From 47ac111e1374efc867b4bfba36bea03754907697 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 22 Apr 2025 04:03:52 +0000 Subject: [PATCH] Auto-Update: 2025-04-22T04:00:19.563485+00:00 --- CVE-2020/CVE-2020-94xx/CVE-2020-9419.json | 32 +++++++++- CVE-2020/CVE-2020-94xx/CVE-2020-9420.json | 32 +++++++++- CVE-2022/CVE-2022-31xx/CVE-2022-3106.json | 22 ++++++- CVE-2022/CVE-2022-449xx/CVE-2022-44910.json | 32 +++++++++- CVE-2022/CVE-2022-456xx/CVE-2022-45688.json | 32 +++++++++- CVE-2022/CVE-2022-460xx/CVE-2022-46061.json | 32 +++++++++- CVE-2022/CVE-2022-460xx/CVE-2022-46062.json | 32 +++++++++- CVE-2022/CVE-2022-460xx/CVE-2022-46071.json | 32 +++++++++- CVE-2022/CVE-2022-460xx/CVE-2022-46072.json | 32 +++++++++- CVE-2022/CVE-2022-460xx/CVE-2022-46073.json | 32 +++++++++- CVE-2022/CVE-2022-460xx/CVE-2022-46074.json | 32 +++++++++- CVE-2022/CVE-2022-461xx/CVE-2022-46117.json | 32 +++++++++- CVE-2022/CVE-2022-463xx/CVE-2022-46350.json | 22 ++++++- CVE-2022/CVE-2022-463xx/CVE-2022-46351.json | 22 ++++++- CVE-2022/CVE-2022-463xx/CVE-2022-46352.json | 22 ++++++- CVE-2022/CVE-2022-463xx/CVE-2022-46353.json | 22 ++++++- CVE-2022/CVE-2022-463xx/CVE-2022-46363.json | 24 +++++++- CVE-2022/CVE-2022-463xx/CVE-2022-46364.json | 24 +++++++- CVE-2025/CVE-2025-17xx/CVE-2025-1731.json | 56 +++++++++++++++++ CVE-2025/CVE-2025-17xx/CVE-2025-1732.json | 56 +++++++++++++++++ CVE-2025/CVE-2025-35xx/CVE-2025-3577.json | 67 +++++++++++++++++++++ README.md | 39 ++++++++---- _state.csv | 55 +++++++++-------- 23 files changed, 724 insertions(+), 59 deletions(-) create mode 100644 CVE-2025/CVE-2025-17xx/CVE-2025-1731.json create mode 100644 CVE-2025/CVE-2025-17xx/CVE-2025-1732.json create mode 100644 CVE-2025/CVE-2025-35xx/CVE-2025-3577.json diff --git a/CVE-2020/CVE-2020-94xx/CVE-2020-9419.json b/CVE-2020/CVE-2020-94xx/CVE-2020-9419.json index f0e2dcb492a..6813ffdaf79 100644 --- a/CVE-2020/CVE-2020-94xx/CVE-2020-9419.json +++ b/CVE-2020/CVE-2020-94xx/CVE-2020-9419.json @@ -2,7 +2,7 @@ "id": "CVE-2020-9419", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-14T01:15:10.210", - "lastModified": "2024-11-21T05:40:36.300", + "lastModified": "2025-04-22T03:15:17.490", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-94xx/CVE-2020-9420.json b/CVE-2020/CVE-2020-94xx/CVE-2020-9420.json index 2c66070caa4..5abfbd36a85 100644 --- a/CVE-2020/CVE-2020-94xx/CVE-2020-9420.json +++ b/CVE-2020/CVE-2020-94xx/CVE-2020-9420.json @@ -2,7 +2,7 @@ "id": "CVE-2020-9420", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-14T01:15:10.273", - "lastModified": "2024-11-21T05:40:36.447", + "lastModified": "2025-04-22T03:15:17.693", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-319" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-319" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-31xx/CVE-2022-3106.json b/CVE-2022/CVE-2022-31xx/CVE-2022-3106.json index ff1517b2d37..000cabb9c1d 100644 --- a/CVE-2022/CVE-2022-31xx/CVE-2022-3106.json +++ b/CVE-2022/CVE-2022-31xx/CVE-2022-3106.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3106", "sourceIdentifier": "secalert@redhat.com", "published": "2022-12-14T21:15:11.747", - "lastModified": "2024-11-21T07:18:50.303", + "lastModified": "2025-04-22T03:15:17.877", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-449xx/CVE-2022-44910.json b/CVE-2022/CVE-2022-449xx/CVE-2022-44910.json index 5278ad15940..cb0a8976c25 100644 --- a/CVE-2022/CVE-2022-449xx/CVE-2022-44910.json +++ b/CVE-2022/CVE-2022-449xx/CVE-2022-44910.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44910", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-14T18:15:22.317", - "lastModified": "2024-11-21T07:28:31.880", + "lastModified": "2025-04-22T03:15:18.257", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-456xx/CVE-2022-45688.json b/CVE-2022/CVE-2022-456xx/CVE-2022-45688.json index 1df4c3e7cd5..c32a864b5eb 100644 --- a/CVE-2022/CVE-2022-456xx/CVE-2022-45688.json +++ b/CVE-2022/CVE-2022-456xx/CVE-2022-45688.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45688", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-13T15:15:11.267", - "lastModified": "2024-11-21T07:29:35.553", + "lastModified": "2025-04-22T03:15:18.457", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-460xx/CVE-2022-46061.json b/CVE-2022/CVE-2022-460xx/CVE-2022-46061.json index bcc4edb8247..c1240fabc9a 100644 --- a/CVE-2022/CVE-2022-460xx/CVE-2022-46061.json +++ b/CVE-2022/CVE-2022-460xx/CVE-2022-46061.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46061", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-13T14:15:10.237", - "lastModified": "2024-11-21T07:30:04.830", + "lastModified": "2025-04-22T03:15:18.677", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-1021" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1021" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-460xx/CVE-2022-46062.json b/CVE-2022/CVE-2022-460xx/CVE-2022-46062.json index 9a54afa354c..10718a66bf3 100644 --- a/CVE-2022/CVE-2022-460xx/CVE-2022-46062.json +++ b/CVE-2022/CVE-2022-460xx/CVE-2022-46062.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46062", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-13T17:15:17.357", - "lastModified": "2024-11-21T07:30:04.983", + "lastModified": "2025-04-22T03:15:18.883", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 4.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-460xx/CVE-2022-46071.json b/CVE-2022/CVE-2022-460xx/CVE-2022-46071.json index 6f1550e3dc0..a25822b08d6 100644 --- a/CVE-2022/CVE-2022-460xx/CVE-2022-46071.json +++ b/CVE-2022/CVE-2022-460xx/CVE-2022-46071.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46071", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-14T18:15:22.627", - "lastModified": "2024-11-21T07:30:05.390", + "lastModified": "2025-04-22T03:15:19.080", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-460xx/CVE-2022-46072.json b/CVE-2022/CVE-2022-460xx/CVE-2022-46072.json index 40842cb6b27..d87ba1bab8d 100644 --- a/CVE-2022/CVE-2022-460xx/CVE-2022-46072.json +++ b/CVE-2022/CVE-2022-460xx/CVE-2022-46072.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46072", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-14T18:15:22.900", - "lastModified": "2024-11-21T07:30:05.583", + "lastModified": "2025-04-22T03:15:19.267", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-460xx/CVE-2022-46073.json b/CVE-2022/CVE-2022-460xx/CVE-2022-46073.json index e0dcf17a751..c537e81f355 100644 --- a/CVE-2022/CVE-2022-460xx/CVE-2022-46073.json +++ b/CVE-2022/CVE-2022-460xx/CVE-2022-46073.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46073", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-14T17:15:11.433", - "lastModified": "2024-11-21T07:30:05.753", + "lastModified": "2025-04-22T03:15:19.437", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-460xx/CVE-2022-46074.json b/CVE-2022/CVE-2022-460xx/CVE-2022-46074.json index c1c34e9e395..a5752ce3f8c 100644 --- a/CVE-2022/CVE-2022-460xx/CVE-2022-46074.json +++ b/CVE-2022/CVE-2022-460xx/CVE-2022-46074.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46074", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-14T17:15:11.640", - "lastModified": "2024-11-21T07:30:05.910", + "lastModified": "2025-04-22T03:15:19.630", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-461xx/CVE-2022-46117.json b/CVE-2022/CVE-2022-461xx/CVE-2022-46117.json index dff41d6844b..51a8851cac2 100644 --- a/CVE-2022/CVE-2022-461xx/CVE-2022-46117.json +++ b/CVE-2022/CVE-2022-461xx/CVE-2022-46117.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46117", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-14T17:15:11.840", - "lastModified": "2024-11-21T07:30:08.390", + "lastModified": "2025-04-22T03:15:19.820", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-463xx/CVE-2022-46350.json b/CVE-2022/CVE-2022-463xx/CVE-2022-46350.json index 44e58ab9806..65964ba1722 100644 --- a/CVE-2022/CVE-2022-463xx/CVE-2022-46350.json +++ b/CVE-2022/CVE-2022-463xx/CVE-2022-46350.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46350", "sourceIdentifier": "productcert@siemens.com", "published": "2022-12-13T16:15:25.667", - "lastModified": "2024-11-21T07:30:26.423", + "lastModified": "2025-04-22T03:15:19.990", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-463xx/CVE-2022-46351.json b/CVE-2022/CVE-2022-463xx/CVE-2022-46351.json index ce8e597bd26..509a2c00ca9 100644 --- a/CVE-2022/CVE-2022-463xx/CVE-2022-46351.json +++ b/CVE-2022/CVE-2022-463xx/CVE-2022-46351.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46351", "sourceIdentifier": "productcert@siemens.com", "published": "2022-12-13T16:15:25.730", - "lastModified": "2024-11-21T07:30:26.550", + "lastModified": "2025-04-22T03:15:20.190", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-463xx/CVE-2022-46352.json b/CVE-2022/CVE-2022-463xx/CVE-2022-46352.json index 4ff253f029a..b4744dbb959 100644 --- a/CVE-2022/CVE-2022-463xx/CVE-2022-46352.json +++ b/CVE-2022/CVE-2022-463xx/CVE-2022-46352.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46352", "sourceIdentifier": "productcert@siemens.com", "published": "2022-12-13T16:15:25.793", - "lastModified": "2024-11-21T07:30:26.673", + "lastModified": "2025-04-22T03:15:20.370", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-463xx/CVE-2022-46353.json b/CVE-2022/CVE-2022-463xx/CVE-2022-46353.json index 04132349ef1..a18961de0e6 100644 --- a/CVE-2022/CVE-2022-463xx/CVE-2022-46353.json +++ b/CVE-2022/CVE-2022-463xx/CVE-2022-46353.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46353", "sourceIdentifier": "productcert@siemens.com", "published": "2022-12-13T16:15:25.853", - "lastModified": "2024-11-21T07:30:26.800", + "lastModified": "2025-04-22T03:15:20.540", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2022/CVE-2022-463xx/CVE-2022-46363.json b/CVE-2022/CVE-2022-463xx/CVE-2022-46363.json index 317f59e1d07..f089ec28b0d 100644 --- a/CVE-2022/CVE-2022-463xx/CVE-2022-46363.json +++ b/CVE-2022/CVE-2022-463xx/CVE-2022-46363.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46363", "sourceIdentifier": "security@apache.org", "published": "2022-12-13T15:15:11.677", - "lastModified": "2024-11-21T07:30:27.900", + "lastModified": "2025-04-22T03:15:20.727", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,13 +36,33 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, "weaknesses": [ { "source": "security@apache.org", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-463xx/CVE-2022-46364.json b/CVE-2022/CVE-2022-463xx/CVE-2022-46364.json index e9273e713a6..ceb37d2306e 100644 --- a/CVE-2022/CVE-2022-463xx/CVE-2022-46364.json +++ b/CVE-2022/CVE-2022-463xx/CVE-2022-46364.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46364", "sourceIdentifier": "security@apache.org", "published": "2022-12-13T17:15:17.587", - "lastModified": "2024-11-21T07:30:28.037", + "lastModified": "2025-04-22T03:15:20.907", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,13 +36,33 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "security@apache.org", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1731.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1731.json new file mode 100644 index 00000000000..f1507698d47 --- /dev/null +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1731.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-1731", + "sourceIdentifier": "security@zyxel.com.tw", + "published": "2025-04-22T03:15:21.177", + "lastModified": "2025-04-22T03:15:21.177", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An incorrect permission assignment vulnerability in the PostgreSQL commands of the USG FLEX H series uOS firmware versions from V1.20 through V1.31 could allow an authenticated local attacker with low privileges to gain access to the Linux shell and escalate their privileges by crafting malicious scripts or modifying system configurations with administrator-level access through a stolen token. Modifying the system configuration is only possible if the administrator has not logged out and the token remains valid." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@zyxel.com.tw", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@zyxel.com.tw", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] + } + ], + "references": [ + { + "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-incorrect-permission-assignment-and-improper-privilege-management-vulnerabilities-in-usg-flex-h-series-firewalls-04-22-2025", + "source": "security@zyxel.com.tw" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1732.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1732.json new file mode 100644 index 00000000000..d0f445b0136 --- /dev/null +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1732.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-1732", + "sourceIdentifier": "security@zyxel.com.tw", + "published": "2025-04-22T03:15:21.337", + "lastModified": "2025-04-22T03:15:21.337", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An improper privilege management vulnerability in the recovery function of the USG FLEX H series uOS firmware version V1.31 and earlier could allow an authenticated local attacker with administrator privileges to upload a crafted configuration file and escalate privileges on a vulnerable device." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@zyxel.com.tw", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@zyxel.com.tw", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-incorrect-permission-assignment-and-improper-privilege-management-vulnerabilities-in-usg-flex-h-series-firewalls-04-22-2025", + "source": "security@zyxel.com.tw" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-35xx/CVE-2025-3577.json b/CVE-2025/CVE-2025-35xx/CVE-2025-3577.json new file mode 100644 index 00000000000..02c61b30171 --- /dev/null +++ b/CVE-2025/CVE-2025-35xx/CVE-2025-3577.json @@ -0,0 +1,67 @@ +{ + "id": "CVE-2025-3577", + "sourceIdentifier": "security@zyxel.com.tw", + "published": "2025-04-22T03:15:21.637", + "lastModified": "2025-04-22T03:15:21.637", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "security@zyxel.com.tw", + "tags": [ + "unsupported-when-assigned" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "**UNSUPPORTED WHEN ASSIGNED** A path traversal vulnerability in the web management interface of the Zyxel\u00a0AMG1302-T10B firmware version\u00a02.00(AAJC.16)C0 could allow an authenticated attacker with\u00a0administrator privileges to\u00a0access restricted directories by sending a crafted HTTP request to an affected device." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@zyxel.com.tw", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security@zyxel.com.tw", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Jiangxiazhe/IOT_Vulnerability/blob/main/README.md", + "source": "security@zyxel.com.tw" + }, + { + "url": "https://www.zyxel.com/service-provider/global/en/security-advisories/end-of-life", + "source": "security@zyxel.com.tw" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index c3f895d2d35..229aa808340 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-04-22T02:00:19.663954+00:00 +2025-04-22T04:00:19.563485+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-04-22T01:15:18.737000+00:00 +2025-04-22T03:15:21.637000+00:00 ``` ### Last Data Feed Release @@ -33,27 +33,40 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -291012 +291015 ``` ### CVEs added in the last Commit -Recently added CVEs: `7` +Recently added CVEs: `3` -- [CVE-2024-58250](CVE-2024/CVE-2024-582xx/CVE-2024-58250.json) (`2025-04-22T01:15:17.270`) -- [CVE-2025-2987](CVE-2025/CVE-2025-29xx/CVE-2025-2987.json) (`2025-04-22T00:15:13.747`) -- [CVE-2025-3849](CVE-2025/CVE-2025-38xx/CVE-2025-3849.json) (`2025-04-22T00:15:13.917`) -- [CVE-2025-3850](CVE-2025/CVE-2025-38xx/CVE-2025-3850.json) (`2025-04-22T01:15:18.227`) -- [CVE-2025-3854](CVE-2025/CVE-2025-38xx/CVE-2025-3854.json) (`2025-04-22T01:15:18.397`) -- [CVE-2025-3855](CVE-2025/CVE-2025-38xx/CVE-2025-3855.json) (`2025-04-22T01:15:18.570`) -- [CVE-2025-3856](CVE-2025/CVE-2025-38xx/CVE-2025-3856.json) (`2025-04-22T01:15:18.737`) +- [CVE-2025-1731](CVE-2025/CVE-2025-17xx/CVE-2025-1731.json) (`2025-04-22T03:15:21.177`) +- [CVE-2025-1732](CVE-2025/CVE-2025-17xx/CVE-2025-1732.json) (`2025-04-22T03:15:21.337`) +- [CVE-2025-3577](CVE-2025/CVE-2025-35xx/CVE-2025-3577.json) (`2025-04-22T03:15:21.637`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `18` -- [CVE-2025-30406](CVE-2025/CVE-2025-304xx/CVE-2025-30406.json) (`2025-04-22T01:00:01.653`) +- [CVE-2020-9419](CVE-2020/CVE-2020-94xx/CVE-2020-9419.json) (`2025-04-22T03:15:17.490`) +- [CVE-2020-9420](CVE-2020/CVE-2020-94xx/CVE-2020-9420.json) (`2025-04-22T03:15:17.693`) +- [CVE-2022-3106](CVE-2022/CVE-2022-31xx/CVE-2022-3106.json) (`2025-04-22T03:15:17.877`) +- [CVE-2022-44910](CVE-2022/CVE-2022-449xx/CVE-2022-44910.json) (`2025-04-22T03:15:18.257`) +- [CVE-2022-45688](CVE-2022/CVE-2022-456xx/CVE-2022-45688.json) (`2025-04-22T03:15:18.457`) +- [CVE-2022-46061](CVE-2022/CVE-2022-460xx/CVE-2022-46061.json) (`2025-04-22T03:15:18.677`) +- [CVE-2022-46062](CVE-2022/CVE-2022-460xx/CVE-2022-46062.json) (`2025-04-22T03:15:18.883`) +- [CVE-2022-46071](CVE-2022/CVE-2022-460xx/CVE-2022-46071.json) (`2025-04-22T03:15:19.080`) +- [CVE-2022-46072](CVE-2022/CVE-2022-460xx/CVE-2022-46072.json) (`2025-04-22T03:15:19.267`) +- [CVE-2022-46073](CVE-2022/CVE-2022-460xx/CVE-2022-46073.json) (`2025-04-22T03:15:19.437`) +- [CVE-2022-46074](CVE-2022/CVE-2022-460xx/CVE-2022-46074.json) (`2025-04-22T03:15:19.630`) +- [CVE-2022-46117](CVE-2022/CVE-2022-461xx/CVE-2022-46117.json) (`2025-04-22T03:15:19.820`) +- [CVE-2022-46350](CVE-2022/CVE-2022-463xx/CVE-2022-46350.json) (`2025-04-22T03:15:19.990`) +- [CVE-2022-46351](CVE-2022/CVE-2022-463xx/CVE-2022-46351.json) (`2025-04-22T03:15:20.190`) +- [CVE-2022-46352](CVE-2022/CVE-2022-463xx/CVE-2022-46352.json) (`2025-04-22T03:15:20.370`) +- [CVE-2022-46353](CVE-2022/CVE-2022-463xx/CVE-2022-46353.json) (`2025-04-22T03:15:20.540`) +- [CVE-2022-46363](CVE-2022/CVE-2022-463xx/CVE-2022-46363.json) (`2025-04-22T03:15:20.727`) +- [CVE-2022-46364](CVE-2022/CVE-2022-463xx/CVE-2022-46364.json) (`2025-04-22T03:15:20.907`) ## Download and Usage diff --git a/_state.csv b/_state.csv index d1b738812b6..1e72cc08d3f 100644 --- a/_state.csv +++ b/_state.csv @@ -164375,8 +164375,8 @@ CVE-2020-9415,0,0,ef76646fa0b2ca980bcbb3f258d5c81af4b28f4a866fa9262968fd28abe315 CVE-2020-9416,0,0,678ee7fdffefb8122f98d2d2fa07fff9c04704c33af6a96f318b387be286f5b0,2024-11-21T05:40:35.917000 CVE-2020-9417,0,0,3cc516023e70e6a935c8865c4731c48989f86d7cbb7ab77eafb6da55985bfdaf,2024-11-21T05:40:36.043000 CVE-2020-9418,0,0,bf19abcf13fe44d4c640b13ee8aa6bba6037a9e15bb831b98897ff160269e409,2024-11-21T05:40:36.167000 -CVE-2020-9419,0,0,0c1a1cfc67fbc1c58af6a39112bda97096bd94f4243a5b7e252ae4e01088ef6a,2024-11-21T05:40:36.300000 -CVE-2020-9420,0,0,0d75c89ec90bed06f070eb3a94339f40bb51d27888c1e7d5d1dbc914cfb3d72b,2024-11-21T05:40:36.447000 +CVE-2020-9419,0,1,3e31c1f00ec37a28a973a2beadb514eaffb1aae45ccbeece47087b5df0c336e2,2025-04-22T03:15:17.490000 +CVE-2020-9420,0,1,7795d44992372db85450a85517f440ef5cbb15ef438b125efd1189d57a20d80c,2025-04-22T03:15:17.693000 CVE-2020-9423,0,0,d1917d65387e05fc106529e94c9253e649eb443df3fa0f1ab4a15d833e041c04,2024-11-21T05:40:36.580000 CVE-2020-9425,0,0,82ce627c6cb82beb4075cb5606c5505dcf53ba00b2270ae6f2986543c56ae652,2024-11-21T05:40:36.720000 CVE-2020-9426,0,0,48c99c5427b01e47061aa2848a9ca5e6963b24e2c3e3a561ab6e685b55758253,2024-11-21T05:40:36.860000 @@ -199495,7 +199495,7 @@ CVE-2022-31056,0,0,06eed9959d681e6f572377b20bac5ea47153bab1d7d91cfe5b1df10c5847f CVE-2022-31057,0,0,dbe8afeb454290f2ebbc1f2f756d0a76a25349ec26ed73d2623981acf6046774,2024-11-21T07:03:48.270000 CVE-2022-31058,0,0,4b27e4b703492e727552948e80c9415dc6bb35a7522efe08685b698f0b2f47ec,2024-11-21T07:03:48.397000 CVE-2022-31059,0,0,841ea1ac846d576ca620bde28a5debcf5f890e98f7c423b3705f03c564b85aa4,2024-11-21T07:03:48.520000 -CVE-2022-3106,0,0,c7547f002f4111e9c61e1adf975b48465f6923de95a4a66968e32fee797c4d8c,2024-11-21T07:18:50.303000 +CVE-2022-3106,0,1,70cd450bd5d89f46cdb662d431dcfc3827fafe8e972b19d9846ef19c98689818,2025-04-22T03:15:17.877000 CVE-2022-31060,0,0,88e1013792412a9ffaa918423f78f897121d9622bdd586f8dbce64b5c45a9d01,2024-11-21T07:03:48.653000 CVE-2022-31061,0,0,1d7f03926b27da2e5bcb13dc33e9ab7fcb1c5ac6be7db8c176cd8f02e088a211,2024-11-21T07:03:48.790000 CVE-2022-31062,0,0,a3eef6bb1a70b448b6b51e2ade575c39e8c74091cd30f9157a87f1d75a0b3a71,2024-11-21T07:03:48.917000 @@ -210251,7 +210251,7 @@ CVE-2022-44897,0,0,f2ce2222aad98b15722e805eaf7ff574143cc8421ca9aa5c80a27ceafc26b CVE-2022-44898,0,0,e598ff335afcba3db9b3c480d0a934b2f1404512710eff58974c561277ec04a2,2024-11-21T07:28:31.563000 CVE-2022-44900,0,0,4273656bcc7ff880ee5d763e12d79f06dddcceec1d544b43fdb0767b6e6abbf4,2024-11-21T07:28:31.730000 CVE-2022-4491,0,0,7f5f8254bee14988a2744d87aaae4cbfa4cf44402a87bfb5b3dd5cd3a21468c3,2025-04-09T19:15:46.247000 -CVE-2022-44910,0,0,986011568a2b62abd84f72f28fb4a64463dbedc809f3a51164412282ebb3091a,2024-11-21T07:28:31.880000 +CVE-2022-44910,0,1,7f798590a89b32f025652aa7a56477f7d1417476759842e78237d89ba4507368,2025-04-22T03:15:18.257000 CVE-2022-4492,0,0,eeb9adcb39c8c54bf51bc51faf131aeaccc620b1e27842fd0d5d7d5689789ab3,2025-03-12T15:15:38.020000 CVE-2022-44928,0,0,572ba273c786a7fe62c949e507f941e2444bd4cc8e8457464a9738e248f29990,2024-11-21T07:28:32.020000 CVE-2022-44929,0,0,0ff05fbc331896c20ecb2f389ce52bd42f3e3d3fe3dc7d71d21c779c9bf59173,2024-11-21T07:28:32.170000 @@ -210790,7 +210790,7 @@ CVE-2022-45674,0,0,580031b9954cf940fff84360cd66195abd3dcb8e388dfd965c100f8ba0740 CVE-2022-45677,0,0,43919b690ca911b467815606707b1186a37bc08bcec4c57689a4e4e1708d83c1,2025-03-14T19:15:39.943000 CVE-2022-4568,0,0,ee6ffc57bf7a69ab5e6be1a916004699612e2373f90b2f7d4925230d76802177,2025-01-30T16:15:28.620000 CVE-2022-45685,0,0,00c004a5d1bc9bc9ee3a7d4a6dbab72cc8ff47765568898ab640257016353f57,2024-11-21T07:29:35.377000 -CVE-2022-45688,0,0,e84beb6b5e6221dbe254b4da8056cfcb30e6a47ff988ff305fa753750d577932,2024-11-21T07:29:35.553000 +CVE-2022-45688,0,1,f7a87c81feb967e52f819d86ab276782335eae8e157e1b7ca1ca0a3e74c8939e,2025-04-22T03:15:18.457000 CVE-2022-45689,0,0,d279eb426897f1a5c4c640557c1d2cd4d189cd451fee6c89666245857dc180d2,2024-11-21T07:29:35.707000 CVE-2022-4569,0,0,4a2599063fefb513ab23f360a9f2529d620d0c97fa1dc35085c7a5a3cf63116b,2024-11-21T07:35:30.753000 CVE-2022-45690,0,0,60bd70496b899e82c07add93ab398ff18b0fed1cb0600805d08475850b553aef,2024-11-21T07:29:35.860000 @@ -211031,14 +211031,14 @@ CVE-2022-46051,0,0,e186846ccdb834553ce45fa6c1479268f81f4de95a904b93ba3d4bc4aa366 CVE-2022-46058,0,0,1ee8ca09badf49f4f8d633c558019211cadc0ab4bf5bd93ba52ed68435a34f89,2024-11-21T07:30:04.527000 CVE-2022-46059,0,0,633fba6fcc71b6e12afc1583834d50baca4ec55c55cd99b8f15cce3280f86cbe,2024-11-21T07:30:04.677000 CVE-2022-4606,0,0,beac2a53e583b356feec7e0dd5b9faebcc7522f5fb76726d2953e036f6e17cec,2024-11-21T07:35:35.153000 -CVE-2022-46061,0,0,e58fd9263d0ae08ee55689580601971bcab6fbca6c14ba770bc9b8c8ce897a46,2024-11-21T07:30:04.830000 -CVE-2022-46062,0,0,54e05f909770e4c216c99a09d19df911aaa0c24f1573777ab37f43301651b20d,2024-11-21T07:30:04.983000 +CVE-2022-46061,0,1,ce8050425bf28bebc9ee9d05a212e6f4919aaba789f7ea904651722c801370e2,2025-04-22T03:15:18.677000 +CVE-2022-46062,0,1,d82385cc979d034738d3fb9baba114270ab11c9dac5eb978463b15dc065f3a7a,2025-04-22T03:15:18.883000 CVE-2022-4607,0,0,936ba49505ee78cee0b1bacfea62faeccf31c340eceb7731d55d13ff31d00a0d,2024-11-21T07:35:35.267000 CVE-2022-46070,0,0,bdd1aa796f03fd1a6d97b18406c747c4dc5cb3e2b6c9802a5f1455aa139b7786,2024-11-21T07:30:05.137000 -CVE-2022-46071,0,0,06cf0e32005ad54f36d222eeb16cca6c3917a030164eb8f9f5163922d4fbbfd9,2024-11-21T07:30:05.390000 -CVE-2022-46072,0,0,d199b9b426f95fca22764d2c7a4018cbfd5ebb97ad2e453676da34511f390dd8,2024-11-21T07:30:05.583000 -CVE-2022-46073,0,0,80d36d822ef62e78f23e7654145243718f1e9d79fb4a38713545ed8b8dc300e8,2024-11-21T07:30:05.753000 -CVE-2022-46074,0,0,cef2b2808e50ea89d69e7fabb2a41df61d021dafa1447e45b450fd5bd67ef529,2024-11-21T07:30:05.910000 +CVE-2022-46071,0,1,6a4812bf22c2592b39b26d18f1e1bd17223c17698ec2ef39992743ca6071b027,2025-04-22T03:15:19.080000 +CVE-2022-46072,0,1,d5c1ed1e141e0b375438aceb0f5adf10697a4a61a3ec2a2e6e97c76ba2ef8c49,2025-04-22T03:15:19.267000 +CVE-2022-46073,0,1,e8d368f51265e46e47693baee9f2b0807624ea8730c789fb3ac73ca4dedc8225,2025-04-22T03:15:19.437000 +CVE-2022-46074,0,1,4788d35b98e1ea6fa3895a7dde451e80e004f2457cc546e434d991913724aa40,2025-04-22T03:15:19.630000 CVE-2022-46076,0,0,d8ca5395c9172594a40906a90b11f75fe055db1008b3fe8b60e625ee8e935c68,2025-04-17T14:15:22.443000 CVE-2022-4608,0,0,be843af6d4396743b51db58c72f2505739c01d27b14e0bce118248260ba2d980,2024-11-21T07:35:35.383000 CVE-2022-46080,0,0,68b2b59d09c84516563c3e52ea8ae348c5f72254930a31286339a3a247d9946b,2024-11-21T07:30:06.260000 @@ -211056,7 +211056,7 @@ CVE-2022-46101,0,0,7cf06e60fd5e4c3fc548ed2e8806771294f729a20a1cbbcf5b426d13bc4f2 CVE-2022-46102,0,0,4c00a7a0a9d764a286d900594ac7cdb1f274427bbbe466a7f8ba751dff829741,2025-04-15T15:16:05.360000 CVE-2022-46109,0,0,4118e1dba5a13c2589463e26dbcd054fafe051bcd884bc8ce6cfde3af445d9bb,2025-04-17T18:15:44.560000 CVE-2022-4611,0,0,e7ac0deadc94e1429edc607c065ffeb7559f1b9634b4fa7eb0189eb24e1bba3f,2024-11-21T07:35:35.763000 -CVE-2022-46117,0,0,16d1e4a88a7bbf2646f4483b9f7d92c865cb83066ac19ead545ab74e29241da3,2024-11-21T07:30:08.390000 +CVE-2022-46117,0,1,58fdee83e2054653e48d8ad73266964ed4359908bf5626b7f5adeb9a138a18e6,2025-04-22T03:15:19.820000 CVE-2022-46118,0,0,2bd1f413a4d8819d8cca325ad7a1cd8651117c7401d2c56a571689372bb00bef,2024-11-21T07:30:08.530000 CVE-2022-46119,0,0,b24a6af81571913eb5cc008925f89ef6b665ddb6ae30e6f47d571b699fd2c3ec,2024-11-21T07:30:08.667000 CVE-2022-4612,0,0,78b49419ee681703024b9b4d6006354881534a73d1642ee07adbe89c373ec39e,2024-11-21T07:35:35.887000 @@ -211269,10 +211269,10 @@ CVE-2022-46346,0,0,43dbfc33fecd7a9ffc1be49ecdeea19ccfa0baaa8828a418a681fb1d72664 CVE-2022-46347,0,0,cc66d83c79f3e44218c12a0b35b7e55cacad6ed89947cf74b4d04d9df27ffa19,2024-11-21T07:30:26.033000 CVE-2022-46348,0,0,b3b3c1c66b630027d0435e28cfbea60f295b340d9c6c2d048fb841d160e7633e,2024-11-21T07:30:26.163000 CVE-2022-46349,0,0,566c5c39bfe05770f73a863860b81dc2e15ce7d4b6742e6a1f7705feeac17242,2024-11-21T07:30:26.293000 -CVE-2022-46350,0,0,a0acaa613de16b6e529018231b3ce8fd35d412bcb6d4fd0ed44085c0227a72b2,2024-11-21T07:30:26.423000 -CVE-2022-46351,0,0,cbd5767cdc4db945cb0ba43cd7688d196bd29a43d77efaf50a133f4067e3d21e,2024-11-21T07:30:26.550000 -CVE-2022-46352,0,0,00a13155dc5b8ed7b035aa6118159b19d015bd5bbf2970a852fb90f56d755153,2024-11-21T07:30:26.673000 -CVE-2022-46353,0,0,fa817b94ddb190f2f70356e68449128669d0ac6f4734acfa383e1e6cac4ada12,2024-11-21T07:30:26.800000 +CVE-2022-46350,0,1,12975a8ab0cf772e1f1063fc4e9282bcca357c7f9bf9ca90d73da56cec2ae134,2025-04-22T03:15:19.990000 +CVE-2022-46351,0,1,4b765e4ca8981e8ad350b5383d09a4e7abb742ec057a9e8c9934342c94588f5e,2025-04-22T03:15:20.190000 +CVE-2022-46352,0,1,707c3915f028a9d4ae8a8aa45820c54e93763f1abb162b8eb5af678d30349c71,2025-04-22T03:15:20.370000 +CVE-2022-46353,0,1,a40da2d3ede62484b698631af7fae6e9663263708bb7f0d2fa6df4f033d99a68,2025-04-22T03:15:20.540000 CVE-2022-46354,0,0,b54e101d98bcc7bdf3369d8e22b533068f967b06511fa3684503bc3291cd0106,2024-11-21T07:30:26.940000 CVE-2022-46355,0,0,305a6a49c47ba6f068e02b03054bb94be666adcbdda42b6f54058d176f63c547,2024-11-21T07:30:27.060000 CVE-2022-46356,0,0,17ca9ad9399acc0a981ea70d03ac8944e2e5914be2c741108861286b4fe17cd2,2025-03-28T16:15:21.900000 @@ -211282,8 +211282,8 @@ CVE-2022-46359,0,0,7ac9438195587de5deff727fa278ba53c3fc732d2777d85361d36e310b96e CVE-2022-4636,0,0,62b2b9a320d3f7c1b1e6d8c5b7aeab8c8de6365fed0e24bb64bd90fcb920bb46,2024-11-21T07:35:38.497000 CVE-2022-46360,0,0,3efe47f1fb225b5eac0554f57801b8add832b1c9193a194a7f7bf29a04d85091,2025-04-10T17:15:36.407000 CVE-2022-46361,0,0,8123416efbf539917e595ae1846ae046080e1a9d1d86d394dc85bef02bcb6e74,2024-11-21T07:30:27.763000 -CVE-2022-46363,0,0,11bf4080c5119e3de59053a93e081168e64a55f6f5be7ad2e04203a89699dde6,2024-11-21T07:30:27.900000 -CVE-2022-46364,0,0,bf2da06870cb78dfa9d7f6fcb66b0c2944fe3d32f8bd394e486f01443b65c12f,2024-11-21T07:30:28.037000 +CVE-2022-46363,0,1,e7370406d3b0e934f4b33a41e88b599b6f49ecd32baa7922e5a5834ec071474c,2025-04-22T03:15:20.727000 +CVE-2022-46364,0,1,b1228f25e96ebc84bfcbc182b1a08976e1e40c7e83bb8c1d983f338939133b3c,2025-04-22T03:15:20.907000 CVE-2022-46365,0,0,3adbb9427147951a7db969b9e813a9ba8a41c016e073bc9da1dde0142401e072,2024-11-21T07:30:28.150000 CVE-2022-46366,0,0,0333a609c61f9c7f8c01fdb3ba6c785fd18686d7d18505535fd58dcd81898c6a,2024-11-21T07:30:28.337000 CVE-2022-46367,0,0,286e3428ff7fcaad8f6a809b1ff608eb4e66ae8548b5beeca32bd9fab4e7cbcb,2024-11-21T07:30:28.533000 @@ -277482,7 +277482,7 @@ CVE-2024-5824,0,0,e1bcdf6d43e3da8ae6ba6ab7de5f8d3f3eaee723b9a1ed9af8e8dbb46b2110 CVE-2024-58248,0,0,61da7a85b05c06a8c0af31ff84c50aa7cbce10a0c387cc01c16d82528c130432,2025-04-17T20:22:16.240000 CVE-2024-58249,0,0,6dd099183450ed4d63d99317401203db2f85417f3bb56d45d02c724b904877dc,2025-04-17T20:22:16.240000 CVE-2024-5825,0,0,682d9c8db78e32760516d35e8d80736a485272125d13ba44bf7f0b379940e54f,2024-06-11T10:15:13.960000 -CVE-2024-58250,1,1,62561e9f7788e1baf846a65ee8adbb795fa02feaee8e1ca73bf6dd457a840038,2025-04-22T01:15:17.270000 +CVE-2024-58250,0,0,62561e9f7788e1baf846a65ee8adbb795fa02feaee8e1ca73bf6dd457a840038,2025-04-22T01:15:17.270000 CVE-2024-5826,0,0,676ce5cec2202232492aeb7a31cb471cd0485dd44f0bad4d2271201c9d98c0de,2024-11-21T09:48:24.490000 CVE-2024-5827,0,0,12cdd01c3634b5f2da13128a187bc2d1c8d9fa87429a9aed8ec50812f82df183,2024-11-21T09:48:24.607000 CVE-2024-5828,0,0,73069a2f9dbd005f637a8c432d288f4c861c4d147da919c5c71f3de2432e48cd,2025-01-08T21:25:28.967000 @@ -282518,6 +282518,8 @@ CVE-2025-1724,0,0,b8e86d6fa70198b5cc9fe6224a04663cb9564b5f8c33fbf347cdad07f13847 CVE-2025-1726,0,0,2f1dd31a8200e6d83c282baf3f0abaf3df3bb9d56b822973c75d4b2e2b3c7f8c,2025-02-26T20:15:13.510000 CVE-2025-1728,0,0,126b29abd5a8b7142eab21be075a4425d5b9e0d4bb1eedd2c9477807954e2152,2025-02-26T22:15:14.333000 CVE-2025-1730,0,0,1995ccb1e144a2c7a6984fe76cde065e7b6f85edc7bf90ff89583ed751f146df,2025-03-01T07:15:11.380000 +CVE-2025-1731,1,1,2f40495e32e09da2e64ba27ddfa196f47244e2685c7b62bab3d78f1fd2b240f8,2025-04-22T03:15:21.177000 +CVE-2025-1732,1,1,217f780632beee8266b8e15000d9d6c361c42c7b0d0e33184c2e6177d5b9b064,2025-04-22T03:15:21.337000 CVE-2025-1734,0,0,30fc1fb2735b5f2600cc56424de4c5b2acf076d3cbcb8f2f5e0f5cad4b061c05,2025-04-01T20:26:30.593000 CVE-2025-1736,0,0,88a51c283f4d0834bbf11d46dc4103f7cba768043b28133bff6d571f4b16f08b,2025-04-01T20:26:30.593000 CVE-2025-1738,0,0,88cd928ab6b3e7b21edc6d43e0b3a3d2962b8b23417ddd8c84224e61394ebbde,2025-02-27T13:15:11.720000 @@ -288441,7 +288443,7 @@ CVE-2025-29834,0,0,4578a3b9050d36f7b5d401ef2cff9bd2a539c6ae9a0546aae8bc67b2af1fd CVE-2025-2984,0,0,1ca7c36096a1944da99408d66ce040b5e7a8b1b551935cef4ecf4b2025e27c21,2025-04-01T20:26:30.593000 CVE-2025-2985,0,0,687fc2820bd43d778eaf02f10df92a92091bdb50597369a30af5a9476cdae1b0,2025-04-01T20:26:30.593000 CVE-2025-29868,0,0,3cdd5d5bc9e5c1cb38e652f74faead4f53d8e8683a37455baaae14fba635a1fa,2025-04-15T13:07:54.393000 -CVE-2025-2987,1,1,7a6947d9cf28f34f85c723a7212ef3dab3685a0221f1d2ad5adcc3fe6f90da63,2025-04-22T00:15:13.747000 +CVE-2025-2987,0,0,7a6947d9cf28f34f85c723a7212ef3dab3685a0221f1d2ad5adcc3fe6f90da63,2025-04-22T00:15:13.747000 CVE-2025-29870,0,0,94e3b8ab8d7fbdb6f03f28530f0ba477688ec414baa8650bbb887d85a3f03a2f,2025-04-09T20:02:41.860000 CVE-2025-2989,0,0,0766747cb0e01c92c737981bb238f9adb3ab95fb53aa49cc63ece17dfe385650,2025-04-07T14:15:04.880000 CVE-2025-29891,0,0,752eb7db0cd8cf51c6f0df1d0540c6e0a94cdab3ef9ff768e6ace10510ce6968,2025-04-02T20:37:07.073000 @@ -288702,7 +288704,7 @@ CVE-2025-3038,0,0,7234e6f6a94363915d71af8eaa721ba5266f9fea3f40b45b2439e5206630fa CVE-2025-3039,0,0,846a42b19421afceedab84a2e86fa6d7400b7dcea08d5d7721ac60a629dd9b39,2025-04-01T20:26:11.547000 CVE-2025-3040,0,0,a1e6fbe8160fa81005d502057842330cb2ae7690c502ccb75ab1e381046694f9,2025-04-01T20:26:11.547000 CVE-2025-30401,0,0,6094c4851d69a90cee16f3fcc3e38848db3a7882816e567c1d58e4520154798e,2025-04-09T18:15:45.107000 -CVE-2025-30406,0,1,51db6be098d64837005d45fe4610c9b1d0c7620f15fc2620b87328ad3b94709d,2025-04-22T01:00:01.653000 +CVE-2025-30406,0,0,51db6be098d64837005d45fe4610c9b1d0c7620f15fc2620b87328ad3b94709d,2025-04-22T01:00:01.653000 CVE-2025-30407,0,0,5398c42f506ff0cf746668f38c343a54dfb5c3e8151c8cfb451ea4e82909416d,2025-03-27T16:45:27.850000 CVE-2025-3041,0,0,d5b21b6b78f2a401c9e8e108885b1916a2f3aafca95b7fffa55c4525e86b27e1,2025-04-01T20:26:11.547000 CVE-2025-3042,0,0,670ae0eb437b93f09d8021319b85476af0f31022941a26149d0aeb898aac3fc2,2025-04-01T20:26:11.547000 @@ -290693,6 +290695,7 @@ CVE-2025-3573,0,0,095399568374006bc1e93d539eebcb743d7cc965cdc4a121e4480938fddae5 CVE-2025-3574,0,0,94473ff233af08be74c232281156bfa5db699f8872e1802977040bd9e36c2d62,2025-04-15T18:39:27.967000 CVE-2025-3575,0,0,73e2cf1e3fbb3ccb86ef07985e1084456954c5cbbd5b3215dbed3da8318cbbf4,2025-04-15T18:39:27.967000 CVE-2025-3576,0,0,fcfdd1e678fdad628e7417f5b3843fb736313985ccb3419de0d7118ddd040472,2025-04-15T18:39:27.967000 +CVE-2025-3577,1,1,09785f673afbf3e63833e0fb9935fb61d41b58f6b4fcc2199cc9778b18043fc7,2025-04-22T03:15:21.637000 CVE-2025-3578,0,0,e13e840aaf0a24c67a679c44959c85bec14fbcb560caa6c65722eed662e1826f,2025-04-15T18:39:27.967000 CVE-2025-3579,0,0,6c0217c9a43a942438244f9ebf630b5c65085fd986d644363e1cb943f76ed2bf,2025-04-15T18:39:27.967000 CVE-2025-3585,0,0,a54288693643171c0acabc6ec95ab94f7327c2199882403bf0dab9c0f61422eb,2025-04-15T18:39:27.967000 @@ -290824,11 +290827,11 @@ CVE-2025-3845,0,0,7b7a76e07ff212126c7183642251a09134e6a925524b02b7668ff89f8b133c CVE-2025-3846,0,0,691cf979796425587ae8b252fcf2c0420010db88cd30aa600bdf74688c1aa482,2025-04-21T23:15:14.397000 CVE-2025-3847,0,0,b94d0ad63e1b8960bfabba95c842ba5fb8b1ca794cbc80eb78adfa492c5eb421,2025-04-21T23:15:15.383000 CVE-2025-38479,0,0,a2b90799a09f2b7e52ed1787c3494708d7e13fc4455320246b953d2a3bbf149e,2025-04-21T14:23:45.950000 -CVE-2025-3849,1,1,fb8ce419acb179781e70c07aaf215942360199b9e1fecb61115d3e91f2673644,2025-04-22T00:15:13.917000 -CVE-2025-3850,1,1,9692f89e0f9d5453a794cae2ca1ca81024f067084881ee7bf926b92a8b7fa651,2025-04-22T01:15:18.227000 -CVE-2025-3854,1,1,c45b9eab6891260e60b5d472ee89d46e0f2b399e0e2a0cfa425a1ca68ca5c124,2025-04-22T01:15:18.397000 -CVE-2025-3855,1,1,0c1017d5ee7638cff7eee4bade9c587f1f75d0c864bd28e6d1ce7389de870412,2025-04-22T01:15:18.570000 -CVE-2025-3856,1,1,1363b7b9ebd2c70ad798e965f136214355264b0161e261b750c13e14fbbcd0b2,2025-04-22T01:15:18.737000 +CVE-2025-3849,0,0,fb8ce419acb179781e70c07aaf215942360199b9e1fecb61115d3e91f2673644,2025-04-22T00:15:13.917000 +CVE-2025-3850,0,0,9692f89e0f9d5453a794cae2ca1ca81024f067084881ee7bf926b92a8b7fa651,2025-04-22T01:15:18.227000 +CVE-2025-3854,0,0,c45b9eab6891260e60b5d472ee89d46e0f2b399e0e2a0cfa425a1ca68ca5c124,2025-04-22T01:15:18.397000 +CVE-2025-3855,0,0,0c1017d5ee7638cff7eee4bade9c587f1f75d0c864bd28e6d1ce7389de870412,2025-04-22T01:15:18.570000 +CVE-2025-3856,0,0,1363b7b9ebd2c70ad798e965f136214355264b0161e261b750c13e14fbbcd0b2,2025-04-22T01:15:18.737000 CVE-2025-3857,0,0,51449bd38475a3b17060ab26660c1388ea275f57bf7d679c955fccd3040afb55,2025-04-21T16:15:54.907000 CVE-2025-38575,0,0,37c6694d45ef25fd4c01ad5e4e3652528a6a4314cc0f5e821de7a1e34897732a,2025-04-21T14:23:45.950000 CVE-2025-38637,0,0,3408ca2942640f2c4ef381f50af306ea1306e1fe1017c8487acb41cc78bd4e79,2025-04-21T14:23:45.950000