From 2590aff179c56139a16bf50c5a21ddcc0594e5ba Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 17 Jun 2025 14:05:05 +0000 Subject: [PATCH] Auto-Update: 2025-06-17T14:00:19.592875+00:00 --- CVE-2021/CVE-2021-238xx/CVE-2021-23814.json | 31 ++++-- CVE-2023/CVE-2023-498xx/CVE-2023-49837.json | 32 +++++- CVE-2023/CVE-2023-509xx/CVE-2023-50967.json | 105 +++++++++++++++++--- CVE-2024/CVE-2024-20xx/CVE-2024-2053.json | 48 +++++++-- CVE-2024/CVE-2024-20xx/CVE-2024-2054.json | 45 +++++++-- CVE-2024/CVE-2024-240xx/CVE-2024-24027.json | 34 ++++++- CVE-2024/CVE-2024-240xx/CVE-2024-24028.json | 32 +++++- CVE-2024/CVE-2024-24xx/CVE-2024-2463.json | 52 ++++++++-- CVE-2024/CVE-2024-24xx/CVE-2024-2464.json | 52 ++++++++-- CVE-2024/CVE-2024-24xx/CVE-2024-2465.json | 52 ++++++++-- CVE-2024/CVE-2024-251xx/CVE-2024-25167.json | 33 +++++- CVE-2024/CVE-2024-252xx/CVE-2024-25294.json | 51 ++++++++-- CVE-2024/CVE-2024-253xx/CVE-2024-25359.json | 31 +++++- CVE-2024/CVE-2024-263xx/CVE-2024-26307.json | 49 +++++++-- CVE-2024/CVE-2024-274xx/CVE-2024-27438.json | 43 ++++++-- CVE-2024/CVE-2024-276xx/CVE-2024-27626.json | 31 +++++- CVE-2024/CVE-2024-283xx/CVE-2024-28396.json | 42 ++++++-- CVE-2024/CVE-2024-286xx/CVE-2024-28635.json | 44 ++++++-- CVE-2024/CVE-2024-287xx/CVE-2024-28735.json | 74 +++++++++++--- CVE-2024/CVE-2024-287xx/CVE-2024-28756.json | 44 ++++++-- CVE-2024/CVE-2024-292xx/CVE-2024-29243.json | 43 +++++++- CVE-2024/CVE-2024-292xx/CVE-2024-29244.json | 43 +++++++- CVE-2024/CVE-2024-298xx/CVE-2024-29858.json | 32 +++++- CVE-2024/CVE-2024-298xx/CVE-2024-29862.json | 60 +++++++++-- CVE-2024/CVE-2024-298xx/CVE-2024-29864.json | 46 +++++++-- CVE-2024/CVE-2024-298xx/CVE-2024-29866.json | 49 +++++++-- CVE-2025/CVE-2025-27xx/CVE-2025-2784.json | 6 +- CVE-2025/CVE-2025-320xx/CVE-2025-32049.json | 6 +- CVE-2025/CVE-2025-329xx/CVE-2025-32906.json | 6 +- CVE-2025/CVE-2025-329xx/CVE-2025-32911.json | 6 +- CVE-2025/CVE-2025-329xx/CVE-2025-32913.json | 6 +- CVE-2025/CVE-2025-329xx/CVE-2025-32914.json | 6 +- CVE-2025/CVE-2025-38xx/CVE-2025-3880.json | 68 +++++++++++++ CVE-2025/CVE-2025-43xx/CVE-2025-4365.json | 78 +++++++++++++++ CVE-2025/CVE-2025-49xx/CVE-2025-4948.json | 6 +- CVE-2025/CVE-2025-52xx/CVE-2025-5291.json | 80 +++++++++++++++ CVE-2025/CVE-2025-53xx/CVE-2025-5349.json | 78 +++++++++++++++ CVE-2025/CVE-2025-57xx/CVE-2025-5700.json | 72 ++++++++++++++ CVE-2025/CVE-2025-57xx/CVE-2025-5777.json | 78 +++++++++++++++ CVE-2025/CVE-2025-60xx/CVE-2025-6020.json | 60 +++++++++++ README.md | 47 +++++++-- _state.csv | 83 +++++++++------- 42 files changed, 1669 insertions(+), 215 deletions(-) create mode 100644 CVE-2025/CVE-2025-38xx/CVE-2025-3880.json create mode 100644 CVE-2025/CVE-2025-43xx/CVE-2025-4365.json create mode 100644 CVE-2025/CVE-2025-52xx/CVE-2025-5291.json create mode 100644 CVE-2025/CVE-2025-53xx/CVE-2025-5349.json create mode 100644 CVE-2025/CVE-2025-57xx/CVE-2025-5700.json create mode 100644 CVE-2025/CVE-2025-57xx/CVE-2025-5777.json create mode 100644 CVE-2025/CVE-2025-60xx/CVE-2025-6020.json diff --git a/CVE-2021/CVE-2021-238xx/CVE-2021-23814.json b/CVE-2021/CVE-2021-238xx/CVE-2021-23814.json index f078408c0ba..d91694c6b99 100644 --- a/CVE-2021/CVE-2021-238xx/CVE-2021-23814.json +++ b/CVE-2021/CVE-2021-238xx/CVE-2021-23814.json @@ -2,13 +2,13 @@ "id": "CVE-2021-23814", "sourceIdentifier": "report@snyk.io", "published": "2021-12-17T20:15:08.340", - "lastModified": "2024-11-21T05:51:53.883", + "lastModified": "2025-06-17T12:15:20.773", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "This affects the package unisharp/laravel-filemanager from 0.0.0. The upload() function does not sufficiently validate the file type when uploading. An attacker may be able to reproduce the following steps: - Install a package with a web Laravel application. - Navigate to the Upload window - Upload an image file, then capture the request - Edit the request contents with a malicious file (webshell) - Enter the path of file uploaded on URL - Remote Code Execution **Note: Prevention for bad extensions can be done by using a whitelist in the config file(lfm.php). Corresponding document can be found in the [here](https://unisharp.github.io/laravel-filemanager/configfolder-categories)." + "value": "This affects versions of the package unisharp/laravel-filemanager before 2.6.2. The upload() function does not sufficiently validate the file type when uploading.\r\rAn attacker may be able to reproduce the following steps:\r\r1. Install a package with a web Laravel application.\r2. Navigate to the Upload window\r3. Upload an image file, then capture the request\r4. Edit the request contents with a malicious file (webshell)\r5. Enter the path of file uploaded on URL - Remote Code Execution\r\r\r**Note:** Prevention for bad extensions can be done by using a whitelist in the config file(lfm.php). Corresponding document can be found in [here](https://unisharp.github.io/laravel-filemanager/configfolder-categories)." }, { "lang": "es", @@ -85,6 +85,16 @@ ] }, "weaknesses": [ + { + "source": "report@snyk.io", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + }, { "source": "nvd@nist.gov", "type": "Primary", @@ -124,15 +134,20 @@ ] }, { - "url": "https://github.com/UniSharp/laravel-filemanager/issues/1113#issuecomment-1812092975", + "url": "https://github.com/UniSharp/laravel-filemanager/issues/1113", "source": "report@snyk.io" }, { - "url": "https://snyk.io/vuln/SNYK-PHP-UNISHARPLARAVELFILEMANAGER-1567199", - "source": "report@snyk.io", - "tags": [ - "Third Party Advisory" - ] + "url": "https://github.com/UniSharp/laravel-filemanager/releases/tag/v2.5.1", + "source": "report@snyk.io" + }, + { + "url": "https://github.com/UniSharp/laravel-filemanager/releases/tag/v2.6.2", + "source": "report@snyk.io" + }, + { + "url": "https://security.snyk.io/vuln/SNYK-PHP-UNISHARPLARAVELFILEMANAGER-1567199", + "source": "report@snyk.io" }, { "url": "https://github.com/UniSharp/laravel-filemanager/blob/master/src/Controllers/UploadController.php%23L26", diff --git a/CVE-2023/CVE-2023-498xx/CVE-2023-49837.json b/CVE-2023/CVE-2023-498xx/CVE-2023-49837.json index 89168560559..47d6b2efa50 100644 --- a/CVE-2023/CVE-2023-498xx/CVE-2023-49837.json +++ b/CVE-2023/CVE-2023-498xx/CVE-2023-49837.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49837", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-21T17:15:07.917", - "lastModified": "2025-03-13T19:15:40.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-17T13:48:25.623", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:davidartiss:code_embed:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.3.6", + "matchCriteriaId": "AB012B5D-EDB3-4B25-A318-57445F4305A4" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/simple-embed-code/wordpress-embed-code-plugin-2-3-6-denial-of-service-attack-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/simple-embed-code/wordpress-embed-code-plugin-2-3-6-denial-of-service-attack-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-509xx/CVE-2023-50967.json b/CVE-2023/CVE-2023-509xx/CVE-2023-50967.json index 1e68396ea2f..7120327dd9f 100644 --- a/CVE-2023/CVE-2023-509xx/CVE-2023-50967.json +++ b/CVE-2023/CVE-2023-509xx/CVE-2023-50967.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50967", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-20T16:15:07.570", - "lastModified": "2024-11-21T08:37:37.800", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-17T13:12:08.180", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,46 +51,127 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:latchset:jose:*:*:*:*:*:*:*:*", + "versionEndIncluding": "11", + "matchCriteriaId": "3D916227-5ADB-41B4-9756-556F0BEA1261" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", + "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/P3ngu1nW/CVE_Request/blob/main/latch-jose.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/latchset/jose", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CIFPQUCLNWEAHYYJWCQD3AZPWYIV6YT3/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OOBFVMOAV732C7PY74AHJ62ZNKT3ISZ6/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W7EGLOAFN2PWZ75ZRLTUDUZCIPH2VFZU/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://github.com/P3ngu1nW/CVE_Request/blob/main/latch-jose.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/latchset/jose", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CIFPQUCLNWEAHYYJWCQD3AZPWYIV6YT3/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OOBFVMOAV732C7PY74AHJ62ZNKT3ISZ6/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W7EGLOAFN2PWZ75ZRLTUDUZCIPH2VFZU/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2053.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2053.json index 8c0a506ba48..f4b39d4eb6d 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2053.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2053.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2053", "sourceIdentifier": "cve@takeonme.org", "published": "2024-03-21T02:52:27.250", - "lastModified": "2025-02-13T18:17:51.650", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-17T13:57:02.687", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,58 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:articatech:artica_proxy:4.40:*:*:*:*:*:*:*", + "matchCriteriaId": "000E5464-245A-4D10-B234-E0C03086BA83" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:articatech:artica_proxy:4.50:*:*:*:*:*:*:*", + "matchCriteriaId": "9410856F-BEDE-43BD-BDA7-EE17A040CAFD" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Mar/11", - "source": "cve@takeonme.org" + "source": "cve@takeonme.org", + "tags": [ + "Exploit", + "Mailing List" + ] }, { "url": "https://korelogic.com/Resources/Advisories/KL-001-2024-001.txt", - "source": "cve@takeonme.org" + "source": "cve@takeonme.org", + "tags": [ + "Exploit" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/11", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List" + ] }, { "url": "https://korelogic.com/Resources/Advisories/KL-001-2024-001.txt", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2054.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2054.json index 665d55e3507..d3bd4718859 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2054.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2054.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2054", "sourceIdentifier": "cve@takeonme.org", "published": "2024-03-21T02:52:27.320", - "lastModified": "2024-11-21T09:08:56.363", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-17T13:56:40.113", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:articatech:artica_proxy:4.50:*:*:*:*:*:*:*", + "matchCriteriaId": "9410856F-BEDE-43BD-BDA7-EE17A040CAFD" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Mar/12", - "source": "cve@takeonme.org" + "source": "cve@takeonme.org", + "tags": [ + "Exploit", + "Mailing List" + ] }, { "url": "https://korelogic.com/Resources/Advisories/KL-001-2024-002.txt", - "source": "cve@takeonme.org" + "source": "cve@takeonme.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/12", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List" + ] }, { "url": "https://korelogic.com/Resources/Advisories/KL-001-2024-002.txt", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-240xx/CVE-2024-24027.json b/CVE-2024/CVE-2024-240xx/CVE-2024-24027.json index 227fde70b5f..67af17b540e 100644 --- a/CVE-2024/CVE-2024-240xx/CVE-2024-24027.json +++ b/CVE-2024/CVE-2024-240xx/CVE-2024-24027.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24027", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-27T21:15:47.180", - "lastModified": "2024-11-21T08:58:51.147", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-17T13:47:56.350", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:likeshop:likeshop:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.5.7", + "matchCriteriaId": "C1B6293A-3888-4311-B063-74239FB8604D" + } + ] + } + ] + } + ], "references": [ { "url": "https://samyueru.substack.com/p/cve-2024-24027-sql-injection-trong-likeshop", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://samyueru.substack.com/p/cve-2024-24027-sql-injection-trong-likeshop", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-240xx/CVE-2024-24028.json b/CVE-2024/CVE-2024-240xx/CVE-2024-24028.json index 06b348bf709..09ec2a731c9 100644 --- a/CVE-2024/CVE-2024-240xx/CVE-2024-24028.json +++ b/CVE-2024/CVE-2024-240xx/CVE-2024-24028.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24028", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-21T02:52:09.833", - "lastModified": "2024-11-21T08:58:51.363", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-17T13:02:50.173", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:likeshop:likeshop:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.5.7", + "matchCriteriaId": "C1B6293A-3888-4311-B063-74239FB8604D" + } + ] + } + ] + } + ], "references": [ { "url": "https://thanhlo.substack.com/p/khai-thac-lo-hong-cve-2024-24028", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://thanhlo.substack.com/p/khai-thac-lo-hong-cve-2024-24028", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2463.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2463.json index 2f1a71c9810..6c7ddf02f6f 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2463.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2463.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2463", "sourceIdentifier": "cvd@cert.pl", "published": "2024-03-21T15:16:54.417", - "lastModified": "2024-11-21T09:09:48.253", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-17T13:49:07.733", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,30 +51,66 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cdex:cdex:*:*:*:*:*:*:*:*", + "versionEndIncluding": "5.71", + "matchCriteriaId": "B0727A25-ACE5-4E39-A68F-84974E7CE0BA" + } + ] + } + ] + } + ], "references": [ { "url": "https://cdex.cloud/", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Product" + ] }, { "url": "https://cert.pl/en/posts/2024/03/CVE-2024-2463/", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://cert.pl/posts/2024/03/CVE-2024-2463/", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://cdex.cloud/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://cert.pl/en/posts/2024/03/CVE-2024-2463/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://cert.pl/posts/2024/03/CVE-2024-2463/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2464.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2464.json index a0495a85eb2..8fdee48c813 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2464.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2464.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2464", "sourceIdentifier": "cvd@cert.pl", "published": "2024-03-21T15:16:54.490", - "lastModified": "2024-11-21T09:09:48.460", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-17T13:49:01.800", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,30 +51,66 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cdex:cdex:*:*:*:*:*:*:*:*", + "versionEndIncluding": "5.71", + "matchCriteriaId": "B0727A25-ACE5-4E39-A68F-84974E7CE0BA" + } + ] + } + ] + } + ], "references": [ { "url": "https://cdex.cloud/", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Product" + ] }, { "url": "https://cert.pl/en/posts/2024/03/CVE-2024-2463/", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://cert.pl/posts/2024/03/CVE-2024-2463/", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://cdex.cloud/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://cert.pl/en/posts/2024/03/CVE-2024-2463/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://cert.pl/posts/2024/03/CVE-2024-2463/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2465.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2465.json index fffd25e40fb..cc08bf37f2c 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2465.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2465.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2465", "sourceIdentifier": "cvd@cert.pl", "published": "2024-03-21T15:16:54.553", - "lastModified": "2024-11-21T09:09:48.647", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-17T13:48:43.217", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,30 +51,66 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cdex:cdex:*:*:*:*:*:*:*:*", + "versionEndIncluding": "5.71", + "matchCriteriaId": "B0727A25-ACE5-4E39-A68F-84974E7CE0BA" + } + ] + } + ] + } + ], "references": [ { "url": "https://cdex.cloud/", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Product" + ] }, { "url": "https://cert.pl/en/posts/2024/03/CVE-2024-2463/", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://cert.pl/posts/2024/03/CVE-2024-2463/", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://cdex.cloud/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://cert.pl/en/posts/2024/03/CVE-2024-2463/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://cert.pl/posts/2024/03/CVE-2024-2463/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25167.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25167.json index ab3bd47f7ba..713862d2e15 100644 --- a/CVE-2024/CVE-2024-251xx/CVE-2024-25167.json +++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25167.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25167", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-21T02:52:13.570", - "lastModified": "2024-11-21T09:00:23.153", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-17T13:57:38.600", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:markerhub:eblog:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "896253C3-0B04-4D4B-883E-10AC6F3F0D5B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/biantaibao/eblog_xss/blob/main/report.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/biantaibao/eblog_xss/blob/main/report.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-252xx/CVE-2024-25294.json b/CVE-2024/CVE-2024-252xx/CVE-2024-25294.json index b0492d5f0b1..a3909b8a819 100644 --- a/CVE-2024/CVE-2024-252xx/CVE-2024-25294.json +++ b/CVE-2024/CVE-2024-252xx/CVE-2024-25294.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25294", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-20T21:15:30.877", - "lastModified": "2024-11-21T09:00:35.037", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-17T13:09:19.133", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,30 +51,65 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:getrebuild:rebuild:3.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "987AF568-0211-4AA8-B304-83D160717412" + } + ] + } + ] + } + ], "references": [ { "url": "http://rebuild.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Not Applicable" + ] }, { "url": "https://deeply-capri-1c8.notion.site/REBUILD-V3-5-2023-12-11-SSRF-30324be04e00477eae472bf75f4f5e0d", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://github.com/getrebuild/rebuild/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "http://rebuild.com", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] }, { "url": "https://deeply-capri-1c8.notion.site/REBUILD-V3-5-2023-12-11-SSRF-30324be04e00477eae472bf75f4f5e0d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://github.com/getrebuild/rebuild/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-253xx/CVE-2024-25359.json b/CVE-2024/CVE-2024-253xx/CVE-2024-25359.json index ebec41d3a39..53a624fbced 100644 --- a/CVE-2024/CVE-2024-253xx/CVE-2024-25359.json +++ b/CVE-2024/CVE-2024-253xx/CVE-2024-25359.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25359", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-21T02:52:14.107", - "lastModified": "2024-11-21T09:00:40.657", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-17T13:57:18.833", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zuoxingdong:lagom:0.1.2:*:*:*:*:*:*:*", + "matchCriteriaId": "9CDC7F79-DC53-4973-B53C-4E1A7C479500" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/bayuncao/vul-cve-10", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://github.com/bayuncao/vul-cve-10", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-263xx/CVE-2024-26307.json b/CVE-2024/CVE-2024-263xx/CVE-2024-26307.json index 5a7e52d819f..f8238fcf098 100644 --- a/CVE-2024/CVE-2024-263xx/CVE-2024-26307.json +++ b/CVE-2024/CVE-2024-263xx/CVE-2024-26307.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26307", "sourceIdentifier": "security@apache.org", "published": "2024-03-21T10:15:07.527", - "lastModified": "2025-02-13T18:17:19.070", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-17T13:50:12.777", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,59 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:doris:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.2.8", + "matchCriteriaId": "5B75564F-3C9C-452E-BD4C-6A9C706EE8B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:doris:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.0.0", + "versionEndExcluding": "2.0.4", + "matchCriteriaId": "A7296FBE-665A-464B-8A52-5ED73CEA5D6A" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/03/21/2", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread/5shhw8x8m271hd2wfwzqzwgf36pmc4pl", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/03/21/2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread/5shhw8x8m271hd2wfwzqzwgf36pmc4pl", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-274xx/CVE-2024-27438.json b/CVE-2024/CVE-2024-274xx/CVE-2024-27438.json index 517ccd4e977..04dfa4b75af 100644 --- a/CVE-2024/CVE-2024-274xx/CVE-2024-27438.json +++ b/CVE-2024/CVE-2024-274xx/CVE-2024-27438.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27438", "sourceIdentifier": "security@apache.org", "published": "2024-03-21T10:15:08.370", - "lastModified": "2025-02-13T18:17:31.937", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-17T13:50:01.197", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:doris:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.2.0", + "versionEndExcluding": "2.0.5", + "matchCriteriaId": "6419B595-3483-47F6-8040-AB8A792253D8" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/03/21/1", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread/h95h82b0svlnwcg6c2xq4b08j6gwgczh", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mitigation" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/03/21/1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread/h95h82b0svlnwcg6c2xq4b08j6gwgczh", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mitigation" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-276xx/CVE-2024-27626.json b/CVE-2024/CVE-2024-276xx/CVE-2024-27626.json index 3a6d5e2b568..93ab36412c1 100644 --- a/CVE-2024/CVE-2024-276xx/CVE-2024-27626.json +++ b/CVE-2024/CVE-2024-276xx/CVE-2024-27626.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27626", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-21T02:52:20.203", - "lastModified": "2024-11-21T09:04:49.480", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-17T13:57:09.253", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dotclear:dotclear:2.29:*:*:*:*:*:*:*", + "matchCriteriaId": "E604EAF6-9764-4ECC-8F3B-B981F9D07420" + } + ] + } + ] + } + ], "references": [ { "url": "https://packetstormsecurity.com/files/177239/Dotclear-2.29-Cross-Site-Scripting.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://packetstormsecurity.com/files/177239/Dotclear-2.29-Cross-Site-Scripting.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-283xx/CVE-2024-28396.json b/CVE-2024/CVE-2024-283xx/CVE-2024-28396.json index 60714ddb5c3..9ee2b47914c 100644 --- a/CVE-2024/CVE-2024-283xx/CVE-2024-28396.json +++ b/CVE-2024/CVE-2024-283xx/CVE-2024-28396.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28396", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-20T14:15:08.650", - "lastModified": "2024-11-21T09:06:16.637", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-17T13:39:34.750", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:myprestamodules:orders_\\(csv\\,_excel\\)_export_pro:*:*:*:*:*:prestashop:*:*", + "versionEndIncluding": "6.0.2", + "matchCriteriaId": "7FFB7DF1-FF47-4925-89B5-DC25A12A6727" + } + ] + } + ] + } + ], "references": [ { "url": "https://addons.prestashop.com/en/data-import-export/17596-orders-csv-excel-export-pro.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://security.friendsofpresta.org/modules/2024/03/14/ordersexport.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://addons.prestashop.com/en/data-import-export/17596-orders-csv-excel-export-pro.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://security.friendsofpresta.org/modules/2024/03/14/ordersexport.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-286xx/CVE-2024-28635.json b/CVE-2024/CVE-2024-286xx/CVE-2024-28635.json index 0d13018f2c9..6a404110e54 100644 --- a/CVE-2024/CVE-2024-286xx/CVE-2024-28635.json +++ b/CVE-2024/CVE-2024-286xx/CVE-2024-28635.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28635", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-21T04:15:09.373", - "lastModified": "2024-11-21T09:06:42.367", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-17T13:52:08.900", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -51,22 +51,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devsoftbaltic:survey_creator:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.9.132", + "matchCriteriaId": "B6EE4799-49CB-41F4-B29C-3D6475B99F74" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/surveyjs/survey-creator/issues/5285", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://packetstormsecurity.com/2403-exploits/surveyjssurveycreator19132-xss.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://github.com/surveyjs/survey-creator/issues/5285", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://packetstormsecurity.com/2403-exploits/surveyjssurveycreator19132-xss.txt", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28735.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28735.json index b77c4110ee0..970e5cbecc2 100644 --- a/CVE-2024/CVE-2024-287xx/CVE-2024-28735.json +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28735.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28735", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-20T15:15:07.920", - "lastModified": "2024-11-21T09:06:51.010", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-17T13:25:30.400", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,46 +51,96 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:unit4:financials_by_coda:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2023q4", + "matchCriteriaId": "3B7F43B0-CCAE-41A3-A07F-A29AC20F11FC" + } + ] + } + ] + } + ], "references": [ { "url": "http://financials.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://unit4.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://packetstormsecurity.com/files/177620/Financials-By-Coda-Authorization-Bypass.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.unit4.com/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://www.unit4.com/products/financial-management-software", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "http://financials.com", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "http://unit4.com", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://packetstormsecurity.com/files/177620/Financials-By-Coda-Authorization-Bypass.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.unit4.com/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.unit4.com/products/financial-management-software", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28756.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28756.json index a9770c38ea0..d514267d34b 100644 --- a/CVE-2024/CVE-2024-287xx/CVE-2024-28756.json +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28756.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28756", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-21T21:15:10.550", - "lastModified": "2024-11-21T09:06:54.270", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-17T13:47:54.133", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:solaredge:mysolaredge:*:*:*:*:*:android:*:*", + "versionEndExcluding": "2.20.1", + "matchCriteriaId": "8F5024CB-BAF8-4D5D-8BC3-EB5A015DAD74" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.solaredge.com/coordinated-vulnerability-disclosure-policy/advisories/sedg-2024-1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-012.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.solaredge.com/coordinated-vulnerability-disclosure-policy/advisories/sedg-2024-1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-012.txt", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-292xx/CVE-2024-29243.json b/CVE-2024/CVE-2024-292xx/CVE-2024-29243.json index 0a9649f0929..f0c23cfa3e6 100644 --- a/CVE-2024/CVE-2024-292xx/CVE-2024-29243.json +++ b/CVE-2024/CVE-2024-292xx/CVE-2024-29243.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29243", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-21T15:16:54.320", - "lastModified": "2024-11-21T09:07:53.150", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-17T13:49:27.260", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,49 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:szlbt:lbt-t300-mini1_firmware:1.2.9:*:*:*:*:*:*:*", + "matchCriteriaId": "C9B2C022-ABD1-4D0E-B76C-760BDC74D3BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:szlbt:lbt-t300-mini1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3C64B18E-C663-4633-86DC-C00B1C7AE920" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/AdamRitz/lbtvul/blob/main/t300mini-2.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/AdamRitz/lbtvul/blob/main/t300mini-2.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-292xx/CVE-2024-29244.json b/CVE-2024/CVE-2024-292xx/CVE-2024-29244.json index 791d6a5267d..27efa9c47b2 100644 --- a/CVE-2024/CVE-2024-292xx/CVE-2024-29244.json +++ b/CVE-2024/CVE-2024-292xx/CVE-2024-29244.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29244", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-21T15:16:54.377", - "lastModified": "2024-11-21T09:07:53.363", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-17T13:49:18.597", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,49 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:szlbt:lbt-t300-mini1_firmware:1.2.9:*:*:*:*:*:*:*", + "matchCriteriaId": "C9B2C022-ABD1-4D0E-B76C-760BDC74D3BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:szlbt:lbt-t300-mini1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3C64B18E-C663-4633-86DC-C00B1C7AE920" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/AdamRitz/lbtvul/blob/main/t300mini-2.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/AdamRitz/lbtvul/blob/main/t300mini-2.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29858.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29858.json index 1f6584d0cf2..c801942f2dd 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29858.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29858.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29858", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-21T04:15:09.420", - "lastModified": "2024-11-21T09:08:28.933", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-17T13:51:32.070", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:misp:misp:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.4.187", + "matchCriteriaId": "B3E7434F-6553-43E7-A5AA-431EC6D41F3A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/MISP/MISP/commit/6a2986be6aad6b37858b4869e238f517b295c111", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/MISP/MISP/commit/6a2986be6aad6b37858b4869e238f517b295c111", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29862.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29862.json index e9e06ac62c0..ed97a0ddf12 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29862.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29862.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29862", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-21T04:15:09.510", - "lastModified": "2024-11-21T09:08:29.393", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-17T13:51:00.100", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,70 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:chirpstack:gateway_bridge:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.0.11", + "matchCriteriaId": "72620406-25E5-42D2-8F8E-BE07AB728DBC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:chirpstack:mqtt_forwarder:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.2.1", + "matchCriteriaId": "C39273DC-8121-4F67-A025-7A77866FEA5B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/chirpstack/chirpstack-gateway-bridge/commit/0c1e80c9fa9f5d093ff62903caedad86ec4640b6", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/chirpstack/chirpstack-mqtt-forwarder/commit/4fa9e6eaaec8c3ca49ebfbf6317572671f17700f", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/chirpstack/chirpstack-gateway-bridge/commit/0c1e80c9fa9f5d093ff62903caedad86ec4640b6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/chirpstack/chirpstack-mqtt-forwarder/commit/4fa9e6eaaec8c3ca49ebfbf6317572671f17700f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29864.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29864.json index edd59825c06..1a248177a8f 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29864.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29864.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29864", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-21T04:15:09.557", - "lastModified": "2024-11-21T09:08:29.820", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-17T13:50:35.700", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,56 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:89luca89:distrobox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.7.0.1", + "matchCriteriaId": "5045CF2A-85BF-4D12-A830-5DE67841F697" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/89luca89/distrobox/commit/82a69f0a234e73e447d0ea8c8b3443b84fd31944", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/89luca89/distrobox/issues/1275", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch" + ] }, { "url": "https://github.com/89luca89/distrobox/commit/82a69f0a234e73e447d0ea8c8b3443b84fd31944", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/89luca89/distrobox/issues/1275", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29866.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29866.json index 5a804847135..bc857608e4a 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29866.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29866.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29866", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-21T14:15:07.810", - "lastModified": "2024-11-21T09:08:30.190", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-17T13:49:42.563", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,59 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:datalust:seq:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2023.4.11151", + "matchCriteriaId": "C6A6B5ED-460C-43C3-9E65-4C84037D02A7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:datalust:seq:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2024", + "versionEndExcluding": "2024.1.11146", + "matchCriteriaId": "D3FED8FB-2EF8-4155-BD69-8A8033CC776F" + } + ] + } + ] + } + ], "references": [ { "url": "https://datalust.co", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/datalust/seq-tickets/issues/2127", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://datalust.co", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://github.com/datalust/seq-tickets/issues/2127", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-27xx/CVE-2025-2784.json b/CVE-2025/CVE-2025-27xx/CVE-2025-2784.json index 4384fb4f793..74bd352a45e 100644 --- a/CVE-2025/CVE-2025-27xx/CVE-2025-2784.json +++ b/CVE-2025/CVE-2025-27xx/CVE-2025-2784.json @@ -2,7 +2,7 @@ "id": "CVE-2025-2784", "sourceIdentifier": "secalert@redhat.com", "published": "2025-04-03T03:15:18.113", - "lastModified": "2025-06-09T10:15:22.457", + "lastModified": "2025-06-17T12:15:22.167", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -92,6 +92,10 @@ "url": "https://access.redhat.com/errata/RHSA-2025:8663", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:9179", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2025-2784", "source": "secalert@redhat.com" diff --git a/CVE-2025/CVE-2025-320xx/CVE-2025-32049.json b/CVE-2025/CVE-2025-320xx/CVE-2025-32049.json index db69d766916..82712c611d6 100644 --- a/CVE-2025/CVE-2025-320xx/CVE-2025-32049.json +++ b/CVE-2025/CVE-2025-320xx/CVE-2025-32049.json @@ -2,7 +2,7 @@ "id": "CVE-2025-32049", "sourceIdentifier": "secalert@redhat.com", "published": "2025-04-03T14:15:43.410", - "lastModified": "2025-06-09T10:15:24.673", + "lastModified": "2025-06-17T12:15:24.733", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -92,6 +92,10 @@ "url": "https://access.redhat.com/errata/RHSA-2025:8663", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:9179", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2025-32049", "source": "secalert@redhat.com" diff --git a/CVE-2025/CVE-2025-329xx/CVE-2025-32906.json b/CVE-2025/CVE-2025-329xx/CVE-2025-32906.json index e8fbf9a0dd1..a832a6e3f53 100644 --- a/CVE-2025/CVE-2025-329xx/CVE-2025-32906.json +++ b/CVE-2025/CVE-2025-329xx/CVE-2025-32906.json @@ -2,7 +2,7 @@ "id": "CVE-2025-32906", "sourceIdentifier": "secalert@redhat.com", "published": "2025-04-14T14:15:24.433", - "lastModified": "2025-05-29T07:15:24.167", + "lastModified": "2025-06-17T12:15:24.950", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -96,6 +96,10 @@ "url": "https://access.redhat.com/errata/RHSA-2025:8292", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:9179", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2025-32906", "source": "secalert@redhat.com" diff --git a/CVE-2025/CVE-2025-329xx/CVE-2025-32911.json b/CVE-2025/CVE-2025-329xx/CVE-2025-32911.json index 7e5c4978331..d5e53bc9025 100644 --- a/CVE-2025/CVE-2025-329xx/CVE-2025-32911.json +++ b/CVE-2025/CVE-2025-329xx/CVE-2025-32911.json @@ -2,7 +2,7 @@ "id": "CVE-2025-32911", "sourceIdentifier": "secalert@redhat.com", "published": "2025-04-15T16:16:06.567", - "lastModified": "2025-05-29T07:15:24.783", + "lastModified": "2025-06-17T12:15:25.213", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -92,6 +92,10 @@ "url": "https://access.redhat.com/errata/RHSA-2025:8292", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:9179", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2025-32911", "source": "secalert@redhat.com" diff --git a/CVE-2025/CVE-2025-329xx/CVE-2025-32913.json b/CVE-2025/CVE-2025-329xx/CVE-2025-32913.json index b4c33c22012..f99c2a7c41c 100644 --- a/CVE-2025/CVE-2025-329xx/CVE-2025-32913.json +++ b/CVE-2025/CVE-2025-329xx/CVE-2025-32913.json @@ -2,7 +2,7 @@ "id": "CVE-2025-32913", "sourceIdentifier": "secalert@redhat.com", "published": "2025-04-14T14:15:24.860", - "lastModified": "2025-05-29T07:15:24.957", + "lastModified": "2025-06-17T12:15:25.447", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -92,6 +92,10 @@ "url": "https://access.redhat.com/errata/RHSA-2025:8292", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:9179", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2025-32913", "source": "secalert@redhat.com" diff --git a/CVE-2025/CVE-2025-329xx/CVE-2025-32914.json b/CVE-2025/CVE-2025-329xx/CVE-2025-32914.json index f022b8e6d44..cf50ee2b783 100644 --- a/CVE-2025/CVE-2025-329xx/CVE-2025-32914.json +++ b/CVE-2025/CVE-2025-329xx/CVE-2025-32914.json @@ -2,7 +2,7 @@ "id": "CVE-2025-32914", "sourceIdentifier": "secalert@redhat.com", "published": "2025-04-14T15:15:25.633", - "lastModified": "2025-06-09T10:15:24.927", + "lastModified": "2025-06-17T12:15:25.657", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -92,6 +92,10 @@ "url": "https://access.redhat.com/errata/RHSA-2025:8663", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:9179", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2025-32914", "source": "secalert@redhat.com" diff --git a/CVE-2025/CVE-2025-38xx/CVE-2025-3880.json b/CVE-2025/CVE-2025-38xx/CVE-2025-3880.json new file mode 100644 index 00000000000..3a50668bd68 --- /dev/null +++ b/CVE-2025/CVE-2025-38xx/CVE-2025-3880.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2025-3880", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-06-17T12:15:25.870", + "lastModified": "2025-06-17T12:15:25.870", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Poll, Survey & Quiz Maker Plugin by Opinion Stage plugin for WordPress is vulnerable to unauthorized modification of data due to a misconfigured capability check on several functions in all versions up to, and including, 19.9.0. This makes it possible for authenticated attackers, with Contributor-level access and above, to change the email address for the account connection, and disconnect the plugin. Previously created content will still be displayed and functional if the account is disconnected." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/social-polls-by-opinionstage/trunk/plugin.php", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/social-polls-by-opinionstage/trunk/src/Modules/Admin.php", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3310848/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ba86268a-7bd6-40ed-9af6-29409245675d?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-43xx/CVE-2025-4365.json b/CVE-2025/CVE-2025-43xx/CVE-2025-4365.json new file mode 100644 index 00000000000..ba1c2b5bd68 --- /dev/null +++ b/CVE-2025/CVE-2025-43xx/CVE-2025-4365.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-4365", + "sourceIdentifier": "secure@citrix.com", + "published": "2025-06-17T13:15:20.690", + "lastModified": "2025-06-17T13:15:20.690", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Arbitrary file read in\u00a0NetScaler Console and NetScaler SDX (SVM)" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@citrix.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "secure@citrix.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1284" + } + ] + } + ], + "references": [ + { + "url": "https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694729", + "source": "secure@citrix.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-49xx/CVE-2025-4948.json b/CVE-2025/CVE-2025-49xx/CVE-2025-4948.json index 98308c2a4b0..c49493d987e 100644 --- a/CVE-2025/CVE-2025-49xx/CVE-2025-4948.json +++ b/CVE-2025/CVE-2025-49xx/CVE-2025-4948.json @@ -2,7 +2,7 @@ "id": "CVE-2025-4948", "sourceIdentifier": "secalert@redhat.com", "published": "2025-05-19T16:15:36.790", - "lastModified": "2025-06-09T10:15:25.730", + "lastModified": "2025-06-17T12:15:27.520", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -92,6 +92,10 @@ "url": "https://access.redhat.com/errata/RHSA-2025:8663", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:9179", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2025-4948", "source": "secalert@redhat.com" diff --git a/CVE-2025/CVE-2025-52xx/CVE-2025-5291.json b/CVE-2025/CVE-2025-52xx/CVE-2025-5291.json new file mode 100644 index 00000000000..f0b4cf39646 --- /dev/null +++ b/CVE-2025/CVE-2025-52xx/CVE-2025-5291.json @@ -0,0 +1,80 @@ +{ + "id": "CVE-2025-5291", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-06-17T12:15:27.747", + "lastModified": "2025-06-17T12:15:27.747", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Master Slider \u2013 Responsive Touch Slider plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's masterslider_pb and ms_slide shortcodes in all versions up to, and including, 3.10.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/master-slider/tags/3.10.8/includes/msp-shortcodes.php#L28", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/master-slider/tags/3.10.8/includes/msp-shortcodes.php#L633", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/master-slider/tags/3.10.8/includes/msp-shortcodes.php#L763", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/master-slider/tags/3.10.8/includes/msp-shortcodes.php#L783", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3309620/", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/master-slider/#description", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ce37fbd2-8d41-4feb-adf6-7ca0ca54e27a?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5349.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5349.json new file mode 100644 index 00000000000..e039c189e12 --- /dev/null +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5349.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-5349", + "sourceIdentifier": "secure@citrix.com", + "published": "2025-06-17T13:15:21.377", + "lastModified": "2025-06-17T13:15:21.377", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper access control on the NetScaler Management Interface in NetScaler ADC\u202fand NetScaler Gateway" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@citrix.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "LOW", + "subIntegrityImpact": "LOW", + "subAvailabilityImpact": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "secure@citrix.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1284" + } + ] + } + ], + "references": [ + { + "url": "https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX693420", + "source": "secure@citrix.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5700.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5700.json new file mode 100644 index 00000000000..bf73f181e99 --- /dev/null +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5700.json @@ -0,0 +1,72 @@ +{ + "id": "CVE-2025-5700", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-06-17T12:15:27.960", + "lastModified": "2025-06-17T12:15:27.960", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Simple Logo Carousel plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018id\u2019 parameter in all versions up to, and including, 1.9.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/idesolutions/simple-logo-carousel/commit/d995b5d35e0fdc0a59307ce664e4ce1158b69bff", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/simple-logo-carousel/trunk/includes/Base/Shortcode.php#L40", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3312693/", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/simple-logo-carousel/#developers", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b25f939c-1dfe-4d4f-a27a-1f9022da6965?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5777.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5777.json new file mode 100644 index 00000000000..5c9b4419416 --- /dev/null +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5777.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-5777", + "sourceIdentifier": "secure@citrix.com", + "published": "2025-06-17T13:15:21.523", + "lastModified": "2025-06-17T13:15:21.523", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insufficient input validation leading to memory overread\u00a0on the NetScaler Management Interface\u00a0NetScaler ADC\u202fand NetScaler Gateway" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@citrix.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "LOW", + "subIntegrityImpact": "LOW", + "subAvailabilityImpact": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "secure@citrix.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX693420", + "source": "secure@citrix.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6020.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6020.json new file mode 100644 index 00000000000..4a23005322f --- /dev/null +++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6020.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-6020", + "sourceIdentifier": "secalert@redhat.com", + "published": "2025-06-17T13:15:21.660", + "lastModified": "2025-06-17T13:15:21.660", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in linux-pam. The module pam_namespace may use access user-controlled paths without proper protection, allowing local users to elevate their privileges to root via multiple symlink attacks and race conditions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2025-6020", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372512", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index c064993b431..c0288fbbeaa 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-17T12:00:18.963019+00:00 +2025-06-17T14:00:19.592875+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-06-17T11:15:22.400000+00:00 +2025-06-17T13:57:38.600000+00:00 ``` ### Last Data Feed Release @@ -33,24 +33,51 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -298111 +298118 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `7` -- [CVE-2025-3515](CVE-2025/CVE-2025-35xx/CVE-2025-3515.json) (`2025-06-17T10:15:23.507`) -- [CVE-2025-6050](CVE-2025/CVE-2025-60xx/CVE-2025-6050.json) (`2025-06-17T11:15:22.400`) +- [CVE-2025-3880](CVE-2025/CVE-2025-38xx/CVE-2025-3880.json) (`2025-06-17T12:15:25.870`) +- [CVE-2025-4365](CVE-2025/CVE-2025-43xx/CVE-2025-4365.json) (`2025-06-17T13:15:20.690`) +- [CVE-2025-5291](CVE-2025/CVE-2025-52xx/CVE-2025-5291.json) (`2025-06-17T12:15:27.747`) +- [CVE-2025-5349](CVE-2025/CVE-2025-53xx/CVE-2025-5349.json) (`2025-06-17T13:15:21.377`) +- [CVE-2025-5700](CVE-2025/CVE-2025-57xx/CVE-2025-5700.json) (`2025-06-17T12:15:27.960`) +- [CVE-2025-5777](CVE-2025/CVE-2025-57xx/CVE-2025-5777.json) (`2025-06-17T13:15:21.523`) +- [CVE-2025-6020](CVE-2025/CVE-2025-60xx/CVE-2025-6020.json) (`2025-06-17T13:15:21.660`) ### CVEs modified in the last Commit -Recently modified CVEs: `3` +Recently modified CVEs: `33` -- [CVE-2025-32920](CVE-2025/CVE-2025-329xx/CVE-2025-32920.json) (`2025-06-17T10:15:22.177`) -- [CVE-2025-48797](CVE-2025/CVE-2025-487xx/CVE-2025-48797.json) (`2025-06-17T10:15:23.827`) -- [CVE-2025-48798](CVE-2025/CVE-2025-487xx/CVE-2025-48798.json) (`2025-06-17T10:15:23.967`) +- [CVE-2024-2464](CVE-2024/CVE-2024-24xx/CVE-2024-2464.json) (`2025-06-17T13:49:01.800`) +- [CVE-2024-2465](CVE-2024/CVE-2024-24xx/CVE-2024-2465.json) (`2025-06-17T13:48:43.217`) +- [CVE-2024-25167](CVE-2024/CVE-2024-251xx/CVE-2024-25167.json) (`2025-06-17T13:57:38.600`) +- [CVE-2024-25294](CVE-2024/CVE-2024-252xx/CVE-2024-25294.json) (`2025-06-17T13:09:19.133`) +- [CVE-2024-25359](CVE-2024/CVE-2024-253xx/CVE-2024-25359.json) (`2025-06-17T13:57:18.833`) +- [CVE-2024-26307](CVE-2024/CVE-2024-263xx/CVE-2024-26307.json) (`2025-06-17T13:50:12.777`) +- [CVE-2024-27438](CVE-2024/CVE-2024-274xx/CVE-2024-27438.json) (`2025-06-17T13:50:01.197`) +- [CVE-2024-27626](CVE-2024/CVE-2024-276xx/CVE-2024-27626.json) (`2025-06-17T13:57:09.253`) +- [CVE-2024-28396](CVE-2024/CVE-2024-283xx/CVE-2024-28396.json) (`2025-06-17T13:39:34.750`) +- [CVE-2024-28635](CVE-2024/CVE-2024-286xx/CVE-2024-28635.json) (`2025-06-17T13:52:08.900`) +- [CVE-2024-28735](CVE-2024/CVE-2024-287xx/CVE-2024-28735.json) (`2025-06-17T13:25:30.400`) +- [CVE-2024-28756](CVE-2024/CVE-2024-287xx/CVE-2024-28756.json) (`2025-06-17T13:47:54.133`) +- [CVE-2024-29243](CVE-2024/CVE-2024-292xx/CVE-2024-29243.json) (`2025-06-17T13:49:27.260`) +- [CVE-2024-29244](CVE-2024/CVE-2024-292xx/CVE-2024-29244.json) (`2025-06-17T13:49:18.597`) +- [CVE-2024-29858](CVE-2024/CVE-2024-298xx/CVE-2024-29858.json) (`2025-06-17T13:51:32.070`) +- [CVE-2024-29862](CVE-2024/CVE-2024-298xx/CVE-2024-29862.json) (`2025-06-17T13:51:00.100`) +- [CVE-2024-29864](CVE-2024/CVE-2024-298xx/CVE-2024-29864.json) (`2025-06-17T13:50:35.700`) +- [CVE-2024-29866](CVE-2024/CVE-2024-298xx/CVE-2024-29866.json) (`2025-06-17T13:49:42.563`) +- [CVE-2025-2784](CVE-2025/CVE-2025-27xx/CVE-2025-2784.json) (`2025-06-17T12:15:22.167`) +- [CVE-2025-32049](CVE-2025/CVE-2025-320xx/CVE-2025-32049.json) (`2025-06-17T12:15:24.733`) +- [CVE-2025-32906](CVE-2025/CVE-2025-329xx/CVE-2025-32906.json) (`2025-06-17T12:15:24.950`) +- [CVE-2025-32911](CVE-2025/CVE-2025-329xx/CVE-2025-32911.json) (`2025-06-17T12:15:25.213`) +- [CVE-2025-32913](CVE-2025/CVE-2025-329xx/CVE-2025-32913.json) (`2025-06-17T12:15:25.447`) +- [CVE-2025-32914](CVE-2025/CVE-2025-329xx/CVE-2025-32914.json) (`2025-06-17T12:15:25.657`) +- [CVE-2025-4948](CVE-2025/CVE-2025-49xx/CVE-2025-4948.json) (`2025-06-17T12:15:27.520`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 29c1016d7b3..ee541f9471d 100644 --- a/_state.csv +++ b/_state.csv @@ -170021,7 +170021,7 @@ CVE-2021-2380,0,0,e4ece85aaa61319fb366f0e67c0fbe1c88ac97ade334d8d2f0f289add1bf9b CVE-2021-23803,0,0,eb8e9adef601c1b8d4a2b999ca421ca5388ac2e6d624a0dc3c5b3280887e5b96,2024-11-21T05:51:53.627000 CVE-2021-23807,0,0,6a75b280203317daea84367b04604555d73dce1e7b062c1ec4ed95723e4d3568,2025-03-05T16:24:40.203000 CVE-2021-2381,0,0,73c8f0f20d7c0d82a834c6c2433f14a1b0192d95ad270c68a3a9c2a28a32f3af,2024-11-21T06:03:00.337000 -CVE-2021-23814,0,0,05b7694c6871e414e1d38dfa93faea0bbff03ef31ec821bb43ceb57d448d1b86,2024-11-21T05:51:53.883000 +CVE-2021-23814,0,1,a43b654ee9e01fea0f05fd7e4d22e4a66b495198fcad86c1bcedcf57b156c487,2025-06-17T12:15:20.773000 CVE-2021-2382,0,0,ad1c8d64756b68cea26351f8493edc116cb9eadff88d7c9a4241c09cace8cee5,2024-11-21T06:03:00.463000 CVE-2021-23820,0,0,b3bdb15ec0471331fe7afb31b41435ce59fa54abb2f7933daf22a58bcc74d1fd,2025-03-06T18:09:40.467000 CVE-2021-23824,0,0,bbb9a711474b62b58291dd1188bf8bcb155385cc2b578cf95db9f4e6203dc7b0,2024-11-21T05:51:54.143000 @@ -239742,7 +239742,7 @@ CVE-2023-49833,0,0,d18597be456f334cb6e7261800855280d9e590ede3c241c7df50b343ef49d CVE-2023-49834,0,0,9af32e71aec1c900f10a1919ce40c423d33500e1360db47f2c93be4cd95603ef,2024-11-21T08:33:55.660000 CVE-2023-49835,0,0,0212543a30c077ddf1cff930dec51394a58d8fd733950b259b31d9c61e602985,2025-06-09T19:23:43.620000 CVE-2023-49836,0,0,f17819488a7cb8ae4b2121f5a078b561f27426e62e0d69d877b353d18d01fd91,2024-11-21T08:33:55.787000 -CVE-2023-49837,0,0,237225e1f64c16497d1ef67c34c36e1498192a9751c75794e06701aa3f0c506a,2025-03-13T19:15:40.187000 +CVE-2023-49837,0,1,4f9d5b6d56ab652633ab86afc7bd824cc4e65c653304c427c99ab5e88246d843,2025-06-17T13:48:25.623000 CVE-2023-49838,0,0,3e5fc80f29bf176873176454fcde64084e4bbacaebc8469c4e2fdcd7377bfa0b,2024-11-21T08:33:56.047000 CVE-2023-49839,0,0,0741e732654ee1e7c7ed82db220a1c9dae75874dddcde52d90d6f372ae660622,2024-11-21T08:33:56.183000 CVE-2023-4984,0,0,c49b34d61d642874a7dab4e0993efd83ff13c0f5c680db37994121585f641188,2024-11-21T08:36:24.280000 @@ -240461,7 +240461,7 @@ CVE-2023-50963,0,0,048c774e65664cc2dd04bbd2bb0bf5e5a8b33087c54a2292c3e70ba4f76d1 CVE-2023-50964,0,0,549af7f5da0e21621df175ef0896772987500a2810b5c1dbe76aa4da3e042b22,2024-11-21T08:37:37.223000 CVE-2023-50965,0,0,2248dd39e1f341a1a154c06aea86ada50b6e9821e264cf1bdafe227413ceed98,2024-11-21T08:37:37.377000 CVE-2023-50966,0,0,ac780191361fdf85a58e0befd7ce245c0c5da0a1412bfb3ad2f8a5003e66bff8,2024-11-21T08:37:37.547000 -CVE-2023-50967,0,0,4072dbea51d7b761fdc795d50e4973472f6aab62d56509c9aea1b2fc7d4fa05d,2024-11-21T08:37:37.800000 +CVE-2023-50967,0,1,b252ef3ed4b813b672c2d6762b779c59a6e76ffe30d88958ae2bc21dc08dc1f5,2025-06-17T13:12:08.180000 CVE-2023-50968,0,0,944ad922dfdd60222188e5019e8a60d8a32f72d029e1d0d5b439b02a7bf2f497,2024-11-21T08:37:38.070000 CVE-2023-50969,0,0,637c6ad9c04c25fc0db7aae47f996533c2be1e2bda2d280957da106a95f376a7,2024-11-21T08:37:38.217000 CVE-2023-5097,0,0,5ebffe674500c6e376e941b2f6ae82b644c3b67a160f7d9b5e599506925766be,2024-11-21T08:41:03.227000 @@ -250196,7 +250196,7 @@ CVE-2024-20526,0,0,7517c9ae25f2ed0403d64d3a7e54d668b651e2debacfb8240f871264993f1 CVE-2024-20527,0,0,41d67b4d9f7335686e1f0c90f125814a72e812da4f51f733338257e60119d81e,2025-04-28T16:54:04.050000 CVE-2024-20528,0,0,ee08564a639eb2ffe8083f1dde5dac6dc26002c0a6ca8c5f163532c25fa1a3cd,2025-04-28T16:54:17.767000 CVE-2024-20529,0,0,449aaca13405a2300bff3c71a4bf477076672b57a91dc5b86499b4c65b07ce43,2025-04-28T16:54:35.190000 -CVE-2024-2053,0,0,df172a8d48d8226dc4dcaf67f8c7b0fbd36c5876cb4ec65ff3f58bf3861cb1da,2025-02-13T18:17:51.650000 +CVE-2024-2053,0,1,21405406427ed68d991e7b3e408223f21e9892dbcc25ef8a0ff2a347d824e36d,2025-06-17T13:57:02.687000 CVE-2024-20530,0,0,4b6fbf3cff3c88ea323fddebc6c0cb7ae788b03316d792f4072bca3f4bb0811a,2024-11-20T16:50:11.577000 CVE-2024-20531,0,0,146b432bce918b7fed6c81c3e05a5e8691f6946a09048d0bdbaeec668bebfdbd,2024-11-20T16:45:31.467000 CVE-2024-20532,0,0,a98adf38c41b4add687eca1d2d364554896ab5d585763cfdfa251477c400c149,2025-04-28T16:54:40.020000 @@ -250206,7 +250206,7 @@ CVE-2024-20536,0,0,0cf8e906b7364c76c10f292b3b2b51c7ae8671839fdcde7e5640903f053fb CVE-2024-20537,0,0,0bfe7d20eb908fe59c92f0ddc5b2954d997f12f86e91ea166b79219997cc0a48,2024-11-22T19:53:29.893000 CVE-2024-20538,0,0,637fb37b3ad9056411de85e8bb83ad084f423ca94786a8c8b68482035d3eaf97,2024-11-20T14:36:01.810000 CVE-2024-20539,0,0,5f38f2d2f952ea770144dc8472aa7e1a56064e025be3a5b1c9943883cc7029ed,2024-11-22T19:42:09.633000 -CVE-2024-2054,0,0,22b249de25f24c9d5e4dba60e1bbfb2ed15b9c99ba0b7f3c989eacb4a07e713d,2024-11-21T09:08:56.363000 +CVE-2024-2054,0,1,ede2f9ceb81ca8294be028282df8039e2040dd9c9f2c94586f0a435228d262c1,2025-06-17T13:56:40.113000 CVE-2024-20540,0,0,b101248a8efda36e915c412442fe685653fc473fd659fbc78c35cc262111a7d1,2024-11-06T18:17:17.287000 CVE-2024-2055,0,0,9c9b4203c5a8691f7ee3b1c0f37424285bdb22c4e9691349b0a7161f418f3aa7,2024-11-21T09:08:56.533000 CVE-2024-2056,0,0,68371bbfe3e7de0ab75bbaafdb9ba13342e9ac1572c260d9b23595be0a55c605,2024-11-21T09:08:56.727000 @@ -253101,8 +253101,8 @@ CVE-2024-24023,0,0,3ee9e259451a221bd1226a86ab24cca18a0427c8accf85594b7fe8589f86f CVE-2024-24024,0,0,ff57aa61c54e7eae66c872d65974ea9488880180e192e5435db730a2dba0aa85,2024-11-21T08:58:50.610000 CVE-2024-24025,0,0,7254548f6b8ac2b8ef1daed9ec2e1b1b876a658e364c41215144a94948aa5a53,2025-06-12T15:15:36.090000 CVE-2024-24026,0,0,d30e0ed7fd28a2b4872b8c86cea254006212452fa02aa8e340063d334f3dcb08,2025-04-24T16:15:27.310000 -CVE-2024-24027,0,0,391b6f0c989ab692fcf3852d54cb7a060d485a544033c03f41cc1af660b901b9,2024-11-21T08:58:51.147000 -CVE-2024-24028,0,0,ad0f9346e6c3e0d5ab573f41d597339a62c7fde950311cf04d789e81f3f0fe87,2024-11-21T08:58:51.363000 +CVE-2024-24027,0,1,ec6983996d129d9023677bc7e984f26d141eb3011e730c8d748d03df762d1ebb,2025-06-17T13:47:56.350000 +CVE-2024-24028,0,1,724084298b1dbcacda5f235f72078c0df49f5bb1e6153ee0d52cbab9a56229a8,2025-06-17T13:02:50.173000 CVE-2024-24029,0,0,af68655e8fbc4adcf9874b4c20d41fedfd5eb062f4d7ac468ed562cf3b508811,2025-06-12T15:15:36.290000 CVE-2024-2403,0,0,0401653e665e07850d0979eeb0951a8f7eb57e50afcaedce51caf1bac8897208,2025-03-26T20:15:20.150000 CVE-2024-24034,0,0,2e37ccde6a893ff8eea80e8e829c47c7fbddcb1c502f4176668c4eb4768c1d4b,2025-06-16T19:15:31.420000 @@ -253402,9 +253402,9 @@ CVE-2024-2462,0,0,a1dd3f4997ef865dfdc0dfb64b96bac6ae8b5f07531d6fad04458a287ee641 CVE-2024-24621,0,0,b001be43080e99b7b4c46930b48679f5b0d187bb971ef9c6a3b104fb6ba1d420,2024-11-21T08:59:29.377000 CVE-2024-24622,0,0,a9af27641f63b4ef2a52f9824809b72768fcdd23be134cd44ad6e34870b4ef4b,2024-11-21T08:59:29.543000 CVE-2024-24623,0,0,32c5e7e4c2a12b4fd8e10766bae8adf778a4314c06c8981714d3d3fc18afb926,2024-11-21T08:59:29.690000 -CVE-2024-2463,0,0,cd33907f43d78ea7a4d83f727dec354bd7fbcef16f21490759aff4ad1db57a40,2024-11-21T09:09:48.253000 -CVE-2024-2464,0,0,a78bc2c9252bb2b47a0187db94331e09b4187899ca4acbfe6bf24a296b8311cb,2024-11-21T09:09:48.460000 -CVE-2024-2465,0,0,9dfb9bf3bb865c229fb26bfbcac054e70b393be6dedef67687e11d88a7f9826c,2024-11-21T09:09:48.647000 +CVE-2024-2463,0,1,37528b48111b8b54b68bad53879e6d26763011fb5c04443b6e659af4ce2ef66f,2025-06-17T13:49:07.733000 +CVE-2024-2464,0,1,be9c0698d74c071e7c71135243f35c8300947e527365ecad408a501d2e98923a,2025-06-17T13:49:01.800000 +CVE-2024-2465,0,1,33a73c8c39cd39bacb5fa5429136fa6f64785cb66e7829fa929c78b294a0a7a6,2025-06-17T13:48:43.217000 CVE-2024-2466,0,0,d8b1e64fa1a3eee0ad1e15cc0aedc5c3295d42d00c2d3e960f0a0dd4a6e21d4e,2024-11-21T09:09:48.847000 CVE-2024-2467,0,0,b462667402cedba4caa592ae7c567717067689568689db5eedb10e506ef16a4b,2024-11-21T09:09:49.040000 CVE-2024-2468,0,0,ee79c285973462515e70d1cd2da5bd3b8fd4566e8905e23739ea0319c22a0401,2025-01-07T17:38:39.947000 @@ -253846,7 +253846,7 @@ CVE-2024-2516,0,0,77ce9a2ebf0a03382426f1ce47b57f851cfbc48c7499c251e75e7b16244e31 CVE-2024-25164,0,0,846e0b12664c69b33a141ecb3fb34631c9985321de2be67da6fd9bf2e318d6f5,2025-04-30T16:53:41.083000 CVE-2024-25165,0,0,688ec36335851944188d6930a699d8a4664b542eac9eb157cb5307635b7fb093,2025-05-05T17:21:49.530000 CVE-2024-25166,0,0,6a7550fba8f4cdc77aefabb88886eef010b0f9c27d5a0ec8eb77cbe16cbee192,2025-05-23T15:41:53.523000 -CVE-2024-25167,0,0,6680c9ae0b5f0e6a56ae0f989b9e9129826f63fc1c07b9d46b893bd2a5ea0d07,2024-11-21T09:00:23.153000 +CVE-2024-25167,0,1,1df6db05fe241b73f7503bd165b03577b0706be88819ed1488d845e58daa9a20,2025-06-17T13:57:38.600000 CVE-2024-25168,0,0,1d24cdbe22f823f21153af9d605281d99c0e49864f5f54414097a3858d65facc,2025-05-28T19:00:23.823000 CVE-2024-25169,0,0,99447ba0d35007c05de0bb325e4f626f2e771e1210f38989dc4b7d60408a0543,2025-03-28T19:15:19.433000 CVE-2024-2517,0,0,295e66015290670d17656ff58cb1c4da5fc5fa5488e00738c41044e38528f829,2025-02-14T17:00:42.847000 @@ -253922,7 +253922,7 @@ CVE-2024-25290,0,0,35a48ca5a622e094bd31621eeb7b60a8ce0e37e115c0a197c45f71405831e CVE-2024-25291,0,0,96fc4fdf9bda90ea9adf3847d54655aefc5fca4ba5f62f3172b9379821861a1c,2025-03-27T18:11:37.647000 CVE-2024-25292,0,0,45864ae548a55a3b3bcfd7b830024d78d12fb520d04d1d13af461fb4540a3667,2025-03-27T15:15:50.407000 CVE-2024-25293,0,0,76c07b6a2eefa02d105cac4f1c577a0c4b8e93bfa8d760f4442c8c07edcfcea2,2025-05-13T14:40:23.387000 -CVE-2024-25294,0,0,548c06e67bc118a6fa5feec4c8fe3ecd605a03dc361470c0aeb4866e475c38a0,2024-11-21T09:00:35.037000 +CVE-2024-25294,0,1,5df4262b146576b790489beccc111bc46c0276253d9f9b4b2a77474471c17da0,2025-06-17T13:09:19.133000 CVE-2024-25297,0,0,a5e886fa4ef1133925f78074d5887ee6bf7505c42983811cbe1a106b4c6fd254,2024-11-21T09:00:35.267000 CVE-2024-25298,0,0,cfcf64b5d754fd69e4a2bff3f63744d367a17e7b3976b42159232a586e9e2d88,2024-11-21T09:00:35.500000 CVE-2024-2530,0,0,eaa4003252bf998a9dd2e238fde2e516ba4979d798449f83c0bfd71f422e1d10,2025-03-03T16:56:17.067000 @@ -253957,7 +253957,7 @@ CVE-2024-25350,0,0,4475b2cde03dfd1b78deacd34e1c6eded8bdb8d6a390fd1c3a4b68cda68ac CVE-2024-25351,0,0,7dd6fa3c0615d36dfbffb6fcdb5c9b681d789f881b9a847118c7e4975d141eaf,2025-03-27T15:09:22.307000 CVE-2024-25354,0,0,297ccea736333201514db90fe7dbcf98c84ce9c571080000be069d554c6a00ad,2024-11-21T09:00:40.210000 CVE-2024-25355,0,0,bf9f24aea57a5ab6015148e7e83742e40755da7892daf5e163536b6780f4b800,2024-11-21T09:00:40.430000 -CVE-2024-25359,0,0,a336a7bea75b7e6c501988a4997083c1321152adb9115b9ab0d654839ea54de5,2024-11-21T09:00:40.657000 +CVE-2024-25359,0,1,1faff4a6843d7c6aabdff7c1ba954123828934100228be8add6df62659ce8f60,2025-06-17T13:57:18.833000 CVE-2024-2536,0,0,34714028d3070baf2ff1ad4c72d71c418ed304ce870351669a86ec15b5067ff5,2024-11-21T09:09:57.987000 CVE-2024-25360,0,0,e089036b5b01d137197b9a6e98d6b65bdfd97c49cd47a370e756821b6a4c19fd,2024-11-21T09:00:40.877000 CVE-2024-25366,0,0,81f42def24e0dad489549c5b3d854c716158eda254125d88487ea07e4ab06493,2025-04-02T20:20:16.947000 @@ -254729,7 +254729,7 @@ CVE-2024-26303,0,0,683c75be030d56d22a80af6c831391a578fbff95d8a5ed04b60b17b6ef840 CVE-2024-26304,0,0,56bdf39b2fd43778db8cbd7fca5f3445a4b499228769887ce2c61f9a8c917ddf,2024-11-21T09:02:19.990000 CVE-2024-26305,0,0,207af5372c6fc3b0f4dcceb5d80ed2c82c3f5ceac7cdcccb513c596eec6d1c42,2024-11-21T09:02:20.113000 CVE-2024-26306,0,0,c069a5261b9deb6b8139352eeda6c0c8f7c03f1d588b2d0788484ef55f108ba1,2025-02-28T13:15:26.423000 -CVE-2024-26307,0,0,7842c4c7922e6571f612e3612dac5d83a0697d8de4e909017d23fbf7e015db1b,2025-02-13T18:17:19.070000 +CVE-2024-26307,0,1,14597d93e6ee3ac1c893f76e8e03eb985fc5be16adba7ec8f59cbb61a66363e7,2025-06-17T13:50:12.777000 CVE-2024-26308,0,0,3f38a3e7e98950ef6e7f848dce8c8a06799a4e83fe7dd54e07558efe432b1c13,2025-03-27T20:15:24.547000 CVE-2024-26309,0,0,00bea15c248e249662bead3afc56845c19345a8a6ff84ebdc44d0c2b2ef87b95,2025-03-26T17:15:24.067000 CVE-2024-2631,0,0,4b2da0b4935a4e7d648b94a0cc3362a78c2f10ad400ad04bf3e2ceb17ee906d3,2025-03-29T00:15:21.277000 @@ -255743,7 +255743,7 @@ CVE-2024-27434,0,0,5694b30bd28f0fe9c16395c30a32737d7ac6900aa3f8e3fb7976b0983aedf CVE-2024-27435,0,0,6dc8bb3ee34c85a8c6dfc8862b9a9e1049341ecc1b661f32e8230a1c343aff9f,2024-11-21T09:04:36.097000 CVE-2024-27436,0,0,713a88796ee4dc48163f026b97ffc79c81e0d3b45ee6235d4ff52cf8ec2e3e87,2024-11-21T09:04:36.280000 CVE-2024-27437,0,0,209eb3192ec71504daa2eda9becf70ece581fec90d86a17cc35f43c1e02e19d9,2025-03-27T21:37:24.097000 -CVE-2024-27438,0,0,3e15308d6d74345ce7d99b9ef518d03e488c8ee266cb19156b4e2f87fe9f6689,2025-02-13T18:17:31.937000 +CVE-2024-27438,0,1,884220c2384dd6c25081e4c3d4b9e503a84643cb245f83edad730396f8909ca1,2025-06-17T13:50:01.197000 CVE-2024-27439,0,0,bf70e55b581f82f7468b043b9b647a64b6f90e7d462ac0abeb48e128046a1ae0,2025-02-13T18:17:32.507000 CVE-2024-2744,0,0,d7bf8b89d62a8b9265c01e026210353751391b534d66ac852ccc06ffc57a5571,2025-05-21T18:58:27 CVE-2024-27440,0,0,f3246d021e78594286f96d28f38f4a153ba29ec42bd1ca9c545820901bf05123,2024-11-21T09:04:36.887000 @@ -255830,7 +255830,7 @@ CVE-2024-27620,0,0,9d93a7995af700d2b5f47649a5a324bcc1220340d6f2f847a3ffbdc29a832 CVE-2024-27622,0,0,8e0b032d21a35fdd5288842c4805671f9cf9ea0437669d9f87a13ae4b3bdf881,2025-03-28T16:05:54.780000 CVE-2024-27623,0,0,0b8613e0438e050befc8caafef4caeb2c7fedf67a19158500b4830afaf3b8ee1,2025-03-28T16:07:47.727000 CVE-2024-27625,0,0,6b594fcfc101fa835d824b87493f4b5d8cf00a7664f013cc884858d547c79926,2025-03-28T16:07:53.420000 -CVE-2024-27626,0,0,9a1abf5d0b8cb2d3b863768b43ec83911190b875da99fdca947dfb8d0f43eff6,2024-11-21T09:04:49.480000 +CVE-2024-27626,0,1,01bf6a3cf2aaa0ec243bc1adbf2892c2db37c420356d4ac3b4586eeabfc99f70,2025-06-17T13:57:09.253000 CVE-2024-27627,0,0,64e619d9251dac6d6016764b95186a6975a71f8714a3967a40144f57f22acc23,2024-11-21T09:04:49.697000 CVE-2024-27628,0,0,46387e1fb6677fef5f092ea931a292681d4b56138363088d2c6117deec1853a1,2025-06-11T15:22:56.587000 CVE-2024-27629,0,0,925d6c515470e75988e5c00e502d5ff2d6b8836f5e5c3c8e1facf7db93bb0b30,2024-11-21T09:04:50.130000 @@ -256433,7 +256433,7 @@ CVE-2024-28392,0,0,d390c6938d5b44056d413b2b408bcc32550deb780a0d9ab9cc047b0024cc3 CVE-2024-28393,0,0,c9f4dc38aa7cb62a7fcaedfa3fead844b0689c54fefaa509c2816ddb9d2b633f,2024-11-21T09:06:15.917000 CVE-2024-28394,0,0,c9f8c97d4aca10910d8f2d44c13ca923fb7aa68ef01730f568b161c43521e5c7,2024-11-21T09:06:16.133000 CVE-2024-28395,0,0,3ac36a8de3aa3d1fe4cc050c5fc46d41abb7ee090785aeaa767ac36e87a67e20,2024-11-21T09:06:16.403000 -CVE-2024-28396,0,0,a9b920310b189713faaee0f6833442602f782d8326fdb8c04904df33448955ca,2024-11-21T09:06:16.637000 +CVE-2024-28396,0,1,63f774fd6573c6ff1beb2fa14007ee691e72ab9ec9d765ed701bb14c734b538e,2025-06-17T13:39:34.750000 CVE-2024-28397,0,0,856f600076688d17f155d0b3de70eb9262cbb77397683a630edc0c5a3e4d66ec,2024-11-21T09:06:16.863000 CVE-2024-2840,0,0,a7ffe5d042ec7962cc81a2b23f8b42cf3a001089fe1f305bad6b8b30e2ca44e0,2024-11-21T09:10:39.107000 CVE-2024-28401,0,0,826cf616629645fbd1a84822aab899008c5c378ac0b171dafbb050c000cd2f35,2025-03-28T19:15:21.033000 @@ -256529,7 +256529,7 @@ CVE-2024-2862,0,0,de64a0a4bc271c289ad8432a80b906776b0e02689be888bdd8bcfeaa8f184e CVE-2024-28623,0,0,866ea92417525311d6a52e3d3bec31442a332fc3dbfd5666330707433ac99b64,2025-04-16T15:33:39.210000 CVE-2024-28627,0,0,9277a6897abe880727737fbbbaaaf027c984f569a532468350bff5d977a1bf19,2024-11-21T09:06:42.143000 CVE-2024-2863,0,0,cb802aec2f5670a2db50b65a9ba985518f35a86ec8069dd3385b56752f9cc0f2,2025-04-04T16:48:07.247000 -CVE-2024-28635,0,0,61242df335a44a1ffcc8a35eed585f9c6d6e29d973b2b56cd4e07379c5b17c10,2024-11-21T09:06:42.367000 +CVE-2024-28635,0,1,b63fcc8f0a522f769c2801425808626127a3886af50c6e62e5cdb835fa58db8e,2025-06-17T13:52:08.900000 CVE-2024-28639,0,0,e7a0e0b3ab0a4c3b57de2dc0a84196d1068993c21df426fe3caa9e5c75427b24,2025-03-26T15:15:49.150000 CVE-2024-2864,0,0,e3c30714995f30dc7e0b527a75c52b920bd6b9f7aa0c230a72b2bee2dd8a2993,2025-05-28T18:50:59.273000 CVE-2024-28640,0,0,990c29eb8c733a819b0a31dbb2e2b0510b47e9a808edbc4e02611ff94875e45d,2024-11-21T09:06:42.733000 @@ -256581,7 +256581,7 @@ CVE-2024-28730,0,0,f77fa1cdd3486632b530514d8ed2b4b02d03ef1909d13fa8c507853b0a763 CVE-2024-28731,0,0,732f38dfd1d44ede04b0cda02ae33f20ea7253c9c9aa59ca9fd40cc1d048b232,2024-11-22T19:15:05.967000 CVE-2024-28732,0,0,7d87f352ac9dc95264896b46a4f8811123392322495e7fd23a689b3ead2ec158,2025-04-15T17:40:17.127000 CVE-2024-28734,0,0,248da8578808414567db67c3b503066a14a98351080fe64fbc15bb46c363a163,2024-11-21T09:06:50.763000 -CVE-2024-28735,0,0,81c41919d4a8ef295ba05c2dc2d0919e7f08d346fde9111b328dce84910fee98,2024-11-21T09:06:51.010000 +CVE-2024-28735,0,1,dca144a6ca57cf500238c0c3d6b112e45665e3bbd0086c4b27c8390c0d94972e,2025-06-17T13:25:30.400000 CVE-2024-28736,0,0,df782a0cdc83649a96a984c1b8ce3c2c9e002e8bd9b3d64936ef7e71c1609578,2024-11-21T09:06:51.233000 CVE-2024-28739,0,0,6f446ff59c9537aa4b5a8742ebfdad671a80a577ee582bd1a98b3db07755c8bd,2024-08-12T18:18:17.717000 CVE-2024-2874,0,0,a31e28465fa71f9062d6319cfc3c8d1fe0a152aed175717a5e9e88a324585636,2024-12-16T15:16:54.830000 @@ -256600,7 +256600,7 @@ CVE-2024-28752,0,0,3743867d820cb3fac6cc93d0ae0ebb1af1934f8628bb7b6539e88268ce65a CVE-2024-28753,0,0,bf7e9c161fe17ddef885af4de9deb82e14e1947648f4df3c13214108525d2ba1,2025-05-01T00:17:11.497000 CVE-2024-28754,0,0,2214144a78c46b2580bfbfec179b899b282fb753a98595a9fdf69833f99d7b2c,2025-05-01T00:13:29.087000 CVE-2024-28755,0,0,94db876d89381c6bafbe99b1b5cd635119fcf3d8444f7aa68a6413cada173fe6,2025-06-10T00:41:15.783000 -CVE-2024-28756,0,0,690c3487a07876dd049c19665e845da2f28dadbd04cc6a33595a62792634596a,2024-11-21T09:06:54.270000 +CVE-2024-28756,0,1,e987012e08e79ee03b46c6960bf7ff0755b5fba179ee1b5a3774f90b1a7cb114,2025-06-17T13:47:54.133000 CVE-2024-28757,0,0,81da43f42617b41a14b128c7de9bea07265204ff81eb0bea8f4158090d852760,2025-03-28T19:15:21.230000 CVE-2024-28759,0,0,0a4255815bf43753569b9bf94f2fbddf12d43389c8cf8017f7885f21185e8276,2025-03-28T20:15:21.890000 CVE-2024-2876,0,0,71c3a804e8eb8bd03fb495c4bf9bde93ee7dd07888efcbbc5faa48502cbce8d5,2024-11-21T09:10:43.890000 @@ -257067,8 +257067,8 @@ CVE-2024-29239,0,0,794c9cedb88e643f175245efe3ec3b2caaefc47db456a30ecba8e95edf040 CVE-2024-2924,0,0,a800336decf4a5ca03d289c145f1cfe49b94f9c1a4d7c72b8b077f88e9c79934,2024-11-21T09:10:51.120000 CVE-2024-29240,0,0,3809ed6e15f6ba8ad2457c3c4767dcc4a3b3a1c13d5f949a4c9713e708528b0c,2025-01-14T21:24:20.010000 CVE-2024-29241,0,0,db361e5a1fb94f0ef773aa209c1222142c369872ed24ae042e9a3cf74fe67dc2,2025-01-14T21:24:52.060000 -CVE-2024-29243,0,0,6712fc080a5e8c9532d36ee5213cbfa29db8274191ca6d9bba87c131b413b31a,2024-11-21T09:07:53.150000 -CVE-2024-29244,0,0,10592a85c5d4647480056a5bbd0b67225862ce6c23f623418cd1bca09ea83d5f,2024-11-21T09:07:53.363000 +CVE-2024-29243,0,1,32fa30ac909a3e3c532540b11ac7da81339b441895494d5c6ac2404e5f1c9fcd,2025-06-17T13:49:27.260000 +CVE-2024-29244,0,1,3f221de1738d5363ed0601d3f78ffbef7a305da565a1c7f048cda8682cd4ec48,2025-06-17T13:49:18.597000 CVE-2024-2925,0,0,08a688428b1cf91c81dd53f1f81a26bc2648cbdabba0669e09c3c551848cd6da,2025-01-08T18:28:36.057000 CVE-2024-2926,0,0,18353582fbf60ea48ced69d4190ccb60f0390ef67dfa3f20a639890b23e716a0,2024-11-21T09:10:51.370000 CVE-2024-29269,0,0,59344950251fa21a0e7c78785a2aa3fcb549293d2bf33594b54e6b598043aea6,2024-11-21T09:07:53.570000 @@ -257359,14 +257359,14 @@ CVE-2024-29852,0,0,29b0b23a86461f9e60f5579670657e219bfa5a95c00b5c38f171db2eecab3 CVE-2024-29853,0,0,4c9002c0c0fbbb703ad210531603aa769175a9f6320529b3713d1a4749a047d2,2024-11-21T09:08:28.420000 CVE-2024-29855,0,0,6d2becce445fb85d8a3ce03c0a9637f2df05bd300108252c9d25a9447a0302af,2025-03-27T21:15:48.220000 CVE-2024-29857,0,0,d0f8da7d297215a9aa89339fb466a7b41b1ef03fad42cb6defbc9cbd2e5f42d8,2024-12-06T14:15:20.263000 -CVE-2024-29858,0,0,c87765169ae5c017511f5327f1da1cf37e38dbdda408b2844a3fb861bcaa87bf,2024-11-21T09:08:28.933000 +CVE-2024-29858,0,1,bf71dd6579e55d5d5a3c08d613b1f67a41eefd97260034d7dd5be41bb76202c1,2025-06-17T13:51:32.070000 CVE-2024-29859,0,0,37a69adc1b7832a621c361f101a9c8b0ea81feef948392f5a53e4b63ef068862,2025-03-05T18:53:05.750000 CVE-2024-2986,0,0,034efbed1cd49349cb60af1887d254a911bb02938b066670d6e87e5a67825916,2025-01-14T15:10:34.143000 -CVE-2024-29862,0,0,8c5ec88bbec916e77218489c7bbd7314ec051f4063b7c8b8a5e341c9fdbc529d,2024-11-21T09:08:29.393000 +CVE-2024-29862,0,1,1f66397d454cbf897eb9a91de74953ff39d6098804a54c4061cfd09e41471f42,2025-06-17T13:51:00.100000 CVE-2024-29863,0,0,84604b7c2f2f884038fabd2dac097e571170e075668006e2307925ea311c7c6d,2024-11-21T09:08:29.610000 -CVE-2024-29864,0,0,500db002acb5f8444110c04fdf6c1755d974238286749d97d2f574426dd009a5,2024-11-21T09:08:29.820000 +CVE-2024-29864,0,1,538de3c8a301d3e02cd8011e17af8be5b46359f9c0b0b0c7321480e1784e1401,2025-06-17T13:50:35.700000 CVE-2024-29865,0,0,f22110c466af3836ac04572aadd63b28ee037c50700b7cf9b140a3219073d33a,2025-04-16T18:44:43.820000 -CVE-2024-29866,0,0,8fc166448f3fbecaecd8b7ed9d6aa230d3bb984af892d0077240e75b9b6f7a9a,2024-11-21T09:08:30.190000 +CVE-2024-29866,0,1,59801641d61e7782555a184d222b66985dbab651d5d8ae9ab0afc32a7e9f9623,2025-06-17T13:49:42.563000 CVE-2024-29868,0,0,654a536670a62fb45b5203eb432335632fdfc103e225c6be2f801ded9b3b1341,2024-11-21T09:08:30.413000 CVE-2024-29869,0,0,8cda6f45350d5d3a29dff2e6c7c701bda04cc444097bfe7159d77df29a276e9c,2025-01-29T15:15:16.417000 CVE-2024-2987,0,0,e4d4968f2ab326fc6f93467dbe0c42753ad32258cee7fd3257881b95a825941e,2025-01-14T15:10:15.733000 @@ -289851,7 +289851,7 @@ CVE-2025-27835,0,0,bfd55bfd7467fd1074b48c9c5b6d2f6f88f9d233c37b427ef5473af1632e7 CVE-2025-27836,0,0,f465c8991d790bdb41314bcd1316c06a9f596110c7a85fa30ce1c38f1408796a,2025-04-01T16:35:25.050000 CVE-2025-27837,0,0,198388712cbc69d26c62c3d088f09d0e18143dea1a79e5577fb06110d422e550,2025-04-01T16:35:15.650000 CVE-2025-27839,0,0,2897e6016e5e328d150ac9e956e1e3698f33d754fabb81cbdb31c6766dbfb22d,2025-03-08T00:15:38.340000 -CVE-2025-2784,0,0,a8f30d5bfa2d3cb94a268e478af752e8103b971e3168ec97fef63ef7d1d50bec,2025-06-09T10:15:22.457000 +CVE-2025-2784,0,1,77ed6b62ff3dc36886f80bf5f954c5e0fb16bb5b2e8578c5b46a66eada554cd1,2025-06-17T12:15:22.167000 CVE-2025-27840,0,0,4f077c11cd42874f9ea8d03fc4b2dba1a597eef072d62ce316763a23259bd33d,2025-03-12T14:58:54.130000 CVE-2025-2786,0,0,e956eb7658768af7a71ab8b6f13dbc2bb5f58d8f62cbc9c5c71f0b357f132e17,2025-04-09T21:16:25.720000 CVE-2025-27867,0,0,706ccc11683336c438698de97765a7b785ce156810f1f1b352bcbe344a4419e0,2025-03-21T21:15:36.910000 @@ -292310,7 +292310,7 @@ CVE-2025-32036,0,0,392ced4a7ceffb3860fa36c03a132228e0c351b485f1983727787214d9a82 CVE-2025-3204,0,0,640564153dde48d17342c52eff358ea56840605e43f6aab84cda78f222b9e0c5,2025-04-15T18:48:43.403000 CVE-2025-32044,0,0,47cfb11ddd4f798b88407ee947b6b37b38d63eb788ec0beb1a8b1f88d22243d0,2025-04-29T13:52:28.490000 CVE-2025-32045,0,0,6307eda7e5fecbb45ee3cd67e3b1e28bbd97fe6280c52237a8c534b3b8db6479,2025-04-29T13:52:28.490000 -CVE-2025-32049,0,0,8ce60c6bfcbf9933ffa2c4f6c8a3e4f1bbc46007033103b1f8f9283aaf242195,2025-06-09T10:15:24.673000 +CVE-2025-32049,0,1,2126caebd122da73b658d5e9f6578921e4e60d0d550219a2c8f83732d71a392e,2025-06-17T12:15:24.733000 CVE-2025-3205,0,0,2fbe92de3997566680a1052e42bc5ae830a44caf727a733907db3320a0fb983b,2025-05-07T15:58:51.537000 CVE-2025-32050,0,0,d0a186287f84675d733fc8adf7b721e0ef8373d24cc78f737949580577a7a0c2,2025-05-29T07:15:22.560000 CVE-2025-32051,0,0,c5601bf30a2280db534481dc10ccb3d4bc49f5f6486729ed8c2da54db3bdca25,2025-04-07T14:18:34.453000 @@ -293041,19 +293041,19 @@ CVE-2025-32888,0,0,851f5838ac3b9022b83107af55b659a3aafc0e2822e0c3d7c62be76cdae08 CVE-2025-32889,0,0,c5001261168b52d1fcafa5e758115761d50fb6c85872f50dce10dea30446578f,2025-05-02T13:52:51.693000 CVE-2025-3289,0,0,2dce3ef8eb88e8d6d3c6bdcdd7b6d448658ce48e819de5faca8e16dde3fc5df6,2025-04-08T18:13:53.347000 CVE-2025-32890,0,0,14fe3680ce0a694763f118a1c4280330bb31bbe10888a63507689bf1688fafee,2025-05-02T13:52:51.693000 -CVE-2025-32906,0,0,626b1bb5c70f6c5d70a12828201142afc602f3fd597c6e841cb13e5c9d501409,2025-05-29T07:15:24.167000 +CVE-2025-32906,0,1,ed269622d928bd2aa475c3656dbb221e908c6bab45b25018cc828ee7bd119edc,2025-06-17T12:15:24.950000 CVE-2025-32907,0,0,213f7e42abba53cbe091599b6e08ac02e165cca9f4b70fa3a4b5acdea9942c00,2025-05-29T07:15:24.333000 CVE-2025-32908,0,0,d04d5cbb3961125d5a394946a9211c5953b759f1c35584196afe4caf2db9d0fd,2025-05-13T21:16:14.597000 CVE-2025-32909,0,0,28834e670b20d61ecd1abc0fbc6573b4598f1e3282cb36a80b5124dae9557e4a,2025-05-29T07:15:24.480000 CVE-2025-32910,0,0,240d5c7ee2b4c85daa5f41c88c38a0b1ff00089c1fa83111393e2a6ccde411d9,2025-05-29T07:15:24.627000 -CVE-2025-32911,0,0,3dd5d330e5c87cf21d952d6d2f4ac7061b9425e4a5d7e13fec51bbce59ac67e5,2025-05-29T07:15:24.783000 +CVE-2025-32911,0,1,19da778239563f465f677d260c2c125ecbe4ab224e433d4e0167f6baf25baa85,2025-06-17T12:15:25.213000 CVE-2025-32912,0,0,537b35ec8e3e7b56fc525d652e56f2627ca353a9690e505ad216d07c70358d3f,2025-05-14T00:15:18.100000 -CVE-2025-32913,0,0,4c0909f1e764fc3bf7ac16dc571564afbd85a7a86a7370c78e55f528fa4db095,2025-05-29T07:15:24.957000 -CVE-2025-32914,0,0,f111116292642a8d9075af57c1ff7064ec7337a57bd531d01793342b33c9f4d3,2025-06-09T10:15:24.927000 +CVE-2025-32913,0,1,e1927d0860bc1d6760527c56e49e831eec072989d1ced890c45db58ff9e96f68,2025-06-17T12:15:25.447000 +CVE-2025-32914,0,1,3af3067d70bd81f91455998b87224657ddcf7d162a47d749db58a95e606833a2,2025-06-17T12:15:25.657000 CVE-2025-32915,0,0,2d5afa660948b242629afd805b42088f6d76764cd20288c422f89dd9fe02bb30,2025-05-23T15:55:02.040000 CVE-2025-32917,0,0,621a83e4e955a5402f378188c4f01b4aff8a0585cec439fee69248f2294167f0,2025-05-13T19:35:18.080000 CVE-2025-3292,0,0,118c173f186dcc5720366632802764bcff206cc9d545c82cefbfbd5ae3208b31,2025-04-15T18:39:27.967000 -CVE-2025-32920,0,1,7e212ccae54e7de68d6b49d615b9e74e6cf3cb23588850cf6230b262d708bae7,2025-06-17T10:15:22.177000 +CVE-2025-32920,0,0,7e212ccae54e7de68d6b49d615b9e74e6cf3cb23588850cf6230b262d708bae7,2025-06-17T10:15:22.177000 CVE-2025-32921,0,0,7c798e84a120c09e79aa61f0d66dd4a5e84ea134e24a6f6fea02a374ca1d5b0e,2025-04-29T13:52:47.470000 CVE-2025-32922,0,0,dd2fa7743096c0ae961ecc41cbe765ffa285523c06483f9df72c6611b9ab1dab,2025-05-16T14:43:26.160000 CVE-2025-32923,0,0,a52facaf2e37400983e8c03a1ceeca22c3067be9be025a531236fb3ed36caeda,2025-04-16T13:25:37.340000 @@ -293364,7 +293364,7 @@ CVE-2025-3511,0,0,2581a75036be8d737bc9c5afcbd1a9fd25ea23392ab1ff727e244646bbc80f CVE-2025-3512,0,0,20d5b7a0c651482d59ceef752919a6e419c7dc684bf79b235343ded68357dd77,2025-04-25T18:15:26.103000 CVE-2025-3513,0,0,30697186a140035be04a508cb924b9ecf131ebffede275cea415703e58a2343a,2025-05-28T16:02:00.560000 CVE-2025-3514,0,0,c86807ed5e4a9fbddc1ff156b508ea32337a1a14e6f5794c2a643d10915e3635,2025-05-28T16:01:47.180000 -CVE-2025-3515,1,1,9cb0da5ac32bc54ba8096e84919be59f07816d81250d2794ed30b9d4e01f9064,2025-06-17T10:15:23.507000 +CVE-2025-3515,0,0,9cb0da5ac32bc54ba8096e84919be59f07816d81250d2794ed30b9d4e01f9064,2025-06-17T10:15:23.507000 CVE-2025-3516,0,0,a2df3bab698f4cdb6459b7ab07371b26a8ad28a7c62a1c7ac29ca859a1d3cf58,2025-05-22T17:03:25.230000 CVE-2025-3517,0,0,b833d94ab9d25f1395ed59764d2646b6bfd238c131bbe071db47d2fa76a973c3,2025-05-02T13:52:51.693000 CVE-2025-3518,0,0,7497563947f75b629887a4413d991889fb74f762947f73f77cc72069a35bed4e,2025-04-24T15:15:58.393000 @@ -293986,6 +293986,7 @@ CVE-2025-3876,0,0,98fa4965cd0fb5896f08763a0582c93ea252014e67d6fd79d41bdf5071b00a CVE-2025-3877,0,0,a620192bb17052afd6333e66b5a40238ba021cbb671fc7173692c585e43df3dd,2025-06-11T13:15:24.007000 CVE-2025-3878,0,0,6edc0413060b870ca8db342e4d416bc7330af04d97c4384be96b3d4817bff1e1,2025-05-21T13:36:16.070000 CVE-2025-3879,0,0,d832e10f3f5a35fa6f778cb83701763ba1ca0a6464dece4429751c1aa0bef5fb,2025-05-05T20:54:19.760000 +CVE-2025-3880,1,1,8ed22a4c02edd3320caae58970e266c82043d9121ffcc8e5ff9fb4666cb29edc,2025-06-17T12:15:25.870000 CVE-2025-3881,0,0,24b54933e846a45dd97d5a9a438a485d3ead998ef41689a70b444bb5ab176e29,2025-05-23T15:55:02.040000 CVE-2025-3882,0,0,c9ae33678e4df5b1046892b754c3ed5475864c05c1f0abd762dbc5e3ccf7733b,2025-05-23T15:55:02.040000 CVE-2025-3883,0,0,901aa57afaa8d1ca1c754809ac2893eff5bb9ad10a88b170dcc77060f45ed8f8,2025-05-23T15:55:02.040000 @@ -294888,6 +294889,7 @@ CVE-2025-4361,0,0,c901020b27e28024d1599c8415c6ec2466e7bee98c3672b14f162db733e59f CVE-2025-4362,0,0,4627ae0f53a83149a3759c09c97520a453789139fc5cb142d52ea024ade64abf,2025-05-28T20:00:58.567000 CVE-2025-4363,0,0,cfc7942feeb9a0f9f6312b42fa943d50981f3a9d84068f01e49e58a260df8ff8,2025-05-13T20:19:50.420000 CVE-2025-4364,0,0,7abc96b4496bfef1269854d9d4450b426753c52eb291c976d683ed2fcf48245a,2025-05-21T20:24:58.133000 +CVE-2025-4365,1,1,80f72b37820c31a5a3c8a3538a52350ac02157f5db7e533e07ed3217cd8fcf8a,2025-06-17T13:15:20.690000 CVE-2025-4366,0,0,231ab1d570625e15497e22d5b442eb1495badc7a98e284eaa21b6f30c183c146,2025-05-23T15:55:02.040000 CVE-2025-4368,0,0,5060346bbf213853af51c9b1f1ab82f240c6c047743a52b24483fa7453a5d04f,2025-05-13T20:19:54.440000 CVE-2025-43697,0,0,f1043efe55ac8e178b55f78e087508d0bf6544d27eb7c45213c2e77f7aa48499,2025-06-12T16:06:39.330000 @@ -296878,8 +296880,8 @@ CVE-2025-48792,0,0,2c0b02c33ee81c6b1c7f3bc9767aecae1b833af65e4351c0dd81998c4a119 CVE-2025-48793,0,0,c894ec9ed8b3b5d1fda9891ce2808a0fb7689dd63eec3c7bb7e9e649736a365c,2025-05-27T04:15:41.090000 CVE-2025-48794,0,0,0f60a10fd5bbac90e9e184a916afa3ee1c6a6178325620c93725d026aac184ad,2025-05-27T04:15:41.160000 CVE-2025-48796,0,0,5c467d1a2669d77ceb69e55cea05d09cde2aaa034119240321683e5490565638,2025-05-28T15:01:30.720000 -CVE-2025-48797,0,1,6c9c3a5fcc126f616b38114ac2fb651b6d32c1af461fa9f7572c4b11e946a5c3,2025-06-17T10:15:23.827000 -CVE-2025-48798,0,1,ff65f5121c0e0cda96784e173e6217bb4bf6c6642cebd0c35f064bd9a2b602ed,2025-06-17T10:15:23.967000 +CVE-2025-48797,0,0,6c9c3a5fcc126f616b38114ac2fb651b6d32c1af461fa9f7572c4b11e946a5c3,2025-06-17T10:15:23.827000 +CVE-2025-48798,0,0,ff65f5121c0e0cda96784e173e6217bb4bf6c6642cebd0c35f064bd9a2b602ed,2025-06-17T10:15:23.967000 CVE-2025-4880,0,0,e66433f376d95dc941d17745f27a53d60427f87111077aee793bacaa1dd21351,2025-05-21T17:33:42.373000 CVE-2025-4881,0,0,3fdda22eaf1afa96c9c6bfb121fd7cc7da116831a6f494c0b7df343d1eed58c4,2025-05-21T19:38:39.660000 CVE-2025-4882,0,0,9ae533a1d17c0bc7b22051d58510b828885d48326cbc794d7bf23ceba43e10c0,2025-05-21T19:38:24.990000 @@ -297203,7 +297205,7 @@ CVE-2025-49466,0,0,de46ae3d5a998ef3ced57f414f3a55cc0272bb310a4e787f30dd6b349d92f CVE-2025-49467,0,0,110ebae3ea82a19af4e25ef45b2ac9df8589c2692e3973927cf1b47933c6584e,2025-06-16T12:32:18.840000 CVE-2025-49468,0,0,0c5705ec6b92f3b27c448d7bfd07d08f75a2e07abc56bbaacb783501986cd119,2025-06-16T12:32:18.840000 CVE-2025-4947,0,0,5a2596b46f41daf47fb71d339aa3ece981233d1a2e1afb5f6d90d81a432acb92,2025-05-28T15:01:30.720000 -CVE-2025-4948,0,0,a5ca61c68a7139420f4ae3cf8d0c9e197c8ea856029d5208bdc5d22ad0659a67,2025-06-09T10:15:25.730000 +CVE-2025-4948,0,1,0e7df54c260456a30951ec3ca271c8ecd68713b1dbf742cd867d5b3aa598f5dd,2025-06-17T12:15:27.520000 CVE-2025-4949,0,0,e32a5af3d2c9a475d779933f61691d18d401479a397ade091e3e4be748dec076,2025-05-23T07:15:21.160000 CVE-2025-49507,0,0,8df57474dbf672acfe3170fcfeb7ba8c285d0e6636e6db25f644b19e631f2cda,2025-06-12T16:06:39.330000 CVE-2025-49509,0,0,83d7c029291217af9a97963b6a105646b66e999b31aeea3bf105eeb0ecb2ab96,2025-06-12T16:06:39.330000 @@ -297517,6 +297519,7 @@ CVE-2025-5286,0,0,05e7ca3386f0ef15ac2b01314d8e06913e02de8c1752e75b99b02bac231214 CVE-2025-5287,0,0,b8300f230839e0ad3335fdc92731d9b07abc7f3405256834dd55febc4f9b0133,2025-05-28T15:01:30.720000 CVE-2025-5288,0,0,5b20c7a865ed486d932e1f5165bbcfd30ae2f04bc0acfb20d9396799c2c655a3,2025-06-16T12:32:18.840000 CVE-2025-5290,0,0,ad45f62f849dd27deb380b44d26b94809d4f0499166fbd95cf7b52d6d8099374,2025-06-02T17:32:17.397000 +CVE-2025-5291,1,1,57cbf478f5d3961a545c3ba09fe26bef82982bd5321cff116130b5bab4a81f5b,2025-06-17T12:15:27.747000 CVE-2025-5292,0,0,30cec8bd4cde62e6ca85175b601b2d9fd7dc117c201a288e7f0e6414bd251b48,2025-06-02T17:32:17.397000 CVE-2025-5295,0,0,d0e6aa3b032b1532910154b10cc32ceaaf64a98256f38c6f6f628cd0a1c4bacc,2025-05-28T15:01:30.720000 CVE-2025-5297,0,0,32219ebb357b11c35687ad82e2d72808a3fe88681e14d78b6d0829c9d1dbc7ef,2025-06-10T19:33:01.990000 @@ -297543,6 +297546,7 @@ CVE-2025-5336,0,0,51ebbfc8a6c001d043ad92fbb70974a3ccedacbc8290bd5643cc8faeb9732c CVE-2025-5337,0,0,f5b214301a56cadaeebc0b9a86ddeaf885fbd4e9b8e681558e7ccfb718bae2b0,2025-06-16T12:32:18.840000 CVE-2025-5340,0,0,9b48da383be5dfbe2bc488480a2be183877451ec75241964210e2e3aad9a2ceb,2025-06-04T14:54:33.783000 CVE-2025-5341,0,0,2f7555dddd47395f556aef803e272926d99b2be1a7b798f5f5a29577ec1f1191,2025-06-05T20:12:23.777000 +CVE-2025-5349,1,1,7168ab1bd0564ec8dff103c05ed831dd4e82333b396710610b87d7abc2d9b7fa,2025-06-17T13:15:21.377000 CVE-2025-5353,0,0,a9d9e9f405a59eeaccd7ee5466c700cdd9eae2ba20f2bc9c98c5c42953abdf75,2025-06-12T16:06:39.330000 CVE-2025-5356,0,0,6a764e64fb18f100210c21c80183447ce555b33b694a7918c938b363fa173ac7,2025-06-02T17:32:17.397000 CVE-2025-5357,0,0,907468d4a23bb292098ec30159d44f17f5a58704c8b53f5a961af7ce379d277f,2025-06-16T16:26:46.080000 @@ -297808,6 +297812,7 @@ CVE-2025-5696,0,0,b4091ee0fb4fa532c5f66065f45fdcbfe956ac564f6752fbce6c2f5c6e7f4f CVE-2025-5697,0,0,e16a3d80fb06f7ce0327380d6c48a4da47ce2498c4d874e03daa95c5a77d2485,2025-06-06T14:07:28.330000 CVE-2025-5698,0,0,516450620243a6336d536db4f711e75cf0a3068f72ea66a45708384556a39a46,2025-06-06T14:07:28.330000 CVE-2025-5699,0,0,0a1565e1ee571962b106c0d60bfe684a5661c8b79bdbf83ccaf5e242dffe56c7,2025-06-06T14:07:28.330000 +CVE-2025-5700,1,1,d57912b209ba5821e1822fbc1032095ee702c6848222caead3b7a5ddd8f2be11,2025-06-17T12:15:27.960000 CVE-2025-5701,0,0,873890d0d7ee46e4c64243a1f1cf0740948dafdadf78be33a983ccdb225e9602,2025-06-05T20:12:23.777000 CVE-2025-5702,0,0,f4b41a5876bf80125fd2f1b602bb755c8f57b5d1f34dfd56969670098c786271,2025-06-05T21:15:22.873000 CVE-2025-5703,0,0,94709a108b8c052e235b42f888b0029894770c90f72ee62feea2d3d3af8ba023,2025-06-06T14:07:28.330000 @@ -297864,6 +297869,7 @@ CVE-2025-5763,0,0,a15a3a2b0366b1c66dcf3b366b895c7439dfb4d30e432b0e7f8ed791e648ad CVE-2025-5764,0,0,2d28a1f65a433690f9d2f8261def9db24023e822b530c5b66d4068781293abda,2025-06-10T19:29:57.893000 CVE-2025-5765,0,0,cf1c505b8511f3d7107b049f561769a46f8060e4722ef9f239daeb196ff8da86,2025-06-10T19:29:44.973000 CVE-2025-5766,0,0,28ff5fc5d5092ea27c0ea445f8523dc92a0b61bbfca49399a743b91e6135f816,2025-06-10T19:29:34.820000 +CVE-2025-5777,1,1,1bd9c5a365e0cd2cbe3fe7b6231443e98e5b388d00167129faf1f606cf559ac0,2025-06-17T13:15:21.523000 CVE-2025-5778,0,0,5f200e53fd6421895a453b111aeb1386ab25cc3e45de20df15c46216ef4a37f8,2025-06-09T12:15:47.880000 CVE-2025-5779,0,0,1e700fadb20c430a15a195537975215f0a5a558e649a2a5a5d9bb126f7483d20,2025-06-10T19:26:20.883000 CVE-2025-5780,0,0,291144f4a381da80b9438fe643e4a6c8cc152547ccff2703d0e51362f127b808,2025-06-10T19:26:11.937000 @@ -298007,13 +298013,14 @@ CVE-2025-6007,0,0,0a6b30e00b610d68c64f9ae664f6748f210976b9ca69a527a02472b830ffa8 CVE-2025-6008,0,0,bdfd3cc3e4441917f3e7587cffe8368d1b175ba60e9dbe2f7dbae2a1b2f94481,2025-06-12T16:06:20.180000 CVE-2025-6009,0,0,45d2cd3c349eec086d7dbf8e5d3677c0ad4a90d0009e476cec317ccc54ba0f3a,2025-06-12T16:06:20.180000 CVE-2025-6012,0,0,26f2f66d87f45d6aa756cc004552cfa11ed42d44708395d664a6658fe8d21b45,2025-06-16T12:32:18.840000 +CVE-2025-6020,1,1,15461c4f32d00084c271b3d4be305f7f9e815d30c9797d34455d7765b875a35c,2025-06-17T13:15:21.660000 CVE-2025-6021,0,0,4d6c316d6b2265feaa5a1f1976caab5acbb233a1583e3791720a0a82dcf439c4,2025-06-12T16:06:20.180000 CVE-2025-6029,0,0,e9108be7e98d0780991a9dbc9771d79381463de686ea76ad25b1212ca465841e,2025-06-16T12:32:18.840000 CVE-2025-6030,0,0,e2d083f85b4980fab673be25fe64ff6c58fe5f2e84e15893b8c80d92f1561a4f,2025-06-16T12:32:18.840000 CVE-2025-6031,0,0,8862006220262f75545734fb5f034c6db29d3c4cbd11030b12e4d70636f9f9cc,2025-06-16T12:32:18.840000 CVE-2025-6035,0,0,b71b50bc0c235c19b2d078bb69ae3921b820489d58f8688dea7a7bdd7515f125,2025-06-16T12:32:18.840000 CVE-2025-6040,0,0,76a8c143b5834b0cf93cda3bf80ab595e40b144f2532ce0d72ddcf42d08934bb,2025-06-16T12:32:18.840000 -CVE-2025-6050,1,1,4160fbf34cb6f235169f679400d6fd080b6cdc16d27847510197ce99aa0f5916,2025-06-17T11:15:22.400000 +CVE-2025-6050,0,0,4160fbf34cb6f235169f679400d6fd080b6cdc16d27847510197ce99aa0f5916,2025-06-17T11:15:22.400000 CVE-2025-6052,0,0,f7b8f6bed96346c732cfe3c58915aaa99b04704580ca581c3769d9ac03c1036c,2025-06-16T12:32:18.840000 CVE-2025-6055,0,0,a1414c05d6a8565eece9cbd85c74aae5128e8846318652e194e65bb36ec8b3a2,2025-06-16T12:32:18.840000 CVE-2025-6059,0,0,84d0ce35ead1515ece8397572c27c6a293b39d090719f8fde70ea6fa5e96acd4,2025-06-16T12:32:18.840000