From 34421de95872405c3a4b1bb0f87cde65b51aae88 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 21 Apr 2025 14:03:51 +0000 Subject: [PATCH] Auto-Update: 2025-04-21T14:00:19.067902+00:00 --- CVE-2022/CVE-2022-205xx/CVE-2022-20568.json | 32 +++++++++++- CVE-2022/CVE-2022-205xx/CVE-2022-20569.json | 32 +++++++++++- CVE-2022/CVE-2022-205xx/CVE-2022-20570.json | 32 +++++++++++- CVE-2022/CVE-2022-46xx/CVE-2022-4667.json | 14 +++++- CVE-2022/CVE-2022-46xx/CVE-2022-4699.json | 18 +++++-- CVE-2022/CVE-2022-47xx/CVE-2022-4749.json | 14 +++++- CVE-2023/CVE-2023-400xx/CVE-2023-40032.json | 39 ++++++++++++-- CVE-2023/CVE-2023-436xx/CVE-2023-43650.json | 28 ++++++++--- CVE-2025/CVE-2025-223xx/CVE-2025-22371.json | 6 +-- CVE-2025/CVE-2025-25xx/CVE-2025-2582.json | 15 ++++-- CVE-2025/CVE-2025-25xx/CVE-2025-2583.json | 15 ++++-- CVE-2025/CVE-2025-324xx/CVE-2025-32408.json | 56 +++++++++++++++++++++ README.md | 26 ++++++---- _state.csv | 31 ++++++------ 14 files changed, 301 insertions(+), 57 deletions(-) create mode 100644 CVE-2025/CVE-2025-324xx/CVE-2025-32408.json diff --git a/CVE-2022/CVE-2022-205xx/CVE-2022-20568.json b/CVE-2022/CVE-2022-205xx/CVE-2022-20568.json index 20d98e26bfa..6d2fdac9ada 100644 --- a/CVE-2022/CVE-2022-205xx/CVE-2022-20568.json +++ b/CVE-2022/CVE-2022-205xx/CVE-2022-20568.json @@ -2,7 +2,7 @@ "id": "CVE-2022-20568", "sourceIdentifier": "security@android.com", "published": "2022-12-16T16:15:19.527", - "lastModified": "2024-11-21T06:43:04.130", + "lastModified": "2025-04-21T13:15:55.747", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-205xx/CVE-2022-20569.json b/CVE-2022/CVE-2022-205xx/CVE-2022-20569.json index 72bf86f2f8e..ddd17968d8a 100644 --- a/CVE-2022/CVE-2022-205xx/CVE-2022-20569.json +++ b/CVE-2022/CVE-2022-205xx/CVE-2022-20569.json @@ -2,7 +2,7 @@ "id": "CVE-2022-20569", "sourceIdentifier": "security@android.com", "published": "2022-12-16T16:15:19.573", - "lastModified": "2024-11-21T06:43:04.277", + "lastModified": "2025-04-21T13:15:56.563", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-205xx/CVE-2022-20570.json b/CVE-2022/CVE-2022-205xx/CVE-2022-20570.json index f1ef1f19144..47daa3ff904 100644 --- a/CVE-2022/CVE-2022-205xx/CVE-2022-20570.json +++ b/CVE-2022/CVE-2022-205xx/CVE-2022-20570.json @@ -2,7 +2,7 @@ "id": "CVE-2022-20570", "sourceIdentifier": "security@android.com", "published": "2022-12-16T16:15:19.623", - "lastModified": "2024-11-21T06:43:04.410", + "lastModified": "2025-04-21T13:15:56.723", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-46xx/CVE-2022-4667.json b/CVE-2022/CVE-2022-46xx/CVE-2022-4667.json index 34f00bed73d..800f1fa5fdb 100644 --- a/CVE-2022/CVE-2022-46xx/CVE-2022-4667.json +++ b/CVE-2022/CVE-2022-46xx/CVE-2022-4667.json @@ -2,8 +2,8 @@ "id": "CVE-2022-4667", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-30T21:15:11.683", - "lastModified": "2025-03-27T19:15:46.710", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-21T13:41:28.503", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -60,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", diff --git a/CVE-2022/CVE-2022-46xx/CVE-2022-4699.json b/CVE-2022/CVE-2022-46xx/CVE-2022-4699.json index 5913bce4ac2..1845e5979d6 100644 --- a/CVE-2022/CVE-2022-46xx/CVE-2022-4699.json +++ b/CVE-2022/CVE-2022-46xx/CVE-2022-4699.json @@ -2,8 +2,8 @@ "id": "CVE-2022-4699", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-30T21:15:11.907", - "lastModified": "2025-03-27T20:15:17.840", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-21T13:58:19.353", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -60,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -80,9 +90,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mediaelement.js_project:mediaelement.js:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:mediaelementjs:mediaelement.js:*:*:*:*:*:wordpress:*:*", "versionEndIncluding": "4.2.8", - "matchCriteriaId": "3112CDFE-6FEC-4F69-82A2-FE0E27EF5FC6" + "matchCriteriaId": "B018E086-49DB-48C3-95A1-BE17E324E738" } ] } diff --git a/CVE-2022/CVE-2022-47xx/CVE-2022-4749.json b/CVE-2022/CVE-2022-47xx/CVE-2022-4749.json index 02927c371f3..2e1e914453d 100644 --- a/CVE-2022/CVE-2022-47xx/CVE-2022-4749.json +++ b/CVE-2022/CVE-2022-47xx/CVE-2022-4749.json @@ -2,8 +2,8 @@ "id": "CVE-2022-4749", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-30T21:15:11.977", - "lastModified": "2025-03-27T20:15:18.010", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-21T13:43:51.547", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -60,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", diff --git a/CVE-2023/CVE-2023-400xx/CVE-2023-40032.json b/CVE-2023/CVE-2023-400xx/CVE-2023-40032.json index ea8076df9ba..f59de50f8de 100644 --- a/CVE-2023/CVE-2023-400xx/CVE-2023-40032.json +++ b/CVE-2023/CVE-2023-400xx/CVE-2023-40032.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40032", "sourceIdentifier": "security-advisories@github.com", "published": "2023-09-11T19:15:43.603", - "lastModified": "2025-02-13T17:17:00.200", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-21T13:45:44.587", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -69,9 +69,34 @@ "value": "CWE-476" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + } + ] + } + ] + }, { "nodes": [ { @@ -116,7 +141,10 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YU2FFC47X2XDEGEHEWAGLU5L3R6FEYD2/", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://github.com/libvips/libvips/commit/e091d65835966ef56d53a4105a7362cafdb1582b", @@ -143,7 +171,10 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YU2FFC47X2XDEGEHEWAGLU5L3R6FEYD2/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-436xx/CVE-2023-43650.json b/CVE-2023/CVE-2023-436xx/CVE-2023-43650.json index 7f4b7a7a79f..446552ddc18 100644 --- a/CVE-2023/CVE-2023-436xx/CVE-2023-43650.json +++ b/CVE-2023/CVE-2023-436xx/CVE-2023-43650.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43650", "sourceIdentifier": "security-advisories@github.com", "published": "2023-09-27T19:15:11.927", - "lastModified": "2025-03-25T20:15:19.257", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-21T13:13:06.060", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,8 +42,8 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", - "baseScore": 7.4, + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "HIGH", @@ -52,10 +52,10 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "NONE" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 2.2, - "impactScore": 5.2 + "impactScore": 5.9 } ] }, @@ -69,6 +69,16 @@ "value": "CWE-640" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-640" + } + ] } ], "configurations": [ @@ -108,7 +118,11 @@ }, { "url": "https://www.sonarsource.com/blog/diving-into-jumpserver-attackers-gateway-to-internal-networks-1-2", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/jumpserver/jumpserver/security/advisories/GHSA-mwx4-8fwc-2xvw", diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22371.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22371.json index da0571a8bf4..f2fd670833a 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22371.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22371.json @@ -2,13 +2,13 @@ "id": "CVE-2025-22371", "sourceIdentifier": "csirt@divd.nl", "published": "2025-04-14T16:15:21.450", - "lastModified": "2025-04-15T18:39:27.967", + "lastModified": "2025-04-21T12:15:31.000", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in SicommNet BASEC (SaaS Service) login page allows an unauthenticated remote attacker to Bypass Authentication and execute arbitrary SQL commands. This issue at least affects BASEC for the date of 14 Dec 2021 onwards. It is very likely that this vulnerability has been present in the solution before that.\n\nAs of the date of this CVE record, there has been no patch" + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in SicommNet BASEC (SaaS Service) login page allows an unauthenticated remote attacker to Bypass Authentication and execute arbitrary SQL commands.This issue at least affects BASEC for the date of 14 Dec 2021 onwards. It is very likely that this vulnerability has been present in the solution before that.\n\nThe issue was fixed by SicommNet around 11pm on 16 april 2025 (Eastern Time)" }, { "lang": "es", @@ -75,7 +75,7 @@ ], "references": [ { - "url": "https://basec.sicomm.net/login/", + "url": "https://basec.sicomm.net/", "source": "csirt@divd.nl" }, { diff --git a/CVE-2025/CVE-2025-25xx/CVE-2025-2582.json b/CVE-2025/CVE-2025-25xx/CVE-2025-2582.json index cf2a0455514..337367dcef8 100644 --- a/CVE-2025/CVE-2025-25xx/CVE-2025-2582.json +++ b/CVE-2025/CVE-2025-25xx/CVE-2025-2582.json @@ -2,13 +2,20 @@ "id": "CVE-2025-2582", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-21T07:15:36.953", - "lastModified": "2025-03-24T14:29:50.370", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2025-04-21T13:15:56.923", + "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cna@vuldb.com", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", - "value": "A vulnerability was found in SimpleMachines SMF 2.1.4 and classified as problematic. Affected by this issue is some unknown functionality of the file ManageAttachments.php. The manipulation of the argument Notice leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure." + "value": "A vulnerability was found in SimpleMachines SMF 2.1.4 and classified as problematic. Affected by this issue is some unknown functionality of the file ManageAttachments.php. The manipulation of the argument Notice leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The vendor does not declare this issue a security vulnerability due to authentication requirements before being able to access any feature in the software that allows file modification." }, { "lang": "es", diff --git a/CVE-2025/CVE-2025-25xx/CVE-2025-2583.json b/CVE-2025/CVE-2025-25xx/CVE-2025-2583.json index 25f653f2ed0..4956037e55e 100644 --- a/CVE-2025/CVE-2025-25xx/CVE-2025-2583.json +++ b/CVE-2025/CVE-2025-25xx/CVE-2025-2583.json @@ -2,13 +2,20 @@ "id": "CVE-2025-2583", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-21T07:15:37.157", - "lastModified": "2025-03-24T14:27:53.530", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2025-04-21T13:15:57.130", + "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cna@vuldb.com", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", - "value": "A vulnerability was found in SimpleMachines SMF 2.1.4. It has been classified as problematic. This affects an unknown part of the file ManageNews.php. The manipulation of the argument subject/message leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure." + "value": "A vulnerability was found in SimpleMachines SMF 2.1.4. It has been classified as problematic. This affects an unknown part of the file ManageNews.php. The manipulation of the argument subject/message leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The vendor does not declare this issue a security vulnerability due to authentication requirements before being able to access any feature in the software that allows file modification." }, { "lang": "es", diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32408.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32408.json new file mode 100644 index 00000000000..2a35d91ab9f --- /dev/null +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32408.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32408", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-21T13:15:57.267", + "lastModified": "2025-04-21T13:15:57.267", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Soffid Console 3.5.38 before 3.5.39, necessary checks were not applied to some Java objects. A malicious agent could possibly execute arbitrary code in the Sync Server and compromise security." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://bookstack.soffid.com/books/security-advisories/page/cve-2024-39669", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 763fd092145..9a280eca53f 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-04-21T12:00:22.260401+00:00 +2025-04-21T14:00:19.067902+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-04-21T10:15:15.643000+00:00 +2025-04-21T13:58:19.353000+00:00 ``` ### Last Data Feed Release @@ -33,23 +33,31 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -290960 +290961 ``` ### CVEs added in the last Commit -Recently added CVEs: `3` +Recently added CVEs: `1` -- [CVE-2025-3837](CVE-2025/CVE-2025-38xx/CVE-2025-3837.json) (`2025-04-21T10:15:15.207`) -- [CVE-2025-3838](CVE-2025/CVE-2025-38xx/CVE-2025-3838.json) (`2025-04-21T10:15:15.493`) -- [CVE-2025-3840](CVE-2025/CVE-2025-38xx/CVE-2025-3840.json) (`2025-04-21T10:15:15.643`) +- [CVE-2025-32408](CVE-2025/CVE-2025-324xx/CVE-2025-32408.json) (`2025-04-21T13:15:57.267`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `11` -- [CVE-2024-38428](CVE-2024/CVE-2024-384xx/CVE-2024-38428.json) (`2025-04-21T10:15:14.207`) +- [CVE-2022-20568](CVE-2022/CVE-2022-205xx/CVE-2022-20568.json) (`2025-04-21T13:15:55.747`) +- [CVE-2022-20569](CVE-2022/CVE-2022-205xx/CVE-2022-20569.json) (`2025-04-21T13:15:56.563`) +- [CVE-2022-20570](CVE-2022/CVE-2022-205xx/CVE-2022-20570.json) (`2025-04-21T13:15:56.723`) +- [CVE-2022-4667](CVE-2022/CVE-2022-46xx/CVE-2022-4667.json) (`2025-04-21T13:41:28.503`) +- [CVE-2022-4699](CVE-2022/CVE-2022-46xx/CVE-2022-4699.json) (`2025-04-21T13:58:19.353`) +- [CVE-2022-4749](CVE-2022/CVE-2022-47xx/CVE-2022-4749.json) (`2025-04-21T13:43:51.547`) +- [CVE-2023-40032](CVE-2023/CVE-2023-400xx/CVE-2023-40032.json) (`2025-04-21T13:45:44.587`) +- [CVE-2023-43650](CVE-2023/CVE-2023-436xx/CVE-2023-43650.json) (`2025-04-21T13:13:06.060`) +- [CVE-2025-22371](CVE-2025/CVE-2025-223xx/CVE-2025-22371.json) (`2025-04-21T12:15:31.000`) +- [CVE-2025-2582](CVE-2025/CVE-2025-25xx/CVE-2025-2582.json) (`2025-04-21T13:15:56.923`) +- [CVE-2025-2583](CVE-2025/CVE-2025-25xx/CVE-2025-2583.json) (`2025-04-21T13:15:57.130`) ## Download and Usage diff --git a/_state.csv b/_state.csv index ca75ed0d57d..5e861341ca8 100644 --- a/_state.csv +++ b/_state.csv @@ -190449,10 +190449,10 @@ CVE-2022-20563,0,0,0c21fcf317e8aa405e12a239ac69807a39fd2fc01fa4f1da3f529bff7b8c9 CVE-2022-20564,0,0,2bbebb25a348d575772248e4cb722f6df121e57651aaae30f7138aa26f2f9462,2024-11-21T06:43:03.730000 CVE-2022-20566,0,0,671f5e6331abda0d8dd408ec4836329efe34eba5672254db06981105333ca820,2024-11-21T06:43:03.860000 CVE-2022-20567,0,0,7958fba28ad1ddcbb8e2cb4b43346bd1e502c0e739bdad780135c8e29ff5d07d,2024-11-21T06:43:03.977000 -CVE-2022-20568,0,0,f3c24d5dd68051f14551fa166944605935249849d39fad81585b94a3a5bb0b44,2024-11-21T06:43:04.130000 -CVE-2022-20569,0,0,2a5f13dfa12c9cf4b1bc707a1d7ebe52650543f331f437355ce5f8aaa4dfe411,2024-11-21T06:43:04.277000 +CVE-2022-20568,0,1,92f9bef085f355fc74944ab5905a13e338cd75fca0701fe2f95107ffea5a71f1,2025-04-21T13:15:55.747000 +CVE-2022-20569,0,1,5554aee5de25caeb7e12252eb980149f206d9b475aa89ece149bdad840735d64,2025-04-21T13:15:56.563000 CVE-2022-2057,0,0,1de082ce2d69ba22541242f287784df4032196300b12774f5e6269f4ed04c3ed,2024-11-21T07:00:14.820000 -CVE-2022-20570,0,0,16a6db63a6c230e61a842305c40126b4a15a1530a5880c36c5cdac73185f9f88,2024-11-21T06:43:04.410000 +CVE-2022-20570,0,1,76a6d596c31a7a878b70da8512f67fa02baaa26bd38faab71759beb77070c1e6,2025-04-21T13:15:56.723000 CVE-2022-20571,0,0,67a09a60c93a80cd6b69f77a55abe245caf819d0a79b148ba450538831ccd2cf,2025-04-18T15:15:45.633000 CVE-2022-20572,0,0,11972dbd53e15c18e59a027ea5bb7075ee0d980d997025677b5d21d00cc1c9ed,2025-04-18T15:15:46.617000 CVE-2022-20574,0,0,e5f65591e415f1d5217143d451194cf344619185bcfb202d95cbb41a1beb5601,2025-04-18T15:15:46.777000 @@ -211478,7 +211478,7 @@ CVE-2022-46666,0,0,ae1cbd205840ce56a0d0648f0b87c2fbcb080c25614c9b8e09f5ebdd1d66c CVE-2022-46667,0,0,97ed49e9654aff2c4aa9cd4ff36ece4eb5ed101e4e07a762c2e5e533711a9ef0,2023-11-07T03:55:44.913000 CVE-2022-46668,0,0,a9633ff68175e38c5c9e6c90b414d49a2e6b29a095a0a2f98af94a7079af2449,2023-11-07T03:55:45.307000 CVE-2022-46669,0,0,e3a83f2ae8ec99c2ce5d12d82131509d5855828a8e837cfeccf234422d92de99,2023-11-07T03:55:45.677000 -CVE-2022-4667,0,0,fb1ecffd2f4bccc35770d76da1bc6eea1947b00dacdf49819b08953a4a6f8e15,2025-03-27T19:15:46.710000 +CVE-2022-4667,0,1,2db426019d3cda981e14f7c3d10e69a72cc6d506496380c8aabc55a2c663dd75,2025-04-21T13:41:28.503000 CVE-2022-46670,0,0,54ed06a7d924b0c6f4f98ce5c794923bab0141975614afe3d63c10cc4a1f13e3,2024-11-21T07:30:52.580000 CVE-2022-46671,0,0,371d72a4b5d5a652948c6ef1acb2d42d8f3997ba9cb800575aaa1ea10007af0f,2023-11-07T03:55:46.260000 CVE-2022-46672,0,0,96c257290952bb9e5e4515f95105030382b238d711535bb42c79c47151c81a06,2023-11-07T03:55:46.650000 @@ -211737,7 +211737,7 @@ CVE-2022-46968,0,0,0208b36a8bfd03989c26bf3b2cceaca71901f6441bc3e8e9efb8b016ba393 CVE-2022-4697,0,0,ad89b868601a9ba1e1629711513619cb8b72f79f4c09c78c936137424c983ef0,2024-11-21T07:35:45.327000 CVE-2022-46973,0,0,02f31245f89b4e77731b222a3c297a409df5dca3c97428837fcdf4b5f1b09476,2025-03-07T17:15:15.877000 CVE-2022-4698,0,0,9e5ab78a249ff3e087fd9d324461bc5aecebd3784012e2baea9fa468c24d13c6,2024-11-21T07:35:45.450000 -CVE-2022-4699,0,0,32fa79e2043b69cf05308e83ef87b29f63b4845024728d9476fb93663ec8933c,2025-03-27T20:15:17.840000 +CVE-2022-4699,0,1,c8bc5b8a0186d69242d063b94e21a13563a8ec47131d958d441152d82ec9d2ae,2025-04-21T13:58:19.353000 CVE-2022-46996,0,0,984b54bc9341b35701fe20f31b56222296aa8090a9e5105f4e5975e85a224e16,2024-11-21T07:31:22.417000 CVE-2022-46997,0,0,d6b3106b43331cebd5b1808146e05d47adf2d8cd5cff8a2c65ce6c9922721726,2024-11-21T07:31:22.603000 CVE-2022-46998,0,0,50a1b25a7a563377910f79acbd285a111a28468a5fe14912a387a2924c8575cd,2025-04-01T16:15:18.060000 @@ -212092,7 +212092,7 @@ CVE-2022-47486,0,0,16c88cf26b6dc32923811585704a2b8521c7471c6728a414e2a58ac5c4fde CVE-2022-47487,0,0,a8a5d05393e4580b5b3e8b869c299ab47395e2c6a52e0296f36bf76d5a24c145,2025-01-28T22:15:12.087000 CVE-2022-47488,0,0,a0b696160186495d6c12a013fdf9f6bd37bbf2fd11611b1b2cb7d16ed94c6d36,2025-01-28T22:15:12.250000 CVE-2022-47489,0,0,5e3c68ad7132c0474291500a52c6f078ed00a39388d28edf9b0a8b796fbd0dd9,2025-01-28T22:15:12.410000 -CVE-2022-4749,0,0,bd4420d08068ba2cb820796acad17578a7886c50d447970a28b9844221b7f399,2025-03-27T20:15:18.010000 +CVE-2022-4749,0,1,5c37cab59c583884cf8dcf4dec79d2ccf65d1ec37850e57d0f0ef18a47257815,2025-04-21T13:43:51.547000 CVE-2022-47490,0,0,173a87b7f4c954b6484889057d4590c904193d1b6f5ce24936446855f118f063,2025-01-28T22:15:12.580000 CVE-2022-47491,0,0,416b17b90fb1d2ceff983aa0c1097cfd23a28db36928f575bc3ff66f7c2a976d,2025-01-28T21:15:10.910000 CVE-2022-47492,0,0,d5088934cec8ae48796f1c8b991534b7f0d9a73ae66625114623e002536c2f47,2025-01-28T22:15:12.743000 @@ -232041,7 +232041,7 @@ CVE-2023-40029,0,0,fc6ee6dda7e1ec8e1f4841a0f42d6e4ca0f07cdbfec5a01253b2d0674dd6c CVE-2023-4003,0,0,b7ca24534e33362e6dbe6b7882f0195e085703e2fac4d5a2f9ba02b121051c95,2024-11-21T08:34:12.223000 CVE-2023-40030,0,0,1ba7ff39bc5cdbdab3034998bc6593cdfa58478c772d67b146d0c66efba795fd,2024-11-21T08:18:33.523000 CVE-2023-40031,0,0,65492e9335581aec0e8512f313f2dc1a52863bed3c88f6f150df33248917036d,2024-11-21T08:18:33.647000 -CVE-2023-40032,0,0,af3e3776e0f0f133dac559437e1dbb683e318726dac141f7c329060de6a65ff2,2025-02-13T17:17:00.200000 +CVE-2023-40032,0,1,37ffbbfc5c851aefc62369e1bd3907248b62b2ed59f78a832be0612c097baad7,2025-04-21T13:45:44.587000 CVE-2023-40033,0,0,f3c3f10ac663bc6b81b75779e96fc2d042c467279e5f45283e4be78109d4deee,2024-11-21T08:18:33.877000 CVE-2023-40034,0,0,7a299c80b1ccb52cdb80ef0fe3ad23d77154912b4d5a2f18e0be528a65448ca6,2024-11-21T08:18:33.990000 CVE-2023-40035,0,0,8c5692029a3c3a38ff2538591f85cdead441fd5a9d385ebbdcd4e3d2a8a5300f,2024-11-21T08:18:34.113000 @@ -234816,7 +234816,7 @@ CVE-2023-43647,0,0,139f768b6d22e7a3a14a19d33214950e8b32f6256a34d972f929459dbcab4 CVE-2023-43648,0,0,877baefa0bb20004d33cef516fe4d28306b767c0768e821c4d62e598612e0557,2024-11-21T08:24:32.490000 CVE-2023-43649,0,0,e7852a5265c874b27e9afcae3c21d63ea584d080f6642adac4b16af53db1b91e,2024-11-21T08:24:32.613000 CVE-2023-4365,0,0,23b1b096ca047aae8347a749cd5ccf0a12e327aba41edf89c7dd5f907fe506d4,2024-11-21T08:34:56.563000 -CVE-2023-43650,0,0,605de2e7e19b8a0f2c81b65e35b3ac0e5ee97c3a3032f313adee4aa8e57d324e,2025-03-25T20:15:19.257000 +CVE-2023-43650,0,1,ccdc707fbb271deb4a1b5f899f986d4ec09f0afcd06561c50a8e00935260e5ce,2025-04-21T13:13:06.060000 CVE-2023-43651,0,0,f97e0017039e5eeabaa9c405eb329a865638fbd9c8648e13627dcdd3f27b4e8e,2025-03-25T20:15:19.423000 CVE-2023-43652,0,0,4e112205994582acc903da7e844728833d05e829b04118d140de95bf3c3cda47,2025-03-25T20:15:20.390000 CVE-2023-43654,0,0,e3be8068928da8c39e12c38f58317fddbbf738d6b1f02f1dac5fee73ced5ac70,2024-11-21T08:24:33.150000 @@ -263446,7 +263446,7 @@ CVE-2024-38424,0,0,b20bddb1e41e4ece23219feec728eb8910763624d1ea2621b5bde813700fd CVE-2024-38425,0,0,e32a925c31eb52f678b53ceda419af6344b1d99e71a719366ec4341ee3e4c249,2024-10-16T17:34:41.633000 CVE-2024-38426,0,0,e896f072a48f5d2b654c4af89d02d2bbd31696f39a3689df3161861ab631426d,2025-03-06T15:21:46.720000 CVE-2024-38427,0,0,e03f18230b0965ff85c2447bdfa04160304b37189e7d46e85ccfd347184198b3,2024-11-21T09:25:48.097000 -CVE-2024-38428,0,1,c72add5c5aae31edb24e640e7e79ad15939c61344032404af547939c2c7019e9,2025-04-21T10:15:14.207000 +CVE-2024-38428,0,0,c72add5c5aae31edb24e640e7e79ad15939c61344032404af547939c2c7019e9,2025-04-21T10:15:14.207000 CVE-2024-38429,0,0,b538fc48e96d9ea292e38fa094ab837d9c16ca39e46b7d2aa04f5879b36ef5a5,2024-11-21T09:25:48.997000 CVE-2024-3843,0,0,24522d8c268e04ee96e1eb3267665f0aabade4b40e231c67983061452f1d7b9f,2024-12-19T14:12:42.743000 CVE-2024-38430,0,0,06391b888b37c32bd396e288f10969027f9a85afbcf753d929198b114655413e,2024-11-21T09:25:49.360000 @@ -284200,7 +284200,7 @@ CVE-2025-22368,0,0,15868b6e5746df64ac40f74359090d3c138a5fc4277e3491f8b4d3153bda9 CVE-2025-22369,0,0,914da155da04583b64bbcd7efb69cdb65cf9b4fa1a7a93f57111b5e36bed452e,2025-03-11T14:15:24.767000 CVE-2025-2237,0,0,6c579bdd62bb8bda18ad2566fa6cb9554676ec322606aaab27d5422395dc3d2a,2025-04-01T20:26:11.547000 CVE-2025-22370,0,0,e3b9834ee83fce05ff2df07009571f711e0033889d2c52add2c8f53db29092f5,2025-03-11T14:15:24.917000 -CVE-2025-22371,0,0,c4b5dcfeead1910ae96a15d3cbcfb5bf3edb4fd979ba4a71d3c03ed0244c4e7b,2025-04-15T18:39:27.967000 +CVE-2025-22371,0,1,9f461a9f9c605aa00535c1132b6092574b51ad977fd37ceeaa572f09b06ee951,2025-04-21T12:15:31 CVE-2025-22372,0,0,8eb6091961aa97f963b8dcb04fdfe2229a68b02ca22a8e8e99cfc05c86fe7672,2025-04-15T18:39:27.967000 CVE-2025-22373,0,0,2129b77552ed7485fc9c37fe3b0ce0a4fd167043212640fc5969b758ce73cbdf,2025-04-15T18:39:27.967000 CVE-2025-22374,0,0,3c76c0c310d0a27c4ffac60f4f224c77b792b9b62909428eaeef4914314662fa,2025-04-11T15:39:52.920000 @@ -286692,11 +286692,11 @@ CVE-2025-25802,0,0,5b7312d109c7306b98466d7b4ccf8332b5ad6cb4414de741bacf1428ceb36 CVE-2025-2581,0,0,0170652bbc12258a3b309bcdba906706e3827a2a9cff555fd68f93a03f3fc189,2025-03-27T13:24:49.403000 CVE-2025-25813,0,0,1cba07b97776d83599b7df63b5b5766d7b58fec6ea11e828d5d68a4a88b39cb9,2025-03-28T16:59:27.230000 CVE-2025-25818,0,0,073f644a1cb42e0f28de6c9cae965c10db55a2adadfbc51d567ec6bb09586146,2025-04-07T18:52:50.387000 -CVE-2025-2582,0,0,b77b2acdecfcaaaf47e93cf556d9ac634703aa60938a853d56344af5ad30f308,2025-03-24T14:29:50.370000 +CVE-2025-2582,0,1,c596e593c5f7b3cf6288c60d0dfdba0b4d9077bcb951da763642784904366349,2025-04-21T13:15:56.923000 CVE-2025-25823,0,0,176bcb7f80214c397d014bf2a43c50764d06568d7d37b2a33e2666678a483963,2025-04-07T18:52:44.020000 CVE-2025-25825,0,0,901c1ade9d04ce3b6dbd9707933599e99dd32566b9419f8728a1c443988c728f,2025-04-07T18:52:38.387000 CVE-2025-25827,0,0,c515f01a42f743458072c88710dfbd5db738cb3e3f4b88b746248bde9a65ff65,2025-04-07T18:52:32.653000 -CVE-2025-2583,0,0,3641d9105002154e03fb9446f6155f27a336523f078bdc22deac26356d244052,2025-03-24T14:27:53.530000 +CVE-2025-2583,0,1,95ea7994f5fe7bd5af49af3575218c5397a9a630d678b54e37d0f478723c35c5,2025-04-21T13:15:57.130000 CVE-2025-2584,0,0,01b36b75f818a840992f2b4aa8cf569241eb8d9980c3c4b646b4dd766fddb076,2025-03-24T14:02:56.053000 CVE-2025-2585,0,0,090dade5152106dd6130007ac8edb53ce6a59e87736c5215aed7beee13811d44,2025-03-21T02:15:12.073000 CVE-2025-2586,0,0,90d99765650cf31c144297f89864c65ede6ca7111f51ba2a04d7d4fa3cd4e1c4,2025-04-01T20:26:30.593000 @@ -290075,6 +290075,7 @@ CVE-2025-32391,0,0,01a08115ae4cefd9de1b9aefec1b85980241d6513f3292da97678ea6370f6 CVE-2025-32395,0,0,a161f016c761dba18a6390dd5da5792bac2d2e42803818db2da92c349d4b75cd,2025-04-11T15:39:52.920000 CVE-2025-3240,0,0,fd4ee2fdb38ac17ffaee2ac6e70f3a2f5dcccf28e2968d4be2b86fe7dc62212e,2025-04-07T14:18:15.560000 CVE-2025-32406,0,0,c67cbc23c83784ef10125f3cffbec33dfd15266df68765e80fc3a95cd3a58377,2025-04-08T18:16:08.917000 +CVE-2025-32408,1,1,3da9ba0dcc49be97ee0ed0500c61eaaf2b9104c751b6e081776c8a687d9c6c4f,2025-04-21T13:15:57.267000 CVE-2025-32409,0,0,90c935eaf5e08e3e6a0e3e6e3bd5188faa5a2fd80d7fe835b9b19800e46d38d1,2025-04-08T18:13:53.347000 CVE-2025-3241,0,0,594a540ab13070f27db4ae33cd1a92be4d81e360e241a5ce3cde519f3dcc5218,2025-04-07T14:18:15.560000 CVE-2025-32413,0,0,264a0d1d6affdc64cee850b499944750da36d787f6454e6724a671c6b9cc8e84,2025-04-08T18:13:53.347000 @@ -290776,9 +290777,9 @@ CVE-2025-3827,0,0,2c065676f62a8efc53d1267f1968e879a7688f19a99cac3edee7f01713ad93 CVE-2025-3828,0,0,21ba1969c15d55d422105012001d55399a9f348f31d9a56752eb6b0b0ebb605e,2025-04-20T16:15:14.057000 CVE-2025-3829,0,0,d6f820dab60b7926192ca686dc2cdac1d32f1c148d9cb377aa4dc9ca0de2e07c,2025-04-20T16:15:14.230000 CVE-2025-3830,0,0,c349ff4b9a002c0025c459962a7618a1bb39129fae2021ecbde6472ecb914ca4,2025-04-20T17:15:44.950000 -CVE-2025-3837,1,1,d831149847ab5f27a9375862c78699b619d4662a9416ca4b62d7a495184b82b3,2025-04-21T10:15:15.207000 -CVE-2025-3838,1,1,ad1a4a6363f9dfcfb15fa35db50d698a50859d472a3e883adce524454ceae21e,2025-04-21T10:15:15.493000 -CVE-2025-3840,1,1,bd47c4daac9691b4d4c2bb717463516cfe5f56f84d03f6467084f2d79d1495bb,2025-04-21T10:15:15.643000 +CVE-2025-3837,0,0,d831149847ab5f27a9375862c78699b619d4662a9416ca4b62d7a495184b82b3,2025-04-21T10:15:15.207000 +CVE-2025-3838,0,0,ad1a4a6363f9dfcfb15fa35db50d698a50859d472a3e883adce524454ceae21e,2025-04-21T10:15:15.493000 +CVE-2025-3840,0,0,bd47c4daac9691b4d4c2bb717463516cfe5f56f84d03f6467084f2d79d1495bb,2025-04-21T10:15:15.643000 CVE-2025-38479,0,0,b2b6ea65e240d4ffeed782b9d037d3b3cf1f0ae1e3ce4a6e40a815527e135169,2025-04-18T07:15:43.613000 CVE-2025-38575,0,0,fc45fd45a431f685538b4001e1e87131d23faf0a16a9209a56843479513a7e70,2025-04-18T07:15:43.717000 CVE-2025-38637,0,0,994255e82cd74ce8666ff4c2bb27a6e5073245f15905958a121473a3bd555340,2025-04-18T07:15:43.823000