From 5386f51c9c78db7c7ff2d3e638ebfb2d30209382 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 19 Jun 2025 16:03:59 +0000 Subject: [PATCH] Auto-Update: 2025-06-19T16:00:20.308673+00:00 --- CVE-2021/CVE-2021-471xx/CVE-2021-47144.json | 169 +----------------- CVE-2022/CVE-2022-492xx/CVE-2022-49299.json | 180 +------------------- CVE-2024/CVE-2024-249xx/CVE-2024-24916.json | 56 ++++++ CVE-2024/CVE-2024-360xx/CVE-2024-36022.json | 29 +--- CVE-2024/CVE-2024-449xx/CVE-2024-44955.json | 86 +--------- CVE-2025/CVE-2025-488xx/CVE-2025-48886.json | 64 +++++++ CVE-2025/CVE-2025-490xx/CVE-2025-49014.json | 82 +++++++++ CVE-2025/CVE-2025-62xx/CVE-2025-6267.json | 137 +++++++++++++++ CVE-2025/CVE-2025-62xx/CVE-2025-6268.json | 137 +++++++++++++++ README.md | 47 ++--- _state.csv | 83 ++++----- 11 files changed, 553 insertions(+), 517 deletions(-) create mode 100644 CVE-2024/CVE-2024-249xx/CVE-2024-24916.json create mode 100644 CVE-2025/CVE-2025-488xx/CVE-2025-48886.json create mode 100644 CVE-2025/CVE-2025-490xx/CVE-2025-49014.json create mode 100644 CVE-2025/CVE-2025-62xx/CVE-2025-6267.json create mode 100644 CVE-2025/CVE-2025-62xx/CVE-2025-6268.json diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47144.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47144.json index 21cc7fa9b32..2204873c861 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47144.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47144.json @@ -2,174 +2,15 @@ "id": "CVE-2021-47144", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-25T09:15:08.950", - "lastModified": "2024-12-17T14:49:22.333", - "vulnStatus": "Analyzed", + "lastModified": "2025-06-19T14:15:24.327", + "vulnStatus": "Rejected", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/amdgpu: fix refcount leak\n\n[Why]\nthe gem object rfb->base.obj[0] is get according to num_planes\nin amdgpufb_create, but is not put according to num_planes\n\n[How]\nput rfb->base.obj[0] in amdgpu_fbdev_destroy according to num_planes" - }, - { - "lang": "es", - "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/amdgpu: corrige la fuga de refcount [Por qu\u00e9] el objeto gema rfb->base.obj[0] se obtiene seg\u00fan num_planes en amdgpufb_create, pero no se coloca seg\u00fan num_planes en amdgpufb_create num_planes [C\u00f3mo] poner rfb->base.obj[0] en amdgpu_fbdev_destroy seg\u00fan num_planes" + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "baseScore": 5.5, - "baseSeverity": "MEDIUM", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 1.8, - "impactScore": 3.6 - } - ] - }, - "weaknesses": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "NVD-CWE-Other" - } - ] - } - ], - "configurations": [ - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionEndExcluding": "4.19.193", - "matchCriteriaId": "A3FDF344-70E4-41FE-8424-F05D70B8DC0F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionStartIncluding": "5.4.0", - "versionEndExcluding": "5.4.124", - "matchCriteriaId": "F717E3E3-B420-411F-AECC-2D26A9F33F0F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionStartIncluding": "5.10.0", - "versionEndExcluding": "5.10.42", - "matchCriteriaId": "18765089-FB00-4E06-82C2-69FE64CAB42D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionStartIncluding": "5.12.0", - "versionEndExcluding": "5.12.9", - "matchCriteriaId": "B1F28E29-3C08-49BB-BCE1-C601F43C091D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", - "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", - "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" - } - ] - } - ] - } - ], - "references": [ - { - "url": "https://git.kernel.org/stable/c/599e5d61ace952b0bb9bd942b198bbd0cfded1d7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - }, - { - "url": "https://git.kernel.org/stable/c/95a4ec905e51a30c64cf2d78b04a7acbeae5ca94", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - }, - { - "url": "https://git.kernel.org/stable/c/9fdb8ed37a3a44f9c49372b69f87fd5f61cb3240", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - }, - { - "url": "https://git.kernel.org/stable/c/dde2656e0bbb2ac7d83a7bd95a8d5c3c95bbc009", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - }, - { - "url": "https://git.kernel.org/stable/c/fa7e6abc75f3d491bc561734312d065dc9dc2a77", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - }, - { - "url": "https://git.kernel.org/stable/c/599e5d61ace952b0bb9bd942b198bbd0cfded1d7", - "source": "af854a3a-2127-422b-91ae-364da2661108", - "tags": [ - "Patch" - ] - }, - { - "url": "https://git.kernel.org/stable/c/95a4ec905e51a30c64cf2d78b04a7acbeae5ca94", - "source": "af854a3a-2127-422b-91ae-364da2661108", - "tags": [ - "Patch" - ] - }, - { - "url": "https://git.kernel.org/stable/c/9fdb8ed37a3a44f9c49372b69f87fd5f61cb3240", - "source": "af854a3a-2127-422b-91ae-364da2661108", - "tags": [ - "Patch" - ] - }, - { - "url": "https://git.kernel.org/stable/c/dde2656e0bbb2ac7d83a7bd95a8d5c3c95bbc009", - "source": "af854a3a-2127-422b-91ae-364da2661108", - "tags": [ - "Patch" - ] - }, - { - "url": "https://git.kernel.org/stable/c/fa7e6abc75f3d491bc561734312d065dc9dc2a77", - "source": "af854a3a-2127-422b-91ae-364da2661108", - "tags": [ - "Patch" - ] - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49299.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49299.json index 26472e4dbd7..a17142786f1 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49299.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49299.json @@ -2,185 +2,15 @@ "id": "CVE-2022-49299", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:06.727", - "lastModified": "2025-04-14T19:49:30.960", - "vulnStatus": "Analyzed", + "lastModified": "2025-06-19T14:15:34.170", + "vulnStatus": "Rejected", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: dwc2: gadget: don't reset gadget's driver->bus\n\nUDC driver should not touch gadget's driver internals, especially it\nshould not reset driver->bus. This wasn't harmful so far, but since\ncommit fc274c1e9973 (\"USB: gadget: Add a new bus for gadgets\") gadget\nsubsystem got it's own bus and messing with ->bus triggers the\nfollowing NULL pointer dereference:\n\ndwc2 12480000.hsotg: bound driver g_ether\n8<--- cut here ---\nUnable to handle kernel NULL pointer dereference at virtual address 00000000\n[00000000] *pgd=00000000\nInternal error: Oops: 5 [#1] SMP ARM\nModules linked in: ...\nCPU: 0 PID: 620 Comm: modprobe Not tainted 5.18.0-rc5-next-20220504 #11862\nHardware name: Samsung Exynos (Flattened Device Tree)\nPC is at module_add_driver+0x44/0xe8\nLR is at sysfs_do_create_link_sd+0x84/0xe0\n...\nProcess modprobe (pid: 620, stack limit = 0x(ptrval))\n...\n module_add_driver from bus_add_driver+0xf4/0x1e4\n bus_add_driver from driver_register+0x78/0x10c\n driver_register from usb_gadget_register_driver_owner+0x40/0xb4\n usb_gadget_register_driver_owner from do_one_initcall+0x44/0x1e0\n do_one_initcall from do_init_module+0x44/0x1c8\n do_init_module from load_module+0x19b8/0x1b9c\n load_module from sys_finit_module+0xdc/0xfc\n sys_finit_module from ret_fast_syscall+0x0/0x54\nException stack(0xf1771fa8 to 0xf1771ff0)\n...\ndwc2 12480000.hsotg: new device is high-speed\n---[ end trace 0000000000000000 ]---\n\nFix this by removing driver->bus entry reset." - }, - { - "lang": "es", - "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: dwc2: gadget: no restablezca el controlador UDC del bus del gadget->controlador no debe tocar los componentes internos del controlador del gadget, especialmente no debe restablecer el controlador UDC del bus del gadget->controlador. Esto no fue da\u00f1ino hasta ahora, pero desde el commit fc274c1e9973 (\"USB: gadget: Agregar un nuevo bus para gadgets\") el subsistema de gadget tiene su propio bus y jugar con ->bus desencadena la siguiente desreferencia de puntero NULL: dwc2 12480000.hsotg: controlador vinculado g_ether 8<--- corte aqu\u00ed --- No se puede manejar la desreferencia de puntero NULL del kernel en la direcci\u00f3n virtual 00000000 [00000000] *pgd=00000000 Error interno: Oops: 5 [#1] M\u00f3dulos SMP ARM vinculados en: ... CPU: 0 PID: 620 Comm: modprobe No contaminado 5.18.0-rc5-next-20220504 #11862 Nombre del hardware: Samsung Exynos (\u00e1rbol de dispositivos aplanado) La PC est\u00e1 en module_add_driver+0x44/0xe8 LR est\u00e1 en sysfs_do_create_link_sd+0x84/0xe0 ... Procesar modprobe (pid: 620, l\u00edmite de pila = 0x(ptrval)) ... module_add_driver desde bus_add_driver+0xf4/0x1e4 bus_add_driver desde driver_register+0x78/0x10c driver_register desde usb_gadget_register_driver_owner+0x40/0xb4 usb_gadget_register_driver_owner desde do_one_initcall+0x44/0x1e0 do_one_initcall desde do_init_module+0x44/0x1c8 do_init_module desde load_module+0x19b8/0x1b9c load_module desde sys_finit_module+0xdc/0xfc sys_finit_module de ret_fast_syscall+0x0/0x54 Pila de excepciones (0xf1771fa8 a 0xf1771ff0) ... dwc2 12480000.hsotg: el nuevo dispositivo es de alta velocidad ---[ fin de seguimiento 000000000000000 ]--- Solucione esto eliminando el restablecimiento de la entrada del bus del controlador." + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "baseScore": 5.5, - "baseSeverity": "MEDIUM", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 1.8, - "impactScore": 3.6 - } - ] - }, - "weaknesses": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-476" - } - ] - } - ], - "configurations": [ - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionEndExcluding": "4.9.318", - "matchCriteriaId": "0D4D4067-974D-4560-8320-22FDA399E3F9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionStartIncluding": "4.10", - "versionEndExcluding": "4.14.283", - "matchCriteriaId": "D6823775-2653-4644-A0D4-4E6E68F10C65" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionStartIncluding": "4.15", - "versionEndExcluding": "4.19.247", - "matchCriteriaId": "B8CFA0F4-2D75-41F4-9753-87944A08B53B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionStartIncluding": "4.20", - "versionEndExcluding": "5.4.198", - "matchCriteriaId": "3EC49633-14DE-4EBD-BB80-76AE2E3EABB9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionStartIncluding": "5.5", - "versionEndExcluding": "5.10.122", - "matchCriteriaId": "1B42AA01-44D8-4572-95E6-FF8E374CF9C5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionStartIncluding": "5.11", - "versionEndExcluding": "5.15.47", - "matchCriteriaId": "FC042EE3-4864-4325-BE0B-4BCDBF11AA61" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionStartIncluding": "5.16", - "versionEndExcluding": "5.17.15", - "matchCriteriaId": "53E7AA2E-2FB4-45CA-A22B-08B4EDBB51AD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionStartIncluding": "5.18", - "versionEndExcluding": "5.18.4", - "matchCriteriaId": "FA6D643C-6D6A-4821-8A8D-B5776B8F0103" - } - ] - } - ] - } - ], - "references": [ - { - "url": "https://git.kernel.org/stable/c/172cfc167c8ee6238f24f9c16efd598602af643c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - }, - { - "url": "https://git.kernel.org/stable/c/3120aac6d0ecd9accf56894aeac0e265f74d3d5a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - }, - { - "url": "https://git.kernel.org/stable/c/5127c0f365265bb69cd776ad6e4b872c309f3fa8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - }, - { - "url": "https://git.kernel.org/stable/c/547ebdc200b862dff761ff4890f66d8217c33316", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - }, - { - "url": "https://git.kernel.org/stable/c/5b0c0298f7c3b57417f1729ec4071f76864b72dd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - }, - { - "url": "https://git.kernel.org/stable/c/bee8f9808a7e82addfc73a0973b16a8bb684205b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - }, - { - "url": "https://git.kernel.org/stable/c/d2159feb9d28ce496d77df98313ab454646372ac", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - }, - { - "url": "https://git.kernel.org/stable/c/d232ca0bbc7d03144bad0ffd1792c3352bfd03fa", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - }, - { - "url": "https://git.kernel.org/stable/c/efb15ff4a77fe053c941281775fefa91c87770e0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24916.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24916.json new file mode 100644 index 00000000000..cdae8921bcd --- /dev/null +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24916.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-24916", + "sourceIdentifier": "cve@checkpoint.com", + "published": "2025-06-19T14:15:44.983", + "lastModified": "2025-06-19T14:15:44.983", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Untrusted DLLs in the installer's directory may be loaded and executed, leading to potentially arbitrary code execution with the installer's privileges (admin)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@checkpoint.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "cve@checkpoint.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://support.checkpoint.com/results/sk/sk183342", + "source": "cve@checkpoint.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36022.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36022.json index 98a8ccfc82a..df73d3a854c 100644 --- a/CVE-2024/CVE-2024-360xx/CVE-2024-36022.json +++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36022.json @@ -2,36 +2,15 @@ "id": "CVE-2024-36022", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-30T15:15:49.263", - "lastModified": "2024-11-21T09:21:27.403", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-19T14:15:45.160", + "vulnStatus": "Rejected", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Init zone device and drm client after mode-1 reset on reload\n\nIn passthrough environment, when amdgpu is reloaded after unload, mode-1\nis triggered after initializing the necessary IPs, That init does not\ninclude KFD, and KFD init waits until the reset is completed. KFD init\nis called in the reset handler, but in this case, the zone device and\ndrm client is not initialized, causing app to create kernel panic.\n\nv2: Removing the init KFD condition from amdgpu_amdkfd_drm_client_create.\nAs the previous version has the potential of creating DRM client twice.\n\nv3: v2 patch results in SDMA engine hung as DRM open causes VM clear to SDMA\nbefore SDMA init. Adding the condition to in drm client creation, on top of v1,\nto guard against drm client creation call multiple times." - }, - { - "lang": "es", - "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdgpu: dispositivo de zona de inicio y cliente drm despu\u00e9s del restablecimiento del modo 1 al recargar. En el entorno de paso a trav\u00e9s, cuando amdgpu se recarga despu\u00e9s de la descarga, el modo 1 se activa despu\u00e9s de inicializar las IP necesarias. Ese inicio no incluye KFD, y el inicio de KFD espera hasta que se complete el reinicio. Se llama a KFD init en el controlador de reinicio, pero en este caso, el dispositivo de zona y el cliente drm no se inicializan, lo que hace que la aplicaci\u00f3n genere p\u00e1nico en el kernel. v2: Eliminaci\u00f3n de la condici\u00f3n KFD inicial de amdgpu_amdkfd_drm_client_create. Como la versi\u00f3n anterior tiene el potencial de crear un cliente DRM dos veces. v3: el parche v2 hace que el motor SDMA se bloquee porque la apertura de DRM hace que la VM se borre a SDMA antes de que se inicie SDMA. Agregar la condici\u00f3n a la creaci\u00f3n del cliente DRM, adem\u00e1s de la versi\u00f3n 1, para protegerse contra llamadas de creaci\u00f3n del cliente DRM varias veces." + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], "metrics": {}, - "references": [ - { - "url": "https://git.kernel.org/stable/c/4f8154f775197d0021b690c2945d6a4d8094c8f6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/f679fd6057fbf5ab34aaee28d58b7f81af0cbf48", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/4f8154f775197d0021b690c2945d6a4d8094c8f6", - "source": "af854a3a-2127-422b-91ae-364da2661108" - }, - { - "url": "https://git.kernel.org/stable/c/f679fd6057fbf5ab34aaee28d58b7f81af0cbf48", - "source": "af854a3a-2127-422b-91ae-364da2661108" - } - ] + "references": [] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44955.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44955.json index 7a0b95f5bc0..6da282ae808 100644 --- a/CVE-2024/CVE-2024-449xx/CVE-2024-44955.json +++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44955.json @@ -2,91 +2,15 @@ "id": "CVE-2024-44955", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-04T19:15:30.423", - "lastModified": "2024-12-09T13:10:03.600", - "vulnStatus": "Modified", + "lastModified": "2025-06-19T14:15:45.237", + "vulnStatus": "Rejected", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Don't refer to dc_sink in is_dsc_need_re_compute\n\n[Why]\nWhen unplug one of monitors connected after mst hub, encounter null pointer dereference.\n\nIt's due to dc_sink get released immediately in early_unregister() or detect_ctx(). When\ncommit new state which directly referring to info stored in dc_sink will cause null pointer\ndereference.\n\n[how]\nRemove redundant checking condition. Relevant condition should already be covered by checking\nif dsc_aux is null or not. Also reset dsc_aux to NULL when the connector is disconnected." - }, - { - "lang": "es", - "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: No hacer referencia a dc_sink en is_dsc_need_re_compute [Por qu\u00e9] Cuando se desconecta uno de los monitores conectados despu\u00e9s del concentrador mst, se produce una desreferencia de puntero nulo. Esto se debe a que dc_sink se libera inmediatamente en early_unregister() o detect_ctx(). Cuando se confirma un nuevo estado que hace referencia directa a la informaci\u00f3n almacenada en dc_sink, se producir\u00e1 una desreferencia de puntero nulo. [C\u00f3mo] Eliminar la condici\u00f3n de comprobaci\u00f3n redundante. La condici\u00f3n relevante ya deber\u00eda estar cubierta comprobando si dsc_aux es nulo o no. Tambi\u00e9n se restablece dsc_aux a NULL cuando se desconecta el conector." + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "baseScore": 5.5, - "baseSeverity": "MEDIUM", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 1.8, - "impactScore": 3.6 - } - ] - }, - "weaknesses": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-476" - } - ] - } - ], - "configurations": [ - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionEndExcluding": "6.10.5", - "matchCriteriaId": "E4CB0927-C720-465B-99F2-3E47215515F2" - } - ] - } - ] - } - ], - "references": [ - { - "url": "https://git.kernel.org/stable/c/39b217193729aa45eded8de24d9245468a0c0263", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - }, - { - "url": "https://git.kernel.org/stable/c/c7e65cab54a89f4df54110f0b44c4ade93d1a911", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/fcf6a49d79923a234844b8efe830a61f3f0584e4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-488xx/CVE-2025-48886.json b/CVE-2025/CVE-2025-488xx/CVE-2025-48886.json new file mode 100644 index 00000000000..4c6cdcb509e --- /dev/null +++ b/CVE-2025/CVE-2025-488xx/CVE-2025-48886.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-48886", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-06-19T15:15:20.473", + "lastModified": "2025-06-19T15:15:20.473", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Hydra is a layer-two scalability solution for Cardano. Prior to version 0.22.0, the process assumes L1 event finality and does not consider failed transactions. Currently, Cardano L1 is monitored for certain events which are necessary for state progression. At the moment, Hydra considers those events as finalized as soon as they are recognized by the node participants making such transactions the target of re-org attacks. The system does not currently consider the fact that failed transactions on the Cardano L1 can indeed appear in blocks because these transactions are so infrequent. This issue has been patched in version 0.22.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-755" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/cardano-scaling/hydra/commit/2bc6a82ef6dbfa8b94e1c11d55253713065f605e", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/cardano-scaling/hydra/commit/fb22d968964bf5d5b79227cc845d871147044ce7", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/cardano-scaling/hydra/security/advisories/GHSA-qr9f-mpgf-wp25", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-490xx/CVE-2025-49014.json b/CVE-2025/CVE-2025-490xx/CVE-2025-49014.json new file mode 100644 index 00000000000..3b418287ec6 --- /dev/null +++ b/CVE-2025/CVE-2025-490xx/CVE-2025-49014.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-49014", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-06-19T15:15:20.650", + "lastModified": "2025-06-19T15:15:20.650", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "jq is a command-line JSON processor. In version 1.8.0 a heap use after free vulnerability exists within the function f_strflocaltime of /src/builtin.c. This issue has been patched in commit 499c91b, no known fix version exists at time of publication." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/jqlang/jq/commit/499c91bca9d4d027833bc62787d1bb075c03680e", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/jqlang/jq/security/advisories/GHSA-rmjp-cr27-wpg2", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-62xx/CVE-2025-6267.json b/CVE-2025/CVE-2025-62xx/CVE-2025-6267.json new file mode 100644 index 00000000000..546ee391bb3 --- /dev/null +++ b/CVE-2025/CVE-2025-62xx/CVE-2025-6267.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2025-6267", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-19T14:15:55.323", + "lastModified": "2025-06-19T14:15:55.323", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in zhilink \u667a\u4e92\u8054(\u6df1\u5733)\u79d1\u6280\u6709\u9650\u516c\u53f8 ADP Application Developer Platform \u5e94\u7528\u5f00\u53d1\u8005\u5e73\u53f0 1.0.0. It has been rated as critical. This issue affects some unknown processing of the file /adpweb/a/base/barcodeDetail/. The manipulation of the argument barcodeNo/barcode/itemNo leads to sql injection. The attack may be initiated remotely. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://vuldb.com/?ctiid.313271", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.313271", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.586697", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-62xx/CVE-2025-6268.json b/CVE-2025/CVE-2025-62xx/CVE-2025-6268.json new file mode 100644 index 00000000000..9ce28a691b4 --- /dev/null +++ b/CVE-2025/CVE-2025-62xx/CVE-2025-6268.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2025-6268", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-19T15:15:20.810", + "lastModified": "2025-06-19T15:15:20.810", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic has been found in Luna Imaging up to 7.5.5.6. Affected is an unknown function of the file /luna/servlet/view/search. The manipulation of the argument q leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://vuldb.com/?ctiid.313272", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.313272", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.592218", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 6ff5429923a..83e7fdbccc7 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-19T14:00:19.951536+00:00 +2025-06-19T16:00:20.308673+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-06-19T13:15:51.840000+00:00 +2025-06-19T15:15:20.810000+00:00 ``` ### Last Data Feed Release @@ -33,47 +33,28 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -298704 +298709 ``` ### CVEs added in the last Commit -Recently added CVEs: `3` +Recently added CVEs: `5` -- [CVE-2025-4738](CVE-2025/CVE-2025-47xx/CVE-2025-4738.json) (`2025-06-19T13:15:51.840`) -- [CVE-2025-6019](CVE-2025/CVE-2025-60xx/CVE-2025-6019.json) (`2025-06-19T12:15:19.727`) -- [CVE-2025-6266](CVE-2025/CVE-2025-62xx/CVE-2025-6266.json) (`2025-06-19T12:15:20.537`) +- [CVE-2024-24916](CVE-2024/CVE-2024-249xx/CVE-2024-24916.json) (`2025-06-19T14:15:44.983`) +- [CVE-2025-48886](CVE-2025/CVE-2025-488xx/CVE-2025-48886.json) (`2025-06-19T15:15:20.473`) +- [CVE-2025-49014](CVE-2025/CVE-2025-490xx/CVE-2025-49014.json) (`2025-06-19T15:15:20.650`) +- [CVE-2025-6267](CVE-2025/CVE-2025-62xx/CVE-2025-6267.json) (`2025-06-19T14:15:55.323`) +- [CVE-2025-6268](CVE-2025/CVE-2025-62xx/CVE-2025-6268.json) (`2025-06-19T15:15:20.810`) ### CVEs modified in the last Commit -Recently modified CVEs: `32` +Recently modified CVEs: `4` -- [CVE-2022-49558](CVE-2022/CVE-2022-495xx/CVE-2022-49558.json) (`2025-06-19T13:15:23.990`) -- [CVE-2023-52569](CVE-2023/CVE-2023-525xx/CVE-2023-52569.json) (`2025-06-19T13:15:25.037`) -- [CVE-2023-52681](CVE-2023/CVE-2023-526xx/CVE-2023-52681.json) (`2025-06-19T13:15:25.340`) -- [CVE-2023-52733](CVE-2023/CVE-2023-527xx/CVE-2023-52733.json) (`2025-06-19T13:15:25.540`) -- [CVE-2023-52760](CVE-2023/CVE-2023-527xx/CVE-2023-52760.json) (`2025-06-19T13:15:30.487`) -- [CVE-2023-52921](CVE-2023/CVE-2023-529xx/CVE-2023-52921.json) (`2025-06-19T13:15:30.640`) -- [CVE-2024-26710](CVE-2024/CVE-2024-267xx/CVE-2024-26710.json) (`2025-06-19T13:15:31.147`) -- [CVE-2024-26774](CVE-2024/CVE-2024-267xx/CVE-2024-26774.json) (`2025-06-19T13:15:31.303`) -- [CVE-2024-26794](CVE-2024/CVE-2024-267xx/CVE-2024-26794.json) (`2025-06-19T13:15:31.510`) -- [CVE-2024-26829](CVE-2024/CVE-2024-268xx/CVE-2024-26829.json) (`2025-06-19T13:15:35.917`) -- [CVE-2024-27410](CVE-2024/CVE-2024-274xx/CVE-2024-27410.json) (`2025-06-19T13:15:36.097`) -- [CVE-2024-35788](CVE-2024/CVE-2024-357xx/CVE-2024-35788.json) (`2025-06-19T13:15:36.360`) -- [CVE-2024-35927](CVE-2024/CVE-2024-359xx/CVE-2024-35927.json) (`2025-06-19T13:15:40.283`) -- [CVE-2024-36288](CVE-2024/CVE-2024-362xx/CVE-2024-36288.json) (`2025-06-19T13:15:40.433`) -- [CVE-2024-43835](CVE-2024/CVE-2024-438xx/CVE-2024-43835.json) (`2025-06-19T13:15:41.177`) -- [CVE-2024-43845](CVE-2024/CVE-2024-438xx/CVE-2024-43845.json) (`2025-06-19T13:15:41.423`) -- [CVE-2024-43911](CVE-2024/CVE-2024-439xx/CVE-2024-43911.json) (`2025-06-19T13:15:41.600`) -- [CVE-2024-45025](CVE-2024/CVE-2024-450xx/CVE-2024-45025.json) (`2025-06-19T13:15:41.733`) -- [CVE-2024-46700](CVE-2024/CVE-2024-467xx/CVE-2024-46700.json) (`2025-06-19T13:15:42.090`) -- [CVE-2024-46852](CVE-2024/CVE-2024-468xx/CVE-2024-46852.json) (`2025-06-19T13:15:46.410`) -- [CVE-2024-56694](CVE-2024/CVE-2024-566xx/CVE-2024-56694.json) (`2025-06-19T13:15:46.560`) -- [CVE-2024-56786](CVE-2024/CVE-2024-567xx/CVE-2024-56786.json) (`2025-06-19T13:15:46.830`) -- [CVE-2024-57920](CVE-2024/CVE-2024-579xx/CVE-2024-57920.json) (`2025-06-19T13:15:50.980`) -- [CVE-2024-58077](CVE-2024/CVE-2024-580xx/CVE-2024-58077.json) (`2025-06-19T13:15:51.193`) -- [CVE-2025-38030](CVE-2025/CVE-2025-380xx/CVE-2025-38030.json) (`2025-06-19T13:15:51.760`) +- [CVE-2021-47144](CVE-2021/CVE-2021-471xx/CVE-2021-47144.json) (`2025-06-19T14:15:24.327`) +- [CVE-2022-49299](CVE-2022/CVE-2022-492xx/CVE-2022-49299.json) (`2025-06-19T14:15:34.170`) +- [CVE-2024-36022](CVE-2024/CVE-2024-360xx/CVE-2024-36022.json) (`2025-06-19T14:15:45.160`) +- [CVE-2024-44955](CVE-2024/CVE-2024-449xx/CVE-2024-44955.json) (`2025-06-19T14:15:45.237`) ## Download and Usage diff --git a/_state.csv b/_state.csv index f581a31711d..2872b46f195 100644 --- a/_state.csv +++ b/_state.csv @@ -187473,7 +187473,7 @@ CVE-2021-47140,0,0,c3dcf5ccce19de7e841d31a01af1a7c0a0ac783be101cc1ae90902a46a0b7 CVE-2021-47141,0,0,e61404ed12a5ac1ae29217dd66abf34d1c9993567a22e9f40130f3f47929515b,2024-12-20T13:52:15.857000 CVE-2021-47142,0,0,6ad377d956d05ee5b77de4a0fcd9c1e12bb267ce6b693f08e9c8a001b07f1a24,2024-12-17T14:56:12.967000 CVE-2021-47143,0,0,e3b00c03aadd7fe0eba996ce0aa700ffe68266a62c0c1a319c4d75334f72fab4,2025-03-13T21:09:12.133000 -CVE-2021-47144,0,0,7ae5f718c8b8ace4f33fb239cb219fe990a890405bf96e6eb5781eebe4403842,2024-12-17T14:49:22.333000 +CVE-2021-47144,0,1,45db3cba27ad95d1197ebaca09ce2daec1e6ac06a78c7071ee0d59a43f2c03bb,2025-06-19T14:15:24.327000 CVE-2021-47145,0,0,43d8e0b6ecfa4a172c868b86d0d689e74785d9a21693602a5589db57ba57a745,2024-12-20T13:54:08.207000 CVE-2021-47146,0,0,dbdc77471ed516b8586014a2485eb48d7b639119ac0499cf0380be4cece2ea03,2024-12-20T13:56:08.667000 CVE-2021-47147,0,0,8cffde98530a8168df40904390cfc1ac183830cade4d4bfa5b463711d25686fb,2024-11-21T06:35:29.547000 @@ -213233,7 +213233,7 @@ CVE-2022-48845,0,0,94f22e9b9acbbb5c8519471c83937a2c7a9147a8e77f1ee3045c80f48a468 CVE-2022-48846,0,0,7258287e68639fcdfd0b4f5144cd503eacb792f0f2fcee8ccf75e40bdfddba68,2024-11-21T07:34:12.050000 CVE-2022-48847,0,0,3321217cd4af573aa5e073a85425079ad5809712d2d6c94889f79663c3d8a616,2024-11-21T07:34:12.187000 CVE-2022-48848,0,0,1f1e31d119acbcb86505cd74e9774b42844323114bdc27c89f05c0211a90e033,2024-11-21T07:34:12.343000 -CVE-2022-48849,0,1,cf7d4bf1b125c37c3e1185047d0249e065abf93553d1111843b773ab48169c2d,2025-06-19T13:15:21.690000 +CVE-2022-48849,0,0,cf7d4bf1b125c37c3e1185047d0249e065abf93553d1111843b773ab48169c2d,2025-06-19T13:15:21.690000 CVE-2022-4885,0,0,3ccdceef4b557bc79233cdb7b14f77a0f886bb4504e564212ba210d67b8e9258,2024-11-21T07:36:08.490000 CVE-2022-48850,0,0,3b978e81aff8dc66cd596ad9489b1964b8388a9bdaa732c023a8dce60be7c237,2024-11-21T07:34:12.593000 CVE-2022-48851,0,0,b5963e610a6b567ac27737bdbd152c9c020f59e3a839696883f7155074b9e929,2024-11-21T07:34:12.727000 @@ -213327,14 +213327,14 @@ CVE-2022-48931,0,0,1dbe2b8984115e6c4128eb39c49ee06011d1a2ee34417caca08b34d6a5e74 CVE-2022-48932,0,0,5ee1a19583d0c4a9467a8feaaebf9dcf3b1db8ef04aca34fdc4cff7132f23fec,2024-08-23T01:48:35.663000 CVE-2022-48933,0,0,1b4c1a1516a577d3b1652e29f5c3e786a949e8aaa7e38c23472c7d258c831a43,2024-08-23T01:50:09.313000 CVE-2022-48934,0,0,aaf1356acfd8d3dd84aa39b3fd1fddb548a57947b1cb9a25af1e11990bb7dc62,2024-08-22T20:33:29.860000 -CVE-2022-48935,0,1,2df4d407b80a4f230b41b7850bb9f18a2827a0aed7a40789730644be1330a313,2025-06-19T13:15:21.983000 +CVE-2022-48935,0,0,2df4d407b80a4f230b41b7850bb9f18a2827a0aed7a40789730644be1330a313,2025-06-19T13:15:21.983000 CVE-2022-48936,0,0,314cbb90d15468a6b1d7555d054a6b503128a9503d9ec5951ea48c3a9258d9c6,2024-08-31T06:15:06.460000 CVE-2022-48937,0,0,6b478b1435d78a7ab05467250f2242aae473c24e90fe3a1aff6615918f5c8a52,2024-08-22T19:07:28.567000 CVE-2022-48938,0,0,b6e9be5213f1247d08ffa614fc1a1459598f240582d9fb96da5e9999e511826e,2024-11-08T16:15:17.730000 CVE-2022-48939,0,0,377615ee29b1087387ff6e3464436ee4fcda9ed9ec30aadbb16f8c0936d8933b,2024-08-22T19:02:08.770000 CVE-2022-4894,0,0,22ed899d22580fa7ff41b74dfe422d716a5c9906a1ee5a472871f1ebbf4474fb,2024-11-21T07:36:09.560000 CVE-2022-48940,0,0,38b69bd3209b0e7ac4d9cbe453d62a205ba4033bc58506aead5aeef18a85020c,2024-08-22T18:37:46.133000 -CVE-2022-48941,0,1,1448e6ff2637fd6ee187920793315d4f4a0b7bd5e5702c158741508f6e028283,2025-06-19T13:15:22.263000 +CVE-2022-48941,0,0,1448e6ff2637fd6ee187920793315d4f4a0b7bd5e5702c158741508f6e028283,2025-06-19T13:15:22.263000 CVE-2022-48942,0,0,54372a0406f1cc0b6657cde2dcb6c662b4713c79f47b57e794248039c65b1eca,2024-08-22T18:25:14.867000 CVE-2022-48943,0,0,0264fe83c8bd61ffaa8ed7a29a1240090d6282de98f79a1469d8e8bd5f420b46,2024-08-22T18:27:42.807000 CVE-2022-48944,0,0,16d9e14c1e4833622d1d49b030ba3e3e9b9c0c99940a3d2a711a2b623c1bcade,2024-09-03T14:26:56.393000 @@ -213564,7 +213564,7 @@ CVE-2022-49149,0,0,8297fdf184d8a7e40f01ea0d5664b49cf40330e7583bc4ef95ce788771a41 CVE-2022-4915,0,0,78e97bf5fafb2d4b7a3e2f6f595e7dd1ee238a60190a7a2d5d6415e7dc17ff0a,2024-11-21T07:36:14.217000 CVE-2022-49150,0,0,89648067971d85640435933caa498e9b7904e2151ba4ff335e966223ae328796,2025-03-13T22:05:03.087000 CVE-2022-49151,0,0,6f4fcc36b8e2ec9d432fdd24048034cbfd9b73238dda4b9dc33cc585a0b93ab8,2025-02-26T07:00:52.330000 -CVE-2022-49152,0,1,c4a44daa128a67ab28411df5611930eeb719858fd4f3058175c97a012867c1a3,2025-06-19T13:15:22.587000 +CVE-2022-49152,0,0,c4a44daa128a67ab28411df5611930eeb719858fd4f3058175c97a012867c1a3,2025-06-19T13:15:22.587000 CVE-2022-49153,0,0,95eb9c7e8ee8ba4b1a97012606c13b8f5d719ee8b39c0fa9f873eb03c309eaff,2025-03-13T21:59:52.070000 CVE-2022-49154,0,0,058332ad746480c433c095f859625c05c95d09d8148e0469d1b9f496b7c549cf,2025-02-26T07:00:52.627000 CVE-2022-49155,0,0,ccc5982f599632c5a9bc700e79ff0e33f7c79bed37c3808f82465d1a36b59668,2025-03-13T22:06:01.560000 @@ -213725,7 +213725,7 @@ CVE-2022-49295,0,0,5e38c4c123787e1ee751a94134f2b29ad572a5b12c9b6211fdebdc37dfbd2 CVE-2022-49296,0,0,588351356d12270e478dd63a43a961d11715903a90acd8e6708c24c601fcaa4b,2025-04-14T20:08:21.310000 CVE-2022-49297,0,0,8d1c06a4aa23def0f72824aed39805f1f922ad45e1d7b60048b08e6a7aa701f7,2025-02-26T07:01:06.527000 CVE-2022-49298,0,0,6ef51ed7003ff5ce2a107fdf5b5fd431bea1536c5c9ba8aad25226015ac10a10,2025-04-14T20:08:32.443000 -CVE-2022-49299,0,0,f197f91d925185ae89eedd3f194e3948bdc958a01200036420aad81b79f27842,2025-04-14T19:49:30.960000 +CVE-2022-49299,0,1,858e440c602b388e1110e4a6eed2edf8cf9a1182fd6623384ad6f3ad00234ba0,2025-06-19T14:15:34.170000 CVE-2022-4930,0,0,7e21b5888ba08ac9f714e1d7cc949231011fc7edea53dba39ac9bb8b71344e77,2024-11-21T07:36:16.550000 CVE-2022-49300,0,0,b797c5faa060878b9beb923e26a960451e4ac34b94b1fc227e08b825a7d5668b,2025-04-14T20:08:41.297000 CVE-2022-49301,0,0,136481d6f3b44bb5b873bb10b1c743de69545e148cb371975e40d2524eedecd4,2025-04-14T20:08:57.483000 @@ -213784,7 +213784,7 @@ CVE-2022-49349,0,0,1aa0d1d0eb3b79e2c845a874dc5fe1db90a2fe64fbb452307be608b1f11ce CVE-2022-4935,0,0,c31e88e6073fd3a29bae4107f25ae33694ff5130dac188737279f3976c97e421,2024-11-21T07:36:17.127000 CVE-2022-49350,0,0,5797ea7c9c6bbd566c497961eeb330f7e8cb153458b7d0b6af2daac2f567e551,2025-02-26T07:01:11.723000 CVE-2022-49351,0,0,f762fc8508cc53a96f2d5ae2409376fdfff9e36e8f7b847da1a350ac1003a378,2025-04-14T19:46:06.033000 -CVE-2022-49352,0,1,823244c735e96d1908eee00f54805dc289c4857d5af5fb9bda42577bca86b134,2025-06-19T13:15:23.173000 +CVE-2022-49352,0,0,823244c735e96d1908eee00f54805dc289c4857d5af5fb9bda42577bca86b134,2025-06-19T13:15:23.173000 CVE-2022-49353,0,0,be077bbcbe43beba9f58af70b6e1b75dd94baa91ee5c399b9024ca0ebceb7606,2025-04-14T19:45:00.240000 CVE-2022-49354,0,0,d8fe12986c733c7dfe77ae298c313fe154cd9f45b9cf0b76657e1140b5aab642,2025-04-14T19:44:14.093000 CVE-2022-49355,0,0,80fa4fd5e635de4f91692140e2c86158eee6f65edf7fc01373d8d1f58728fae1,2025-02-26T13:15:34.157000 @@ -213850,13 +213850,13 @@ CVE-2022-49409,0,0,3a950fbc64da2692edff68767b6c6abac72091f6e85997f1aa6e95042b2d7 CVE-2022-4941,0,0,c9bd40e150e10c29b1c1e079ad1ffb2aea9c86536c13026eb988f154ee982f63,2024-11-21T07:36:17.807000 CVE-2022-49410,0,0,84d3e0f7bc21d558aec3b4e0ae8dee5a83279109778732c277deb256b86bb2fc,2025-04-17T20:31:34.340000 CVE-2022-49411,0,0,2b5ce5715259713da2a41ab77c5286503ef5377899a5c8c8887f3d26b2333df2,2025-03-25T13:42:10.430000 -CVE-2022-49412,0,1,4f46ff2d315d02f6f16a687dc1b5546d05e8cdd6687c045d7846d721ea0dd8f9,2025-06-19T13:15:23.390000 +CVE-2022-49412,0,0,4f46ff2d315d02f6f16a687dc1b5546d05e8cdd6687c045d7846d721ea0dd8f9,2025-06-19T13:15:23.390000 CVE-2022-49413,0,0,b2779eac2a49f8913753d7cd747a23e073f48c0c2dc073ff2425a07a12ae4534,2025-03-24T19:52:50.113000 CVE-2022-49414,0,0,78bee9ca007908a24f772b14094ada9ee18d2cc4a2d938908fbffbcb58ba4b45,2025-04-17T20:35:12.403000 CVE-2022-49415,0,0,cc9039f44d53c55e84c3684b78f9440e4ff08d1e0f2a5666027ec595491fe980,2025-02-26T07:01:17.987000 CVE-2022-49416,0,0,09c89d207391df88211f0618c2195524a326b2439f8e7dc7ec1d9f0561573089,2025-03-24T19:57:30.150000 CVE-2022-49417,0,0,49961907fb61384541aef641811d488df153e40bcbca60f55f87b6d9cab4df46,2025-02-26T07:01:18.170000 -CVE-2022-49418,0,1,d0aa489b7864f924c24aff27af838703a66915ae7446105b04bb73c1789e9f08,2025-06-19T13:15:23.660000 +CVE-2022-49418,0,0,d0aa489b7864f924c24aff27af838703a66915ae7446105b04bb73c1789e9f08,2025-06-19T13:15:23.660000 CVE-2022-49419,0,0,5e829714eda436088a7d4e2a3f319dbfd17b45b8ecc959b900f607e63f922a81,2025-03-24T19:57:48.187000 CVE-2022-4942,0,0,4bfd31c9d3683237fc0f66ee6838a8e9abe03973c1dc054d19973ecd2181f17a,2024-11-21T07:36:17.917000 CVE-2022-49420,0,0,b46138299cef30db3771e236c2dee66f2ab59bca5d670ea9e8d5a786215d1752,2025-02-26T07:01:18.440000 @@ -214008,7 +214008,7 @@ CVE-2022-49554,0,0,0a34a3ac650254cb3dbd54b8422b1c5adcae22b4c4383ae36cc0c388c2f4c CVE-2022-49555,0,0,8de1c6fc16220f4772a30decf3ad5acfcd7fadbb1585a19ad12b3d6ad05c00cf,2025-02-26T07:01:31.313000 CVE-2022-49556,0,0,de449809bae8cf397686a95281a178fe4b9ccf84aef2008424bda7593f787eb5,2025-02-26T07:01:31.407000 CVE-2022-49557,0,0,38a9ef5191d44200c06c66c46ec6d0c2e3a8bb943adbda5a5d7d1696f2d7f29c,2025-02-26T07:01:31.503000 -CVE-2022-49558,0,1,4c402e69801d6bcff63fb791b8eccb9d40581cddc3ca92adb758dc7fe3a2ea1c,2025-06-19T13:15:23.990000 +CVE-2022-49558,0,0,4c402e69801d6bcff63fb791b8eccb9d40581cddc3ca92adb758dc7fe3a2ea1c,2025-06-19T13:15:23.990000 CVE-2022-49559,0,0,2d14c0fbbdaee85fbd444788c794ab884da113af56925a6fd30e8cd880f6bc1d,2025-02-26T07:01:31.687000 CVE-2022-4956,0,0,43d14a14df320488a03d84b995042cdf95aa3fb7ff65406b2df0e2b91a52a9a3,2024-11-21T07:36:19.420000 CVE-2022-49560,0,0,f7c3028aafa421076b95e5c2bf3d153f3809af6aad83d1d0d1d9464b491c9c33,2025-03-10T21:25:29.677000 @@ -241994,7 +241994,7 @@ CVE-2023-52565,0,0,573eae026add44222db4dcfafdb299400ef2ab79702c7319794326b052947 CVE-2023-52566,0,0,4a45e53e899c4c8e03aa80fb0793adc54a3cf1171b058b92566f227166dfee91,2025-04-08T15:08:55.437000 CVE-2023-52567,0,0,18cd831f228d03b1e3290afd2f881bf52bd296c7921d05278f526558565ace57,2024-12-11T16:26:16.023000 CVE-2023-52568,0,0,8d17d4f43096b1e8e2ac821253ed4d8309c3179fdcc64f1f4e718167b321b031,2024-12-11T16:23:49.080000 -CVE-2023-52569,0,1,df1275888ba06ca21a82881e8960dc896067a15bc45cfc453e437a3a74c9d6eb,2025-06-19T13:15:25.037000 +CVE-2023-52569,0,0,df1275888ba06ca21a82881e8960dc896067a15bc45cfc453e437a3a74c9d6eb,2025-06-19T13:15:25.037000 CVE-2023-5257,0,0,3ce640126c4032ba9918a5e5e037c470517d8bf27f41acbde20ca80717bf2d95,2024-11-21T08:41:23.437000 CVE-2023-52570,0,0,c7a973afb4874bbc0a4a26ff210f16ddeefd555596f88f99c2b297604732223f,2024-12-11T15:21:44.063000 CVE-2023-52571,0,0,0530f604f4af36e2992e1f7440b11a88707cbaea887a6a55bb83acc474872973,2025-04-08T15:05:00.363000 @@ -242118,7 +242118,7 @@ CVE-2023-52678,0,0,953cb4fa01ac6791b2584f95a5c8315c108ebc482f65f293fe1f239c11425 CVE-2023-52679,0,0,c478e813ddd4b4ce1343e3f27409449fa8ed702ee1034440fed17cea99bc0916,2025-01-10T17:43:16.480000 CVE-2023-5268,0,0,f9bebe86fa585dfcbe060b1fc00adb16b0d04aa3d4d18f7175ba3a6e3d9791b3,2024-11-21T08:41:24.927000 CVE-2023-52680,0,0,ae64b074c35060884727ad53684f53cc03f000222f0fa8eecc3a6d877d9f2721,2024-11-21T08:40:20.917000 -CVE-2023-52681,0,1,9979ebd32b3b744719f95c4518639ea57b75a7e784be8db9600f82ed62535911,2025-06-19T13:15:25.340000 +CVE-2023-52681,0,0,9979ebd32b3b744719f95c4518639ea57b75a7e784be8db9600f82ed62535911,2025-06-19T13:15:25.340000 CVE-2023-52682,0,0,7173fbc8b142d32af92920f8c64d6a1bcd27bf572e831e7779e266c7cb9a253f,2024-11-21T08:40:21.140000 CVE-2023-52683,0,0,9b2b7b84c8196b3a590a9ce5475ccf3a213512372aec3910ecd4dc19f9dd5698,2024-11-21T08:40:21.257000 CVE-2023-52684,0,0,826a51fde3c297efd3fc5507da29c58f7b97d76cfc3216cf6472e94079a4d24f,2025-04-07T19:05:23.597000 @@ -242174,7 +242174,7 @@ CVE-2023-5273,0,0,6f26df3fc1e6203409f37349c999afab7055cfb5e89e02483db488eefca53f CVE-2023-52730,0,0,1ebdd041e2bc78bea11061473cc34d19a52a846428c3eec8b8c107820fac7c23,2024-11-21T08:40:27.883000 CVE-2023-52731,0,0,f8ad5fad613ade1f6ee5f3c6074ef9d4461b8891819ac9a19a1d924438b4937a,2024-11-21T08:40:28.007000 CVE-2023-52732,0,0,1eb76b8d97f2e3d09be2caf803604d47c4ef9e424628d8acb55510ffc20a29aa,2024-11-21T08:40:28.117000 -CVE-2023-52733,0,1,d8b36e38e3f34fa775025847fd118ed3ac106313dc762d2202b3a2ae3b5ec530,2025-06-19T13:15:25.540000 +CVE-2023-52733,0,0,d8b36e38e3f34fa775025847fd118ed3ac106313dc762d2202b3a2ae3b5ec530,2025-06-19T13:15:25.540000 CVE-2023-52734,0,0,2f76584608f90880dda5ed1cfe003cf8af38c50f85a7ba05f54382ff1ea93b84,2024-05-28T19:15:09.773000 CVE-2023-52735,0,0,f478ba3b373cd433bb5aee25a220a182cbf53291e6340b29288cf9162f927cfd,2025-04-02T14:51:07.620000 CVE-2023-52736,0,0,c35bcc1b2cba606129c818a936155ca214b02693b11b04934035f9ed16c416ef,2024-11-21T08:40:28.620000 @@ -242204,7 +242204,7 @@ CVE-2023-52757,0,0,59eb322f34bc12b8711c834c3ce346bda3ca5214ddbf962c381360374341e CVE-2023-52758,0,0,1dec77a3ad2d46363a8d440866791b91e3ba2419e4f6b349bb352575fcbf86ba,2024-05-24T16:15:09.010000 CVE-2023-52759,0,0,d02de4f2e673632abe3697cddfe6669da6af361a999f03297379c860e218d9d0,2024-12-19T11:15:30.140000 CVE-2023-5276,0,0,0b7db42a0b69ca7893c46dd3bcba89bcdb20b2edc3fa2c1057d10c47dc3e90db,2024-11-21T08:41:26 -CVE-2023-52760,0,1,be4664371f00ed519eb214443ad69b213a779969946b87431fc93a9157c3c1fd,2025-06-19T13:15:30.487000 +CVE-2023-52760,0,0,be4664371f00ed519eb214443ad69b213a779969946b87431fc93a9157c3c1fd,2025-06-19T13:15:30.487000 CVE-2023-52761,0,0,2de2d44e86efe53326e55f7ec6f21c5145ed9df593be989838b4687490700a3c,2024-11-21T08:40:31.823000 CVE-2023-52762,0,0,b1526cb45988cef620a220c45195944361e97b42679e23f18e92d83e3ddbd163,2024-11-21T08:40:31.957000 CVE-2023-52763,0,0,51608820498fd55626f4c63260788d9dac36f63a4eb8157e60a3920e8ba1efdd,2024-11-21T08:40:32.093000 @@ -242381,7 +242381,7 @@ CVE-2023-52918,0,0,b756056ec028a3f8dbe95359b4e6a9ee9c3aee022710af984fbcd888a01bb CVE-2023-52919,0,0,428ae0b617ce1503b5cd1e233daf56322f531cad4cdc2d0ff04fec45c15d021d,2024-10-24T03:53:16.377000 CVE-2023-5292,0,0,053cd6bdc838ec8e58310af23c6d4e5e608dfbec5f41437eefe04e4d3a1ca985,2024-11-21T08:41:27.907000 CVE-2023-52920,0,0,d3f31fdc95b4a67b67ed332bc8577a6c103a6cc3b65bec1715fea71c281674f5,2025-01-09T16:15:35.587000 -CVE-2023-52921,0,1,c9f9bd22855b8379a13799b1a815f41642b925730ab26056a1a11d5dc4d2992e,2025-06-19T13:15:30.640000 +CVE-2023-52921,0,0,c9f9bd22855b8379a13799b1a815f41642b925730ab26056a1a11d5dc4d2992e,2025-06-19T13:15:30.640000 CVE-2023-52922,0,0,4ae9be38bb6e6ca23829d038f55e60ad12898283b6085540928abd9ae32559e4,2025-06-13T20:15:22.450000 CVE-2023-52923,0,0,d09409de037f5df89cd9d952de36693819046c41079eff92af40562f1bb761b3,2025-01-20T11:15:07.670000 CVE-2023-52924,0,0,bd440ccf1a42892e419405c1c6a29cc2e2440c3f674ae48874e7009d8d7bdcee,2025-02-05T10:15:21.073000 @@ -253939,6 +253939,7 @@ CVE-2024-24910,0,0,6b331799a881a5d956a87c006abe5e882f01b24bf255742ad3b49c624db6b CVE-2024-24911,0,0,000ec366e410a6c31f93ab7f8a2e5fcf30159e4251e9a0263b609a65802a079d,2025-02-06T14:15:29.577000 CVE-2024-24912,0,0,7e4db9efaf9ed4fd90c3653c0c141095d6d30e8a8ae2098e663586572a626f62,2024-11-21T08:59:57.947000 CVE-2024-24914,0,0,6a184fa1912b50a75a0f68f12ef7de42e993a65d0e5eee8a5ac41cb6b37ddf0c,2024-11-08T19:01:03.880000 +CVE-2024-24916,1,1,f386f1592d60dd44d86fab84a74d22c9e2dceb453c216f7377cb501ea1221570,2025-06-19T14:15:44.983000 CVE-2024-24919,0,0,79021d06164055237b10fa49935e385f8096a39629b5d8ac929ac9e336c9c5cc,2025-01-27T21:42:18.743000 CVE-2024-2492,0,0,a9b15c0f5d53de03b8229afca1c8a7b4e7a78c54ba58e9584411863892de05ef,2025-01-09T17:01:54.423000 CVE-2024-24920,0,0,dc0bb25ed0284e07ee39402f3b0f41ee21d4b48f63522bd3cf324ad5fae05c1c,2024-11-21T08:59:58.420000 @@ -255274,7 +255275,7 @@ CVE-2024-26707,0,0,1c758f00ff80d3ca5b813ab085c0f9ff555bb1b0aa5a49dbcb6e9068a2759 CVE-2024-26708,0,0,bdc17ef7e58087066d3e85b0859e722e8ac059d7967114ad28115d9b3375b4ae,2025-04-08T15:31:23.777000 CVE-2024-26709,0,0,84265dc256d943df4540d48ae1b11a8d0310b66ecceaef365d267322aba660bc,2025-01-13T20:03:28.797000 CVE-2024-2671,0,0,bd5a320ab3401036156189ab4d3c6361e3a5116b660dfa0e919103b068f0300e,2025-02-21T15:22:57.597000 -CVE-2024-26710,0,1,d91617f4ca4e9a9d1f5c2cca466d703e7087376b6a0b7ff97a78b84a1307d155,2025-06-19T13:15:31.147000 +CVE-2024-26710,0,0,d91617f4ca4e9a9d1f5c2cca466d703e7087376b6a0b7ff97a78b84a1307d155,2025-06-19T13:15:31.147000 CVE-2024-26711,0,0,1cb1621e17ab6fc4256a8b2cd44f93b4025c21bdd8d93a6a4ecbfd4ca633f9c6,2025-02-27T22:02:24.350000 CVE-2024-26712,0,0,3eabb06e3f183090db18d9de2e74b41b5b40f04fc54674544de28e3b74739392,2025-04-08T15:30:20.373000 CVE-2024-26713,0,0,e7e300ec5bbfa68ba83e0a47cb90f58abff0db2ab2dd369821dd312aa798bced,2024-12-19T12:15:06.330000 @@ -255344,7 +255345,7 @@ CVE-2024-26770,0,0,8d08eaa70a2e2e3d40574f2b704a77374cb9e6669a6ba5b5bad3773130c49 CVE-2024-26771,0,0,5e3318a5219a1562a00396de2c61a0fa558f01729e9603c0306f834212e0432f,2025-01-27T14:59:26.887000 CVE-2024-26772,0,0,c15abffc72b52c1a80253e130b87503f54d4bae2e6cddf19576aab0699a1611a,2025-04-04T14:16:47.867000 CVE-2024-26773,0,0,1d4a42bde597efed855450dd0aa8a8e904f698a7797b2eeeaff9bc97aa6ee818,2025-03-18T16:47:14.460000 -CVE-2024-26774,0,1,b20f68ad798f47a3112a9583e723a0e9797df4899daeded36e85706ea3f97d2c,2025-06-19T13:15:31.303000 +CVE-2024-26774,0,0,b20f68ad798f47a3112a9583e723a0e9797df4899daeded36e85706ea3f97d2c,2025-06-19T13:15:31.303000 CVE-2024-26775,0,0,285e0acd81a3ae287fc503b023988af78322228ca5a120edc7cd1b3b8dae3d03,2025-01-07T17:29:01.727000 CVE-2024-26776,0,0,1bba81b8a8e72ec7c95ffb5d3e7b333d1413cd97a166084740a9af418cac677d,2025-02-27T14:37:18.470000 CVE-2024-26777,0,0,daa8d9f58a531907703c73a4675a28b328f6bf2537032c88b428620832a46d69,2025-02-27T14:36:46.680000 @@ -255366,7 +255367,7 @@ CVE-2024-26790,0,0,da7993ff6ba918c2f5e13339b4c718269282ee965a1c6bb70f04c36e1ddd8 CVE-2024-26791,0,0,c8ef10c6f04ed9c66fd762d6a0b3a45e0c79cbce1caed02d55dfa6a1faf6f0f6,2024-12-20T14:35:01.250000 CVE-2024-26792,0,0,785771b4bfd2e03416e2a07ada6b7ec1391a403eee900f868d4d1d8145ef2354,2024-12-20T16:15:54.653000 CVE-2024-26793,0,0,aa90abb3d1121ccaaf349ab01239e4c0a4a16759efda564be699ec746faed484,2024-12-20T15:56:00.320000 -CVE-2024-26794,0,1,a3da132eb916650492f3106d515b735dbe72602746c12f011cd20d711c76dfe9,2025-06-19T13:15:31.510000 +CVE-2024-26794,0,0,a3da132eb916650492f3106d515b735dbe72602746c12f011cd20d711c76dfe9,2025-06-19T13:15:31.510000 CVE-2024-26795,0,0,d43373becd1a2a0dc874625192219b12b2ce199f209c7afab1c87714eb89d672,2025-03-19T11:42:41.993000 CVE-2024-26796,0,0,740b63b874106b1735e661fa59a152bb86da8899659de0c6c2baad5e3560a4e5,2025-02-27T14:42:59.307000 CVE-2024-26797,0,0,7fcfec66278f984b39928c78bd306ae2d1a962abb25765fcb783613999da1ac4,2025-04-04T14:28:24.440000 @@ -255404,7 +255405,7 @@ CVE-2024-26825,0,0,5ce48738814319bfdc0872ba26b2b463e8d87f9b2edf67de8e88f9e8483cf CVE-2024-26826,0,0,ef7b75c128b5631f4acb91497bc6db3efb75b4e39a3d93ea904f63614f9960ae,2025-03-27T20:57:04.587000 CVE-2024-26827,0,0,4cc514efbe22ca04935a47f409b758351113d51b04fbbf02df44e27fcf8c06d7,2024-04-18T15:15:28.957000 CVE-2024-26828,0,0,84cc1261ddaa48629277944c8edcecccf8c15c1a0d5d26c02dc97eff20614da7,2025-04-08T19:16:26.800000 -CVE-2024-26829,0,1,b0fb093ec36f7b8fab0c07d9ff5d8c115163457af7ad63571f29a99c79782f86,2025-06-19T13:15:35.917000 +CVE-2024-26829,0,0,b0fb093ec36f7b8fab0c07d9ff5d8c115163457af7ad63571f29a99c79782f86,2025-06-19T13:15:35.917000 CVE-2024-2683,0,0,d31db9b74162f34437448255d1f05adaf71bd3df21d7a1817f74540be30fbc76,2025-02-19T18:17:48.753000 CVE-2024-26830,0,0,2e2d3d6269a8cd6a1cd47762591871dad624cc396e1ad5b9c684796d0e57ebe7,2025-04-02T13:19:07.453000 CVE-2024-26831,0,0,f65b722d125da32d24604f127879b9206512a4f102e576e5645c679ad672606e,2025-04-02T13:19:02.103000 @@ -256014,7 +256015,7 @@ CVE-2024-27407,0,0,dc07c9bf4f777f0e957ab25dab31a13cbbf2678e72e3a590e12482cccd0be CVE-2024-27408,0,0,98c8b30837a43afd080646bbf037ed81aeb11ea466e7a3ed6819c36cd81c8836,2024-11-21T09:04:33.527000 CVE-2024-27409,0,0,bc22652d032818f4fca14079fcd7842d612c3718de3699320e494dfa7ee8a5c1,2024-11-21T09:04:33.653000 CVE-2024-2741,0,0,30b99159ddaffefc3023664c691b9ef3588e2d3200502b3b66f4719c657f05c7,2024-11-21T09:10:24.803000 -CVE-2024-27410,0,1,e2b99fbfacc2e17073c8f281de201fc889439fe117d814d6701704ee8054a9fd,2025-06-19T13:15:36.097000 +CVE-2024-27410,0,0,e2b99fbfacc2e17073c8f281de201fc889439fe117d814d6701704ee8054a9fd,2025-06-19T13:15:36.097000 CVE-2024-27411,0,0,f33ed05b1af79c8798dce10b734b807cfd3c3c0280cda3312cace7d33a168919,2024-11-21T09:04:33.923000 CVE-2024-27412,0,0,a702c5879aeed78b48b36d8ae6b313b965796547c99b174c28ae0bc5c2f82542,2024-11-21T09:04:34.063000 CVE-2024-27413,0,0,bd327b327f16ab52d01828f6d316a044860ba7af430fc81075dcfbe2d6b40958,2024-11-21T09:04:34.300000 @@ -262266,7 +262267,7 @@ CVE-2024-35784,0,0,6a36ecbf216ecaf3512a6c5b2ee3703a250b459b4a7ecfacf4fe0e8fda312 CVE-2024-35785,0,0,77c21670bce798ec6fb6e30378d55b3c958574746063148d56c3b95ce96a48ea,2024-11-21T09:20:53.437000 CVE-2024-35786,0,0,77f89bb040cf765f6d9234d420731b7c23c63247ead02a0f8c0b8e4af33e99a9,2025-01-10T18:10:34.873000 CVE-2024-35787,0,0,4661ac4ee6981aead7188ecd1296951853916d0577763ef27ab740e5af313cc2,2024-11-21T09:20:53.720000 -CVE-2024-35788,0,1,f5404129956ea562d37064ccb92719605cd6913b7eeae8729cb7360c707b9b93,2025-06-19T13:15:36.360000 +CVE-2024-35788,0,0,f5404129956ea562d37064ccb92719605cd6913b7eeae8729cb7360c707b9b93,2025-06-19T13:15:36.360000 CVE-2024-35789,0,0,9b8c98c47e91f31c7211ff1dcdc3ce85d2adc838fbdea552f5a97604371b7ddd,2024-11-21T09:20:53.967000 CVE-2024-3579,0,0,7bb6876499ebd3266b422abae1569406fd610b0a85fc736905cfc9d045e4620e,2024-11-21T09:29:54.917000 CVE-2024-35790,0,0,914a42206bcf167074dd60111e4c8cecf43541d1e237ed2dfbd858b2449c7b9b,2025-06-04T13:15:24.587000 @@ -262417,7 +262418,7 @@ CVE-2024-35923,0,0,e200bbefa4260a7322c5705e6c101e370170f714b6cca2259ba31c94a243a CVE-2024-35924,0,0,51a8e81a5087f6b00f86aef3df30b13903521527bd7c24804424b3f4f88b017b,2024-11-21T09:21:12.833000 CVE-2024-35925,0,0,c69da8bf3be050c34947dfbb2cbe6b517f550618f4e390b45d64a13e545dc166,2024-12-31T18:51:18.303000 CVE-2024-35926,0,0,c1b13d208fac57fe78f6933a263aa2f330043107ad1ad5de4da551ecec504628,2024-11-21T09:21:13.097000 -CVE-2024-35927,0,1,6b5953bf852146d119c1b41379a677c7ee4ae45bdf6f0faad14652712d972b65,2025-06-19T13:15:40.283000 +CVE-2024-35927,0,0,6b5953bf852146d119c1b41379a677c7ee4ae45bdf6f0faad14652712d972b65,2025-06-19T13:15:40.283000 CVE-2024-35928,0,0,1c31dc8c665b8952880067e761bee324da2eee6fa320ed892680e88b3dd7b63e,2024-12-19T12:15:06.590000 CVE-2024-35929,0,0,7da540c66ffc823238b17395ecbf47d1012e0cd64e229ac26e5cc7bd9ae7f5a8,2024-12-30T19:56:30.927000 CVE-2024-3593,0,0,7dfe1a06ca99b709e0966f80e5fa7243762a8725a5825da6ebc20a944f2ce167,2024-11-21T09:29:56.757000 @@ -262522,7 +262523,7 @@ CVE-2024-36019,0,0,f02053cb973e1c96d485baf06035b62edccf042bea033f3776e823e91a178 CVE-2024-3602,0,0,d3cbf668ee81c993c6c1a222abdc99fc263e0a164b77fb771b4ebab250b2fbc2,2024-11-21T09:29:57.953000 CVE-2024-36020,0,0,25e42c8a88f0ddc6971355bfaa1fe3e1077dd58b980e3b76b47fcef300a19108,2024-11-21T09:21:27.090000 CVE-2024-36021,0,0,e329f3d46bec53961296646b95182fcee51db869a5da34a000bb9ec4b09a82e5,2024-11-21T09:21:27.280000 -CVE-2024-36022,0,0,40f30287ca8f6630a5bb77986ebb699becfdb9ff88e433c3855f4e9840bd131d,2024-11-21T09:21:27.403000 +CVE-2024-36022,0,1,51dac97c1f219f060ef0fddf94e1fe59968e0e0d8f6538dfb52154bc9e602f12,2025-06-19T14:15:45.160000 CVE-2024-36023,0,0,e5bd5a963b07073a291c96616b254515ad4a6774864c3c2874fadf0832668b50,2024-11-21T09:21:27.523000 CVE-2024-36024,0,0,e81683da475e946ecb026d2acbb1cb6964660d51a3ff9882d05006bff012115d,2024-11-21T09:21:27.663000 CVE-2024-36025,0,0,33c56aef941738177fa17f1493b08e4d2d3a3e4eea32429e0a62f0a601334f80,2024-11-21T09:21:27.783000 @@ -262772,7 +262773,7 @@ CVE-2024-36284,0,0,5dd896a891af07144a56a3845fc97f090935104348eba8ca7b12ce82fc1d0 CVE-2024-36285,0,0,0c7823d3ace3df8d9b320bdafb5965f47e49d2f414a435615a3b8f24fcb2140d,2025-02-12T22:15:34.737000 CVE-2024-36286,0,0,bac102403e45fda8132277c6a8c936743611fe7ec3db2c756aa2121a9f9c29ed,2025-01-07T17:08:25.580000 CVE-2024-36287,0,0,454ffb39c6631203600464ecb505365d9728982dd5fbfd6048bea7e40482bfdb,2024-11-21T09:21:59.527000 -CVE-2024-36288,0,1,a0ee5542c758804cbffdc4002529af43c77173dfd3e792ed953d25f7e566e12b,2025-06-19T13:15:40.433000 +CVE-2024-36288,0,0,a0ee5542c758804cbffdc4002529af43c77173dfd3e792ed953d25f7e566e12b,2025-06-19T13:15:40.433000 CVE-2024-36289,0,0,9a4e2e8c22c877a7229e5ef67cd4e3937f178f5664cb9107f76a5fa80df78b1a,2024-11-21T09:21:59.813000 CVE-2024-3629,0,0,95cbbd26104b7fd2dcbc50917364d61467d72e4899fadcb6f1fb0df19afa4d01,2025-05-15T14:16:37.597000 CVE-2024-36290,0,0,8298f0d1642987ec9c63c5254514e0267d57f00f7a058acac2c0e8b01a55797a,2025-01-14T16:15:29.473000 @@ -268736,7 +268737,7 @@ CVE-2024-43831,0,0,a9268ace7dacd553d87b45d213b555879d8348eca66f21b44f2f371c23948 CVE-2024-43832,0,0,15442ca051ab0155fadf84dac6604a0024bcf8cf7f43b8779d15dbd2c77cba17,2024-08-19T12:59:59.177000 CVE-2024-43833,0,0,5b7f17e91a1832d7c0ad5164e31831087a6aefdb4e7b61c82a3de3880edd76b6,2024-08-22T15:42:46.827000 CVE-2024-43834,0,0,d5ef14ae2ffbc2e7669580090c9ce16cedbf19f89cc0924be7d59abe1e2c67e4,2024-10-30T21:44:22.570000 -CVE-2024-43835,0,1,a3ab222d1a491144a0334a9ba805b7c1b4da5dc6c44257c2955c0e7c78fa171d,2025-06-19T13:15:41.177000 +CVE-2024-43835,0,0,a3ab222d1a491144a0334a9ba805b7c1b4da5dc6c44257c2955c0e7c78fa171d,2025-06-19T13:15:41.177000 CVE-2024-43836,0,0,f4c655bb2f56247f5d81fd742c3fcdd23416972e391d432e6e172ae5a57cc892,2024-08-22T15:43:26.303000 CVE-2024-43837,0,0,1226778b7252461769175d745fa085c5a9c87889904d99a3bba5d59789b343af,2024-08-22T15:44:03.417000 CVE-2024-43838,0,0,a5d4b7b522d8e67215b6ea2369694b147dcc49e3947e9b76857a7ed426025c6a,2024-10-29T16:24:43.273000 @@ -268747,7 +268748,7 @@ CVE-2024-43841,0,0,38746749d86e4f534fafdf8b478fa91ff1f5e1f65eb119200a1d6855c1feb CVE-2024-43842,0,0,15812ad8d85131679f82ea4663681c7db021618aa78b78cc9c9aed3923db1d1f,2024-09-30T13:55:17.007000 CVE-2024-43843,0,0,7e3bdccf9d6054cb61c364d96f8741fe73ef63f682003f6ac63ebd930248bda3,2024-10-29T16:29:16.960000 CVE-2024-43844,0,0,892289f8fc772f3f240038fccb3ec1dc83964292e0a1f838b372b21b4d76a86c,2024-10-25T19:49:05.987000 -CVE-2024-43845,0,1,941ae2382b20e0b42cbe2b8c7f4cf75ea6c953719811a855165bdbb72eafa916,2025-06-19T13:15:41.423000 +CVE-2024-43845,0,0,941ae2382b20e0b42cbe2b8c7f4cf75ea6c953719811a855165bdbb72eafa916,2025-06-19T13:15:41.423000 CVE-2024-43846,0,0,00546e8b7d32618825c1193130d999ce23114d449f5814665fe713817c3f3225,2024-10-25T19:52:01.380000 CVE-2024-43847,0,0,40ae3f5c22580f8696b31462f52ae00e272df092f77c73d18c35f4e6f355f13a,2024-10-25T19:55:53.963000 CVE-2024-43848,0,0,afa9f7a71028fa60eedc9a3a10bbe895ac3ef406bc4b18f0f8a8865a6f95d3fd,2024-10-25T13:57:51.800000 @@ -268820,7 +268821,7 @@ CVE-2024-43908,0,0,53a4829da8a8a1ad7fa0dc717c980975a2bb5c37e29b8800bdfbda1733423 CVE-2024-43909,0,0,ad74e5431cfb800574a2dd7e0ced34f90848e63e0bbff2558cec0eed3e55119c,2024-08-27T13:41:48.467000 CVE-2024-4391,0,0,4aa68eb768a7600ba1d511ef94f64977ab4a9f3debf9ac676e99a8182061a2de,2025-01-07T18:09:14.470000 CVE-2024-43910,0,0,f09792e52923a702137c77836c509e81bd123178796b2db869e8028c46dbd737,2024-09-05T18:30:23.437000 -CVE-2024-43911,0,1,4eb7a4e6677e826bd73aded02e92c831525c000672ce55845ac938b5cd7b66e1,2025-06-19T13:15:41.600000 +CVE-2024-43911,0,0,4eb7a4e6677e826bd73aded02e92c831525c000672ce55845ac938b5cd7b66e1,2025-06-19T13:15:41.600000 CVE-2024-43912,0,0,b045133d294e4fa9817b7cc6e1963575a481178f8d5aa121f3202846d1b4ef09,2024-09-05T18:19:17.067000 CVE-2024-43913,0,0,c1c655bf98a245b739b6bae86ffd25e2929e2c6be651f6c884a5a07e5e42c724,2024-12-09T13:10:03.003000 CVE-2024-43914,0,0,2295c4b85c720f6aa521d0d441f8fa3541ee5bbad0e5cc835a8e46f08f8be0dd,2024-09-05T18:03:49.997000 @@ -269448,7 +269449,7 @@ CVE-2024-44951,0,0,aa685e9643193f2a430154fe7087e89f1644d56a299d0e03a2a9efed4e0cd CVE-2024-44952,0,0,6075a53e4a12ab3edde68b2f32d76123b685c2ffd8a80a3e387b8f8a1b55017c,2024-11-09T10:15:04.710000 CVE-2024-44953,0,0,d6bdfb63db04ea95627162f46f471f3f784f46dc1c5f5c5598b91e3343ece3d2,2025-03-07T18:15:40.950000 CVE-2024-44954,0,0,ca1483f1bc80b6fc317dee185ca5bfaca3fb71a4e1bb2be04aaa089f77305fa8,2024-10-10T18:02:42.307000 -CVE-2024-44955,0,0,2bc6b0d941fdfccf3c93972ebd5efd5058cb7c721673095ebdd7739bcf15a6cb,2024-12-09T13:10:03.600000 +CVE-2024-44955,0,1,e4a2492d3ee52c185351f510b38f12ba865b64e3f4b497cfe9040977e631629e,2025-06-19T14:15:45.237000 CVE-2024-44956,0,0,86920dddd41f37c850fb3187de0d04345b34edcff9616626c578c463883b545f,2024-09-06T16:37:11.777000 CVE-2024-44957,0,0,1cf763e8c9a7c6633066ea97c4cd268591794ba04e060d517e94af511c95351c,2024-09-06T16:37:00.077000 CVE-2024-44958,0,0,10ffa07c682ea617924ba9d633879bcec7023ba11be7e36066d5dd8fd1f703a6,2024-10-10T17:56:24.467000 @@ -269525,7 +269526,7 @@ CVE-2024-45021,0,0,b5c8b3592be5699bf0881de00fd5b0362eb80914279b4a5a7d96fef6a9675 CVE-2024-45022,0,0,2cea89592199656ec921a3999b1ae285f1db04da7aaf687ce93a2d7242a86506,2024-09-13T16:36:39.043000 CVE-2024-45023,0,0,f8e0a62a83abee054b0294c32d7a5d15b03d0cc79f4e4a9ba7f0506ba34b6cb4,2024-09-13T16:30:30.427000 CVE-2024-45024,0,0,4feaf532db5af8cbee0e911fe09f5676ea54d7e53f7e82578a612b5e947edf46,2024-09-13T16:30:17.277000 -CVE-2024-45025,0,1,11a7bef58ec6b5de820b57899e3f37f7b83c47bf237cd7afdb64fcb34cb11053,2025-06-19T13:15:41.733000 +CVE-2024-45025,0,0,11a7bef58ec6b5de820b57899e3f37f7b83c47bf237cd7afdb64fcb34cb11053,2025-06-19T13:15:41.733000 CVE-2024-45026,0,0,89a8af0ac58952e722e5a53de5f494d1f681def0babb2de65d80753f6e55d193,2024-09-13T16:29:55.927000 CVE-2024-45027,0,0,906b9ad56781558d74178ff20f312e7339b089bddb5d18b11ef9c6d75d05a75a,2025-05-09T08:15:18.677000 CVE-2024-45028,0,0,af25595a666e3b491983ae69084787c84baeb2d3f88bb766b24cec6d0cfb83a7,2024-09-13T16:29:35.877000 @@ -270653,7 +270654,7 @@ CVE-2024-46697,0,0,9943cf76deb7cd05c4635bc9d12865f4ae0e9cc1d23e6f8d61c4587524e0e CVE-2024-46698,0,0,be3a5928ad47004b2d560db3d5df5b16cf4a67d11c1a9ecc79fc9d1af2a3eb53,2024-09-13T16:53:03 CVE-2024-46699,0,0,b9f4243f64b3f749473025d5fece9ff74365febeb983013139a1c61713f6b89a,2024-09-13T16:53:10.620000 CVE-2024-4670,0,0,20450840160cca1402ceff3ad240b158e7c98a105624c4f901b79d8d80b04786,2024-11-21T09:43:20.563000 -CVE-2024-46700,0,1,5cd93665de0e92a00c1210698436ce01c25104437e47fddb0ff4efc3fce44c0b,2025-06-19T13:15:42.090000 +CVE-2024-46700,0,0,5cd93665de0e92a00c1210698436ce01c25104437e47fddb0ff4efc3fce44c0b,2025-06-19T13:15:42.090000 CVE-2024-46701,0,0,e529b0621330ae5ac1d4b33df08f71883ab0b3900295daf37d0dfe30c681ef31,2024-09-19T13:40:27.817000 CVE-2024-46702,0,0,f5b7fc9bcaeb54226afdebb2f9f120b5650bb150fd7460409201dbd777ad9b41,2024-09-19T13:35:58.637000 CVE-2024-46703,0,0,d926face52ba1a18b356030e2a43e186ee85e58145f49e8ade11cb932899dc19,2024-09-19T13:33:57.563000 @@ -270820,7 +270821,7 @@ CVE-2024-46849,0,0,55f5b24a78843dcc8538314aaf7fc9612b26c57281c0bbf2f4b0fed08fece CVE-2024-4685,0,0,dcc1995af2e9fd1e34a2f9668e5bc3a683e3cfc7906d3660a8b9bcf75f88030b,2025-02-19T18:38:59.740000 CVE-2024-46850,0,0,41be926e86dd8c952ae96807dd33a02f26b5880c97e6286fb0ffb5c599a187f6,2024-10-04T15:30:32.110000 CVE-2024-46851,0,0,b0993c3439c6fdf7de7e13034429b55167ffbe1f88b2ed8118656fa5260e8c01,2024-10-04T16:00:43.913000 -CVE-2024-46852,0,1,1e4dd009dbc248ae2fc9217a7cec4442d7b40b3f6c50166be19bd07dd05305a9,2025-06-19T13:15:46.410000 +CVE-2024-46852,0,0,1e4dd009dbc248ae2fc9217a7cec4442d7b40b3f6c50166be19bd07dd05305a9,2025-06-19T13:15:46.410000 CVE-2024-46853,0,0,7013163bb0b0de8fcc4deccdec036fc108843e6740181da643a0cc828a7da7b8,2024-11-08T16:15:23.727000 CVE-2024-46854,0,0,d2b8ace374763a38df18b61a469d196e1746b4597f0027e5c9c667cf2f8fd171,2024-11-08T16:15:23.857000 CVE-2024-46855,0,0,46b0faa9ce85540614181cf4962008995b9781bd009434c91e4d733a9654cd2a,2024-10-17T14:15:12.790000 @@ -277898,7 +277899,7 @@ CVE-2024-56690,0,0,2a72c8e6571a5a1d0298311d84636f71e3ae4d29693e80187270d779ac92c CVE-2024-56691,0,0,62c59d5d1a3d371802a9cee1fb0752a9e914735965be638d034aafb90a06960b,2024-12-28T10:15:14.027000 CVE-2024-56692,0,0,ace0c927c4a341e1aaf5f28ce5750c7447fae74ffcb794dd6309f417fa7701eb,2025-01-16T16:20:06.443000 CVE-2024-56693,0,0,7478b55a09e156ef8c901ca8f31c798307144b33b79f35a2ee3a5c9550234da1,2025-03-24T17:31:47.693000 -CVE-2024-56694,0,1,764a1446a74f39b10c094959361057a2a30bd4f79d97f5a2db26ea7e59ebbb24,2025-06-19T13:15:46.560000 +CVE-2024-56694,0,0,764a1446a74f39b10c094959361057a2a30bd4f79d97f5a2db26ea7e59ebbb24,2025-06-19T13:15:46.560000 CVE-2024-56695,0,0,8a4eb8360428ebf490447f80ec720c69eb5c05aa8c8254981044c72c87974385,2025-03-05T18:53:08.307000 CVE-2024-56696,0,0,e7ff58f277f582521235fb4a39dccc778e70841711b02192c9e97fdaa9f8f3ce,2025-01-08T16:45:40.197000 CVE-2024-56697,0,0,415312cd2de09e121d8f6863f3f85137f2ef58c344d43a9b863b32cfd98dbc09,2025-01-08T16:45:54.327000 @@ -277997,7 +277998,7 @@ CVE-2024-56782,0,0,8ea8c1c6076121ccd6387cd73e62b29831bb97f162a193d72c4089bf509d6 CVE-2024-56783,0,0,ce83b6478d153aecb85bd2ed51b7393f53075c8b501633f17784c3734829a62e,2025-01-09T21:24:41.370000 CVE-2024-56784,0,0,246e46b18d01297182b84d0eeedb7f89be5b067468d07e5fbcd2a4701c7c5b7f,2025-01-09T21:25:55.693000 CVE-2024-56785,0,0,8f5cb98439d0416d3248c986cf648022357f0a09f9da0115702bc78871254399,2025-01-09T21:27:27.500000 -CVE-2024-56786,0,1,c21d19ad26e7ba1031a72a0771e370f32d3d1c09901f144809bfb60669526b81,2025-06-19T13:15:46.830000 +CVE-2024-56786,0,0,c21d19ad26e7ba1031a72a0771e370f32d3d1c09901f144809bfb60669526b81,2025-06-19T13:15:46.830000 CVE-2024-56787,0,0,77f49900ebe1e38ab8e44c5b5372eb9d15671b545bb90d2215966dec4b8fe2e1,2025-01-09T21:28:12.873000 CVE-2024-56788,0,0,51dd43caa6c390f7c49e9d88b01231376fef9ee874b8f580ebd095d6eb630ba3,2025-01-11T13:15:29.090000 CVE-2024-5679,0,0,dc654eef86d673e662acc6dfc1ecb27b2f541880d76227d1d93861f825adc641,2024-11-21T09:48:08.710000 @@ -278575,7 +278576,7 @@ CVE-2024-57917,0,0,b1167e5c425222d1e86557f7fbfade37e2c05b542cac17d0614dacc0faf5f CVE-2024-57918,0,0,51a0ae7790d69294b939f21a09ba710f5e4fba529bc7fb169229a8b80c38f093,2025-01-19T12:15:25.960000 CVE-2024-57919,0,0,e1738bf3dfca2fdef7365aa48f1ce4c0aa5de667cd9d2a7db2f45a4ee2b8b3c7,2025-02-18T13:38:22.377000 CVE-2024-5792,0,0,50e11f463088247110774be144fbfaca02cb5ac823192aaf13a748fe05bdb47b,2024-11-21T09:48:20.570000 -CVE-2024-57920,0,1,e886d01100cb89cc10688a55d9ec23c065bd36f5b0221320d880948827c50067,2025-06-19T13:15:50.980000 +CVE-2024-57920,0,0,e886d01100cb89cc10688a55d9ec23c065bd36f5b0221320d880948827c50067,2025-06-19T13:15:50.980000 CVE-2024-57921,0,0,c7302d486dbfb4c3bec63ccb147bf84370f9dbf24a7b88cf2b3ffd88950eddd1,2025-01-19T12:15:26.247000 CVE-2024-57922,0,0,bf2dd1432a9e3e667536a17647221b1e6b2f7d234607dcec972738ef61d4c750,2025-02-27T21:59:28.277000 CVE-2024-57923,0,0,8d53fe837f5375f53275d78002c8e62a8004542cf9a9d70aff773f09fd6c7f44,2025-01-19T12:15:26.433000 @@ -278728,7 +278729,7 @@ CVE-2024-58073,0,0,eb683fa11db3d5ae68d3f6675819692177d4c529e62bda8352837736a5636 CVE-2024-58074,0,0,c2882c9b1642af94a6966e94b4db4f1dbe7d1e9afcf383c98c1b880460b03666,2025-03-06T16:15:53.943000 CVE-2024-58075,0,0,02ccfba812ec5be3736e2c44edd77c2858713f9c995acf80239dbfbabb0b0926,2025-03-06T16:15:54.040000 CVE-2024-58076,0,0,cf8e0406b76ea78c0bb3d3987fee0579e4d2ec1271af278be4a1756c465a16d3,2025-03-25T14:26:52.030000 -CVE-2024-58077,0,1,634b774378af6bfd507980cd75c7187075e4d23fb39461364c64277eca54e758,2025-06-19T13:15:51.193000 +CVE-2024-58077,0,0,634b774378af6bfd507980cd75c7187075e4d23fb39461364c64277eca54e758,2025-06-19T13:15:51.193000 CVE-2024-58078,0,0,e508ee0d2ac67ad04e2896e307afebb7f13e51e73a51a69c9294be9999e510ad,2025-03-06T17:15:21.250000 CVE-2024-58079,0,0,7fd5cc7589f5af5f8bbeac5e0840eb8db1d8a12c0b4e2caca3cc52286bddc2f2,2025-03-13T13:15:46.133000 CVE-2024-5808,0,0,1d3ef99a05770383f75119606dd44066da1dce0bb204c0f99ad9e2a7f5bac72e,2025-05-28T00:49:06.347000 @@ -294291,7 +294292,7 @@ CVE-2025-38027,0,0,471ef0d7ca5d24c18ccb08a9eddf5cbddd30470e775a52cb01bc90f38e1ce CVE-2025-38028,0,0,0a7639190a1937774dbcb851869664e12bc334f75a4870acae02cc8069cfea0a,2025-06-18T13:46:52.973000 CVE-2025-38029,0,0,92d383e3593af7bcce9265075a2e2f877017899966aa410dfe02a30304d4b909,2025-06-18T13:46:52.973000 CVE-2025-3803,0,0,01cac43cb81122f40562a95ea00e02849827ad730598145fa3ede5a68597810d,2025-04-21T14:23:45.950000 -CVE-2025-38030,0,1,da7acce03f957af6d724acad28c4a34123763b145ebfe015d98d4b36466d234c,2025-06-19T13:15:51.760000 +CVE-2025-38030,0,0,da7acce03f957af6d724acad28c4a34123763b145ebfe015d98d4b36466d234c,2025-06-19T13:15:51.760000 CVE-2025-38031,0,0,486b5cbb4cd98022b686c86aee16cd270c1eb4dd11847090fa684f4f14929793,2025-06-18T13:46:52.973000 CVE-2025-38032,0,0,e6efe23d93f2ffe49e4bc29b5d8bd527975896df0c10a6b76bd704bff3a8d41f,2025-06-18T13:46:52.973000 CVE-2025-38033,0,0,22e8c97a0b2b90d6c86a7604c284682b993460d61d5c6c03c971671c669696d0,2025-06-18T13:46:52.973000 @@ -296586,7 +296587,7 @@ CVE-2025-4734,0,0,99bf1e4024c1482ea99fe0fd5315f4fee30ed05717e4831cdd0b865abb118a CVE-2025-4735,0,0,f96e4d2d2fb70e0f1c88cd9e2e0e0d4de95ba2f9e43dcc187f8debac18edd909,2025-05-28T14:26:46.997000 CVE-2025-4736,0,0,1dca037a7f0cbc80e91cfd83149841017fcad28a58750ed26439191bb836bb26,2025-05-27T19:50:59.997000 CVE-2025-4737,0,0,f9f82f092173f94badf92602e6f8f404f3e0568cce6afc358521e7171b0637d3,2025-05-16T14:43:26.160000 -CVE-2025-4738,1,1,70bd8280163617c773ed1ba89ddd6b9864d828db42f4acaa431997cd5a5b43d1,2025-06-19T13:15:51.840000 +CVE-2025-4738,0,0,70bd8280163617c773ed1ba89ddd6b9864d828db42f4acaa431997cd5a5b43d1,2025-06-19T13:15:51.840000 CVE-2025-4739,0,0,cc2e318d2f840424b36b046688f8220e8357f337cbe30ff9f4e8c26b1723a285,2025-05-28T14:26:55.127000 CVE-2025-4740,0,0,6c6357004a26b75a6edf5c8b51b4eebaf151da15d33a0ac49a5219d302fb606d,2025-05-16T14:42:18.700000 CVE-2025-4741,0,0,ef8421e0cde45e475879357ff0c51cc359c029c130dc5d6beb431eec100b6596,2025-05-28T14:27:04.720000 @@ -297391,6 +297392,7 @@ CVE-2025-48881,0,0,478c71cbb268c7668af9adbe8d9db873a15a6f0100cbc1765ad6b2fc8ccbe CVE-2025-48882,0,0,0675a44f5475635d3b90df25f21b843f71a594f25b60ebf1257710a520ba2459,2025-06-02T17:32:17.397000 CVE-2025-48883,0,0,14507842d3e0b613f4c9b8d62ad8df05d93e1c97510cf43e163a8411a419850f,2025-06-02T17:32:17.397000 CVE-2025-48885,0,0,a22cad12e847f8e3d6cac2d0c207ccbc3235380976544a38095804a3e40d9d2f,2025-06-02T17:32:17.397000 +CVE-2025-48886,1,1,804fb54f649dfaed4a17820c45e257f12c5f661ecd7371b6b111563aa366ad58,2025-06-19T15:15:20.473000 CVE-2025-48887,0,0,d715c137954000dfa4d0fdb3ecdb8e16b928f4dac02dc271a6a5d4052e6a12f9,2025-06-19T00:55:27.710000 CVE-2025-48888,0,0,e337e94b85d7a08366e0c5a3cc16b222a86bb1703b8b9d4a80140797b44ccf65,2025-06-05T20:12:23.777000 CVE-2025-48889,0,0,10193c433a4bb6349663dd15365e40e7749e3028945374c079cc00a7a9212044,2025-05-30T16:31:03.107000 @@ -297478,6 +297480,7 @@ CVE-2025-4901,0,0,e27cda4f5daf0c789b44760e4e5b993aff83932164a6246a45c2b68bff562e CVE-2025-49011,0,0,3665e61b0cd57a602b77e200d37022bd1c16f58fa0f0e634b56cbf0760aaef11,2025-06-09T12:15:47.880000 CVE-2025-49012,0,0,2faa3b03d38706521ba412ef015f2b3ddc23776e15e89fc334c8483419ee59d3,2025-06-06T14:07:28.330000 CVE-2025-49013,0,0,53845c94e81c77646a01f8c00c78ad71027f55ce3164819fe14a34a7c91aff28,2025-06-12T16:06:47.857000 +CVE-2025-49014,1,1,856d9c372196e9d3a725054d166df8953c318647d8bc5aee2ea2794c95fb1a3a,2025-06-19T15:15:20.650000 CVE-2025-49015,0,0,7a51f7c5ae45f0bd54ecb4209bb2e64263c11f32f2190e16ff2a6f3efe9375e5,2025-06-18T15:15:27.550000 CVE-2025-4902,0,0,6a78a99defe072cc999de50623b42fd325c4fdcaf44bc58ff1a0ab5edd3f00ae,2025-05-21T13:37:47.987000 CVE-2025-4903,0,0,69886136439184589d2514a03e48b62487582f2c9800b08c9aef0c9095fac7f7,2025-05-27T16:29:52.787000 @@ -298588,7 +298591,7 @@ CVE-2025-6007,0,0,ad7217a46edf88f3122f03c09e2fdcfd31382468cbe1002c4a5de402899399 CVE-2025-6008,0,0,cf45d1b8877307f98a5e962959db4dd8b70df84c99522375a10c3d04cde0826f,2025-06-19T01:26:01.867000 CVE-2025-6009,0,0,78abb2d4f36e6029b865859c44e8b3b2ae426316eb8bf2e15ca3e33565c4ca16,2025-06-19T01:25:17.743000 CVE-2025-6012,0,0,26f2f66d87f45d6aa756cc004552cfa11ed42d44708395d664a6658fe8d21b45,2025-06-16T12:32:18.840000 -CVE-2025-6019,1,1,04254b9397dd11cd6c3c371a0a809a11e95d3435e7861389ea1ee8b10ff74261,2025-06-19T12:15:19.727000 +CVE-2025-6019,0,0,04254b9397dd11cd6c3c371a0a809a11e95d3435e7861389ea1ee8b10ff74261,2025-06-19T12:15:19.727000 CVE-2025-6020,0,0,439a2d09f05868a64a6818f204c8af8c3741a1aa91da69dac7da1c6864b5ef72,2025-06-17T20:50:23.507000 CVE-2025-6021,0,0,4d6c316d6b2265feaa5a1f1976caab5acbb233a1583e3791720a0a82dcf439c4,2025-06-12T16:06:20.180000 CVE-2025-6029,0,0,e9108be7e98d0780991a9dbc9771d79381463de686ea76ad25b1212ca465841e,2025-06-16T12:32:18.840000 @@ -298702,4 +298705,6 @@ CVE-2025-6199,0,0,8b74f0ab0d170aa7cc558f1e79481a7093394c0368bbc35b907707db4c26f5 CVE-2025-6201,0,0,fae5d9a8c9dcb541916adb0b451bda886e1fe3141eb6c37705d42f0b95790d08,2025-06-19T03:15:26.017000 CVE-2025-6220,0,0,5f7d83b19f9a74deb42015750f7b5335a45a31dba8653fadb3cf8eaf78a671be,2025-06-18T13:47:40.833000 CVE-2025-6240,0,0,afdbdd4423b9b6d85b5822d8414b4fba12d402c8710eb5b02e519fcba3d4ca1c,2025-06-18T15:15:28.187000 -CVE-2025-6266,1,1,f88678c0ca6c6b4793348c364f2d4b51fa863b9a2b4f605e9b4cf59a8ae65084,2025-06-19T12:15:20.537000 +CVE-2025-6266,0,0,f88678c0ca6c6b4793348c364f2d4b51fa863b9a2b4f605e9b4cf59a8ae65084,2025-06-19T12:15:20.537000 +CVE-2025-6267,1,1,abd4330b3858f9e21bdcec6fd248eb70ba09cf96ae2d8c82b03451247b5b4eab,2025-06-19T14:15:55.323000 +CVE-2025-6268,1,1,6fa9140584959e948202f092432ac46aad7bd9559cbc482008db9c6d49de4338,2025-06-19T15:15:20.810000