-2024-9528,0,0,324f5a9bfc4a37c1aeda9587a3d9c2b641c0fbccff333ce06df06554eda75394,2025-02-06T18:35:28.637000 CVE-2024-9529,0,0,6b328ba0bed5589256da193b60a8a18489bbec6f2035b97998856b36e33a34ba,2024-11-15T19:35:19.160000 CVE-2024-9530,0,0,d9770d6d9d81aca35282dd37cad0ec897a8e52cf92a99657df0b6283cc63f82d,2024-10-25T18:52:10.810000 -CVE-2024-9531,0,1,bd5dea9af3b5acebc7a9498df783f0aa08a3c09d57316df4d5faf9fd73c9b899,2025-06-05T16:56:56.240000 +CVE-2024-9531,0,0,bd5dea9af3b5acebc7a9498df783f0aa08a3c09d57316df4d5faf9fd73c9b899,2025-06-05T16:56:56.240000 CVE-2024-9532,0,0,ee74e81fcd3228028851cbf05d2cfbe5eea8f3421ccb07415d383b1bab6b2af5,2024-10-09T11:18:49.027000 CVE-2024-9533,0,0,11363b568362f03cfdabbcb932ea8a978b23b62f974945ecc7fb3cafbfa9061b,2024-10-09T11:18:34.560000 CVE-2024-9534,0,0,491ec5d6b5ab9ce3a6949ab86a011008ecd469bc754ae94796c037eeecca32df,2024-10-09T11:18:23.607000 @@ -282322,10 +282322,10 @@ CVE-2024-9936,0,0,1f6ddab8c53f4d6f468bc3c998b336f907b00c883130cc27707d2e94ed2db1 CVE-2024-9937,0,0,0766c76afe10a009ad41ed699dbcb8d528e71a258224f4e49db1d6ce7899ad8d,2024-10-16T16:38:14.557000 CVE-2024-9938,0,0,f49b9eb7f381d715bc7c56ebe1a2562d847f1875ed746118dd755a2d400bc9b1,2024-11-18T17:11:17.393000 CVE-2024-9939,0,0,c47ba97255f1c4100695a38e7349ad92d97a71d9b8357497d3b60d8266490e6a,2025-03-13T16:27:18.140000 -CVE-2024-9940,0,1,62e1ff5f5c0a2104a425b72d4724baaf471b60419bb5a8714e4094c89753fdff,2025-06-05T16:40:26.147000 +CVE-2024-9940,0,0,62e1ff5f5c0a2104a425b72d4724baaf471b60419bb5a8714e4094c89753fdff,2025-06-05T16:40:26.147000 CVE-2024-9941,0,0,f8c1a3ce8301c9f96e0ee1a5f0096fa5255bc477de166caa18bdb6a9866bfb15,2024-11-26T19:37:15.283000 CVE-2024-9942,0,0,c6315b95bdda9839ef612eba500df807a644d469ed95f37c88df9fcfa0cbb756,2024-11-26T19:33:35.843000 -CVE-2024-9943,0,1,356f69899a75ea0ea0e171d2de47a21c8a7cf6cad8cddb1f2cf0542e9958208a,2025-06-05T16:57:08.370000 +CVE-2024-9943,0,0,356f69899a75ea0ea0e171d2de47a21c8a7cf6cad8cddb1f2cf0542e9958208a,2025-06-05T16:57:08.370000 CVE-2024-9944,0,0,f8fe44d98686a29a4c29e0df47e437528a061318d17270b2824d7d54b74548b5,2024-10-17T20:47:35.817000 CVE-2024-9945,0,0,cea3df2b6f5b90a7f8d9b7bf1f4b5f371dc7412d9ebdd4e046c2e2c67744f223,2024-12-13T16:15:28.267000 CVE-2024-9946,0,0,442c0aff28a23c9d67bb95abea8abfbdb9db72aae0a6f6a85ef41b89c2d30c77,2024-11-08T20:38:07.557000 @@ -283299,15 +283299,15 @@ CVE-2025-1212,0,0,4775d3c7abc8db0222566d77a07a3b283456acd669d779aebc898ec54ad5eb CVE-2025-1213,0,0,226c2da2d3a4aac647d77e7a97567bbe3f4fafbe21e513e404ff5a1441bfa553,2025-02-12T18:15:22.180000 CVE-2025-1214,0,0,ee530a0ccb2dbec34bd0adb6326677fa3eb44dee2c85c32f60f080d2175851ef,2025-02-12T20:15:39.200000 CVE-2025-1215,0,0,28588a9b24de663f5bef0961d5dfe96e8a71be7eda3beced3b32d3f6d90dfb60,2025-03-21T18:15:34.290000 -CVE-2025-1216,0,0,abdcf7b1d24d8445a4f6ed627d67b343a3a87ed763645866fcef7a7de7e49669,2025-02-12T20:15:39.907000 +CVE-2025-1216,0,1,50376fb254a43a782342af97b4677c5fc99c4063ba5e1de50a8eca2831d4fcbd,2025-06-05T19:46:48.060000 CVE-2025-1217,0,0,775b5b40e99ed6cb30df08cb80664125bba20f68dd952ce028f26b376f222b4a,2025-05-23T14:15:25.767000 CVE-2025-1219,0,0,e17024aa809e518546045f8224c0a9988066d9d47c6a0948c6a958a7960baa9b,2025-05-23T14:15:25.950000 CVE-2025-1222,0,0,37e1c4bd7e5e0aef71d4eaf69d903e1860c5e20ac2c3d888fafec2d8540da40a,2025-02-20T01:15:09.707000 CVE-2025-1223,0,0,79c0b4e1b63833c27fb384ab59edaf7afe279373880088cf1aa2309d13ed89d4,2025-02-20T01:15:09.837000 -CVE-2025-1224,0,0,59fdfd1d3bd6ca02fc2d196a667525934b64022ed9429789a0b5f4e7c427eb9f,2025-02-13T15:15:20.500000 -CVE-2025-1225,0,0,775a64c9f4633524291ca7bef1a94707f1a9e8d35072c7b212b938041306fa46,2025-02-12T20:15:40.203000 -CVE-2025-1226,0,0,430a628b1f0e64c60ce97a31cd895fdf521cec0567fb592bd5bdf6f4fcd1e0b3,2025-02-12T21:15:20.470000 -CVE-2025-1227,0,0,b55af184f87caf618381835e880bc0a07b74fed7d0c7382ddb55edd0ddddfb9e,2025-02-12T22:15:41.383000 +CVE-2025-1224,0,1,fcef054865826c9eb5852cbebebf8a55d220f08e4237f5092abd44cbf6f4e9e2,2025-06-05T19:47:07.900000 +CVE-2025-1225,0,1,e6d32e36ec07a31dfb454e260dc9ff8a02ab3c926e53c37e618ef7c47ba76600,2025-06-05T19:47:35.927000 +CVE-2025-1226,0,1,5a6b711b964a183f3e1caf1568207f4c8b4fdcf214a6067a68cf41f1067c619b,2025-06-05T19:50:14.263000 +CVE-2025-1227,0,1,ebf45d04e240b048f685a5603dded7d44860f738e9c320618ec001ee23d74aed,2025-06-05T19:50:47.190000 CVE-2025-1228,0,0,12c830b22a778120983d037d36321ed8fb02836367f4bbbd9be0e19668100480,2025-02-12T22:15:41.493000 CVE-2025-1229,0,0,fa5787151bd081a7c3655f50c46799853d648eeeec0e4010ed7332955f8d9df1,2025-02-12T22:15:41.667000 CVE-2025-1230,0,0,dd0a3ca0e089c26c5259a45f938e8e64977c81ece19c03ae3b8594f4d83448d5,2025-02-12T11:15:11.230000 @@ -283770,7 +283770,7 @@ CVE-2025-1808,0,0,e7598b7f8580190f908b3118b5c0d79761365b9d99dd376ca7955b674e589d CVE-2025-1809,0,0,0e051d8eda56035c04f32be51a96c16adce266a6be0493dc65b33d1bbb6b23ae,2025-03-03T21:15:17.397000 CVE-2025-1810,0,0,5f1c16444374fb3ece0458b6736f8ec3c4daa432684a2200a8e31c80b7e6e99c,2025-03-03T22:15:37.280000 CVE-2025-1811,0,0,857715adea2e0e1d71f608745fa6268cd41061918ed8a5823a90033505937a29,2025-03-03T21:15:17.517000 -CVE-2025-1812,0,0,961cd071b165b99871c88d8e940e599a427d829ad61c9054c38f1fcfedde3e87,2025-03-03T21:15:17.640000 +CVE-2025-1812,0,1,fc2bada80958d0497b66061adca3ba919c250184c829e158885439d506faefe7,2025-06-05T19:52:43.550000 CVE-2025-1813,0,0,dc6153a43a96794f0a7da21f49cbfff542d23f1d2a49d063d808ed52db6e5f91,2025-05-28T20:31:05.023000 CVE-2025-1814,0,0,f052b655becafe7f6e8e1d38682da2dbf4c2c6590d4c98cc9092d8c336659c0f,2025-03-05T21:21:54.603000 CVE-2025-1815,0,0,cb8516a4bd1acad3269d8ebad1c2d004a0689886e960eaa6015183a95860e2a0,2025-03-03T21:15:17.830000 @@ -283790,7 +283790,7 @@ CVE-2025-1834,0,0,00fe78fd3caac7a502cdf75e4364d25f840ac9c9aaa69f4647f76b2228ceff CVE-2025-1835,0,0,aee1b4a486da841c7db8143deed10ae556bf311d96bdf0dba2c0ead166fcb14b,2025-03-03T20:15:44.867000 CVE-2025-1836,0,0,e55d8c1ad6c532ca23d15111c1e742b84846f7f3c67ac8b9d72b2a3b7fffafce,2025-03-02T23:15:10.993000 CVE-2025-1838,0,0,c53eb69ef96a5fe2305ece0f2cbbf93f285af0fa69ad3bc447aadc10cbe1cb8a,2025-05-05T20:54:19.760000 -CVE-2025-1840,0,0,11fc5062f9b2e0e0b2ba7a6f1fa5e4ee2c5a098000b6e86ddfd6cc6aca9b5fd8,2025-03-03T20:15:45.073000 +CVE-2025-1840,0,1,b8fba6b05c656edde4e8ecb6319ccde80209a403a68f06b91faf7a306cca50d9,2025-06-05T19:55:58.760000 CVE-2025-1841,0,0,93c3963f7b28e530d32ddfce1cac9f7753c496bd96376c2ca5a5004f3e46c57b,2025-05-28T17:05:17.987000 CVE-2025-1842,0,0,7ccd0ad08d0d8734df889044267fd3c6cfe4c03c4a27d4282f875e8799119511,2025-03-03T01:15:10.023000 CVE-2025-1843,0,0,b6acf8256986f4d81d9dc0aa341dcd2b222099446bdc75e0a94764752196a841,2025-03-03T18:15:34.290000 @@ -284143,7 +284143,7 @@ CVE-2025-20276,0,0,6cf092eb5dd2245802a5bcb9a818620f11d716e95f3b62bde7f5e467cfd48 CVE-2025-20277,0,0,917c2ecb7b6c2a75ec831ba32d70b778b24e255a063aa1b7e69bac1be259b202,2025-06-04T17:15:27.753000 CVE-2025-20278,0,0,538962a5c4cb53f34921bd48affcf8a62ba0962069837fca6da1d48d30af1fb1,2025-06-04T17:15:27.963000 CVE-2025-20279,0,0,5454c778c8e39c087bd2befd9596d767f063d8e825df4f01dbfa391f4eb686eb,2025-06-04T17:15:28.213000 -CVE-2025-20286,0,0,0649648a5f2f6b2990d14bc5035eebc05d3de4459dcb7e4420bc8d5010762b05,2025-06-04T21:15:37.940000 +CVE-2025-20286,0,1,12dd31a7bb3c1877c998d83f86a9d4cfdbfca18d891f84521b1e053cf7ca9300,2025-06-05T19:15:28.590000 CVE-2025-2029,0,0,d542afcc372a129fd7977f37fa3c5e3e2b220f9ceca1025a42b23e0691f5c316,2025-03-06T15:15:17.943000 CVE-2025-20297,0,0,fd036aef2926b86f71d7b735e8eace20d04567625f017b30a40eab31b1a018ed,2025-06-04T14:54:53.980000 CVE-2025-20298,0,0,5ef123b99aecda479eda59b2805a60f94ea649d648ececceda6a02d8cab7316c,2025-06-04T14:54:53.980000 @@ -290036,7 +290036,7 @@ CVE-2025-29121,0,0,434c82f016c57d7556d63e2eda422fcf8e77cdebbec7ff8a56364350ed336 CVE-2025-2913,0,0,05115e492e5903ee3a87f1df4d48942de0b75f3b4b0f3d949d399c048447b491,2025-05-28T20:37:16.777000 CVE-2025-29135,0,0,500947b54e2f6360bd88908c4e621c7a101c66a93881bfd5d1d8147aa620860c,2025-04-01T19:58:46.270000 CVE-2025-29137,0,0,6931ace246948745a6b3fe7c0c4f84f92cdbdc6e8e8f8a7f93a7b8720a179a1b,2025-04-01T20:37:02.110000 -CVE-2025-2914,0,0,7dea73f042650d596d2e3187700342f46fbe9d689db45320f8ba785ff1305b72,2025-03-28T18:11:40.180000 +CVE-2025-2914,0,1,80de8c8203a8c6e5ee48a61979dd7eebd126df92749f77d2c9bd8a25b7ecec40,2025-06-05T19:21:11.357000 CVE-2025-29149,0,0,2b30e3ef51abdd15292670ac51eb247a8a581b78085e4a43217ece3a22f27ca1,2025-03-27T15:26:02.940000 CVE-2025-2915,0,0,70cc8be03dfb35b9ef84c0237ac359de350c3b4b4245e9a89d1955b7eff26074,2025-04-14T14:03:21.190000 CVE-2025-29150,0,0,830ae278210dc8950b4025bdf811095dc9ceda7da749b4d24c53ea4d187bdb2f,2025-04-15T13:50:15.537000 @@ -290062,7 +290062,7 @@ CVE-2025-2922,0,0,3bc5ec8a99fcde0c1ea21d21dc7b385206ff258c0afe476cd7ac1f9396d68a CVE-2025-29223,0,0,4eb47a6a12a40c8ad4f5fe35a8959205d1c0822c1860f68755d34960cac62f9e,2025-04-01T20:21:04.690000 CVE-2025-29226,0,0,2a22bb41c1636f111fba56d4837d1f7d2c1c2827dade39d30847ae9b2258cb43,2025-04-01T20:29:05.520000 CVE-2025-29227,0,0,98c6c2a56c36a920ebfda1c9f607bc1ce8140ab24fa775ca0ea0701e2b0db727,2025-04-01T20:28:58.697000 -CVE-2025-2923,0,0,67077d94759a07d3417cf09df0c07ecdc229308d14abdd8723b2f5fbfc4732e5,2025-04-01T20:26:39.627000 +CVE-2025-2923,0,1,3fa4450a30e61b795e0eb8eb6a8c6563b4cdc6b682ae774273d6df0273ec39bb,2025-06-05T19:21:58.263000 CVE-2025-29230,0,0,a96d6f25884fce83e2e6e66d008df496713f73ab7711eea3506888e7dec9bf9e,2025-04-01T20:28:51.790000 CVE-2025-2924,0,0,035b342e4739e959d11faebc838ea9c953beab2ad201da68f4190d4779a05c84,2025-04-17T13:13:27.960000 CVE-2025-2925,0,0,6e6057af1505bd2aca9814f533b29610886f80d850b5e22863ae1d8118c6e560,2025-04-17T13:11:07.250000 @@ -292978,8 +292978,8 @@ CVE-2025-3532,0,0,a2f5d1e1aeeff6c317e31a6e6d9145846fef7ec6ec6973517901d1a73b6137 CVE-2025-3533,0,0,0517ee64c7ed259e758d3f181da415a253b558981950122d1448e5774aae3999,2025-04-15T18:39:27.967000 CVE-2025-3534,0,0,2272ee5251cae38598be241c56971c979c5200bb3e067a8d10aed0694d3aed07,2025-04-15T18:39:27.967000 CVE-2025-3535,0,0,f999a89f76aec7b751bc0506d7eea783fe36cff05bacd7f9284f3dd0ef46110d,2025-04-15T18:39:27.967000 -CVE-2025-3536,0,0,214d5e2c283f254382d7a035e1512404ac54a530b5438ffb25d0ebcd03d2c9a9,2025-04-15T18:39:27.967000 -CVE-2025-3537,0,0,c5790c039771191e787e5f3e5114b79ae1613e659749ca4490d4a00be99fafb7,2025-04-15T18:39:27.967000 +CVE-2025-3536,0,1,47374e886ed77e1f30c8dfe7ae7747514b22ea59a630aca3bcd1d366a1b4fa5c,2025-06-05T19:26:38.817000 +CVE-2025-3537,0,1,26bb00c7ac0a8ffa088dda9dd8b04e46bf9e023f71dde1831d194d6d9e1ba45b,2025-06-05T19:27:31.170000 CVE-2025-3538,0,0,be8972ee100bbce77ca472972c9e8d6b2e8810a9136a4043fbbb19bd2cda8449,2025-04-15T18:39:27.967000 CVE-2025-3539,0,0,13ffbd6325942e7997c9d670a6185b23f5b8169726331abd465f9125c41e2cac,2025-04-15T18:39:27.967000 CVE-2025-3540,0,0,f985cb3ef1ae01ebd2dd0344431149f5225f213ab49c447467ad0f6d71a72ecc,2025-04-15T18:39:27.967000 @@ -293027,7 +293027,7 @@ CVE-2025-3580,0,0,fb5209c3cd7ebcd66c15bce657f3ddb23cbe27d0c5d33814deb9407bd651e1 CVE-2025-3583,0,0,5e828bc2ad696ee8fcb9f09a10e41d54b38effce4c0c5b61566233d5e9eb1a29,2025-05-07T16:36:47.020000 CVE-2025-3584,0,0,59ca71c3ddec8b989ca250d68253dd4ed4793bd2db21f016ec9f563d6fba7dc2,2025-06-05T14:10:30.393000 CVE-2025-3585,0,0,793d014b8d4f8a0338ac5bc0543e903589c1e8b4dc1d9fc37efe0dfb6e2b3b88,2025-05-21T20:01:00.620000 -CVE-2025-3587,0,0,24a9d7f002b5d3dda78896e9b2347c9c9868aa706322ae2e0fbf5aeb34b2cb44,2025-04-15T18:39:27.967000 +CVE-2025-3587,0,1,2f8e769f77e4ee455186772bee4aa97a90bfa8ed4fc03f982022d2823b79d01c,2025-06-05T19:28:11.513000 CVE-2025-3588,0,0,da176b06433f826abfeb7533e116e8f1c0acf114fe10a330f45ab13cc6f35417,2025-04-15T18:39:27.967000 CVE-2025-3589,0,0,ec0c189c6bcc1523e6ba16f34ce102759c4f33ff83334f822a0d28647cf0ad2d,2025-04-29T20:16:58.833000 CVE-2025-3590,0,0,4a0453d8b3689d6f2e7dcbfdf29c48f9e72ed335c884f8c177d44093a3f9f857,2025-04-15T18:39:27.967000 @@ -294847,6 +294847,8 @@ CVE-2025-46251,0,0,d17dbf4e8e21c626e2d5432aff3bc0ed6b69b0ab0b53ad1b17cc7c8b8336e CVE-2025-46252,0,0,c50b6d0ac2ae9d7ce943a5ed8ef2fd6da152fdf4666412ab5a89649c7df0b743,2025-04-30T15:10:04.440000 CVE-2025-46253,0,0,b25f3cee4a5e94813fb7283f6e435befe966b21315e8df614c830de7a55808b6,2025-04-30T15:08:45.127000 CVE-2025-46254,0,0,5e703cc2f27dee605c5157342c085d9f1bee15259d5841a98b801a9b78337a6f,2025-04-30T14:59:42.390000 +CVE-2025-46257,1,1,704a1d8fabe44556c8e4d5f05b6f6bce19301f8af17e5abc52df3ec4a1a9afe1,2025-06-05T18:15:21.753000 +CVE-2025-46258,1,1,6a47e56a84225cab831d5442ffa31fc54141ca417836d65c947ded26aa61f917,2025-06-05T18:15:22.163000 CVE-2025-46260,0,0,de05a0a1a6df47faa889a46f36513cb0a0e28fdfce45e20918b1c808a2fd7912,2025-04-29T13:52:28.490000 CVE-2025-46261,0,0,f73cf724c402394b3913a420df099a6b766492bce3124de0e7d9c6a51320fc7a,2025-04-29T13:52:28.490000 CVE-2025-46262,0,0,3a9f12ab6eb5cdcf6fa62ad6d3121c10d8abb7bcf9a3b5a5fed9a42bb0613e1c,2025-05-21T20:25:16.407000 @@ -295463,7 +295465,7 @@ CVE-2025-47612,0,0,c47b42ba681a0fc372d8b3ed0a64dde5908cf096a52bafb21bff62087f151 CVE-2025-47613,0,0,c78d295eface98ad13067abd05fb456cdbee898feb32d0bc8a9c81f2cc2688c0,2025-05-23T15:54:42.643000 CVE-2025-47614,0,0,9cf4846e333b058377603c0a3e55e737741e66282da97fc5632536599de77a65,2025-05-08T14:39:09.683000 CVE-2025-47615,0,0,1a3ce5c26750d3af0dfb7e2c23f693671e6af62e6086d59fddd30b2bc63caafa,2025-05-08T14:39:09.683000 -CVE-2025-47616,0,0,a49f87bbe8e0df1c3349748a649cb8561f394823cb7774467b821f7808813f81,2025-05-08T14:39:09.683000 +CVE-2025-47616,0,1,7b22ae0d2cf6192ca88e64db9c3ca2e5255851e179fe426e313b0c0b594daea8,2025-06-05T19:15:28.853000 CVE-2025-47617,0,0,e87ad196f223568b94cdbfec08a1cc23cfe30c033180f35f4ddcc4a92dc8432d,2025-05-08T14:39:09.683000 CVE-2025-47618,0,0,a977e5bd264a0b193ead21f47dc3e088d7da52e58382b501125fe30243007f62,2025-05-23T15:54:42.643000 CVE-2025-47619,0,0,9282f7baa4e808c0745e9280e307d0be36b63133d4d2bfaeaadbe12420e873cb,2025-05-23T15:54:42.643000 @@ -295539,7 +295541,7 @@ CVE-2025-47691,0,0,2fbcaec9e7aa91338754c59feea941303c490f94047df759c01680eb3cbc3 CVE-2025-47692,0,0,c444a1a1a14d26e3caa340ba7e06ef944bc094c41e95aad797793f9895bd3464,2025-05-08T14:39:09.683000 CVE-2025-47693,0,0,e89b1a6670330d4d22f8cc221b89668c8cd5df047d9ad3b00d816d91b773e5b1,2025-05-19T13:35:50.497000 CVE-2025-47697,0,0,7017cb143ae00e39a6be41658c8a7e8e23de50ae8206815ae5f36b7139369e22,2025-06-04T19:57:39.970000 -CVE-2025-4770,0,0,2831683f289495e881491b095da878b75d549e4b63c7232b9b53981ad42c7257,2025-05-16T14:42:18.700000 +CVE-2025-4770,0,1,5f368204f0ca7aae3eb62fd6ef282ad79cf1325c5be1729c43aaaf95e2bf0dbb,2025-06-05T19:35:54.267000 CVE-2025-47701,0,0,85bb7ccaf297c9dca91c85cb3376ebab43abe419ae7564896c8e3565de9158da,2025-05-20T17:15:49.160000 CVE-2025-47702,0,0,69356e692b2460ffa941a7d3976049902a43456cf1e503712f5b2444ac03a9b8,2025-05-16T14:43:56.797000 CVE-2025-47703,0,0,bd0c128a404fc43b93902c0a4888431136875c8309ad71af5b4f81b9467b4e29,2025-05-20T17:15:49.330000 @@ -295609,7 +295611,7 @@ CVE-2025-47791,0,0,bb13ba0274d81a1986d65f7103abdff4aea9a73bf23faae8bda9c5552391f CVE-2025-47792,0,0,5db4e1b0099c338d37989cd3de0ee62c1464ff8fe0f69042bbd11e43a23f0241,2025-05-19T13:35:50.497000 CVE-2025-47793,0,0,a0dce33b5060bd7d152dca8ab7d8795e92e866ec8730dcbdb31b478b4b4a4aa6,2025-05-19T13:35:50.497000 CVE-2025-47794,0,0,fe7227e3d0226dcb896a577c64f1cd15be4a2124b27c33b886b791a4f94db856,2025-05-19T13:35:50.497000 -CVE-2025-4780,0,0,d131d931f8e20ab6766aaedd82235a82e87c6b0a7fa63ad71513e43f1b12a89e,2025-05-16T14:42:18.700000 +CVE-2025-4780,0,1,50836fef64e4f508a2f70175fce08dae54861b0690bfd6af3a0acab7a4fbf285,2025-06-05T19:36:06.897000 CVE-2025-47809,0,0,7378247eba6fac39102e733903012e4738ae1399f25f08cdedbbe88c7b8a3bad,2025-05-16T14:42:18.700000 CVE-2025-4781,0,0,9dabcc14836b43733524131bd4b7d81a20b179417e93f112f8e4e0e5eedf8fdb,2025-05-21T20:59:18.993000 CVE-2025-47814,0,0,91d01c94bb9a2d6cbf1f2ce3b51913f5401bb5d496a9da26d55db4bea09f6271,2025-05-13T15:15:59.160000 @@ -295908,7 +295910,7 @@ CVE-2025-4849,0,0,79bafc8d78c1efc632ed95ad4a130766ed5d90c45e45605773df0d46773756 CVE-2025-48490,0,0,87ecfeb6e490715223675b6987710680d7319b22f1f72e859b8289d6cc58a36f,2025-05-30T16:31:03.107000 CVE-2025-48491,0,0,192909d10acf6a2f5c7dbd7cf4a77eb5c3f60df46b3da837effcf5a7a7693800,2025-05-30T16:31:03.107000 CVE-2025-48492,0,0,403a5473251d0861ab7d826ccca3a9aee2288a4f6bf49b37e21ab18d8ee7611e,2025-06-04T19:56:47.567000 -CVE-2025-48493,1,1,033b0f2ecabbd4a5efd11dc5c0b94aedb4fdd1dec739449f2d4d37431b26608e,2025-06-05T17:15:29.377000 +CVE-2025-48493,0,0,033b0f2ecabbd4a5efd11dc5c0b94aedb4fdd1dec739449f2d4d37431b26608e,2025-06-05T17:15:29.377000 CVE-2025-48494,0,0,e00521f8a0f3a9ebe9171d0cc58187598193294c5888b4b6a1109f72d9410a03,2025-06-02T17:32:17.397000 CVE-2025-48495,0,0,fb3d4c3815acb69b7e6dd709945e299a370be57fca621c3fdcbb8bde438068e6,2025-06-02T17:32:17.397000 CVE-2025-4850,0,0,f4734de71688bb34b47f04cb41c5af0cc568cf46c9e6cb90745360a2b3c7693b,2025-05-24T00:57:35.620000 @@ -296023,7 +296025,7 @@ CVE-2025-48934,0,0,5fbbb42bd65d5a10fa3798188dfa5a3d35dfeeff75f700ed53d72fdf4fd7a CVE-2025-48935,0,0,285fbfce3a00bd7689fb5587111ddd0dc8f65774a119270b6d122b217a2f2c8f,2025-06-04T20:15:24.330000 CVE-2025-48936,0,0,466cc85edbb9de09c6e53990c33f4edba165b1227854443bbecd0e6313d71310,2025-06-04T18:31:41.773000 CVE-2025-48938,0,0,a912921d4d92c08babc86f1d87d9a3c7f64794d28789a8d268c733457eab99b1,2025-06-02T17:32:17.397000 -CVE-2025-4894,0,0,c35734ea3b9d1c2d9fc5ff2784c4ea0a6404c54d6ca085ce7efa4587f756b4da,2025-05-19T13:35:20.460000 +CVE-2025-4894,0,1,e203d4bd91eb3e3cb92f624dec258fe2ede19a69c9e41059892032f4ff18f560,2025-06-05T19:39:01.520000 CVE-2025-48940,0,0,69c8738c40ce7804d4df0abebfa7b439311ba65046421bb97675e682461cc8b0,2025-06-02T17:32:17.397000 CVE-2025-48941,0,0,27372c9a3f2bc12dcc7fb2eb69cf1151ae0278ab9c7bcb04bd6a31084f7da468,2025-06-02T17:32:17.397000 CVE-2025-48942,0,0,2a485fb562d70d0576cababddaf40f7a7eb7a022a0399a7752fb108cbdc63bd5,2025-06-02T17:32:17.397000 @@ -296061,7 +296063,7 @@ CVE-2025-49001,0,0,8dc4548fe390fc22a5faf69cde327e5fe5b96046e91fdc466cb08c1aca094 CVE-2025-49002,0,0,216cade8987f40e7e1bae00fef99c6cc70caf989f13acf7e248d90eb2faa16c6,2025-06-05T14:07:36.847000 CVE-2025-49007,0,0,d8df88ddb67d849e1e0f062e7015a01cc75e40595f763cd8d0df9b7eb17fb116,2025-06-04T23:15:21.540000 CVE-2025-49008,0,0,1a51e27e6a013c43166249fe0ee8fe5264ecf51cc772afb6e621b5cd0bc71c49,2025-06-05T14:15:32.520000 -CVE-2025-49009,1,1,97c70198aef0d40d4d31a16fb239db47907d0d4bc74a3f5c6ed4175be269a781,2025-06-05T17:15:29.570000 +CVE-2025-49009,0,0,97c70198aef0d40d4d31a16fb239db47907d0d4bc74a3f5c6ed4175be269a781,2025-06-05T17:15:29.570000 CVE-2025-4901,0,0,e27cda4f5daf0c789b44760e4e5b993aff83932164a6246a45c2b68bff562e8d,2025-05-21T13:40:20.293000 CVE-2025-4902,0,0,6a78a99defe072cc999de50623b42fd325c4fdcaf44bc58ff1a0ab5edd3f00ae,2025-05-21T13:37:47.987000 CVE-2025-4903,0,0,69886136439184589d2514a03e48b62487582f2c9800b08c9aef0c9095fac7f7,2025-05-27T16:29:52.787000 @@ -296112,8 +296114,8 @@ CVE-2025-4932,0,0,e41c8c7120f6be787f778775691442ae3f684922a5cb2fdd2af424e8de0f06 CVE-2025-4933,0,0,0fbe7adf27b85ffbb28114888a777d26eb2d318b5f12830f1886cb4f39dc30e8,2025-05-21T17:43:51.150000 CVE-2025-4934,0,0,661cbc97b2adf4ec313661a8210ecceab635f3c4c1dd76317d718414fbabce61,2025-05-28T12:45:54.230000 CVE-2025-4935,0,0,92cb90814ea6fb6d6ceddf06a94155e30e3eafd607e5ccb1da311d381c9aeaee,2025-05-28T12:29:38.047000 -CVE-2025-4936,0,0,b796de04ed72d3ddae709233c3e5d64b8529db19cc4a5257b40d1d7d2f3b7003,2025-05-21T20:25:33.823000 -CVE-2025-4937,0,0,7a5da748e88b98653597e71442ed8dabf484aeeb6d6748285bd4ad6898095dad,2025-05-21T20:25:33.823000 +CVE-2025-4936,0,1,fd9d880b7441ec1437d5f670ce3c73dd4d729c4bf41ee475585bff130ceae1f2,2025-06-05T19:39:27.940000 +CVE-2025-4937,0,1,b11676149af0c28f312982d79c8f35a9ba810703d80c77681d063c82de8ef130,2025-06-05T19:42:48.337000 CVE-2025-4938,0,0,9bfbb8aefdfbb754eacbb83a30a05c557a118de2c85e31be873a9e69bcb3eeca,2025-05-28T01:33:36.677000 CVE-2025-4939,0,0,5ec31620a920403386badd8ed8c9ad70156a6e4853cf1462dcd01754dc60b7d3,2025-05-28T01:32:20.263000 CVE-2025-4940,0,0,2476264f5ca230e398816216f503ad21bd6ee0718fc81a3cc8e1ef1268a9a775,2025-05-21T20:25:16.407000 @@ -296292,7 +296294,7 @@ CVE-2025-5210,0,0,7f798974cbc440c4e4dd8009e513c3eb9007b33b9ead67a41eab0bd81192fb CVE-2025-5211,0,0,8f4ed9a6be734738ba7e8af34dfd90276884a544fade7898e9f11540d4e9c7c6,2025-06-05T14:13:12.777000 CVE-2025-5212,0,0,09bde77c0a73fbc6c1f35bedb61d3c4c409f9d9416e30903b1d4777f1733a256,2025-06-05T14:12:55.247000 CVE-2025-5213,0,0,8262fd7ad3860a05f2599b6c82e670c892a52b241834cc36a8cbcfe508de4e0a,2025-06-05T14:12:38.577000 -CVE-2025-5214,0,1,a52b4862bb884abe1a919229c049af5540894bace11b462a27b3279b9175c70c,2025-06-05T16:00:18.113000 +CVE-2025-5214,0,0,a52b4862bb884abe1a919229c049af5540894bace11b462a27b3279b9175c70c,2025-06-05T16:00:18.113000 CVE-2025-5215,0,0,b474fef582698d1da247f3d19a45fd39f888869bffdeede119632bb605f5727f,2025-06-05T15:59:44.683000 CVE-2025-5216,0,0,055c6e0bf462827ac1da33850cd24c0034f80451f364dc70e380ec186ecf86e2,2025-06-05T15:59:14.990000 CVE-2025-5217,0,0,845e58cc2a7cf7d636f8550dca345401beab30372e211227ca46148f5ec7226e,2025-06-05T15:58:28.290000 @@ -296581,12 +296583,20 @@ CVE-2025-5661,0,0,48584c23c019a116bc867e0c6bd399859edeb270cdcee39bbbbb2266d281bc CVE-2025-5663,0,0,8e3f5d413c4aa2afa0e7546309b4c5ab94c22ccf32423975da7301a2ebc5d1f3,2025-06-05T15:15:48.467000 CVE-2025-5664,0,0,0195d66ec5053c33da77920f1e566cdf785064ad2f039ed17c4e60bf3a966013,2025-06-05T15:15:48.627000 CVE-2025-5665,0,0,bde0ca2b3d1395a5645a500bf9e3ee250cfdeeb3ad50502bfb1f34f5edaf902e,2025-06-05T15:15:48.847000 -CVE-2025-5666,1,1,a465b9fbcda06eed40215a0319871093255e2484c23d800c36ea42c3bd561e93,2025-06-05T16:15:27.470000 -CVE-2025-5667,1,1,beff78e3ff677c9a3d449fc77798121a9445d57020cc79d811b1f9400c6a259a,2025-06-05T16:15:27.683000 -CVE-2025-5668,1,1,d9c38590eaf693600e0ab8471b4b62574adb74e0256445216af5e035e09d74dd,2025-06-05T17:15:29.730000 -CVE-2025-5669,1,1,e93c6e68a8323ddaabbf5ac9e3880a32030271b5f67e34ce4666d235eba27829,2025-06-05T17:15:29.917000 -CVE-2025-5670,1,1,b4f91dafeb4138ba612234c8143412892983d95e9240fa2ffee1de7394c7ac5d,2025-06-05T17:15:30.117000 -CVE-2025-5683,0,0,ba4cab8ac4a992f679318045c0972e1d1d7a83c5101ea31565eb781d5696d00a,2025-06-05T06:15:27.517000 +CVE-2025-5666,0,0,a465b9fbcda06eed40215a0319871093255e2484c23d800c36ea42c3bd561e93,2025-06-05T16:15:27.470000 +CVE-2025-5667,0,0,beff78e3ff677c9a3d449fc77798121a9445d57020cc79d811b1f9400c6a259a,2025-06-05T16:15:27.683000 +CVE-2025-5668,0,1,76c95f9734325b6f91df631f8c0e96fe0c6f248d11d8ab5df18d8df8fd2b78e2,2025-06-05T18:15:22.447000 +CVE-2025-5669,0,1,fe384574c395d319387b4a7905aad34bfb866da090b8f7e6c2759aab4910b610,2025-06-05T18:15:22.627000 +CVE-2025-5670,0,1,bb319b3e1f78ddbb0b25287ad73b0f5017700736f61811adde00cdc7a82f46f3,2025-06-05T18:15:22.790000 +CVE-2025-5671,1,1,da7978d309ee259af0cdfac673f0b0e208f5e3d92963b8778239b679f7e58169,2025-06-05T18:15:22.947000 +CVE-2025-5672,1,1,c4ee3e1d3b4311403311feb8cad1437d8fcaf28117056653f1fcde6e003e1808,2025-06-05T18:15:23.220000 +CVE-2025-5674,1,1,324741bb7b6abb6ccbb994090b7e4e98ff38299ae39c2b78118159271f422981,2025-06-05T19:15:29.627000 +CVE-2025-5675,1,1,21722a3f896ba0469fa2aae99cfc376ed9957b422b3c81bf5e2629e6ce677760,2025-06-05T19:15:29.993000 +CVE-2025-5676,1,1,0634663974cbb998802bfba213f9b0aba85adcf56fe2d94307c17ebca513cc04,2025-06-05T19:15:30.247000 +CVE-2025-5677,1,1,fbe2b02a639304da37eda3a9eef9cd4e6d151569861ab9b7eecacb591839e4c2,2025-06-05T19:15:30.487000 +CVE-2025-5679,1,1,21b457901aeabd6b63461d46d8982b2e96b6c47559232158af772aaacd4cf937,2025-06-05T19:15:30.697000 +CVE-2025-5683,0,1,96eafcd109560d45c8a6c123e3d3545fb70ce0bc8b75045730d5be51598134e9,2025-06-05T19:15:30.890000 CVE-2025-5688,0,0,73bb641229fc7f0cc58d056bcd50b9204b2df12fec290a20f6d3344d9742580f,2025-06-04T17:15:29.330000 CVE-2025-5690,0,0,ac9502bdafeae675eb4593084c8644a2164e57d1b6a23446acd8173b20c2ef82,2025-06-04T22:15:26.470000 CVE-2025-5701,0,0,25dfd43bc0d8a99b1c1ad2c25933fffdc37face9a53fdc8c0d697535d26edf00,2025-06-05T12:15:24.233000 +CVE-2025-5702,1,1,7eb2db6bf991037e6e18e46a46e76c5c91b80b8e0ea1499a7274990d167be027,2025-06-05T19:15:31.073000