Auto-Update: 2025-06-02T16:00:13.679810+00:00

This commit is contained in:
cad-safe-bot 2025-06-02 16:03:48 +00:00
parent 8913de9814
commit 2e9238d0de
75 changed files with 2776 additions and 241 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-0376",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-01-16T16:15:10.487",
"lastModified": "2024-11-21T07:37:04.500",
"lastModified": "2025-06-02T15:15:21.640",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-0769",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-01-16T16:15:10.623",
"lastModified": "2024-11-21T07:37:47.100",
"lastModified": "2025-06-02T15:15:22.307",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-2252",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-01-16T16:15:10.773",
"lastModified": "2024-11-21T07:58:14.590",
"lastModified": "2025-06-02T15:15:22.787",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 2.7,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.2,
"impactScore": 1.4
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-27168",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-19T14:15:12.247",
"lastModified": "2024-11-21T07:52:24.970",
"lastModified": "2025-06-02T15:15:22.550",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-434"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-46952",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-17T03:15:07.997",
"lastModified": "2024-11-21T08:29:32.620",
"lastModified": "2025-06-02T15:15:23.287",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-48345",
"sourceIdentifier": "security@unisoc.com",
"published": "2024-01-18T03:15:57.520",
"lastModified": "2024-11-21T08:31:31.977",
"lastModified": "2025-06-02T15:15:23.490",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-125"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-48858",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-17T20:15:50.573",
"lastModified": "2024-11-21T08:32:33.407",
"lastModified": "2025-06-02T15:15:23.687",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-49943",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-18T19:15:09.340",
"lastModified": "2024-11-21T08:34:03.063",
"lastModified": "2025-06-02T15:15:23.877",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-50028",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-19T14:15:12.413",
"lastModified": "2024-11-21T08:36:28.603",
"lastModified": "2025-06-02T15:15:24.133",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-50614",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-18T22:15:10.843",
"lastModified": "2024-11-21T08:37:06.697",
"lastModified": "2025-06-02T15:15:24.323",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-319"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-319"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50726",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-13T21:15:54.797",
"lastModified": "2024-11-21T08:37:13.270",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-02T14:35:20.430",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
@ -49,32 +69,93 @@
"value": "CWE-269"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.2.0",
"versionEndExcluding": "2.8.12",
"matchCriteriaId": "97F9C576-36FB-4689-A614-7E187420E645"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.9.0",
"versionEndExcluding": "2.9.7",
"matchCriteriaId": "67EED14E-C1EF-475C-87BF-3714537EC2B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.10.0",
"versionEndExcluding": "2.10.3",
"matchCriteriaId": "91F1733A-B8C1-4676-96B5-C9EF16E9C23B"
}
]
}
]
}
],
"references": [
{
"url": "https://argo-cd.readthedocs.io/en/latest/operator-manual/rbac",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/argoproj/argo-cd/commit/3b8f673f06c2d228e01cbc830e5cb57cef008978",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-g623-jcgg-mhmm",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://argo-cd.readthedocs.io/en/latest/operator-manual/rbac",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://github.com/argoproj/argo-cd/commit/3b8f673f06c2d228e01cbc830e5cb57cef008978",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-g623-jcgg-mhmm",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-51217",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-18T21:15:08.243",
"lastModified": "2024-11-21T08:37:54.923",
"lastModified": "2025-06-02T15:15:24.520",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-78"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-52069",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-17T03:15:08.043",
"lastModified": "2024-11-21T08:39:06.227",
"lastModified": "2025-06-02T15:15:25.000",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5922",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-01-16T16:15:13.487",
"lastModified": "2024-11-21T08:42:47.117",
"lastModified": "2025-06-02T15:15:25.183",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-6292",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-01-16T16:15:13.640",
"lastModified": "2024-11-21T08:43:32.790",
"lastModified": "2025-06-02T15:15:25.403",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-6732",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-01-16T16:15:13.817",
"lastModified": "2024-11-21T08:44:26.687",
"lastModified": "2025-06-02T15:15:25.687",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-7083",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-01-16T16:15:13.973",
"lastModified": "2024-11-21T08:45:13.047",
"lastModified": "2025-06-02T15:15:25.847",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-7151",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-01-16T16:15:14.130",
"lastModified": "2024-11-21T08:45:23.173",
"lastModified": "2025-06-02T15:15:26.013",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-0237",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-01-16T16:15:14.413",
"lastModified": "2024-11-21T08:46:07.443",
"lastModified": "2025-06-02T15:15:26.280",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-0238",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-01-16T16:15:14.467",
"lastModified": "2024-11-21T08:46:07.550",
"lastModified": "2025-06-02T15:15:26.457",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -53,6 +73,16 @@
"value": "CWE-862"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-0381",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-01-18T08:15:40.000",
"lastModified": "2024-11-21T08:46:27.643",
"lastModified": "2025-06-02T15:15:26.620",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-0405",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-01-17T05:15:08.913",
"lastModified": "2024-11-21T08:46:30.777",
"lastModified": "2025-06-02T15:15:26.800",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-12087",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-01-14T18:15:25.467",
"lastModified": "2025-05-13T10:15:20.010",
"lastModified": "2025-06-02T15:15:27.363",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -60,6 +60,10 @@
"url": "https://access.redhat.com/errata/RHSA-2025:7050",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2025:8385",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-12087",
"source": "secalert@redhat.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-12088",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-01-14T18:15:25.643",
"lastModified": "2025-05-13T10:15:20.170",
"lastModified": "2025-06-02T15:15:27.540",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -60,6 +60,10 @@
"url": "https://access.redhat.com/errata/RHSA-2025:7050",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2025:8385",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-12088",
"source": "secalert@redhat.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-12133",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-02-10T16:15:37.260",
"lastModified": "2025-05-23T14:15:24.510",
"lastModified": "2025-06-02T15:15:27.653",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -64,6 +64,10 @@
"url": "https://access.redhat.com/errata/RHSA-2025:8021",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2025:8385",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-12133",
"source": "secalert@redhat.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-12243",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-02-10T16:15:37.423",
"lastModified": "2025-05-23T14:15:25.293",
"lastModified": "2025-06-02T15:15:27.810",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -64,6 +64,10 @@
"url": "https://access.redhat.com/errata/RHSA-2025:8020",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2025:8385",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-12243",
"source": "secalert@redhat.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-12747",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-01-14T18:15:25.830",
"lastModified": "2025-05-13T10:15:20.300",
"lastModified": "2025-06-02T15:15:27.937",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -60,6 +60,10 @@
"url": "https://access.redhat.com/errata/RHSA-2025:7050",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2025:8385",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-12747",
"source": "secalert@redhat.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-20270",
"sourceIdentifier": "psirt@cisco.com",
"published": "2024-01-17T17:15:11.627",
"lastModified": "2024-11-21T08:52:09.830",
"lastModified": "2025-06-02T15:15:28.117",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -62,7 +62,7 @@
"weaknesses": [
{
"source": "psirt@cisco.com",
"type": "Secondary",
"type": "Primary",
"description": [
{
"lang": "en",
@ -72,7 +72,17 @@
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-20272",
"sourceIdentifier": "psirt@cisco.com",
"published": "2024-01-17T17:15:12.130",
"lastModified": "2024-11-21T08:52:12.043",
"lastModified": "2025-06-02T15:15:29.633",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -62,7 +62,7 @@
"weaknesses": [
{
"source": "psirt@cisco.com",
"type": "Secondary",
"type": "Primary",
"description": [
{
"lang": "en",
@ -72,13 +72,23 @@
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-20287",
"sourceIdentifier": "psirt@cisco.com",
"published": "2024-01-17T17:15:12.467",
"lastModified": "2024-11-21T08:52:13.810",
"lastModified": "2025-06-02T15:15:29.810",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -62,7 +62,7 @@
"weaknesses": [
{
"source": "psirt@cisco.com",
"type": "Secondary",
"type": "Primary",
"description": [
{
"lang": "en",
@ -72,13 +72,23 @@
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-88"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2007",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-21T02:52:25.977",
"lastModified": "2024-11-21T09:08:47.890",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-02T15:32:05.250",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.0,
"impactScore": 6.0
}
],
"cvssMetricV2": [
@ -76,30 +96,71 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openbmb:xagent:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BE320A72-ECE1-458F-876F-A57E0D3CB4DF"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/OpenBMB/XAgent/issues/386",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.255265",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.255265",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/OpenBMB/XAgent/issues/386",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.255265",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.255265",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21722",
"sourceIdentifier": "security@joomla.org",
"published": "2024-02-29T01:44:03.627",
"lastModified": "2024-11-21T08:54:52.290",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-02T15:28:56.793",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,16 +49,65 @@
"value": "CWE-613"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-613"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.2.0",
"versionEndExcluding": "3.10.15",
"matchCriteriaId": "ADD499D3-EEF2-48F7-96B1-66AFA4A1E74C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.0.0",
"versionEndExcluding": "4.4.3",
"matchCriteriaId": "4CE95A6B-EFBA-4A53-839A-E13864511CEB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.0.0",
"versionEndExcluding": "5.0.3",
"matchCriteriaId": "448756BA-E10C-4587-A54B-AD8B81EEF150"
}
]
}
]
}
],
"references": [
{
"url": "https://developer.joomla.org/security-centre/925-20240201-core-insufficient-session-expiration-in-mfa-management-views.html",
"source": "security@joomla.org"
"source": "security@joomla.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://developer.joomla.org/security-centre/925-20240201-core-insufficient-session-expiration-in-mfa-management-views.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21723",
"sourceIdentifier": "security@joomla.org",
"published": "2024-02-29T01:44:03.707",
"lastModified": "2024-12-02T16:15:08.967",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-02T15:27:37.210",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,16 +49,65 @@
"value": "CWE-601"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.5.0",
"versionEndExcluding": "3.10.15",
"matchCriteriaId": "F482DF95-E076-4F5A-A2EC-66CEF6B1E863"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.0.0",
"versionEndExcluding": "4.4.3",
"matchCriteriaId": "4CE95A6B-EFBA-4A53-839A-E13864511CEB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.0.0",
"versionEndExcluding": "5.0.3",
"matchCriteriaId": "448756BA-E10C-4587-A54B-AD8B81EEF150"
}
]
}
]
}
],
"references": [
{
"url": "https://developer.joomla.org/security-centre/926-20240202-core-open-redirect-in-installation-application.html",
"source": "security@joomla.org"
"source": "security@joomla.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://developer.joomla.org/security-centre/926-20240202-core-open-redirect-in-installation-application.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21725",
"sourceIdentifier": "security@joomla.org",
"published": "2024-02-29T01:44:03.837",
"lastModified": "2024-11-21T08:54:52.683",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-02T15:27:04.010",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,14 +61,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.0.0",
"versionEndExcluding": "4.4.3",
"matchCriteriaId": "4CE95A6B-EFBA-4A53-839A-E13864511CEB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.0.0",
"versionEndExcluding": "5.0.3",
"matchCriteriaId": "448756BA-E10C-4587-A54B-AD8B81EEF150"
}
]
}
]
}
],
"references": [
{
"url": "https://developer.joomla.org/security-centre/928-20240204-core-xss-in-mail-address-outputs.html",
"source": "security@joomla.org"
"source": "security@joomla.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://developer.joomla.org/security-centre/928-20240204-core-xss-in-mail-address-outputs.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21726",
"sourceIdentifier": "security@joomla.org",
"published": "2024-02-29T01:44:03.897",
"lastModified": "2024-12-13T11:15:07.320",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-02T14:41:33.100",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,20 +49,73 @@
"value": "CWE-79"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.7.0",
"versionEndIncluding": "3.10.15",
"matchCriteriaId": "C3D02EFE-2ED7-4D56-AEEA-F562317FEE45"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.0.0",
"versionEndExcluding": "4.4.3",
"matchCriteriaId": "4CE95A6B-EFBA-4A53-839A-E13864511CEB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.0.0",
"versionEndExcluding": "5.0.3",
"matchCriteriaId": "448756BA-E10C-4587-A54B-AD8B81EEF150"
}
]
}
]
}
],
"references": [
{
"url": "https://developer.joomla.org/security-centre/929-20240205-core-inadequate-content-filtering-within-the-filter-code.html",
"source": "security@joomla.org"
"source": "security@joomla.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.sonarsource.com/blog/joomla-multiple-xss-vulnerabilities/",
"source": "security@joomla.org"
"source": "security@joomla.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://developer.joomla.org/security-centre/929-20240205-core-inadequate-content-filtering-within-the-filter-code.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-22563",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-19T15:15:09.513",
"lastModified": "2024-11-21T08:56:27.410",
"lastModified": "2025-06-02T15:15:31.033",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-401"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
}
],
"configurations": [
@ -82,6 +112,13 @@
"tags": [
"Issue Tracking"
]
},
{
"url": "https://github.com/openvswitch/ovs-issues/issues/315",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Issue Tracking"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-22592",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-18T15:15:09.813",
"lastModified": "2024-11-21T08:56:28.763",
"lastModified": "2025-06-02T15:15:31.233",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-352"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-22819",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-18T17:15:14.623",
"lastModified": "2024-11-21T08:56:41.107",
"lastModified": "2025-06-02T15:15:31.413",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-352"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-22877",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-19T14:15:13.557",
"lastModified": "2024-11-21T08:56:44.530",
"lastModified": "2025-06-02T15:15:31.593",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23525",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-18T00:15:38.590",
"lastModified": "2024-11-21T08:57:53.423",
"lastModified": "2025-06-02T15:15:31.777",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-611"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-611"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23659",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-19T05:15:09.233",
"lastModified": "2024-11-21T08:58:06.740",
"lastModified": "2025-06-02T15:15:32.007",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25228",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-14T02:15:50.613",
"lastModified": "2024-11-21T09:00:30.977",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-02T14:26:22.573",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,54 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vinchin:vinchin_backup_and_recovery:*:*:*:*:*:*:*:*",
"versionEndIncluding": "7.2",
"matchCriteriaId": "3891B5A9-CDD6-4BA5-A9E4-D320804835B2"
}
]
}
]
}
],
"references": [
{
"url": "https://blog.leakix.net/2024/01/vinchin-backup-rce-chain/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://seclists.org/fulldisclosure/2024/Mar/15",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://blog.leakix.net/2024/01/vinchin-backup-rce-chain/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://seclists.org/fulldisclosure/2024/Mar/15",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28069",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-16T06:15:13.763",
"lastModified": "2025-03-18T14:15:38.693",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-02T14:19:11.623",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mitel:micontact_center_business:*:*:*:*:*:*:*:*",
"versionEndIncluding": "10.0.0.4",
"matchCriteriaId": "AB4FCCA2-E401-4652-82F1-14E9F65BE2F8"
}
]
}
]
}
],
"references": [
{
"url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-24-0001",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-24-0001",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28070",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-16T06:15:14.117",
"lastModified": "2025-03-20T20:15:31.707",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-02T14:18:03.163",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mitel:micontact_center_business:*:*:*:*:*:*:*:*",
"versionEndIncluding": "10.0.0.4",
"matchCriteriaId": "AB4FCCA2-E401-4652-82F1-14E9F65BE2F8"
}
]
}
]
}
],
"references": [
{
"url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-24-0002",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-24-0002",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28123",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-21T02:52:23.827",
"lastModified": "2024-11-21T09:05:51.980",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-02T14:06:34.380",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,32 +69,79 @@
"value": "CWE-787"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wasmi-labs:wasmi:*:*:*:*:*:rust:*:*",
"versionStartIncluding": "0.15.0",
"versionEndExcluding": "0.31.1",
"matchCriteriaId": "DAB41919-ADBF-4CC4-B289-F15B7F68460C"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/wasmi-labs/wasmi/commit/f7b3200e9f3dc9e2cbca966cb255c228453c792f",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/wasmi-labs/wasmi/releases/tag/v0.31.1",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/wasmi-labs/wasmi/security/advisories/GHSA-75jp-vq8x-h4cq",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://github.com/wasmi-labs/wasmi/commit/f7b3200e9f3dc9e2cbca966cb255c228453c792f",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/wasmi-labs/wasmi/releases/tag/v0.31.1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/wasmi-labs/wasmi/security/advisories/GHSA-75jp-vq8x-h4cq",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35753",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-08T11:15:49.193",
"lastModified": "2024-11-21T09:20:48.897",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-02T15:56:33.503",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -90,9 +90,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:templatesnext:templatesnext_onepager:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:templatesnext:onepager:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.3.3",
"matchCriteriaId": "7E584626-F9B4-43C2-BAC0-2BBDC3FE079C"
"matchCriteriaId": "41046D5B-02DD-4AC3-9BC7-783E21393DBE"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45689",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2024-11-20T11:15:05.337",
"lastModified": "2024-11-21T13:57:24.187",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-02T15:33:57.730",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,10 +39,64 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.1.13",
"matchCriteriaId": "FFA99B07-9756-4DF8-A807-72D175B485F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.2.0",
"versionEndExcluding": "4.2.10",
"matchCriteriaId": "9BA66423-C6E4-4083-A957-D8DAC924FA7D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.3.0",
"versionEndExcluding": "4.3.7",
"matchCriteriaId": "22C8E2F5-D5D6-4309-91AB-C5AF23255D2C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.4.0",
"versionEndExcluding": "4.4.3",
"matchCriteriaId": "5CD03E57-232E-442C-B1E0-9C0974006F78"
}
]
}
]
}
],
"references": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309941",
"source": "patrick@puiterwijk.org"
"source": "patrick@puiterwijk.org",
"tags": [
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45690",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2024-11-20T11:15:05.413",
"lastModified": "2024-11-27T15:15:26.050",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-02T15:34:48.510",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,59 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.1.13",
"matchCriteriaId": "FFA99B07-9756-4DF8-A807-72D175B485F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.2.0",
"versionEndExcluding": "4.2.10",
"matchCriteriaId": "9BA66423-C6E4-4083-A957-D8DAC924FA7D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.3.0",
"versionEndExcluding": "4.3.7",
"matchCriteriaId": "22C8E2F5-D5D6-4309-91AB-C5AF23255D2C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.4.0",
"versionEndExcluding": "4.4.3",
"matchCriteriaId": "5CD03E57-232E-442C-B1E0-9C0974006F78"
}
]
}
]
}
],
"references": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309939",
"source": "patrick@puiterwijk.org"
"source": "patrick@puiterwijk.org",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://moodle.org/security/",
"source": "patrick@puiterwijk.org"
"source": "patrick@puiterwijk.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45691",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2024-11-20T11:15:05.490",
"lastModified": "2024-11-21T13:57:24.187",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-02T15:35:23.890",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,71 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.1.13",
"matchCriteriaId": "FFA99B07-9756-4DF8-A807-72D175B485F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.2.0",
"versionEndExcluding": "4.2.10",
"matchCriteriaId": "9BA66423-C6E4-4083-A957-D8DAC924FA7D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.3.0",
"versionEndExcluding": "4.3.7",
"matchCriteriaId": "22C8E2F5-D5D6-4309-91AB-C5AF23255D2C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.4.0",
"versionEndExcluding": "4.4.3",
"matchCriteriaId": "5CD03E57-232E-442C-B1E0-9C0974006F78"
}
]
}
]
}
],
"references": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309940",
"source": "patrick@puiterwijk.org"
"source": "patrick@puiterwijk.org",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://moodle.org/security/",
"source": "patrick@puiterwijk.org"
"source": "patrick@puiterwijk.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-48877",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2025-06-02T15:15:32.200",
"lastModified": "2025-06-02T15:15:32.200",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A memory corruption vulnerability exists in the Shared String Table Record Parser implementation in xls2csv utility version 0.95. A specially crafted malformed file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "talos-cna@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "talos-cna@cisco.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-680"
}
]
}
],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-2128",
"source": "talos-cna@cisco.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-48899",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2024-11-20T11:15:05.563",
"lastModified": "2024-11-21T13:57:24.187",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-02T15:36:03.710",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,12 +49,44 @@
"value": "CWE-284"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.4.0",
"versionEndExcluding": "4.4.4",
"matchCriteriaId": "8E1F89F0-D04C-41A0-89D2-C45C94F29967"
}
]
}
]
}
],
"references": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318819",
"source": "patrick@puiterwijk.org"
"source": "patrick@puiterwijk.org",
"tags": [
"Issue Tracking"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-52035",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2025-06-02T15:15:32.377",
"lastModified": "2025-06-02T15:15:32.377",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An integer overflow vulnerability exists in the OLE Document File Allocation Table Parser functionality of catdoc 0.95. A specially crafted malformed file can lead to heap-based memory corruption. An attacker can provide a malicious file to trigger this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "talos-cna@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "talos-cna@cisco.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-2131",
"source": "talos-cna@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-54028",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2025-06-02T15:15:32.537",
"lastModified": "2025-06-02T15:15:32.537",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An integer underflow vulnerability exists in the OLE Document DIFAT Parser functionality of catdoc 0.95. A specially crafted malformed file can lead to heap-based memory corruption. An attacker can provide a malicious file to trigger this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "talos-cna@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "talos-cna@cisco.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-191"
}
]
}
],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-2132",
"source": "talos-cna@cisco.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-57783",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-02T14:15:21.170",
"lastModified": "2025-06-02T14:15:21.170",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The desktop application in Dot through 0.9.3 allows XSS and resultant command execution because user input and LLM output are appended to the DOM with innerHTML (in render.js), and because the Electron window can access Node.js APIs."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.4,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://dotapp.uk",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/EDMPL/Vulnerability-Research/tree/main/CVE-2024-57783",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/alexpinel/Dot/issues/28",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-8176",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-03-14T09:15:14.157",
"lastModified": "2025-05-13T23:15:21.950",
"lastModified": "2025-06-02T15:15:32.773",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -92,6 +92,10 @@
"url": "https://access.redhat.com/errata/RHSA-2025:7512",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2025:8385",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-8176",
"source": "secalert@redhat.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-0073",
"sourceIdentifier": "arm-security@arm.com",
"published": "2025-06-02T11:15:21.067",
"lastModified": "2025-06-02T11:15:21.067",
"lastModified": "2025-06-02T15:15:32.967",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,30 @@
"value": "Use After Free vulnerability in Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user process to perform improper GPU memory processing operations to gain access to already freed memory.This issue affects Valhall GPU Kernel Driver: from r53p0 before r54p0; Arm 5th Gen GPU Architecture Kernel Driver: from r53p0 before r54p0."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "arm-security@arm.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-0819",
"sourceIdentifier": "arm-security@arm.com",
"published": "2025-06-02T11:15:21.707",
"lastModified": "2025-06-02T11:15:21.707",
"lastModified": "2025-06-02T14:15:22.580",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,30 @@
"value": "Use After Free vulnerability in Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user process to perform valid GPU memory processing operations to gain access to already freed memory.This issue affects Bifrost GPU Kernel Driver: from r44p0 through r49p3, from r50p0 through r51p0; Valhall GPU Kernel Driver: from r44p0 through r49p3, from r50p0 through r54p0; Arm 5th Gen GPU Architecture Kernel Driver: from r44p0 through r49p3, from r50p0 through r54p0."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "arm-security@arm.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-1246",
"sourceIdentifier": "arm-security@arm.com",
"published": "2025-06-02T11:15:21.823",
"lastModified": "2025-06-02T11:15:21.823",
"lastModified": "2025-06-02T14:15:22.753",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,30 @@
"value": "Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Arm Ltd Bifrost GPU Userspace Driver, Arm Ltd Valhall GPU Userspace Driver, Arm Ltd Arm 5th Gen GPU Architecture Userspace Driver allows a non-privileged user process to perform valid GPU processing operations, including via WebGL or WebGPU, to access outside of buffer bounds.This issue affects Bifrost GPU Userspace Driver: from r18p0 through r49p3, from r50p0 through r51p0; Valhall GPU Userspace Driver: from r28p0 through r49p3, from r50p0 through r54p0; Arm 5th Gen GPU Architecture Userspace Driver: from r41p0 through r49p3, from r50p0 through r54p0."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "arm-security@arm.com",

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-20001",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2025-06-02T15:15:33.110",
"lastModified": "2025-06-02T15:15:33.110",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An out-of-bounds read vulnerability exists in High-Logic FontCreator 15.0.0.3015. A specially crafted font file can trigger this vulnerability which can lead to disclosure of sensitive information. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "talos-cna@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "talos-cna@cisco.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2025-2157",
"source": "talos-cna@cisco.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-25179",
"sourceIdentifier": "367425dc-4d06-4041-9650-c2dc6aaa27ce",
"published": "2025-06-02T05:15:20.160",
"lastModified": "2025-06-02T05:15:20.160",
"lastModified": "2025-06-02T15:15:33.260",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,30 @@
"value": "Software installed and run as a non-privileged user may conduct improper GPU system calls to subvert GPU HW to write to arbitrary physical memory pages."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "367425dc-4d06-4041-9650-c2dc6aaa27ce",

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-26465",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-02-18T19:15:29.230",
"lastModified": "2025-05-27T16:15:30.890",
"lastModified": "2025-06-02T15:15:33.437",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -154,6 +154,10 @@
"url": "https://access.redhat.com/errata/RHSA-2025:6993",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2025:8385",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2025-26465",
"source": "secalert@redhat.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-31263",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-05-29T22:15:22.250",
"lastModified": "2025-05-30T22:15:22.317",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-02T15:59:55.480",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "15.4",
"matchCriteriaId": "E3BD0A90-23F1-430A-8119-E14055F7E621"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-31264",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-05-29T22:15:22.350",
"lastModified": "2025-05-30T22:15:22.463",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-02T15:59:48.713",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,18 +51,62 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.7.5",
"matchCriteriaId": "345CC17A-CCA4-4B82-A645-A5226A8DAEBB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "14.7.5",
"matchCriteriaId": "D05DCA25-A1A0-4AEA-9F31-952803114EE2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.0",
"versionEndExcluding": "15.4",
"matchCriteriaId": "1320B815-0457-4276-83B9-AFAFDAF17EDA"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,66 @@
{
"id": "CVE-2025-37089",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2025-06-02T14:15:22.993",
"lastModified": "2025-06-02T15:15:33.653",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A command injection remote code execution vulnerability exists in HPE StoreOnce Software."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-alert@hpe.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbst04847en_us&docLocale=en_US",
"source": "security-alert@hpe.com"
}
]
}

View File

@ -0,0 +1,66 @@
{
"id": "CVE-2025-37090",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2025-06-02T14:15:23.163",
"lastModified": "2025-06-02T15:15:33.767",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A server-side request forgery vulnerability\u00a0exists in HPE StoreOnce Software."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-alert@hpe.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbst04847en_us&docLocale=en_US",
"source": "security-alert@hpe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-37091",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2025-06-02T14:15:23.310",
"lastModified": "2025-06-02T14:15:23.310",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A command injection remote code execution vulnerability\u00a0exists in HPE StoreOnce Software."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-alert@hpe.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbst04847en_us&docLocale=en_US",
"source": "security-alert@hpe.com"
}
]
}

View File

@ -0,0 +1,66 @@
{
"id": "CVE-2025-37092",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2025-06-02T14:15:23.467",
"lastModified": "2025-06-02T15:15:33.947",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A command injection remote code execution vulnerability exists in HPE StoreOnce Software."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-alert@hpe.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbst04847en_us&docLocale=en_US",
"source": "security-alert@hpe.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2025-37093",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2025-06-02T14:15:23.590",
"lastModified": "2025-06-02T14:15:23.590",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An authentication bypass vulnerability\u00a0exists in HPE StoreOnce Software."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-alert@hpe.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbst04847en_us&docLocale=en_US",
"source": "security-alert@hpe.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2025-37094",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2025-06-02T14:15:23.720",
"lastModified": "2025-06-02T14:15:23.720",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A directory traversal arbitrary file deletion vulnerability\u00a0exists in HPE StoreOnce Software."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-alert@hpe.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 4.2
}
]
},
"references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbst04847en_us&docLocale=en_US",
"source": "security-alert@hpe.com"
}
]
}

View File

@ -0,0 +1,66 @@
{
"id": "CVE-2025-37095",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2025-06-02T15:15:34.060",
"lastModified": "2025-06-02T15:15:34.060",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A directory traversal information disclosure vulnerability\u00a0exists in HPE StoreOnce Software."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-alert@hpe.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbst04847en_us&docLocale=en_US",
"source": "security-alert@hpe.com"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-37096",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2025-06-02T15:15:34.193",
"lastModified": "2025-06-02T15:15:34.193",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A command injection remote code execution vulnerability exists in HPE StoreOnce Software."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-alert@hpe.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbst04847en_us&docLocale=en_US",
"source": "security-alert@hpe.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-44172",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-02T15:15:34.317",
"lastModified": "2025-06-02T15:15:34.317",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tenda AC6 V15.03.05.16 was discovered to contain a stack overflow via the time parameter in the setSmartPowerManagement function."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/hcxj/Tenda-Vul/blob/main/setSmartPowerManagement.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-5447",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-02T14:15:24.400",
"lastModified": "2025-06-02T14:15:24.400",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. It has been declared as critical. This vulnerability affects the function ssid1MACFilter of the file /goform/ssid1MACFilter. The manipulation of the argument apselect_%d/newap_text_%d leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
},
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_10/10.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.310786",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.310786",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.584369",
"source": "cna@vuldb.com"
},
{
"url": "https://www.linksys.com/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-06-02T14:00:19.743193+00:00
2025-06-02T16:00:13.679810+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-06-02T13:59:05.650000+00:00
2025-06-02T15:59:55.480000+00:00
```
### Last Data Feed Release
@ -33,42 +33,59 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
296209
296224
```
### CVEs added in the last Commit
Recently added CVEs: `14`
Recently added CVEs: `15`
- [CVE-2024-12168](CVE-2024/CVE-2024-121xx/CVE-2024-12168.json) (`2025-06-02T13:15:20.517`)
- [CVE-2025-26396](CVE-2025/CVE-2025-263xx/CVE-2025-26396.json) (`2025-06-02T13:15:21.367`)
- [CVE-2025-46806](CVE-2025/CVE-2025-468xx/CVE-2025-46806.json) (`2025-06-02T13:15:21.600`)
- [CVE-2025-46807](CVE-2025/CVE-2025-468xx/CVE-2025-46807.json) (`2025-06-02T12:15:24.800`)
- [CVE-2025-48495](CVE-2025/CVE-2025-484xx/CVE-2025-48495.json) (`2025-06-02T12:15:25.380`)
- [CVE-2025-48745](CVE-2025/CVE-2025-487xx/CVE-2025-48745.json) (`2025-06-02T13:15:21.897`)
- [CVE-2025-48955](CVE-2025/CVE-2025-489xx/CVE-2025-48955.json) (`2025-06-02T12:15:25.523`)
- [CVE-2025-48957](CVE-2025/CVE-2025-489xx/CVE-2025-48957.json) (`2025-06-02T12:15:25.680`)
- [CVE-2025-48958](CVE-2025/CVE-2025-489xx/CVE-2025-48958.json) (`2025-06-02T12:15:25.840`)
- [CVE-2025-48990](CVE-2025/CVE-2025-489xx/CVE-2025-48990.json) (`2025-06-02T12:15:25.997`)
- [CVE-2025-5443](CVE-2025/CVE-2025-54xx/CVE-2025-5443.json) (`2025-06-02T12:15:26.143`)
- [CVE-2025-5444](CVE-2025/CVE-2025-54xx/CVE-2025-5444.json) (`2025-06-02T12:15:26.337`)
- [CVE-2025-5445](CVE-2025/CVE-2025-54xx/CVE-2025-5445.json) (`2025-06-02T13:15:22.910`)
- [CVE-2025-5446](CVE-2025/CVE-2025-54xx/CVE-2025-5446.json) (`2025-06-02T13:15:23.097`)
- [CVE-2024-48877](CVE-2024/CVE-2024-488xx/CVE-2024-48877.json) (`2025-06-02T15:15:32.200`)
- [CVE-2024-52035](CVE-2024/CVE-2024-520xx/CVE-2024-52035.json) (`2025-06-02T15:15:32.377`)
- [CVE-2024-54028](CVE-2024/CVE-2024-540xx/CVE-2024-54028.json) (`2025-06-02T15:15:32.537`)
- [CVE-2024-57783](CVE-2024/CVE-2024-577xx/CVE-2024-57783.json) (`2025-06-02T14:15:21.170`)
- [CVE-2025-20001](CVE-2025/CVE-2025-200xx/CVE-2025-20001.json) (`2025-06-02T15:15:33.110`)
- [CVE-2025-37089](CVE-2025/CVE-2025-370xx/CVE-2025-37089.json) (`2025-06-02T14:15:22.993`)
- [CVE-2025-37090](CVE-2025/CVE-2025-370xx/CVE-2025-37090.json) (`2025-06-02T14:15:23.163`)
- [CVE-2025-37091](CVE-2025/CVE-2025-370xx/CVE-2025-37091.json) (`2025-06-02T14:15:23.310`)
- [CVE-2025-37092](CVE-2025/CVE-2025-370xx/CVE-2025-37092.json) (`2025-06-02T14:15:23.467`)
- [CVE-2025-37093](CVE-2025/CVE-2025-370xx/CVE-2025-37093.json) (`2025-06-02T14:15:23.590`)
- [CVE-2025-37094](CVE-2025/CVE-2025-370xx/CVE-2025-37094.json) (`2025-06-02T14:15:23.720`)
- [CVE-2025-37095](CVE-2025/CVE-2025-370xx/CVE-2025-37095.json) (`2025-06-02T15:15:34.060`)
- [CVE-2025-37096](CVE-2025/CVE-2025-370xx/CVE-2025-37096.json) (`2025-06-02T15:15:34.193`)
- [CVE-2025-44172](CVE-2025/CVE-2025-441xx/CVE-2025-44172.json) (`2025-06-02T15:15:34.317`)
- [CVE-2025-5447](CVE-2025/CVE-2025-54xx/CVE-2025-5447.json) (`2025-06-02T14:15:24.400`)
### CVEs modified in the last Commit
Recently modified CVEs: `9`
Recently modified CVEs: `58`
- [CVE-2024-26467](CVE-2024/CVE-2024-264xx/CVE-2024-26467.json) (`2025-06-02T13:46:43.653`)
- [CVE-2024-26468](CVE-2024/CVE-2024-264xx/CVE-2024-26468.json) (`2025-06-02T13:55:25.737`)
- [CVE-2024-28286](CVE-2024/CVE-2024-282xx/CVE-2024-28286.json) (`2025-06-02T13:59:05.650`)
- [CVE-2025-47289](CVE-2025/CVE-2025-472xx/CVE-2025-47289.json) (`2025-06-02T13:15:21.743`)
- [CVE-2025-49113](CVE-2025/CVE-2025-491xx/CVE-2025-49113.json) (`2025-06-02T13:15:21.987`)
- [CVE-2025-5428](CVE-2025/CVE-2025-54xx/CVE-2025-5428.json) (`2025-06-02T13:15:22.140`)
- [CVE-2025-5430](CVE-2025/CVE-2025-54xx/CVE-2025-5430.json) (`2025-06-02T13:15:22.277`)
- [CVE-2025-5431](CVE-2025/CVE-2025-54xx/CVE-2025-5431.json) (`2025-06-02T13:15:22.403`)
- [CVE-2025-5432](CVE-2025/CVE-2025-54xx/CVE-2025-5432.json) (`2025-06-02T13:15:22.523`)
- [CVE-2024-21725](CVE-2024/CVE-2024-217xx/CVE-2024-21725.json) (`2025-06-02T15:27:04.010`)
- [CVE-2024-21726](CVE-2024/CVE-2024-217xx/CVE-2024-21726.json) (`2025-06-02T14:41:33.100`)
- [CVE-2024-22563](CVE-2024/CVE-2024-225xx/CVE-2024-22563.json) (`2025-06-02T15:15:31.033`)
- [CVE-2024-22592](CVE-2024/CVE-2024-225xx/CVE-2024-22592.json) (`2025-06-02T15:15:31.233`)
- [CVE-2024-22819](CVE-2024/CVE-2024-228xx/CVE-2024-22819.json) (`2025-06-02T15:15:31.413`)
- [CVE-2024-22877](CVE-2024/CVE-2024-228xx/CVE-2024-22877.json) (`2025-06-02T15:15:31.593`)
- [CVE-2024-23525](CVE-2024/CVE-2024-235xx/CVE-2024-23525.json) (`2025-06-02T15:15:31.777`)
- [CVE-2024-23659](CVE-2024/CVE-2024-236xx/CVE-2024-23659.json) (`2025-06-02T15:15:32.007`)
- [CVE-2024-25228](CVE-2024/CVE-2024-252xx/CVE-2024-25228.json) (`2025-06-02T14:26:22.573`)
- [CVE-2024-28069](CVE-2024/CVE-2024-280xx/CVE-2024-28069.json) (`2025-06-02T14:19:11.623`)
- [CVE-2024-28070](CVE-2024/CVE-2024-280xx/CVE-2024-28070.json) (`2025-06-02T14:18:03.163`)
- [CVE-2024-28123](CVE-2024/CVE-2024-281xx/CVE-2024-28123.json) (`2025-06-02T14:06:34.380`)
- [CVE-2024-35753](CVE-2024/CVE-2024-357xx/CVE-2024-35753.json) (`2025-06-02T15:56:33.503`)
- [CVE-2024-45689](CVE-2024/CVE-2024-456xx/CVE-2024-45689.json) (`2025-06-02T15:33:57.730`)
- [CVE-2024-45690](CVE-2024/CVE-2024-456xx/CVE-2024-45690.json) (`2025-06-02T15:34:48.510`)
- [CVE-2024-45691](CVE-2024/CVE-2024-456xx/CVE-2024-45691.json) (`2025-06-02T15:35:23.890`)
- [CVE-2024-48899](CVE-2024/CVE-2024-488xx/CVE-2024-48899.json) (`2025-06-02T15:36:03.710`)
- [CVE-2024-8176](CVE-2024/CVE-2024-81xx/CVE-2024-8176.json) (`2025-06-02T15:15:32.773`)
- [CVE-2025-0073](CVE-2025/CVE-2025-00xx/CVE-2025-0073.json) (`2025-06-02T15:15:32.967`)
- [CVE-2025-0819](CVE-2025/CVE-2025-08xx/CVE-2025-0819.json) (`2025-06-02T14:15:22.580`)
- [CVE-2025-1246](CVE-2025/CVE-2025-12xx/CVE-2025-1246.json) (`2025-06-02T14:15:22.753`)
- [CVE-2025-25179](CVE-2025/CVE-2025-251xx/CVE-2025-25179.json) (`2025-06-02T15:15:33.260`)
- [CVE-2025-26465](CVE-2025/CVE-2025-264xx/CVE-2025-26465.json) (`2025-06-02T15:15:33.437`)
- [CVE-2025-31263](CVE-2025/CVE-2025-312xx/CVE-2025-31263.json) (`2025-06-02T15:59:55.480`)
- [CVE-2025-31264](CVE-2025/CVE-2025-312xx/CVE-2025-31264.json) (`2025-06-02T15:59:48.713`)
## Download and Usage

View File

@ -214763,7 +214763,7 @@ CVE-2023-0372,0,0,0f408f100cdc228be2c6134ddfbf42615a3c5ad1c6d6ed45a5af4aec68b3c8
CVE-2023-0373,0,0,e53e84a37457c14e8fca99502ebe656cdff2d6640b980e201f5f2b50e3a78c52,2025-03-21T17:15:37.620000
CVE-2023-0374,0,0,ae4f5db6eb936a3b818c45a588550c93b15d5a51af99d7e2373040cf12eb9f6e,2025-02-06T17:15:14.833000
CVE-2023-0375,0,0,8948a3962bbed5c7e344609d7d5077346684df9a4b1ebdbb684540f03777e60c,2025-03-12T21:15:40.340000
CVE-2023-0376,0,0,11e2e11d167ff3062ed2f2d79ae85117d0bc4108e9327c9b271722ebad76c116,2024-11-21T07:37:04.500000
CVE-2023-0376,0,1,a9f6de5e0668ec86ac889cde4b7f40c1edd842c95af7ba6f28a9a7a5f9cf4a27,2025-06-02T15:15:21.640000
CVE-2023-0377,0,0,9985f7addb4b6395ecb8f44f70b75d5f0a14376de7e9bfa2d4adc8dd24e4447a,2024-11-21T07:37:04.600000
CVE-2023-0378,0,0,736996cb01e7855e9d6ff04f5f36851f6d27f466bd855e3b2600330380ed8d08,2025-03-12T21:15:40.490000
CVE-2023-0379,0,0,45a21024b71eac3a3ff03943f6ddf52c72280bcd61f1cdeff5ae8ab462791d33,2025-03-21T15:15:39.677000
@ -215137,7 +215137,7 @@ CVE-2023-0765,0,0,d81a9947bd5979a852b00ad341198f24c732fccfb6b1b45f11dcbef5a319e8
CVE-2023-0766,0,0,1092b03cd783a767d141adca44f8d9dacfc07a7a63563c8f7e23edbf7c3d5f50,2025-01-10T21:15:10.640000
CVE-2023-0767,0,0,f78933a774100aabc97c57a047549e41b1bba4ccd3b51eaa63cb3995025b9708,2025-05-05T16:15:27.383000
CVE-2023-0768,0,0,854944641b4c5c80838898ca164f46cd13b5eb87a809afca93532e5fd701927a,2025-01-29T15:15:11.710000
CVE-2023-0769,0,0,5eb73aa037d1c957a5cf00d758b84f2a8f44950ce424403d490536e87b702de7,2024-11-21T07:37:47.100000
CVE-2023-0769,0,1,43159a4a5d95a671aca3a566d6b425e68b61eb2ef15f5e3a0b5b690d4c25187b,2025-06-02T15:15:22.307000
CVE-2023-0770,0,0,42e2b4f0a595f0b7931c2b3eab09288e628e4a581686658c0dc24964b06ee6a1,2024-11-21T07:37:47.203000
CVE-2023-0771,0,0,c5852d70b396a984c744cff0b70a231813098a3efeaf6e285671182f8fcd969e,2024-11-21T07:37:47.330000
CVE-2023-0772,0,0,40c9608ad8ce64d9af51d4a0d1fdeeed56c0f76e10a95efc35403be3468c8646,2025-02-27T22:15:35.663000
@ -218577,7 +218577,7 @@ CVE-2023-22514,0,0,cc572fcbdee9c93664108a48b7c4c9a37b4e8e1c0b38e68a95b64a70a2c61
CVE-2023-22515,0,0,e1b3a5c24dec069d33c73f20bc1e55691c01a674db9c1c72e0df3398fa55e1d8,2025-02-09T20:49:55.073000
CVE-2023-22516,0,0,001864230f9bc370fdca0f79ab8ffe9d7082f111d6a1d9cf3af59d82a0bf4574,2024-11-21T07:44:58.067000
CVE-2023-22518,0,0,ffd5fb533725d5d514e6c5e19fe2c7a3ae793b884c40ee98301804be4b645b91,2025-02-10T17:57:38.567000
CVE-2023-2252,0,0,0bc9a23e1143297ad16e664c6bccf2a58fd4e64b813e69decc0e508dbb06a97d,2024-11-21T07:58:14.590000
CVE-2023-2252,0,1,2bd19d11fbfefe5fcb1aa2e6ad07f7c06d119507e89603cb6483c0765e459f0f,2025-06-02T15:15:22.787000
CVE-2023-22520,0,0,68467da915d1382f83c28d39a2fbb38fe01fc4a6d3fc7cdb26e003d34ab2d44b,2024-01-16T18:15:09.217000
CVE-2023-22521,0,0,1f8190080ce314436cab85a90e50a84df0701b248eb422294817dfaedd7e8a69,2024-11-21T07:44:58.370000
CVE-2023-22522,0,0,73a3afe2672e3a98d2021e03297248879ea1cd1422b1dd590846069e03201c32,2024-11-21T07:44:58.503000
@ -222227,7 +222227,7 @@ CVE-2023-27162,0,0,8f603f2e0c3fd7aa8ee57c03ccd280cde9a2325dd8868559c30c8a46c1d29
CVE-2023-27163,0,0,9c101eb5654766d13e0254c345cf17aee1d3261a77ddc2387286e3f4d41516ca,2025-02-18T16:15:14.970000
CVE-2023-27164,0,0,92ebbb8e2a47cbcbbfb56a213309c52630a9aa5e012b6519949b14cf38a80c99,2024-11-21T07:52:24.667000
CVE-2023-27167,0,0,825e44b6757cba46b93791c5d6267bf99bc95e34eae3697ee7eb5f88849d32b4,2025-05-05T16:15:32.867000
CVE-2023-27168,0,0,f5ed98440bf9c281464a4cf0da65aedc7cda805ca2bf7d5ca1abd326046c72cf,2024-11-21T07:52:24.970000
CVE-2023-27168,0,1,d41d0fc9f3847ea8c3c4792188bfd20798afd4cd4d8cd75b4717595651a99fc7,2025-06-02T15:15:22.550000
CVE-2023-27169,0,0,9acdf1fdd0946176b8379507933bebd0f4ffee4616bdd8a1d67f72626cfe69bf,2024-11-21T07:52:25.123000
CVE-2023-2717,0,0,87daae3684f2fc775fd4158f021b85ebbc86e19a3143432c7394602dddd168f9,2024-11-21T07:59:09.540000
CVE-2023-27170,0,0,7d3719c3e2fec5bbd7f1cbf0129e8cbb1f2b1de936c1cdeb141f118e371ba0cb,2024-11-21T07:52:25.277000
@ -237540,7 +237540,7 @@ CVE-2023-46948,0,0,3d24552d626bdd493c17569fa5b88a760ad03e9ee052bd6087829bf5f1ae2
CVE-2023-4695,0,0,c74100712c0e42f2b7bef88d5e27d52041bc75691f61dc3feaace92a91b7037d,2024-11-21T08:35:42.433000
CVE-2023-46950,0,0,609a6af0a53c82039d742da7f4e89dbe20270af7542bf97b5e36b7e496720de3,2025-04-18T14:30:56.840000
CVE-2023-46951,0,0,af6d22cf4696c26298231efc86f1a698ab38a2f263e7c3bbf15f2108d2b23443,2025-04-18T14:29:50.863000
CVE-2023-46952,0,0,1d7c91ef701f1976c4219231252cd63d14f18f0eaf9019654761d0a860d17dce,2024-11-21T08:29:32.620000
CVE-2023-46952,0,1,456523e52a149d5bc163d7db86ef28de68b775018307ac7d30ce518c829a4f2e,2025-06-02T15:15:23.287000
CVE-2023-46953,0,0,68a9b090f6d4d3190cf6a60025325fb0ec08ead21ebe8036db9bf430145304fa,2024-11-21T08:29:32.780000
CVE-2023-46954,0,0,cd206134cdff7486e042f0ee79fd9ddca5805b61cff02233e93cb9bd80548133,2024-11-21T08:29:32.937000
CVE-2023-46956,0,0,36b38e05a88bd4c41daac6504cf1af5d6543790a871f63dd3c61bb1a55b4ded7,2024-11-21T08:29:33.177000
@ -238523,7 +238523,7 @@ CVE-2023-48341,0,0,b498b73cf8a30ce8727d780b22caeae9c501877d2ca34a31e1d6a5dd8d058
CVE-2023-48342,0,0,a2185ccc7bdabadc1c6eabf399fcb12c31235917b0f65fda6d3a1daa2add00e8,2024-11-21T08:31:31.587000
CVE-2023-48343,0,0,1df35a0c0ce9d0f1496774d6d789a43171b643a7aaad059ac610e2a9dc25e0bb,2024-11-21T08:31:31.727000
CVE-2023-48344,0,0,b74605e53a15b05ca17c6e5a40d614e07abc479f06ef78c8be20974699b4f60d,2024-11-21T08:31:31.853000
CVE-2023-48345,0,0,1571ffe8aaf27d2bf8b933c9d3f6487785d1c134d3689719ebd6c4de11550790,2024-11-21T08:31:31.977000
CVE-2023-48345,0,1,fd8fda8eb1d196c93e3332a6a309dccc07806916495685ec9a72a7477f26fe70,2025-06-02T15:15:23.490000
CVE-2023-48346,0,0,060ba84f21007adee45e15790f4f828d0077a5f25f8c9f82f9190607ef567e18,2024-11-21T08:31:32.110000
CVE-2023-48347,0,0,ee1cb9d5d8075ca884a5456d0b57e685d260e61c2564e6193d72cf240570adef,2024-11-21T08:31:32.240000
CVE-2023-48348,0,0,1441f74ed8ed44581488644fee6f90f41796665c63f343bfc14b999eea4deb86,2024-11-21T08:31:32.377000
@ -239035,7 +239035,7 @@ CVE-2023-48842,0,0,d7d1454819f1dcdd14528a1d9f62c6c0ce99da0350570de551d8614dfc285
CVE-2023-48848,0,0,833c54e750b28847a055f211313ad917d61a7c10771960d3ca25918d56e67af5,2024-11-21T08:32:33.003000
CVE-2023-48849,0,0,966a1549d30c886b6324a18fa1c5e2305f618ff5ac3cff3211d2d6884236edce,2024-11-21T08:32:33.227000
CVE-2023-4885,0,0,20d51472315535f916beba5b70efac40bd64ba77bb70a5c4a1070eff5650bcb9,2024-11-21T08:36:11.207000
CVE-2023-48858,0,0,28d3523032c0c9365564e97af4c200a6d533dcc524b16ce398eda9c5da350625,2024-11-21T08:32:33.407000
CVE-2023-48858,0,1,8fafd5c41155e70c55d1c8ca6dcd15c7bde34a68a2bf18f8df6b7ae60568685c,2025-06-02T15:15:23.687000
CVE-2023-48859,0,0,9ac2603fca4a5ab31df2b9156386a46c755a85f515a18a4e785544aaeb000113,2024-11-21T08:32:33.563000
CVE-2023-4886,0,0,8f2d70647d8c027fd6ff5469d2fc104d09830f4fc19038f5e962ea02566dc513,2024-11-21T08:36:11.347000
CVE-2023-48860,0,0,af1254a0cba48df114b71f85053e187c5308de39d1f8346f841d080a150ff4e1,2024-11-21T08:32:33.713000
@ -239797,7 +239797,7 @@ CVE-2023-49936,0,0,cd62a18804bd9dc8418670ad7a20c9cd315356c519e2e57cafab3fdbeb176
CVE-2023-49937,0,0,e8aea032283a4e6b02b8e19a44b4a376da8401e064528ef11f3819239043979e,2024-11-21T08:34:02.757000
CVE-2023-49938,0,0,b26bbe6e41f55249f3b1613ef448ae76249727eba93b5bf639b8bee7e2e2cd5f,2024-11-21T08:34:02.903000
CVE-2023-4994,0,0,263f967e33b69a95d12d44b5097a3c651ecc22acaac4b05b8c55655ef9415bcc,2024-11-21T08:36:25.387000
CVE-2023-49943,0,0,75baeb7f0662422b2e61da0f08311b1325ad8cbf0d3b4cb188b99c569517fd34,2024-11-21T08:34:03.063000
CVE-2023-49943,0,1,9c9657296a82c120b7df6703d885f604f4ce853d5454378acc864778fb170c2d,2025-06-02T15:15:23.877000
CVE-2023-49944,0,0,589f0b35d814426d37687d1a4890d9ccbff089664b8b1b81eaf10346ad3c25be,2024-11-21T08:34:03.213000
CVE-2023-49946,0,0,ed35683a16e600c52b4863fbd351dfe056f99dc53bbce2a7b504852450a2bdf6,2024-11-21T08:34:03.360000
CVE-2023-49947,0,0,9557fa74580356c9a31cd1ffc90cc725702231a8e208ac54a59201c9e6615d98,2024-11-21T08:34:03.533000
@ -239865,7 +239865,7 @@ CVE-2023-5002,0,0,987bc6cf7338c0e2792735e9cea7dbd327df20b8bcec6e3a4dcd230105906c
CVE-2023-50020,0,0,72f019b0b67d78b3e19cc9985f2bbcc228431a3d95399a3b630e069fbd7c9428,2024-11-21T08:36:28.110000
CVE-2023-50026,0,0,2c912893dbdaa7ca70a39c536f9dc106ab1015ffc09774484bb6765128e9e35f,2025-05-15T20:15:27.827000
CVE-2023-50027,0,0,a9df9652fe85e440e14297428e35023f622e0d6fad228e66bd9862e8e00d25cf,2024-11-21T08:36:28.440000
CVE-2023-50028,0,0,9c21f195f5399d3eb17e322659a6fd5ee617fea8c1c313179f2902ac273bbdf0,2024-11-21T08:36:28.603000
CVE-2023-50028,0,1,bc4cce8055493dfdc46bdad95dfbbf2fe4b4742039c0ec649a3686cbb73699b0,2025-06-02T15:15:24.133000
CVE-2023-50029,0,0,d9c3518854c85e69d880a1ad286a67c19e645e056a6c80ec6fbac44c0b5d546c,2024-11-21T08:36:28.757000
CVE-2023-5003,0,0,f64093738a42959932d4b4b997e13e1d8afd18db58cb4f2c4944b7622d19fcb4,2025-04-23T17:16:49.257000
CVE-2023-50030,0,0,0c35c6db0f852011a5bb2023730b3c15416fdec236721c35869d8fd0b71f0e6e,2024-11-21T08:36:28.970000
@ -240197,7 +240197,7 @@ CVE-2023-5060,0,0,4574fa407e4590e9fd333d833ef5274bf3db629345459d700e302888d935f7
CVE-2023-50609,0,0,f80477abf1bcb4c89dc5f0283b2f56c0951fc7ab7b4a7af6354987ec28dafe5d,2024-11-21T08:37:06.417000
CVE-2023-5061,0,0,f3239aefbd571c3e8110326969216870974de4180583b15bd07a3906f8857990,2024-11-21T08:40:59.863000
CVE-2023-50612,0,0,8a3cdcecef68339ac40ada42c54dc9cfa15e10322d3e9be0f306c5a124855ae8,2024-11-21T08:37:06.553000
CVE-2023-50614,0,0,ae5a2da3410b9ae0ad708ef33b5be7d19c23eb830e521481875b59d8a9a24b33,2024-11-21T08:37:06.697000
CVE-2023-50614,0,1,abccd3fd3dfaae01017e527ded905c443dc3f38755467f11a80755ddb21c0975,2025-06-02T15:15:24.323000
CVE-2023-5062,0,0,a3c8c9da9f4ae90413061e2dc1660ee905e810b7907b2ee50509044256141aeb,2024-11-21T08:40:59.990000
CVE-2023-50628,0,0,d8930aee5643d37a5e41c25c0bd2db48cc9b207f7f7080df4d264736e6b98d92,2024-11-21T08:37:06.853000
CVE-2023-5063,0,0,f5d5f4de39b41820cb511287250db03c41d294954bbc6486f419a4e3d5f5130a,2024-11-21T08:41:00.110000
@ -240241,7 +240241,7 @@ CVE-2023-50722,0,0,fdd73aaf90c3032488e5654f68d1ccb1bc41c68f313efd190cf1416c5cfc7
CVE-2023-50723,0,0,f26055994988cd60fd4b1017c9a4bc4bf6d4c3f553263f47b4f09901c52a2008,2024-11-21T08:37:12.807000
CVE-2023-50724,0,0,792f3df63251b42592e03cc78b2c7a1421cd4b65d983b11b41fca989e5dbcd97,2024-11-21T08:37:12.957000
CVE-2023-50725,0,0,f6cfe27a4f95540bf9c1282551baac7ac219ced1e21d552f17c03445d29be646,2024-11-21T08:37:13.120000
CVE-2023-50726,0,0,3d2d6da5fd9ae7c2ee407afe604cbc0f4ad2cc0e5df9f694073532a4e0bacff5,2024-11-21T08:37:13.270000
CVE-2023-50726,0,1,8a974aa58c1c7ac1b32b093751b26b8affb698f6d81c2f21e5b0b2f3dd21e11f,2025-06-02T14:35:20.430000
CVE-2023-50727,0,0,7fd0b45f39cb9b362e8759f12c7af7e3c9d235761e8b7421030b04bd73351383,2024-11-21T08:37:13.413000
CVE-2023-50728,0,0,70a4af02345ec5c5e51b46ac2a37f5bdb924afbd59e24864dea37aa9a9c22e47,2024-11-21T08:37:13.543000
CVE-2023-50729,0,0,7c15fddb99d9d34b4e7e8920d1f7866610d95afcabe7d422c2433320bdda3360,2024-11-21T08:37:13.700000
@ -240577,7 +240577,7 @@ CVE-2023-51204,0,0,4ab72253fa3e646995088e6b92194973fe2551fe1d8abba5f33132c62634f
CVE-2023-51208,0,0,2e1f21f8e5d857887c3f899fd4593f10b397e3a39401d099d98d6c5bd6ee511e,2024-05-27T01:15:14.283000
CVE-2023-5121,0,0,edd03e2178265561785d2da3936604e9c309797ec7c91e9006d607e096d1ff6a,2024-11-21T08:41:06.270000
CVE-2023-51210,0,0,1e8c0b0ddad5e32de94abd7d188090379642b2bc9e219c15dd196ac33f6dc24b,2024-11-21T08:37:54.773000
CVE-2023-51217,0,0,ee8c1e3004b147f48ee22b4d924c8738937b21f026afb701b884753fc9bb7f99,2024-11-21T08:37:54.923000
CVE-2023-51217,0,1,c572e9fc555b67fbd8bd65745c6358aa86fe459a87669ead1694c0f780150c3e,2025-06-02T15:15:24.520000
CVE-2023-51219,0,0,ed9264b5d5bba3ce65d2752c3b1850f14b4fb39ad5d6f529328c2a51d4c8e38c,2025-02-19T21:15:14.533000
CVE-2023-5122,0,0,05cac3257f237d04df2bc4fc8a8899b5106568e4dbd1ff40b3c5537d8f10e59a,2025-02-13T18:15:55.023000
CVE-2023-5123,0,0,fbc607d8916f6087859cdc46bf56c313ed6143ddbafacb1cd001f30ba0eeb2fb,2024-11-21T08:41:06.523000
@ -241219,7 +241219,7 @@ CVE-2023-52060,0,0,916b6d0023ba25356201b349f9585af7af15e0ab89951480565e91e01992b
CVE-2023-52064,0,0,cdef612cbf98d13deb7aa4b99c2c8a1e376d46e030d189acdda80c813318fa18,2025-05-05T18:10:51.717000
CVE-2023-52066,0,0,09340d84a37f64a7d281f33481a88c11d08d9b9bd7b6e5fa961539ad3a21cbc4,2024-11-04T19:35:02.827000
CVE-2023-52068,0,0,7ecac2896ebd66625aba5f276e9edc1208d7d8cbeb72808da2150f1beda62c3b,2024-11-21T08:39:06.050000
CVE-2023-52069,0,0,e0cc3a56b8f34ef806c166922e3f10aab7b4b5e2b7d66a9939240fb5414ee212,2024-11-21T08:39:06.227000
CVE-2023-52069,0,1,cb766f3ce59eaab19dc14320a95af22e4429e8b1bf17c2b999051f5953ca169f,2025-06-02T15:15:25
CVE-2023-5207,0,0,ef2c43a59a01bbaf7d89946b8ee60b66ebea7013b82a60d36b9f98785d4adaf4,2024-11-21T08:41:18.077000
CVE-2023-52070,0,0,250134024d350dfc154d8e35b8085d7897bef84e646a77739f4c15d2bc8cf353,2025-05-27T14:20:46.280000
CVE-2023-52071,0,0,812221a84c238215dcedea186e9ad0947ed6c219cfb74718c68ca339bd585423,2024-02-23T09:15:21.867000
@ -242872,7 +242872,7 @@ CVE-2023-5918,0,0,75cefa204a8d53d4806b0b33290f87039b24e3bd8e82e6f77c43835dd8635c
CVE-2023-5919,0,0,cb18dc9946aaa63a5059f96d8880f1009bf792889e863663a6ed71dbd4b3c9f8,2024-11-21T08:42:46.693000
CVE-2023-5920,0,0,1f2e1f8a6bef74c737436916a6a04f28f5d7b58187a829f5cee7efd4462bbaa5,2024-11-21T08:42:46.840000
CVE-2023-5921,0,0,f0fa67323ced6a26783ea4f1268b00c126d5e3bba39c173a708d810ad4e8bff6,2024-11-21T08:42:46.980000
CVE-2023-5922,0,0,8718afeaefba8405ae14022140e50a2ae6b34fd218e9e40bcaf3de5ee748464e,2024-11-21T08:42:47.117000
CVE-2023-5922,0,1,723b58ef35c243510a79894d46d175b6be0a9883826057e511dab217352cb861,2025-06-02T15:15:25.183000
CVE-2023-5923,0,0,7ecddee1e61892b90bf163c4f3009cdc6bfff682d78c0c920f90cb7608e09602,2024-11-21T08:42:47.237000
CVE-2023-5924,0,0,c3dfaf2aef94e1a091bf010690df5c8f403993819e0a4ec4aed6f45d2fa1aea5,2024-11-21T08:42:47.377000
CVE-2023-5925,0,0,7b7b6e66f7b4c1694f0a225bb173de3dc83199463d8543bd4ca45587a49a8249,2024-11-21T08:42:47.523000
@ -243212,7 +243212,7 @@ CVE-2023-6288,0,0,9df2c11e1962ef6df633540e8703bd25c0b7dfa23d81b9d118aae5134b9ee0
CVE-2023-6289,0,0,ea6995b3f013ac468f8860dc5b35e68319538e0629d16f5f7da0d59db34022f5,2025-05-07T21:15:59.620000
CVE-2023-6290,0,0,1622e53eafd84e476c01d20ab3013e3c7daa69d3566b893f40eaebe53a8373a1,2024-11-21T08:43:32.380000
CVE-2023-6291,0,0,7e6d67a4e261a2c663b0f913e9eb5cce3b1efbd5a764f4b536ff2221b4a3b839,2024-11-21T08:43:32.587000
CVE-2023-6292,0,0,189dd61e8d5c7e055eb64dfb458f7ca736e6093b35221ecd9fff1c6277648511,2024-11-21T08:43:32.790000
CVE-2023-6292,0,1,a0990916e761f02d20b924f8a377698af89f44b73bde78c0b1016f93664587c7,2025-06-02T15:15:25.403000
CVE-2023-6293,0,0,3ead6bbf58439756907eabf2ba7dbcf1f8f9a68ec2f2da3dfdae156a6b960d19,2024-11-21T08:43:32.913000
CVE-2023-6294,0,0,7e861dec2250a517c77d5feb5188720a797bb4733ba7c8f6a10f8c15f81f456f,2025-04-24T16:15:25.777000
CVE-2023-6295,0,0,748b72aeecbd5ae0b4a8331c7433498e813d2068e47b6b86142d9b8b270ea2cd,2024-11-21T08:43:33.290000
@ -243592,7 +243592,7 @@ CVE-2023-6728,0,0,d5cad901337cc4f13c12b57aeda30d9bb062a3112003e6a2837c11a6ce7a60
CVE-2023-6729,0,0,2086303b3eb3fdf0b43c4f9d5042f89ed6b56bc1b32daea71fb38f406001fdf0,2024-10-18T12:52:33.507000
CVE-2023-6730,0,0,22067958a8780ef63fcf2d5dd8344cfe89214cadcc1e42b0442beaf8085d13fa,2024-11-21T08:44:26.450000
CVE-2023-6731,0,0,2942153fbc00009823f4b03aabea6b8e217fe0ade4f421285e18b47aa4de93d4,2025-03-05T15:16:45.610000
CVE-2023-6732,0,0,f4818ab892836c726761fbb1f6979409df88c74e546c8095c628beec8a815e3a,2024-11-21T08:44:26.687000
CVE-2023-6732,0,1,6c4c2101534eded8360304ae9b5ed8367ad7e0dcd2f30227012e983058ca0643,2025-06-02T15:15:25.687000
CVE-2023-6733,0,0,3253e9934cdbad22d3f5bf18ea41de714a7571ae0a9c69b303a3f5309983ec5b,2024-11-21T08:44:26.820000
CVE-2023-6734,0,0,f702cfc07dd4f70df68ba07e813e6841d7b4220f597a5c694e7bd72e1e10c540,2024-06-05T20:15:12.617000
CVE-2023-6735,0,0,2e0e8da83bfa1203cb45b7bfbfe69fa42028a43343df6bbbf222eb569fd8d28b,2024-11-21T08:44:26.960000
@ -243923,7 +243923,7 @@ CVE-2023-7079,0,0,46c393c570993abb391f057750b5f3d862f3a7268c200e5fdd089347f6f96e
CVE-2023-7080,0,0,0dedea4579e0ebdb20487dc410d73c81f344d084a8525a398527f331a9f27e4d,2024-11-21T08:45:12.610000
CVE-2023-7081,0,0,91c63ea627dfdcc942a01ae71661456a1ce0179dd752d7ae102820022c20b567,2025-02-26T07:32:59.377000
CVE-2023-7082,0,0,01da1b16e99cb894b19b28e654f0eb0d1f946ad3cc9cf73b506a5d550a9446db,2024-11-21T08:45:12.920000
CVE-2023-7083,0,0,c5aa53dbff112a3d086d0b26f297d981e1f6ee6c887d1ac2941e9a37a179680a,2024-11-21T08:45:13.047000
CVE-2023-7083,0,1,bd9fe220d9ffb8ab896a7aa5f1b550a5a279117f4114912c85245fab437efc94,2025-06-02T15:15:25.847000
CVE-2023-7084,0,0,d9889df429199caea86387e661e3ff9a19490ddaa4c78a76e3ed6d89055dc2e5,2024-11-21T08:45:13.180000
CVE-2023-7085,0,0,ff31f837c71e6103db320dfb5036954bafa30bf8481edfd8ca5717d6131b3010,2025-05-05T18:00:58.713000
CVE-2023-7086,0,0,5f5556a768b7c5094b694e246744f2a06e6987bb2fe83cf2ef0166847738a87d,2025-05-17T03:15:26.153000
@ -243983,7 +243983,7 @@ CVE-2023-7147,0,0,5eacdabf818d435c41eaacb6bc6aee40cfbc4f7c6bc8097d0373cbb43521a2
CVE-2023-7148,0,0,cd74d5d5043d0f225a5508f1ce1e737d9b8269b12196e1f077a48a7869ab503e,2024-11-21T08:45:22.710000
CVE-2023-7149,0,0,2dc7658ef978c730070cd603039cecfafa7928437de4bd11a31dfc51df1ef8a9,2024-11-21T08:45:22.850000
CVE-2023-7150,0,0,8e489edbb212b4cb216303afe4e7fb97ca2805dfbb02272f899f0856211bf82f,2024-11-21T08:45:22.987000
CVE-2023-7151,0,0,2bcc017ed475884ef40e9ef310d438d4a7cf4323b614c4bb4bcb445865cc2d64,2024-11-21T08:45:23.173000
CVE-2023-7151,0,1,ad14e75458ac006d60338e359df38b3eaefecc241804b344e483c0b609a01b06,2025-06-02T15:15:26.013000
CVE-2023-7152,0,0,fd36b2beac1491fb034b863529b6250cbd0ee457451d0960b74f5cba9928330a,2024-11-21T08:45:23.297000
CVE-2023-7153,0,0,1e39be193597bfbc0dcaa21559658c46b7e5399dfef019b10121642cda71c097,2024-11-21T08:45:23.457000
CVE-2023-7154,0,0,7f3e702cdcdaec5e19a8aff3c6834f631a68d29be8c1209901c99d969e4e4a86,2024-11-21T08:45:23.570000
@ -244333,8 +244333,8 @@ CVE-2024-0232,0,0,262e92a8eff0d97ac80a34d49e9c5090de92ad24c159801550ee9096cf11a2
CVE-2024-0233,0,0,2d775dbc62efafb6903af80f3e57ab3523829ba69aef8d027ebe3eb91ae9c2e9,2024-11-21T08:46:07.087000
CVE-2024-0235,0,0,97c370be241353b5412e3ed8d1a2a18f25f0f0b847280387a8ada599386de846,2024-11-21T08:46:07.210000
CVE-2024-0236,0,0,6b2f63591237ac4a75810290f98b00846d3afeefa04ab34bef12f96c65ca34f7,2024-11-21T08:46:07.330000
CVE-2024-0237,0,0,1ae839abcd94bb04d82cfa7f373940cb827c85de591b60d36e8f2388e94b2aa7,2024-11-21T08:46:07.443000
CVE-2024-0238,0,0,7788b5b49a01d450a0cad79d300bddcb30a63e3bd899277e0434ea02fa632077,2024-11-21T08:46:07.550000
CVE-2024-0237,0,1,20ec553d19cddb8fb82a9f17d174a46607b62ab3765c9374ca2a2cbd249ee15b,2025-06-02T15:15:26.280000
CVE-2024-0238,0,1,fee178d6c5fe4f981dadea4f4cae9becd0d083b2a7e9efe13a009a005ed50a91,2025-06-02T15:15:26.457000
CVE-2024-0239,0,0,6f23ad78408a5b7fde0094b93c2f985cca082936819d8778d8ad7ce82830a134,2025-05-09T16:15:22.680000
CVE-2024-0240,0,0,7d6b3f14a6dd022bd35161532302d70a9578d8886110d55cfc841241eb474bf7,2025-02-05T22:37:50.810000
CVE-2024-0241,0,0,4ebb855c40a85c7c841fbab6073d0853cfd68536ca74ef250d3c9e3d71f58549,2024-11-21T08:46:07.923000
@ -244469,7 +244469,7 @@ CVE-2024-0377,0,0,0e353b2cc17ff573216a0d4035ee71ce75ad1473df46058436429c0fd8b618
CVE-2024-0378,0,0,6327e42d183029a8d5af62628ec61e961d0148256785c05c3ae05fdc51bde6b0,2025-01-16T18:30:44.367000
CVE-2024-0379,0,0,475cbad042878d51f320d58661d629586a1d37bc9b3d13df1876a09ec0653a25,2025-02-05T18:10:45.403000
CVE-2024-0380,0,0,b13ba26b2c93293898a30471c8b142088e326e5cfea22174ba924ab8efd84293,2024-11-21T08:46:27.490000
CVE-2024-0381,0,0,4408f366f53a4f9f027eb35f7cc148cd5099ad6f453db0955bde4e51626db08a,2024-11-21T08:46:27.643000
CVE-2024-0381,0,1,ed1a0911e368346187d438e9392a91776a0a9e936ef2cdd74e2f550f6abaa4dc,2025-06-02T15:15:26.620000
CVE-2024-0382,0,0,89dea95cfa60010212418517f6858b68d57b6774bff452bfccc38c701002fb49,2024-11-21T08:46:27.790000
CVE-2024-0383,0,0,8c60a50fe459675df309f5b4d3ee17156f99c6e5af75b01147418e180e58e587,2025-02-27T15:59:50.517000
CVE-2024-0384,0,0,7a94f21befb3cd3a1407d20d2b315c6141a3e3c615a2b4fd46013577fd76d174,2024-11-21T08:46:28.113000
@ -244490,7 +244490,7 @@ CVE-2024-0401,0,0,0823df990368b4b050577e6bc5b48e2ef1b07328db0e6b9bddf77162cab737
CVE-2024-0402,0,0,c949b5bd8222e6e23b4e7ba309ff59582bbc865f49ff9c531f74ebc2c33ecdb5,2024-11-21T08:46:30.360000
CVE-2024-0403,0,0,0c4d5ded98178436b940b342e29aa8129795369001d8e1cfcada2266b944f3d5,2025-05-19T15:15:21.730000
CVE-2024-0404,0,0,e68675852fdad4a719b11b1ba5421da84ab893dbe21118b0c4ff6ad8acdc2b36,2024-11-21T08:46:30.660000
CVE-2024-0405,0,0,e66adb1ef6baed40b92ad2708a2a7f7801896af39f78da834867100b8b40a4a0,2024-11-21T08:46:30.777000
CVE-2024-0405,0,1,b84c57fd844beaf78604909af92c861379014e6e000bd4d69036e6d9446a117d,2025-06-02T15:15:26.800000
CVE-2024-0406,0,0,14ebcdcd7cb29deec53ed13e83d8eaa78a7a83a3f926a3637e324503d60634db,2025-04-25T15:02:44.233000
CVE-2024-0407,0,0,bf7446b50e0f1a0b381fa6716fb89f82f79db67f0ab4fa78f751b5ca6c555100,2024-11-21T08:46:31.027000
CVE-2024-0408,0,0,e030a2f701c930b593d7d8ff457fa175da0a5c43fe41606146dc8b73cdf52f60,2024-11-21T08:46:31.200000
@ -247201,8 +247201,8 @@ CVE-2024-12083,0,0,d43543ed1a2c4c8cfbaff70b85f71ffc7dc15514475ec8e8bc46a80ffd753
CVE-2024-12084,0,0,09f03b9789ff761106bb1f3be0d03a40a943d9b32f44fa2457c69ada372f11ea,2025-02-26T14:15:10.473000
CVE-2024-12085,0,0,6327110f4afed370432415f28af95b82497d74d03c532d5f071f6072439a2df5,2025-03-20T07:15:37.273000
CVE-2024-12086,0,0,eddb6eda122eaf0dac2b18ce83df4e5fbbd9d253ae3afef485d18d17f7300647,2025-02-26T15:15:21.020000
CVE-2024-12087,0,0,4b079bb20e9fb19a82e1b75bb5c57124d72cc7b60f90b36dc6ce2192bbee925e,2025-05-13T10:15:20.010000
CVE-2024-12088,0,0,e6b018cc078e0010ebcf313bec4d9813c8d1f8ea7c864cf3cfa73c023ab83f52,2025-05-13T10:15:20.170000
CVE-2024-12087,0,1,df3bea08522196fb43d695d955bbc8eb3271f4bc9d424f79fd153618cd4cd731,2025-06-02T15:15:27.363000
CVE-2024-12088,0,1,a23d744ba95196ef16cdc9166d6a394978a9000ef984a1eb8f1d65ae2dfd9878,2025-06-02T15:15:27.540000
CVE-2024-12089,0,0,e4693d0f49f7bcd8f49a3c46cbf99b45117c9aeb9696a4344a79bacac3eaba78,2024-12-16T15:15:06.250000
CVE-2024-1209,0,0,0c11632b4f799f8334de1fe031a18ed75abc1306137789706f83e79036cdbf29,2024-11-21T08:50:02.720000
CVE-2024-12090,0,0,3ae49935c044b86a3444ecb09701dd060f603a46c2ce1e27c4f8226f9377436d,2024-12-16T15:15:06.393000
@ -247251,7 +247251,7 @@ CVE-2024-1213,0,0,46a1c578e51af4f5ea0de6f43fa1aef1a4b74eefd9efa4b8f5743377924d31
CVE-2024-12130,0,0,f13cb67c00f6dcc27d0c31ba4dea31c8dabc6f66eb953b7214a560c5a851f67a,2024-12-17T15:52:01.670000
CVE-2024-12131,0,0,dbf0aa17931777a7d2a18f8d74d983fb90b7cc72d860577b6997f11baa1caf8d,2025-02-05T19:34:09.820000
CVE-2024-12132,0,0,b06e93c25499732ca815413e2d46627c97d1199e136eda86bfe61d37a4878c0b,2025-02-05T19:37:43.237000
CVE-2024-12133,0,0,c716781b612526b9d612670b35aaf7e455225ca724f247fede80d44a7b63bc5b,2025-05-23T14:15:24.510000
CVE-2024-12133,0,1,10b581a4c9ad6acebafd3e4c21f3a1617e68b9dc24e22b02761c5ae5fa3a9b83,2025-06-02T15:15:27.653000
CVE-2024-12136,0,0,c0c4c27cbbd7828041291776815c4afc28a05bd5c4ef0cabafb6c42812b651a4,2025-05-12T16:56:35.197000
CVE-2024-12137,0,0,3866c73264ee04bbb6164db23f168e7ffa40b18dd0c34a109d019afb6b1c2412,2025-03-19T09:15:14.090000
CVE-2024-12138,0,0,da6ee7fbee0e9075f414529b46a16ebad54f1168ad899da7c1771d5519a5d924,2024-12-04T14:15:19.413000
@ -247281,7 +247281,7 @@ CVE-2024-12164,0,0,e252f13dd9720dcd4131988acbb14108c9d660bac4dc69fb3a06b127cc0ee
CVE-2024-12165,0,0,565f6113f161726a36dcd8f87106f931ffa1dad23df770638714143fb4529a90,2024-12-07T02:15:18.790000
CVE-2024-12166,0,0,318717b4a3842e9291a2442fedeb1198ccbbca486552d6b1e9ef8aa65b1bfc3e,2024-12-07T02:15:18.923000
CVE-2024-12167,0,0,648fdeb771c33890685bfca6029b01ac44a17697a1725a67472f5321f6e1f66d,2024-12-07T02:15:19.057000
CVE-2024-12168,1,1,00d2c546c11a236b0cfeb984a17951f770ce5e9104d3a5f1bf8ced2a2cf20293,2025-06-02T13:15:20.517000
CVE-2024-12168,0,0,00d2c546c11a236b0cfeb984a17951f770ce5e9104d3a5f1bf8ced2a2cf20293,2025-06-02T13:15:20.517000
CVE-2024-12169,0,0,2cb4d326eb74962f36bd473143efe22c253e3ffb801c22c8001cea0ca8bcb67d,2025-03-27T16:45:46.410000
CVE-2024-1217,0,0,6b4f28a64a0963868a0b0fd68f3e80e1f35d8f2883d87d4094b446f0742cbcfb,2025-01-19T02:51:21.017000
CVE-2024-12170,0,0,dda5e4dfb884254330b10e15454ff7f267eea062af3a3c0f061f58e061dbc21b,2025-01-07T05:15:15.713000
@ -247362,7 +247362,7 @@ CVE-2024-12239,0,0,2dd2f60a878bde8fc4082e44b55290b6330ca8ddb5c2322a79fe1567e7103
CVE-2024-1224,0,0,cbfbaa5b4f0e1c410530412d727d5bf58dfe126bd3d740f330bf5c6e93a0658e,2024-11-21T08:50:05.487000
CVE-2024-12240,0,0,6672995b52813f98387098ac3b3013676e82d4cc5e92b1023b4a144f1eea1a77,2025-01-14T11:15:15.137000
CVE-2024-12242,0,0,2f55c665eef830ff2620035cbcfe4292d890dc745ab209f9df7f0382ca44ae3c,2025-02-11T02:15:33.653000
CVE-2024-12243,0,0,16f882f1b6bf82e63001c6b6427f55bbae99292a81f4ea03915e74b19a3481ce,2025-05-23T14:15:25.293000
CVE-2024-12243,0,1,e36597904871af68737b1609cb8f5b8cebb3c523b502b88fbdb595881842a9b2,2025-06-02T15:15:27.810000
CVE-2024-12244,0,0,902128c7510fb9ce8d0215617298469dd7c5ca7cd9d40c58e1ffed541e8e617f,2025-04-29T13:52:47.470000
CVE-2024-12245,0,0,31276812dc8de5bfdb7bab3cdab8b1c866149ec90ff0dd7db23266bd4fc80d08,2025-03-14T18:15:27.530000
CVE-2024-12246,0,0,25e368b7b625668da07b20dc2399fc14978a413e8f5dc9b92a1c223e61cf9256,2025-02-11T02:15:33.710000
@ -247872,7 +247872,7 @@ CVE-2024-12743,0,0,62e1184f57129404b8941aacc25c68e38e14fd392dd612ecdadef7bd57a7b
CVE-2024-12744,0,0,d9bcd7b60c79640d4995955dca329cb96a3574a3f475005b85edf507783c7d57,2024-12-26T15:15:06.290000
CVE-2024-12745,0,0,56f1c84b33bef267b3eb5e88e8c9c1273071ba9706fba6301263255413a17152,2024-12-26T15:15:06.527000
CVE-2024-12746,0,0,3dc399827dbe6da7d4657aa1f300fc1452e75823ea53e19ad5a88d067d48a8c0,2024-12-26T15:15:06.650000
CVE-2024-12747,0,0,2d26c27ff01f40725b9f6c5072af1e828730b723696b1f4620263dc23d1fb992,2025-05-13T10:15:20.300000
CVE-2024-12747,0,1,c40c04c12da3d602f8e166a8353291f3e503a91ddb4e0934ab4eb62a6af8f9f8,2025-06-02T15:15:27.937000
CVE-2024-12749,0,0,280ff2c791b5dcf89d574e3e5b909038185309adaa236341da6134d271fc7b79,2025-05-11T23:34:57.513000
CVE-2024-1275,0,0,8eab781ab1c4b6181e657741b9361b7d07c5c975bf66f07a41ffcd3de9380867,2024-11-21T08:50:12.913000
CVE-2024-12750,0,0,6a526d5045eccc8fde3f6e58014c106b7e36505121e785d332806b0d5bbd64b9,2025-05-20T20:15:32.760000
@ -249774,7 +249774,7 @@ CVE-2024-20066,0,0,0f85fe051819a9be24207b717ae67bb1aa3886173e6db86ab7492cdf7d870
CVE-2024-20067,0,0,7a6e29fdc4913ebd1f71afe7f54ea4f5078686bf3ce10dbc8b506302259e8ca9,2025-04-25T18:39:01.213000
CVE-2024-20068,0,0,61ddc002af0d0ddf69dce5ade39f4653c4486d436f21efb15073fcdfc9c3810c,2025-04-25T18:38:30.833000
CVE-2024-20069,0,0,875dfd0be69ca66a05acadc760869c21548a7bcc2801594cda005fcc8982c15f,2025-04-25T18:38:24.040000
CVE-2024-2007,0,0,eb3d968c0e354405f44bf0195c13e90db38e42455abe7ee8eb99ae7b486c5b60,2024-11-21T09:08:47.890000
CVE-2024-2007,0,1,fc03119af92b20d1700f2aca2f5e62f2c43515657b1de2f42cb25980169c9abe,2025-06-02T15:32:05.250000
CVE-2024-20070,0,0,14dad7897ce30d439dfb9340d57ecf9ccd11d04d5ffd4c8fd35210d65693641e,2025-04-25T18:38:13.850000
CVE-2024-20071,0,0,8a6cd3b4b278b838fba269bc146be756d54434f5dbe7841da000a2444e0ecdde,2025-04-25T18:38:10.847000
CVE-2024-20072,0,0,37c50da273863006cc8a2780d84a42c015df4a5b3b6a0450d7001f326422aeb5,2025-04-25T18:38:06.520000
@ -249898,9 +249898,9 @@ CVE-2024-20267,0,0,60db6698bc2b5bfed7fe8f868752c4d1f1bfa5497f21476bc1bb83c3f9744
CVE-2024-20268,0,0,f54dcbc1b570decd00936c9c3273238bf5358fc22c126ebd5868e76084b92c48,2024-10-25T12:56:36.827000
CVE-2024-20269,0,0,7dccc9897dae85a9605fda4a9bca48b4a5608dd2bbba71c7a1ad8048c935ff52,2024-10-31T19:35:03.420000
CVE-2024-2027,0,0,a7e3ea7c1f9e0baf2199741e40307a7aaf04c9a4fcc75509ade3bd8f6ea736b9,2025-05-06T14:09:30.200000
CVE-2024-20270,0,0,527c85da6972409fbd3feabaf4ac289d41795328353490218d3bc94d305c8921,2024-11-21T08:52:09.830000
CVE-2024-20270,0,1,ae791813d7e0994b81d8dcf78be50b8cf4e5e2f2ea28dd7900a9fdbcf32937ae,2025-06-02T15:15:28.117000
CVE-2024-20271,0,0,9167f39910a3ebe83ceda407aedd1b94bbe70ccfe316a346d50e7fe0569d3135,2024-11-21T08:52:11.843000
CVE-2024-20272,0,0,4354b761f3bfe3f6ae519103315efd5af19c06e4c8af3b6ddd30e3de64825837,2024-11-21T08:52:12.043000
CVE-2024-20272,0,1,0f4207d9c30cbfeb2b9f468d2d1216a3ffcd94d7e6326ec2451a0d1d9a1434cb,2025-06-02T15:15:29.633000
CVE-2024-20273,0,0,8d679697c15bc2e97b5a81ffc7e40e8c047d103fb882cac5915eb3a6895e7557,2024-10-31T19:09:24.687000
CVE-2024-20274,0,0,c5f8f757ac6f47f6af16641b1eb8057c6a0d4e407a0ee99ef0a042f0acd647c1,2024-10-25T12:56:36.827000
CVE-2024-20275,0,0,da3976bbd51710bb6dfdefc4d127f7e55f475507ba3be3fdde8e80041befcce1,2024-10-25T12:56:36.827000
@ -249916,7 +249916,7 @@ CVE-2024-20283,0,0,0f68fe03da8c98d3e648a6521bf7f91d65a0eef384dc8a97d7ec4e5edd918
CVE-2024-20284,0,0,d5982ce3492e779a26e4cd0874315bacd89a9f40ac1ac254415ffe3458a91847,2024-10-17T15:03:07.253000
CVE-2024-20285,0,0,e447442ea94decd1922f5ebff8beb02fbb9a139f6c25d436b75289296cbe7167,2024-10-22T14:37:01.363000
CVE-2024-20286,0,0,85e23f2950ae4810a600e93514030caa8699d3aad395e782f498eb820818c91d,2024-10-22T14:44:16.063000
CVE-2024-20287,0,0,f59e167771c566ea49a772716721cd0bee31092f0381b7acc8ce94fb9f699c84,2024-11-21T08:52:13.810000
CVE-2024-20287,0,1,8cc794985e7aab5502c11def2bf6987c83631f8f99e8ffb6c813e7210fbe5ce5,2025-06-02T15:15:29.810000
CVE-2024-20289,0,0,5a41bc3598f1aaec7151598e1fa9b8bdf8e15887462c2c995bc9a053cd9eb195,2024-08-29T13:25:27.537000
CVE-2024-2029,0,0,b4ec0fb87b25dbda385a151f4a9390a5913fdb85d70aeda457cf530e66ab8d7c,2024-11-21T09:08:52.600000
CVE-2024-20290,0,0,0babbf7a7f9d2f4798677a463b58b8e44a6aa9038067184cbb9fb6075566f6d6,2024-11-21T08:52:14.023000
@ -251262,11 +251262,11 @@ CVE-2024-21719,0,0,9c44e12e1d76733d3feed8e181f5b47ac15ebb214263488ee83326a519e42
CVE-2024-2172,0,0,78f159870a3b1f4b7457cf7bb76f1b6382fde68fdd2a41bb4435297ebe3c18e0,2024-11-21T09:09:10.853000
CVE-2024-21720,0,0,fb67e72ba582adcc0c5e5d3a9e98cab75db5f6134d2b15bd6a10b63688338923,2025-01-01T00:15:37.927000
CVE-2024-21721,0,0,6410e381c95c472dc089a2773dc0abc68f1f222dbf9d3db9afe0135917afba85,2025-01-01T00:15:37.987000
CVE-2024-21722,0,0,2a5ea02f71deb95ec5eaf888eff71c016429075fe8ca3edea2eca62d44bde2f5,2024-11-21T08:54:52.290000
CVE-2024-21723,0,0,dafb257c8701f6f7fbb9c3d3b339ce39d25c8581b1bd8116b2e72321fff57356,2024-12-02T16:15:08.967000
CVE-2024-21722,0,1,ee44a27bced81bef3749a2db8bb0e8e4960c36ed36c93f2a01773bd93b39d4cc,2025-06-02T15:28:56.793000
CVE-2024-21723,0,1,cb72464300e7cd12dce689c7da7b1f50462629f6a3fd18533715b1a8c9c95cd3,2025-06-02T15:27:37.210000
CVE-2024-21724,0,0,90f98621740411a24ebbbb514a7d09daacd8a8ba2b0e4725c9049c1cb50630e3,2025-03-27T22:15:15.453000
CVE-2024-21725,0,0,e9755f4e96dcf1acdbff69b1e771d5e935c3e4ca0c665929f6b8ae05c4b0ec0e,2024-11-21T08:54:52.683000
CVE-2024-21726,0,0,cc456bf0ba8578c6bff424b566060ce3c3e12474d62073707c3b25ba26e0768e,2024-12-13T11:15:07.320000
CVE-2024-21725,0,1,c35dd28e602780ed3329f54c49ff4fc66b7eef9aa953e693a71f38d911c4487c,2025-06-02T15:27:04.010000
CVE-2024-21726,0,1,8ae2038fcd7e88a88a493d2e1e60637f4c706fea9b6b443454997f714979b749,2025-06-02T14:41:33.100000
CVE-2024-21727,0,0,69b1b2551ec1b0e547a0769414a7c8dc66f3a431d56c8d7ad59321005f2cc5bd,2024-11-21T08:54:53.040000
CVE-2024-21728,0,0,737f3c4b18f676ead5578d81c694c6ccfbf7c5fc175bf610a8cfa12392285c7b,2024-12-03T16:15:21.030000
CVE-2024-21729,0,0,1891d8574862b25d66b7e90d29c18f14ce7b7ae18dbc6e5f2430f36e44738395,2025-03-25T17:15:49.563000
@ -251984,7 +251984,7 @@ CVE-2024-22551,0,0,c6aecaead02e49114c0f79c63f4d90b0f89765d6e0ce933a5f3502764c581
CVE-2024-22559,0,0,af00b961063945ad2526dcb3766cd0bfaa8ddb4afba0a251413b3b4f5c40ad08,2025-05-29T16:15:34.840000
CVE-2024-2256,0,0,a9cdf8c119abdb1591c1ea139372886975f6825ae6823e4c7f0bfa86ce66c0ef,2025-01-23T19:19:01.903000
CVE-2024-22562,0,0,ea97d322ba73922c2b4b17e7faf95fd9fb5924a77ee360bbda566226f58ffc1f,2024-11-21T08:56:27.267000
CVE-2024-22563,0,0,53141b7efa0448a4fc58647686dae7b112a9eee549be6b37a305348b85c7a109,2024-11-21T08:56:27.410000
CVE-2024-22563,0,1,a7ae3576922d6f1ec5a4bf27e4449f9ff98437ebeb4d111a20b9a37f30d1df00,2025-06-02T15:15:31.033000
CVE-2024-22567,0,0,2a034ecf0e68a255d1c72f03aeb92b1775a988d7343bb0ed2af9804759f912f1,2024-11-21T08:56:27.563000
CVE-2024-22568,0,0,3880556bf46833b64579e87b398833833f840f929944234dc82abb9760bd1590,2024-11-21T08:56:27.713000
CVE-2024-22569,0,0,3a55b2ee886f6b6e4a8f99a6df1ffb40539c265ddbe381d4a10f0cda4ab2a1d8,2025-05-30T19:15:29.023000
@ -251995,7 +251995,7 @@ CVE-2024-22588,0,0,8e2502298f7c6b135485bc5396597a78ea89ffb55c12fc0b95b7b4561f1ec
CVE-2024-2259,0,0,a3104431d195b990188b0eaf6770bbdd7744abb2cc67108311ab43825c1510de,2024-08-13T12:58:25.437000
CVE-2024-22590,0,0,c61f02103dabd4fe4ee1e4744aa85defca93b5aa3ffb20a4fea1a1e022feb844,2024-11-21T08:56:28.390000
CVE-2024-22591,0,0,abf87faca2359544afd8aae57da6b1b3c01d4b19e553631d37daefe27f471c8a,2024-11-21T08:56:28.613000
CVE-2024-22592,0,0,11c927ae234a90a6884a667a5dc9eb192346a0cebcde3bca88b693b0237baaeb,2024-11-21T08:56:28.763000
CVE-2024-22592,0,1,593835b284e3483f81fda6f64e50c2a2a17d0fc8e64e321aa4ccb98ae21d9cc9,2025-06-02T15:15:31.233000
CVE-2024-22593,0,0,5096bdfca51e45974ccf7b3375156b8687c264919ecbeeea17fc6ebd6a05be56,2024-11-21T08:56:28.923000
CVE-2024-2260,0,0,351310aee203264fb40c4c9b7d72886cb8591172239c88678e117dcb93f9903c,2024-11-21T09:09:22.200000
CVE-2024-22601,0,0,911fc06c53591b52a66c4d8b85d7ec2c09891cf909bb76b2114fd8c5524918d1,2024-11-21T08:56:29.163000
@ -252087,7 +252087,7 @@ CVE-2024-22813,0,0,fde04cad36ea7ed6da5592badd051abcc370fc34b9e00641beabb2629ce4c
CVE-2024-22815,0,0,bf7286714cb17cb76e21dc0bc91848ea894410859ccb42c29106c27e54a4b4d1,2024-11-21T08:56:40.553000
CVE-2024-22817,0,0,785b3109338119fbeba47114458cfe5eb47e7da41d87a16e45c85e72fa70c775,2024-11-21T08:56:40.783000
CVE-2024-22818,0,0,ae07f7c9f23d3ccaa5209ac1c54f9755e1e9817fbfc817996581e36100b284f5,2024-11-21T08:56:40.953000
CVE-2024-22819,0,0,7643939697805bf94d7d7dc83e3bb3d9f69bd48a67997c832d257ece9ce7ba6a,2024-11-21T08:56:41.107000
CVE-2024-22819,0,1,7e298a92c78d234d5ab0ca56f880a0108a23b6be265e0dee3a64531ce6e0dcf7,2025-06-02T15:15:31.413000
CVE-2024-2282,0,0,f65d975fa959d79e35fd81da556b5cbe68cb3b1111b3d61a39d139eaf08fcba0,2025-03-12T13:24:34.817000
CVE-2024-22824,0,0,1f155b9a7a63089013ee0de27e2d285d6a380f9e67385bd145351024a01e284d,2025-04-02T20:18:40.970000
CVE-2024-2283,0,0,2243dce5ea854d7cbbba0e81a83ce390d73424536113b1e7319b4a16ae330824,2025-03-12T13:24:15.510000
@ -252111,7 +252111,7 @@ CVE-2024-2287,0,0,6a39bd22bf778ab9ef88f37dcc3c969ac4abf6d6c0b210c60c8dae9cd488c8
CVE-2024-22871,0,0,5cb6a1794fa239aa149c09da9e9377ad68d4db05bcd9d7956a59416700d6ed64,2025-05-28T19:56:07.707000
CVE-2024-22873,0,0,6165970db789c15d94a1c759e386900acfe17775ba21a6f751b4c2bc62bbc560,2025-04-25T19:03:39.103000
CVE-2024-22876,0,0,7b64300d77b839c22e56dafc52a8b282c24d807d3e1138deb97774c53ad9e682,2024-11-21T08:56:44.390000
CVE-2024-22877,0,0,869857cd8b9a44e1d528c28503ad46b7c531212f5054c9f21fd2618927c6b492,2024-11-21T08:56:44.530000
CVE-2024-22877,0,1,88c6f0f1c60fbea36632841f05e640ffd56de4073456e40d04cedfcce7737ce5,2025-06-02T15:15:31.593000
CVE-2024-2288,0,0,f6ed54bcc2b3e715f6f7f1bc8122a65aceb675402a6406a77355fa6ec0523110,2024-11-21T09:09:26.250000
CVE-2024-22880,0,0,57fbbe23fde2c87b7ed64a754ecaf00025c535fb2033f922d6720bcee3eadd21,2025-04-02T20:29:15.763000
CVE-2024-22889,0,0,bc789a72f7d1e24bd814b0b6d2146517cc600e2afe43b498499dda222266b149,2025-01-21T16:53:16.990000
@ -252628,7 +252628,7 @@ CVE-2024-23521,0,0,57d58ffb0b9d9efecde4d13454097fc5a706b8ca84a89b6c40b02bdc1acf2
CVE-2024-23522,0,0,e9199f7cbcff6af01d20d297fe947b7685cc900555c843ba08ab65ddfafffb61,2025-02-03T16:20:24.827000
CVE-2024-23523,0,0,6b732971a9009d9924469952ccdd7773f23afdb9ca508585f57f299b77cef45d,2024-11-21T08:57:53.177000
CVE-2024-23524,0,0,230e624abeb1264f575882f29402084a230de023d6b2834bb9894ee18b1dc174,2024-11-21T08:57:53.293000
CVE-2024-23525,0,0,ccada4146b36ebbc395f49babcccbdbedf9db8b3410cb6a1a4b8ba0c5e583397,2024-11-21T08:57:53.423000
CVE-2024-23525,0,1,df200e3b1bdec19216e25a6de4864c85bac6436bacbe44d24d830afccfbdde4a,2025-06-02T15:15:31.777000
CVE-2024-23526,0,0,58ea8cb3e70ab7a9702306500ff49dc5296448b63c1213f7a68f54480d8986d3,2025-05-06T18:30:25.693000
CVE-2024-23527,0,0,69d51eb5a5d640ab49d82d67f7460cb27ffd4fa20a8579becdaf860540ad3215,2025-05-06T13:35:39.873000
CVE-2024-23528,0,0,637d2a2ba39f10a22a8d9800f64405e2707572c05891930690365e5a1c9ebf30,2025-05-06T18:58:45.767000
@ -252738,7 +252738,7 @@ CVE-2024-23655,0,0,17fc7d790554df486ec677a5a1ece0195d91e752bce766bd1884c4780cb92
CVE-2024-23656,0,0,6b2dd5e5fc67d8f7e730ac5a91f9bc97b62f72d1c70d7c62411d5aa72b24b13b,2024-11-21T08:58:06.240000
CVE-2024-23657,0,0,af8dd4c9a54a228b51a3a7ea1ef8edba58b5bfd873984eb8ec483a5cb6984532,2024-09-20T12:49:35.743000
CVE-2024-23658,0,0,5335e0bfed7a3e1e945cd4842099e3db4366e8569f4b69b0eb6f64dcb84b357a,2025-05-06T13:54:11.390000
CVE-2024-23659,0,0,ad170a41af26f2d803ac6b77f51bcda8b824401a4b561683bd9fd982de3deaf1,2024-11-21T08:58:06.740000
CVE-2024-23659,0,1,382ad5774e5a73cbca95bbcf40ad42080a17578fcb7fffe0f9c459eec5bccad3,2025-06-02T15:15:32.007000
CVE-2024-2366,0,0,90e2f12149642b70d84804fc6f88a92a2e96d1915eadd9b4c5ad94265dc43843,2024-11-21T09:09:36.327000
CVE-2024-23660,0,0,8c936ab42762b0a08627ef5d1b0305c46f54eadd46f69b2265ff096c6d65b427,2025-05-15T20:15:44.077000
CVE-2024-23662,0,0,fcb6a3236ea3e39380df6e19287e42e2832677f3aa97bcd1d15ed0addfd552f6,2024-12-11T19:11:44.790000
@ -253862,7 +253862,7 @@ CVE-2024-25224,0,0,6661cb4ddcaf46a3be6af450c3d3d0e947c7be858470010fc1b0918027c5f
CVE-2024-25225,0,0,44e6226284b333e36adac04f9326790183394b1a94557d560e864b88631f7f62,2025-05-08T16:15:24.957000
CVE-2024-25226,0,0,6f8eafe79239304a0e78413bbc40fb88efceb15001ec387ba912730d7a0bc334,2025-03-14T19:15:45.037000
CVE-2024-25227,0,0,9d9c9f36ea15f809c0b3dec8ed8907e7769d9e9a7553111548f48089975ce5e5,2025-03-26T20:15:19.400000
CVE-2024-25228,0,0,a7ae97e8fc31026094e3fa6036e0a85536dfe9dfbfdd7eb8dad22a40923d779e,2024-11-21T09:00:30.977000
CVE-2024-25228,0,1,164d3e6f4b15051946b88dfa0c550c14f8324affef39ae8e5650405c1125d030,2025-06-02T14:26:22.573000
CVE-2024-2523,0,0,d3ebd7dd87c4d56dd6d177edeaec4b77f9df6d5a6465cc2e2fb88930d1d23528,2025-02-14T16:53:12.380000
CVE-2024-25239,0,0,e8b78e9075a52194c6cdf4e5429941a3e42a47f6da49a37e18b484e6c9cc5758,2025-04-30T16:21:15.660000
CVE-2024-2524,0,0,0e5bc8adf2a750b7df87f769e08c6248cfa89324acd88208a520f216dad3cf9e,2025-03-03T16:59:10.290000
@ -254753,8 +254753,8 @@ CVE-2024-26462,0,0,25f2254d778b889a2851e66f6c411f8a73b90524a128dab651aec48b5cdb8
CVE-2024-26464,0,0,4ab3cf87be607a3f2e4c00e75552541f89691b136bdc5e46f36bd1de5e4f294e,2024-02-28T15:15:09.390000
CVE-2024-26465,0,0,ade97cdb5c6cf4f48879f07ad4a7605a0c64a0d603fc472a6f3229d145ef5dca,2024-11-25T19:15:08.960000
CVE-2024-26466,0,0,dc82b286483ed0081f723ee3516747e22293d5c74e6b30bbf9650bedfe3ba1c3,2025-05-19T12:48:52.820000
CVE-2024-26467,0,1,b500d420921049b8fd4623514a671ad1adc39001df3a95f0e4b096c166702a21,2025-06-02T13:46:43.653000
CVE-2024-26468,0,1,cb9a2a0b675bae026341df25e5965cdc1a11555ba271a5ad0bd8f1416d0e5d50,2025-06-02T13:55:25.737000
CVE-2024-26467,0,0,b500d420921049b8fd4623514a671ad1adc39001df3a95f0e4b096c166702a21,2025-06-02T13:46:43.653000
CVE-2024-26468,0,0,cb9a2a0b675bae026341df25e5965cdc1a11555ba271a5ad0bd8f1416d0e5d50,2025-06-02T13:55:25.737000
CVE-2024-26469,0,0,9e4d593902085f4092c8cab6fbd5cadf0d15ba8323e2da1cf6d86de4feb54a4f,2025-05-13T14:22:16.917000
CVE-2024-2647,0,0,bbe1a272a76fd31c1c6ab2c26f30c3c63771d99203be4f6b4b60845ea9cf719b,2025-02-10T13:49:48.360000
CVE-2024-26470,0,0,5e30fb9ed298680eb1509fddcf64925b43bcf3998f5c1cf22223f32f773def6f,2025-04-30T16:52:55.830000
@ -256170,9 +256170,9 @@ CVE-2024-28065,0,0,70da5557c0864e26afef9c27a08ef280b066a769128683677a3fbf0e6bb07
CVE-2024-28066,0,0,d0dd8700e3d67194ced6e44b8a1aa15edc2e5058e4dc671b0d3ef7a28fb38999,2024-11-21T09:05:44.270000
CVE-2024-28067,0,0,3565fd0ada2e0c321bb115af4a670e45b532df6130e88a302b617be4c5f9f12f,2024-11-21T09:05:44.517000
CVE-2024-28068,0,0,4ad18e3fac7a71a575f477d531a4c0047d3a9eba63b8ba6967e711d0116faaae,2024-11-21T09:05:44.713000
CVE-2024-28069,0,0,2c3df4a11044519aee82b1095bf49b94ae8d5ece46a414fa0e9e9415816b9122,2025-03-18T14:15:38.693000
CVE-2024-28069,0,1,736f97bfad465537841603cf6580f412411f75153c2281100bedacded992c5af,2025-06-02T14:19:11.623000
CVE-2024-2807,0,0,d5df072d14c63a150df30c06942ef8b1a4196e073cd023f9b3c41b08dcfaef61,2024-11-21T09:10:34.117000
CVE-2024-28070,0,0,350dc52078b8b9e56ec10783d2d37c84484d32a4b1c593fac1d0c23e19a67233,2025-03-20T20:15:31.707000
CVE-2024-28070,0,1,8cd5859ab33b801ad2886a31ba005afafc0e5767ca4f5834c427b17913bef9ba,2025-06-02T14:18:03.163000
CVE-2024-28072,0,0,4c08f86186600b9b3288b9e0c28e7c3bbf121b9a165ab22ed55189c2b2697fdf,2025-02-25T17:12:45.987000
CVE-2024-28073,0,0,f4ffb5c6b4d3ef6f1309a2ec14e64f821a11bf12e7ae4d45b29236c4c3be96cc,2025-02-10T22:38:47.683000
CVE-2024-28074,0,0,3d38a6fb7b33bb44728bf0324460e801275e73fa7b2b344069badf98dbf71eb9,2025-02-26T18:44:42.420000
@ -256221,7 +256221,7 @@ CVE-2024-2812,0,0,8b6d30205bee6181242e8d31f403e11341462f2307faa4f20deb252027c2cc
CVE-2024-28120,0,0,342a2532f5b974c08d6471254539fc9caa0231a289ef6497f77b1f84f4afd09e,2025-02-26T18:46:09.633000
CVE-2024-28121,0,0,115a1c99aefa939b04cce33a32ba74eeb00b430abe11ed901a01a0cbd0e0e021,2024-11-21T09:05:51.707000
CVE-2024-28122,0,0,e3d16868d7774e283044aa0f03af6142658f7d2fd8130130495f2d2fa9dfb6f3,2024-11-21T09:05:51.847000
CVE-2024-28123,0,0,b58a74ee6c4946490f282dd06af3eba4d701ea7d5d2ffbcbbb9609b58e26bce5,2024-11-21T09:05:51.980000
CVE-2024-28123,0,1,797282998b189034c65379a6db3ac29de50060910430f35ee01f78e75f9d0bf4,2025-06-02T14:06:34.380000
CVE-2024-28125,0,0,a964f3be7fbf693cabfab1cab21a25243643637360f3b4dfc76dfcb0e2a98c0a,2024-11-21T09:05:52.107000
CVE-2024-28126,0,0,bdca6710977b6c4816da9b6611740c12aabc24c1dc8b3f05e1f936957ab23ed5,2024-11-21T09:05:52.337000
CVE-2024-28127,0,0,77e8cab03528d8443539f421af735f4841e64e2500d965d208c91c76c1e365e8,2025-02-12T22:15:32.137000
@ -256358,7 +256358,7 @@ CVE-2024-28279,0,0,371a6db4bfcfaa0c72291cbc279291879c814e6e774d39db4e4c005f7e298
CVE-2024-2828,0,0,79034e33018335efad10934558e8b84384b5f2f2133fce62438d617ea963efcf,2024-11-21T09:10:37.513000
CVE-2024-28283,0,0,ce7a9c7cebaf258528c4f64296c4349b2ca8196425fb75250670fc71bac6a199,2024-11-21T09:06:08.270000
CVE-2024-28285,0,0,d6af77d4c1b881ace2cde569269de77c400ab0444445e8beeda0612dd6100440,2024-11-21T09:06:08.497000
CVE-2024-28286,0,1,0757249cbaa15bc07df502c32c1b53781d52e423b8f162fc3de5e29bd12f0076,2025-06-02T13:59:05.650000
CVE-2024-28286,0,0,0757249cbaa15bc07df502c32c1b53781d52e423b8f162fc3de5e29bd12f0076,2025-06-02T13:59:05.650000
CVE-2024-28287,0,0,a8c69a5ccabbb193237debf5f07040ef395a0f376f000c1003682d3fc4f3b2ce,2024-11-21T09:06:08.947000
CVE-2024-28288,0,0,917c615d247f423af0c4696050d5dac2e677cd6cdc4f1d78fcb72e3632aa5e47,2024-11-21T09:06:09.163000
CVE-2024-2829,0,0,5d6ede104c5f721bc49057f0a400b43bce14f079f98156f2630e18adcc15a282,2024-12-12T17:32:37.870000
@ -261894,7 +261894,7 @@ CVE-2024-3575,0,0,bf0a974910d440c71c3203b9e6ca9232b0d786599944f42d5b466009b7058f
CVE-2024-35750,0,0,a08f0c642e5143b45302ac04d62196525ca30d68b265f75e66be64141fa421c1,2024-11-21T09:20:48.520000
CVE-2024-35751,0,0,4ce27a107dee54a69f8c46de316c7cb1789f9ede60b70f1f5e4b685d2a6eb074,2024-11-21T09:20:48.640000
CVE-2024-35752,0,0,ae1d5170072c24ca1c96dd5b14982b6b76b5d0362260390c0d54cf30c7d4317d,2024-11-21T09:20:48.767000
CVE-2024-35753,0,0,0a605ae0e6d106519ddabf368c726450f2d4946ed29eb600387c944021389d2b,2024-11-21T09:20:48.897000
CVE-2024-35753,0,1,7f4a1fc54e387b3927c4fb67cb34ae88c9b036a562dff94fc3473a1ee5288523,2025-06-02T15:56:33.503000
CVE-2024-35754,0,0,a7fb573e24cca17b6ddee680b8856f7167fdd27f0a2facf4cd95b77d9f2d43ef,2024-11-21T09:20:49.083000
CVE-2024-35755,0,0,a2670a69c401c728ac13a2b21e3d92a977a9fe4c7795e1aa8a8b58255db41b89,2024-11-21T09:20:49.217000
CVE-2024-35756,0,0,236b3486967bf2ab1760449450bb6e5e109679263094ee70289f983663531a47,2024-11-21T09:20:49.363000
@ -269754,10 +269754,10 @@ CVE-2024-45679,0,0,7651b6390d8c9eeeb21ca94da124cdf405bc8412a2ce55b38f820e578ca06
CVE-2024-4568,0,0,f6f19a8fa55535a065733ec93f910b17949f269894c359358bfe3741c8e56d5d,2025-01-29T16:12:47.597000
CVE-2024-45682,0,0,29a9b38c1416c69b93fcebe786e804315833f976987dba100541108ea6e9c025,2024-09-27T18:54:51.820000
CVE-2024-45687,0,0,f1ef720c82131faf3795ca7ed71e8c7a48a72b19604cac14b1322a841e7a6998,2025-01-21T17:15:14.073000
CVE-2024-45689,0,0,6cba9096d01ab9310441e23902cd59427304a3e16e6c1762f294c738a4de8439,2024-11-21T13:57:24.187000
CVE-2024-45689,0,1,b3af540ce8054eb70b4f18c1cdef1e82d0bc6ad2648cb6809151cd66efe0554b,2025-06-02T15:33:57.730000
CVE-2024-4569,0,0,ba592b80ed6116ecbd4d53735429f8c39d53ea8b4dcbfacd3c9ec216c31b3724,2024-11-21T09:43:07.773000
CVE-2024-45690,0,0,783797356f320178dffd5ab038bf0b14fae640cb9dfb28871854307de4347eab,2024-11-27T15:15:26.050000
CVE-2024-45691,0,0,3932b63960908ed3c75150580db34d2c7126268bddaefd50d4f06bf997974803,2024-11-21T13:57:24.187000
CVE-2024-45690,0,1,ef05d3aa36f58a2e15f52d9ef5652fc852ef625cfbd859b5fccdb8c372e4222a,2025-06-02T15:34:48.510000
CVE-2024-45691,0,1,b78674079dc47e062f07b7b25b905e8e25e7cf12e74767b65f2baf1000c993c2,2025-06-02T15:35:23.890000
CVE-2024-45692,0,0,cef1229496e48288d63ef2a3497cb6007e8aae6291614ef335d2578df3868291,2024-09-05T21:35:14.337000
CVE-2024-45693,0,0,d8dc5be56c194fd0cc76faa90b52d189116fba89e125b6f6d0385bc9a2b3161b,2024-11-21T09:37:59.820000
CVE-2024-45694,0,0,a456b081b3a06009bc3ccae784c6bf7e3fe7500705b2698ace6703b0601ad915,2024-09-17T18:40:07.243000
@ -271914,6 +271914,7 @@ CVE-2024-48873,0,0,cee95097906f778e3918c39df3defa2e6d02e9a00cca599ceaeb9dd37d6a5
CVE-2024-48874,0,0,eeaca873ea28c1f296f045cd53e89c3d879a147973586469db92bb65f5b360fd,2024-12-10T19:44:16.093000
CVE-2024-48875,0,0,bb50d02366cde2f1dbfc074cc80cb37e110ec9788344cb4eb4a5fdece8dacf62,2025-02-03T15:17:17.033000
CVE-2024-48876,0,0,22d2844af665c57f4c01ec7fd9c25097e59e54558a31a5014c9af9ca1de57285,2025-01-11T13:15:23.263000
CVE-2024-48877,1,1,371acfd33f2cd0545e9c631917ebef4a084b7ce16b424e2f6add83faca1beffb,2025-06-02T15:15:32.200000
CVE-2024-48878,0,0,61df8c716ea1a9423d8f98d007fe741d86381fb579c3442ef6d827deee3b213c,2024-11-05T19:44:58.650000
CVE-2024-4888,0,0,133d57bae18b01966145fd4e4ce13e18e7959193dbb6b4323cb9d35593035efb,2024-11-21T09:43:47.830000
CVE-2024-48881,0,0,b23f95dff65a492953a695b231d4f9344fc7f54af69ded8ea700f43b3702364e,2025-01-31T15:54:29.633000
@ -271930,7 +271931,7 @@ CVE-2024-48895,0,0,2619cbfc056db229022c601c361879a86e8ef7297a78db8864167658fcd89
CVE-2024-48896,0,0,68f9b7eee2d42fd99555582d831f186b3535e450fad14d101fd4d18eb273b831,2024-11-20T14:47:12.777000
CVE-2024-48897,0,0,f3182141722d6be3bdc9aba61fbb38fd1908803d90d823ef2ab33a0e64cdc49a,2024-11-20T14:48:25.373000
CVE-2024-48898,0,0,2bbe84de4ba6be3ab03f78825e1f154bca82574585a617dc37898b47a2165c1c,2024-11-20T14:46:16.237000
CVE-2024-48899,0,0,0c1631b2f90bcea62f89ccb0ee7cb25d734bec0e3c021c6c25e47a4d336deefc,2024-11-21T13:57:24.187000
CVE-2024-48899,0,1,eb76319bd18f01b7503dd2a2f3856ff3104244a68e1129e9428c69469b9ae487,2025-06-02T15:36:03.710000
CVE-2024-4890,0,0,6e589fdb6077c4e188ee9995a9f88a600abbe14c9e8cdba14f2d7418747caae1,2024-11-21T09:43:48.113000
CVE-2024-48900,0,0,906a3971f953f9efb237a78dcf4f276b0eb327f92bdc6728147ee1acc8f7a2f1,2024-11-21T18:15:10.460000
CVE-2024-48901,0,0,71a32a44c0ef4ae7be4ebee83c1da9cd9051ae7f4725178587fe5cc4d9f33740,2024-11-20T14:45:10.380000
@ -274485,6 +274486,7 @@ CVE-2024-52030,0,0,1c8c0fc19875fd13cb7d2c670514db2905b658fa65d7f02c2e79f836f774f
CVE-2024-52032,0,0,ebce94fe2fa07c0a2426d75efa16d8e7877d250f9ee8dc2354264e2c39be86dc,2024-11-14T16:47:21.583000
CVE-2024-52033,0,0,0dfe20fd02897926b6d074909c30d74601a5c2c41f63e04fe1072b7b927bd8fe,2024-11-21T13:57:24.187000
CVE-2024-52034,0,0,c9473f84b9fc6d425259f88e7c5b60351f6ac73033e0eb23e91d0c305c1e3c69,2024-11-22T23:15:05.640000
CVE-2024-52035,1,1,57d7ad9b395a163afa31f99f53d49955ad252d51184c3ebd59d82a8e18d29718,2025-06-02T15:15:32.377000
CVE-2024-5204,0,0,861a03c6b8b38defa5d93991a4825262ae7b814b89fc2ffc1e32a59f04171e4e,2024-11-21T09:47:10.927000
CVE-2024-52043,0,0,01817a93ef2b86eee46d11ea37ef3b14d11dd95a30b1201cefbf5183522c2a3f,2024-11-08T20:39:36.233000
CVE-2024-52046,0,0,2012afe94f0162668960f3b67f775d4001b7749fc2a22f4787a854837296713d,2025-02-12T10:15:13.573000
@ -275894,6 +275896,7 @@ CVE-2024-54024,0,0,b12992324e708add852aff73cc4680ab70c64cd77d627c575cda6c4714aff
CVE-2024-54025,0,0,8aa32b233e56da713dddb0eb535be2617e97f8dd7601088b08118f98be13f739,2025-04-08T18:13:53.347000
CVE-2024-54026,0,0,723fec38eab4317b0780c9816dd56e900186889e5e56922795660677a81a6c2f,2025-03-11T15:15:43.307000
CVE-2024-54027,0,0,7544813701dc95fd0c5530c62bca74c9e14470944bfaab3455d456f59c4e66ad,2025-03-17T14:15:19.613000
CVE-2024-54028,1,1,36484056b10869dc38c3906b20182f6306b1bd640a307d95072de46e0139cbea,2025-06-02T15:15:32.537000
CVE-2024-5403,0,0,f4e58d907f2a672c85e38960e3074ec1cb3261646ec2ccae3d1a32d0c95159be,2024-11-21T09:47:35.097000
CVE-2024-54030,0,0,07c84f217a6fa368622d2a223843d19c0c7e728e80537c7c260b676bb124b4cd,2025-01-07T08:15:25.760000
CVE-2024-54031,0,0,e561fa8b1140e643c613ddbd502d702389ee48a6a06d0cb85808f49f71337f6f,2025-01-15T13:15:11.203000
@ -278081,6 +278084,7 @@ CVE-2024-57777,0,0,0a0491ad5da31bf74445425855f0e8fab666a442d1eaff789c85a35d3cece
CVE-2024-57778,0,0,88cc3788386a43b9b29a906a8a7d919e762036b78785413c8cdb1209d44810a7,2025-02-18T15:15:17.207000
CVE-2024-5778,0,0,44ca5dca3141a6d37f6826ebacfa9246d365e941b7c28662690166013bb5bd71,2024-06-12T08:15:51.173000
CVE-2024-57782,0,0,022d7da96a22a84980eaea7d9eae565f929bfd801967ab630182f4317d7eb947,2025-03-17T19:15:24.683000
CVE-2024-57783,1,1,4e88c24e2aa75b7c2ac4ecf5b6ce7d382070b40ed51ee777a7cf4e78f39413f3,2025-06-02T14:15:21.170000
CVE-2024-57784,0,0,a0ffa91a6d1336afb59f42e28acde5cce54240c902b605d9b18af65e76eeccc4,2025-02-03T21:15:15.133000
CVE-2024-57785,0,0,da53710abc0b38f1f9720d31a7383037ac10a091073d73f356e9f0e15e997042,2025-02-04T15:15:18.943000
CVE-2024-5779,0,0,2a86c05c31e595b12ded5db682c98a0bf6f259741199a426f00c627efee46fc9,2024-06-12T08:15:51.240000
@ -280637,7 +280641,7 @@ CVE-2024-8172,0,0,5e062d7fa9b382dea93e1f767fffb1fa53a9fae08c970d11918d99fbdd4158
CVE-2024-8173,0,0,79d0a5bcc298ac96a53f7987d1a6d8cd25e9e6d09db6737baa14ffb177e446db,2024-09-05T18:39:00.950000
CVE-2024-8174,0,0,3446999d604a73b64824b7dfc0f9030b87b9bf86620bf485c6700ced4124e5f3,2024-08-27T14:32:08.607000
CVE-2024-8175,0,0,315b5d8c30fa3f596d2b19f9165abc0783338a7797fc6b810b3d2ebf5065b9c7,2024-09-26T13:32:02.803000
CVE-2024-8176,0,0,5507ff0a27c05e7d2d3abfa5ac8b36bb36ac287f2602eb76fd677d6484639188,2025-05-13T23:15:21.950000
CVE-2024-8176,0,1,974d7a123488f70a8c32f0d47ab2caea84c500e146b526211794ec9b05bdda5f,2025-06-02T15:15:32.773000
CVE-2024-8177,0,0,b6b87a35240fa465258bcf1069a2f42ce120e742e643226c45df1f3c07fd30d8,2024-12-13T01:29:28.587000
CVE-2024-8178,0,0,f63bf0f152c4f86c96b3594773688985cacb234931d40b4f2f4b7730cd2e6082,2024-09-06T17:35:20.203000
CVE-2024-8179,0,0,b1b4aece608ad1a17ae7c49798e553f4880b682fdd1e7f65e9fe5b21bed13415,2024-12-12T12:15:27.937000
@ -282372,7 +282376,7 @@ CVE-2025-0069,0,0,d7ac8ba36cfcab8a8836c1588e52e8bbaed2d415e393c11bf82b7bb82617b0
CVE-2025-0070,0,0,dbf9edc467887c587ee503735d983d3eb618b4cd55fb133fb8e2178f124d6f6b,2025-01-14T01:15:17.427000
CVE-2025-0071,0,0,a9f17b8587d9681508885fa05b5cb6e1fb480f5738675f612162a9b567f90271,2025-03-11T01:15:33.917000
CVE-2025-0072,0,0,7c68681d522f867cd278cffcb4470ef78b9648796a6206167a2247ec164299a1,2025-05-12T16:15:21.587000
CVE-2025-0073,0,0,e612b82ce7aceb5e22ac6e6c5a7d01a7a284ab1a80d6f17bf536b26f9203eb73,2025-06-02T11:15:21.067000
CVE-2025-0073,0,1,ae7b0d240988df51d9b1701b880c556e013b1eaf350e263b193849e46f73f13d,2025-06-02T15:15:32.967000
CVE-2025-0101,0,0,391653291dbc9e356bdd9f7cf48cb4ee16c22960b84cfac559c323183419fbd8,2025-04-16T13:25:37.340000
CVE-2025-0103,0,0,06fd8d922bac50d8ab7e8102b5457a5978f502265c9b1059554ccaf6e0c9679c,2025-01-11T03:15:22.020000
CVE-2025-0104,0,0,dc4c81878786bc602ee20c50b1dae485c1da904352cbab72ccb96b2a9dcd9e75,2025-01-11T03:15:22.183000
@ -282946,7 +282950,7 @@ CVE-2025-0814,0,0,275433a2e2c23056d581480e8763e8e9197d76ff67d734aa21e397b5cac2bf
CVE-2025-0815,0,0,f73b50d64016c2e64fd2df2d6c90edb74018594168bb3b9f019d2de177423288,2025-02-13T07:15:11.160000
CVE-2025-0816,0,0,d49cff9b1300ba83e836640c26fee4d28d3c84d54249c4f7af3bef6763c2c81e,2025-02-13T07:15:11.353000
CVE-2025-0817,0,0,11343ed20662b8da62be45ff4c13d864ae4d9a05be3d231b0a3e4a5cb280e5dc,2025-02-21T12:15:11.963000
CVE-2025-0819,0,0,50a9643f2ab349d33a7d5834da9052f27f85d7c0df2fe60b842822c4fff1cf26,2025-06-02T11:15:21.707000
CVE-2025-0819,0,1,6a85f061cf11860762cab47105a1994eb35ae64727bb08bf1067c560dc09bbd9,2025-06-02T14:15:22.580000
CVE-2025-0820,0,0,6d45f28eb00b0039ad804e065c885bf40234d2bcc3aa26a58867a7f5eaafc285,2025-03-01T05:15:15.953000
CVE-2025-0821,0,0,276d38f36e1718392d91943f87a21d4117bd30970ca15dadffff44ef97d51e0f,2025-02-25T03:42:52.263000
CVE-2025-0822,0,0,4c844a6713ce2631895193eac241699c6c3839eb1c8dbea359488af5de55887f,2025-02-24T12:36:46.670000
@ -283286,7 +283290,7 @@ CVE-2025-1240,0,0,363ac0ec488e57d295d78c481b595c1c1507ba076f5813d8f4f20530988afa
CVE-2025-1243,0,0,b36908327b1b41fa664c4a39c71934592fd1d75bcc40ba67f7d64ed64955da7e,2025-02-12T01:15:09.073000
CVE-2025-1244,0,0,ca7dde03c53f2f538c0b12fb599e84ae66a426ff6488b7e67f4989aba1f7a6f7,2025-03-13T14:15:34.977000
CVE-2025-1245,0,0,1f44b48d866bcc8251435e1f8580e9a7c9edc0ad7da6e06f008dba048b954524,2025-05-16T14:42:18.700000
CVE-2025-1246,0,0,0251c2ff86aa80d3f3c492ca4aeeab9dd727fa21cb46bb08a619161352af0126,2025-06-02T11:15:21.823000
CVE-2025-1246,0,1,d28c647e8b5c0ca40b323666d7d8f8ec4b62daac93e0b59ae361b147c35f023d,2025-06-02T14:15:22.753000
CVE-2025-1247,0,0,413d4bcd6e00b55487b15f2b541fa31d8a6169438afa6345f0107f85b8ddc727,2025-03-03T14:15:34.120000
CVE-2025-1249,0,0,6a7f3a2500b58cdcea7c9e46385c15368818268591d8a8d12de3eb4b42bd3d72,2025-02-26T15:15:24.470000
CVE-2025-1252,0,0,9716250bcf118be27f9d89f5f8b184767026e3acfd92390347cf9e55a42d7d4b,2025-05-08T14:39:09.683000
@ -283895,6 +283899,7 @@ CVE-2025-1993,0,0,cc38e952c65d052c82178ffa099a41c9554ba3ffc8216755b6ee79ded066b7
CVE-2025-1997,0,0,2320e8fae7a90840d951f0ca1bf029eb0495106dea7a57ba1224c981543ab87d,2025-03-27T16:45:12.210000
CVE-2025-1998,0,0,3538634182b2dcc45e8bb62709ffff36cc782093b83dd33c724b80bb29d5b1ec,2025-03-27T16:45:12.210000
CVE-2025-2000,0,0,c744a04801dcef754276dff40a4c1297d0ba396540500fda4355fbfeeb2bc0f3,2025-03-14T13:15:40.907000
CVE-2025-20001,1,1,10a8b3950273df4f8746aaf980a710e420d33450e936e6be226d6e765e0b0b5a,2025-06-02T15:15:33.110000
CVE-2025-20002,0,0,06f8b7b78b05d57d8766d2266c0a87b89836980b0a1b3eef34006bf4ebbae468,2025-03-05T00:15:37.910000
CVE-2025-20003,0,0,9aab26fae4688f2c5b24f48fd9367dc0a88c0b6a43467853ef0bf76f42f26649,2025-05-16T14:43:56.797000
CVE-2025-20004,0,0,b41fd66e5620d6ef99a6c291133df66a941b40000f945dc548e07a2ae7b9f6c6,2025-05-16T14:43:56.797000
@ -287933,7 +287938,7 @@ CVE-2025-2517,0,0,d5f18489614869649cdda48e18fead9184cb1c42970b5856b1c4b6d2f7bf53
CVE-2025-25170,0,0,10b2b5d5b1d8e09a883b23033bc8ac75abe37fde2151575888a21edb35483c78,2025-03-03T14:15:54.613000
CVE-2025-25175,0,0,57f52436a99f7fed27112577d2b540c306e155b82b661017f91c9191eec841c4,2025-03-13T09:15:14.123000
CVE-2025-25178,0,0,4d3495fd89869cab43d2d5601ae744320ec1fbb133f1b7ab10bcd79797aa78af,2025-04-15T15:16:07.543000
CVE-2025-25179,0,0,0664ca98bae8342bf248103bce283686940031a025e1a3de5401f0969870563c,2025-06-02T05:15:20.160000
CVE-2025-25179,0,1,8b930b8c3e3cbf0c418063c11b43fa891041f6c375279d86a046ff51904a19f4,2025-06-02T15:15:33.260000
CVE-2025-2518,0,0,a8f5c8872d95d859608c7cfe7c532bd063803d6f530f9a6abeebcf860d42a83b,2025-05-30T16:31:03.107000
CVE-2025-25181,0,0,aebe0b9a6314ff7a9f4a4ab410e1c6b1bc48e96ec20a3daea50dbb87c370c597,2025-03-13T14:31:11.140000
CVE-2025-25182,0,0,6fd347398e5cc83c7bcf9c93dfa3366f2e8e0aced29c81495217dd5d01f504cd,2025-02-12T17:15:23.857000
@ -288477,7 +288482,7 @@ CVE-2025-26389,0,0,69c0b4482301cbdf7810c0d66dde175a8a55879ae4b001f43aded2e047b17
CVE-2025-2639,0,0,eeccd7e86f1a8e6550900d4406a77fd9c06a6948c701e759827649fddf007255,2025-03-28T19:33:14.553000
CVE-2025-26390,0,0,d486511ec0cd7e022494115d025bafe0774221a17a1b54e8ff55467ae4483ee1,2025-05-13T19:35:18.080000
CVE-2025-26393,0,0,0084efd52fbee3d09de405c3fe48d1fbc4bd7655a73c657547c37f33e81d553f,2025-03-17T20:15:14.140000
CVE-2025-26396,1,1,3fec10aa99b62ec6557c26ff189fae94e929e21d16192c5bd4df833d6411ad26,2025-06-02T13:15:21.367000
CVE-2025-26396,0,0,3fec10aa99b62ec6557c26ff189fae94e929e21d16192c5bd4df833d6411ad26,2025-06-02T13:15:21.367000
CVE-2025-2640,0,0,cb1c6d71f05715e40a599d54b3e503bcebd1109fe2ad2ac7ebfd5568ea675609,2025-04-02T14:26:23.040000
CVE-2025-26401,0,0,8a8a5edf8458e0cd9c5461b93aa3dd8d7a38c5486b82730ab0a36983d22db1ca,2025-04-07T14:18:15.560000
CVE-2025-26408,0,0,cc3ff44719bfe263908c93711d844cb0c43379729d03c83e2a4a7413b5395225,2025-03-22T15:15:38.687000
@ -288491,7 +288496,7 @@ CVE-2025-2643,0,0,f96a1e9165c8c6b99a098f4d86d5cf57a75b6fe768e009b644ffd8b873a806
CVE-2025-2644,0,0,6ca4f7abbe58e9b22566e3f05f3eadc09a0b0dd9a1ead419e5c203f89ddafe7c,2025-04-02T13:30:34.347000
CVE-2025-2645,0,0,bb51f6ba23884b7e7c3767dcbb7ecf7badccba1b056823008f0ccc4a1f7f8fd8,2025-04-02T13:15:10.653000
CVE-2025-2646,0,0,1f43af586340e9a3b657344aff21032473ef2c407815ff224af302b07a3268d0,2025-04-02T12:32:58.283000
CVE-2025-26465,0,0,6299ff125dc1c38b894659aed9c0746efb4d353a8bd04009f0c542a1fee0c6a1,2025-05-27T16:15:30.890000
CVE-2025-26465,0,1,ac0fdb720eaae016b7a47bcdeea42f0bc1abfe57712ef9fedbef53f01af96ede,2025-06-02T15:15:33.437000
CVE-2025-26466,0,0,1656a292c9a746d1d9c8576626629bb24a094bd9c889c8b628a2189f999ed909,2025-05-27T16:15:31.100000
CVE-2025-2647,0,0,31fe515a44f11cf9569f888e0a91d0a688196caf010a5ad274bf1696fe7f4f4e,2025-03-27T16:26:36.977000
CVE-2025-26473,0,0,41b0bd46f32c6729eefb29a2666cce546dde395dd2362800539aebed7d4bc19a,2025-03-19T10:34:55.550000
@ -291237,8 +291242,8 @@ CVE-2025-31259,0,0,58aa3fe000d9fd54882741087fb8c4bef11ee6d048be6cea4692fa3a1bc83
CVE-2025-31260,0,0,97f1087f96d08dd66d679fbf0003dd18d73e0a2dc386ab135a2a6e50a6418fc6,2025-05-27T20:04:38.437000
CVE-2025-31261,0,0,fe9a725ea8350416195739877d19c3e659ef0a1757d010c1080b93bc2647f648,2025-05-30T22:15:22.140000
CVE-2025-31262,0,0,7599e648849bdfa2172ff63c139068eaa0fd9196c21c6b9b97d7ada151e0e86e,2025-05-28T14:18:57.337000
CVE-2025-31263,0,0,e87a7e4d372bfc303894e1fe4dbdb3c90e1ed962933ba5107afa6c1e0cacfbec,2025-05-30T22:15:22.317000
CVE-2025-31264,0,0,f42f391127caaee2df7ffa93c1b4ece8b29b7617afacaa32979073abdaf6cebf,2025-05-30T22:15:22.463000
CVE-2025-31263,0,1,88645be91c3ed34cc14af01811c00380cfdbc0029a4b0732c323de859d142070,2025-06-02T15:59:55.480000
CVE-2025-31264,0,1,20ff5d7cf189206f9774e2adddb278b1b2fb3153ffb117332b1c9754f358a821,2025-06-02T15:59:48.713000
CVE-2025-31282,0,0,e42cf63dbb0fe720b3cff193b25f790bd6ddf2c2ce7f9ecf83cd2fa7f8f4826f,2025-04-07T14:18:49.830000
CVE-2025-31283,0,0,f1c9b9a8bd26581142b32e65b03aa48b10749e70986d31aa3500b4055b161aed,2025-04-07T14:18:49.830000
CVE-2025-31284,0,0,414b38cf46319d544e3e7ccb1bcdd15c60d390dd05075a67d2ab6f13acabecaf,2025-04-07T14:18:49.830000
@ -293005,7 +293010,15 @@ CVE-2025-3707,0,0,19f2a3789a7c8f868baebd7065af2264b477a736f48157fc6f27b30ec7dd06
CVE-2025-3708,0,0,d78aa125c93a2dcfe7efdd0fc06a6ffc03cde5530d4cb9fd272dabdbcad493c7,2025-05-07T16:50:44.930000
CVE-2025-37087,0,0,20c409449e046fc0b07333a7d65b24c67907255590b88923cb6e09a524d20ee6,2025-05-01T22:15:17.647000
CVE-2025-37088,0,0,64ae2a894e2b0014068f1cc908ac2a8b164865977a9c111fb0dac895c15630cc,2025-04-25T15:15:36.593000
CVE-2025-37089,1,1,0ed62dab044ae02e67ed805f154f8c4369ec05ec46e7b662b0c0c500bed53b96,2025-06-02T15:15:33.653000
CVE-2025-3709,0,0,bd15d31f777243540548b544e8985e8a31e62890f7bf4ae13fef85062e09984a,2025-05-07T16:50:52.680000
CVE-2025-37090,1,1,385c4f7fccead35647e1bb81b838fda98337fe690e831035ac40570e6393bb09,2025-06-02T15:15:33.767000
CVE-2025-37091,1,1,cf101b01bbd20c7e1da5e9eb0bd1673f87a1767cad8942b40339caa6934a5dde,2025-06-02T14:15:23.310000
CVE-2025-37092,1,1,dfc3efb74808ac55daee9377cb6ca7ee6f150bac57a973ed563672ed3a164c7c,2025-06-02T15:15:33.947000
CVE-2025-37093,1,1,49d31f66db76de2bdbe7ed120420f507ab24b06ab1c3fff6cd540e6e89059b53,2025-06-02T14:15:23.590000
CVE-2025-37094,1,1,9dfc6caefb4609b24e34427982fad785537ce4a2a867024c844bb2b0c990f86e,2025-06-02T14:15:23.720000
CVE-2025-37095,1,1,7b207e338aed02f0939d851dcc957037732d07b63863d7e97f96bde0ef766c08,2025-06-02T15:15:34.060000
CVE-2025-37096,1,1,f3dc98953c54563942cc134473111e1bd40dc2356ab5d687308c6844c522565e,2025-06-02T15:15:34.193000
CVE-2025-3710,0,0,0a7778bd78e4f22f022c252525488d49274bac6d5b6fae8773984217c6dc6eab,2025-05-28T03:15:21.150000
CVE-2025-3711,0,0,4fd34b3efb29d679fc862ba489bdc27881bacd2c43f3c49bf4be0e93fc622083,2025-05-28T03:15:22.193000
CVE-2025-3712,0,0,ea56365e47ceb44e31dafb8f72bb0d4f1a8a74a514b3fc339176f713c23eafa1,2025-05-28T03:15:22.310000
@ -294324,6 +294337,7 @@ CVE-2025-44134,0,0,45b85d904dd860695476948041d246707a0696d9dc7fe9b405a5e27a85d44
CVE-2025-44135,0,0,e8d32c865e9ccdb8b63503c21fad4c48843876d5709a3df063410109f034ccc9,2025-05-14T13:04:58.830000
CVE-2025-4415,0,0,842147d08c13efcbee3eee94c9e6b73fdc7bd886265d0112fafca4c76640377e,2025-05-21T20:24:58.133000
CVE-2025-4416,0,0,947e34b55b1f3a049a504a042d77855f4bb594e5af127c8b711744c73ee871aa,2025-05-21T20:24:58.133000
CVE-2025-44172,1,1,074712c3ade1084063c0166c360b482da566b4083f643bd388c2a3e43bd3a5a8,2025-06-02T15:15:34.317000
CVE-2025-44175,0,0,6a1ea2c060c5151e759fb4f6f9f8a177685f1f644be37fecaa66c9a597ac256e,2025-05-13T19:35:25.503000
CVE-2025-44176,0,0,06ea95c07747d5a57bc4a45bf66b04996fa2438a7e4362161ea04e3f0c60e03f,2025-05-23T19:00:51.080000
CVE-2025-44180,0,0,cbbf280e22b3f1eceb8396c23851cf21862b54048f76231b82a81c5cae091205,2025-05-28T14:30:23.873000
@ -295006,8 +295020,8 @@ CVE-2025-46802,0,0,e0845e0a2badfb8351bf85ec4dfd1c99c7e29caf4bb332a81fa1375afc25e
CVE-2025-46803,0,0,0a5de4a7042abfff99e6c11ab58d1e1483a67b11f4bef7e11f8857a336030c12,2025-05-28T15:01:30.720000
CVE-2025-46804,0,0,33150bb68c13eed9accf4cb312a19408b88b9f75691eb7f11163f9cad134f711,2025-05-28T15:01:30.720000
CVE-2025-46805,0,0,b1097088aa0dbd2e4b45c8b3983be6a33e94edc138942af1ff1720f9da99ad58,2025-05-28T15:01:30.720000
CVE-2025-46806,1,1,603ad39c04d3b6dfb4d74e2a6593c9cafab3fcac7b5373b3a24f9b62ae31d289,2025-06-02T13:15:21.600000
CVE-2025-46807,1,1,1c6a320639dd7d05bae2073dca3f030f06f77af255e7f77dab44f866bfed0685,2025-06-02T12:15:24.800000
CVE-2025-46806,0,0,603ad39c04d3b6dfb4d74e2a6593c9cafab3fcac7b5373b3a24f9b62ae31d289,2025-06-02T13:15:21.600000
CVE-2025-46807,0,0,1c6a320639dd7d05bae2073dca3f030f06f77af255e7f77dab44f866bfed0685,2025-06-02T12:15:24.800000
CVE-2025-46812,0,0,efbba45e18cc8937b9f87a0e29f466265a1e1be9d804a38357596ef0f2987dda,2025-05-12T17:32:52.810000
CVE-2025-46813,0,0,01deee0db3f748e6f8e958a47d5a96825a2f5d578da6e58d6d8c34dd9ef7b2a5,2025-05-05T20:54:19.760000
CVE-2025-46814,0,0,a39c61eb85c9c40f8b1a1b3b957ff5b21067cc488cde122058f10a18468e916d,2025-05-07T14:13:20.483000
@ -295097,7 +295111,7 @@ CVE-2025-47284,0,0,927b09b86a7bb19dbf3e9d0808f921b2d28747e702e8d9ec13ede5b5a7267
CVE-2025-47285,0,0,a4b322cfa16ac0198aad5626c2233334a81e0c8124806adefa631e6ad6b3d8e6,2025-05-16T14:43:26.160000
CVE-2025-47287,0,0,4a03b7a85e9f4f1ae469c2f4edaad7e40d35a7308b2c4cacf7afd6a1813a45c3,2025-05-29T06:15:23.090000
CVE-2025-47288,0,0,4f46812765e170d3e0663ea32f05e904834e57f589f5c764ae983ba008d7452b,2025-05-30T16:31:03.107000
CVE-2025-47289,0,1,09cb84c673d83325feab8cd735aaca2413f90bf61c59c4bcaed6123f411e9d81,2025-06-02T13:15:21.743000
CVE-2025-47289,0,0,09cb84c673d83325feab8cd735aaca2413f90bf61c59c4bcaed6123f411e9d81,2025-06-02T13:15:21.743000
CVE-2025-4729,0,0,073b70e77ba60376073b6bf036503b0e9d4ab1ba93aced39541912843c902c9b,2025-05-16T14:42:18.700000
CVE-2025-47290,0,0,fef9205d946b23690e870377651d8631936053bea9e3a05a823cfda120b52c00,2025-05-21T20:24:58.133000
CVE-2025-47291,0,0,77c2613c093f23da4845bc4516f16594af2697fccb6f4c62fbf6122c314ea551,2025-05-21T20:24:58.133000
@ -295727,7 +295741,7 @@ CVE-2025-48490,0,0,87ecfeb6e490715223675b6987710680d7319b22f1f72e859b8289d6cc58a
CVE-2025-48491,0,0,192909d10acf6a2f5c7dbd7cf4a77eb5c3f60df46b3da837effcf5a7a7693800,2025-05-30T16:31:03.107000
CVE-2025-48492,0,0,27f020803580a5c4453e15c7140e9561136d4680304daf59a0f7133793e5d193,2025-05-30T16:31:03.107000
CVE-2025-48494,0,0,5745fb806ce299632f2531b42815e36bb1c9c8377243e0f319ec99a0550ef850,2025-06-02T11:15:22.867000
CVE-2025-48495,1,1,fe5c88c6ea2ca72185cecedb50ad11f9b1ee65a3599da0cdcaa0274975580e8d,2025-06-02T12:15:25.380000
CVE-2025-48495,0,0,fe5c88c6ea2ca72185cecedb50ad11f9b1ee65a3599da0cdcaa0274975580e8d,2025-06-02T12:15:25.380000
CVE-2025-4850,0,0,f4734de71688bb34b47f04cb41c5af0cc568cf46c9e6cb90745360a2b3c7693b,2025-05-24T00:57:35.620000
CVE-2025-4851,0,0,e5a9ac67f494616a05e2f84fff689d174d4a8c96dcdf95534865dd01a2cf2a1b,2025-05-24T01:03:29.400000
CVE-2025-4852,0,0,8056c97adb54f901af1b48f1e44b7ca1809889745baa2872bb19324ac5d93e7f,2025-05-19T15:15:34.693000
@ -295761,7 +295775,7 @@ CVE-2025-48741,0,0,75001d0705bc789d943f76109b8b14a126d281e251509064c5cca96008e10
CVE-2025-48742,0,0,5f33c781ef30502ef2e246627292bc67d88c79205c0f59dcb70501ff4a68f09c,2025-05-29T17:15:21.900000
CVE-2025-48743,0,0,24d943dbdb45a4fa6b30762dbd53504c04a4380cb55364901f38457df34be0b5,2025-05-28T15:01:30.720000
CVE-2025-48744,0,0,2bdd08647659ee3f558bb4b4bded879f1ed8d92273df3815d9aaa6c8cd04d2b8,2025-05-28T15:01:30.720000
CVE-2025-48745,1,1,f2d9c50f894d95aade77e788c5c232afd36dc9a98ad93323913ad989a9da4a6d,2025-06-02T13:15:21.897000
CVE-2025-48745,0,0,f2d9c50f894d95aade77e788c5c232afd36dc9a98ad93323913ad989a9da4a6d,2025-06-02T13:15:21.897000
CVE-2025-48746,0,0,f72c5a8d16806b0ba968ccabf6f8a5266bce1d331d3179a6d466243179f0e088,2025-05-30T17:15:29.937000
CVE-2025-48747,0,0,8c3baf0ee9646e657c0ba351a53bca2d3d39df6e364e578cbb75404ea4e19368,2025-05-29T14:29:50.247000
CVE-2025-48748,0,0,379223c1d681caf1cc4eae8f0abea64ba33403c2868d28f8d0d01bb8de57655a,2025-05-30T16:31:03.107000
@ -295843,14 +295857,14 @@ CVE-2025-48946,0,0,1a27a6f457ae10610e9029a593882fe63dffb628eae1e50404a3c7d290e45
CVE-2025-48948,0,0,ca75e8c9851d84ae181b6b16f7e3dd9c6089c2140c1ef03716877d045b38e2d4,2025-05-30T20:15:43.910000
CVE-2025-48949,0,0,4e76516c9619345b129c182f65062ed50a58136a10adc9889a0de68842130806,2025-05-30T20:15:44.083000
CVE-2025-4895,0,0,451159abdd179506166eda92c0cc3ecdcfca15d4a903bf6a2c0ccf029c166653,2025-05-21T19:37:48.777000
CVE-2025-48955,1,1,e866020b5e53cd957bc33457946ef98a259e2748730b0523cd3a756f2ee07e50,2025-06-02T12:15:25.523000
CVE-2025-48957,1,1,0bb9005e25d05f04f7168f81837919e34950d9cf87042ea4188ad6efc5d9339e,2025-06-02T12:15:25.680000
CVE-2025-48958,1,1,c67b68371e8bfae6a779f69aa2d3c70fb8dff5d80a7f298972784a871b72d1d2,2025-06-02T12:15:25.840000
CVE-2025-48955,0,0,e866020b5e53cd957bc33457946ef98a259e2748730b0523cd3a756f2ee07e50,2025-06-02T12:15:25.523000
CVE-2025-48957,0,0,0bb9005e25d05f04f7168f81837919e34950d9cf87042ea4188ad6efc5d9339e,2025-06-02T12:15:25.680000
CVE-2025-48958,0,0,c67b68371e8bfae6a779f69aa2d3c70fb8dff5d80a7f298972784a871b72d1d2,2025-06-02T12:15:25.840000
CVE-2025-4896,0,0,eb43857d84c4e3c0ca9bf4ac15086d7606c87aaeb17237d45e10278d3431115c,2025-05-27T16:30:13.490000
CVE-2025-4897,0,0,104730cc5ad0680860a774881c7ad06896ad7afe2bb00c017480a43cf79011cd,2025-05-27T16:30:05.410000
CVE-2025-4898,0,0,088de021e18707e0dc4ec8499500601b39900fc456f0a7d4c0f7a0b50fbac254,2025-05-21T19:37:41.533000
CVE-2025-4899,0,0,384aad67823f1c19c564c5975182391c80467536acba8235a635dfd93a5393e3,2025-05-21T19:37:31.280000
CVE-2025-48990,1,1,53563761e0abc7a3ca88976c33667a47da4f8dc3c5f72a17ecf7203538dc6a56,2025-06-02T12:15:25.997000
CVE-2025-48990,0,0,53563761e0abc7a3ca88976c33667a47da4f8dc3c5f72a17ecf7203538dc6a56,2025-06-02T12:15:25.997000
CVE-2025-4900,0,0,a63cc638a24f84eec22901c973a40410ae17057cc7bae6578e39029782b2ee63,2025-05-21T19:37:15.790000
CVE-2025-4901,0,0,e27cda4f5daf0c789b44760e4e5b993aff83932164a6246a45c2b68bff562e8d,2025-05-21T13:40:20.293000
CVE-2025-4902,0,0,6a78a99defe072cc999de50623b42fd325c4fdcaf44bc58ff1a0ab5edd3f00ae,2025-05-21T13:37:47.987000
@ -295864,7 +295878,7 @@ CVE-2025-4909,0,0,2543aa084bfc859fe1a7a0558cc76c793b6ee9b986cb9885265313fc24749d
CVE-2025-4910,0,0,d0c7584b70570a0f60f72259e5222dec42c6f070aafbec7da031c0738cd595d2,2025-05-21T17:40:58.137000
CVE-2025-4911,0,0,8165f0d1dc1e78afded21e50626575112805e2ff63d8f266295fb56c02f3696f,2025-05-21T13:26:25.383000
CVE-2025-49112,0,0,68b9f8ae8378455b94697490a4c9482a35ead35162dc1f57c6769030fa5d1d53,2025-06-02T05:15:21.277000
CVE-2025-49113,0,1,32d36c52070530467b17daab5505f8aec0de856bdbbf3bfcf6775e31c5175692,2025-06-02T13:15:21.987000
CVE-2025-49113,0,0,32d36c52070530467b17daab5505f8aec0de856bdbbf3bfcf6775e31c5175692,2025-06-02T13:15:21.987000
CVE-2025-4912,0,0,952cc1697455c59886c397e61a80308747f6eedd0f377c0531d621b366fc5d7d,2025-05-21T17:41:21.063000
CVE-2025-4913,0,0,53b3af32223266d4fefa6288fa7668d3e6278e5d2f6f83bce997bdbd90d149c2,2025-05-19T17:37:22.390000
CVE-2025-4914,0,0,a988b116f09ba2a954362a47d883dbc77032cfbf0fc2d8366f3812d4ec746e85,2025-05-19T17:37:31.327000
@ -296188,11 +296202,11 @@ CVE-2025-5424,0,0,8846307422a1e70afaa4472c8339f8684a9ad79dc12a6b1e4401dcca541b41
CVE-2025-5425,0,0,be91d19736e14b87d2d7a8a21cf7155dfcdc6ebc2c74f44b7cabd08f35eb48eb,2025-06-02T03:15:25.537000
CVE-2025-5426,0,0,57cb772d14527dbc6e6a63b12d5b01bad3ac902c3f8c60c73dd5ff0ee844eb33,2025-06-02T03:15:25.717000
CVE-2025-5427,0,0,7248241b6511e7dae2909aae008975c5e1d909b0fa9a2d42cb023cab3ad79f41,2025-06-02T04:15:44
CVE-2025-5428,0,1,8de7c8b73073abc1d37c3198f867a27f29ebbbad4190b2dd6629572e7d38630e,2025-06-02T13:15:22.140000
CVE-2025-5428,0,0,8de7c8b73073abc1d37c3198f867a27f29ebbbad4190b2dd6629572e7d38630e,2025-06-02T13:15:22.140000
CVE-2025-5429,0,0,d3b059787ffa7e06d4a4aef3851efbbfa5534e20659ffd5b3f55c63550568be6,2025-06-02T05:16:08.447000
CVE-2025-5430,0,1,575998dfdc58bf78895e6505775ceb47d8fb5a44c64b642741ea3c1e2d02041c,2025-06-02T13:15:22.277000
CVE-2025-5431,0,1,994e477235c446060bbb3fd20ba0a9dde6f8fc0485f87b1341fbed2c0eb64a07,2025-06-02T13:15:22.403000
CVE-2025-5432,0,1,1606ccb952e02573ce9e9ce8f262975d836a490db658823d9e039892725ade78,2025-06-02T13:15:22.523000
CVE-2025-5430,0,0,575998dfdc58bf78895e6505775ceb47d8fb5a44c64b642741ea3c1e2d02041c,2025-06-02T13:15:22.277000
CVE-2025-5431,0,0,994e477235c446060bbb3fd20ba0a9dde6f8fc0485f87b1341fbed2c0eb64a07,2025-06-02T13:15:22.403000
CVE-2025-5432,0,0,1606ccb952e02573ce9e9ce8f262975d836a490db658823d9e039892725ade78,2025-06-02T13:15:22.523000
CVE-2025-5433,0,0,c8bef5e02889d81d9820bc4f7df922d26d02dd5fb2e601c82875e353e00ca72f,2025-06-02T07:15:22
CVE-2025-5434,0,0,4e7c75fc3ac4e181befe9a93c9c12ef65751e8d2fe55da16447e5daadcd83eaa,2025-06-02T07:15:22.230000
CVE-2025-5435,0,0,dcf4258cf6809dfc182d62df7089a871748c9b139044f7b2923e29e48b3038b5,2025-06-02T08:15:21.230000
@ -296203,8 +296217,9 @@ CVE-2025-5439,0,0,aa110c46dc286c7e9d8cb2d97815d673f115d30b33674e0d9da42bae02a93b
CVE-2025-5440,0,0,23a278cff435d5c44ccef8150e6637344c9029c328600fd3b807a6015b6ed757,2025-06-02T10:15:22.180000
CVE-2025-5441,0,0,64777ca5b3f1848321cc862bac1cadce8406dedce7ee060897eb18bc57816364,2025-06-02T11:15:23.060000
CVE-2025-5442,0,0,4cfa2491529f3adc5b1beaec9350343f83487af1e2dc30a5f11bee6aa59c5a28,2025-06-02T11:15:23.260000
CVE-2025-5443,1,1,5598bb6eea21bd13765afe37d6570c2e26dc8a78ef3614e8a741492174c69c78,2025-06-02T12:15:26.143000
CVE-2025-5444,1,1,d544dbe8f2268ff7850a7c0dc85fc51888e589c75a04a384cb8526b00af58fc4,2025-06-02T12:15:26.337000
CVE-2025-5445,1,1,519bf24077154af0e4727aac86b3fc5b5c4cf0c1944316e2c44d42b4bf4316f8,2025-06-02T13:15:22.910000
CVE-2025-5446,1,1,2943f1b50cf2623a078c7b44d217f150986e93c16c4756ecb5da1f8e47e23a76,2025-06-02T13:15:23.097000
CVE-2025-5443,0,0,5598bb6eea21bd13765afe37d6570c2e26dc8a78ef3614e8a741492174c69c78,2025-06-02T12:15:26.143000
CVE-2025-5444,0,0,d544dbe8f2268ff7850a7c0dc85fc51888e589c75a04a384cb8526b00af58fc4,2025-06-02T12:15:26.337000
CVE-2025-5445,0,0,519bf24077154af0e4727aac86b3fc5b5c4cf0c1944316e2c44d42b4bf4316f8,2025-06-02T13:15:22.910000
CVE-2025-5446,0,0,2943f1b50cf2623a078c7b44d217f150986e93c16c4756ecb5da1f8e47e23a76,2025-06-02T13:15:23.097000
CVE-2025-5447,1,1,f03f2c7fe90da7c24aca3f9edc7f777a3225725acd293fec77b8087ca6f832ac,2025-06-02T14:15:24.400000
CVE-2025-5455,0,0,8d271c9b47b5647f1f114bae05a0555876aab8060dabdd5d5775e0ee67faf718,2025-06-02T09:15:21.493000

Can't render this file because it is too large.