Auto-Update: 2025-06-03T12:00:19.291650+00:00

This commit is contained in:
cad-safe-bot 2025-06-03 12:03:54 +00:00
parent 662786889d
commit 4a953dccf9
14 changed files with 1249 additions and 57 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-49528",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-12T06:15:06.320",
"lastModified": "2024-11-21T08:33:30.187",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-03T11:00:35.743",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,38 +51,108 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ffmpeg:ffmpeg:6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9F9E88B2-A11F-475E-A456-538734144487"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59"
}
]
}
]
}
],
"references": [
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://trac.ffmpeg.org/ticket/10691",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://trac.ffmpeg.org/ticket/10691",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-36486",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2025-06-03T10:15:20.657",
"lastModified": "2025-06-03T11:15:20.383",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A privilege escalation vulnerability exists in the virtual machine archive restoration functionality of Parallels Desktop for Mac version 20.1.1 (55740). When an archived virtual machine is restored, the prl_vmarchiver tool decompresses the file and writes the content back to its original location using root privileges. An attacker can exploit this process by using a hard link to write to an arbitrary file, potentially resulting in privilege escalation."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-62"
}
]
}
],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-2126",
"source": "talos-cna@cisco.com"
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2126",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46256",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-27T18:15:05.787",
"lastModified": "2024-10-24T17:15:16.690",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-03T11:55:42.657",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,51 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jc21:nginx_proxy_manager:2.11.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6AAC6DBD-AAF7-4528-A360-F0297F834C57"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/NginxProxyManager/nginx-proxy-manager/blob/v2.11.3/backend/internal/certificate.js#L830",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/NginxProxyManager/nginx-proxy-manager/commit/99cce7e2b0da2978411cedd7cac5fffbe15bc466",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/NginxProxyManager/nginx-proxy-manager/pull/4073/commits/c39d5433bcd13993def222bbb2b6988bbb810a05",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/barttran2k/POC_CVE-2024-46256",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46257",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-27T18:15:05.870",
"lastModified": "2024-10-24T18:15:08.617",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-03T11:55:19.547",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,51 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jc21:nginx_proxy_manager:2.11.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6AAC6DBD-AAF7-4528-A360-F0297F834C57"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/NginxProxyManager/nginx-proxy-manager/blob/v2.11.3/backend/internal/certificate.js#L870",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/NginxProxyManager/nginx-proxy-manager/commit/99cce7e2b0da2978411cedd7cac5fffbe15bc466",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/NginxProxyManager/nginx-proxy-manager/pull/4073/commits/c39d5433bcd13993def222bbb2b6988bbb810a05",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/barttran2k/POC_CVE-2024-46256",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-52561",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2025-06-03T10:15:21.857",
"lastModified": "2025-06-03T11:15:20.513",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A privilege escalation vulnerability exists in the Snapshot functionality of Parallels Desktop for Mac version 20.1.1 (build 55740). When a snapshot of a virtual machine is deleted, a root service verifies and modifies the ownership of the snapshot files. By using a symlink, an attacker can change the ownership of files owned by root to a lower-privilege user, potentially leading to privilege escalation."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-708"
}
]
}
],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-2123",
"source": "talos-cna@cisco.com"
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2123",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-54189",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2025-06-03T10:15:22.040",
"lastModified": "2025-06-03T11:15:20.613",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A privilege escalation vulnerability exists in the Snapshot functionality of Parallels Desktop for Mac version 20.1.1 (build 55740). When a snapshot of a virtual machine is taken, a root service writes to a file owned by a normal user. By using a hard link, an attacker can write to an arbitrary file, potentially leading to privilege escalation."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-62"
}
]
}
],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-2124",
"source": "talos-cna@cisco.com"
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2124",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6119",
"sourceIdentifier": "openssl-security@openssl.org",
"published": "2024-09-03T16:15:07.177",
"lastModified": "2024-11-21T09:49:00.040",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-03T10:51:54.117",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -49,40 +69,478 @@
"value": "CWE-843"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-843"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.0.0",
"versionEndExcluding": "3.0.15",
"matchCriteriaId": "F6B2B529-0ABC-49F4-BD03-380F291A84D4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.1.0",
"versionEndExcluding": "3.1.7",
"matchCriteriaId": "30CD2859-B247-4957-A511-0FE284AA4A3A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.2.0",
"versionEndExcluding": "3.2.3",
"matchCriteriaId": "B822EA84-566B-44F2-9485-8A97103249D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.3.0",
"versionEndExcluding": "3.3.2",
"matchCriteriaId": "37FD7956-A868-459B-90EA-C0D2DCF63AFC"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:management_services_for_element_software_and_netapp_hci:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FDAC85F0-93AF-4BE3-AE1A-8ADAF1CDF9AB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:ontap_9:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD886814-B4A0-4764-9F08-2060601D8E89"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E7CF3019-975D-40BB-A8A4-894E62BD3797"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:ontap_tools:9:*:*:*:*:vmware_vsphere:*:*",
"matchCriteriaId": "C2D814BE-93EC-42EF-88C5-EA7E7DF07BE5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netapp:brocade_fabric_operating_system:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2119FFC-08F9-4C3F-881C-9C72916BC652"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6770B6C3-732E-4E22-BF1C-2D2FD610061C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F9C8C20-42EB-4AB5-BD97-212DEB070C43"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FFF7106-ED78-49BA-9EC5-B889E3685D53"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56409CEC-5A1E-4450-AA42-641E459CC2AF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B06F4839-D16A-4A61-9BB5-55B13F41E47F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0B4AD8A-F172-4558-AEC6-FF424BA2D912"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8497A4C9-8474-4A62-8331-3FE862ED4098"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CDDF61B7-EC5C-467C-B710-B89F502CD04F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netapp:h610c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89612649-BACF-4FAC-9BA4-324724FD93A6"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netapp:h610c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3D9B255-C1AF-42D1-BF9B-13642FBDC080"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD7CFE0E-9D1E-4495-B302-89C3096FC0DF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netapp:h610s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F63A3FA7-AAED-4A9D-9FDE-6195302DA0F6"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:h:netapp:h615c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7296A1F2-D315-4FD5-8A73-65C480C855BE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:netapp:h615c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5921A877-18BF-43FE-915C-D226E140ACFC"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95BA156C-C977-4F0C-8DFB-3FAE9CC8C02D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD7447BC-F315-4298-A822-549942FC118B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netapp:a250_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1236B66D-EB11-4324-929F-E2B86683C3C7"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netapp:a250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "281DFC67-46BB-4FC2-BE03-3C65C9311F65"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netapp:500f_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ECF32BB1-9A58-4821-AE49-5D5C8200631F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netapp:500f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F21DE67F-CDFD-4D36-9967-633CD0240C6F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netapp:c250_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1AB1EC2-2560-494A-A51B-6F20CE318FEB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netapp:c250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "58DE2B52-4E49-4CD0-9310-00291B0352C7"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/openssl/openssl/commit/05f360d9e849a1b277db628f1f13083a7f8dd04f",
"source": "openssl-security@openssl.org"
"source": "openssl-security@openssl.org",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/openssl/openssl/commit/06d1dc3fa96a2ba5a3e22735a033012aadc9f0d6",
"source": "openssl-security@openssl.org"
"source": "openssl-security@openssl.org",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/openssl/openssl/commit/621f3729831b05ee828a3203eddb621d014ff2b2",
"source": "openssl-security@openssl.org"
"source": "openssl-security@openssl.org",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/openssl/openssl/commit/7dfcee2cd2a63b2c64b9b4b0850be64cb695b0a0",
"source": "openssl-security@openssl.org"
"source": "openssl-security@openssl.org",
"tags": [
"Patch"
]
},
{
"url": "https://openssl-library.org/news/secadv/20240903.txt",
"source": "openssl-security@openssl.org"
"source": "openssl-security@openssl.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/09/03/4",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.freebsd.org/archives/freebsd-security/2024-September/000303.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240912-0001/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-31359",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2025-06-03T10:15:22.240",
"lastModified": "2025-06-03T11:15:20.913",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A directory traversal vulnerability exists in the PVMP package unpacking functionality of Parallels Desktop for Mac version 20.2.2 (55879). This vulnerability can be exploited by an attacker to write to arbitrary files, potentially leading to privilege escalation."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.0,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2025-2160",
"source": "talos-cna@cisco.com"
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2160",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2025-4392",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-06-03T10:15:22.397",
"lastModified": "2025-06-03T10:15:22.397",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Shared Files \u2013 Frontend File Upload Form & Secure File Sharing plugin for WordPress is vulnerable to Stored Cross-Site Scripting via html File uploads in all versions up to, and including, 1.7.48 due to insufficient input sanitization and output escaping within the sanitize_file() function. This makes it possible for unauthenticated attackers to bypass the plugin\u2019s MIME-only checks and inject arbitrary web scripts in pages that will execute whenever a user accesses the html file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/anssilaitila/shared-files/blob/master/admin/class-sf-admin-allow-more-file-types.php",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3304053/",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/shared-files/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/469a9c8a-0708-4c93-99d8-e9157a1f91f5?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-5137",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-25T00:15:23.257",
"lastModified": "2025-05-28T18:15:29.657",
"lastModified": "2025-06-03T10:15:22.570",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -141,6 +141,10 @@
"url": "https://vuldb.com/?submit.571933",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.585711",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/CyberPunk-Infernity/Advisory/issues/2",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-5492",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-03T11:15:21.023",
"lastModified": "2025-06-03T11:15:21.023",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in D-Link DI-500WF-WT up to 20250511 and classified as critical. Affected by this vulnerability is the function sub_456DE8 of the file /msp_info.htm?flag=cmd of the component /usr/sbin/jhttpd. The manipulation of the argument cmd leads to command injection. The attack can be launched remotely."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://vuldb.com/?ctiid.310909",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.310909",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.575244",
"source": "cna@vuldb.com"
},
{
"url": "https://www.dlink.com/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-5493",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-03T11:15:21.230",
"lastModified": "2025-06-03T11:15:21.230",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Baison Channel Middleware Product 2.0.1 and classified as critical. Affected by this issue is some unknown functionality of the file /e3api/api/main/ToJsonByControlName. The manipulation of the argument data leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://medium.com/@luoluoxi311/sql-injection-in-baison-channel-middleware-product-version-2-0-1-e0d1ec95c697",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.310910",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.310910",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.586972",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-06-03T10:00:19.496425+00:00
2025-06-03T12:00:19.291650+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-06-03T09:15:23.007000+00:00
2025-06-03T11:55:42.657000+00:00
```
### Last Data Feed Release
@ -33,26 +33,31 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
296297
296304
```
### CVEs added in the last Commit
Recently added CVEs: `6`
Recently added CVEs: `7`
- [CVE-2025-1725](CVE-2025/CVE-2025-17xx/CVE-2025-1725.json) (`2025-06-03T09:15:22.487`)
- [CVE-2025-41428](CVE-2025/CVE-2025-414xx/CVE-2025-41428.json) (`2025-06-03T08:15:19.467`)
- [CVE-2025-4420](CVE-2025/CVE-2025-44xx/CVE-2025-4420.json) (`2025-06-03T09:15:22.673`)
- [CVE-2025-46355](CVE-2025/CVE-2025-463xx/CVE-2025-46355.json) (`2025-06-03T08:15:19.813`)
- [CVE-2025-5103](CVE-2025/CVE-2025-51xx/CVE-2025-5103.json) (`2025-06-03T09:15:22.840`)
- [CVE-2025-5116](CVE-2025/CVE-2025-51xx/CVE-2025-5116.json) (`2025-06-03T09:15:23.007`)
- [CVE-2024-36486](CVE-2024/CVE-2024-364xx/CVE-2024-36486.json) (`2025-06-03T10:15:20.657`)
- [CVE-2024-52561](CVE-2024/CVE-2024-525xx/CVE-2024-52561.json) (`2025-06-03T10:15:21.857`)
- [CVE-2024-54189](CVE-2024/CVE-2024-541xx/CVE-2024-54189.json) (`2025-06-03T10:15:22.040`)
- [CVE-2025-31359](CVE-2025/CVE-2025-313xx/CVE-2025-31359.json) (`2025-06-03T10:15:22.240`)
- [CVE-2025-4392](CVE-2025/CVE-2025-43xx/CVE-2025-4392.json) (`2025-06-03T10:15:22.397`)
- [CVE-2025-5492](CVE-2025/CVE-2025-54xx/CVE-2025-5492.json) (`2025-06-03T11:15:21.023`)
- [CVE-2025-5493](CVE-2025/CVE-2025-54xx/CVE-2025-5493.json) (`2025-06-03T11:15:21.230`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `5`
- [CVE-2024-0579](CVE-2024/CVE-2024-05xx/CVE-2024-0579.json) (`2025-06-03T09:15:21.340`)
- [CVE-2023-49528](CVE-2023/CVE-2023-495xx/CVE-2023-49528.json) (`2025-06-03T11:00:35.743`)
- [CVE-2024-46256](CVE-2024/CVE-2024-462xx/CVE-2024-46256.json) (`2025-06-03T11:55:42.657`)
- [CVE-2024-46257](CVE-2024/CVE-2024-462xx/CVE-2024-46257.json) (`2025-06-03T11:55:19.547`)
- [CVE-2024-6119](CVE-2024/CVE-2024-61xx/CVE-2024-6119.json) (`2025-06-03T10:51:54.117`)
- [CVE-2025-5137](CVE-2025/CVE-2025-51xx/CVE-2025-5137.json) (`2025-06-03T10:15:22.570`)
## Download and Usage

View File

@ -239483,7 +239483,7 @@ CVE-2023-49502,0,0,69af41f78008495447faebfcddd8fb8f31648e607af034680c599387b5e34
CVE-2023-49508,0,0,a06f67b805f448f282f17a49613360ae1ef3e331d48eb4a72cdc35f3932734bd,2025-03-27T15:15:47.470000
CVE-2023-4951,0,0,1bbc4959ac980f797457caaf60413d1bbf7dabd5bc8076002f966e17295d986f,2024-11-21T08:36:20.073000
CVE-2023-49515,0,0,a4c0f2e305f9bd09bbc07b299160e9ee82b974a0de89b6dbf4caf99ad0f89a33,2024-11-21T08:33:29.953000
CVE-2023-49528,0,0,ae59a6a1bbac46ad56a1a54c31382ae08b7998b27d77cdcde165b61ff049b910,2024-11-21T08:33:30.187000
CVE-2023-49528,0,1,9e1bf8b1430fa2f7fade812edc2a9f2119d6570f4b75e0e01a07411c6e244e88,2025-06-03T11:00:35.743000
CVE-2023-49539,0,0,6c1a1c576d32ef46d5e4268335e72acb623b3fb07800faa6d6779ff5f8b6d865,2025-04-14T13:03:09.210000
CVE-2023-49540,0,0,f48df38fc2cc2401a7c459c3ce7d9fc5cdd2304594218c5a375b797b03c07892,2025-04-14T13:03:20.370000
CVE-2023-49543,0,0,eca47ceaa9faa03870d8f334777ac5e443d94c5cb84920320f11c792c02ac35b,2025-04-18T14:21:05.953000
@ -244660,7 +244660,7 @@ CVE-2024-0575,0,0,666db6d006ad62a3798810cdf677ce8703490110d9506ea423387c568d8644
CVE-2024-0576,0,0,ad7a11f1101011fcccc639cc126df4bf996c2095ae6ccfc69cc179008012f4d5,2024-11-21T08:46:55.867000
CVE-2024-0577,0,0,6da93877f20c21635a4796302f324842a4d17e9d36ff795581ac357d18c84502,2024-11-21T08:46:56
CVE-2024-0578,0,0,ee96b899589e161f2fa6ec7b5e57230eca35c9f889dd1f0b522a3b67c1a43964,2024-11-21T08:46:56.177000
CVE-2024-0579,0,1,364c5be124a0fa43fcbd1d1c0c59ceb71fea47bc06c30562fd762ed415efb7a4,2025-06-03T09:15:21.340000
CVE-2024-0579,0,0,364c5be124a0fa43fcbd1d1c0c59ceb71fea47bc06c30562fd762ed415efb7a4,2025-06-03T09:15:21.340000
CVE-2024-0580,0,0,4f03021d504adea5906d25054a7bdbbeee6b07de5251752c2f6620a9f1d606c3,2024-11-21T08:46:56.453000
CVE-2024-0581,0,0,195cad63f48edfacf562edbfafcc549b51805ce4e6c8c685d59db42934309bf3,2024-11-21T08:46:56.580000
CVE-2024-0582,0,0,a162ed06c8be1ace9eb09441c3e8b77ff26337827cb8ad9e2481a1cd8134a776,2024-11-21T08:46:56.703000
@ -262593,6 +262593,7 @@ CVE-2024-36481,0,0,4eb9f12e83487746bcd563f74e1338838b3bacec77ea996220050453df93a
CVE-2024-36482,0,0,535472baf1dda6517f1f0290a0b6663d8509986e45cf2f1daae2170dddb08280,2025-02-04T18:27:28.993000
CVE-2024-36484,0,0,a06783a9b3c79d8cb9b5fe8bfffb1618ea1a5c1aab2918e64ca3d8f674b8e0e9,2024-11-21T09:22:16.280000
CVE-2024-36485,0,0,d951588f4dcc00d26595f8d25b71cc0d010f10ca23d6ec7bebb340fbcf7c88da,2024-11-07T11:15:04.637000
CVE-2024-36486,1,1,f73d4a75bbec382c2c22d4bedbdf9571ea4a7e892b6da8db6348c9897cdcd113,2025-06-03T11:15:20.383000
CVE-2024-36488,0,0,abe66b275816c86c5f144981d7bda84aea8ae8a17414a41070e511c1200662b4,2025-02-04T18:32:08.450000
CVE-2024-36489,0,0,483f02515bfc91c5ae3d16c61773df6c14d7d1b71a9ade79929d031b233a7f89,2024-11-21T09:22:16.667000
CVE-2024-3649,0,0,9d4b3c873377dc252861a0a03bd9c832139a807a0ffd6ec04c3597a6690414bd,2024-11-21T09:30:04.903000
@ -270040,8 +270041,8 @@ CVE-2024-46240,0,0,1191cdf44b6509cbee2a8abac44a625a4ac7bf4a3622ea84bd1d88a32af8a
CVE-2024-46241,0,0,65a068281839d70d77856026e22ffe1b7df2d3ec55dc4b9009edbb9990408570,2025-03-31T19:20:33.810000
CVE-2024-46242,0,0,278c5d74ca553d7a6ee7eea1c9d6c6283b4a956d21df9f54eec439967fafe153,2025-01-07T21:15:11.783000
CVE-2024-4625,0,0,aad46a28d2c2f49a77b5936172e43c0dde451e0472cbbc7daa3b8775fd5ff0b1,2025-02-11T02:15:35.090000
CVE-2024-46256,0,0,2cf9e791598dc4f7b0037a4042d6e31a14af13108ec122cc018fd2a7c094474b,2024-10-24T17:15:16.690000
CVE-2024-46257,0,0,5509f1c6f98cff35b4c59f758c1790a3fd61a38a5163d0fe836d3bf1c1d10548,2024-10-24T18:15:08.617000
CVE-2024-46256,0,1,3daa31071c4b67edd9f0d11a3fc63d598231ffb72f7368afe378fcf13211cd21,2025-06-03T11:55:42.657000
CVE-2024-46257,0,1,594c24a594c08b09fcac1af5b5219d4ff3f22ab5b2e2707d0c7b4cb5eb11789a,2025-06-03T11:55:19.547000
CVE-2024-46258,0,0,f0370fbfdad86ce1dfd5697a2aae76d6a5956ed64072b68df4d04522255e7fe0,2025-03-14T16:15:35.750000
CVE-2024-46259,0,0,a06e19335a00ccd45e6fb45880d0b8b0290c81e26923d63fcfc67e365dce9d63,2025-03-18T17:15:42.877000
CVE-2024-4626,0,0,e6a81841b054989b62fde9d622901d07198d294f1608fb279a45bf1cc90a81a1,2024-11-21T09:43:14.590000
@ -274846,6 +274847,7 @@ CVE-2024-52558,0,0,862aa816f99d7d175aef88936bc531a11569a19b5f814c5d7b923875345c7
CVE-2024-52559,0,0,af632a7cbb87ee504be0a00b900d193f82666532e997cddf8a97d190ed2c3153,2025-03-07T12:32:44.420000
CVE-2024-5256,0,0,351ec0133ebd6057956e3a32f156ca3c6d3a5e82f4f6d83d2ed56c2cf43e8b33,2024-11-21T09:47:17.300000
CVE-2024-52560,0,0,17f5696064cc8a54449a3e1cfd601a790042146971352f114ead14ce71af8bb4,2025-02-27T03:15:10.573000
CVE-2024-52561,1,1,ae58a3d9d667cb71a74b2a189fc197d330ecda202d1ff14b20d44ddd32761443,2025-06-03T11:15:20.513000
CVE-2024-52564,0,0,082fb97e963e24eeaf48108489383b26257575861650145a72a41c8a27e90eeb,2024-12-05T10:31:40.663000
CVE-2024-52565,0,0,02d8cf9601a79a81a90ae9c5bdc3d5a4c9c0865f4264720b000e5fe215f3cc2e,2024-12-10T14:30:45.133000
CVE-2024-52566,0,0,ad9914b2c2d53afe57085e24afde6d252d9adbd5430cfab4bef8a3994295e334,2024-12-10T14:30:45.280000
@ -276032,6 +276034,7 @@ CVE-2024-54179,0,0,cc40342456ec0e93880ba1ff6de6912ca898fe0485f93a482cde3b645de39
CVE-2024-5418,0,0,e8b4cd9b422aa40da5d2622d5e29796eb5a07db3f41b03941ba29e731fed299e,2025-03-24T14:25:36.727000
CVE-2024-54181,0,0,3e04974e8b1a6b14bc562b3f38845258be106e346d87e72f2301979081de7867,2025-03-28T16:32:40.990000
CVE-2024-54188,0,0,ec9d6aa982b8b4cba1cea93620070be8cc8bcc8a69afc701b43a83a98178fa89,2025-05-23T19:15:21.850000
CVE-2024-54189,1,1,53b3c84b96ec6f2b48c423db2ab6870480f6c5c9438d15dd5505454cf313d7c5,2025-06-03T11:15:20.613000
CVE-2024-5419,0,0,bf78f58706f13dc16fbd00574fc12a2ad63186889150404f7c80cf6aaa4041da,2024-11-21T09:47:37.083000
CVE-2024-54191,0,0,247e99cd867b0b816f93e1330170d487e47438a01b1b24e3eb1ed293d8adb8cf,2025-01-16T16:21:27.237000
CVE-2024-54193,0,0,d4064cbcdedae86603fba40721ede5426ca6ed68b9bf4e5893ada8c0fb6b87d9,2025-01-11T13:15:26.840000
@ -278704,7 +278707,7 @@ CVE-2024-6115,0,0,eec9b9fa172ac256762e1ff94626bf7be5708125578f492f47c61123573760
CVE-2024-6116,0,0,a82b4f9e406682e1c346ea922968aed67ed34cab517fa3b4b09f35029b051a3b,2024-11-21T09:48:59.623000
CVE-2024-6117,0,0,461527e133dd2edd82006c6f54e8f321e4f3b25ffcc332ed5755abacd85bd057,2024-08-30T17:41:50.753000
CVE-2024-6118,0,0,cfcc0b86a9899219d3949b5d35ce4b674191c1f8be378def04f73b05ae9103c1,2024-08-30T17:44:20.537000
CVE-2024-6119,0,0,8626ecefe5db60c118b177ef65e56414abc72e3b59bc18284ff370302e522272,2024-11-21T09:49:00.040000
CVE-2024-6119,0,1,8d46ea9a4d913a477553b4718f35f4aeadc8a2295b88657096091a3c540051a5,2025-06-03T10:51:54.117000
CVE-2024-6120,0,0,cb3266172a0dbddc29d2c5abd4187ea149af404c82d58bd0b8d19d6c5050b3c6,2024-11-21T09:49:00.237000
CVE-2024-6121,0,0,7876e6b9d760c8a34902e8bd733e688a853803265af121afc610b913d33c3095,2024-11-21T09:49:00.370000
CVE-2024-6122,0,0,275d88eab238bef7eb77d1af6c98aea5a6837e54aba2e2131e7a267a5fb0c32c,2024-11-21T09:49:00.507000
@ -283691,7 +283694,7 @@ CVE-2025-1716,0,0,7b54faf04c0c346ecfa632bdb4185fc3c19aff41bf7399ecadc1ddfb775e6d
CVE-2025-1717,0,0,3d4f0d449e7852a9bab717d0d55b537c9dc57d522d200e81bab92be20a7c833d,2025-03-11T16:12:42.783000
CVE-2025-1723,0,0,da7e603c0fdbcf8b17bcff90e3ff294dcf324014070d98aed22d913dc322d276,2025-03-03T08:15:15.717000
CVE-2025-1724,0,0,b8e86d6fa70198b5cc9fe6224a04663cb9564b5f8c33fbf347cdad07f13847ed,2025-03-17T07:15:33.467000
CVE-2025-1725,1,1,484f4f3b008cf8f410d412b639fcc32bd2e1e80b242bac0d03000edf1c5898a4,2025-06-03T09:15:22.487000
CVE-2025-1725,0,0,484f4f3b008cf8f410d412b639fcc32bd2e1e80b242bac0d03000edf1c5898a4,2025-06-03T09:15:22.487000
CVE-2025-1726,0,0,2f1dd31a8200e6d83c282baf3f0abaf3df3bb9d56b822973c75d4b2e2b3c7f8c,2025-02-26T20:15:13.510000
CVE-2025-1728,0,0,126b29abd5a8b7142eab21be075a4425d5b9e0d4bb1eedd2c9477807954e2152,2025-02-26T22:15:14.333000
CVE-2025-1730,0,0,1995ccb1e144a2c7a6984fe76cde065e7b6f85edc7bf90ff89583ed751f146df,2025-03-01T07:15:11.380000
@ -291315,6 +291318,7 @@ CVE-2025-31352,0,0,3b4ee61ff7706e5b838ec3976d4739ae6e58eadd39aa9e1b3ccd9b903a2bb
CVE-2025-31353,0,0,aade972dfa9ec47d3e07b242f41f20d76a01f8f078e181747ee000ca91c0162c,2025-04-17T20:21:48.243000
CVE-2025-31354,0,0,a2c1ecbfcb3235477ad8200431c0ea4c81321e989c49ca93cbcc9e6a449508c8,2025-04-15T18:39:43.697000
CVE-2025-31357,0,0,10568eb634d6e712fcbab95ba9d1ba1b9cae9c7b98346cc44a3edcb291c43f89,2025-04-16T13:25:37.340000
CVE-2025-31359,1,1,1d3622d08cc48c9b0671aec4181cb1d8ea59cbc2bc6ecdef7deac6781b872199,2025-06-03T11:15:20.913000
CVE-2025-3136,0,0,7ff98ba975809b4188d01f2e115e9c45862abffa34dc2aa33ad7cd01529a1bca,2025-05-28T15:59:54.130000
CVE-2025-31360,0,0,d1f586e795abef0eb367609debec6330cd41ffe8fbde4933f6aef94b2cc696ff,2025-04-16T13:25:37.340000
CVE-2025-31362,0,0,29e714bdac918165d1f72d9b66a1fef39fc1fe95242e3501acdc160e75ffc0c8,2025-04-11T15:39:52.920000
@ -294017,7 +294021,7 @@ CVE-2025-41414,0,0,e15bca7d4059421d15d5cb35dc483cbefc52e8d9cd9f55b31b9d84f79a125
CVE-2025-4142,0,0,78a1ea715ae46e4bda0a693a8542472224c3dca467cf3911b9ec4f409b46b000,2025-05-12T19:39:50.053000
CVE-2025-41423,0,0,3ae1e637900a2dfc5b6bacaa494e26a0b5d8e1e48accef6073153be61f7a9347,2025-04-29T13:52:47.470000
CVE-2025-41426,0,0,43242131e19ec18f330497e91493c38832fad38a58a843ab859c1d5a86371244,2025-05-21T20:24:58.133000
CVE-2025-41428,1,1,05da2590e70d1e08d485e3c1627cbb1dfad00722d6df324d58ae8555e7344690,2025-06-03T08:15:19.467000
CVE-2025-41428,0,0,05da2590e70d1e08d485e3c1627cbb1dfad00722d6df324d58ae8555e7344690,2025-06-03T08:15:19.467000
CVE-2025-41429,0,0,785edbb9428ab75f9ce49605baef089838a4f7d9c3a250c30dec518c67c17fbc,2025-05-19T13:35:20.460000
CVE-2025-4143,0,0,3a393d8ebe58f1f33890c3bd1fbf19f7d13ee6d06509ac73d2c28267c5f302ad,2025-05-12T19:39:43.820000
CVE-2025-41431,0,0,457130baf4dd6b7cc1c6ae128560ec31a298f522cc0ef7f373b70c3f0729af10,2025-05-08T14:39:09.683000
@ -294337,6 +294341,7 @@ CVE-2025-43916,0,0,681d8be38d92746749b1aa52bc81a99ae8dcb7d5c6c1be22a9ecf0d141bf9
CVE-2025-43917,0,0,6cbc8a0cc4b5f4a260ea1bcaa2e61bc873dc43de357e9552c071e8ec2a49bca5,2025-04-21T14:23:45.950000
CVE-2025-43918,0,0,c6804f12f91fd2a33114034d2a7e21d55151c0cf36b011a784bd1cc327d47c14,2025-04-21T14:23:45.950000
CVE-2025-43919,0,0,755abcb8d09616a195e9d6af1306163e6a8ac43b52edd282a6c37eaf3c4a6f2b,2025-04-28T14:15:22.137000
CVE-2025-4392,1,1,dac40497d85d0008ac6df90c7725f33db178c5c730ecf0a95d45819f9fba527e,2025-06-03T10:15:22.397000
CVE-2025-43920,0,0,a93ea085d5c9b285842c20a6cabb6e3bd669bd42c39c42462b7c06195a41f1d6,2025-04-28T14:15:22.323000
CVE-2025-43921,0,0,4042bcd81d7e3864da5b8ba4d01fe494ca12b33f201fc6021c6725eb890091e8,2025-04-28T14:15:22.477000
CVE-2025-43922,0,0,78ba59a603bfb99812991a8e1a7955ce6faa943c6ec5cbadbdfa1e2ab9c91614,2025-04-23T14:08:13.383000
@ -294400,7 +294405,7 @@ CVE-2025-4419,0,0,280ab2097f0627a87fc9bc990e1fbeb501026297486a153453a713f412e7cb
CVE-2025-44192,0,0,bbf878f3192590ae7f65b7dd525822e7ec5ccf80ca743afb76c106db312359e8,2025-05-12T19:42:18.530000
CVE-2025-44193,0,0,7a2f77bbf3da9e372539ce2d9568faa612514d106c676666f4f9e9bb49dd4d4d,2025-05-12T19:42:08.603000
CVE-2025-44194,0,0,16480af03700c5c401cb85fd0d61e2e08efda510d573cd95f20458628d42434d,2025-05-12T19:41:14.840000
CVE-2025-4420,1,1,ce038fb29a6692be764c07fd478227cfce695047a961e4cb45ef9ab346d0ddd9,2025-06-03T09:15:22.673000
CVE-2025-4420,0,0,ce038fb29a6692be764c07fd478227cfce695047a961e4cb45ef9ab346d0ddd9,2025-06-03T09:15:22.673000
CVE-2025-4427,0,0,a2f798eeedafecbd9cb912f610af162690a80cf4bdd1bef66f3124ee4670723f,2025-05-21T18:45:49.493000
CVE-2025-4428,0,0,9005850fdd231a6f5e460fd5ca5842b016cbe5e1aed7fc3fa752cdd9cc20f3cb,2025-05-21T18:45:24.800000
CVE-2025-4429,0,0,fe6071399e142802408b914c5bdedf40a11e5b9791557c888b05a6344723a056,2025-05-30T16:31:03.107000
@ -294786,7 +294791,7 @@ CVE-2025-46349,0,0,1714a97271744ee922f4bd027ddde23d095fab400e525c7e78a72152293a3
CVE-2025-4635,0,0,dbd97ddcf9f06e6a17bd98831167ca852ef57632eda54b68ef8eca53b0008e92,2025-05-30T16:31:03.107000
CVE-2025-46350,0,0,e9c2d732d02d04db30379a06f4d06a3199d3f19fe29e090eebfdcec4aeb7f535,2025-05-09T13:57:36.823000
CVE-2025-46352,0,0,618391598a4bc31a1d4677ab5a474da78aeac6261ac4ae8b26099a8c01185f09,2025-05-30T16:31:03.107000
CVE-2025-46355,1,1,1807f41563bddcc346794c010d8d1d00e0f382923616bb8bb587edc58bb97041,2025-06-03T08:15:19.813000
CVE-2025-46355,0,0,1807f41563bddcc346794c010d8d1d00e0f382923616bb8bb587edc58bb97041,2025-06-03T08:15:19.813000
CVE-2025-4636,0,0,42769483161d9081ca44d7da54fb93931edabd656065d5921f77e2f9979ff65e,2025-05-30T16:31:03.107000
CVE-2025-4637,0,0,6a6f5a6b16c4a5dc9c7dfdefe827d1876d1a6cd89fb863be894c5faba3f21b65,2025-05-16T14:43:56.797000
CVE-2025-46374,0,0,0df9474f29e53d817d13f584af47eb0c12cf27caea3c45635f75daa159094ef3,2025-04-24T03:15:15.797000
@ -296058,7 +296063,7 @@ CVE-2025-5096,0,0,42fe716f1efce968dc8e29663c380993b2461be601464bb005e7e57e1c9394
CVE-2025-5098,0,0,e792975c992e79d3f869380d6027059665b6a277fad36b72dc800d8cb0d75190,2025-05-23T16:15:27.730000
CVE-2025-5099,0,0,13cd227e8a1cb5199e136889be91b2b7e7b3359f206c3039fee4aeec3797db59,2025-05-23T16:15:27.873000
CVE-2025-5100,0,0,a54df1e8b0bff17450a1f67dfee2545841c6f379cdcd252b360f4d2a6c61fdc9,2025-05-27T16:15:34.280000
CVE-2025-5103,1,1,af4594b973fdd953cec06d0755700664db10b8fb67ea2802be047b4e3fd3bb5b,2025-06-03T09:15:22.840000
CVE-2025-5103,0,0,af4594b973fdd953cec06d0755700664db10b8fb67ea2802be047b4e3fd3bb5b,2025-06-03T09:15:22.840000
CVE-2025-5105,0,0,7ec1994145b2106c72a5e3c1031b0347b4a7435fd8dfdb2d41bb64c0d8abcf2a,2025-05-23T15:54:42.643000
CVE-2025-5106,0,0,8d60356cbd9079f6bf55b49bab02b8750a168dbc792ae017334e677c2dae68bb,2025-05-23T15:54:42.643000
CVE-2025-5107,0,0,9bef18bc6435a934e04f34863d5f7ce6cdc3bf383eb4382c07acbfcfb93c088a,2025-05-27T15:15:35.577000
@ -296069,7 +296074,7 @@ CVE-2025-5111,0,0,ab3c47416b65781d53c047fed78dbbb335dd4bed9307ae97643de9e73c2c42
CVE-2025-5112,0,0,f0cd0b8c93be317d3a2c0e92912b455b4fb61ee919b7fe6bebacd87c921bdc33,2025-05-23T15:54:42.643000
CVE-2025-5113,0,0,0bd61b4abacfc5745f349f466d36dc6433bff2c84afe9ce5402853e11bea600a,2025-06-02T17:32:17.397000
CVE-2025-5114,0,0,20a4205c8646981529f8abb6bcbb5fe0a32214254e6052ddc8802d6fd9b03d3c,2025-05-23T15:54:42.643000
CVE-2025-5116,1,1,3a3248d5910bdfdea3cbcccc91a56e9fb901b18c52c8f2836052f1a9c085e6e7,2025-06-03T09:15:23.007000
CVE-2025-5116,0,0,3a3248d5910bdfdea3cbcccc91a56e9fb901b18c52c8f2836052f1a9c085e6e7,2025-06-03T09:15:23.007000
CVE-2025-5117,0,0,d8ff3473124b58dde3b831065aca2c1cf497de1bb078c68e491105627964201f,2025-05-28T15:01:30.720000
CVE-2025-5119,0,0,bf969a61748b203da4a3f2f501a91ebb4932bff138f2ad55051f80ff5d8eb019,2025-05-28T14:58:52.920000
CVE-2025-5122,0,0,f0e21910b241d49227076aad0272129f233644ba6bdfb930e332b9b2297be743,2025-05-29T14:29:50.247000
@ -296085,7 +296090,7 @@ CVE-2025-5133,0,0,9efeb5e03ee463d00e42fc9de1ba56f91b977c7bd992a461e7b0ec85f68612
CVE-2025-5134,0,0,e6299a527615fdc21c9e0da34d766bbd97a350c6d1ff17bb4cf7353121119f1a,2025-05-28T18:15:29.287000
CVE-2025-5135,0,0,7e1e10f6dd0f2054f3d7d8d511a459c0778068a613df540a11dbd00c31fa1143,2025-05-28T18:15:29.410000
CVE-2025-5136,0,0,6b5f88824c6819c9067ba2a7cc4e9b248d29b2e219ade7b27acd010192e50f7f,2025-05-28T18:15:29.530000
CVE-2025-5137,0,0,bd7b0939690c00ed16e8b3fb58c2a16dc513e9bfd444f41fa5f480b987908a57,2025-05-28T18:15:29.657000
CVE-2025-5137,0,1,c83c907e9ec05e68313328484d50f5a3a65ffbd23d70539d45126ec5cf338d9e,2025-06-03T10:15:22.570000
CVE-2025-5138,0,0,3bae41860cd01f5b3b29a66081652cec538a389d28958af017b419d06b38908c,2025-05-28T14:58:52.920000
CVE-2025-5139,0,0,1f6b6d6f74654497d336b663b2d16a5fe2eea3d0378c7d1c3577dfaa66e63c83,2025-05-28T14:58:52.920000
CVE-2025-5140,0,0,7eb8851e623e7595aeb04f88f3b17c4f06b9055459a202a999065089d465d23f,2025-05-28T14:58:52.920000
@ -296296,3 +296301,5 @@ CVE-2025-5445,0,0,4170f3c2f537d54cec187b705ba4828958c100062593b53f1a91ca989cc07f
CVE-2025-5446,0,0,9d168da398a778ce0b0095a7e0a8e3bca462cdb12a826e6bb187c380e071a192,2025-06-02T17:32:17.397000
CVE-2025-5447,0,0,a5cb8bc4c7a4de9ae3bfa5d338b695456ece1a5a0b2112b238cb5da4d8fbdcc4,2025-06-02T17:32:17.397000
CVE-2025-5455,0,0,49ebfbc7472b909f08e0e5deb4e4ea5f4cedd298a2046130e62c9603cffb4aad,2025-06-02T17:32:17.397000
CVE-2025-5492,1,1,b5038878420625bb26f8489e550a4b7b6eed1512f61db614ac007c24853837c9,2025-06-03T11:15:21.023000
CVE-2025-5493,1,1,a858c3594792a90731d1aaa0c94c119619aaf3566be815bfa56f0bef72a8553e,2025-06-03T11:15:21.230000

Can't render this file because it is too large.