From 5841da8d892107be14a3d9272746180ee5e6b0ef Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 17 Jun 2025 16:04:01 +0000 Subject: [PATCH] Auto-Update: 2025-06-17T16:00:20.396590+00:00 --- CVE-2020/CVE-2020-138xx/CVE-2020-13878.json | 32 +- CVE-2020/CVE-2020-266xx/CVE-2020-26624.json | 32 +- CVE-2021/CVE-2021-251xx/CVE-2021-25117.json | 22 +- CVE-2022/CVE-2022-470xx/CVE-2022-47072.json | 32 +- CVE-2023/CVE-2023-252xx/CVE-2023-25295.json | 32 +- CVE-2023/CVE-2023-253xx/CVE-2023-25365.json | 36 +- CVE-2023/CVE-2023-270xx/CVE-2023-27001.json | 22 +- CVE-2023/CVE-2023-328xx/CVE-2023-32877.json | 32 +- CVE-2023/CVE-2023-335xx/CVE-2023-33538.json | 33 +- CVE-2023/CVE-2023-362xx/CVE-2023-36236.json | 32 +- CVE-2023/CVE-2023-402xx/CVE-2023-40284.json | 107 ++++- CVE-2023/CVE-2023-402xx/CVE-2023-40285.json | 107 ++++- CVE-2023/CVE-2023-410xx/CVE-2023-41099.json | 33 +- CVE-2023/CVE-2023-440xx/CVE-2023-44077.json | 32 +- CVE-2023/CVE-2023-463xx/CVE-2023-46343.json | 32 +- CVE-2023/CVE-2023-469xx/CVE-2023-46953.json | 32 +- CVE-2023/CVE-2023-48xx/CVE-2023-4818.json | 22 +- CVE-2023/CVE-2023-50xx/CVE-2023-5041.json | 22 +- CVE-2023/CVE-2023-512xx/CVE-2023-51282.json | 32 +- CVE-2023/CVE-2023-517xx/CVE-2023-51790.json | 32 +- CVE-2023/CVE-2023-519xx/CVE-2023-51906.json | 22 +- CVE-2023/CVE-2023-520xx/CVE-2023-52032.json | 22 +- CVE-2023/CVE-2023-520xx/CVE-2023-52041.json | 22 +- CVE-2023/CVE-2023-61xx/CVE-2023-6161.json | 22 +- CVE-2023/CVE-2023-64xx/CVE-2023-6447.json | 22 +- CVE-2023/CVE-2023-70xx/CVE-2023-7074.json | 22 +- CVE-2024/CVE-2024-12xx/CVE-2024-1283.json | 32 +- CVE-2024/CVE-2024-200xx/CVE-2024-20002.json | 32 +- CVE-2024/CVE-2024-225xx/CVE-2024-22567.json | 32 +- CVE-2024/CVE-2024-229xx/CVE-2024-22912.json | 32 +- CVE-2024/CVE-2024-230xx/CVE-2024-23055.json | 22 +- CVE-2024/CVE-2024-236xx/CVE-2024-23686.json | 22 +- CVE-2024/CVE-2024-241xx/CVE-2024-24115.json | 32 +- CVE-2024/CVE-2024-284xx/CVE-2024-28441.json | 34 +- CVE-2024/CVE-2024-285xx/CVE-2024-28521.json | 45 +- CVE-2024/CVE-2024-286xx/CVE-2024-28635.json | 8 +- CVE-2024/CVE-2024-292xx/CVE-2024-29273.json | 35 +- CVE-2024/CVE-2024-293xx/CVE-2024-29366.json | 56 ++- CVE-2024/CVE-2024-293xx/CVE-2024-29385.json | 56 ++- CVE-2024/CVE-2024-316xx/CVE-2024-31673.json | 35 +- CVE-2024/CVE-2024-337xx/CVE-2024-33791.json | 45 +- CVE-2024/CVE-2024-337xx/CVE-2024-33792.json | 55 ++- CVE-2024/CVE-2024-337xx/CVE-2024-33793.json | 45 +- CVE-2024/CVE-2024-344xx/CVE-2024-34402.json | 131 ++++- CVE-2024/CVE-2024-344xx/CVE-2024-34403.json | 133 +++++- CVE-2024/CVE-2024-344xx/CVE-2024-34467.json | 35 +- CVE-2024/CVE-2024-344xx/CVE-2024-34468.json | 36 +- CVE-2024/CVE-2024-344xx/CVE-2024-34469.json | 36 +- CVE-2024/CVE-2024-345xx/CVE-2024-34502.json | 87 +++- CVE-2024/CVE-2024-401xx/CVE-2024-40120.json | 32 +- CVE-2024/CVE-2024-440xx/CVE-2024-44068.json | 178 ++++++- CVE-2024/CVE-2024-451xx/CVE-2024-45184.json | 502 +++++++++++++++++++- CVE-2024/CVE-2024-462xx/CVE-2024-46292.json | 36 +- CVE-2024/CVE-2024-465xx/CVE-2024-46540.json | 38 +- CVE-2024/CVE-2024-479xx/CVE-2024-47913.json | 49 +- CVE-2024/CVE-2024-481xx/CVE-2024-48112.json | 34 +- CVE-2024/CVE-2024-487xx/CVE-2024-48700.json | 27 +- CVE-2024/CVE-2024-581xx/CVE-2024-58134.json | 56 ++- CVE-2024/CVE-2024-581xx/CVE-2024-58135.json | 61 ++- CVE-2025/CVE-2025-03xx/CVE-2025-0320.json | 78 +++ CVE-2025/CVE-2025-215xx/CVE-2025-21572.json | 27 +- CVE-2025/CVE-2025-247xx/CVE-2025-24761.json | 56 +++ CVE-2025/CVE-2025-247xx/CVE-2025-24773.json | 56 +++ CVE-2025/CVE-2025-255xx/CVE-2025-25504.json | 76 ++- CVE-2025/CVE-2025-280xx/CVE-2025-28062.json | 36 +- CVE-2025/CVE-2025-281xx/CVE-2025-28168.json | 31 +- CVE-2025/CVE-2025-289xx/CVE-2025-28972.json | 56 +++ CVE-2025/CVE-2025-289xx/CVE-2025-28991.json | 56 +++ CVE-2025/CVE-2025-290xx/CVE-2025-29002.json | 56 +++ CVE-2025/CVE-2025-305xx/CVE-2025-30562.json | 56 +++ CVE-2025/CVE-2025-306xx/CVE-2025-30618.json | 56 +++ CVE-2025/CVE-2025-309xx/CVE-2025-30988.json | 56 +++ CVE-2025/CVE-2025-319xx/CVE-2025-31919.json | 56 +++ CVE-2025/CVE-2025-325xx/CVE-2025-32510.json | 56 +++ CVE-2025/CVE-2025-325xx/CVE-2025-32549.json | 56 +++ CVE-2025/CVE-2025-345xx/CVE-2025-34508.json | 100 ++++ CVE-2025/CVE-2025-35xx/CVE-2025-3517.json | 27 +- CVE-2025/CVE-2025-394xx/CVE-2025-39479.json | 56 +++ CVE-2025/CVE-2025-394xx/CVE-2025-39486.json | 56 +++ CVE-2025/CVE-2025-395xx/CVE-2025-39508.json | 56 +++ CVE-2025/CVE-2025-39xx/CVE-2025-3927.json | 43 +- CVE-2025/CVE-2025-41xx/CVE-2025-4178.json | 83 +++- CVE-2025/CVE-2025-42xx/CVE-2025-4215.json | 187 +++++++- CVE-2025/CVE-2025-42xx/CVE-2025-4218.json | 87 +++- CVE-2025/CVE-2025-432xx/CVE-2025-43200.json | 188 +++++++- CVE-2025/CVE-2025-439xx/CVE-2025-43915.json | 67 ++- CVE-2025/CVE-2025-43xx/CVE-2025-4316.json | 34 +- CVE-2025/CVE-2025-44xx/CVE-2025-4404.json | 104 ++++ CVE-2025/CVE-2025-452xx/CVE-2025-45242.json | 36 +- CVE-2025/CVE-2025-465xx/CVE-2025-46567.json | 59 ++- CVE-2025/CVE-2025-465xx/CVE-2025-46568.json | 54 ++- CVE-2025/CVE-2025-467xx/CVE-2025-46724.json | 39 +- CVE-2025/CVE-2025-474xx/CVE-2025-47452.json | 56 +++ CVE-2025/CVE-2025-475xx/CVE-2025-47559.json | 56 +++ CVE-2025/CVE-2025-475xx/CVE-2025-47572.json | 56 +++ CVE-2025/CVE-2025-475xx/CVE-2025-47573.json | 56 +++ CVE-2025/CVE-2025-47xx/CVE-2025-4754.json | 82 ++++ CVE-2025/CVE-2025-481xx/CVE-2025-48111.json | 56 +++ CVE-2025/CVE-2025-481xx/CVE-2025-48118.json | 56 +++ CVE-2025/CVE-2025-481xx/CVE-2025-48145.json | 56 +++ CVE-2025/CVE-2025-482xx/CVE-2025-48272.json | 27 +- CVE-2025/CVE-2025-482xx/CVE-2025-48274.json | 56 +++ CVE-2025/CVE-2025-483xx/CVE-2025-48333.json | 56 +++ CVE-2025/CVE-2025-489xx/CVE-2025-48976.json | 43 +- CVE-2025/CVE-2025-48xx/CVE-2025-4802.json | 44 +- CVE-2025/CVE-2025-48xx/CVE-2025-4879.json | 78 +++ CVE-2025/CVE-2025-490xx/CVE-2025-49071.json | 56 +++ CVE-2025/CVE-2025-491xx/CVE-2025-49124.json | 31 +- CVE-2025/CVE-2025-491xx/CVE-2025-49125.json | 31 +- CVE-2025/CVE-2025-491xx/CVE-2025-49175.json | 60 +++ CVE-2025/CVE-2025-491xx/CVE-2025-49176.json | 60 +++ CVE-2025/CVE-2025-491xx/CVE-2025-49177.json | 60 +++ CVE-2025/CVE-2025-491xx/CVE-2025-49178.json | 60 +++ CVE-2025/CVE-2025-491xx/CVE-2025-49179.json | 60 +++ CVE-2025/CVE-2025-491xx/CVE-2025-49180.json | 60 +++ CVE-2025/CVE-2025-492xx/CVE-2025-49234.json | 56 +++ CVE-2025/CVE-2025-492xx/CVE-2025-49251.json | 56 +++ CVE-2025/CVE-2025-492xx/CVE-2025-49252.json | 56 +++ CVE-2025/CVE-2025-492xx/CVE-2025-49253.json | 56 +++ CVE-2025/CVE-2025-492xx/CVE-2025-49254.json | 56 +++ CVE-2025/CVE-2025-492xx/CVE-2025-49255.json | 56 +++ CVE-2025/CVE-2025-492xx/CVE-2025-49256.json | 56 +++ CVE-2025/CVE-2025-492xx/CVE-2025-49257.json | 56 +++ CVE-2025/CVE-2025-492xx/CVE-2025-49258.json | 56 +++ CVE-2025/CVE-2025-492xx/CVE-2025-49259.json | 56 +++ CVE-2025/CVE-2025-492xx/CVE-2025-49260.json | 56 +++ CVE-2025/CVE-2025-492xx/CVE-2025-49261.json | 56 +++ CVE-2025/CVE-2025-492xx/CVE-2025-49266.json | 56 +++ CVE-2025/CVE-2025-493xx/CVE-2025-49312.json | 56 +++ CVE-2025/CVE-2025-493xx/CVE-2025-49316.json | 56 +++ CVE-2025/CVE-2025-493xx/CVE-2025-49330.json | 56 +++ CVE-2025/CVE-2025-493xx/CVE-2025-49331.json | 56 +++ CVE-2025/CVE-2025-494xx/CVE-2025-49415.json | 56 +++ CVE-2025/CVE-2025-494xx/CVE-2025-49444.json | 56 +++ CVE-2025/CVE-2025-494xx/CVE-2025-49447.json | 56 +++ CVE-2025/CVE-2025-494xx/CVE-2025-49451.json | 56 +++ CVE-2025/CVE-2025-494xx/CVE-2025-49452.json | 56 +++ CVE-2025/CVE-2025-495xx/CVE-2025-49508.json | 56 +++ CVE-2025/CVE-2025-498xx/CVE-2025-49842.json | 82 ++++ CVE-2025/CVE-2025-498xx/CVE-2025-49854.json | 56 +++ CVE-2025/CVE-2025-498xx/CVE-2025-49855.json | 56 +++ CVE-2025/CVE-2025-498xx/CVE-2025-49856.json | 56 +++ CVE-2025/CVE-2025-498xx/CVE-2025-49857.json | 56 +++ CVE-2025/CVE-2025-498xx/CVE-2025-49858.json | 56 +++ CVE-2025/CVE-2025-498xx/CVE-2025-49859.json | 56 +++ CVE-2025/CVE-2025-498xx/CVE-2025-49861.json | 56 +++ CVE-2025/CVE-2025-498xx/CVE-2025-49862.json | 56 +++ CVE-2025/CVE-2025-498xx/CVE-2025-49863.json | 56 +++ CVE-2025/CVE-2025-498xx/CVE-2025-49864.json | 56 +++ CVE-2025/CVE-2025-498xx/CVE-2025-49865.json | 56 +++ CVE-2025/CVE-2025-498xx/CVE-2025-49868.json | 56 +++ CVE-2025/CVE-2025-498xx/CVE-2025-49871.json | 56 +++ CVE-2025/CVE-2025-498xx/CVE-2025-49872.json | 56 +++ CVE-2025/CVE-2025-498xx/CVE-2025-49874.json | 56 +++ CVE-2025/CVE-2025-498xx/CVE-2025-49875.json | 56 +++ CVE-2025/CVE-2025-498xx/CVE-2025-49877.json | 56 +++ CVE-2025/CVE-2025-498xx/CVE-2025-49878.json | 56 +++ CVE-2025/CVE-2025-498xx/CVE-2025-49879.json | 56 +++ CVE-2025/CVE-2025-498xx/CVE-2025-49880.json | 56 +++ CVE-2025/CVE-2025-498xx/CVE-2025-49881.json | 56 +++ CVE-2025/CVE-2025-498xx/CVE-2025-49882.json | 56 +++ CVE-2025/CVE-2025-49xx/CVE-2025-4932.json | 68 ++- CVE-2025/CVE-2025-49xx/CVE-2025-4949.json | 92 +++- CVE-2025/CVE-2025-50xx/CVE-2025-5001.json | 90 +++- CVE-2025/CVE-2025-50xx/CVE-2025-5010.json | 79 ++- CVE-2025/CVE-2025-50xx/CVE-2025-5011.json | 79 ++- CVE-2025/CVE-2025-50xx/CVE-2025-5013.json | 75 ++- CVE-2025/CVE-2025-52xx/CVE-2025-5209.json | 31 +- CVE-2025/CVE-2025-56xx/CVE-2025-5689.json | 16 +- CVE-2025/CVE-2025-60xx/CVE-2025-6069.json | 76 +++ CVE-2025/CVE-2025-61xx/CVE-2025-6151.json | 14 +- CVE-2025/CVE-2025-61xx/CVE-2025-6152.json | 14 +- CVE-2025/CVE-2025-61xx/CVE-2025-6167.json | 14 +- CVE-2025/CVE-2025-61xx/CVE-2025-6179.json | 43 +- CVE-2025/CVE-2025-61xx/CVE-2025-6196.json | 64 +++ CVE-2025/CVE-2025-61xx/CVE-2025-6199.json | 60 +++ README.md | 92 ++-- _state.csv | 346 +++++++++----- 178 files changed, 9696 insertions(+), 532 deletions(-) create mode 100644 CVE-2025/CVE-2025-03xx/CVE-2025-0320.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24761.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24773.json create mode 100644 CVE-2025/CVE-2025-289xx/CVE-2025-28972.json create mode 100644 CVE-2025/CVE-2025-289xx/CVE-2025-28991.json create mode 100644 CVE-2025/CVE-2025-290xx/CVE-2025-29002.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30562.json create mode 100644 CVE-2025/CVE-2025-306xx/CVE-2025-30618.json create mode 100644 CVE-2025/CVE-2025-309xx/CVE-2025-30988.json create mode 100644 CVE-2025/CVE-2025-319xx/CVE-2025-31919.json create mode 100644 CVE-2025/CVE-2025-325xx/CVE-2025-32510.json create mode 100644 CVE-2025/CVE-2025-325xx/CVE-2025-32549.json create mode 100644 CVE-2025/CVE-2025-345xx/CVE-2025-34508.json create mode 100644 CVE-2025/CVE-2025-394xx/CVE-2025-39479.json create mode 100644 CVE-2025/CVE-2025-394xx/CVE-2025-39486.json create mode 100644 CVE-2025/CVE-2025-395xx/CVE-2025-39508.json create mode 100644 CVE-2025/CVE-2025-44xx/CVE-2025-4404.json create mode 100644 CVE-2025/CVE-2025-474xx/CVE-2025-47452.json create mode 100644 CVE-2025/CVE-2025-475xx/CVE-2025-47559.json create mode 100644 CVE-2025/CVE-2025-475xx/CVE-2025-47572.json create mode 100644 CVE-2025/CVE-2025-475xx/CVE-2025-47573.json create mode 100644 CVE-2025/CVE-2025-47xx/CVE-2025-4754.json create mode 100644 CVE-2025/CVE-2025-481xx/CVE-2025-48111.json create mode 100644 CVE-2025/CVE-2025-481xx/CVE-2025-48118.json create mode 100644 CVE-2025/CVE-2025-481xx/CVE-2025-48145.json create mode 100644 CVE-2025/CVE-2025-482xx/CVE-2025-48274.json create mode 100644 CVE-2025/CVE-2025-483xx/CVE-2025-48333.json create mode 100644 CVE-2025/CVE-2025-48xx/CVE-2025-4879.json create mode 100644 CVE-2025/CVE-2025-490xx/CVE-2025-49071.json create mode 100644 CVE-2025/CVE-2025-491xx/CVE-2025-49175.json create mode 100644 CVE-2025/CVE-2025-491xx/CVE-2025-49176.json create mode 100644 CVE-2025/CVE-2025-491xx/CVE-2025-49177.json create mode 100644 CVE-2025/CVE-2025-491xx/CVE-2025-49178.json create mode 100644 CVE-2025/CVE-2025-491xx/CVE-2025-49179.json create mode 100644 CVE-2025/CVE-2025-491xx/CVE-2025-49180.json create mode 100644 CVE-2025/CVE-2025-492xx/CVE-2025-49234.json create mode 100644 CVE-2025/CVE-2025-492xx/CVE-2025-49251.json create mode 100644 CVE-2025/CVE-2025-492xx/CVE-2025-49252.json create mode 100644 CVE-2025/CVE-2025-492xx/CVE-2025-49253.json create mode 100644 CVE-2025/CVE-2025-492xx/CVE-2025-49254.json create mode 100644 CVE-2025/CVE-2025-492xx/CVE-2025-49255.json create mode 100644 CVE-2025/CVE-2025-492xx/CVE-2025-49256.json create mode 100644 CVE-2025/CVE-2025-492xx/CVE-2025-49257.json create mode 100644 CVE-2025/CVE-2025-492xx/CVE-2025-49258.json create mode 100644 CVE-2025/CVE-2025-492xx/CVE-2025-49259.json create mode 100644 CVE-2025/CVE-2025-492xx/CVE-2025-49260.json create mode 100644 CVE-2025/CVE-2025-492xx/CVE-2025-49261.json create mode 100644 CVE-2025/CVE-2025-492xx/CVE-2025-49266.json create mode 100644 CVE-2025/CVE-2025-493xx/CVE-2025-49312.json create mode 100644 CVE-2025/CVE-2025-493xx/CVE-2025-49316.json create mode 100644 CVE-2025/CVE-2025-493xx/CVE-2025-49330.json create mode 100644 CVE-2025/CVE-2025-493xx/CVE-2025-49331.json create mode 100644 CVE-2025/CVE-2025-494xx/CVE-2025-49415.json create mode 100644 CVE-2025/CVE-2025-494xx/CVE-2025-49444.json create mode 100644 CVE-2025/CVE-2025-494xx/CVE-2025-49447.json create mode 100644 CVE-2025/CVE-2025-494xx/CVE-2025-49451.json create mode 100644 CVE-2025/CVE-2025-494xx/CVE-2025-49452.json create mode 100644 CVE-2025/CVE-2025-495xx/CVE-2025-49508.json create mode 100644 CVE-2025/CVE-2025-498xx/CVE-2025-49842.json create mode 100644 CVE-2025/CVE-2025-498xx/CVE-2025-49854.json create mode 100644 CVE-2025/CVE-2025-498xx/CVE-2025-49855.json create mode 100644 CVE-2025/CVE-2025-498xx/CVE-2025-49856.json create mode 100644 CVE-2025/CVE-2025-498xx/CVE-2025-49857.json create mode 100644 CVE-2025/CVE-2025-498xx/CVE-2025-49858.json create mode 100644 CVE-2025/CVE-2025-498xx/CVE-2025-49859.json create mode 100644 CVE-2025/CVE-2025-498xx/CVE-2025-49861.json create mode 100644 CVE-2025/CVE-2025-498xx/CVE-2025-49862.json create mode 100644 CVE-2025/CVE-2025-498xx/CVE-2025-49863.json create mode 100644 CVE-2025/CVE-2025-498xx/CVE-2025-49864.json create mode 100644 CVE-2025/CVE-2025-498xx/CVE-2025-49865.json create mode 100644 CVE-2025/CVE-2025-498xx/CVE-2025-49868.json create mode 100644 CVE-2025/CVE-2025-498xx/CVE-2025-49871.json create mode 100644 CVE-2025/CVE-2025-498xx/CVE-2025-49872.json create mode 100644 CVE-2025/CVE-2025-498xx/CVE-2025-49874.json create mode 100644 CVE-2025/CVE-2025-498xx/CVE-2025-49875.json create mode 100644 CVE-2025/CVE-2025-498xx/CVE-2025-49877.json create mode 100644 CVE-2025/CVE-2025-498xx/CVE-2025-49878.json create mode 100644 CVE-2025/CVE-2025-498xx/CVE-2025-49879.json create mode 100644 CVE-2025/CVE-2025-498xx/CVE-2025-49880.json create mode 100644 CVE-2025/CVE-2025-498xx/CVE-2025-49881.json create mode 100644 CVE-2025/CVE-2025-498xx/CVE-2025-49882.json create mode 100644 CVE-2025/CVE-2025-60xx/CVE-2025-6069.json create mode 100644 CVE-2025/CVE-2025-61xx/CVE-2025-6196.json create mode 100644 CVE-2025/CVE-2025-61xx/CVE-2025-6199.json diff --git a/CVE-2020/CVE-2020-138xx/CVE-2020-13878.json b/CVE-2020/CVE-2020-138xx/CVE-2020-13878.json index ff3aa73738c..2f2eea5452b 100644 --- a/CVE-2020/CVE-2020-138xx/CVE-2020-13878.json +++ b/CVE-2020/CVE-2020-138xx/CVE-2020-13878.json @@ -2,7 +2,7 @@ "id": "CVE-2020-13878", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-05T08:15:41.840", - "lastModified": "2024-11-21T05:02:03.590", + "lastModified": "2025-06-17T15:15:33.890", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-266xx/CVE-2020-26624.json b/CVE-2020/CVE-2020-266xx/CVE-2020-26624.json index f96a5165d8c..b70ccf0ccd1 100644 --- a/CVE-2020/CVE-2020-266xx/CVE-2020-26624.json +++ b/CVE-2020/CVE-2020-266xx/CVE-2020-26624.json @@ -2,7 +2,7 @@ "id": "CVE-2020-26624", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-02T22:15:07.837", - "lastModified": "2024-11-21T05:20:09.577", + "lastModified": "2025-06-17T15:15:34.790", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 2.5 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 3.8, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 2.5 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-251xx/CVE-2021-25117.json b/CVE-2021/CVE-2021-251xx/CVE-2021-25117.json index 51a4613f6b9..f03b96315c7 100644 --- a/CVE-2021/CVE-2021-251xx/CVE-2021-25117.json +++ b/CVE-2021/CVE-2021-251xx/CVE-2021-25117.json @@ -2,7 +2,7 @@ "id": "CVE-2021-25117", "sourceIdentifier": "contact@wpscan.com", "published": "2024-01-16T16:15:09.213", - "lastModified": "2024-11-21T05:54:23.110", + "lastModified": "2025-06-17T14:15:26.197", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-470xx/CVE-2022-47072.json b/CVE-2022/CVE-2022-470xx/CVE-2022-47072.json index 31ba2d5ad0d..fafe77d8350 100644 --- a/CVE-2022/CVE-2022-470xx/CVE-2022-47072.json +++ b/CVE-2022/CVE-2022-470xx/CVE-2022-47072.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47072", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-31T21:15:08.440", - "lastModified": "2024-11-21T07:31:27.933", + "lastModified": "2025-06-17T15:15:35.183", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-252xx/CVE-2023-25295.json b/CVE-2023/CVE-2023-252xx/CVE-2023-25295.json index c497765bfcb..3b56170b4d4 100644 --- a/CVE-2023/CVE-2023-252xx/CVE-2023-25295.json +++ b/CVE-2023/CVE-2023-252xx/CVE-2023-25295.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25295", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-17T03:15:07.743", - "lastModified": "2024-11-21T07:49:23.760", + "lastModified": "2025-06-17T15:15:35.367", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-253xx/CVE-2023-25365.json b/CVE-2023/CVE-2023-253xx/CVE-2023-25365.json index aec9f89aca6..d1807ae4282 100644 --- a/CVE-2023/CVE-2023-253xx/CVE-2023-25365.json +++ b/CVE-2023/CVE-2023-253xx/CVE-2023-25365.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25365", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-08T22:15:08.410", - "lastModified": "2024-11-21T07:49:27.247", + "lastModified": "2025-06-17T15:15:35.540", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,20 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-270xx/CVE-2023-27001.json b/CVE-2023/CVE-2023-270xx/CVE-2023-27001.json index 0c6d0238afe..5326c72c7a6 100644 --- a/CVE-2023/CVE-2023-270xx/CVE-2023-27001.json +++ b/CVE-2023/CVE-2023-270xx/CVE-2023-27001.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27001", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-08T22:15:08.463", - "lastModified": "2024-11-21T07:52:10.427", + "lastModified": "2025-06-17T14:15:27.097", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-328xx/CVE-2023-32877.json b/CVE-2023/CVE-2023-328xx/CVE-2023-32877.json index f606a3a477f..476f5df022c 100644 --- a/CVE-2023/CVE-2023-328xx/CVE-2023-32877.json +++ b/CVE-2023/CVE-2023-328xx/CVE-2023-32877.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32877", "sourceIdentifier": "security@mediatek.com", "published": "2024-01-02T03:15:07.980", - "lastModified": "2024-11-21T08:04:15.263", + "lastModified": "2025-06-17T15:15:35.757", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-335xx/CVE-2023-33538.json b/CVE-2023/CVE-2023-335xx/CVE-2023-33538.json index a19d8442354..8e400432115 100644 --- a/CVE-2023/CVE-2023-335xx/CVE-2023-33538.json +++ b/CVE-2023/CVE-2023-335xx/CVE-2023-33538.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33538", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-07T04:15:10.623", - "lastModified": "2025-06-17T01:00:02.367", - "vulnStatus": "Modified", + "lastModified": "2025-06-17T15:54:04.850", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -189,28 +189,41 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "Broken Link" ] }, { "url": "https://web.archive.org/web/20230609111043/https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/3/TL-WR940N_TL-WR841N_userRpm_WlanNetworkRpm_Command_Injection.md", - "source": "cve@mitre.org" - }, - { - "url": "https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/3/TL-WR940N_TL-WR841N_userRpm_WlanNetworkRpm_Command_Injection.md", - "source": "af854a3a-2127-422b-91ae-364da2661108", + "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ] }, + { + "url": "https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/3/TL-WR940N_TL-WR841N_userRpm_WlanNetworkRpm_Command_Injection.md", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "Broken Link" + ] + }, { "url": "https://web.archive.org/web/20230609111043/https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/3/TL-WR940N_TL-WR841N_userRpm_WlanNetworkRpm_Command_Injection.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.tp-link.com/us/support/faq/3562/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-362xx/CVE-2023-36236.json b/CVE-2023/CVE-2023-362xx/CVE-2023-36236.json index 229f9da2c33..444dda82617 100644 --- a/CVE-2023/CVE-2023-362xx/CVE-2023-36236.json +++ b/CVE-2023/CVE-2023-362xx/CVE-2023-36236.json @@ -2,7 +2,7 @@ "id": "CVE-2023-36236", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-16T22:15:37.473", - "lastModified": "2024-11-21T08:09:26.313", + "lastModified": "2025-06-17T15:15:35.950", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40284.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40284.json index 27ac645938c..36817f58d12 100644 --- a/CVE-2023/CVE-2023-402xx/CVE-2023-40284.json +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40284.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40284", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-27T04:15:09.200", - "lastModified": "2024-11-21T08:19:08.287", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-17T14:08:47.313", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,117 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11ssm-f_firmware:1.66:*:*:*:*:*:*:*", + "matchCriteriaId": "20BC3CF1-B926-40C7-A22F-246B2DF85154" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11ssm-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1EC19D26-080D-4B5A-A41C-253D00036608" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sae-f_firmware:1.66:*:*:*:*:*:*:*", + "matchCriteriaId": "4B6ECA00-0751-453C-AD3C-3092454D8F5C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sae-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B9DED254-4F7C-4BA3-BDB4-C20046F1801D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sse-f_firmware:1.66:*:*:*:*:*:*:*", + "matchCriteriaId": "073133FA-E96D-44AD-A69B-D6BC8818D0E0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sse-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FC57F4A1-10F8-4926-A446-D2B8F05B8008" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.supermicro.com/en/support/security_BMC_IPMI_Oct_2023", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.supermicro.com/en/support/security_center#%21advisories", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.supermicro.com/en/support/security_BMC_IPMI_Oct_2023", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.supermicro.com/en/support/security_center#%21advisories", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40285.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40285.json index cb5e76a4fc4..d2c946a04ef 100644 --- a/CVE-2023/CVE-2023-402xx/CVE-2023-40285.json +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40285.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40285", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-27T04:15:09.440", - "lastModified": "2024-12-06T22:15:18.837", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-17T14:04:35.960", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,117 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11ssm-f_firmware:1.66:*:*:*:*:*:*:*", + "matchCriteriaId": "20BC3CF1-B926-40C7-A22F-246B2DF85154" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11ssm-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1EC19D26-080D-4B5A-A41C-253D00036608" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sae-f_firmware:1.66:*:*:*:*:*:*:*", + "matchCriteriaId": "4B6ECA00-0751-453C-AD3C-3092454D8F5C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sae-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B9DED254-4F7C-4BA3-BDB4-C20046F1801D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sse-f_firmware:1.66:*:*:*:*:*:*:*", + "matchCriteriaId": "073133FA-E96D-44AD-A69B-D6BC8818D0E0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sse-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FC57F4A1-10F8-4926-A446-D2B8F05B8008" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.supermicro.com/en/support/security_BMC_IPMI_Oct_2023", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.supermicro.com/en/support/security_center#%21advisories", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.supermicro.com/en/support/security_BMC_IPMI_Oct_2023", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.supermicro.com/en/support/security_center#%21advisories", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-410xx/CVE-2023-41099.json b/CVE-2023/CVE-2023-410xx/CVE-2023-41099.json index 14ddc05696a..c16894b6830 100644 --- a/CVE-2023/CVE-2023-410xx/CVE-2023-41099.json +++ b/CVE-2023/CVE-2023-410xx/CVE-2023-41099.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41099", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-22T15:15:15.390", - "lastModified": "2024-11-21T08:20:34.550", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-17T14:18:19.630", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:atos:eviden_cardos_api:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.0", + "versionEndExcluding": "5.5.5.2811", + "matchCriteriaId": "D0C8A139-ED77-4DCE-94C1-C4CECA873948" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.bull.com/ols/product/security/psirt/security-bulletins/cardos-api-local-privilege-escalation-psirt-358-tlp-clear-version-2-6-cve-2023-41099/view", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.bull.com/ols/product/security/psirt/security-bulletins/cardos-api-local-privilege-escalation-psirt-358-tlp-clear-version-2-6-cve-2023-41099/view", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-440xx/CVE-2023-44077.json b/CVE-2023/CVE-2023-440xx/CVE-2023-44077.json index b812fb95c12..012cf416826 100644 --- a/CVE-2023/CVE-2023-440xx/CVE-2023-44077.json +++ b/CVE-2023/CVE-2023-440xx/CVE-2023-44077.json @@ -2,7 +2,7 @@ "id": "CVE-2023-44077", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-17T20:15:50.517", - "lastModified": "2024-11-21T08:25:11.473", + "lastModified": "2025-06-17T15:15:36.450", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-347" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-347" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46343.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46343.json index b96e24500ce..3bd5a536952 100644 --- a/CVE-2023/CVE-2023-463xx/CVE-2023-46343.json +++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46343.json @@ -2,7 +2,7 @@ "id": "CVE-2023-46343", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-23T10:15:10.383", - "lastModified": "2024-11-21T08:28:19.323", + "lastModified": "2025-06-17T14:15:27.323", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-476" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-469xx/CVE-2023-46953.json b/CVE-2023/CVE-2023-469xx/CVE-2023-46953.json index 61d40721eff..1d628a5db0b 100644 --- a/CVE-2023/CVE-2023-469xx/CVE-2023-46953.json +++ b/CVE-2023/CVE-2023-469xx/CVE-2023-46953.json @@ -2,7 +2,7 @@ "id": "CVE-2023-46953", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-06T05:15:09.427", - "lastModified": "2024-11-21T08:29:32.780", + "lastModified": "2025-06-17T15:15:36.700", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4818.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4818.json index 28bc02f57a3..d7a89b98697 100644 --- a/CVE-2023/CVE-2023-48xx/CVE-2023-4818.json +++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4818.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4818", "sourceIdentifier": "cvd@cert.pl", "published": "2024-01-15T14:15:25.180", - "lastModified": "2024-11-21T08:36:02.230", + "lastModified": "2025-06-17T14:15:27.577", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.9, + "impactScore": 6.0 } ] }, diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5041.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5041.json index 9504997daec..b52df30bce4 100644 --- a/CVE-2023/CVE-2023-50xx/CVE-2023-5041.json +++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5041.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5041", "sourceIdentifier": "contact@wpscan.com", "published": "2024-01-17T15:15:10.850", - "lastModified": "2024-11-21T08:40:57.330", + "lastModified": "2025-06-17T15:15:37.327", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-512xx/CVE-2023-51282.json b/CVE-2023/CVE-2023-512xx/CVE-2023-51282.json index 9f354a015b8..2fdc77dc7b7 100644 --- a/CVE-2023/CVE-2023-512xx/CVE-2023-51282.json +++ b/CVE-2023/CVE-2023-512xx/CVE-2023-51282.json @@ -2,7 +2,7 @@ "id": "CVE-2023-51282", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-16T02:15:28.590", - "lastModified": "2024-11-21T08:37:56.710", + "lastModified": "2025-06-17T15:15:36.863", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-94" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51790.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51790.json index 04c2480412c..085739ea612 100644 --- a/CVE-2023/CVE-2023-517xx/CVE-2023-51790.json +++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51790.json @@ -2,7 +2,7 @@ "id": "CVE-2023-51790", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-12T13:15:11.733", - "lastModified": "2024-11-21T08:38:48.780", + "lastModified": "2025-06-17T14:15:27.850", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-519xx/CVE-2023-51906.json b/CVE-2023/CVE-2023-519xx/CVE-2023-51906.json index 1097d4d9762..5e968b17cbf 100644 --- a/CVE-2023/CVE-2023-519xx/CVE-2023-51906.json +++ b/CVE-2023/CVE-2023-519xx/CVE-2023-51906.json @@ -2,7 +2,7 @@ "id": "CVE-2023-51906", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-20T02:15:07.670", - "lastModified": "2024-11-21T08:38:55.823", + "lastModified": "2025-06-17T14:15:28.030", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-520xx/CVE-2023-52032.json b/CVE-2023/CVE-2023-520xx/CVE-2023-52032.json index 87e5f5d7fd5..cf4a9f59407 100644 --- a/CVE-2023/CVE-2023-520xx/CVE-2023-52032.json +++ b/CVE-2023/CVE-2023-520xx/CVE-2023-52032.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52032", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-11T09:15:47.483", - "lastModified": "2024-11-21T08:39:03.040", + "lastModified": "2025-06-17T15:15:37.040", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-520xx/CVE-2023-52041.json b/CVE-2023/CVE-2023-520xx/CVE-2023-52041.json index a3ab5d27213..c90f92aea25 100644 --- a/CVE-2023/CVE-2023-520xx/CVE-2023-52041.json +++ b/CVE-2023/CVE-2023-520xx/CVE-2023-52041.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52041", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-16T19:15:08.410", - "lastModified": "2024-11-21T08:39:03.710", + "lastModified": "2025-06-17T14:15:28.197", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-61xx/CVE-2023-6161.json b/CVE-2023/CVE-2023-61xx/CVE-2023-6161.json index ac97057eeaf..c6a0c7d3f71 100644 --- a/CVE-2023/CVE-2023-61xx/CVE-2023-6161.json +++ b/CVE-2023/CVE-2023-61xx/CVE-2023-6161.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6161", "sourceIdentifier": "contact@wpscan.com", "published": "2024-01-08T19:15:10.137", - "lastModified": "2024-11-21T08:43:16.843", + "lastModified": "2025-06-17T15:15:37.620", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, diff --git a/CVE-2023/CVE-2023-64xx/CVE-2023-6447.json b/CVE-2023/CVE-2023-64xx/CVE-2023-6447.json index c8a146e8a20..9d79f518a38 100644 --- a/CVE-2023/CVE-2023-64xx/CVE-2023-6447.json +++ b/CVE-2023/CVE-2023-64xx/CVE-2023-6447.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6447", "sourceIdentifier": "contact@wpscan.com", "published": "2024-01-22T20:15:47.553", - "lastModified": "2024-11-21T08:43:52.870", + "lastModified": "2025-06-17T14:15:28.470", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7074.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7074.json index 31a77cd3fa6..c3e1b71a4d5 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7074.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7074.json @@ -2,7 +2,7 @@ "id": "CVE-2023-7074", "sourceIdentifier": "contact@wpscan.com", "published": "2024-01-29T15:15:09.793", - "lastModified": "2024-11-21T08:45:11.670", + "lastModified": "2025-06-17T15:15:37.787", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1283.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1283.json index 744fd0b88e5..893fcc15308 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1283.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1283.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1283", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-02-07T00:15:56.323", - "lastModified": "2024-11-21T08:50:13.640", + "lastModified": "2025-06-17T15:15:38.487", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20002.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20002.json index 2678e51db2b..e50918ba653 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20002.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20002.json @@ -2,7 +2,7 @@ "id": "CVE-2024-20002", "sourceIdentifier": "security@mediatek.com", "published": "2024-02-05T06:15:47.083", - "lastModified": "2024-11-21T08:51:46.143", + "lastModified": "2025-06-17T14:15:28.767", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-225xx/CVE-2024-22567.json b/CVE-2024/CVE-2024-225xx/CVE-2024-22567.json index e592be8a2cf..f88f46653a5 100644 --- a/CVE-2024/CVE-2024-225xx/CVE-2024-22567.json +++ b/CVE-2024/CVE-2024-225xx/CVE-2024-22567.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22567", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-05T20:15:55.620", - "lastModified": "2024-11-21T08:56:27.563", + "lastModified": "2025-06-17T15:15:39.000", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-229xx/CVE-2024-22912.json b/CVE-2024/CVE-2024-229xx/CVE-2024-22912.json index 33ad3ff9bf8..6d388f0d7a6 100644 --- a/CVE-2024/CVE-2024-229xx/CVE-2024-22912.json +++ b/CVE-2024/CVE-2024-229xx/CVE-2024-22912.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22912", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-19T18:15:08.723", - "lastModified": "2024-11-21T08:56:47.240", + "lastModified": "2025-06-17T15:15:39.170", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-230xx/CVE-2024-23055.json b/CVE-2024/CVE-2024-230xx/CVE-2024-23055.json index 197a78f11e7..d944fa0b879 100644 --- a/CVE-2024/CVE-2024-230xx/CVE-2024-23055.json +++ b/CVE-2024/CVE-2024-230xx/CVE-2024-23055.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23055", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-25T22:15:08.623", - "lastModified": "2024-11-21T08:56:52.597", + "lastModified": "2025-06-17T15:15:39.340", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23686.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23686.json index c494fdc3864..96fa34df527 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23686.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23686.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23686", "sourceIdentifier": "disclosure@vulncheck.com", "published": "2024-01-19T22:15:08.437", - "lastModified": "2024-11-21T08:58:10.460", + "lastModified": "2025-06-17T15:15:40.450", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, diff --git a/CVE-2024/CVE-2024-241xx/CVE-2024-24115.json b/CVE-2024/CVE-2024-241xx/CVE-2024-24115.json index 07c5afd0193..5025757e1ca 100644 --- a/CVE-2024/CVE-2024-241xx/CVE-2024-24115.json +++ b/CVE-2024/CVE-2024-241xx/CVE-2024-24115.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24115", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-08T20:15:52.933", - "lastModified": "2024-11-21T08:58:56.140", + "lastModified": "2025-06-17T14:15:30.030", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-284xx/CVE-2024-28441.json b/CVE-2024/CVE-2024-284xx/CVE-2024-28441.json index 228390610a7..b0f75ef3880 100644 --- a/CVE-2024/CVE-2024-284xx/CVE-2024-28441.json +++ b/CVE-2024/CVE-2024-284xx/CVE-2024-28441.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28441", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-22T02:15:08.480", - "lastModified": "2024-11-21T09:06:22.517", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-17T14:26:25.113", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:magicflue:magicflue:*:*:*:*:*:*:*:*", + "versionEndIncluding": "7.0", + "matchCriteriaId": "2A7EA268-BEB0-4861-A6E4-A5A1361D4B86" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/iamHuFei/HVVault/blob/main/webapp/%E9%AD%94%E6%96%B9%E7%BD%91%E8%A1%A8/magicflu-mailupdate-jsp-fileupload.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/iamHuFei/HVVault/blob/main/webapp/%E9%AD%94%E6%96%B9%E7%BD%91%E8%A1%A8/magicflu-mailupdate-jsp-fileupload.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-285xx/CVE-2024-28521.json b/CVE-2024/CVE-2024-285xx/CVE-2024-28521.json index 9ea719aaef0..02966610b94 100644 --- a/CVE-2024/CVE-2024-285xx/CVE-2024-28521.json +++ b/CVE-2024/CVE-2024-285xx/CVE-2024-28521.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28521", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-21T22:15:12.457", - "lastModified": "2024-11-21T09:06:26.813", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-17T14:45:13.120", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netentsec:application_security_gateway_firmware:6.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "65E29A4B-A93E-46D2-8F8E-7C2695C1D75B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netentsec:ns-asg:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F7FC64EC-FBAF-42F3-B743-C4873014168C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/aknbg1thub/cve/blob/main/sql.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/aknbg1thub/cve/blob/main/sql.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-286xx/CVE-2024-28635.json b/CVE-2024/CVE-2024-286xx/CVE-2024-28635.json index 6a404110e54..ffa4dc6e055 100644 --- a/CVE-2024/CVE-2024-286xx/CVE-2024-28635.json +++ b/CVE-2024/CVE-2024-286xx/CVE-2024-28635.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28635", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-21T04:15:09.373", - "lastModified": "2025-06-17T13:52:08.900", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-17T14:05:15.577", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -60,9 +60,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:devsoftbaltic:survey_creator:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:devsoftbaltic:survey-creator:*:*:*:*:*:*:*:*", "versionEndIncluding": "1.9.132", - "matchCriteriaId": "B6EE4799-49CB-41F4-B29C-3D6475B99F74" + "matchCriteriaId": "14DF7161-CDB1-4903-88C4-25EC82443254" } ] } diff --git a/CVE-2024/CVE-2024-292xx/CVE-2024-29273.json b/CVE-2024/CVE-2024-292xx/CVE-2024-29273.json index 9c35d975188..bed3dd34bc4 100644 --- a/CVE-2024/CVE-2024-292xx/CVE-2024-29273.json +++ b/CVE-2024/CVE-2024-292xx/CVE-2024-29273.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29273", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-22T04:15:11.857", - "lastModified": "2024-11-21T09:07:54.247", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-17T14:22:54.603", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,41 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dzzoffice:dzzoffice:2.02.1_sc_utf8:*:*:*:*:*:*:*", + "matchCriteriaId": "08D8E4EE-DC18-4672-AD08-AB6750489C80" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/zyx0814/dzzoffice/issues/244", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://github.com/zyx0814/dzzoffice/issues/244", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-293xx/CVE-2024-29366.json b/CVE-2024/CVE-2024-293xx/CVE-2024-29366.json index a2707b15fb0..3971d6f7102 100644 --- a/CVE-2024/CVE-2024-293xx/CVE-2024-29366.json +++ b/CVE-2024/CVE-2024-293xx/CVE-2024-29366.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29366", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-22T17:15:08.887", - "lastModified": "2024-11-21T09:07:57.600", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-17T14:16:46.567", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,66 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dir-845l_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.01krb03", + "matchCriteriaId": "BC7DE1C8-D307-491E-8F24-4AD51E896CC3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dir-845l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD53005B-ECBD-4211-88B1-A33EC5D0DFD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/20Yiju/DLink/blob/master/DIR-845L/CI.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.dlink.com/en/security-bulletin/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/20Yiju/DLink/blob/master/DIR-845L/CI.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.dlink.com/en/security-bulletin/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-293xx/CVE-2024-29385.json b/CVE-2024/CVE-2024-293xx/CVE-2024-29385.json index ffadaaa6647..5de7f699de9 100644 --- a/CVE-2024/CVE-2024-293xx/CVE-2024-29385.json +++ b/CVE-2024/CVE-2024-293xx/CVE-2024-29385.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29385", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-22T17:15:08.943", - "lastModified": "2024-11-21T09:07:58.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-17T14:09:38.640", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,66 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dir-845l_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.01krb03", + "matchCriteriaId": "BC7DE1C8-D307-491E-8F24-4AD51E896CC3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dir-845l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD53005B-ECBD-4211-88B1-A33EC5D0DFD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/songah119/Report/blob/main/CI-1.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.dlink.com/en/security-bulletin/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/songah119/Report/blob/main/CI-1.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.dlink.com/en/security-bulletin/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-316xx/CVE-2024-31673.json b/CVE-2024/CVE-2024-316xx/CVE-2024-31673.json index 913a40acb64..3e047565746 100644 --- a/CVE-2024/CVE-2024-316xx/CVE-2024-31673.json +++ b/CVE-2024/CVE-2024-316xx/CVE-2024-31673.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31673", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-03T18:15:09.310", - "lastModified": "2024-11-21T09:13:48.477", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-17T15:05:11.003", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,41 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kliqqi:kliqqi_cms:2.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "7FA8A074-F9FF-4CE1-9E47-D9DB7D776D68" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Kliqqi-CMS/Kliqqi-CMS/issues/265", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://github.com/Kliqqi-CMS/Kliqqi-CMS/issues/265", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-337xx/CVE-2024-33791.json b/CVE-2024/CVE-2024-337xx/CVE-2024-33791.json index b9e1928a7b4..f0731b996f2 100644 --- a/CVE-2024/CVE-2024-337xx/CVE-2024-33791.json +++ b/CVE-2024/CVE-2024-337xx/CVE-2024-33791.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33791", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-03T17:15:08.047", - "lastModified": "2024-11-21T09:17:30.170", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-17T15:13:31.073", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netis-systems:mex605_firmware:2.00.06:*:*:*:*:*:*:*", + "matchCriteriaId": "887CCD86-2732-4B92-9DBB-216AE04CA504" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netis-systems:mex605:-:*:*:*:*:*:*:*", + "matchCriteriaId": "004827EF-B40F-47EB-93F7-9104EEE04465" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ymkyu/CVE/tree/main/CVE-2024-33791", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/ymkyu/CVE/tree/main/CVE-2024-33791", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-337xx/CVE-2024-33792.json b/CVE-2024/CVE-2024-337xx/CVE-2024-33792.json index 993c6c2bb0d..529b153b294 100644 --- a/CVE-2024/CVE-2024-337xx/CVE-2024-33792.json +++ b/CVE-2024/CVE-2024-337xx/CVE-2024-33792.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33792", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-03T17:15:08.093", - "lastModified": "2024-11-21T09:17:30.357", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-17T15:10:57.783", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +61,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netis-systems:mex605_firmware:2.00.06:*:*:*:*:*:*:*", + "matchCriteriaId": "887CCD86-2732-4B92-9DBB-216AE04CA504" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netis-systems:mex605:-:*:*:*:*:*:*:*", + "matchCriteriaId": "004827EF-B40F-47EB-93F7-9104EEE04465" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ymkyu/CVE/tree/main/CVE-2024-33792", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/ymkyu/CVE/tree/main/CVE-2024-33792", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-337xx/CVE-2024-33793.json b/CVE-2024/CVE-2024-337xx/CVE-2024-33793.json index e176e8ad4fa..75731aa49a3 100644 --- a/CVE-2024/CVE-2024-337xx/CVE-2024-33793.json +++ b/CVE-2024/CVE-2024-337xx/CVE-2024-33793.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33793", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-03T17:15:08.147", - "lastModified": "2024-11-21T09:17:30.567", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-17T15:09:57.787", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netis-systems:mex605_firmware:2.00.06:*:*:*:*:*:*:*", + "matchCriteriaId": "887CCD86-2732-4B92-9DBB-216AE04CA504" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netis-systems:mex605:-:*:*:*:*:*:*:*", + "matchCriteriaId": "004827EF-B40F-47EB-93F7-9104EEE04465" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ymkyu/CVE/tree/main/CVE-2024-33793", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/ymkyu/CVE/tree/main/CVE-2024-33793", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34402.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34402.json index b6774b6c108..3dfb1bbcba4 100644 --- a/CVE-2024/CVE-2024-344xx/CVE-2024-34402.json +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34402.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34402", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-03T01:15:48.633", - "lastModified": "2024-11-21T09:18:35.737", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-17T15:24:01.950", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,62 +51,161 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:uriparser_project:uriparser:*:*:*:*:*:*:*:*", + "versionEndIncluding": "0.9.7", + "matchCriteriaId": "28A780B0-75ED-46D5-B656-928BF2F6C45F" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", + "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/05/06/1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/05/06/3", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://github.com/uriparser/uriparser/issues/183", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://github.com/uriparser/uriparser/pull/185", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5R36L762D3KX3GA66OOPWW7M7KKDRXDP/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CZ6KEUQXWCTYXGTBMZDD7CHJCYI52XY3/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UG4J7PD475LSCGCSHFU4GMU4TWLDSNW2/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/05/06/1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/05/06/3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://github.com/uriparser/uriparser/issues/183", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://github.com/uriparser/uriparser/pull/185", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5R36L762D3KX3GA66OOPWW7M7KKDRXDP/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CZ6KEUQXWCTYXGTBMZDD7CHJCYI52XY3/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UG4J7PD475LSCGCSHFU4GMU4TWLDSNW2/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34403.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34403.json index 5beef24b05f..bfbc81902fa 100644 --- a/CVE-2024/CVE-2024-344xx/CVE-2024-34403.json +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34403.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34403", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-03T01:15:48.693", - "lastModified": "2024-11-21T09:18:35.980", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-17T15:20:17.017", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,62 +51,163 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:uriparser_project:uriparser:*:*:*:*:*:*:*:*", + "versionEndIncluding": "0.9.7", + "matchCriteriaId": "28A780B0-75ED-46D5-B656-928BF2F6C45F" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", + "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/05/06/1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/05/06/3", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://github.com/uriparser/uriparser/issues/183", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://github.com/uriparser/uriparser/pull/186", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Vendor Advisory", + "Patch" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5R36L762D3KX3GA66OOPWW7M7KKDRXDP/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CZ6KEUQXWCTYXGTBMZDD7CHJCYI52XY3/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UG4J7PD475LSCGCSHFU4GMU4TWLDSNW2/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/05/06/1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/05/06/3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://github.com/uriparser/uriparser/issues/183", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://github.com/uriparser/uriparser/pull/186", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory", + "Patch" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5R36L762D3KX3GA66OOPWW7M7KKDRXDP/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CZ6KEUQXWCTYXGTBMZDD7CHJCYI52XY3/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UG4J7PD475LSCGCSHFU4GMU4TWLDSNW2/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34467.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34467.json index 56c6913227e..f02e00a5c3c 100644 --- a/CVE-2024/CVE-2024-344xx/CVE-2024-34467.json +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34467.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34467", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-04T20:15:07.527", - "lastModified": "2024-11-21T09:18:44.753", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-17T15:02:34.373", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,41 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:thinkphp:thinkphp:8.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "468CD6C1-413F-4E30-9BE5-6470846F6B47" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/top-think/framework/issues/2996", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://github.com/top-think/framework/issues/2996", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34468.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34468.json index d67e3705565..09663089244 100644 --- a/CVE-2024/CVE-2024-344xx/CVE-2024-34468.json +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34468.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34468", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-04T20:15:07.590", - "lastModified": "2024-12-04T21:15:23.670", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-17T15:01:01.797", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,42 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rukovoditel:rukovoditel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.5.3", + "matchCriteriaId": "AC4F2E82-7E5F-42D3-9BA2-259AF2585C32" + } + ] + } + ] + } + ], "references": [ { "url": "https://forum.rukovoditel.net/viewtopic.php?t=5071", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://forum.rukovoditel.net/viewtopic.php?t=5071", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34469.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34469.json index 85ff97bdb02..a2a33f7120d 100644 --- a/CVE-2024/CVE-2024-344xx/CVE-2024-34469.json +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34469.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34469", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-04T20:15:07.640", - "lastModified": "2024-11-21T09:18:45.113", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-17T14:57:03.317", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,42 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rukovoditel:rukovoditel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.5.3", + "matchCriteriaId": "AC4F2E82-7E5F-42D3-9BA2-259AF2585C32" + } + ] + } + ] + } + ], "references": [ { "url": "https://forum.rukovoditel.net/viewtopic.php?t=5071", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://forum.rukovoditel.net/viewtopic.php?t=5071", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-345xx/CVE-2024-34502.json b/CVE-2024/CVE-2024-345xx/CVE-2024-34502.json index e1acf21cdc6..cab88072777 100644 --- a/CVE-2024/CVE-2024-345xx/CVE-2024-34502.json +++ b/CVE-2024/CVE-2024-345xx/CVE-2024-34502.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34502", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-05T19:15:07.197", - "lastModified": "2024-11-21T09:18:49.567", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-17T14:53:28.127", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,30 +51,101 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.39.6", + "matchCriteriaId": "6A7D7611-D088-4AF6-8CE0-EACBE4FF4492" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.40.0", + "versionEndExcluding": "1.40.2", + "matchCriteriaId": "3EF19DE5-1D79-4001-ABA1-D648AD6610D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.41.0", + "versionEndExcluding": "1.41.1", + "matchCriteriaId": "314B0F2D-27BD-486B-B528-FD8A7AAE53E6" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", + "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59" + } + ] + } + ] + } + ], "references": [ { "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/WikibaseLexeme/+/1013359", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FU2FGUXXK6TMV6R52VRECLC6XCSQQISY/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "Mailing List" + ] }, { "url": "https://phabricator.wikimedia.org/T357101", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/WikibaseLexeme/+/1013359", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FU2FGUXXK6TMV6R52VRECLC6XCSQQISY/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "Mailing List" + ] }, { "url": "https://phabricator.wikimedia.org/T357101", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-401xx/CVE-2024-40120.json b/CVE-2024/CVE-2024-401xx/CVE-2024-40120.json index 6f51f80699e..5a7bbcc158b 100644 --- a/CVE-2024/CVE-2024-401xx/CVE-2024-40120.json +++ b/CVE-2024/CVE-2024-401xx/CVE-2024-40120.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40120", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-16T13:15:51.237", - "lastModified": "2025-05-16T16:15:28.017", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-17T14:09:04.597", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:seaweedfs:seaweedfs:3.68:*:*:*:*:*:*:*", + "matchCriteriaId": "6DEC3675-AAAF-4E2D-AB11-3039C50F9692" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/sud0why/1b2115c1d644bd3db1c1b3f16684a78c", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/seaweedfs/seaweedfs/issues/5710", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44068.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44068.json index ae8c665663c..364d126eafd 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44068.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44068.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44068", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-07T19:15:09.907", - "lastModified": "2024-10-10T12:57:21.987", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-17T15:52:59.677", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,184 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:exynos_9820_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1E582F31-BCC1-4276-BC34-A38EDCC4BB01" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:samsung:exynos_9820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1B8C35DE-1C58-4C6E-BB15-0E3C2FECB8DA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:exynos_9825_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7584E423-2C8E-4576-AB84-BC3A8351B3F9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:samsung:exynos_9825:-:*:*:*:*:*:*:*", + "matchCriteriaId": "77A6027E-CD79-4DBD-B065-BE5AE7967F3B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:exynos_980_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5F18F62E-2012-442E-BE60-6E76325D1824" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:samsung:exynos_980:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D8701B6-6989-44D1-873A-A1823BFD7CCC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:exynos_990_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BCF6C91D-DECE-4630-85FE-C22EF2B9160A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:samsung:exynos_990:-:*:*:*:*:*:*:*", + "matchCriteriaId": "87FE8214-E165-4874-BB5A-3C4298708039" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:exynos_850_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1928760C-4FC4-45B0-84FF-C1105CD1DD2A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:samsung:exynos_850:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB410A6D-642B-49AE-8B1C-EADA953A84DA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:exynos_w920_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6ADED27-EDAF-4FB3-8CB2-AE5F59B93641" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:samsung:exynos_w920:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4BF79654-E5C6-4DFF-B33A-A78571CD300C" + } + ] + } + ] + } + ], "references": [ { "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-44068/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45184.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45184.json index 5509222711e..dea4f81b8f4 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45184.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45184.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45184", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-11T21:15:06.947", - "lastModified": "2024-11-06T17:35:34.223", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-17T15:42:26.653", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,508 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:exynos_9820_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1E582F31-BCC1-4276-BC34-A38EDCC4BB01" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:samsung:exynos_9820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1B8C35DE-1C58-4C6E-BB15-0E3C2FECB8DA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:exynos_9825_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7584E423-2C8E-4576-AB84-BC3A8351B3F9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:samsung:exynos_9825:-:*:*:*:*:*:*:*", + "matchCriteriaId": "77A6027E-CD79-4DBD-B065-BE5AE7967F3B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:exynos_980_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5F18F62E-2012-442E-BE60-6E76325D1824" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:samsung:exynos_980:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D8701B6-6989-44D1-873A-A1823BFD7CCC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:exynos_990_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BCF6C91D-DECE-4630-85FE-C22EF2B9160A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:samsung:exynos_990:-:*:*:*:*:*:*:*", + "matchCriteriaId": "87FE8214-E165-4874-BB5A-3C4298708039" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:exynos_850_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1928760C-4FC4-45B0-84FF-C1105CD1DD2A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:samsung:exynos_850:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB410A6D-642B-49AE-8B1C-EADA953A84DA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:exynos_1080_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "43DE4D6F-D662-46F2-93BC-9AE950320BDE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:samsung:exynos_1080:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE06CD56-8BFD-4208-843A-179E3E6F5C10" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:exynos_2100_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89B88BFE-3C82-498C-8EC1-5784836DB1A1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:samsung:exynos_2100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9385885D-654A-496E-8029-7C6D9B077193" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:exynos_1280_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BD1A7B09-9031-4E54-A24F-3237C054166B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:samsung:exynos_1280:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DFC68046-2F08-40D1-B158-89D8D9263541" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:exynos_2200_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "63C0D9AC-BD23-48C9-83E7-301DEC06E583" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:samsung:exynos_2200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A72ADEBB-ED72-4A5B-BB27-95EDE43F8116" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:exynos_1330_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2635646-DD6A-4735-8E01-F45445584832" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:samsung:exynos_1330:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA0F8A58-71B7-4503-A03A-6FB4282D75BD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:exynos_1380_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D381478B-C638-4663-BD71-144BE4B02E46" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:samsung:exynos_1380:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61E72146-72FE-4B54-AB79-3C665E7F016C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:exynos_1480_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "64897B0D-EBF6-4BEB-BF54-ABCDBFAB45E0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:samsung:exynos_1480:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F3F328B4-0442-4748-B5EE-DD1CEE50D6CF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:exynos_2400_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "16D9272E-1794-48FF-B6A4-8F48395BA38E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:samsung:exynos_2400:-:*:*:*:*:*:*:*", + "matchCriteriaId": "932F5FB3-5527-44D7-9DD9-EF03963E3CA3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:exynos_9110_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F1896BFF-D709-481B-AD4F-37D1A8B30C06" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:samsung:exynos_9110:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E6748EF2-3C63-41CD-B3D1-4B3FEC614B40" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:exynos_w920_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6ADED27-EDAF-4FB3-8CB2-AE5F59B93641" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:samsung:exynos_w920:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4BF79654-E5C6-4DFF-B33A-A78571CD300C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:exynos_w930_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "801E188F-C71B-4933-9099-151A4A1B1BC5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:samsung:exynos_w930:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8D8FC82D-57C5-4F00-BDF4-4261A32C4246" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:exynos_modem_5123_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06B60F97-1320-44F5-970C-BBA29F375524" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:samsung:exynos_modem_5123:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72419735-076A-4E72-869F-0C7D801371C1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:exynos_modem_5300_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4F66A096-7BA3-47D6-98F4-879C3A4C1FFC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:samsung:exynos_modem_5300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE202894-D48A-4B9E-B3BD-28529967A0B3" + } + ] + } + ] + } + ], "references": [ { "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-45184/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-462xx/CVE-2024-46292.json b/CVE-2024/CVE-2024-462xx/CVE-2024-46292.json index 6123a0e6915..5798d3e81d2 100644 --- a/CVE-2024/CVE-2024-462xx/CVE-2024-46292.json +++ b/CVE-2024/CVE-2024-462xx/CVE-2024-46292.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46292", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-09T16:15:04.373", - "lastModified": "2024-10-21T00:15:12.240", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-17T15:49:56.567", + "vulnStatus": "Analyzed", "cveTags": [ { "sourceIdentifier": "cve@mitre.org", @@ -58,18 +58,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:trustwave:modsecurity:3.0.12:*:*:*:*:*:*:*", + "matchCriteriaId": "6FE9C31F-37F8-4AD6-A606-222793761F95" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/owasp-modsecurity/ModSecurity/blob/v3/master/README.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/yoloflz101/yoloflz/blob/main/README.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://modsecurity.org/20241011/about-cve-2024-46292-2024-october/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-465xx/CVE-2024-46540.json b/CVE-2024/CVE-2024-465xx/CVE-2024-46540.json index 394af68cab3..1c715d1b0d5 100644 --- a/CVE-2024/CVE-2024-465xx/CVE-2024-46540.json +++ b/CVE-2024/CVE-2024-465xx/CVE-2024-46540.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46540", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-30T17:15:04.550", - "lastModified": "2024-10-04T13:51:25.567", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-17T15:57:20.630", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:*", + "versionEndExcluding": "2.3.15", + "matchCriteriaId": "EE25D2F6-8025-4EC4-8418-6B9D14F7F341" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/microvorld/1c1ef9c3390a5d88a5ede9f9424a8bd2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/emlog/emlog", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/microvorld/CVE-2024/blob/main/emlog.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-479xx/CVE-2024-47913.json b/CVE-2024/CVE-2024-479xx/CVE-2024-47913.json index 852d5116921..3f4312583ef 100644 --- a/CVE-2024/CVE-2024-479xx/CVE-2024-47913.json +++ b/CVE-2024/CVE-2024-479xx/CVE-2024-47913.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47913", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-04T22:15:02.687", - "lastModified": "2024-12-06T21:15:08.590", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-17T15:54:48.687", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.39.9", + "matchCriteriaId": "FD0C21BE-0A08-4CEB-9CB8-B79BD88103B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.40.0", + "versionEndExcluding": "1.41.3", + "matchCriteriaId": "B0ED8E65-CFE2-465C-A330-15FCE03B3056" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.42.0", + "versionEndExcluding": "1.42.2", + "matchCriteriaId": "0ECB922E-CEC2-40BF-8655-09D0E48E2D42" + } + ] + } + ] + } + ], "references": [ { "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/AbuseFilter/+/1076855", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://phabricator.wikimedia.org/T372998", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-481xx/CVE-2024-48112.json b/CVE-2024/CVE-2024-481xx/CVE-2024-48112.json index 64212d9b184..2cf1e7b4731 100644 --- a/CVE-2024/CVE-2024-481xx/CVE-2024-48112.json +++ b/CVE-2024/CVE-2024-481xx/CVE-2024-48112.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48112", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T21:15:14.393", - "lastModified": "2024-11-01T12:57:03.417", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-17T15:38:05.447", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:thinkphp:thinkphp:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1.3", + "versionEndIncluding": "8.0.4", + "matchCriteriaId": "4E49985F-0F72-4C76-AC59-BE406157A940" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/nn0nkey/nn0nkey/blob/main/Thinkphp/CVE-2024-48112.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/top-think/think", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48700.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48700.json index 443074d95cd..4d99a1afc68 100644 --- a/CVE-2024/CVE-2024-487xx/CVE-2024-48700.json +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48700.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48700", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T18:15:04.407", - "lastModified": "2024-10-29T19:35:24.643", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-17T15:40:35.690", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kliqqi:kliqqi_cms:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.5.2", + "matchCriteriaId": "A4A4B686-93A3-4501-99EA-3E511EE56FDF" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ChangeYourWay/post/blob/main/CVE-2024-48700", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-581xx/CVE-2024-58134.json b/CVE-2024/CVE-2024-581xx/CVE-2024-58134.json index 3aa84d589e0..11e26c88f37 100644 --- a/CVE-2024/CVE-2024-581xx/CVE-2024-58134.json +++ b/CVE-2024/CVE-2024-581xx/CVE-2024-58134.json @@ -2,8 +2,8 @@ "id": "CVE-2024-58134", "sourceIdentifier": "9b29abf9-4ab0-4765-b253-1875cd9b441e", "published": "2025-05-03T16:15:19.310", - "lastModified": "2025-05-12T19:15:48.523", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-17T14:15:38.223", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -55,30 +55,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mojolicious:mojolicious:*:*:*:*:*:perl:*:*", + "versionStartIncluding": "0.999922", + "versionEndIncluding": "9.40", + "matchCriteriaId": "007066BB-83B9-4F4C-BAAB-261837197373" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/hashcat/hashcat/pull/4090", - "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e" + "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://github.com/mojolicious/mojo/pull/1791", - "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e" + "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://github.com/mojolicious/mojo/pull/2200", - "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e" + "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://medium.com/securing/baking-mojolicious-cookies-revisited-a-case-study-of-solving-security-problems-through-security-by-13da7c225802", - "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e" + "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://metacpan.org/release/SRI/Mojolicious-9.39/source/lib/Mojolicious.pm#L51", - "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e" + "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e", + "tags": [ + "Product" + ] }, { "url": "https://www.synacktiv.com/publications/baking-mojolicious-cookies", - "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e" + "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-581xx/CVE-2024-58135.json b/CVE-2024/CVE-2024-581xx/CVE-2024-58135.json index 594f65b31b7..950a3bb9b47 100644 --- a/CVE-2024/CVE-2024-581xx/CVE-2024-58135.json +++ b/CVE-2024/CVE-2024-581xx/CVE-2024-58135.json @@ -2,8 +2,8 @@ "id": "CVE-2024-58135", "sourceIdentifier": "9b29abf9-4ab0-4765-b253-1875cd9b441e", "published": "2025-05-03T11:15:48.037", - "lastModified": "2025-05-12T19:15:48.663", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-17T14:16:05.757", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,34 +61,77 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mojolicious:mojolicious:*:*:*:*:*:perl:*:*", + "versionStartIncluding": "7.28", + "versionEndIncluding": "9.40", + "matchCriteriaId": "18CB7F71-95D5-44DC-BD63-01394CC408B4" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/hashcat/hashcat/pull/4090", - "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e" + "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://github.com/mojolicious/mojo/pull/2200", - "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e" + "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch" + ] }, { "url": "https://metacpan.org/release/SRI/Mojolicious-7.28/source/lib/Mojolicious/Command/generate/app.pm#L220", - "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e" + "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e", + "tags": [ + "Product" + ] }, { "url": "https://metacpan.org/release/SRI/Mojolicious-9.38/source/lib/Mojolicious/Command/Author/generate/app.pm#L202", - "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e" + "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e", + "tags": [ + "Product" + ] }, { "url": "https://metacpan.org/release/SRI/Mojolicious-9.39/source/lib/Mojo/Util.pm#L181", - "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e" + "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e", + "tags": [ + "Product" + ] }, { "url": "https://perldoc.perl.org/functions/rand", - "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e" + "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e", + "tags": [ + "Product" + ] }, { "url": "https://security.metacpan.org/docs/guides/random-data-for-security.html", - "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e" + "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e", + "tags": [ + "Technical Description" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0320.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0320.json new file mode 100644 index 00000000000..c674ea3d808 --- /dev/null +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0320.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-0320", + "sourceIdentifier": "secure@citrix.com", + "published": "2025-06-17T14:15:30.270", + "lastModified": "2025-06-17T14:15:30.270", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Local Privilege escalation allows a low-privileged user to gain SYSTEM privileges in Citrix Secure Access Client for Windows" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@citrix.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "secure@citrix.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694724", + "source": "secure@citrix.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21572.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21572.json index fd834faf0e0..b0df3977db6 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21572.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21572.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21572", "sourceIdentifier": "secalert_us@oracle.com", "published": "2025-05-02T22:15:16.927", - "lastModified": "2025-05-06T15:16:01.123", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-17T14:16:23.633", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:opengrok:1.13.25:*:*:*:*:*:*:*", + "matchCriteriaId": "052D26CE-749F-4CE2-8B93-8813CFD630CE" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/all-oracle-cves-outside-other-oracle-public-documents.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24761.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24761.json new file mode 100644 index 00000000000..301f2828549 --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24761.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24761", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:40.800", + "lastModified": "2025-06-17T15:15:40.800", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in snstheme DSK allows PHP Local File Inclusion. This issue affects DSK: from n/a through 2.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/theme/dsk/vulnerability/wordpress-dsk-2-2-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24773.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24773.json new file mode 100644 index 00000000000..d4734b68f2b --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24773.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24773", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:40.940", + "lastModified": "2025-06-17T15:15:40.940", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in mojoomla WPCRM - CRM for Contact form CF7 & WooCommerce allows SQL Injection. This issue affects WPCRM - CRM for Contact form CF7 & WooCommerce: from n/a through 3.2.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wpcrm/vulnerability/wordpress-wpcrm-crm-for-contact-form-cf7-woocommerce-3-2-0-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-255xx/CVE-2025-25504.json b/CVE-2025/CVE-2025-255xx/CVE-2025-25504.json index 2a7d9afac91..1c4edd6b4a6 100644 --- a/CVE-2025/CVE-2025-255xx/CVE-2025-25504.json +++ b/CVE-2025/CVE-2025-255xx/CVE-2025-25504.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25504", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-05T16:15:50.640", - "lastModified": "2025-05-05T20:54:19.760", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-17T14:13:16.263", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -55,14 +55,82 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:niceforyou:gefen_webfwc:1.70v:*:*:*:*:*:*:*", + "matchCriteriaId": "AD283856-18D2-4625-8A88-D3F9DFA31610" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:niceforyou:gefen_gf-avip-mc_firmware:a5.22:*:*:*:*:*:*:*", + "matchCriteriaId": "E81DB305-DDB0-48A6-A171-F1F3ED3EA816" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:niceforyou:gefen_webfwc:1.85h:*:*:*:*:*:*:*", + "matchCriteriaId": "D58769C1-827B-4963-A00D-2C1B389EE396" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:niceforyou:gefen_webfwc:1.86v:*:*:*:*:*:*:*", + "matchCriteriaId": "EE973A49-081A-4CA1-BFCA-F71E1FC36FD4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:niceforyou:gefen_gf-avip-mc_firmware:a5.310:*:*:*:*:*:*:*", + "matchCriteriaId": "C404DBC9-0EE7-4BD1-90DC-B09D4FBA5775" + } + ] + } + ] + } + ], "references": [ { "url": "http://gefen.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://www.troy-wilson.com/cve-2025-25504.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-280xx/CVE-2025-28062.json b/CVE-2025/CVE-2025-280xx/CVE-2025-28062.json index 56aaeb46457..abb2ecaca68 100644 --- a/CVE-2025/CVE-2025-280xx/CVE-2025-28062.json +++ b/CVE-2025/CVE-2025-280xx/CVE-2025-28062.json @@ -2,8 +2,8 @@ "id": "CVE-2025-28062", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-05T16:15:51.310", - "lastModified": "2025-05-13T20:15:27.343", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-17T14:13:04.563", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,42 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:frappe:erpnext:14.74.3:*:*:*:*:*:*:*", + "matchCriteriaId": "5CF42DBE-9321-4CC3-9093-3CAB462BCDFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:frappe:erpnext:14.82.1:*:*:*:*:*:*:*", + "matchCriteriaId": "951326DA-FE7B-4DED-AAC5-F889C79BD830" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Thvt0ne/CVE-2025-28062", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/frappe/erpnext", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-281xx/CVE-2025-28168.json b/CVE-2025/CVE-2025-281xx/CVE-2025-28168.json index 41b0ba880de..3afd0e6fe11 100644 --- a/CVE-2025/CVE-2025-281xx/CVE-2025-28168.json +++ b/CVE-2025/CVE-2025-281xx/CVE-2025-28168.json @@ -2,8 +2,8 @@ "id": "CVE-2025-28168", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-05T14:15:28.500", - "lastModified": "2025-05-08T18:15:42.197", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-17T14:15:20.720", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -81,14 +81,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:multiple_file_upload_project:multiple_file_upload:3.1.0:*:*:*:*:outsystems:*:*", + "matchCriteriaId": "7FC6134C-BD60-43D3-A3C7-C2FB4740B03D" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/IamLeandrooooo/01090be3023f5e7c7397bb9b1f5505b9", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.outsystems.com/forge/component-overview/200/multiple-file-upload-o11", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-289xx/CVE-2025-28972.json b/CVE-2025/CVE-2025-289xx/CVE-2025-28972.json new file mode 100644 index 00000000000..dc5c8a83722 --- /dev/null +++ b/CVE-2025/CVE-2025-289xx/CVE-2025-28972.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-28972", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:41.077", + "lastModified": "2025-06-17T15:15:41.077", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Suhas Surse WP Employee Attendance System allows Blind SQL Injection. This issue affects WP Employee Attendance System: from n/a through 3.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-employee-attendance-system/vulnerability/wordpress-wp-employee-attendance-system-3-5-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-289xx/CVE-2025-28991.json b/CVE-2025/CVE-2025-289xx/CVE-2025-28991.json new file mode 100644 index 00000000000..c4b29a78485 --- /dev/null +++ b/CVE-2025/CVE-2025-289xx/CVE-2025-28991.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-28991", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:41.210", + "lastModified": "2025-06-17T15:15:41.210", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in snstheme Evon allows PHP Local File Inclusion. This issue affects Evon: from n/a through 3.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/theme/snsevon/vulnerability/wordpress-evon-3-4-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-290xx/CVE-2025-29002.json b/CVE-2025/CVE-2025-290xx/CVE-2025-29002.json new file mode 100644 index 00000000000..5a1ba7edaa3 --- /dev/null +++ b/CVE-2025/CVE-2025-290xx/CVE-2025-29002.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-29002", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:41.360", + "lastModified": "2025-06-17T15:15:41.360", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in snstheme Simen allows PHP Local File Inclusion. This issue affects Simen: from n/a through 4.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/theme/snssimen/vulnerability/wordpress-simen-4-6-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30562.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30562.json new file mode 100644 index 00000000000..87422c49b25 --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30562.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30562", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:41.507", + "lastModified": "2025-06-17T15:15:41.507", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in wpdistillery Navigation Tree Elementor allows Blind SQL Injection. This issue affects Navigation Tree Elementor: from n/a through 1.0.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/navigation-tree-elementor/vulnerability/wordpress-navigation-tree-elementor-1-0-1-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30618.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30618.json new file mode 100644 index 00000000000..7115f8665af --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30618.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30618", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:41.650", + "lastModified": "2025-06-17T15:15:41.650", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of Untrusted Data vulnerability in yuliaz Rapyd Payment Extension for WooCommerce allows Object Injection. This issue affects Rapyd Payment Extension for WooCommerce: from n/a through 1.2.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/rapyd-payments/vulnerability/wordpress-rapyd-payment-extension-for-woocommerce-1-1-9-php-object-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-309xx/CVE-2025-30988.json b/CVE-2025/CVE-2025-309xx/CVE-2025-30988.json new file mode 100644 index 00000000000..24b7b9ef610 --- /dev/null +++ b/CVE-2025/CVE-2025-309xx/CVE-2025-30988.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30988", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:41.793", + "lastModified": "2025-06-17T15:15:41.793", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in _CreativeMedia_ Elite Video Player allows Stored XSS. This issue affects Elite Video Player: from n/a through 10.0.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/elite-video-player/vulnerability/wordpress-elite-video-player-10-0-5-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-319xx/CVE-2025-31919.json b/CVE-2025/CVE-2025-319xx/CVE-2025-31919.json new file mode 100644 index 00000000000..eceb2addcd9 --- /dev/null +++ b/CVE-2025/CVE-2025-319xx/CVE-2025-31919.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-31919", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:41.943", + "lastModified": "2025-06-17T15:15:41.943", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of Untrusted Data vulnerability in themeton Spare allows Object Injection. This issue affects Spare: from n/a through 1.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/theme/spare/vulnerability/wordpress-spare-1-7-php-object-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32510.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32510.json new file mode 100644 index 00000000000..73556dfd033 --- /dev/null +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32510.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32510", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:42.093", + "lastModified": "2025-06-17T15:15:42.093", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Unrestricted Upload of File with Dangerous Type vulnerability in ovatheme Ovatheme Events Manager allows Using Malicious Files. This issue affects Ovatheme Events Manager: from n/a through 1.7.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 10.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/ova-events-manager/vulnerability/wordpress-ovatheme-events-manager-plugin-1-7-5-arbitrary-file-upload-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32549.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32549.json new file mode 100644 index 00000000000..744bd1e5b49 --- /dev/null +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32549.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32549", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:42.247", + "lastModified": "2025-06-17T15:15:42.247", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in mojoomla WPGYM allows PHP Local File Inclusion. This issue affects WPGYM: from n/a through 65.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/gym-management/vulnerability/wordpress-wpgym-65-0-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-345xx/CVE-2025-34508.json b/CVE-2025/CVE-2025-345xx/CVE-2025-34508.json new file mode 100644 index 00000000000..53479272169 --- /dev/null +++ b/CVE-2025/CVE-2025-345xx/CVE-2025-34508.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-34508", + "sourceIdentifier": "disclosure@vulncheck.com", + "published": "2025-06-17T15:15:42.407", + "lastModified": "2025-06-17T15:15:42.407", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A path traversal vulnerability exists in the file dropoff functionality \nof ZendTo versions 6.15-7 and prior. This could allow a remote, authenticated attacker to retrieve the files of other ZendTo users, retrieve files on the host \nsystem, or cause a denial of service." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://horizon3.ai/attack-research/attack-blogs/cve-2025-34508-another-file-sharing-application-another-path-traversal/", + "source": "disclosure@vulncheck.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-35xx/CVE-2025-3517.json b/CVE-2025/CVE-2025-35xx/CVE-2025-3517.json index 751b141d774..8d4f72a3838 100644 --- a/CVE-2025/CVE-2025-35xx/CVE-2025-3517.json +++ b/CVE-2025/CVE-2025-35xx/CVE-2025-3517.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3517", "sourceIdentifier": "security@devolutions.net", "published": "2025-05-01T19:15:58.517", - "lastModified": "2025-05-02T13:52:51.693", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-17T14:18:39.783", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2025.1.6.0", + "matchCriteriaId": "3DDC73A7-6F06-4BB1-9C50-2EFE929D55CD" + } + ] + } + ] + } + ], "references": [ { "url": "https://devolutions.net/security/advisories/DEVO-2025-0006/", - "source": "security@devolutions.net" + "source": "security@devolutions.net", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-394xx/CVE-2025-39479.json b/CVE-2025/CVE-2025-394xx/CVE-2025-39479.json new file mode 100644 index 00000000000..0c8e3f3ca44 --- /dev/null +++ b/CVE-2025/CVE-2025-394xx/CVE-2025-39479.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39479", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:42.567", + "lastModified": "2025-06-17T15:15:42.567", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in smartiolabs Smart Notification allows Blind SQL Injection. This issue affects Smart Notification: from n/a through 10.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/smio-push-notification/vulnerability/wordpress-smart-notification-plugin-10-3-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-394xx/CVE-2025-39486.json b/CVE-2025/CVE-2025-394xx/CVE-2025-39486.json new file mode 100644 index 00000000000..c7cebc64a7b --- /dev/null +++ b/CVE-2025/CVE-2025-394xx/CVE-2025-39486.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39486", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:42.727", + "lastModified": "2025-06-17T15:15:42.727", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ValvePress Rankie allows SQL Injection. This issue affects Rankie: from n/a through n/a." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/valvepress-rankie/vulnerability/wordpress-rankie-plugin-1-8-2-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-395xx/CVE-2025-39508.json b/CVE-2025/CVE-2025-395xx/CVE-2025-39508.json new file mode 100644 index 00000000000..5ec02a3c7a6 --- /dev/null +++ b/CVE-2025/CVE-2025-395xx/CVE-2025-39508.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-39508", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:42.873", + "lastModified": "2025-06-17T15:15:42.873", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NasaTheme Nasa Core allows Reflected XSS. This issue affects Nasa Core: from n/a through 6.3.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/nasa-core/vulnerability/wordpress-nasa-core-plugin-6-3-2-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-39xx/CVE-2025-3927.json b/CVE-2025/CVE-2025-39xx/CVE-2025-3927.json index 6818ab1a496..8d12952a20f 100644 --- a/CVE-2025/CVE-2025-39xx/CVE-2025-3927.json +++ b/CVE-2025/CVE-2025-39xx/CVE-2025-3927.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3927", "sourceIdentifier": "cret@cert.org", "published": "2025-05-02T15:15:49.017", - "lastModified": "2025-05-12T16:15:24.823", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-17T14:18:20.087", + "vulnStatus": "Analyzed", "cveTags": [ { "sourceIdentifier": "cret@cert.org", @@ -46,14 +46,49 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:digigram:pyko-out:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0DE1AE15-833F-4E8C-9A8D-621552D371B7" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.digigram.com/download/pyko-out-user-manual-en-jan-2019/", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "Product" + ] }, { "url": "https://www.kb.cert.org/vuls/id/360686", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-41xx/CVE-2025-4178.json b/CVE-2025/CVE-2025-41xx/CVE-2025-4178.json index d6df59ea868..02ee85f0390 100644 --- a/CVE-2025/CVE-2025-41xx/CVE-2025-4178.json +++ b/CVE-2025/CVE-2025-41xx/CVE-2025-4178.json @@ -2,8 +2,8 @@ "id": "CVE-2025-4178", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-01T22:15:18.140", - "lastModified": "2025-05-02T18:15:27.780", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-17T14:18:28.283", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 } ], "cvssMetricV2": [ @@ -120,26 +140,75 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xiaowei1118:java_server:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2019-09-22", + "matchCriteriaId": "A68DDC2A-D82D-4D37-87E3-7DEFAEEFF8A5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250418-02.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.306797", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.306797", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.561794", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250418-02.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-42xx/CVE-2025-4215.json b/CVE-2025/CVE-2025-42xx/CVE-2025-4215.json index a44ff5e1f18..49a656dadc1 100644 --- a/CVE-2025/CVE-2025-42xx/CVE-2025-4215.json +++ b/CVE-2025/CVE-2025-42xx/CVE-2025-4215.json @@ -2,8 +2,8 @@ "id": "CVE-2025-4215", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-02T21:15:23.893", - "lastModified": "2025-06-12T01:15:26.443", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-17T14:17:53.467", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 3.7, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 } ], "cvssMetricV2": [ @@ -122,36 +142,185 @@ "value": "CWE-1333" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1333" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ublockorigin:ublock_origin:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.63.3", + "matchCriteriaId": "E79DA830-EA8C-47B6-BD7F-0842DEC5F88C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ublockorigin:ublock_origin:1.63.3:beta1:*:*:*:*:*:*", + "matchCriteriaId": "79A4228B-1FA0-4150-8D6F-814F1DB61AE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ublockorigin:ublock_origin:1.63.3:beta10:*:*:*:*:*:*", + "matchCriteriaId": "0DACB05D-3A30-4ADE-A265-7EA081710055" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ublockorigin:ublock_origin:1.63.3:beta11:*:*:*:*:*:*", + "matchCriteriaId": "A06C4A41-F9F3-4FD8-88FE-D245B462E881" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ublockorigin:ublock_origin:1.63.3:beta12:*:*:*:*:*:*", + "matchCriteriaId": "05C5AE9C-2C38-44C8-BA47-A274E45CCE20" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ublockorigin:ublock_origin:1.63.3:beta13:*:*:*:*:*:*", + "matchCriteriaId": "C5BB4A6D-F31D-48D2-853C-0631DD9FA574" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ublockorigin:ublock_origin:1.63.3:beta14:*:*:*:*:*:*", + "matchCriteriaId": "FEBC2AC0-72E3-4879-8360-D10C766FA618" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ublockorigin:ublock_origin:1.63.3:beta15:*:*:*:*:*:*", + "matchCriteriaId": "7437C121-9E8F-4A04-ACEF-25CD49AB1EE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ublockorigin:ublock_origin:1.63.3:beta16:*:*:*:*:*:*", + "matchCriteriaId": "7F39A0E7-A745-49CB-93A0-06E3E6B622DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ublockorigin:ublock_origin:1.63.3:beta2:*:*:*:*:*:*", + "matchCriteriaId": "07374522-6C44-4037-A81C-AED82D4AB365" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ublockorigin:ublock_origin:1.63.3:beta3:*:*:*:*:*:*", + "matchCriteriaId": "85EB1169-3841-4D09-A747-17CE738A91B3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ublockorigin:ublock_origin:1.63.3:beta4:*:*:*:*:*:*", + "matchCriteriaId": "887E88B7-3905-487F-9462-D32F234D0FC1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ublockorigin:ublock_origin:1.63.3:beta5:*:*:*:*:*:*", + "matchCriteriaId": "6FB0CF01-BD25-441D-B3D3-B4C948211B12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ublockorigin:ublock_origin:1.63.3:beta6:*:*:*:*:*:*", + "matchCriteriaId": "1BCA6D91-F17D-4E7C-B986-58C4E1313522" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ublockorigin:ublock_origin:1.63.3:beta7:*:*:*:*:*:*", + "matchCriteriaId": "0178FB98-7B4D-45F4-9880-8B471AA5702A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ublockorigin:ublock_origin:1.63.3:beta8:*:*:*:*:*:*", + "matchCriteriaId": "9EC0A01E-DB43-487A-BDA9-5EAB05670DBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ublockorigin:ublock_origin:1.63.3:beta9:*:*:*:*:*:*", + "matchCriteriaId": "43563BB4-DE44-4780-A963-B73161987B1B" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/gorhill/uBlock/commit/eaedaf5b10d2f7857c6b77fbf7d4a80681d4d46c", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Patch" + ] }, { "url": "https://github.com/gorhill/uBlock/releases/tag/1.63.3b17", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://vuldb.com/?ctiid.307194", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.307194", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.562301", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2025/06/msg00013.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://github.com/gorhill/uBlock/commit/eaedaf5b10d2f7857c6b77fbf7d4a80681d4d46c", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-42xx/CVE-2025-4218.json b/CVE-2025/CVE-2025-42xx/CVE-2025-4218.json index 0b8e789b12f..9b3ab0ef63e 100644 --- a/CVE-2025/CVE-2025-42xx/CVE-2025-4218.json +++ b/CVE-2025/CVE-2025-42xx/CVE-2025-4218.json @@ -2,8 +2,8 @@ "id": "CVE-2025-4218", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-02T21:15:24.057", - "lastModified": "2025-05-05T20:54:19.760", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-17T14:16:53.353", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,32 +142,83 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:andrewhhan:browserpilot:*:*:*:*:*:*:*:*", + "versionEndIncluding": "0.2.51", + "matchCriteriaId": "6FB7E480-79E2-4AA5-A75E-3E322D2F0B1A" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/handrew/browserpilot/issues/20", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://github.com/handrew/browserpilot/issues/20#issue-2999815850", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.307195", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.307195", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.562383", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/handrew/browserpilot/issues/20", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-432xx/CVE-2025-43200.json b/CVE-2025/CVE-2025-432xx/CVE-2025-43200.json index e5b503b5f01..d9e52ca69a0 100644 --- a/CVE-2025/CVE-2025-432xx/CVE-2025-43200.json +++ b/CVE-2025/CVE-2025-432xx/CVE-2025-43200.json @@ -2,56 +2,220 @@ "id": "CVE-2025-43200", "sourceIdentifier": "product-security@apple.com", "published": "2025-06-16T22:16:41.120", - "lastModified": "2025-06-17T01:00:02.367", - "vulnStatus": "Received", + "lastModified": "2025-06-17T15:52:31.157", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed with improved checks. This issue is fixed in watchOS 11.3.1, macOS Ventura 13.7.4, iOS 15.8.4 and iPadOS 15.8.4, iOS 16.7.11 and iPadOS 16.7.11, iPadOS 17.7.5, visionOS 2.3.1, macOS Sequoia 15.3.1, iOS 18.3.1 and iPadOS 18.3.1, macOS Sonoma 14.7.4. A logic issue existed when processing a maliciously crafted photo or video shared via an iCloud Link. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 mejorando las comprobaciones. Este problema se solucion\u00f3 en watchOS 11.3.1, macOS Ventura 13.7.4, iOS 15.8.4 y iPadOS 15.8.4, iOS 16.7.11 y iPadOS 16.7.11, iPadOS 17.7.5, visionOS 2.3.1, macOS Sequoia 15.3.1, iOS 18.3.1 y iPadOS 18.3.1, y macOS Sonoma 14.7.4. Exist\u00eda un problema l\u00f3gico al procesar una foto o un v\u00eddeo creado con fines maliciosos compartidos a trav\u00e9s de un enlace de iCloud. Apple tiene conocimiento de un informe que indica que este problema podr\u00eda haber sido explotado en un ataque extremadamente sofisticado contra personas espec\u00edficas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 2.5 + } + ] + }, "cisaExploitAdd": "2025-06-16", "cisaActionDue": "2025-07-07", "cisaRequiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "Apple Multiple Products Unspecified Vulnerability", + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.8.4", + "matchCriteriaId": "307F4698-5786-4CA5-98A8-E3AAF1E7A09D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0", + "versionEndExcluding": "16.7.11", + "matchCriteriaId": "9323964E-AE9A-46DB-8E97-C74E77C914E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.7.5", + "matchCriteriaId": "FE5060E3-0884-40C3-B9EE-B0A72B7E400F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartIncluding": "18.0", + "versionEndExcluding": "18.3.1", + "matchCriteriaId": "A77F4D69-3C11-4074-A7E6-C85767F026EF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.8.4", + "matchCriteriaId": "F8A92F23-F3AF-4365-B405-70AFC1D9ECB3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0", + "versionEndIncluding": "16.7.11", + "matchCriteriaId": "53A97BDC-343C-4767-BE85-21CB53EEC517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndIncluding": "18.3.1", + "matchCriteriaId": "36145355-2878-4236-B2B7-ED32AEFD3862" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.4", + "matchCriteriaId": "2B4C5FF9-09CB-426B-AFE2-519E7AB7EA4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.4", + "matchCriteriaId": "D1B00E67-4EE3-49F8-9087-8C2FC95C9C6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.3.1", + "matchCriteriaId": "5A4E86B3-4331-4C55-9B1F-A15A5FC88BA9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.3.1", + "matchCriteriaId": "57566A2E-9B11-405D-8C46-F8FE45DA464B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "11.3.1", + "matchCriteriaId": "F898D7BC-247F-434F-9F95-7771723C4F5C" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122173", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122174", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122345", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122346", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122900", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122901", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122902", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122903", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122904", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://citizenlab.ca/2025/06/first-forensic-confirmation-of-paragons-ios-mercenary-spyware-finds-journalists-targeted/", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Press/Media Coverage" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-439xx/CVE-2025-43915.json b/CVE-2025/CVE-2025-439xx/CVE-2025-43915.json index c13a851e5db..fd0162cb45a 100644 --- a/CVE-2025/CVE-2025-439xx/CVE-2025-43915.json +++ b/CVE-2025/CVE-2025-439xx/CVE-2025-43915.json @@ -2,8 +2,8 @@ "id": "CVE-2025-43915", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-05T17:18:49.603", - "lastModified": "2025-05-19T16:15:30.010", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-17T14:12:57.600", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,73 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:linkerd:buoyant:*:*:*:*:enterprise:linkerd:*:*", + "versionStartIncluding": "2.13.0", + "versionEndIncluding": "2.13.7", + "matchCriteriaId": "C9742371-D40C-41C4-B2BF-549DFD744D25" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:linkerd:buoyant:*:*:*:*:enterprise:linkerd:*:*", + "versionStartIncluding": "2.14.0", + "versionEndIncluding": "2.14.10", + "matchCriteriaId": "50AC0938-14D0-4C9F-91A2-AE672D698440" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:linkerd:buoyant:*:*:*:*:enterprise:linkerd:*:*", + "versionStartIncluding": "2.15.0", + "versionEndIncluding": "2.15.7", + "matchCriteriaId": "DFA5823A-8764-4DA2-B581-98C81EB8595C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:linkerd:buoyant:*:*:*:*:enterprise:linkerd:*:*", + "versionStartIncluding": "2.16.0", + "versionEndExcluding": "2.16.5", + "matchCriteriaId": "4958DFE3-9F0F-4B67-9BBC-F94D3A006DFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:linkerd:buoyant:*:*:*:*:enterprise:linkerd:*:*", + "versionStartIncluding": "2.17.0", + "versionEndExcluding": "2.17.2", + "matchCriteriaId": "23536DA5-20CE-4B36-BB34-5487C7CFF3E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:linkerd:linkerd:*:*:*:*:edge:kubernetes:*:*", + "versionEndExcluding": "25.2.1", + "matchCriteriaId": "345C63E1-3AC0-4698-9066-DCD4B3DCD8E4" + } + ] + } + ] + } + ], "references": [ { "url": "https://docs.buoyant.io/security/advisories/2025-01/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.buoyant.io/resources", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-43xx/CVE-2025-4316.json b/CVE-2025/CVE-2025-43xx/CVE-2025-4316.json index e36fe0f52d2..335493a39b5 100644 --- a/CVE-2025/CVE-2025-43xx/CVE-2025-4316.json +++ b/CVE-2025/CVE-2025-43xx/CVE-2025-4316.json @@ -2,8 +2,8 @@ "id": "CVE-2025-4316", "sourceIdentifier": "security@devolutions.net", "published": "2025-05-05T14:15:29.930", - "lastModified": "2025-05-14T13:15:48.907", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-17T14:13:42.267", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.3.17.0", + "matchCriteriaId": "30844EBB-E284-4CCF-B7A3-48B74A9BF5DC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2025.1.3.0", + "versionEndExcluding": "2025.1.7.0", + "matchCriteriaId": "29B618AF-ED49-494B-BCDB-1135D3221F1A" + } + ] + } + ] + } + ], "references": [ { "url": "https://devolutions.net/security/advisories/DEVO-2025-0007/", - "source": "security@devolutions.net" + "source": "security@devolutions.net", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-44xx/CVE-2025-4404.json b/CVE-2025/CVE-2025-44xx/CVE-2025-4404.json new file mode 100644 index 00000000000..04304eca646 --- /dev/null +++ b/CVE-2025/CVE-2025-44xx/CVE-2025-4404.json @@ -0,0 +1,104 @@ +{ + "id": "CVE-2025-4404", + "sourceIdentifier": "secalert@redhat.com", + "published": "2025-06-17T14:15:32.743", + "lastModified": "2025-06-17T15:15:53.147", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A privilege escalation from host to domain vulnerability was found in the FreeIPA project. The FreeIPA package fails to validate the uniqueness of the `krbCanonicalName` for the admin account by default, allowing users to create services with the same canonical name as the REALM admin. When a successful attack happens, the user can retrieve a Kerberos ticket in the name of this service, containing the admin@REALM credential. This flaw allows an attacker to perform administrative tasks over the REALM, leading to access to sensitive data and sensitive data exfiltration." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1220" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2025:9184", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:9185", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:9186", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:9187", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:9188", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:9189", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:9190", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:9191", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:9192", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:9193", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:9194", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/security/cve/CVE-2025-4404", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2364606", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-452xx/CVE-2025-45242.json b/CVE-2025/CVE-2025-452xx/CVE-2025-45242.json index 0c6c7c7492a..f71ab6d76fa 100644 --- a/CVE-2025/CVE-2025-452xx/CVE-2025-45242.json +++ b/CVE-2025/CVE-2025-452xx/CVE-2025-45242.json @@ -2,8 +2,8 @@ "id": "CVE-2025-45242", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-05T17:18:50.540", - "lastModified": "2025-05-05T20:54:19.760", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-17T14:12:39.773", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rhymix:rhymix:2.1.22:*:*:*:*:*:*:*", + "matchCriteriaId": "082A9480-66FD-4EB1-B11F-491F5BDF0194" + } + ] + } + ] + } + ], "references": [ { "url": "http://rhymix.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://gist.github.com/chao112122/536a55fece5f578b90cee2c841eecdce", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/rhymix/rhymix", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-465xx/CVE-2025-46567.json b/CVE-2025/CVE-2025-465xx/CVE-2025-46567.json index b6c912d1fbe..8e43709bab7 100644 --- a/CVE-2025/CVE-2025-465xx/CVE-2025-46567.json +++ b/CVE-2025/CVE-2025-465xx/CVE-2025-46567.json @@ -2,8 +2,8 @@ "id": "CVE-2025-46567", "sourceIdentifier": "security-advisories@github.com", "published": "2025-05-01T18:15:58.117", - "lastModified": "2025-05-02T18:15:27.260", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-17T14:19:39.290", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.3, "impactScore": 4.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -51,18 +71,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hiyouga:llama-factory:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.0", + "matchCriteriaId": "CCE62620-4488-49A9-BA7B-C8E2790768AC" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/hiyouga/LLaMA-Factory/commit/2989d39239d2f46e584c1e1180ba46b9768afb2a", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/hiyouga/LLaMA-Factory/security/advisories/GHSA-f2f7-gj54-6vpv", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/hiyouga/LLaMA-Factory/security/advisories/GHSA-f2f7-gj54-6vpv", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-465xx/CVE-2025-46568.json b/CVE-2025/CVE-2025-465xx/CVE-2025-46568.json index 83c3231b5e9..58b3dc43198 100644 --- a/CVE-2025/CVE-2025-465xx/CVE-2025-46568.json +++ b/CVE-2025/CVE-2025-465xx/CVE-2025-46568.json @@ -2,8 +2,8 @@ "id": "CVE-2025-46568", "sourceIdentifier": "security-advisories@github.com", "published": "2025-05-01T18:15:58.263", - "lastModified": "2025-05-02T14:15:19.860", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-17T14:19:19.067", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } ] }, "weaknesses": [ @@ -73,14 +95,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:stirlingpdf:stirling_pdf:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.45.0", + "matchCriteriaId": "4BA2DA40-27DC-43EF-8B84-E803B5320D23" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Stirling-Tools/Stirling-PDF/security/advisories/GHSA-998c-x8hx-737r", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/Stirling-Tools/Stirling-PDF/security/advisories/GHSA-998c-x8hx-737r", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-467xx/CVE-2025-46724.json b/CVE-2025/CVE-2025-467xx/CVE-2025-46724.json index e117a08081a..f9d487228ce 100644 --- a/CVE-2025/CVE-2025-467xx/CVE-2025-46724.json +++ b/CVE-2025/CVE-2025-467xx/CVE-2025-46724.json @@ -2,8 +2,8 @@ "id": "CVE-2025-46724", "sourceIdentifier": "security-advisories@github.com", "published": "2025-05-20T18:15:46.430", - "lastModified": "2025-05-21T20:24:58.133", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-17T14:11:48.377", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:langroid:langroid:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.53.15", + "matchCriteriaId": "FBE9F987-C1AA-4EB5-A30A-935D89DB9EA7" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/langroid/langroid/commit/0d9e4a7bb3ae2eef8d38f2e970ff916599a2b2a6", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/langroid/langroid/security/advisories/GHSA-jqq5-wc57-f8hj", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/langroid/langroid/security/advisories/GHSA-jqq5-wc57-f8hj", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-474xx/CVE-2025-47452.json b/CVE-2025/CVE-2025-474xx/CVE-2025-47452.json new file mode 100644 index 00000000000..457ccdafddd --- /dev/null +++ b/CVE-2025/CVE-2025-474xx/CVE-2025-47452.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47452", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:43.227", + "lastModified": "2025-06-17T15:15:43.227", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Unrestricted Upload of File with Dangerous Type vulnerability in RexTheme WP VR allows Upload a Web Shell to a Web Server. This issue affects WP VR: from n/a through 8.5.26." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.9, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wpvr/vulnerability/wordpress-wp-vr-8-5-26-arbitrary-file-upload-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-475xx/CVE-2025-47559.json b/CVE-2025/CVE-2025-475xx/CVE-2025-47559.json new file mode 100644 index 00000000000..34ac0f1665d --- /dev/null +++ b/CVE-2025/CVE-2025-475xx/CVE-2025-47559.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47559", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:43.397", + "lastModified": "2025-06-17T15:15:43.397", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Unrestricted Upload of File with Dangerous Type vulnerability in RomanCode MapSVG allows Upload a Web Shell to a Web Server. This issue affects MapSVG: from n/a through 8.5.32." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.9, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/mapsvg/vulnerability/wordpress-mapsvg-plugin-8-5-32-arbitrary-file-upload-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-475xx/CVE-2025-47572.json b/CVE-2025/CVE-2025-475xx/CVE-2025-47572.json new file mode 100644 index 00000000000..0c3153b2fc0 --- /dev/null +++ b/CVE-2025/CVE-2025-475xx/CVE-2025-47572.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47572", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:43.573", + "lastModified": "2025-06-17T15:15:43.573", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in mojoomla School Management allows PHP Local File Inclusion. This issue affects School Management: from n/a through 93.0.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/school-management/vulnerability/wordpress-school-management-93-0-0-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-475xx/CVE-2025-47573.json b/CVE-2025/CVE-2025-475xx/CVE-2025-47573.json new file mode 100644 index 00000000000..02b40b4e1ec --- /dev/null +++ b/CVE-2025/CVE-2025-475xx/CVE-2025-47573.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47573", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:43.947", + "lastModified": "2025-06-17T15:15:43.947", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in mojoomla School Management allows Blind SQL Injection. This issue affects School Management: from n/a through 92.0.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/school-management/vulnerability/wordpress-school-management-system-plugin-92-0-0-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-47xx/CVE-2025-4754.json b/CVE-2025/CVE-2025-47xx/CVE-2025-4754.json new file mode 100644 index 00000000000..6220c836ea5 --- /dev/null +++ b/CVE-2025/CVE-2025-47xx/CVE-2025-4754.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-4754", + "sourceIdentifier": "6b3ad84c-e1a6-4bf7-a703-f496b71e49db", + "published": "2025-06-17T15:15:53.273", + "lastModified": "2025-06-17T15:15:53.273", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insufficient Session Expiration vulnerability in ash-project ash_authentication_phoenix allows Session Hijacking. This vulnerability is associated with program files lib/ash_authentication_phoenix/controller.ex.\n\nThis issue affects ash_authentication_phoenix until 2.10.0." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "6b3ad84c-e1a6-4bf7-a703-f496b71e49db", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 2.3, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "6b3ad84c-e1a6-4bf7-a703-f496b71e49db", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-613" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/team-alembic/ash_authentication_phoenix/pull/634", + "source": "6b3ad84c-e1a6-4bf7-a703-f496b71e49db" + }, + { + "url": "https://github.com/team-alembic/ash_authentication_phoenix/security/advisories/GHSA-f7gq-h8jv-h3cq", + "source": "6b3ad84c-e1a6-4bf7-a703-f496b71e49db" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-481xx/CVE-2025-48111.json b/CVE-2025/CVE-2025-481xx/CVE-2025-48111.json new file mode 100644 index 00000000000..481ce589119 --- /dev/null +++ b/CVE-2025/CVE-2025-481xx/CVE-2025-48111.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-48111", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:44.133", + "lastModified": "2025-06-17T15:15:44.133", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in YITHEMES YITH PayPal Express Checkout for WooCommerce allows Cross Site Request Forgery. This issue affects YITH PayPal Express Checkout for WooCommerce: from n/a through 1.49.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/yith-paypal-express-checkout-for-woocommerce/vulnerability/wordpress-yith-paypal-express-checkout-for-woocommerce-plugin-1-49-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-481xx/CVE-2025-48118.json b/CVE-2025/CVE-2025-481xx/CVE-2025-48118.json new file mode 100644 index 00000000000..b8a71c26160 --- /dev/null +++ b/CVE-2025/CVE-2025-481xx/CVE-2025-48118.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-48118", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:44.350", + "lastModified": "2025-06-17T15:15:44.350", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WpExperts Hub Woocommerce Partial Shipment allows SQL Injection. This issue affects Woocommerce Partial Shipment: from n/a through 3.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wc-partial-shipment/vulnerability/wordpress-woocommerce-partial-shipment-3-2-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-481xx/CVE-2025-48145.json b/CVE-2025/CVE-2025-481xx/CVE-2025-48145.json new file mode 100644 index 00000000000..068c874f424 --- /dev/null +++ b/CVE-2025/CVE-2025-481xx/CVE-2025-48145.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-48145", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:44.513", + "lastModified": "2025-06-17T15:15:44.513", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Michal Jaworski Track, Analyze & Optimize by WP Tao allows Reflected XSS. This issue affects Track, Analyze & Optimize by WP Tao: from n/a through 1.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-tao/vulnerability/wordpress-track-analyze-optimize-by-wp-tao-plugin-1-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-482xx/CVE-2025-48272.json b/CVE-2025/CVE-2025-482xx/CVE-2025-48272.json index b509d5d61d1..61f0aad823f 100644 --- a/CVE-2025/CVE-2025-482xx/CVE-2025-48272.json +++ b/CVE-2025/CVE-2025-482xx/CVE-2025-48272.json @@ -2,8 +2,8 @@ "id": "CVE-2025-48272", "sourceIdentifier": "audit@patchstack.com", "published": "2025-05-19T15:15:30.947", - "lastModified": "2025-05-21T20:25:33.823", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-17T14:10:18.237", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpjobportal:wp_job_portal:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.3.3", + "matchCriteriaId": "EEF4383E-9AFB-4394-A6AC-4012ECB81089" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/wp-job-portal/vulnerability/wordpress-wp-job-portal-2-3-2-insecure-direct-object-references-idor-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-482xx/CVE-2025-48274.json b/CVE-2025/CVE-2025-482xx/CVE-2025-48274.json new file mode 100644 index 00000000000..0a75393b01a --- /dev/null +++ b/CVE-2025/CVE-2025-482xx/CVE-2025-48274.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-48274", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:44.700", + "lastModified": "2025-06-17T15:15:44.700", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in wpjobportal WP Job Portal allows Blind SQL Injection. This issue affects WP Job Portal: from n/a through 2.3.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-job-portal/vulnerability/wordpress-wp-job-portal-2-3-2-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-483xx/CVE-2025-48333.json b/CVE-2025/CVE-2025-483xx/CVE-2025-48333.json new file mode 100644 index 00000000000..b9d7c704302 --- /dev/null +++ b/CVE-2025/CVE-2025-483xx/CVE-2025-48333.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-48333", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:44.867", + "lastModified": "2025-06-17T15:15:44.867", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPQuark eForm - WordPress Form Builder allows Reflected XSS. This issue affects eForm - WordPress Form Builder: from n/a through n/a." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-fsqm-pro/vulnerability/wordpress-eform-wordpress-form-builder-4-19-1-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48976.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48976.json index 8b9a11e5def..773013ccd8a 100644 --- a/CVE-2025/CVE-2025-489xx/CVE-2025-48976.json +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48976.json @@ -2,16 +2,55 @@ "id": "CVE-2025-48976", "sourceIdentifier": "security@apache.org", "published": "2025-06-16T15:15:24.460", - "lastModified": "2025-06-16T20:15:27.350", + "lastModified": "2025-06-17T14:15:30.637", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Allocation of resources for multipart headers with insufficient limits enabled a DoS vulnerability in Apache Commons FileUpload.\n\nThis issue affects Apache Commons FileUpload: from 1.0 before 1.6; from 2.0.0-M1 before 2.0.0-M4.\n\nUsers are recommended to upgrade to versions 1.6 or 2.0.0-M4, which fix the issue." + }, + { + "lang": "es", + "value": "La asignaci\u00f3n de recursos para encabezados multiparte con l\u00edmites insuficientes gener\u00f3 una vulnerabilidad de denegaci\u00f3n de servicio (DoS) en Apache Commons FileUpload. Este problema afecta a Apache Commons FileUpload: de la versi\u00f3n 1.0 a la 1.6; de la versi\u00f3n 2.0.0-M1 a la 2.0.0-M4. Se recomienda actualizar a las versiones 1.6 o 2.0.0-M4, que solucionan el problema." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://lists.apache.org/thread/fbs3wrr3p67vkjcxogqqqqz45pqtso12", diff --git a/CVE-2025/CVE-2025-48xx/CVE-2025-4802.json b/CVE-2025/CVE-2025-48xx/CVE-2025-4802.json index 93b142413b8..1452ad1ee09 100644 --- a/CVE-2025/CVE-2025-48xx/CVE-2025-4802.json +++ b/CVE-2025/CVE-2025-48xx/CVE-2025-4802.json @@ -2,8 +2,8 @@ "id": "CVE-2025-4802", "sourceIdentifier": "3ff69d7a-14f2-4f67-a097-88dee7810d18", "published": "2025-05-16T20:15:22.280", - "lastModified": "2025-05-20T14:15:51.347", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-17T14:09:23.137", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.27", + "versionEndIncluding": "2.38", + "matchCriteriaId": "29CCC9F6-2130-4DA8-8B5D-7A00337CBC0A" + } + ] + } + ] + } + ], "references": [ { "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32976", - "source": "3ff69d7a-14f2-4f67-a097-88dee7810d18" + "source": "3ff69d7a-14f2-4f67-a097-88dee7810d18", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://sourceware.org/cgit/glibc/commit/?id=1e18586c5820e329f741d5c710275e165581380e", - "source": "3ff69d7a-14f2-4f67-a097-88dee7810d18" + "source": "3ff69d7a-14f2-4f67-a097-88dee7810d18", + "tags": [ + "Patch" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2025/05/16/7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2025/05/17/2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-48xx/CVE-2025-4879.json b/CVE-2025/CVE-2025-48xx/CVE-2025-4879.json new file mode 100644 index 00000000000..a5eff6f9df6 --- /dev/null +++ b/CVE-2025/CVE-2025-48xx/CVE-2025-4879.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-4879", + "sourceIdentifier": "secure@citrix.com", + "published": "2025-06-17T14:15:33.170", + "lastModified": "2025-06-17T14:15:33.170", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Local Privilege escalation allows a low-privileged user to gain SYSTEM privileges in\u00a0Citrix Workspace app for Windows" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@citrix.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "secure@citrix.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694718", + "source": "secure@citrix.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-490xx/CVE-2025-49071.json b/CVE-2025/CVE-2025-490xx/CVE-2025-49071.json new file mode 100644 index 00000000000..fa3b07e1b30 --- /dev/null +++ b/CVE-2025/CVE-2025-490xx/CVE-2025-49071.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49071", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:45.130", + "lastModified": "2025-06-17T15:15:45.130", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Unrestricted Upload of File with Dangerous Type vulnerability in NasaTheme Flozen allows Upload a Web Shell to a Web Server. This issue affects Flozen: from n/a through n/a." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 10.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/theme/flozen-theme/vulnerability/wordpress-flozen-1-5-1-arbitrary-file-upload-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-491xx/CVE-2025-49124.json b/CVE-2025/CVE-2025-491xx/CVE-2025-49124.json index 62aa28f68e4..6fe6adfacc9 100644 --- a/CVE-2025/CVE-2025-491xx/CVE-2025-49124.json +++ b/CVE-2025/CVE-2025-491xx/CVE-2025-49124.json @@ -2,16 +2,43 @@ "id": "CVE-2025-49124", "sourceIdentifier": "security@apache.org", "published": "2025-06-16T15:15:24.707", - "lastModified": "2025-06-16T20:15:27.557", + "lastModified": "2025-06-17T14:15:30.940", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Untrusted Search Path vulnerability in Apache Tomcat installer for Windows. During installation, the Tomcat installer for Windows used icacls.exe without specifying a full path.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0 through 10.1.41, from 9.0.23 through 9.0.105.\n\nUsers are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue." + }, + { + "lang": "es", + "value": "Vulnerabilidad de ruta de b\u00fasqueda no confiable en el instalador de Apache Tomcat para Windows. Durante la instalaci\u00f3n, el instalador de Tomcat para Windows utiliz\u00f3 icacls.exe sin especificar una ruta completa. Este problema afecta a Apache Tomcat: de 11.0.0-M1 a 11.0.7, de 10.1.0 a 10.1.41, y de 9.0.23 a 9.0.105. Se recomienda actualizar a las versiones 11.0.8, 10.1.42 o 9.0.106, que solucionan el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2025/CVE-2025-491xx/CVE-2025-49125.json b/CVE-2025/CVE-2025-491xx/CVE-2025-49125.json index 97b79d9c812..50c8f155d62 100644 --- a/CVE-2025/CVE-2025-491xx/CVE-2025-49125.json +++ b/CVE-2025/CVE-2025-491xx/CVE-2025-49125.json @@ -2,16 +2,43 @@ "id": "CVE-2025-49125", "sourceIdentifier": "security@apache.org", "published": "2025-06-16T15:15:24.850", - "lastModified": "2025-06-16T20:15:27.650", + "lastModified": "2025-06-17T14:15:31.747", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Authentication Bypass Using an Alternate Path or Channel vulnerability in Apache Tomcat.\u00a0 When using PreResources or PostResources mounted other than at the root of the web application, it was possible to access those resources via an unexpected path. That path was likely not to be protected by the same security constraints as the expected path, allowing those security constraints to be bypassed.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105.\n\nUsers are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue." + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n mediante una ruta o canal alternativo en Apache Tomcat. Al usar recursos previos o posteriores montados en una ubicaci\u00f3n distinta a la ra\u00edz de la aplicaci\u00f3n web, era posible acceder a ellos mediante una ruta inesperada. Es probable que dicha ruta no estuviera protegida por las mismas restricciones de seguridad que la ruta esperada, lo que permiti\u00f3 eludirlas. Este problema afecta a Apache Tomcat: de la 11.0.0-M1 a la 11.0.7, de la 10.1.0-M1 a la 10.1.41 y de la 9.0.0.M1 a la 9.0.105. Se recomienda actualizar a las versiones 11.0.8, 10.1.42 o 9.0.106, que solucionan el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2025/CVE-2025-491xx/CVE-2025-49175.json b/CVE-2025/CVE-2025-491xx/CVE-2025-49175.json new file mode 100644 index 00000000000..62134627263 --- /dev/null +++ b/CVE-2025/CVE-2025-491xx/CVE-2025-49175.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-49175", + "sourceIdentifier": "secalert@redhat.com", + "published": "2025-06-17T15:15:45.290", + "lastModified": "2025-06-17T15:15:45.290", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in the X Rendering extension's handling of animated cursors. If a client provides no cursors, the server assumes at least one is present, leading to an out-of-bounds read and potential crash." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2025-49175", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2369947", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-491xx/CVE-2025-49176.json b/CVE-2025/CVE-2025-491xx/CVE-2025-49176.json new file mode 100644 index 00000000000..01f69d583d9 --- /dev/null +++ b/CVE-2025/CVE-2025-491xx/CVE-2025-49176.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-49176", + "sourceIdentifier": "secalert@redhat.com", + "published": "2025-06-17T15:15:45.470", + "lastModified": "2025-06-17T15:15:45.470", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in the Big Requests extension. The request length is multiplied by 4 before checking against the maximum allowed size, potentially causing an integer overflow and bypassing the size check." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", + "baseScore": 6.6, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2025-49176", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2369954", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-491xx/CVE-2025-49177.json b/CVE-2025/CVE-2025-491xx/CVE-2025-49177.json new file mode 100644 index 00000000000..08aff97c599 --- /dev/null +++ b/CVE-2025/CVE-2025-491xx/CVE-2025-49177.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-49177", + "sourceIdentifier": "secalert@redhat.com", + "published": "2025-06-17T15:15:45.650", + "lastModified": "2025-06-17T15:15:45.650", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in the XFIXES extension. The XFixesSetClientDisconnectMode handler does not validate the request length, allowing a client to read unintended memory from previous requests." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2025-49177", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2369955", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-491xx/CVE-2025-49178.json b/CVE-2025/CVE-2025-491xx/CVE-2025-49178.json new file mode 100644 index 00000000000..7f389cdf285 --- /dev/null +++ b/CVE-2025/CVE-2025-491xx/CVE-2025-49178.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-49178", + "sourceIdentifier": "secalert@redhat.com", + "published": "2025-06-17T15:15:45.813", + "lastModified": "2025-06-17T15:15:45.813", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in the X server's request handling. Non-zero 'bytes to ignore' in a client's request can cause the server to skip processing another client's request, potentially leading to a denial of service." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2025-49178", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2369977", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-491xx/CVE-2025-49179.json b/CVE-2025/CVE-2025-491xx/CVE-2025-49179.json new file mode 100644 index 00000000000..db224ccd594 --- /dev/null +++ b/CVE-2025/CVE-2025-491xx/CVE-2025-49179.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-49179", + "sourceIdentifier": "secalert@redhat.com", + "published": "2025-06-17T15:15:46.000", + "lastModified": "2025-06-17T15:15:46.000", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in the X Record extension. The RecordSanityCheckRegisterClients function does not check for an integer overflow when computing request length, which allows a client to bypass length checks." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", + "baseScore": 6.6, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2025-49179", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2369978", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-491xx/CVE-2025-49180.json b/CVE-2025/CVE-2025-491xx/CVE-2025-49180.json new file mode 100644 index 00000000000..5a3bd795acb --- /dev/null +++ b/CVE-2025/CVE-2025-491xx/CVE-2025-49180.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-49180", + "sourceIdentifier": "secalert@redhat.com", + "published": "2025-06-17T15:15:46.183", + "lastModified": "2025-06-17T15:15:46.183", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in the RandR extension, where the RRChangeProviderProperty function does not properly validate input. This issue leads to an integer overflow when computing the total size to allocate." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2025-49180", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2369981", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-492xx/CVE-2025-49234.json b/CVE-2025/CVE-2025-492xx/CVE-2025-49234.json new file mode 100644 index 00000000000..e1bcf194d8a --- /dev/null +++ b/CVE-2025/CVE-2025-492xx/CVE-2025-49234.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49234", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:46.353", + "lastModified": "2025-06-17T15:15:46.353", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Deepak anand WP Dummy Content Generator allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WP Dummy Content Generator: from n/a through 3.4.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-dummy-content-generator/vulnerability/wordpress-wp-dummy-content-generator-plugin-3-4-6-arbitrary-user-deletion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-492xx/CVE-2025-49251.json b/CVE-2025/CVE-2025-492xx/CVE-2025-49251.json new file mode 100644 index 00000000000..cecdf5b8653 --- /dev/null +++ b/CVE-2025/CVE-2025-492xx/CVE-2025-49251.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49251", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:46.517", + "lastModified": "2025-06-17T15:15:46.517", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in thembay Fana allows PHP Local File Inclusion. This issue affects Fana: from n/a through 1.1.28." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/theme/fana/vulnerability/wordpress-fana-1-1-28-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-492xx/CVE-2025-49252.json b/CVE-2025/CVE-2025-492xx/CVE-2025-49252.json new file mode 100644 index 00000000000..964805853d9 --- /dev/null +++ b/CVE-2025/CVE-2025-492xx/CVE-2025-49252.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49252", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:46.663", + "lastModified": "2025-06-17T15:15:46.663", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in thembay Besa allows PHP Local File Inclusion. This issue affects Besa: from n/a through 2.3.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/theme/besa/vulnerability/wordpress-besa-2-3-8-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-492xx/CVE-2025-49253.json b/CVE-2025/CVE-2025-492xx/CVE-2025-49253.json new file mode 100644 index 00000000000..ea81ecc40f1 --- /dev/null +++ b/CVE-2025/CVE-2025-492xx/CVE-2025-49253.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49253", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:46.817", + "lastModified": "2025-06-17T15:15:46.817", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in thembay Lasa allows PHP Local File Inclusion. This issue affects Lasa: from n/a through 1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/theme/lasa/vulnerability/wordpress-lasa-1-1-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-492xx/CVE-2025-49254.json b/CVE-2025/CVE-2025-492xx/CVE-2025-49254.json new file mode 100644 index 00000000000..b9ccc106d83 --- /dev/null +++ b/CVE-2025/CVE-2025-492xx/CVE-2025-49254.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49254", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:46.973", + "lastModified": "2025-06-17T15:15:46.973", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in thembay Nika allows PHP Local File Inclusion. This issue affects Nika: from n/a through 1.2.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/theme/nika/vulnerability/wordpress-nika-1-2-8-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-492xx/CVE-2025-49255.json b/CVE-2025/CVE-2025-492xx/CVE-2025-49255.json new file mode 100644 index 00000000000..a3ce45e916b --- /dev/null +++ b/CVE-2025/CVE-2025-492xx/CVE-2025-49255.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49255", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:47.127", + "lastModified": "2025-06-17T15:15:47.127", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in thembay Ruza allows PHP Local File Inclusion. This issue affects Ruza: from n/a through 1.0.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/theme/ruza/vulnerability/wordpress-ruza-1-0-7-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-492xx/CVE-2025-49256.json b/CVE-2025/CVE-2025-492xx/CVE-2025-49256.json new file mode 100644 index 00000000000..c1d3de309ab --- /dev/null +++ b/CVE-2025/CVE-2025-492xx/CVE-2025-49256.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49256", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:47.283", + "lastModified": "2025-06-17T15:15:47.283", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in thembay Sapa allows PHP Local File Inclusion. This issue affects Sapa: from n/a through 1.1.14." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/theme/sapa/vulnerability/wordpress-sapa-1-1-14-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-492xx/CVE-2025-49257.json b/CVE-2025/CVE-2025-492xx/CVE-2025-49257.json new file mode 100644 index 00000000000..6299badedef --- /dev/null +++ b/CVE-2025/CVE-2025-492xx/CVE-2025-49257.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49257", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:47.423", + "lastModified": "2025-06-17T15:15:47.423", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in thembay Zota allows PHP Local File Inclusion. This issue affects Zota: from n/a through 1.3.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/theme/zota/vulnerability/wordpress-zota-1-3-8-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-492xx/CVE-2025-49258.json b/CVE-2025/CVE-2025-492xx/CVE-2025-49258.json new file mode 100644 index 00000000000..bc807bcda49 --- /dev/null +++ b/CVE-2025/CVE-2025-492xx/CVE-2025-49258.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49258", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:47.587", + "lastModified": "2025-06-17T15:15:47.587", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in thembay Maia allows PHP Local File Inclusion. This issue affects Maia: from n/a through 1.1.15." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/theme/maia/vulnerability/wordpress-maia-1-1-15-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-492xx/CVE-2025-49259.json b/CVE-2025/CVE-2025-492xx/CVE-2025-49259.json new file mode 100644 index 00000000000..698c986186f --- /dev/null +++ b/CVE-2025/CVE-2025-492xx/CVE-2025-49259.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49259", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:47.733", + "lastModified": "2025-06-17T15:15:47.733", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in thembay Hara allows PHP Local File Inclusion. This issue affects Hara: from n/a through 1.2.10." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/theme/hara/vulnerability/wordpress-hara-1-2-10-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-492xx/CVE-2025-49260.json b/CVE-2025/CVE-2025-492xx/CVE-2025-49260.json new file mode 100644 index 00000000000..c09d06017a7 --- /dev/null +++ b/CVE-2025/CVE-2025-492xx/CVE-2025-49260.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49260", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:47.880", + "lastModified": "2025-06-17T15:15:47.880", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in thembay Aora allows PHP Local File Inclusion. This issue affects Aora: from n/a through 1.3.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/theme/aora/vulnerability/wordpress-aora-1-3-9-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-492xx/CVE-2025-49261.json b/CVE-2025/CVE-2025-492xx/CVE-2025-49261.json new file mode 100644 index 00000000000..972151ac1d5 --- /dev/null +++ b/CVE-2025/CVE-2025-492xx/CVE-2025-49261.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49261", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:48.033", + "lastModified": "2025-06-17T15:15:48.033", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in thembay Diza allows PHP Local File Inclusion. This issue affects Diza: from n/a through 1.3.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/theme/diza/vulnerability/wordpress-diza-1-3-8-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-492xx/CVE-2025-49266.json b/CVE-2025/CVE-2025-492xx/CVE-2025-49266.json new file mode 100644 index 00000000000..e9b30842cab --- /dev/null +++ b/CVE-2025/CVE-2025-492xx/CVE-2025-49266.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49266", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:48.210", + "lastModified": "2025-06-17T15:15:48.210", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rustaurius Ultimate Reviews allows Reflected XSS. This issue affects Ultimate Reviews: from n/a through 3.2.14." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/ultimate-reviews/vulnerability/wordpress-ultimate-reviews-plugin-3-2-14-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-493xx/CVE-2025-49312.json b/CVE-2025/CVE-2025-493xx/CVE-2025-49312.json new file mode 100644 index 00000000000..df0211c0c9c --- /dev/null +++ b/CVE-2025/CVE-2025-493xx/CVE-2025-49312.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49312", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:48.363", + "lastModified": "2025-06-17T15:15:48.363", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CodeRevolution Echo RSS Feed Post Generator Plugin for WordPress allows Reflected XSS. This issue affects Echo RSS Feed Post Generator Plugin for WordPress: from n/a through 5.4.8.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/rss-feed-post-generator-echo/vulnerability/wordpress-echo-rss-feed-post-generator-plugin-for-wordpress-plugin-5-4-8-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-493xx/CVE-2025-49316.json b/CVE-2025/CVE-2025-493xx/CVE-2025-49316.json new file mode 100644 index 00000000000..1ebea85e377 --- /dev/null +++ b/CVE-2025/CVE-2025-493xx/CVE-2025-49316.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49316", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:48.510", + "lastModified": "2025-06-17T15:15:48.510", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Saleswonder Team Tobias WP2LEADS allows Reflected XSS. This issue affects WP2LEADS: from n/a through 3.5.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp2leads/vulnerability/wordpress-wp2leads-plugin-3-5-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-493xx/CVE-2025-49330.json b/CVE-2025/CVE-2025-493xx/CVE-2025-49330.json new file mode 100644 index 00000000000..b660a152fa1 --- /dev/null +++ b/CVE-2025/CVE-2025-493xx/CVE-2025-49330.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49330", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:48.673", + "lastModified": "2025-06-17T15:15:48.673", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of Untrusted Data vulnerability in CRM Perks Integration for Contact Form 7 and Zoho CRM, Bigin allows Object Injection. This issue affects Integration for Contact Form 7 and Zoho CRM, Bigin: from n/a through 1.3.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/cf7-zoho/vulnerability/wordpress-integration-for-contact-form-7-and-zoho-crm-bigin-1-3-0-php-object-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-493xx/CVE-2025-49331.json b/CVE-2025/CVE-2025-493xx/CVE-2025-49331.json new file mode 100644 index 00000000000..f55eededc9e --- /dev/null +++ b/CVE-2025/CVE-2025-493xx/CVE-2025-49331.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49331", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:48.830", + "lastModified": "2025-06-17T15:15:48.830", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of Untrusted Data vulnerability in impleCode eCommerce Product Catalog allows Object Injection. This issue affects eCommerce Product Catalog: from n/a through 3.4.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/ecommerce-product-catalog/vulnerability/wordpress-ecommerce-product-catalog-3-4-3-php-object-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-494xx/CVE-2025-49415.json b/CVE-2025/CVE-2025-494xx/CVE-2025-49415.json new file mode 100644 index 00000000000..00c324156c2 --- /dev/null +++ b/CVE-2025/CVE-2025-494xx/CVE-2025-49415.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49415", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:48.977", + "lastModified": "2025-06-17T15:15:48.977", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Fastw3b LLC FW Gallery allows Path Traversal. This issue affects FW Gallery: from n/a through 8.0.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/fw-gallery/vulnerability/wordpress-fw-gallery-8-0-0-arbitrary-file-deletion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-494xx/CVE-2025-49444.json b/CVE-2025/CVE-2025-494xx/CVE-2025-49444.json new file mode 100644 index 00000000000..8e2c0d1bc69 --- /dev/null +++ b/CVE-2025/CVE-2025-494xx/CVE-2025-49444.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49444", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:49.127", + "lastModified": "2025-06-17T15:15:49.127", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Unrestricted Upload of File with Dangerous Type vulnerability in merkulove Reformer for Elementor allows Upload a Web Shell to a Web Server. This issue affects Reformer for Elementor: from n/a through 1.0.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 10.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/reformer-elementor/vulnerability/wordpress-reformer-for-elementor-1-0-5-arbitrary-file-upload-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-494xx/CVE-2025-49447.json b/CVE-2025/CVE-2025-494xx/CVE-2025-49447.json new file mode 100644 index 00000000000..428496ed5fc --- /dev/null +++ b/CVE-2025/CVE-2025-494xx/CVE-2025-49447.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49447", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:49.273", + "lastModified": "2025-06-17T15:15:49.273", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Fastw3b LLC FW Food Menu allows Using Malicious Files. This issue affects FW Food Menu : from n/a through 6.0.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 10.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/fw-food-menu/vulnerability/wordpress-fw-food-menu-6-0-0-arbitrary-file-upload-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-494xx/CVE-2025-49451.json b/CVE-2025/CVE-2025-494xx/CVE-2025-49451.json new file mode 100644 index 00000000000..ea10ba5d97b --- /dev/null +++ b/CVE-2025/CVE-2025-494xx/CVE-2025-49451.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49451", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:49.420", + "lastModified": "2025-06-17T15:15:49.420", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Path Traversal vulnerability in yannisraft Aeroscroll Gallery \u2013 Infinite Scroll Image Gallery & Post Grid with Photo Gallery allows Path Traversal. This issue affects Aeroscroll Gallery \u2013 Infinite Scroll Image Gallery & Post Grid with Photo Gallery: from n/a through 1.0.12." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-35" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/aeroscroll-gallery/vulnerability/wordpress-aeroscroll-gallery-infinite-scroll-image-gallery-post-grid-with-photo-gallery-1-0-12-directory-traversal-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-494xx/CVE-2025-49452.json b/CVE-2025/CVE-2025-494xx/CVE-2025-49452.json new file mode 100644 index 00000000000..d055d946df1 --- /dev/null +++ b/CVE-2025/CVE-2025-494xx/CVE-2025-49452.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49452", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:49.573", + "lastModified": "2025-06-17T15:15:49.573", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Adrian Lad\u00f3 PostaPanduri allows SQL Injection. This issue affects PostaPanduri: from n/a through 2.1.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/postapanduri/vulnerability/wordpress-postapanduri-2-1-3-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-495xx/CVE-2025-49508.json b/CVE-2025/CVE-2025-495xx/CVE-2025-49508.json new file mode 100644 index 00000000000..4a4292bc536 --- /dev/null +++ b/CVE-2025/CVE-2025-495xx/CVE-2025-49508.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49508", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:49.720", + "lastModified": "2025-06-17T15:15:49.720", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in LoftOcean CozyStay allows PHP Local File Inclusion. This issue affects CozyStay: from n/a through n/a." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/theme/cozystay/vulnerability/wordpress-cozystay-1-7-1-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-498xx/CVE-2025-49842.json b/CVE-2025/CVE-2025-498xx/CVE-2025-49842.json new file mode 100644 index 00000000000..2719ed852b6 --- /dev/null +++ b/CVE-2025/CVE-2025-498xx/CVE-2025-49842.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-49842", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-06-17T14:15:32.170", + "lastModified": "2025-06-17T14:15:32.170", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "conda-forge-webservices is the web app deployed to run conda-forge admin commands and linting. Prior to version 2025.3.24, the conda_forge_webservice Docker container executes commands without specifying a user. By default, Docker containers run as the root user, which increases the risk of privilege escalation and host compromise if a vulnerability is exploited. This issue has been patched in version 2025.3.24." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 1.0, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "ACTIVE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "UNREPORTED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/conda-forge/conda-forge-webservices/commit/c28b67f833f32299cc47eef8ad226ca991db67ae", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/conda-forge/conda-forge-webservices/security/advisories/GHSA-3cj6-wc22-wvpv", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-498xx/CVE-2025-49854.json b/CVE-2025/CVE-2025-498xx/CVE-2025-49854.json new file mode 100644 index 00000000000..e8e915f7aab --- /dev/null +++ b/CVE-2025/CVE-2025-498xx/CVE-2025-49854.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49854", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:49.877", + "lastModified": "2025-06-17T15:15:49.877", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Anh Tran Slim SEO allows SQL Injection. This issue affects Slim SEO: from n/a through 4.5.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/slim-seo/vulnerability/wordpress-slim-seo-plugin-4-5-4-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-498xx/CVE-2025-49855.json b/CVE-2025/CVE-2025-498xx/CVE-2025-49855.json new file mode 100644 index 00000000000..82ad0da5934 --- /dev/null +++ b/CVE-2025/CVE-2025-498xx/CVE-2025-49855.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49855", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:50.030", + "lastModified": "2025-06-17T15:15:50.030", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Meks Meks Flexible Shortcodes allows DOM-Based XSS. This issue affects Meks Flexible Shortcodes: from n/a through 1.3.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/meks-flexible-shortcodes/vulnerability/wordpress-meks-flexible-shortcodes-plugin-1-3-7-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-498xx/CVE-2025-49856.json b/CVE-2025/CVE-2025-498xx/CVE-2025-49856.json new file mode 100644 index 00000000000..e51521f60fc --- /dev/null +++ b/CVE-2025/CVE-2025-498xx/CVE-2025-49856.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49856", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:50.187", + "lastModified": "2025-06-17T15:15:50.187", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in CyberChimps Responsive Plus allows Cross Site Request Forgery. This issue affects Responsive Plus: from n/a through 3.2.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/responsive-add-ons/vulnerability/wordpress-responsive-plus-plugin-3-2-2-cross-site-request-forgery-csrf-to-settings-change-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-498xx/CVE-2025-49857.json b/CVE-2025/CVE-2025-498xx/CVE-2025-49857.json new file mode 100644 index 00000000000..1e9fe6671bb --- /dev/null +++ b/CVE-2025/CVE-2025-498xx/CVE-2025-49857.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49857", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:50.333", + "lastModified": "2025-06-17T15:15:50.333", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in WPExperts.io myCred allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects myCred: from n/a through 2.9.4.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/mycred/vulnerability/wordpress-mycred-plugin-2-9-4-2-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-498xx/CVE-2025-49858.json b/CVE-2025/CVE-2025-498xx/CVE-2025-49858.json new file mode 100644 index 00000000000..df2e3e9db4b --- /dev/null +++ b/CVE-2025/CVE-2025-498xx/CVE-2025-49858.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49858", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:50.487", + "lastModified": "2025-06-17T15:15:50.487", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in tychesoftwares Arconix Shortcodes allows Stored XSS. This issue affects Arconix Shortcodes: from n/a through 2.1.17." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/arconix-shortcodes/vulnerability/wordpress-arconix-shortcodes-plugin-2-1-17-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-498xx/CVE-2025-49859.json b/CVE-2025/CVE-2025-498xx/CVE-2025-49859.json new file mode 100644 index 00000000000..2f65573e2e4 --- /dev/null +++ b/CVE-2025/CVE-2025-498xx/CVE-2025-49859.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49859", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:50.640", + "lastModified": "2025-06-17T15:15:50.640", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in etruel WP Views Counter allows Stored XSS. This issue affects WP Views Counter: from n/a through 2.0.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wpecounter/vulnerability/wordpress-wp-views-counter-plugin-2-0-3-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-498xx/CVE-2025-49861.json b/CVE-2025/CVE-2025-498xx/CVE-2025-49861.json new file mode 100644 index 00000000000..34d2c7e77ee --- /dev/null +++ b/CVE-2025/CVE-2025-498xx/CVE-2025-49861.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49861", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:50.790", + "lastModified": "2025-06-17T15:15:50.790", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Timur Kamaev Kama Click Counter allows Stored XSS. This issue affects Kama Click Counter: from n/a through 4.0.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/kama-clic-counter/vulnerability/wordpress-kama-click-counter-plugin-4-0-3-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-498xx/CVE-2025-49862.json b/CVE-2025/CVE-2025-498xx/CVE-2025-49862.json new file mode 100644 index 00000000000..5dd591ebdab --- /dev/null +++ b/CVE-2025/CVE-2025-498xx/CVE-2025-49862.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49862", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:50.930", + "lastModified": "2025-06-17T15:15:50.930", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in motov.net Ebook Store allows Stored XSS. This issue affects Ebook Store: from n/a through 5.8008." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/ebook-store/vulnerability/wordpress-ebook-store-plugin-5-8008-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-498xx/CVE-2025-49863.json b/CVE-2025/CVE-2025-498xx/CVE-2025-49863.json new file mode 100644 index 00000000000..5aca6d51c8c --- /dev/null +++ b/CVE-2025/CVE-2025-498xx/CVE-2025-49863.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49863", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:51.083", + "lastModified": "2025-06-17T15:15:51.083", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Codeus Advanced Sermons allows Stored XSS. This issue affects Advanced Sermons: from n/a through 3.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/advanced-sermons/vulnerability/wordpress-advanced-sermons-plugin-3-6-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-498xx/CVE-2025-49864.json b/CVE-2025/CVE-2025-498xx/CVE-2025-49864.json new file mode 100644 index 00000000000..48bd2cbd550 --- /dev/null +++ b/CVE-2025/CVE-2025-498xx/CVE-2025-49864.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49864", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:51.233", + "lastModified": "2025-06-17T15:15:51.233", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in AFS Analytics AFS Analytics allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects AFS Analytics: from n/a through 4.21." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/addfreestats/vulnerability/wordpress-afs-analytics-plugin-4-21-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-498xx/CVE-2025-49865.json b/CVE-2025/CVE-2025-498xx/CVE-2025-49865.json new file mode 100644 index 00000000000..f320f4c692f --- /dev/null +++ b/CVE-2025/CVE-2025-498xx/CVE-2025-49865.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49865", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:51.383", + "lastModified": "2025-06-17T15:15:51.383", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Helmut Wandl Advanced Settings allows Cross Site Request Forgery. This issue affects Advanced Settings: from n/a through 3.0.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/advanced-settings/vulnerability/wordpress-advanced-settings-plugin-3-0-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-498xx/CVE-2025-49868.json b/CVE-2025/CVE-2025-498xx/CVE-2025-49868.json new file mode 100644 index 00000000000..02bcad7f277 --- /dev/null +++ b/CVE-2025/CVE-2025-498xx/CVE-2025-49868.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49868", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:51.533", + "lastModified": "2025-06-17T15:15:51.533", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in FunnelKit Automation By Autonami allows Phishing. This issue affects Automation By Autonami: from n/a through 3.6.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-marketing-automations/vulnerability/wordpress-automation-by-autonami-plugin-3-6-0-open-redirection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-498xx/CVE-2025-49871.json b/CVE-2025/CVE-2025-498xx/CVE-2025-49871.json new file mode 100644 index 00000000000..7dfe646b5a3 --- /dev/null +++ b/CVE-2025/CVE-2025-498xx/CVE-2025-49871.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49871", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:51.687", + "lastModified": "2025-06-17T15:15:51.687", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Brian Mutende Noptin allows Stored XSS. This issue affects Noptin: from n/a through 3.8.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/newsletter-optin-box/vulnerability/wordpress-noptin-plugin-3-8-7-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-498xx/CVE-2025-49872.json b/CVE-2025/CVE-2025-498xx/CVE-2025-49872.json new file mode 100644 index 00000000000..223c7b1214a --- /dev/null +++ b/CVE-2025/CVE-2025-498xx/CVE-2025-49872.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49872", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:51.830", + "lastModified": "2025-06-17T15:15:51.830", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in WPExperts.io myCred allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects myCred: from n/a through 2.9.4.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/mycred/vulnerability/wordpress-mycred-plugin-2-9-4-2-broken-access-control-vulnerability-2?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-498xx/CVE-2025-49874.json b/CVE-2025/CVE-2025-498xx/CVE-2025-49874.json new file mode 100644 index 00000000000..080894532b4 --- /dev/null +++ b/CVE-2025/CVE-2025-498xx/CVE-2025-49874.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49874", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:51.980", + "lastModified": "2025-06-17T15:15:51.980", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in tychesoftwares Arconix FAQ allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Arconix FAQ: from n/a through 1.9.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/arconix-faq/vulnerability/wordpress-arconix-faq-plugin-1-9-6-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-498xx/CVE-2025-49875.json b/CVE-2025/CVE-2025-498xx/CVE-2025-49875.json new file mode 100644 index 00000000000..924f8585b75 --- /dev/null +++ b/CVE-2025/CVE-2025-498xx/CVE-2025-49875.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49875", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:52.123", + "lastModified": "2025-06-17T15:15:52.123", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in IfSo Dynamic Content If-So Dynamic Content Personalization allows Stored XSS. This issue affects If-So Dynamic Content Personalization: from n/a through 1.9.3.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/if-so/vulnerability/wordpress-if-so-dynamic-content-personalization-plugin-1-9-3-1-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-498xx/CVE-2025-49877.json b/CVE-2025/CVE-2025-498xx/CVE-2025-49877.json new file mode 100644 index 00000000000..e3b208ae938 --- /dev/null +++ b/CVE-2025/CVE-2025-498xx/CVE-2025-49877.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49877", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:52.270", + "lastModified": "2025-06-17T15:15:52.270", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Server-Side Request Forgery (SSRF) vulnerability in Metagauss ProfileGrid allows Server Side Request Forgery. This issue affects ProfileGrid : from n/a through 5.9.5.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/profilegrid-user-profiles-groups-and-communities/vulnerability/wordpress-profilegrid-plugin-5-9-5-2-server-side-request-forgery-ssrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-498xx/CVE-2025-49878.json b/CVE-2025/CVE-2025-498xx/CVE-2025-49878.json new file mode 100644 index 00000000000..ebe5c061315 --- /dev/null +++ b/CVE-2025/CVE-2025-498xx/CVE-2025-49878.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49878", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:52.420", + "lastModified": "2025-06-17T15:15:52.420", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Greg Winiarski WPAdverts allows DOM-Based XSS. This issue affects WPAdverts: from n/a through 2.2.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wpadverts/vulnerability/wordpress-wpadverts-plugin-2-2-4-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-498xx/CVE-2025-49879.json b/CVE-2025/CVE-2025-498xx/CVE-2025-49879.json new file mode 100644 index 00000000000..642be1375f2 --- /dev/null +++ b/CVE-2025/CVE-2025-498xx/CVE-2025-49879.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49879", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:52.567", + "lastModified": "2025-06-17T15:15:52.567", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in themezaa Litho allows Path Traversal. This issue affects Litho: from n/a through 3.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/theme/litho/vulnerability/wordpress-litho-3-0-arbitrary-file-deletion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-498xx/CVE-2025-49880.json b/CVE-2025/CVE-2025-498xx/CVE-2025-49880.json new file mode 100644 index 00000000000..c96b043362e --- /dev/null +++ b/CVE-2025/CVE-2025-498xx/CVE-2025-49880.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49880", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:52.707", + "lastModified": "2025-06-17T15:15:52.707", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Emraan Cheema CubeWP Forms allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects CubeWP Forms: from n/a through 1.1.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/cubewp-forms/vulnerability/wordpress-cubewp-forms-plugin-1-1-5-broken-access-control-vulnerability-2?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-498xx/CVE-2025-49881.json b/CVE-2025/CVE-2025-498xx/CVE-2025-49881.json new file mode 100644 index 00000000000..f1c2631d38b --- /dev/null +++ b/CVE-2025/CVE-2025-498xx/CVE-2025-49881.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49881", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:52.853", + "lastModified": "2025-06-17T15:15:52.853", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CyberChimps Responsive Blocks allows Stored XSS. This issue affects Responsive Blocks: from n/a through 2.0.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/responsive-block-editor-addons/vulnerability/wordpress-responsive-blocks-plugin-2-0-5-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-498xx/CVE-2025-49882.json b/CVE-2025/CVE-2025-498xx/CVE-2025-49882.json new file mode 100644 index 00000000000..3bc459f1635 --- /dev/null +++ b/CVE-2025/CVE-2025-498xx/CVE-2025-49882.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49882", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-17T15:15:52.997", + "lastModified": "2025-06-17T15:15:52.997", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Emraan Cheema CubeWP Framework allows DOM-Based XSS. This issue affects CubeWP Framework: from n/a through 1.1.23." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/cubewp-framework/vulnerability/wordpress-cubewp-framework-plugin-1-1-23-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-49xx/CVE-2025-4932.json b/CVE-2025/CVE-2025-49xx/CVE-2025-4932.json index 2e3c1b3aec1..131d1a48f12 100644 --- a/CVE-2025/CVE-2025-49xx/CVE-2025-4932.json +++ b/CVE-2025/CVE-2025-49xx/CVE-2025-4932.json @@ -2,8 +2,8 @@ "id": "CVE-2025-4932", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-19T13:15:20.043", - "lastModified": "2025-05-19T13:35:20.460", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-17T14:09:35.493", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,22 +144,56 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:projectworlds:online_lawyer_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FE9AF2CA-6F65-4DCB-869E-4473F7F0A61D" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/hhhanxx/attack/issues/12", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.309494", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.309494", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.579676", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-49xx/CVE-2025-4949.json b/CVE-2025/CVE-2025-49xx/CVE-2025-4949.json index 6e0de7257dc..db6b182f144 100644 --- a/CVE-2025/CVE-2025-49xx/CVE-2025-4949.json +++ b/CVE-2025/CVE-2025-49xx/CVE-2025-4949.json @@ -2,8 +2,8 @@ "id": "CVE-2025-4949", "sourceIdentifier": "emo@eclipse.org", "published": "2025-05-21T07:16:01.397", - "lastModified": "2025-05-23T07:15:21.160", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-17T14:10:34.853", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "GREEN" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } ] }, "weaknesses": [ @@ -75,36 +97,88 @@ "value": "CWE-827" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eclipse:jgit:*:*:*:*:*:*:*:*", + "versionEndIncluding": "7.2.0.202503040940-r", + "matchCriteriaId": "C9229A9D-23D4-410B-9455-3102CB366F10" + } + ] + } + ] } ], "references": [ { "url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/64", - "source": "emo@eclipse.org" + "source": "emo@eclipse.org", + "tags": [ + "Vendor Advisory", + "Issue Tracking" + ] }, { "url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/281", - "source": "emo@eclipse.org" + "source": "emo@eclipse.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://projects.eclipse.org/projects/technology.jgit/releases/6.10.1", - "source": "emo@eclipse.org" + "source": "emo@eclipse.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://projects.eclipse.org/projects/technology.jgit/releases/7.0.1", - "source": "emo@eclipse.org" + "source": "emo@eclipse.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://projects.eclipse.org/projects/technology.jgit/releases/7.1.1", - "source": "emo@eclipse.org" + "source": "emo@eclipse.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://projects.eclipse.org/projects/technology.jgit/releases/7.2.1", - "source": "emo@eclipse.org" + "source": "emo@eclipse.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/281", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-50xx/CVE-2025-5001.json b/CVE-2025/CVE-2025-50xx/CVE-2025-5001.json index 3b09522ab6d..e663c889d44 100644 --- a/CVE-2025/CVE-2025-50xx/CVE-2025-5001.json +++ b/CVE-2025/CVE-2025-50xx/CVE-2025-5001.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5001", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-20T22:15:19.043", - "lastModified": "2025-05-21T20:24:58.133", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-17T14:11:34.640", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -122,36 +142,88 @@ "value": "CWE-190" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gnu:pspp:-:*:*:*:*:*:*:*", + "matchCriteriaId": "293DBCDE-628A-418F-91C3-3BF35306D67C" + } + ] + } + ] } ], "references": [ { "url": "https://drive.google.com/file/d/12IIt8eR591Z8O1ABOCkT_jdXSWaBxMZx/view?usp=drive_link", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://savannah.gnu.org/bugs/index.php?67069", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.309652", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.309652", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.569966", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.gnu.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://savannah.gnu.org/bugs/index.php?67069", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-50xx/CVE-2025-5010.json b/CVE-2025/CVE-2025-50xx/CVE-2025-5010.json index 274bf9db76f..19e682ee7db 100644 --- a/CVE-2025/CVE-2025-50xx/CVE-2025-5010.json +++ b/CVE-2025/CVE-2025-50xx/CVE-2025-5010.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5010", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-21T00:15:22.137", - "lastModified": "2025-05-21T23:15:55.330", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-17T14:11:21.613", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ], "cvssMetricV2": [ @@ -122,28 +142,73 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:moonlightl:hexo-boot:4.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "279EDECB-88B4-42B1-9B06-FD6E7C74A850" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/trengh222/hexo-boot-xss1.0/blob/yhtt/README.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.309663", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.309663", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.580567", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/trengh222/hexo-boot-xss1.0/blob/yhtt/README.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-50xx/CVE-2025-5011.json b/CVE-2025/CVE-2025-50xx/CVE-2025-5011.json index 34900dcf652..853d8481b21 100644 --- a/CVE-2025/CVE-2025-50xx/CVE-2025-5011.json +++ b/CVE-2025/CVE-2025-50xx/CVE-2025-5011.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5011", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-21T00:15:22.310", - "lastModified": "2025-05-21T23:15:55.447", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-17T14:11:05.917", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ], "cvssMetricV2": [ @@ -122,28 +142,73 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:moonlightl:hexo-boot:4.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "279EDECB-88B4-42B1-9B06-FD6E7C74A850" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/trengh222/hexo-boot-xss2.0", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.309664", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.309664", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.580588", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/trengh222/hexo-boot-xss2.0", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-50xx/CVE-2025-5013.json b/CVE-2025/CVE-2025-50xx/CVE-2025-5013.json index 2cda92ee7c7..177c728be54 100644 --- a/CVE-2025/CVE-2025-50xx/CVE-2025-5013.json +++ b/CVE-2025/CVE-2025-50xx/CVE-2025-5013.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5013", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-21T06:16:29.103", - "lastModified": "2025-05-21T23:15:55.563", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-17T14:10:53.597", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ], "cvssMetricV2": [ @@ -122,24 +142,67 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hkcms:hkcms:2.3.2.240702:*:*:*:*:*:*:*", + "matchCriteriaId": "3167B3CB-1881-45BB-B009-D730A1C0A3AA" + } + ] + } + ] } ], "references": [ { "url": "https://gitee.com/Hk_Cms/HkCms/issues/IBZ2G7", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Vendor Advisory", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.309729", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.309729", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://gitee.com/Hk_Cms/HkCms/issues/IBZ2G7", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Vendor Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-52xx/CVE-2025-5209.json b/CVE-2025/CVE-2025-52xx/CVE-2025-5209.json index c2bb52df134..e5896fa48c4 100644 --- a/CVE-2025/CVE-2025-52xx/CVE-2025-5209.json +++ b/CVE-2025/CVE-2025-52xx/CVE-2025-5209.json @@ -2,16 +2,43 @@ "id": "CVE-2025-5209", "sourceIdentifier": "contact@wpscan.com", "published": "2025-06-17T06:15:21.870", - "lastModified": "2025-06-17T06:15:21.870", + "lastModified": "2025-06-17T14:15:33.303", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Ivory Search WordPress plugin before 5.5.10 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed" + }, + { + "lang": "es", + "value": "El complemento Ivory Search para WordPress anterior a la versi\u00f3n 5.5.10 no desinfecta ni escapa de algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de cross site scripting incluso cuando unfiltered_html no est\u00e1 permitido." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/8b51dc46-62c8-45b5-96ce-fb774b430388/", diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5689.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5689.json index 59a6c60dcb3..2e2e7450335 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5689.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5689.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5689", "sourceIdentifier": "security@ubuntu.com", "published": "2025-06-16T12:15:19.610", - "lastModified": "2025-06-16T12:32:18.840", + "lastModified": "2025-06-17T15:15:53.433", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found in the temporary user record that authd uses in the pre-auth NSS. As a result, a user login for the first time will be considered to be part of the root group in the context of that SSH session." + }, + { + "lang": "es", + "value": "Se detect\u00f3 una falla en el registro de usuario temporal que authd utiliza en el NSS previo a la autorizaci\u00f3n. Como resultado, un usuario que inicia sesi\u00f3n por primera vez se considerar\u00e1 parte del grupo root en el contexto de esa sesi\u00f3n SSH." } ], "metrics": { @@ -18,20 +22,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", - "baseScore": 6.4, - "baseSeverity": "MEDIUM", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N", + "baseScore": 8.5, + "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", - "confidentialityImpact": "LOW", + "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE" }, "exploitabilityScore": 3.1, - "impactScore": 2.7 + "impactScore": 4.7 } ] }, diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6069.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6069.json new file mode 100644 index 00000000000..8f540a9a587 --- /dev/null +++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6069.json @@ -0,0 +1,76 @@ +{ + "id": "CVE-2025-6069", + "sourceIdentifier": "cna@python.org", + "published": "2025-06-17T14:15:33.677", + "lastModified": "2025-06-17T14:15:33.677", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The html.parser.HTMLParser class had worse-case quadratic complexity when processing certain crafted malformed inputs potentially leading to amplified denial-of-service." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@python.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cna@python.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1333" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/python/cpython/commit/4455cbabf991e202185a25a631af206f60bbc949", + "source": "cna@python.org" + }, + { + "url": "https://github.com/python/cpython/commit/6eb6c5dbfb528bd07d77b60fd71fd05d81d45c41", + "source": "cna@python.org" + }, + { + "url": "https://github.com/python/cpython/commit/d851f8e258c7328814943e923a7df81bca15df4b", + "source": "cna@python.org" + }, + { + "url": "https://github.com/python/cpython/issues/135462", + "source": "cna@python.org" + }, + { + "url": "https://github.com/python/cpython/pull/135464", + "source": "cna@python.org" + }, + { + "url": "https://mail.python.org/archives/list/security-announce@python.org/thread/K5PIYLR6EP3WR7ZOKKYQUWEDNQVUXOYM/", + "source": "cna@python.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6151.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6151.json index 8d9164a67f2..500c6e344d7 100644 --- a/CVE-2025/CVE-2025-61xx/CVE-2025-6151.json +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6151.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6151", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-17T01:15:23.313", - "lastModified": "2025-06-17T01:15:23.313", + "lastModified": "2025-06-17T15:15:53.710", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in TP-Link TL-WR940N V4. Affected by this issue is some unknown functionality of the file /userRpm/WanSlaacCfgRpm.htm. The manipulation of the argument dnsserver1 leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en el TP-Link TL-WR940N V4. Este problema afecta a una funcionalidad desconocida del archivo /userRpm/WanSlaacCfgRpm.htm. La manipulaci\u00f3n del argumento dnsserver1 provoca un desbordamiento del b\u00fafer. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://www.tp-link.com/", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/WhereisDoujo/CVE/issues/7", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6152.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6152.json index a754f7f0c41..2026182bf86 100644 --- a/CVE-2025/CVE-2025-61xx/CVE-2025-6152.json +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6152.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6152", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-17T02:15:20.213", - "lastModified": "2025-06-17T02:15:20.213", + "lastModified": "2025-06-17T15:15:53.837", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in Steel Browser up to 0.1.3. This affects the function handleFileUpload of the file api/src/modules/files/files.routes.ts. The manipulation of the argument filename leads to path traversal. It is possible to initiate the attack remotely. The patch is named 7ba93a10000fb77ee01731478ef40551a27bd5b9. It is recommended to apply a patch to fix this issue." + }, + { + "lang": "es", + "value": "Se detect\u00f3 una vulnerabilidad cr\u00edtica en Steel Browser hasta la versi\u00f3n 0.1.3. Esta afecta a la funci\u00f3n handleFileUpload del archivo api/src/modules/files/files.routes.ts. La manipulaci\u00f3n del argumento filename provoca un path traversal. Es posible iniciar el ataque de forma remota. El parche se llama 7ba93a10000fb77ee01731478ef40551a27bd5b9. Se recomienda aplicar un parche para solucionar este problema." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.593060", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/steel-dev/steel-browser/issues/129", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6167.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6167.json index b2fc555a632..8549e09a356 100644 --- a/CVE-2025/CVE-2025-61xx/CVE-2025-6167.json +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6167.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6167", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-17T07:15:18.330", - "lastModified": "2025-06-17T07:15:18.330", + "lastModified": "2025-06-17T15:15:53.960", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in themanojdesai python-a2a up to 0.5.5. Affected is the function create_workflow of the file python_a2a/agent_flow/server/api.py. The manipulation leads to path traversal. Upgrading to version 0.5.6 is able to address this issue. It is recommended to upgrade the affected component." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad cr\u00edtica en themanojdesai python-a2a hasta la versi\u00f3n 0.5.5. La funci\u00f3n create_workflow del archivo python_a2a/agent_flow/server/api.py est\u00e1 afectada. La manipulaci\u00f3n provoca un path traversal. Actualizar a la versi\u00f3n 0.5.6 puede solucionar este problema. Se recomienda actualizar el componente afectado. " } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.593613", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/themanojdesai/python-a2a/issues/40", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6179.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6179.json index c5d7150081c..350150a5729 100644 --- a/CVE-2025/CVE-2025-61xx/CVE-2025-6179.json +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6179.json @@ -2,16 +2,55 @@ "id": "CVE-2025-6179", "sourceIdentifier": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f", "published": "2025-06-16T17:15:32.053", - "lastModified": "2025-06-16T17:15:32.053", + "lastModified": "2025-06-17T14:15:34.673", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Permissions Bypass in Extension Management in Google ChromeOS 16181.27.0 on managed Chrome devices allows a local attacker to disable extensions and access Developer Mode, including loading additional extensions via exploiting vulnerabilities using the ExtHang3r and ExtPrint3r tools." + }, + { + "lang": "es", + "value": "La omisi\u00f3n de permisos en la administraci\u00f3n de extensiones en Google ChromeOS 16181.27.0 en dispositivos Chrome administrados permite a un atacante local deshabilitar extensiones y acceder al modo de desarrollador, incluida la carga de extensiones adicionales mediante la explotaci\u00f3n de vulnerabilidades con las herramientas ExtHang3r y ExtPrint3r." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://issues.chromium.org/issues/b/399652193", diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6196.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6196.json new file mode 100644 index 00000000000..1d39a182ff9 --- /dev/null +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6196.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-6196", + "sourceIdentifier": "secalert@redhat.com", + "published": "2025-06-17T15:15:54.140", + "lastModified": "2025-06-17T15:15:54.140", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in libgepub, a library used to read EPUB files. The software mishandles file size calculations when opening specially crafted EPUB files, leading to incorrect memory allocations. This issue causes the application to crash. Known affected usage includes desktop services like Tumbler, which may process malicious files automatically when browsing directories. While no direct remote attack vectors are confirmed, any application using libgepub to parse user-supplied EPUB content could be vulnerable to a denial of service." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2025-6196", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373117", + "source": "secalert@redhat.com" + }, + { + "url": "https://gitlab.gnome.org/GNOME/libgepub/-/issues/18", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6199.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6199.json new file mode 100644 index 00000000000..dce70fc4c99 --- /dev/null +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6199.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-6199", + "sourceIdentifier": "secalert@redhat.com", + "published": "2025-06-17T15:15:54.307", + "lastModified": "2025-06-17T15:15:54.307", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in the GIF parser of GdkPixbuf\u2019s LZW decoder. When an invalid symbol is encountered during decompression, the decoder sets the reported output size to the full buffer length rather than the actual number of written bytes. This logic error results in uninitialized sections of the buffer being included in the output, potentially leaking arbitrary memory contents in the processed image." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2025-6199", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373147", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index c0288fbbeaa..0bb83bae902 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-17T14:00:19.592875+00:00 +2025-06-17T16:00:20.396590+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-06-17T13:57:38.600000+00:00 +2025-06-17T15:57:20.630000+00:00 ``` ### Last Data Feed Release @@ -33,51 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -298118 +298202 ``` ### CVEs added in the last Commit -Recently added CVEs: `7` +Recently added CVEs: `84` -- [CVE-2025-3880](CVE-2025/CVE-2025-38xx/CVE-2025-3880.json) (`2025-06-17T12:15:25.870`) -- [CVE-2025-4365](CVE-2025/CVE-2025-43xx/CVE-2025-4365.json) (`2025-06-17T13:15:20.690`) -- [CVE-2025-5291](CVE-2025/CVE-2025-52xx/CVE-2025-5291.json) (`2025-06-17T12:15:27.747`) -- [CVE-2025-5349](CVE-2025/CVE-2025-53xx/CVE-2025-5349.json) (`2025-06-17T13:15:21.377`) -- [CVE-2025-5700](CVE-2025/CVE-2025-57xx/CVE-2025-5700.json) (`2025-06-17T12:15:27.960`) -- [CVE-2025-5777](CVE-2025/CVE-2025-57xx/CVE-2025-5777.json) (`2025-06-17T13:15:21.523`) -- [CVE-2025-6020](CVE-2025/CVE-2025-60xx/CVE-2025-6020.json) (`2025-06-17T13:15:21.660`) +- [CVE-2025-49854](CVE-2025/CVE-2025-498xx/CVE-2025-49854.json) (`2025-06-17T15:15:49.877`) +- [CVE-2025-49855](CVE-2025/CVE-2025-498xx/CVE-2025-49855.json) (`2025-06-17T15:15:50.030`) +- [CVE-2025-49856](CVE-2025/CVE-2025-498xx/CVE-2025-49856.json) (`2025-06-17T15:15:50.187`) +- [CVE-2025-49857](CVE-2025/CVE-2025-498xx/CVE-2025-49857.json) (`2025-06-17T15:15:50.333`) +- [CVE-2025-49858](CVE-2025/CVE-2025-498xx/CVE-2025-49858.json) (`2025-06-17T15:15:50.487`) +- [CVE-2025-49859](CVE-2025/CVE-2025-498xx/CVE-2025-49859.json) (`2025-06-17T15:15:50.640`) +- [CVE-2025-49861](CVE-2025/CVE-2025-498xx/CVE-2025-49861.json) (`2025-06-17T15:15:50.790`) +- [CVE-2025-49862](CVE-2025/CVE-2025-498xx/CVE-2025-49862.json) (`2025-06-17T15:15:50.930`) +- [CVE-2025-49863](CVE-2025/CVE-2025-498xx/CVE-2025-49863.json) (`2025-06-17T15:15:51.083`) +- [CVE-2025-49864](CVE-2025/CVE-2025-498xx/CVE-2025-49864.json) (`2025-06-17T15:15:51.233`) +- [CVE-2025-49865](CVE-2025/CVE-2025-498xx/CVE-2025-49865.json) (`2025-06-17T15:15:51.383`) +- [CVE-2025-49868](CVE-2025/CVE-2025-498xx/CVE-2025-49868.json) (`2025-06-17T15:15:51.533`) +- [CVE-2025-49871](CVE-2025/CVE-2025-498xx/CVE-2025-49871.json) (`2025-06-17T15:15:51.687`) +- [CVE-2025-49872](CVE-2025/CVE-2025-498xx/CVE-2025-49872.json) (`2025-06-17T15:15:51.830`) +- [CVE-2025-49874](CVE-2025/CVE-2025-498xx/CVE-2025-49874.json) (`2025-06-17T15:15:51.980`) +- [CVE-2025-49875](CVE-2025/CVE-2025-498xx/CVE-2025-49875.json) (`2025-06-17T15:15:52.123`) +- [CVE-2025-49877](CVE-2025/CVE-2025-498xx/CVE-2025-49877.json) (`2025-06-17T15:15:52.270`) +- [CVE-2025-49878](CVE-2025/CVE-2025-498xx/CVE-2025-49878.json) (`2025-06-17T15:15:52.420`) +- [CVE-2025-49879](CVE-2025/CVE-2025-498xx/CVE-2025-49879.json) (`2025-06-17T15:15:52.567`) +- [CVE-2025-49880](CVE-2025/CVE-2025-498xx/CVE-2025-49880.json) (`2025-06-17T15:15:52.707`) +- [CVE-2025-49881](CVE-2025/CVE-2025-498xx/CVE-2025-49881.json) (`2025-06-17T15:15:52.853`) +- [CVE-2025-49882](CVE-2025/CVE-2025-498xx/CVE-2025-49882.json) (`2025-06-17T15:15:52.997`) +- [CVE-2025-6069](CVE-2025/CVE-2025-60xx/CVE-2025-6069.json) (`2025-06-17T14:15:33.677`) +- [CVE-2025-6196](CVE-2025/CVE-2025-61xx/CVE-2025-6196.json) (`2025-06-17T15:15:54.140`) +- [CVE-2025-6199](CVE-2025/CVE-2025-61xx/CVE-2025-6199.json) (`2025-06-17T15:15:54.307`) ### CVEs modified in the last Commit -Recently modified CVEs: `33` +Recently modified CVEs: `92` -- [CVE-2024-2464](CVE-2024/CVE-2024-24xx/CVE-2024-2464.json) (`2025-06-17T13:49:01.800`) -- [CVE-2024-2465](CVE-2024/CVE-2024-24xx/CVE-2024-2465.json) (`2025-06-17T13:48:43.217`) -- [CVE-2024-25167](CVE-2024/CVE-2024-251xx/CVE-2024-25167.json) (`2025-06-17T13:57:38.600`) -- [CVE-2024-25294](CVE-2024/CVE-2024-252xx/CVE-2024-25294.json) (`2025-06-17T13:09:19.133`) -- [CVE-2024-25359](CVE-2024/CVE-2024-253xx/CVE-2024-25359.json) (`2025-06-17T13:57:18.833`) -- [CVE-2024-26307](CVE-2024/CVE-2024-263xx/CVE-2024-26307.json) (`2025-06-17T13:50:12.777`) -- [CVE-2024-27438](CVE-2024/CVE-2024-274xx/CVE-2024-27438.json) (`2025-06-17T13:50:01.197`) -- [CVE-2024-27626](CVE-2024/CVE-2024-276xx/CVE-2024-27626.json) (`2025-06-17T13:57:09.253`) -- [CVE-2024-28396](CVE-2024/CVE-2024-283xx/CVE-2024-28396.json) (`2025-06-17T13:39:34.750`) -- [CVE-2024-28635](CVE-2024/CVE-2024-286xx/CVE-2024-28635.json) (`2025-06-17T13:52:08.900`) -- [CVE-2024-28735](CVE-2024/CVE-2024-287xx/CVE-2024-28735.json) (`2025-06-17T13:25:30.400`) -- [CVE-2024-28756](CVE-2024/CVE-2024-287xx/CVE-2024-28756.json) (`2025-06-17T13:47:54.133`) -- [CVE-2024-29243](CVE-2024/CVE-2024-292xx/CVE-2024-29243.json) (`2025-06-17T13:49:27.260`) -- [CVE-2024-29244](CVE-2024/CVE-2024-292xx/CVE-2024-29244.json) (`2025-06-17T13:49:18.597`) -- [CVE-2024-29858](CVE-2024/CVE-2024-298xx/CVE-2024-29858.json) (`2025-06-17T13:51:32.070`) -- [CVE-2024-29862](CVE-2024/CVE-2024-298xx/CVE-2024-29862.json) (`2025-06-17T13:51:00.100`) -- [CVE-2024-29864](CVE-2024/CVE-2024-298xx/CVE-2024-29864.json) (`2025-06-17T13:50:35.700`) -- [CVE-2024-29866](CVE-2024/CVE-2024-298xx/CVE-2024-29866.json) (`2025-06-17T13:49:42.563`) -- [CVE-2025-2784](CVE-2025/CVE-2025-27xx/CVE-2025-2784.json) (`2025-06-17T12:15:22.167`) -- [CVE-2025-32049](CVE-2025/CVE-2025-320xx/CVE-2025-32049.json) (`2025-06-17T12:15:24.733`) -- [CVE-2025-32906](CVE-2025/CVE-2025-329xx/CVE-2025-32906.json) (`2025-06-17T12:15:24.950`) -- [CVE-2025-32911](CVE-2025/CVE-2025-329xx/CVE-2025-32911.json) (`2025-06-17T12:15:25.213`) -- [CVE-2025-32913](CVE-2025/CVE-2025-329xx/CVE-2025-32913.json) (`2025-06-17T12:15:25.447`) -- [CVE-2025-32914](CVE-2025/CVE-2025-329xx/CVE-2025-32914.json) (`2025-06-17T12:15:25.657`) -- [CVE-2025-4948](CVE-2025/CVE-2025-49xx/CVE-2025-4948.json) (`2025-06-17T12:15:27.520`) +- [CVE-2025-4218](CVE-2025/CVE-2025-42xx/CVE-2025-4218.json) (`2025-06-17T14:16:53.353`) +- [CVE-2025-4316](CVE-2025/CVE-2025-43xx/CVE-2025-4316.json) (`2025-06-17T14:13:42.267`) +- [CVE-2025-43200](CVE-2025/CVE-2025-432xx/CVE-2025-43200.json) (`2025-06-17T15:52:31.157`) +- [CVE-2025-43915](CVE-2025/CVE-2025-439xx/CVE-2025-43915.json) (`2025-06-17T14:12:57.600`) +- [CVE-2025-45242](CVE-2025/CVE-2025-452xx/CVE-2025-45242.json) (`2025-06-17T14:12:39.773`) +- [CVE-2025-46567](CVE-2025/CVE-2025-465xx/CVE-2025-46567.json) (`2025-06-17T14:19:39.290`) +- [CVE-2025-46568](CVE-2025/CVE-2025-465xx/CVE-2025-46568.json) (`2025-06-17T14:19:19.067`) +- [CVE-2025-46724](CVE-2025/CVE-2025-467xx/CVE-2025-46724.json) (`2025-06-17T14:11:48.377`) +- [CVE-2025-4802](CVE-2025/CVE-2025-48xx/CVE-2025-4802.json) (`2025-06-17T14:09:23.137`) +- [CVE-2025-48272](CVE-2025/CVE-2025-482xx/CVE-2025-48272.json) (`2025-06-17T14:10:18.237`) +- [CVE-2025-48976](CVE-2025/CVE-2025-489xx/CVE-2025-48976.json) (`2025-06-17T14:15:30.637`) +- [CVE-2025-49124](CVE-2025/CVE-2025-491xx/CVE-2025-49124.json) (`2025-06-17T14:15:30.940`) +- [CVE-2025-49125](CVE-2025/CVE-2025-491xx/CVE-2025-49125.json) (`2025-06-17T14:15:31.747`) +- [CVE-2025-4932](CVE-2025/CVE-2025-49xx/CVE-2025-4932.json) (`2025-06-17T14:09:35.493`) +- [CVE-2025-4949](CVE-2025/CVE-2025-49xx/CVE-2025-4949.json) (`2025-06-17T14:10:34.853`) +- [CVE-2025-5001](CVE-2025/CVE-2025-50xx/CVE-2025-5001.json) (`2025-06-17T14:11:34.640`) +- [CVE-2025-5010](CVE-2025/CVE-2025-50xx/CVE-2025-5010.json) (`2025-06-17T14:11:21.613`) +- [CVE-2025-5011](CVE-2025/CVE-2025-50xx/CVE-2025-5011.json) (`2025-06-17T14:11:05.917`) +- [CVE-2025-5013](CVE-2025/CVE-2025-50xx/CVE-2025-5013.json) (`2025-06-17T14:10:53.597`) +- [CVE-2025-5209](CVE-2025/CVE-2025-52xx/CVE-2025-5209.json) (`2025-06-17T14:15:33.303`) +- [CVE-2025-5689](CVE-2025/CVE-2025-56xx/CVE-2025-5689.json) (`2025-06-17T15:15:53.433`) +- [CVE-2025-6151](CVE-2025/CVE-2025-61xx/CVE-2025-6151.json) (`2025-06-17T15:15:53.710`) +- [CVE-2025-6152](CVE-2025/CVE-2025-61xx/CVE-2025-6152.json) (`2025-06-17T15:15:53.837`) +- [CVE-2025-6167](CVE-2025/CVE-2025-61xx/CVE-2025-6167.json) (`2025-06-17T15:15:53.960`) +- [CVE-2025-6179](CVE-2025/CVE-2025-61xx/CVE-2025-6179.json) (`2025-06-17T14:15:34.673`) ## Download and Usage diff --git a/_state.csv b/_state.csv index ee541f9471d..3c72f730504 100644 --- a/_state.csv +++ b/_state.csv @@ -148922,7 +148922,7 @@ CVE-2020-13871,0,0,d799b73ceab4d0fbee66ad126611fef7624fcb70ec6ccb2100ba88c3cff1d CVE-2020-13872,0,0,bad8457f1bca1850d3e5f02918bbf4845d39ef9f4cf8bee1ffa8f4f0e614a339,2024-11-21T05:02:03.153000 CVE-2020-13873,0,0,cf985d7edf7b43576eb8691772366f81165808cbd6056f36b5f59548d4502a45,2024-11-21T05:02:03.303000 CVE-2020-13877,0,0,8083d03ea78037f79168889554f5061377712d7e107c584dd6a8660ed3837c7b,2024-11-21T05:02:03.450000 -CVE-2020-13878,0,0,42dbc418ed50e431f26ee1890a9601c78f53a776fba8cb03dbaaf47b80f4ec02,2024-11-21T05:02:03.590000 +CVE-2020-13878,0,1,107b5ba74d85eab2ae437146a82753f8453418e8a60630abb1748356cc86cc4d,2025-06-17T15:15:33.890000 CVE-2020-13879,0,0,180f4ac773e9770c185e0ed16d0320896bedea4aea8bf6f58c2e6a83dcab8928,2025-04-17T19:15:49.657000 CVE-2020-1388,0,0,3aafb8e5c72733b07dce49a1658d8c9f9be03eea9e598dd7cb827bde4a316ac0,2024-11-21T05:10:23.677000 CVE-2020-13880,0,0,58741e3d77d64f946a5d83df999ae126b07b18231d141d7e7d0a98316b170026,2024-11-21T05:02:03.877000 @@ -155849,7 +155849,7 @@ CVE-2020-26609,0,0,b1276559e5b51c36ad0921b31d3936560cbed7e566c5fa9bbb4ba97236bfe CVE-2020-2661,0,0,b1681b156bb98adb26337cecd3379426ae8a0e7db82d2af964418ee42cdb2ee2,2024-11-21T05:25:55.800000 CVE-2020-2662,0,0,7dbc120400ef515c83858eecd30b062aebd984fcafe369707b3ed824c04f53f5,2024-11-21T05:25:55.960000 CVE-2020-26623,0,0,868ae7c90cab410e748b26b3f8ba89a6ba9fa063d74adcd261dfe52b6b1621be,2025-06-03T15:15:23.283000 -CVE-2020-26624,0,0,6ae1dd581800c36f7d6764595aeacb52c77420ca90c8addb5d4d4a79a20fc344,2024-11-21T05:20:09.577000 +CVE-2020-26624,0,1,0ed95c612f55855230148eef454f177ef45490258735d3e4b9cd2ffde6b34efe,2025-06-17T15:15:34.790000 CVE-2020-26625,0,0,9bda7c918951fc23775bec67f6e88eb70fd1e6dcd3b4d8a1fd00dac18775a0c4,2025-05-16T18:16:00.633000 CVE-2020-26627,0,0,3ffd8644f12b90c2141a35b8b18f5821a93ffe24227a55d35b514592c33fde48,2025-06-03T15:15:23.537000 CVE-2020-26628,0,0,4bd8fc6faf7cbc587d496d53268fae79ceb010e9b3aa4d7dc06728be5812e026,2024-11-21T05:20:09.997000 @@ -170021,7 +170021,7 @@ CVE-2021-2380,0,0,e4ece85aaa61319fb366f0e67c0fbe1c88ac97ade334d8d2f0f289add1bf9b CVE-2021-23803,0,0,eb8e9adef601c1b8d4a2b999ca421ca5388ac2e6d624a0dc3c5b3280887e5b96,2024-11-21T05:51:53.627000 CVE-2021-23807,0,0,6a75b280203317daea84367b04604555d73dce1e7b062c1ec4ed95723e4d3568,2025-03-05T16:24:40.203000 CVE-2021-2381,0,0,73c8f0f20d7c0d82a834c6c2433f14a1b0192d95ad270c68a3a9c2a28a32f3af,2024-11-21T06:03:00.337000 -CVE-2021-23814,0,1,a43b654ee9e01fea0f05fd7e4d22e4a66b495198fcad86c1bcedcf57b156c487,2025-06-17T12:15:20.773000 +CVE-2021-23814,0,0,a43b654ee9e01fea0f05fd7e4d22e4a66b495198fcad86c1bcedcf57b156c487,2025-06-17T12:15:20.773000 CVE-2021-2382,0,0,ad1c8d64756b68cea26351f8493edc116cb9eadff88d7c9a4241c09cace8cee5,2024-11-21T06:03:00.463000 CVE-2021-23820,0,0,b3bdb15ec0471331fe7afb31b41435ce59fa54abb2f7933daf22a58bcc74d1fd,2025-03-06T18:09:40.467000 CVE-2021-23824,0,0,bbb9a711474b62b58291dd1188bf8bcb155385cc2b578cf95db9f4e6203dc7b0,2024-11-21T05:51:54.143000 @@ -171332,7 +171332,7 @@ CVE-2021-25113,0,0,7c68a88c0216b0c95062855091f4436cc1925f1e4105d2f3c5b1b71781d11 CVE-2021-25114,0,0,e21a46ad101f2cf515f4072ecb69f23ca1ee1fa2cdfdedbcc0809aceb313a2c2,2024-11-21T05:54:22.753000 CVE-2021-25115,0,0,4a714ad4467c23c974891e3bf0f894fa9c0c87b634ee6ba8edf5c9aad012349a,2024-11-21T05:54:22.870000 CVE-2021-25116,0,0,c1d836bed3586960d7ef5a19955fff6511cb702a4336198b8434fd4c06340909,2024-11-21T05:54:22.987000 -CVE-2021-25117,0,0,d6e4518729def2e17b2f2a49778bd39342ab910a65d2978479ac9a624c22c763,2024-11-21T05:54:23.110000 +CVE-2021-25117,0,1,56eb62a79c343cdcb355a0efc1e5c8babf3169e6002ce8dd3e38857f0e23ace4,2025-06-17T14:15:26.197000 CVE-2021-25118,0,0,d3bddcdeba7b81c1919ed99193f5f7eb7cc81bc22fdfe4f5746eb114fb74cb49,2024-11-21T05:54:23.220000 CVE-2021-25119,0,0,ac0bf7f002ad3e86d317c43ab1859294f6b05b463029ff626c3fc45c1806a17c,2024-11-21T05:54:23.337000 CVE-2021-25120,0,0,0b3b0565afc4c37ed6f537745f54b26d9e07a6d34709fd3df5534753ab04f4da,2024-11-21T05:54:23.450000 @@ -211966,7 +211966,7 @@ CVE-2022-47069,0,0,887e07d320710c6167b3c59bd07316c092363ca104ad56f467df3d84b60a7 CVE-2022-4707,0,0,46965d8b08213adfd9a2fb7aba5eb37b104a9152a1b11cab9a99b52a01e22755,2024-11-21T07:35:46.480000 CVE-2022-47070,0,0,ba5534a61ec2dbb7bfa0e2f61a37aee01ea2583f06ce4fcd412181fa3aa384a1,2025-03-26T16:15:16.247000 CVE-2022-47071,0,0,05e1eb317d9b9efb3c5b5798fc1ed10d23548b88bc0df743ca5ad9f9901edc20,2025-03-26T19:15:19.310000 -CVE-2022-47072,0,0,36e706d3d20207b8800cdc3631c0ccbb74ffcd6e2a15d9b3c507223942950358,2024-11-21T07:31:27.933000 +CVE-2022-47072,0,1,cc27f26e712550f3ae3c5fb4bd1559fdb5d7f77485b51342f9bc6654b084109e,2025-06-17T15:15:35.183000 CVE-2022-47073,0,0,1af55275a4aa924ba6182624800114ebaf2737a269d3ca0a0534bb09cd113218,2025-04-01T16:15:18.993000 CVE-2022-47075,0,0,2572330a3306620b7535b124109a6025ade4f1de3dd5dea9b39b4b23f7bb6540,2025-03-18T15:15:41.377000 CVE-2022-47076,0,0,1064197c46d1abb0c1de48b9c9fb82915f3705f9285dabfbf40c059d017a0bc7,2025-03-18T15:15:41.650000 @@ -220795,7 +220795,7 @@ CVE-2023-25283,0,0,5f356e0d9f59faa52b6e5bf0560e1bd2b7ce0198ae0f76caceeb35ca6da8a CVE-2023-25289,0,0,329ff7443b569815cbc864f61fb485ad78c0c94d2eb5ca2650f4ea870fb1efd4,2025-01-29T21:15:14.523000 CVE-2023-2529,0,0,e0c597e5f44df4f0fa35a31922c8c63e9eda9621312de091657b5b531d976868,2024-11-21T07:58:47.050000 CVE-2023-25292,0,0,3f06b791e0f858743cc9523b1e9506d3377c6b13955495c0f2e922089d530295,2025-01-31T19:15:11.643000 -CVE-2023-25295,0,0,a98834b6bd1f87785173f8777c2482cbef1ded510a102976fe5e23312fa33c78,2024-11-21T07:49:23.760000 +CVE-2023-25295,0,1,6e54959dd845f5a6a9be23a1500f5c04e54db774ae2ba9cf1502241debc8bd3b,2025-06-17T15:15:35.367000 CVE-2023-2530,0,0,c36e5a9f5a23eb0efcedd6cdd8d45f1a0a10adb98425deae26560f2b5760cd78,2025-01-07T16:15:29.843000 CVE-2023-25303,0,0,0e0b37f3d5556a7b52f9466ef02672f221d50c1e3df4c4033756bc2697aa978e,2025-02-13T16:15:38.373000 CVE-2023-25304,0,0,28a9fcfe9f8defd2b94db49ca3a63558bcf2cd3ca6efe7b0c3e6f407ffddeb97,2024-11-21T07:49:24.047000 @@ -220826,7 +220826,7 @@ CVE-2023-25361,0,0,c3270213ad0f7bbc788a8c7a0c4853eae1c14f60cd4010621b5c00ec9f250 CVE-2023-25362,0,0,54a7584d73fe770bb4b6a778bf39100b69fcd447dfd780e09c48eeda355d0dce,2024-11-21T07:49:26.760000 CVE-2023-25363,0,0,a13e12e2d521248bb56a1f4c931835a614aa9c58a3850209d3d076c4362a4633,2024-11-21T07:49:26.910000 CVE-2023-25364,0,0,18e074f726c1a7bbb7f4b7c4f618e112147b7df67e3764dd5918c3fb79f094a5,2024-11-21T07:49:27.050000 -CVE-2023-25365,0,0,ad5f61675742eba1fbb7732c180aed0ffb329f9cdee48813c521c4336a44e25b,2024-11-21T07:49:27.247000 +CVE-2023-25365,0,1,e5c40240fa8bf634f4e6336a0ad3a3473f080647678483cc940e1ec9d1627034,2025-06-17T15:15:35.540000 CVE-2023-25366,0,0,e034a09dabe66546dba0104923cd2c56b7a8bad5dbcfb8795891a662bfdeb239,2024-12-12T19:15:07.573000 CVE-2023-25367,0,0,717aae8162d73c14f2031ca4e6d35a3c6339f31664c247e5a3044c78f0ab8198,2025-01-03T18:15:13.890000 CVE-2023-25368,0,0,9045fd682abf836aa58dc88f54032f36a259e19895d82843c52df057cb701a22,2025-01-03T18:15:14.157000 @@ -222132,7 +222132,7 @@ CVE-2023-26998,0,0,3d595fa31191b7e424e9de2bc1d4611c2d67b331f560fb4101add87055686 CVE-2023-26999,0,0,b56e220d76d422add9f8bf625668ffb617cc1f8e3b56abede0a3c81e14d7596f,2025-06-16T19:15:20.273000 CVE-2023-2700,0,0,39eae528fab2c9005417e2728ba40351fd5c31be39110f823a95f3ceafdaaa56,2025-01-28T17:15:14.093000 CVE-2023-27000,0,0,e7632f817e61d8a12de30f7cfd641dc1805aa79e66ef1ddb4d0513ee23d486e3,2024-11-21T07:52:10.270000 -CVE-2023-27001,0,0,3ac29dffc9689e6b71694979be6cfa0bad2c5d91addbadb78a74143a10316adc,2024-11-21T07:52:10.427000 +CVE-2023-27001,0,1,11f4550029e4f18814f49cb059457355046484ceed8f30f7ec482feff5c4d93b,2025-06-17T14:15:27.097000 CVE-2023-27008,0,0,1025aac055231396c7c04d404864dcb2609774418612e6608c48001f9e020623,2025-02-18T21:15:15 CVE-2023-2701,0,0,359ca3cd85c5ad292c6eb2e38c8d6f254861fc7eec8105a5b114d5cb8ef3d322,2024-11-21T07:59:06.923000 CVE-2023-27010,0,0,745a49b1c5716222865a934c6a0267c8e324416df9583e99aaef3e0918f09419,2025-03-03T17:15:10.880000 @@ -226931,7 +226931,7 @@ CVE-2023-32873,0,0,65dac95621bd11945fe69863088e83b075fc0f7059f5ab1bf54e4c8c64810 CVE-2023-32874,0,0,c4200f00c39dfa54f423142533ef1bf0a08fc0bb69117733aa52fbe5c9f656b1,2025-04-17T19:15:55.677000 CVE-2023-32875,0,0,116b378492d3571b123798ea305cffc67c1649a5e4687c7ea8e86905f1a52940,2025-06-16T19:15:21.480000 CVE-2023-32876,0,0,0ae622faa86eb2c45443b265e1b7ebe82ce175c154a1e7253080cf1b32a32f57,2025-06-03T15:15:28.200000 -CVE-2023-32877,0,0,67b00d8236c06bb5ef6d6f69f0da656f18ef587e78402deb79f54c65a21d78e8,2024-11-21T08:04:15.263000 +CVE-2023-32877,0,1,c1be61a166643a44cbf1f94476413b7c2566aabcbe1dbd7c3eead6ee7986c257,2025-06-17T15:15:35.757000 CVE-2023-32878,0,0,4ba592dccc3a790199397e7a15851c09029e953a4e17fee7a5caf3a9a68ebe8b,2025-05-16T18:16:00.943000 CVE-2023-32879,0,0,ead4f2b3a3d5dc3209c2b1326d161a11da486100675f641d2a72c75b316501f9,2024-11-21T08:04:15.503000 CVE-2023-3288,0,0,460dcdccbabb639d059f18f9cc926d0a7bdc301d497ebf5a7732131065332b87,2024-11-21T08:16:56.097000 @@ -227436,7 +227436,7 @@ CVE-2023-33533,0,0,3c4dc916ce0e09629a4d1fe9abe3d09a4054678118c9121ca7e5c0b829b1c CVE-2023-33534,0,0,375224b30005c5c6b4df976c11ab08ed3b921dbd5d50ac7db6447c43e9441aad,2024-11-21T08:05:41.057000 CVE-2023-33536,0,0,cb50e37274d092888d1fe39ac87a363acf8eaa47d7301bb2b831795e57af7d9d,2025-01-07T16:15:31.153000 CVE-2023-33537,0,0,e4de1c536060f7cf7b6b601cdcb55c69fae53fc6ccc20322c7e5aead8394ad75,2025-01-07T16:15:31.423000 -CVE-2023-33538,0,0,5ff9f917289a1fca73e2aedad3826e69e811aea50c56538f11efb54f648a6615,2025-06-17T01:00:02.367000 +CVE-2023-33538,0,1,91d3fb64a7e8d167f6f2f87dc0deb4418e5aca0fb3da23ef47cf5bd690cbabca,2025-06-17T15:54:04.850000 CVE-2023-3354,0,0,c1971a8d35c84792a7e3b4b69170665e207a3bb365fff75d5a707072047933e4,2024-11-21T08:17:05.117000 CVE-2023-33544,0,0,ea770ac3095100c0cf3dfef2c91d44acce796d4bc92ed10e70a1e80795446c94,2025-01-09T17:15:09.997000 CVE-2023-33546,0,0,9e82aede766f4b9b701714d917a2868af3b3571a49bd4b295d6aba2bb98c278a,2024-11-21T08:05:41.850000 @@ -229312,7 +229312,7 @@ CVE-2023-36223,0,0,d16652ecc22f089d29badb1a0087722df90b386d822612396de8168891499 CVE-2023-3623,0,0,58f6fbc2dac7804d2f6ad4649270cd072940718c8efc97f423d912b5674a0667,2024-11-21T08:17:41.730000 CVE-2023-36234,0,0,371f1a9fe6d1b1dc16b9d1ea10ea114e7eb692627ec7f646d52589df5fbb33fc,2024-11-21T08:09:26.010000 CVE-2023-36235,0,0,3d2b70007409f5f0c6d2adf239a32b1639fe653d423481413d2733dc7352c051,2025-06-10T17:17:51.890000 -CVE-2023-36236,0,0,ed892a5be5cd89045bf58519030585ee3526284778a1f01ad439665801e2d638,2024-11-21T08:09:26.313000 +CVE-2023-36236,0,1,a5c267f421ab22180ff0eeea07127c87c714de93f247e771e9a52a4bf4917dd3,2025-06-17T15:15:35.950000 CVE-2023-36237,0,0,66f4fa284ac8cd77d5adf7806a99441b2c7c7fb7455a5b3f41d46f4424732243,2025-04-11T20:20:35.777000 CVE-2023-36238,0,0,74d82b6db1d7c339bcbf92fb4d805a86745b3c5d31c3da1e2ecff2f0a20d7720,2025-04-14T13:13:25.427000 CVE-2023-36239,0,0,f9d13b68c05b1055dba1062750873e061858f8074fa25ddf4d3138bb3886ad07,2024-11-21T08:09:26.837000 @@ -232664,8 +232664,8 @@ CVE-2023-40280,0,0,c45cf50ab63830f7a9f75e4a63fafae07d7eaa4f6f787d86e26989914d6bb CVE-2023-40281,0,0,2b1967fd2299129e7658c6dec283a26e1de7f1934f9fe51581bfcd4cbbb260c2,2024-11-21T08:19:07.793000 CVE-2023-40282,0,0,3495f927d5ad5272c9834124fb4964646ea624e090ac7c537b5897b79aa7b7d5,2024-11-21T08:19:07.933000 CVE-2023-40283,0,0,ea7d04ab8378169ffa827568dcd4ccaafd56803cd46ec2dff1857c0ffb061d74,2025-05-05T14:14:38.967000 -CVE-2023-40284,0,0,8b56fa007ccd4bbed230b29efd2c0897e310ca95f6bd2babce75559e67af59a0,2024-11-21T08:19:08.287000 -CVE-2023-40285,0,0,ed92e6a7e52db18b578370a517833d68913d3001e4071c70035684eb0f178423,2024-12-06T22:15:18.837000 +CVE-2023-40284,0,1,d98ebe4ea76b40cf66f99e30639088439dd4539caf4ca9ea48acb6578968010e,2025-06-17T14:08:47.313000 +CVE-2023-40285,0,1,98880a6b3a0139fe1ff4567d51197e6720c116ef92ed40cc7babd5ad4556067d,2025-06-17T14:04:35.960000 CVE-2023-40286,0,0,8e9d52389fc0c47f7a1514c01c864daeeb13ffc272fede3ef4c2db1ff6e4f515,2024-11-21T08:19:08.693000 CVE-2023-40287,0,0,37a394888b36cde69e4ca366e6673bc51e3b31e8f5b7f129b2f746928cd5b774,2024-11-21T08:19:08.937000 CVE-2023-40288,0,0,a51a2f80aa883af4a3772bded1d5a1f6b88da721d93af181bbec64e9e3b463ec,2024-11-21T08:19:09.170000 @@ -233329,7 +233329,7 @@ CVE-2023-41095,0,0,282a9d4aa79158ad6d46a31a455ca81c3e9da9f3a94bb7051b01a4fafeb77 CVE-2023-41096,0,0,9d2a3b004a3ead57a4f92a053a3758d2797981fd58d85ec0ae508495ad890085,2024-11-21T08:20:33.533000 CVE-2023-41097,0,0,03f4bd4a8b00fb8b7a52cc9c13b6178930cda30aac6af422bcd321cc1aece9e8,2024-11-21T08:20:34.237000 CVE-2023-41098,0,0,39b456ecf7a1664fca44c9c7c6481e23f2765f62e896cdfa6f4e37aad580d66b,2024-11-21T08:20:34.387000 -CVE-2023-41099,0,0,7d0529f6a649e57435904a1f49aca75b29f07a0a101f029a5157d78e2d5c9caf,2024-11-21T08:20:34.550000 +CVE-2023-41099,0,1,ad6d89cd811e0dcf5996cacaffebfc09c5364a8951f8061aadb491e2623f63cd,2025-06-17T14:18:19.630000 CVE-2023-4110,0,0,4822c89a1abc6a9329b4f7541f02332de86ac06fd0b0237fd1ed86f9c29bbb6c,2024-11-21T08:34:24.857000 CVE-2023-41100,0,0,d283fa2d04e42862c76db903f6f0309a77427c93f343053310203383bdeabc6b,2024-11-21T08:20:34.780000 CVE-2023-41101,0,0,d963be042f56394c2c7c0ca42f294a5aed61510aea0f5b96288f2406cfeaad75,2024-11-21T08:20:34.950000 @@ -235503,7 +235503,7 @@ CVE-2023-4406,0,0,f0ee9fe45e3fd65d5a61760e63acfda0e9c8c2b35c8d03cfb54c0fdfc61d0c CVE-2023-44061,0,0,775180093b9e0ddfa76c99f4c2682fa8f3e61d51a315ba5136c34617113b9884,2024-11-21T08:25:11.160000 CVE-2023-4407,0,0,34a5fa3774d5c6ea7985cdcd0e169ba7c3f34fa9559c022e8cfe45e1f74b4bdb,2024-11-21T08:35:04.903000 CVE-2023-44075,0,0,a6dfc8a2eccf7cb6f4dfc9e0b7d9e7e20b8c491bbd361fcd66286e6c54b4a621,2024-11-21T08:25:11.317000 -CVE-2023-44077,0,0,16c7ba1da5624fa7825cd8322d4ad671604c92d8ef046455129539d66161d0ae,2024-11-21T08:25:11.473000 +CVE-2023-44077,0,1,1d545144591fdc9c7967890cbf2e56231f4f607563eef7b9d7af0412c4493c1e,2025-06-17T15:15:36.450000 CVE-2023-44078,0,0,f4721573d756898bfdf4e1579d72f102203d15ffb88367799bfb08cc3e577a80,2023-11-07T04:21:33.440000 CVE-2023-4408,0,0,b6b010488cbf768d9ee2aab2004e7252c91f3c1631fb8432c1806896d7c5264a,2025-03-14T17:15:40.310000 CVE-2023-44080,0,0,b25eb53e997cd2c2a4d04ca2ce46ff09177d84024f28694643dbd3372f87d4a7,2024-11-21T08:25:11.650000 @@ -237073,7 +237073,7 @@ CVE-2023-46327,0,0,6e1a3dbdea44feac54dee9bdc750cc0b60a31e9c729b984d4fbd8cb5bee62 CVE-2023-46331,0,0,495955235e870e660b46964a34bd9063cd362321cbb29e40de4f0f48f12d439d,2024-11-21T08:28:18.993000 CVE-2023-46332,0,0,31a24576ef50f9763024fab6855d62d9c1032744ba000d4a61061b05a3485aac,2024-11-21T08:28:19.167000 CVE-2023-4634,0,0,45def46bc938918fddd0e814a4f6baaad0a1dfc469762bed0eecafed7137dbe8,2024-11-21T08:35:35.040000 -CVE-2023-46343,0,0,e2b7d5f4d3f41be5481921c43b538deaad8d340959da379329973c75a0e20eab,2024-11-21T08:28:19.323000 +CVE-2023-46343,0,1,29129641a33e74be6c1adb37462c09502d6ae031c6dbe7f58127748cff348280,2025-06-17T14:15:27.323000 CVE-2023-46344,0,0,f7d6095a4eb8dbe0569347cda7b2456613a004671a444ac98d91e1d00adc8103,2025-05-07T21:15:58.080000 CVE-2023-46345,0,0,9253504bad04e5faab779200996a50e61a212166caa26a7a54a3cdc7a0f5ba54,2024-11-21T08:28:19.677000 CVE-2023-46346,0,0,ac50be1bfae36630cf5b77dabff4046d438d06f98eac0c576135931a514de2c2,2024-11-21T08:28:19.843000 @@ -237557,7 +237557,7 @@ CVE-2023-4695,0,0,c74100712c0e42f2b7bef88d5e27d52041bc75691f61dc3feaace92a91b703 CVE-2023-46950,0,0,609a6af0a53c82039d742da7f4e89dbe20270af7542bf97b5e36b7e496720de3,2025-04-18T14:30:56.840000 CVE-2023-46951,0,0,af6d22cf4696c26298231efc86f1a698ab38a2f263e7c3bbf15f2108d2b23443,2025-04-18T14:29:50.863000 CVE-2023-46952,0,0,456523e52a149d5bc163d7db86ef28de68b775018307ac7d30ce518c829a4f2e,2025-06-02T15:15:23.287000 -CVE-2023-46953,0,0,68a9b090f6d4d3190cf6a60025325fb0ec08ead21ebe8036db9bf430145304fa,2024-11-21T08:29:32.780000 +CVE-2023-46953,0,1,e30b7ec3c2bba44a016c1956bb7c3e1e870a2e25cbf5fc606018555221e4305f,2025-06-17T15:15:36.700000 CVE-2023-46954,0,0,cd206134cdff7486e042f0ee79fd9ddca5805b61cff02233e93cb9bd80548133,2024-11-21T08:29:32.937000 CVE-2023-46956,0,0,36b38e05a88bd4c41daac6504cf1af5d6543790a871f63dd3c61bb1a55b4ded7,2024-11-21T08:29:33.177000 CVE-2023-46958,0,0,784f9dc1566265a426825ca548444a17e30288cc3f47efc25ad1be90f8920063,2024-11-21T08:29:33.393000 @@ -238380,7 +238380,7 @@ CVE-2023-4817,0,0,6449695e70cace3a77c89e2be23ba0b940d8bb3903aa47d28c2970f08147ec CVE-2023-48171,0,0,e8da85f2020031f57b0697bb75e8682fc7c287f67e15f3f2e7a48d83c80a63f9,2024-09-18T18:54:08.080000 CVE-2023-48172,0,0,98bc1f4a3eedf8e0ffe8418da8569fdf971e71b50a1721f0a8f3af6c7048d3fa,2024-11-21T08:31:10.430000 CVE-2023-48176,0,0,8958c238c0f1453e68eacc681fec4b12f14f83f55e3505dde321e4c434bc5fdc,2024-11-21T08:31:10.567000 -CVE-2023-4818,0,0,75711385fa97dd4691a7ad163015d9005eae68244531c17fad4e7a071681ec9d,2024-11-21T08:36:02.230000 +CVE-2023-4818,0,1,4f3c761b7fddbe12c67787df607ddf77fe8064fd45cb76cf04e0e18a06b8869b,2025-06-17T14:15:27.577000 CVE-2023-48183,0,0,494a44ced24924131382ed1e395a760efb49399eca86efcb17f6f2db96f7f780,2024-11-21T08:31:10.710000 CVE-2023-48184,0,0,6362a993c0d1a058eb84861c06d397bc3d8cc244fdc633828c5a500e75c32523,2024-11-21T08:31:10.920000 CVE-2023-48185,0,0,2d20061e19e376895e9283359ed89c7cd512ddf64568fd1256f29f111581d30d,2024-11-21T08:31:11.133000 @@ -239742,7 +239742,7 @@ CVE-2023-49833,0,0,d18597be456f334cb6e7261800855280d9e590ede3c241c7df50b343ef49d CVE-2023-49834,0,0,9af32e71aec1c900f10a1919ce40c423d33500e1360db47f2c93be4cd95603ef,2024-11-21T08:33:55.660000 CVE-2023-49835,0,0,0212543a30c077ddf1cff930dec51394a58d8fd733950b259b31d9c61e602985,2025-06-09T19:23:43.620000 CVE-2023-49836,0,0,f17819488a7cb8ae4b2121f5a078b561f27426e62e0d69d877b353d18d01fd91,2024-11-21T08:33:55.787000 -CVE-2023-49837,0,1,4f9d5b6d56ab652633ab86afc7bd824cc4e65c653304c427c99ab5e88246d843,2025-06-17T13:48:25.623000 +CVE-2023-49837,0,0,4f9d5b6d56ab652633ab86afc7bd824cc4e65c653304c427c99ab5e88246d843,2025-06-17T13:48:25.623000 CVE-2023-49838,0,0,3e5fc80f29bf176873176454fcde64084e4bbacaebc8469c4e2fdcd7377bfa0b,2024-11-21T08:33:56.047000 CVE-2023-49839,0,0,0741e732654ee1e7c7ed82db220a1c9dae75874dddcde52d90d6f372ae660622,2024-11-21T08:33:56.183000 CVE-2023-4984,0,0,c49b34d61d642874a7dab4e0993efd83ff13c0f5c680db37994121585f641188,2024-11-21T08:36:24.280000 @@ -240137,7 +240137,7 @@ CVE-2023-50383,0,0,e859d76f4d38e71520f31d9bb502fae7a56c4ad7c8e60650734d136fd3214 CVE-2023-50386,0,0,3d321338d1a055ffe7a3a345a938e437dc20e4ad923215c51fd1986958a92376,2025-04-24T16:15:25.233000 CVE-2023-50387,0,0,cb856c3bfc13af4dcaa4ed06ca8ac19baeace1cc350fe9fdb765b9024674fca8,2025-05-12T15:15:56.673000 CVE-2023-50395,0,0,5a03be257462b96247a33ff9bc28570e66b4d2d1a8806b5e027f41fef36209ed,2025-02-26T18:39:31.457000 -CVE-2023-5041,0,0,d20889ac41b584423601989f870a665bcd0d92276ca0146db8d3e313fe40e5ab,2024-11-21T08:40:57.330000 +CVE-2023-5041,0,1,6a97996a65e61ba3bde0766fe22cf99f13e9aaa6dbdc176ef10844d94732c74f,2025-06-17T15:15:37.327000 CVE-2023-5042,0,0,583154dcbfd3cb946a120ac423ee75be90414774fca8121b6822cfa3fc94675e,2024-11-21T08:40:57.487000 CVE-2023-50422,0,0,bdff8ba036da6b26105337173bc51856c709f9be56dac16c287bd4da35db944e,2024-11-21T08:36:57.380000 CVE-2023-50423,0,0,5da3babab3eb6370806d56310fc13e210383decf103de1410819dd323c0112b7,2024-11-21T08:36:57.623000 @@ -240461,7 +240461,7 @@ CVE-2023-50963,0,0,048c774e65664cc2dd04bbd2bb0bf5e5a8b33087c54a2292c3e70ba4f76d1 CVE-2023-50964,0,0,549af7f5da0e21621df175ef0896772987500a2810b5c1dbe76aa4da3e042b22,2024-11-21T08:37:37.223000 CVE-2023-50965,0,0,2248dd39e1f341a1a154c06aea86ada50b6e9821e264cf1bdafe227413ceed98,2024-11-21T08:37:37.377000 CVE-2023-50966,0,0,ac780191361fdf85a58e0befd7ce245c0c5da0a1412bfb3ad2f8a5003e66bff8,2024-11-21T08:37:37.547000 -CVE-2023-50967,0,1,b252ef3ed4b813b672c2d6762b779c59a6e76ffe30d88958ae2bc21dc08dc1f5,2025-06-17T13:12:08.180000 +CVE-2023-50967,0,0,b252ef3ed4b813b672c2d6762b779c59a6e76ffe30d88958ae2bc21dc08dc1f5,2025-06-17T13:12:08.180000 CVE-2023-50968,0,0,944ad922dfdd60222188e5019e8a60d8a32f72d029e1d0d5b439b02a7bf2f497,2024-11-21T08:37:38.070000 CVE-2023-50969,0,0,637c6ad9c04c25fc0db7aae47f996533c2be1e2bda2d280957da106a95f376a7,2024-11-21T08:37:38.217000 CVE-2023-5097,0,0,5ebffe674500c6e376e941b2f6ae82b644c3b67a160f7d9b5e599506925766be,2024-11-21T08:41:03.227000 @@ -240610,7 +240610,7 @@ CVE-2023-5127,0,0,3fdbc762852bea80fea6b909cf2814d7df78ac1c27f25416e9e0960c134130 CVE-2023-51277,0,0,71531b68baf02f85eaeef36923f7d51d7e051421ccffd83857febc5bd81c2ba7,2025-06-03T15:15:47.833000 CVE-2023-5128,0,0,bfe204edd11054b27893926793a261843cc5aafcba80836f465a9cbe06b587f5,2024-11-21T08:41:07.113000 CVE-2023-51281,0,0,79b04eca98fe1dab6ef30c2f8202fae9473ab06251454d69918e9613759ab9ff,2025-03-28T14:35:27.157000 -CVE-2023-51282,0,0,8e64a1bfc8d57aa569e5ddaeb84ba0deccb82f824ea2197546b9a82d011d8c15,2024-11-21T08:37:56.710000 +CVE-2023-51282,0,1,92fba247a376c03ff97f61f096914933a969f30ef05b36ef0736d4194fb363ea,2025-06-17T15:15:36.863000 CVE-2023-5129,0,0,3c0d5df1426e0bdb75917cedbbb32908a5a7c5fa2c2f7eca16ba24a2fca6eb00,2023-11-07T04:23:29.527000 CVE-2023-51293,0,0,5ab25a2432647284e418ce08ca217e3063c752c7b6837e432b2d3a75a55de48e,2025-05-08T16:15:23.687000 CVE-2023-51295,0,0,893c6eb7600f1e2cdbcda789eb41147f17fce3c65bd77c3b8309feecd2d34c5e,2025-06-16T18:46:36.130000 @@ -241112,7 +241112,7 @@ CVE-2023-51785,0,0,7bf1201aabfd5c1bdb73bedf6df5815eade722db6edea80760f3c662c004c CVE-2023-51786,0,0,bf09d8f8f63a4e3f6f66005c6beaeb401c697f84374e0c65b239308cd8cc1700,2024-11-21T08:38:48.360000 CVE-2023-51787,0,0,5f8d2c782dc788eee813e2402dfc152dffd31830ff89bb95262b37f03302844c,2025-03-18T15:15:46.463000 CVE-2023-5179,0,0,61058694efce3a9e55af6e46169562fc6182f98fba78c8e491ae3a650293c88a,2024-11-21T08:41:14.720000 -CVE-2023-51790,0,0,a13b0c105e48a1a5b054d117a534fd4b2227bbeed075d8bc49d0275385a6a9e7,2024-11-21T08:38:48.780000 +CVE-2023-51790,0,1,7ab41766ed0f7b5ca024c8934ee9f859c1d0b012e924518e1ae29a1dfaf5e5fb,2025-06-17T14:15:27.850000 CVE-2023-51791,0,0,9a6e5760c598d28ed4df3a899528f346222833d0ffd0fbdebe747dca9fff247d,2024-11-21T08:38:48.937000 CVE-2023-51792,0,0,61db6c9f246b9cf4bb8433ae5242804a21463c4140fc3d050bb4d70e85a3e1af,2024-11-21T08:38:49.180000 CVE-2023-51793,0,0,2645a86482ce4e1c0887c226114584c44d66b9c7a6a46c208530475cc9ab7475,2024-11-21T08:38:49.410000 @@ -241161,7 +241161,7 @@ CVE-2023-5189,0,0,f877579052e7e020385bd9010538c2c710e7d8d7f1242bfd44a5823be3c899 CVE-2023-51890,0,0,2b6091a001d1db9add9c03f6d7eff0ad33ec925e8861f3124beb43a9f1371b2a,2024-11-21T08:38:55.530000 CVE-2023-51892,0,0,1b6073fa69bcf42a46211f2d4e0d0705f0efa5d449540db3d7473beb8f33540b,2025-05-30T15:15:26.200000 CVE-2023-5190,0,0,d8a4ea45160d47f1af14cb80d174ff8977d085cc3f8bb05f2897e432ea5f6fea,2025-01-28T21:34:19.250000 -CVE-2023-51906,0,0,dcaa2f0b0dc30bcbd5cca54796e11f7cab839434a57be609c8c9a61ed0212161,2024-11-21T08:38:55.823000 +CVE-2023-51906,0,1,e143e1c504db70661bb9fc22809cc974bf3750f027fe465de939c5607b0e652b,2025-06-17T14:15:28.030000 CVE-2023-5192,0,0,59e8b3a63b756e27580f62a0295ee68438268b96ea1db1c38e14753d138f1013,2024-11-21T08:41:16.347000 CVE-2023-51924,0,0,3ef97b73d74cd4fbdcb2de18a47ce42fa049c1fcfcc1125d67daa3051dd5b262,2025-06-16T19:15:27.897000 CVE-2023-51925,0,0,117828602ffa5cf4a8f78de252e2339ea9d748f270af8944adc20dc801b9d4e4,2024-11-21T08:38:56.147000 @@ -241217,12 +241217,12 @@ CVE-2023-52029,0,0,ded14f1492191a90ab9b2dfc9b6f39adc1c3c071931bb22dd43a8a99d88f3 CVE-2023-5203,0,0,7fa210ffb971b4eef44e9726f598e7acff4028f9372a76da85ed815e64bbbac0,2024-11-21T08:41:17.580000 CVE-2023-52030,0,0,6a98053b86d79fb19dbd295e1e2501b2ea7ae15c4004b4efe760c6a885606eb1,2025-05-14T20:15:20.593000 CVE-2023-52031,0,0,de0e66aef02bfa15fd90e4805761b505563baf6b0540d5057e33522d94b496a1,2025-06-03T15:15:48.887000 -CVE-2023-52032,0,0,96c86c56404afffb324ec68fcb2332326cf375a43929cebbd6cd1839647aee2d,2024-11-21T08:39:03.040000 +CVE-2023-52032,0,1,1f3ebfc7848e7a9cb13c18618b9019798792d2fc53d4403659618fc2837d4eae,2025-06-17T15:15:37.040000 CVE-2023-52038,0,0,eb1de472f1082b9c50008ec04a4ae7d3a6185d807b63ff44d5cad288b96f92a0,2025-05-30T15:15:26.660000 CVE-2023-52039,0,0,aa7e1ecd8fcca88faf9d723d93e4259830cdff734e4be1c030b047b447472d4f,2025-05-30T15:15:26.850000 CVE-2023-5204,0,0,a5190d82b8d3d7afe06c79d9dbab50f2b73ea26103b410c4da1037e33008bbc0,2025-05-12T15:09:58.850000 CVE-2023-52040,0,0,7249fa2e919fe531794a77cdfc58237aa186075b6f7eb11746cb5af750d95ce9,2024-11-21T08:39:03.490000 -CVE-2023-52041,0,0,266e4b569b2673c9c3796b9449940a8d835a0b4a45c9f3e4e0ccbf1748f5a761,2024-11-21T08:39:03.710000 +CVE-2023-52041,0,1,91c36bb1744ad51bc51ca740957583f9392c595280ef3fe46afbf9220199fc17,2025-06-17T14:15:28.197000 CVE-2023-52042,0,0,0cb454c276748a3c4d6c8e39d6f56a86ccdf1f7fc0e3910b9980df0c50cf06fc,2024-11-21T08:39:03.863000 CVE-2023-52043,0,0,90e54dc8f5faefeb0db40410720bff86ff8cbfce9cd09d50903f4f37ff56e3dc,2024-11-21T08:39:04.113000 CVE-2023-52044,0,0,5b5e70107668847bba1d6062e34c0bf4eaededd76c0935abbe5da27ca0360f7e,2025-04-17T19:11:53.057000 @@ -243120,7 +243120,7 @@ CVE-2023-6157,0,0,080d6cd4cc425a0afe05178fb35b017e8e858b49dece9cd4a0bbac63bc23ce CVE-2023-6158,0,0,5d5c75a44d75ddb6195e5041513e2cfb5614b8f718ceb15f790e06f6777c1804,2025-06-03T15:15:50.993000 CVE-2023-6159,0,0,267ca5e8b86acd22eae5e8507e284e28e024960b25212ba7e8a55dfdd4a59ae6,2024-11-21T08:43:16.580000 CVE-2023-6160,0,0,120d064e1078ef21ebae8d628d0427ec7c55f80773b38dc89d07e36d52c35e0e,2024-11-21T08:43:16.717000 -CVE-2023-6161,0,0,f3edb5d2f57bc23de1bebbbb38f32a23d08c15db099a50cf3dfe50ede0913ad0,2024-11-21T08:43:16.843000 +CVE-2023-6161,0,1,bc381753eb30a580931a9268d3b76d391232c6fb38d2e592d29ea86c1c25ab1e,2025-06-17T15:15:37.620000 CVE-2023-6163,0,0,3820df48e0a5ca1113079079a9cad75d299b2e050fe19da70680994a056c89e8,2025-06-09T21:15:45.757000 CVE-2023-6164,0,0,c38c3815e9359341dd72cef4b5f5d1810b57529c8d80538cacdf08e0183f1b7f,2024-11-21T08:43:17.070000 CVE-2023-6165,0,0,c373f75a58d10b9469a2d8ff34d698f24ff9ac2f96374db48b7d182206d3d27d,2025-05-29T15:15:27.133000 @@ -243369,7 +243369,7 @@ CVE-2023-6441,0,0,f1e89a7c13d3ccfdc0bb97b3b506abd2cd8d7a92cc8c42b12a684a36d95255 CVE-2023-6442,0,0,039f356490ba21737d0637d3585b8f0cb39a9dbea5ce5d94663966bac35f3bf8,2024-11-21T08:43:52.413000 CVE-2023-6444,0,0,b1ff37d44817c82fe1eaedd03d7f9c5735472f547dc6a65b89d5f15b340f79ed,2025-05-01T00:09:05.283000 CVE-2023-6446,0,0,3fb2608a7d2227a8009188176dcb3fbb6899c8c4c439e7336690fac0d0b63c8d,2024-11-21T08:43:52.740000 -CVE-2023-6447,0,0,baa35d8c97eaf94b47b556e2d66301885fb42321a160e3313c101cd07ff630ee,2024-11-21T08:43:52.870000 +CVE-2023-6447,0,1,e764724c7ced402eb33b9d4764198f73c487b19c36f26f7495bc3f4be44dc6e5,2025-06-17T14:15:28.470000 CVE-2023-6448,0,0,1567953113b8e9350a6698af9843f43336c4a4ea3829daf3f026215dd542c09a,2025-01-27T21:52:49.177000 CVE-2023-6449,0,0,298d83ff1fdf0ab4c481fc476ec85fd0b07f999107230aeef4c9d231b7aeb5e4,2024-11-21T08:43:53.150000 CVE-2023-6450,0,0,fac4da1df5b1f2a713490686a9163699c2c6616fd46f4ec68039f7fb07f2b229,2024-11-21T08:43:53.283000 @@ -243931,7 +243931,7 @@ CVE-2023-7070,0,0,d4f8c7975a3506a7dcc8c4cfe544d8efda7b15b1eb3e3eebf34fdba11847a9 CVE-2023-7071,0,0,f60f3c803bde63d7b882878d79ca913dba396e005e3f7370bbe2b6854179506d,2025-06-03T14:15:42.597000 CVE-2023-7072,0,0,23fa1af2087ffb27192d96427a8ce6f5c19cc93d8c827b357e0e8ace44d8ce0f,2025-01-22T17:40:31.817000 CVE-2023-7073,0,0,85b3734eba0e857f75453bf3ac337fab097371ed1baa19537546b7ca2054c908,2024-11-21T08:45:11.537000 -CVE-2023-7074,0,0,291d8c5c534661f5dfaf35a7ff2936d8f8587deb8df66b45ac15b47f998232e9,2024-11-21T08:45:11.670000 +CVE-2023-7074,0,1,445a463be496c837f584e8017edc9ef33a796d45870e53d361ca65c05be75eb5,2025-06-17T15:15:37.787000 CVE-2023-7075,0,0,d0df2f8a9cc7c4dfc585b329a5ad90139d84978807f1e8347549224668d83135,2024-11-21T08:45:11.810000 CVE-2023-7076,0,0,3ac51d46bb9f82f95635d08ccbd9e8f7d2e94c3fa520005cfb73818fe2a70841,2024-11-21T08:45:11.957000 CVE-2023-7077,0,0,9bb95febbeabd70159e29cbb53c665dc0ba47398660267aae9df7359506e4479,2025-05-15T20:15:29.743000 @@ -247972,7 +247972,7 @@ CVE-2024-12825,0,0,e5a4d7f38d6d259b5737402affdabce23860527403323be321069fe15e333 CVE-2024-12826,0,0,5299c46313436d68c9289650a6ef6457bf429f032709c773f24c86ea6949c331,2025-01-25T08:15:08.463000 CVE-2024-12828,0,0,a29f7d175d08af9e9a3e3b2d9a239843d4c47c7b84f9529c7b9ddf19ae5c7fea,2024-12-30T17:15:07.717000 CVE-2024-12829,0,0,b6def8373fb939ecec35d929ec57c311d0480519af7a0919a5038b5b832e9ed5,2025-01-03T17:46:48.507000 -CVE-2024-1283,0,0,b1c9571efecc70819ed9018aef1b79e079809dddea59c76e732d84247ac1db52,2024-11-21T08:50:13.640000 +CVE-2024-1283,0,1,6c1c96d7825672909441950dddf73708269f69b6a4ba53cdeb3469e0fffe0ab8,2025-06-17T15:15:38.487000 CVE-2024-12830,0,0,18bcb0e40539df86d5019b2e3a08e03e4a9e7df31568fecf257a302c1fc01bc8,2025-01-03T17:47:52.397000 CVE-2024-12831,0,0,ff4242668f135de6fc9c699db6062145287dcf5202b9f05a586e3bb6a651bf5f,2025-01-03T17:48:53.940000 CVE-2024-12832,0,0,46214a3c8f752d4a2eed28a89cf2d84504348b14c7a5e391464558b4113950be,2025-01-03T17:50:27.337000 @@ -249732,7 +249732,7 @@ CVE-2024-1998,0,0,4588679fabfec7cfc1601533f6b3d06871ae6e9d9962008d18bd8e3dcde350 CVE-2024-1999,0,0,c59a5c28ef3ed84e72f2dbc570e2ebbcac67f0efd64c2931b0b4f6d75abc8d91,2025-02-07T17:54:53.463000 CVE-2024-2000,0,0,131a5b834ad6429b4444b9587f55da12d55e7ba3458f3d2854b921a3dd00f3ce,2025-01-23T16:34:23.897000 CVE-2024-20001,0,0,87ee233f6c981b0de014cfca839e85f06966eed21fee7bcc712dc01deb584036,2025-05-15T20:15:41.387000 -CVE-2024-20002,0,0,55a994447631f5951a6e1275f63c34e7fa418e413ae7221c0028baa239663e52,2024-11-21T08:51:46.143000 +CVE-2024-20002,0,1,c8d30080282b5130d06987d577813e0e774d9c8ba4af97d42ddc06bfa4749a8d,2025-06-17T14:15:28.767000 CVE-2024-20003,0,0,79362f7e34cccc0afd3abe9f4ba7baa825f3eb45bc504c607750ca92392388fb,2024-11-21T08:51:46.293000 CVE-2024-20004,0,0,6d2734a2709aa2a549c91b390b1e6acaa344bb76ff5c26f95d989fa3421a95e4,2024-11-21T08:51:46.530000 CVE-2024-20005,0,0,4f39843e6bd6bd21fe808524fbc243f31d0803af04fb2c2ec4b27452926ad2fe,2025-04-22T20:36:03.550000 @@ -250196,7 +250196,7 @@ CVE-2024-20526,0,0,7517c9ae25f2ed0403d64d3a7e54d668b651e2debacfb8240f871264993f1 CVE-2024-20527,0,0,41d67b4d9f7335686e1f0c90f125814a72e812da4f51f733338257e60119d81e,2025-04-28T16:54:04.050000 CVE-2024-20528,0,0,ee08564a639eb2ffe8083f1dde5dac6dc26002c0a6ca8c5f163532c25fa1a3cd,2025-04-28T16:54:17.767000 CVE-2024-20529,0,0,449aaca13405a2300bff3c71a4bf477076672b57a91dc5b86499b4c65b07ce43,2025-04-28T16:54:35.190000 -CVE-2024-2053,0,1,21405406427ed68d991e7b3e408223f21e9892dbcc25ef8a0ff2a347d824e36d,2025-06-17T13:57:02.687000 +CVE-2024-2053,0,0,21405406427ed68d991e7b3e408223f21e9892dbcc25ef8a0ff2a347d824e36d,2025-06-17T13:57:02.687000 CVE-2024-20530,0,0,4b6fbf3cff3c88ea323fddebc6c0cb7ae788b03316d792f4072bca3f4bb0811a,2024-11-20T16:50:11.577000 CVE-2024-20531,0,0,146b432bce918b7fed6c81c3e05a5e8691f6946a09048d0bdbaeec668bebfdbd,2024-11-20T16:45:31.467000 CVE-2024-20532,0,0,a98adf38c41b4add687eca1d2d364554896ab5d585763cfdfa251477c400c149,2025-04-28T16:54:40.020000 @@ -250206,7 +250206,7 @@ CVE-2024-20536,0,0,0cf8e906b7364c76c10f292b3b2b51c7ae8671839fdcde7e5640903f053fb CVE-2024-20537,0,0,0bfe7d20eb908fe59c92f0ddc5b2954d997f12f86e91ea166b79219997cc0a48,2024-11-22T19:53:29.893000 CVE-2024-20538,0,0,637fb37b3ad9056411de85e8bb83ad084f423ca94786a8c8b68482035d3eaf97,2024-11-20T14:36:01.810000 CVE-2024-20539,0,0,5f38f2d2f952ea770144dc8472aa7e1a56064e025be3a5b1c9943883cc7029ed,2024-11-22T19:42:09.633000 -CVE-2024-2054,0,1,ede2f9ceb81ca8294be028282df8039e2040dd9c9f2c94586f0a435228d262c1,2025-06-17T13:56:40.113000 +CVE-2024-2054,0,0,ede2f9ceb81ca8294be028282df8039e2040dd9c9f2c94586f0a435228d262c1,2025-06-17T13:56:40.113000 CVE-2024-20540,0,0,b101248a8efda36e915c412442fe685653fc473fd659fbc78c35cc262111a7d1,2024-11-06T18:17:17.287000 CVE-2024-2055,0,0,9c9b4203c5a8691f7ee3b1c0f37424285bdb22c4e9691349b0a7161f418f3aa7,2024-11-21T09:08:56.533000 CVE-2024-2056,0,0,68371bbfe3e7de0ab75bbaafdb9ba13342e9ac1572c260d9b23595be0a55c605,2024-11-21T09:08:56.727000 @@ -252013,7 +252013,7 @@ CVE-2024-22559,0,0,af00b961063945ad2526dcb3766cd0bfaa8ddb4afba0a251413b3b4f5c40a CVE-2024-2256,0,0,a9cdf8c119abdb1591c1ea139372886975f6825ae6823e4c7f0bfa86ce66c0ef,2025-01-23T19:19:01.903000 CVE-2024-22562,0,0,52da9ef53608fcf7b329dd71f779423dce3806b86d8b5ddcb8c4a50dd1509b52,2025-06-16T19:15:31.020000 CVE-2024-22563,0,0,a7ae3576922d6f1ec5a4bf27e4449f9ff98437ebeb4d111a20b9a37f30d1df00,2025-06-02T15:15:31.033000 -CVE-2024-22567,0,0,2a034ecf0e68a255d1c72f03aeb92b1775a988d7343bb0ed2af9804759f912f1,2024-11-21T08:56:27.563000 +CVE-2024-22567,0,1,fcd408075576acc17516e56b26bd418b9bbb5e3e9ffcf6fa7f272e757a716790,2025-06-17T15:15:39 CVE-2024-22568,0,0,3880556bf46833b64579e87b398833833f840f929944234dc82abb9760bd1590,2024-11-21T08:56:27.713000 CVE-2024-22569,0,0,3a55b2ee886f6b6e4a8f99a6df1ffb40539c265ddbe381d4a10f0cda4ab2a1d8,2025-05-30T19:15:29.023000 CVE-2024-2257,0,0,6326751678e552f2a5b329ffd28dd832a7b3b3968f1851a84cee129e01bef6d8,2024-11-21T09:09:21.760000 @@ -252159,7 +252159,7 @@ CVE-2024-22905,0,0,af861a89b31b1cd519cf02c39e78baf454e4f374e5027f26c4ee555cf3533 CVE-2024-2291,0,0,619d761e61f944fc6b549132505892b7a31cc16bd266518c53fa8681dacbbe93,2025-01-16T18:02:45.747000 CVE-2024-22910,0,0,3883a21e4d7ebb68711e4eeee92068762683ca55d6c27ae707217eea22f9d1af,2025-06-13T12:52:26.857000 CVE-2024-22911,0,0,c5c45760e04e38e3f527d6abede56871d14899fdbce1f2fceed9a671affb60a8,2025-06-05T16:15:26.963000 -CVE-2024-22912,0,0,5ea775660d89bfc8062a1a2e64de2f4dcb16849b1db5073b4dff385a0b1fad2c,2024-11-21T08:56:47.240000 +CVE-2024-22912,0,1,e7311088655b34d9f6b0bf7722206f645bfb9b0f07d5a9d4a72a88ddd8d786cb,2025-06-17T15:15:39.170000 CVE-2024-22913,0,0,ac1aca178c5689a84a4fe1d3de2822fdbc55949d87e5fc11519420261810c862,2025-05-30T15:15:33.337000 CVE-2024-22914,0,0,62b78c42de78eae9ec85357ee373b76ca654492c7be19bbe9e95f2da85fae82b,2024-11-21T08:56:47.543000 CVE-2024-22915,0,0,32a8402524c28738ba5c982871940dfede8bd85f6704a228ce9b9ff3d1f4db69,2025-05-30T15:15:33.513000 @@ -252202,7 +252202,7 @@ CVE-2024-23049,0,0,123bfbcf3c065f85e1671e94c372b42e7730e61d2f549ac590a6713bc73df CVE-2024-2305,0,0,8e03b8f2ed7cc707ba8b68648aaba53ab636fc8cf60b101c18404f02d1218f6c,2025-01-31T01:48:22.557000 CVE-2024-23052,0,0,f64915640578da4aa31f36b2448b98b95ef3ed79182c0b353ac064ff3a6c2d29,2025-01-16T17:53:25.507000 CVE-2024-23054,0,0,57c8ee13e5deea4252b00a79726f9264b2ea14e0ed94c41b033e36787c15e590,2024-11-21T08:56:52.347000 -CVE-2024-23055,0,0,424171c81b8faebe79d8fa44169374c5df8b725bc8a3c3cfaa5dd80c008f24c8,2024-11-21T08:56:52.597000 +CVE-2024-23055,0,1,1e3b1a669577a46f7d03d8cda5f25bc4193c2d7c34a7f28eb3c652b8d42aeec8,2025-06-17T15:15:39.340000 CVE-2024-23057,0,0,c9a0fba17c8ddfbbfffb041e148435e71b05f1ddb663ebd20878bf31d80a5eb5,2024-11-21T08:56:52.757000 CVE-2024-23058,0,0,6732b65704f03192487f327f389531e0f75a12286a4a4827a9806d807ef51a3e,2024-11-21T08:56:53.007000 CVE-2024-23059,0,0,b446b502f04bc0516858214fe2428dbfd12b0f88e8abdb01c38d33250c3b500c,2025-06-03T15:15:57.867000 @@ -252794,7 +252794,7 @@ CVE-2024-23682,0,0,d480875c483a3225e1bcb0a50270b6be595b10e20e0e11d57cfd604ea66a1 CVE-2024-23683,0,0,e8a65a9c68ed89ff653850d40ee6655fd3f498423653598b44b1747c6974b57a,2024-11-21T08:58:10.077000 CVE-2024-23684,0,0,00958e2aad4899aef14dd4d50a4c8f14f417e06cc83b441ac027d6a6af2be0bc,2024-11-21T08:58:10.200000 CVE-2024-23685,0,0,4d76ba887ba6b7199a905c61f87b44242c3388823e23b896c25e6f2138a8f59c,2025-05-30T15:15:36.670000 -CVE-2024-23686,0,0,7e0645541c015ac30eda01c537743860b35759e6fbb6cabea618c05607474d07,2024-11-21T08:58:10.460000 +CVE-2024-23686,0,1,10a859b2769f06121695244710dee0adba855bb8d07823189b04c828a699df3a,2025-06-17T15:15:40.450000 CVE-2024-23687,0,0,c9b20f1f460b4646812b2de79b6a7f155f494e9c7341321ab8ceed7c0195c95d,2025-05-22T19:15:40.330000 CVE-2024-23688,0,0,c659042598645c0c0fe5f9aca9a8b934e5ec750f56491cd83f91b6f1b5a4fb4a,2024-11-21T08:58:10.720000 CVE-2024-23689,0,0,9f4b8ee5ef4f90ecfc201e7d2b464f6dfc2a4feb6214f8fcb78fb2d73da1b3a1,2025-05-30T15:15:36.853000 @@ -253101,8 +253101,8 @@ CVE-2024-24023,0,0,3ee9e259451a221bd1226a86ab24cca18a0427c8accf85594b7fe8589f86f CVE-2024-24024,0,0,ff57aa61c54e7eae66c872d65974ea9488880180e192e5435db730a2dba0aa85,2024-11-21T08:58:50.610000 CVE-2024-24025,0,0,7254548f6b8ac2b8ef1daed9ec2e1b1b876a658e364c41215144a94948aa5a53,2025-06-12T15:15:36.090000 CVE-2024-24026,0,0,d30e0ed7fd28a2b4872b8c86cea254006212452fa02aa8e340063d334f3dcb08,2025-04-24T16:15:27.310000 -CVE-2024-24027,0,1,ec6983996d129d9023677bc7e984f26d141eb3011e730c8d748d03df762d1ebb,2025-06-17T13:47:56.350000 -CVE-2024-24028,0,1,724084298b1dbcacda5f235f72078c0df49f5bb1e6153ee0d52cbab9a56229a8,2025-06-17T13:02:50.173000 +CVE-2024-24027,0,0,ec6983996d129d9023677bc7e984f26d141eb3011e730c8d748d03df762d1ebb,2025-06-17T13:47:56.350000 +CVE-2024-24028,0,0,724084298b1dbcacda5f235f72078c0df49f5bb1e6153ee0d52cbab9a56229a8,2025-06-17T13:02:50.173000 CVE-2024-24029,0,0,af68655e8fbc4adcf9874b4c20d41fedfd5eb062f4d7ac468ed562cf3b508811,2025-06-12T15:15:36.290000 CVE-2024-2403,0,0,0401653e665e07850d0979eeb0951a8f7eb57e50afcaedce51caf1bac8897208,2025-03-26T20:15:20.150000 CVE-2024-24034,0,0,2e37ccde6a893ff8eea80e8e829c47c7fbddcb1c502f4176668c4eb4768c1d4b,2025-06-16T19:15:31.420000 @@ -253137,7 +253137,7 @@ CVE-2024-2411,0,0,80617ce8dc31b8e83eb2beef80c39afc1f74e19ab0ddd6a4eb931ef62e8874 CVE-2024-24110,0,0,1fb115b633e50bda2eac87a86b11b52bf18355442d25fa5c13b5c90c0251f50f,2025-06-10T15:50:19.520000 CVE-2024-24112,0,0,fa2e3e7c3fcd453559e34c075845d4fcb313c6fd23214935b122beb782fc0c40,2025-05-08T19:15:58.530000 CVE-2024-24113,0,0,a516f265b8153f0a027545f2a188df9a3586caa127e0706759a4bc7bf3b498c3,2025-05-15T20:15:45.590000 -CVE-2024-24115,0,0,3bbcdb03c559df344243325b54bdfce43d333b593de152334d8a64bb5fe49231,2024-11-21T08:58:56.140000 +CVE-2024-24115,0,1,0d7484a36a8bfc42d1e3130f3421e0338dcc028b54f611265b34a0696e87a65c,2025-06-17T14:15:30.030000 CVE-2024-24116,0,0,10d5e48253fa01e5e6580157279d20286cc191736eeb04e8847397bc9fbd1633,2025-02-10T23:15:12.970000 CVE-2024-24117,0,0,49f348c4b4e49f23705ce94bcad1b078a411ec7087fad0beeb2feccdf2954d4d,2025-03-13T14:15:22.943000 CVE-2024-2412,0,0,68eb681b0fa4a4498fa14048430f94f9fe1b3cee4b03260c689eaea8c72d78dd,2024-11-21T09:09:41.943000 @@ -253402,9 +253402,9 @@ CVE-2024-2462,0,0,a1dd3f4997ef865dfdc0dfb64b96bac6ae8b5f07531d6fad04458a287ee641 CVE-2024-24621,0,0,b001be43080e99b7b4c46930b48679f5b0d187bb971ef9c6a3b104fb6ba1d420,2024-11-21T08:59:29.377000 CVE-2024-24622,0,0,a9af27641f63b4ef2a52f9824809b72768fcdd23be134cd44ad6e34870b4ef4b,2024-11-21T08:59:29.543000 CVE-2024-24623,0,0,32c5e7e4c2a12b4fd8e10766bae8adf778a4314c06c8981714d3d3fc18afb926,2024-11-21T08:59:29.690000 -CVE-2024-2463,0,1,37528b48111b8b54b68bad53879e6d26763011fb5c04443b6e659af4ce2ef66f,2025-06-17T13:49:07.733000 -CVE-2024-2464,0,1,be9c0698d74c071e7c71135243f35c8300947e527365ecad408a501d2e98923a,2025-06-17T13:49:01.800000 -CVE-2024-2465,0,1,33a73c8c39cd39bacb5fa5429136fa6f64785cb66e7829fa929c78b294a0a7a6,2025-06-17T13:48:43.217000 +CVE-2024-2463,0,0,37528b48111b8b54b68bad53879e6d26763011fb5c04443b6e659af4ce2ef66f,2025-06-17T13:49:07.733000 +CVE-2024-2464,0,0,be9c0698d74c071e7c71135243f35c8300947e527365ecad408a501d2e98923a,2025-06-17T13:49:01.800000 +CVE-2024-2465,0,0,33a73c8c39cd39bacb5fa5429136fa6f64785cb66e7829fa929c78b294a0a7a6,2025-06-17T13:48:43.217000 CVE-2024-2466,0,0,d8b1e64fa1a3eee0ad1e15cc0aedc5c3295d42d00c2d3e960f0a0dd4a6e21d4e,2024-11-21T09:09:48.847000 CVE-2024-2467,0,0,b462667402cedba4caa592ae7c567717067689568689db5eedb10e506ef16a4b,2024-11-21T09:09:49.040000 CVE-2024-2468,0,0,ee79c285973462515e70d1cd2da5bd3b8fd4566e8905e23739ea0319c22a0401,2025-01-07T17:38:39.947000 @@ -253846,7 +253846,7 @@ CVE-2024-2516,0,0,77ce9a2ebf0a03382426f1ce47b57f851cfbc48c7499c251e75e7b16244e31 CVE-2024-25164,0,0,846e0b12664c69b33a141ecb3fb34631c9985321de2be67da6fd9bf2e318d6f5,2025-04-30T16:53:41.083000 CVE-2024-25165,0,0,688ec36335851944188d6930a699d8a4664b542eac9eb157cb5307635b7fb093,2025-05-05T17:21:49.530000 CVE-2024-25166,0,0,6a7550fba8f4cdc77aefabb88886eef010b0f9c27d5a0ec8eb77cbe16cbee192,2025-05-23T15:41:53.523000 -CVE-2024-25167,0,1,1df6db05fe241b73f7503bd165b03577b0706be88819ed1488d845e58daa9a20,2025-06-17T13:57:38.600000 +CVE-2024-25167,0,0,1df6db05fe241b73f7503bd165b03577b0706be88819ed1488d845e58daa9a20,2025-06-17T13:57:38.600000 CVE-2024-25168,0,0,1d24cdbe22f823f21153af9d605281d99c0e49864f5f54414097a3858d65facc,2025-05-28T19:00:23.823000 CVE-2024-25169,0,0,99447ba0d35007c05de0bb325e4f626f2e771e1210f38989dc4b7d60408a0543,2025-03-28T19:15:19.433000 CVE-2024-2517,0,0,295e66015290670d17656ff58cb1c4da5fc5fa5488e00738c41044e38528f829,2025-02-14T17:00:42.847000 @@ -253922,7 +253922,7 @@ CVE-2024-25290,0,0,35a48ca5a622e094bd31621eeb7b60a8ce0e37e115c0a197c45f71405831e CVE-2024-25291,0,0,96fc4fdf9bda90ea9adf3847d54655aefc5fca4ba5f62f3172b9379821861a1c,2025-03-27T18:11:37.647000 CVE-2024-25292,0,0,45864ae548a55a3b3bcfd7b830024d78d12fb520d04d1d13af461fb4540a3667,2025-03-27T15:15:50.407000 CVE-2024-25293,0,0,76c07b6a2eefa02d105cac4f1c577a0c4b8e93bfa8d760f4442c8c07edcfcea2,2025-05-13T14:40:23.387000 -CVE-2024-25294,0,1,5df4262b146576b790489beccc111bc46c0276253d9f9b4b2a77474471c17da0,2025-06-17T13:09:19.133000 +CVE-2024-25294,0,0,5df4262b146576b790489beccc111bc46c0276253d9f9b4b2a77474471c17da0,2025-06-17T13:09:19.133000 CVE-2024-25297,0,0,a5e886fa4ef1133925f78074d5887ee6bf7505c42983811cbe1a106b4c6fd254,2024-11-21T09:00:35.267000 CVE-2024-25298,0,0,cfcf64b5d754fd69e4a2bff3f63744d367a17e7b3976b42159232a586e9e2d88,2024-11-21T09:00:35.500000 CVE-2024-2530,0,0,eaa4003252bf998a9dd2e238fde2e516ba4979d798449f83c0bfd71f422e1d10,2025-03-03T16:56:17.067000 @@ -253957,7 +253957,7 @@ CVE-2024-25350,0,0,4475b2cde03dfd1b78deacd34e1c6eded8bdb8d6a390fd1c3a4b68cda68ac CVE-2024-25351,0,0,7dd6fa3c0615d36dfbffb6fcdb5c9b681d789f881b9a847118c7e4975d141eaf,2025-03-27T15:09:22.307000 CVE-2024-25354,0,0,297ccea736333201514db90fe7dbcf98c84ce9c571080000be069d554c6a00ad,2024-11-21T09:00:40.210000 CVE-2024-25355,0,0,bf9f24aea57a5ab6015148e7e83742e40755da7892daf5e163536b6780f4b800,2024-11-21T09:00:40.430000 -CVE-2024-25359,0,1,1faff4a6843d7c6aabdff7c1ba954123828934100228be8add6df62659ce8f60,2025-06-17T13:57:18.833000 +CVE-2024-25359,0,0,1faff4a6843d7c6aabdff7c1ba954123828934100228be8add6df62659ce8f60,2025-06-17T13:57:18.833000 CVE-2024-2536,0,0,34714028d3070baf2ff1ad4c72d71c418ed304ce870351669a86ec15b5067ff5,2024-11-21T09:09:57.987000 CVE-2024-25360,0,0,e089036b5b01d137197b9a6e98d6b65bdfd97c49cd47a370e756821b6a4c19fd,2024-11-21T09:00:40.877000 CVE-2024-25366,0,0,81f42def24e0dad489549c5b3d854c716158eda254125d88487ea07e4ab06493,2025-04-02T20:20:16.947000 @@ -254729,7 +254729,7 @@ CVE-2024-26303,0,0,683c75be030d56d22a80af6c831391a578fbff95d8a5ed04b60b17b6ef840 CVE-2024-26304,0,0,56bdf39b2fd43778db8cbd7fca5f3445a4b499228769887ce2c61f9a8c917ddf,2024-11-21T09:02:19.990000 CVE-2024-26305,0,0,207af5372c6fc3b0f4dcceb5d80ed2c82c3f5ceac7cdcccb513c596eec6d1c42,2024-11-21T09:02:20.113000 CVE-2024-26306,0,0,c069a5261b9deb6b8139352eeda6c0c8f7c03f1d588b2d0788484ef55f108ba1,2025-02-28T13:15:26.423000 -CVE-2024-26307,0,1,14597d93e6ee3ac1c893f76e8e03eb985fc5be16adba7ec8f59cbb61a66363e7,2025-06-17T13:50:12.777000 +CVE-2024-26307,0,0,14597d93e6ee3ac1c893f76e8e03eb985fc5be16adba7ec8f59cbb61a66363e7,2025-06-17T13:50:12.777000 CVE-2024-26308,0,0,3f38a3e7e98950ef6e7f848dce8c8a06799a4e83fe7dd54e07558efe432b1c13,2025-03-27T20:15:24.547000 CVE-2024-26309,0,0,00bea15c248e249662bead3afc56845c19345a8a6ff84ebdc44d0c2b2ef87b95,2025-03-26T17:15:24.067000 CVE-2024-2631,0,0,4b2da0b4935a4e7d648b94a0cc3362a78c2f10ad400ad04bf3e2ceb17ee906d3,2025-03-29T00:15:21.277000 @@ -255743,7 +255743,7 @@ CVE-2024-27434,0,0,5694b30bd28f0fe9c16395c30a32737d7ac6900aa3f8e3fb7976b0983aedf CVE-2024-27435,0,0,6dc8bb3ee34c85a8c6dfc8862b9a9e1049341ecc1b661f32e8230a1c343aff9f,2024-11-21T09:04:36.097000 CVE-2024-27436,0,0,713a88796ee4dc48163f026b97ffc79c81e0d3b45ee6235d4ff52cf8ec2e3e87,2024-11-21T09:04:36.280000 CVE-2024-27437,0,0,209eb3192ec71504daa2eda9becf70ece581fec90d86a17cc35f43c1e02e19d9,2025-03-27T21:37:24.097000 -CVE-2024-27438,0,1,884220c2384dd6c25081e4c3d4b9e503a84643cb245f83edad730396f8909ca1,2025-06-17T13:50:01.197000 +CVE-2024-27438,0,0,884220c2384dd6c25081e4c3d4b9e503a84643cb245f83edad730396f8909ca1,2025-06-17T13:50:01.197000 CVE-2024-27439,0,0,bf70e55b581f82f7468b043b9b647a64b6f90e7d462ac0abeb48e128046a1ae0,2025-02-13T18:17:32.507000 CVE-2024-2744,0,0,d7bf8b89d62a8b9265c01e026210353751391b534d66ac852ccc06ffc57a5571,2025-05-21T18:58:27 CVE-2024-27440,0,0,f3246d021e78594286f96d28f38f4a153ba29ec42bd1ca9c545820901bf05123,2024-11-21T09:04:36.887000 @@ -255830,7 +255830,7 @@ CVE-2024-27620,0,0,9d93a7995af700d2b5f47649a5a324bcc1220340d6f2f847a3ffbdc29a832 CVE-2024-27622,0,0,8e0b032d21a35fdd5288842c4805671f9cf9ea0437669d9f87a13ae4b3bdf881,2025-03-28T16:05:54.780000 CVE-2024-27623,0,0,0b8613e0438e050befc8caafef4caeb2c7fedf67a19158500b4830afaf3b8ee1,2025-03-28T16:07:47.727000 CVE-2024-27625,0,0,6b594fcfc101fa835d824b87493f4b5d8cf00a7664f013cc884858d547c79926,2025-03-28T16:07:53.420000 -CVE-2024-27626,0,1,01bf6a3cf2aaa0ec243bc1adbf2892c2db37c420356d4ac3b4586eeabfc99f70,2025-06-17T13:57:09.253000 +CVE-2024-27626,0,0,01bf6a3cf2aaa0ec243bc1adbf2892c2db37c420356d4ac3b4586eeabfc99f70,2025-06-17T13:57:09.253000 CVE-2024-27627,0,0,64e619d9251dac6d6016764b95186a6975a71f8714a3967a40144f57f22acc23,2024-11-21T09:04:49.697000 CVE-2024-27628,0,0,46387e1fb6677fef5f092ea931a292681d4b56138363088d2c6117deec1853a1,2025-06-11T15:22:56.587000 CVE-2024-27629,0,0,925d6c515470e75988e5c00e502d5ff2d6b8836f5e5c3c8e1facf7db93bb0b30,2024-11-21T09:04:50.130000 @@ -256433,7 +256433,7 @@ CVE-2024-28392,0,0,d390c6938d5b44056d413b2b408bcc32550deb780a0d9ab9cc047b0024cc3 CVE-2024-28393,0,0,c9f4dc38aa7cb62a7fcaedfa3fead844b0689c54fefaa509c2816ddb9d2b633f,2024-11-21T09:06:15.917000 CVE-2024-28394,0,0,c9f8c97d4aca10910d8f2d44c13ca923fb7aa68ef01730f568b161c43521e5c7,2024-11-21T09:06:16.133000 CVE-2024-28395,0,0,3ac36a8de3aa3d1fe4cc050c5fc46d41abb7ee090785aeaa767ac36e87a67e20,2024-11-21T09:06:16.403000 -CVE-2024-28396,0,1,63f774fd6573c6ff1beb2fa14007ee691e72ab9ec9d765ed701bb14c734b538e,2025-06-17T13:39:34.750000 +CVE-2024-28396,0,0,63f774fd6573c6ff1beb2fa14007ee691e72ab9ec9d765ed701bb14c734b538e,2025-06-17T13:39:34.750000 CVE-2024-28397,0,0,856f600076688d17f155d0b3de70eb9262cbb77397683a630edc0c5a3e4d66ec,2024-11-21T09:06:16.863000 CVE-2024-2840,0,0,a7ffe5d042ec7962cc81a2b23f8b42cf3a001089fe1f305bad6b8b30e2ca44e0,2024-11-21T09:10:39.107000 CVE-2024-28401,0,0,826cf616629645fbd1a84822aab899008c5c378ac0b171dafbb050c000cd2f35,2025-03-28T19:15:21.033000 @@ -256458,7 +256458,7 @@ CVE-2024-28434,0,0,b4ec98e1977770c102909c7a0d588aabc57ecbb170e993639452a9a8542bb CVE-2024-28435,0,0,c1eb3631efd3094abec5049eb4a799f488ec927a573dc60d97c11961b18410a7,2024-11-21T09:06:21.787000 CVE-2024-28436,0,0,fa5bd980c28c3f8f08d759f37ba571df3d374a0601a509206b0b069f844ed82f,2024-11-21T09:06:22.120000 CVE-2024-2844,0,0,868f7b743a9ced9e723d40ffdbe9584175a5971e2679cfef2899839f98050a91,2025-02-05T21:03:26.840000 -CVE-2024-28441,0,0,d0df85189510c9a4a0220f2f81b5d4fb6f74418fa2c37372bdeafcbdef88439b,2024-11-21T09:06:22.517000 +CVE-2024-28441,0,1,b0dae2b18fe84f95046447f07f137da0f025e019bcb2bf460810c1dc6dbdad72,2025-06-17T14:26:25.113000 CVE-2024-28442,0,0,39f9ff8978e427c05b79b512e2e774e85082ceb0d52e4ded352ec1fb8b6270ad,2024-11-21T09:06:22.873000 CVE-2024-28446,0,0,130fe6f11acb7921804657dac29074c2a724a37c0f7026ddccf60719c6661838,2024-11-21T09:06:23.270000 CVE-2024-28447,0,0,96f74453ed1c3ab881a5353933e4fe8cdaefba2a1eb3251d1371e6f2bfd54cd7,2024-11-21T09:06:23.603000 @@ -256475,7 +256475,7 @@ CVE-2024-28515,0,0,8635dd87ea8a3a499809e352c5b7ec934d36b0555af2f64334f2b2acfc4f6 CVE-2024-28519,0,0,ff3bc549c354e2188713bd5be72aca417b62a4ec9737287b4a78432a884798a2,2024-11-21T09:06:24.853000 CVE-2024-2852,0,0,dd26b7b9ac627a5751899da94041cb9d97fd5cbcc3e54bcdd927630acfb9dc6a,2024-11-21T09:10:40.773000 CVE-2024-28520,0,0,bdbd590c8922f1bd3dd6b9a5cf56e5050765c29334c8f1526f4f95cf767f5870,2024-11-21T09:06:25.213000 -CVE-2024-28521,0,0,b41f681387f3f16f2831db45840ce6a0575200748d9e9da90a18302db00f4a70,2024-11-21T09:06:26.813000 +CVE-2024-28521,0,1,59e55c0dbcedbf2259e21da66d6e3fd6671879de9753f45b8cc799c609f5a0a2,2025-06-17T14:45:13.120000 CVE-2024-2853,0,0,362806360a0f6fe467e356812d5759f63b54d044462c4fb00a1dd66553b784c1,2024-11-21T09:10:40.953000 CVE-2024-28535,0,0,4eefab81f519bf7cec4ce778127c72452feccc76606d64246a6da6f4238be885,2024-11-21T09:06:27.130000 CVE-2024-28537,0,0,579db6f82ac424c17c19a532e6c987f29fd9c08d04f869594612ef3398d687df,2025-03-13T19:47:19.443000 @@ -256529,7 +256529,7 @@ CVE-2024-2862,0,0,de64a0a4bc271c289ad8432a80b906776b0e02689be888bdd8bcfeaa8f184e CVE-2024-28623,0,0,866ea92417525311d6a52e3d3bec31442a332fc3dbfd5666330707433ac99b64,2025-04-16T15:33:39.210000 CVE-2024-28627,0,0,9277a6897abe880727737fbbbaaaf027c984f569a532468350bff5d977a1bf19,2024-11-21T09:06:42.143000 CVE-2024-2863,0,0,cb802aec2f5670a2db50b65a9ba985518f35a86ec8069dd3385b56752f9cc0f2,2025-04-04T16:48:07.247000 -CVE-2024-28635,0,1,b63fcc8f0a522f769c2801425808626127a3886af50c6e62e5cdb835fa58db8e,2025-06-17T13:52:08.900000 +CVE-2024-28635,0,1,66c28729dbb83576272fe65c166c670e56b5ae3e2a39b51c02fef7fd0ec24579,2025-06-17T14:05:15.577000 CVE-2024-28639,0,0,e7a0e0b3ab0a4c3b57de2dc0a84196d1068993c21df426fe3caa9e5c75427b24,2025-03-26T15:15:49.150000 CVE-2024-2864,0,0,e3c30714995f30dc7e0b527a75c52b920bd6b9f7aa0c230a72b2bee2dd8a2993,2025-05-28T18:50:59.273000 CVE-2024-28640,0,0,990c29eb8c733a819b0a31dbb2e2b0510b47e9a808edbc4e02611ff94875e45d,2024-11-21T09:06:42.733000 @@ -256581,7 +256581,7 @@ CVE-2024-28730,0,0,f77fa1cdd3486632b530514d8ed2b4b02d03ef1909d13fa8c507853b0a763 CVE-2024-28731,0,0,732f38dfd1d44ede04b0cda02ae33f20ea7253c9c9aa59ca9fd40cc1d048b232,2024-11-22T19:15:05.967000 CVE-2024-28732,0,0,7d87f352ac9dc95264896b46a4f8811123392322495e7fd23a689b3ead2ec158,2025-04-15T17:40:17.127000 CVE-2024-28734,0,0,248da8578808414567db67c3b503066a14a98351080fe64fbc15bb46c363a163,2024-11-21T09:06:50.763000 -CVE-2024-28735,0,1,dca144a6ca57cf500238c0c3d6b112e45665e3bbd0086c4b27c8390c0d94972e,2025-06-17T13:25:30.400000 +CVE-2024-28735,0,0,dca144a6ca57cf500238c0c3d6b112e45665e3bbd0086c4b27c8390c0d94972e,2025-06-17T13:25:30.400000 CVE-2024-28736,0,0,df782a0cdc83649a96a984c1b8ce3c2c9e002e8bd9b3d64936ef7e71c1609578,2024-11-21T09:06:51.233000 CVE-2024-28739,0,0,6f446ff59c9537aa4b5a8742ebfdad671a80a577ee582bd1a98b3db07755c8bd,2024-08-12T18:18:17.717000 CVE-2024-2874,0,0,a31e28465fa71f9062d6319cfc3c8d1fe0a152aed175717a5e9e88a324585636,2024-12-16T15:16:54.830000 @@ -256600,7 +256600,7 @@ CVE-2024-28752,0,0,3743867d820cb3fac6cc93d0ae0ebb1af1934f8628bb7b6539e88268ce65a CVE-2024-28753,0,0,bf7e9c161fe17ddef885af4de9deb82e14e1947648f4df3c13214108525d2ba1,2025-05-01T00:17:11.497000 CVE-2024-28754,0,0,2214144a78c46b2580bfbfec179b899b282fb753a98595a9fdf69833f99d7b2c,2025-05-01T00:13:29.087000 CVE-2024-28755,0,0,94db876d89381c6bafbe99b1b5cd635119fcf3d8444f7aa68a6413cada173fe6,2025-06-10T00:41:15.783000 -CVE-2024-28756,0,1,e987012e08e79ee03b46c6960bf7ff0755b5fba179ee1b5a3774f90b1a7cb114,2025-06-17T13:47:54.133000 +CVE-2024-28756,0,0,e987012e08e79ee03b46c6960bf7ff0755b5fba179ee1b5a3774f90b1a7cb114,2025-06-17T13:47:54.133000 CVE-2024-28757,0,0,81da43f42617b41a14b128c7de9bea07265204ff81eb0bea8f4158090d852760,2025-03-28T19:15:21.230000 CVE-2024-28759,0,0,0a4255815bf43753569b9bf94f2fbddf12d43389c8cf8017f7885f21185e8276,2025-03-28T20:15:21.890000 CVE-2024-2876,0,0,71c3a804e8eb8bd03fb495c4bf9bde93ee7dd07888efcbbc5faa48502cbce8d5,2024-11-21T09:10:43.890000 @@ -257067,15 +257067,15 @@ CVE-2024-29239,0,0,794c9cedb88e643f175245efe3ec3b2caaefc47db456a30ecba8e95edf040 CVE-2024-2924,0,0,a800336decf4a5ca03d289c145f1cfe49b94f9c1a4d7c72b8b077f88e9c79934,2024-11-21T09:10:51.120000 CVE-2024-29240,0,0,3809ed6e15f6ba8ad2457c3c4767dcc4a3b3a1c13d5f949a4c9713e708528b0c,2025-01-14T21:24:20.010000 CVE-2024-29241,0,0,db361e5a1fb94f0ef773aa209c1222142c369872ed24ae042e9a3cf74fe67dc2,2025-01-14T21:24:52.060000 -CVE-2024-29243,0,1,32fa30ac909a3e3c532540b11ac7da81339b441895494d5c6ac2404e5f1c9fcd,2025-06-17T13:49:27.260000 -CVE-2024-29244,0,1,3f221de1738d5363ed0601d3f78ffbef7a305da565a1c7f048cda8682cd4ec48,2025-06-17T13:49:18.597000 +CVE-2024-29243,0,0,32fa30ac909a3e3c532540b11ac7da81339b441895494d5c6ac2404e5f1c9fcd,2025-06-17T13:49:27.260000 +CVE-2024-29244,0,0,3f221de1738d5363ed0601d3f78ffbef7a305da565a1c7f048cda8682cd4ec48,2025-06-17T13:49:18.597000 CVE-2024-2925,0,0,08a688428b1cf91c81dd53f1f81a26bc2648cbdabba0669e09c3c551848cd6da,2025-01-08T18:28:36.057000 CVE-2024-2926,0,0,18353582fbf60ea48ced69d4190ccb60f0390ef67dfa3f20a639890b23e716a0,2024-11-21T09:10:51.370000 CVE-2024-29269,0,0,59344950251fa21a0e7c78785a2aa3fcb549293d2bf33594b54e6b598043aea6,2024-11-21T09:07:53.570000 CVE-2024-2927,0,0,760e13d63ffb1aa6a6097fc1c420dd924f8af6747ca04c686b3b6cab9f0c738a,2025-02-20T18:53:42.533000 CVE-2024-29271,0,0,b6a43cc93673741929c4f802221b3ad8633e018d6d64dc02da1a74c4839ea778,2025-05-28T18:44:18.073000 CVE-2024-29272,0,0,4754a7c5076b083702459ba699bb97ba75ede56224df0a9cc35e3661bb2ef812,2025-05-28T19:00:50.340000 -CVE-2024-29273,0,0,e88c38979e6a8cb440359a757929c3c3768beb837dec53069b260cb2536d1e3b,2024-11-21T09:07:54.247000 +CVE-2024-29273,0,1,165f75433cbd8063a3c673ca2c98668432afbd4580098cf33132b1003226f91b,2025-06-17T14:22:54.603000 CVE-2024-29275,0,0,89179450cff6bd242efa87e5702bd962171bbc5420f761d638b1bc409f5cc15b,2025-03-28T16:51:45.747000 CVE-2024-29276,0,0,e492e2b9f2cab402ec63c3351f8ac901d3688e777b31189c69f2d34536b203c2,2024-11-21T09:07:54.710000 CVE-2024-29278,0,0,810e815ceeacd459126cd2f0be1468e4723065d75f15ecab73f4c892d8b4bcaf,2024-11-21T09:07:54.933000 @@ -257100,7 +257100,7 @@ CVE-2024-29338,0,0,3256c7f30ffd5e0486bc787c933363bd34a9e24e8b56cf9ebf1d4bc36ec0a CVE-2024-2934,0,0,ce8a2e0cd96895cbdc241c11fcca1001cf9d7fac6a58f752da2f615ab7465389,2025-02-18T17:04:28.120000 CVE-2024-2935,0,0,fe5ce30d9e10b7b977104ec7d6369e60a90b4b141559dbfac35fe6bb0e217634,2025-02-18T17:05:15.397000 CVE-2024-2936,0,0,e1637e9751cd50192c775246bed8a5a935eb4d558daee53b8066da607cc107cb,2025-02-13T16:31:06.233000 -CVE-2024-29366,0,0,a4c37234f5475bf3e0db182bc2ff356efc3d9687878407fd7f29d2e5e10e4975,2024-11-21T09:07:57.600000 +CVE-2024-29366,0,1,344d4d17da364820862394e78eb923f3e3376e1198d4f71df704d6b87fbc721c,2025-06-17T14:16:46.567000 CVE-2024-29368,0,0,fc268cb09b0bc551c591731ce1c050e6bbaff32be7f5f9a2c93173f9b7fcdbea,2025-04-30T16:45:39.453000 CVE-2024-2937,0,0,10c97f18fa847858ff544d31a1bbce732f86937b7f371f3c3318a5bd104ab2c4,2024-09-10T15:03:49.607000 CVE-2024-29374,0,0,f37e27252921acf8a4f291c1895d3592a434f512285d764e0d8031c7358fb01c,2025-05-01T15:05:13.430000 @@ -257108,7 +257108,7 @@ CVE-2024-29375,0,0,9fb36855b8810cc643a70a3d7ff9b507de64e033c4774e2512c90e32ee330 CVE-2024-29376,0,0,18e37db27049adb98aa236244a0509330fb220c59ba9007f64ad7afe95b197ae,2024-11-22T15:15:06.440000 CVE-2024-2938,0,0,b43e830d087a31581dd74583ec1502425d263801340be532bbb74345784eba4f,2025-02-20T18:38:08.680000 CVE-2024-29384,0,0,01bdd40561345e9cff8d3f4e346ab0707aa0c3210e4e286d930a011578ce6649,2024-11-21T09:07:58.653000 -CVE-2024-29385,0,0,379560aa263a88d8a2172d50f1080a233949e14f3a947946f4ae7f79bb2447ff,2024-11-21T09:07:58.880000 +CVE-2024-29385,0,1,5b8fbeb28e1df5b35cafd4990723a16c7c906c79da43c9a50c5ad773a8f24ca9,2025-06-17T14:09:38.640000 CVE-2024-29386,0,0,808f71869d95e5d3aa1cbc6777c7ae49f412c09ab44446fbae42a3f8c6afea7a,2025-04-11T13:48:17.293000 CVE-2024-29387,0,0,7c90a0e71e33b2d6b5f61b7a5192b06affcf3848bccaca26ed95de0dce63f4b9,2025-04-11T13:47:11.857000 CVE-2024-2939,0,0,558b843869773db58e41d3e67b617c443849c6f6002b5c0a69358a8665c4a9e3,2025-02-19T18:43:35.447000 @@ -257359,14 +257359,14 @@ CVE-2024-29852,0,0,29b0b23a86461f9e60f5579670657e219bfa5a95c00b5c38f171db2eecab3 CVE-2024-29853,0,0,4c9002c0c0fbbb703ad210531603aa769175a9f6320529b3713d1a4749a047d2,2024-11-21T09:08:28.420000 CVE-2024-29855,0,0,6d2becce445fb85d8a3ce03c0a9637f2df05bd300108252c9d25a9447a0302af,2025-03-27T21:15:48.220000 CVE-2024-29857,0,0,d0f8da7d297215a9aa89339fb466a7b41b1ef03fad42cb6defbc9cbd2e5f42d8,2024-12-06T14:15:20.263000 -CVE-2024-29858,0,1,bf71dd6579e55d5d5a3c08d613b1f67a41eefd97260034d7dd5be41bb76202c1,2025-06-17T13:51:32.070000 +CVE-2024-29858,0,0,bf71dd6579e55d5d5a3c08d613b1f67a41eefd97260034d7dd5be41bb76202c1,2025-06-17T13:51:32.070000 CVE-2024-29859,0,0,37a69adc1b7832a621c361f101a9c8b0ea81feef948392f5a53e4b63ef068862,2025-03-05T18:53:05.750000 CVE-2024-2986,0,0,034efbed1cd49349cb60af1887d254a911bb02938b066670d6e87e5a67825916,2025-01-14T15:10:34.143000 -CVE-2024-29862,0,1,1f66397d454cbf897eb9a91de74953ff39d6098804a54c4061cfd09e41471f42,2025-06-17T13:51:00.100000 +CVE-2024-29862,0,0,1f66397d454cbf897eb9a91de74953ff39d6098804a54c4061cfd09e41471f42,2025-06-17T13:51:00.100000 CVE-2024-29863,0,0,84604b7c2f2f884038fabd2dac097e571170e075668006e2307925ea311c7c6d,2024-11-21T09:08:29.610000 -CVE-2024-29864,0,1,538de3c8a301d3e02cd8011e17af8be5b46359f9c0b0b0c7321480e1784e1401,2025-06-17T13:50:35.700000 +CVE-2024-29864,0,0,538de3c8a301d3e02cd8011e17af8be5b46359f9c0b0b0c7321480e1784e1401,2025-06-17T13:50:35.700000 CVE-2024-29865,0,0,f22110c466af3836ac04572aadd63b28ee037c50700b7cf9b140a3219073d33a,2025-04-16T18:44:43.820000 -CVE-2024-29866,0,1,59801641d61e7782555a184d222b66985dbab651d5d8ae9ab0afc32a7e9f9623,2025-06-17T13:49:42.563000 +CVE-2024-29866,0,0,59801641d61e7782555a184d222b66985dbab651d5d8ae9ab0afc32a7e9f9623,2025-06-17T13:49:42.563000 CVE-2024-29868,0,0,654a536670a62fb45b5203eb432335632fdfc103e225c6be2f801ded9b3b1341,2024-11-21T09:08:30.413000 CVE-2024-29869,0,0,8cda6f45350d5d3a29dff2e6c7c701bda04cc444097bfe7159d77df29a276e9c,2025-01-29T15:15:16.417000 CVE-2024-2987,0,0,e4d4968f2ab326fc6f93467dbe0c42753ad32258cee7fd3257881b95a825941e,2025-01-14T15:10:15.733000 @@ -258872,7 +258872,7 @@ CVE-2024-31668,0,0,92d852b5513f85b46c5c8aacca49dc78103d1045b501ee09fe75860fd2d47 CVE-2024-31669,0,0,e67157c072d6472b13e8463ea23f9b22948945715ffb2a3485fbc46118d6e7b5,2024-12-03T16:15:21.540000 CVE-2024-3167,0,0,b0bdf42e92bad376276c8af48f28639bc7025690df7bfcbc255509f46b757355,2024-11-21T09:29:03.290000 CVE-2024-31670,0,0,485c6b39a9c06c65b704780df5587d61e2c68aff13a9abfb705a544147e51149,2024-12-13T18:15:20.167000 -CVE-2024-31673,0,0,1e896eb514f9b32b2d1d7aaf8ff7fcde843f831d855fe06b409bb1a41bb38fca,2024-11-21T09:13:48.477000 +CVE-2024-31673,0,1,daaabfb840b3730af21ab36c24cc562730d3a8e824427e5f8ad6fa6a3f345120,2025-06-17T15:05:11.003000 CVE-2024-31678,0,0,4d44fd7de319bb3c3e3ca325e023129ab6329704291ba3ed2bd041396946b733,2025-04-08T15:20:02.083000 CVE-2024-3168,0,0,877aaf095d6020a88ac424b786e5481114bcabd626ac29a10ba6589de92c2016,2025-03-13T14:15:29.337000 CVE-2024-31680,0,0,1d8afa08aacd4452af060ce38af7363253c000fc0951d9c1ffe97fb1b965709a,2024-11-21T09:13:48.890000 @@ -260442,9 +260442,9 @@ CVE-2024-33787,0,0,c49a88a43a707c2472f311af9a25d218e0650695fd55867c121db961e1d0f CVE-2024-33788,0,0,d9e631d68ae2203702b7e708decaf819d9af63c25e4d0516bd7f43a761e5472b,2025-06-11T15:39:33.297000 CVE-2024-33789,0,0,5986e92c6ccb4c451262b2b9902891f0ea70e1b2b0fa3b4355e2c35998fcde42,2025-06-10T18:01:58.607000 CVE-2024-3379,0,0,ff4b29a94fdd9578584432ff10eeb3895455cc484ac7d59b569ca6f419a0ff31,2024-11-18T21:30:49.947000 -CVE-2024-33791,0,0,10d6f9660f26ee5081281abb1d87f7687e0f393264625d80e14e053c61a15247,2024-11-21T09:17:30.170000 -CVE-2024-33792,0,0,d6c9e0d0b1570f13b040672fda8a12f21c3a340271ead6eb440a2cfc47214ea0,2024-11-21T09:17:30.357000 -CVE-2024-33793,0,0,6449bf4f8c4aa99992ed3b51fcd98295be9d191858bb63bc1a04529388414ccd,2024-11-21T09:17:30.567000 +CVE-2024-33791,0,1,7a27fb0a64bec0e7d7eee8802c38635d2e8a23621cf443d024b5ed10bf5c4915,2025-06-17T15:13:31.073000 +CVE-2024-33792,0,1,43e364ea7bea31918c98ca711faba1649e261918e2de2e17c93b6d552b027bf8,2025-06-17T15:10:57.783000 +CVE-2024-33793,0,1,4a0387614dc8d4f56143a2d1d2cfb67a2d9550aaca0a800d4d36a99c010bce75,2025-06-17T15:09:57.787000 CVE-2024-33799,0,0,7e6afd488f1dcab8b1fef588752559212849d0acd970ef8508f1cef146e5209e,2025-03-25T17:19:16.673000 CVE-2024-3380,0,0,2dff51ddbee3af980b9cfb6cf09776d99cf02d06821df7efa0940e1572fc0531,2024-06-07T17:15:51.487000 CVE-2024-33800,0,0,176667b45bcbb639dc5d8f4aa5eef9850c3bb31ba58d69a36212bb549a768c70,2025-03-25T17:19:11.513000 @@ -260922,8 +260922,8 @@ CVE-2024-34399,0,0,fa616a5babcaf42787946ebecb7f12ab699617c74e0d38a5c61b1374f609b CVE-2024-3440,0,0,3f13bc3624027e098a71bfa9faf881800f72231b484f42c72b9113d8573cc5ea,2025-02-10T16:13:08.300000 CVE-2024-34400,0,0,61addbb37f2be6f3520fd1cbc50bcd9bbc76a89c19689ad04dca7f6a95f34a40,2024-11-21T09:18:35.293000 CVE-2024-34401,0,0,ad64215e77a2b77255b5ebe7935007458638468cdfe46fd9b5c1118486e1d08c,2025-06-10T18:06:46.050000 -CVE-2024-34402,0,0,14aa988c57dacf8327e158d6809e6dad1d5b5da3ee7370be493b340f6165322a,2024-11-21T09:18:35.737000 -CVE-2024-34403,0,0,7f1176d5c284abd46695a3aac101ecac96b0206840cb4fd5f461e08e9fdc6c4c,2024-11-21T09:18:35.980000 +CVE-2024-34402,0,1,a985689fbcff14ea63709f843cea9e1df3ee4a3fb3163d1908dda6e45128e210,2025-06-17T15:24:01.950000 +CVE-2024-34403,0,1,9e27750ff5ffd047652a73723b764a2d7b709035bdb18a2bd4e3a08f308f3777,2025-06-17T15:20:17.017000 CVE-2024-34404,0,0,45cd797469fadab4130ad07f7dba5d42cc10e87e49d302cddd2916272514d9be,2025-03-28T20:15:23.287000 CVE-2024-34405,0,0,2ccc0810bad96ce1aa10dc2834a7da039d958546adfbde50e850cce0caca71e2,2024-11-21T09:18:36.407000 CVE-2024-34406,0,0,69f6590b96aa7ae33303cc00dd7926bbf5a011eff0e40ddd5b91929594b48012,2024-11-22T19:15:06.477000 @@ -260985,9 +260985,9 @@ CVE-2024-34461,0,0,c5a1d6fd0d0f85ab6d3fe40169deb0459ad0af3f0539266d0cae58e6e40ea CVE-2024-34462,0,0,382b69b4d65ff7d4fb7e8efbd069728a2c9fb930dc8c5e2ec23c0f73515e8b2a,2025-06-10T17:48:47.850000 CVE-2024-34463,0,0,56e29bee1bacb79fb80159be5fec6fd4dbf960af7d71832b8ae5ddba29330a36,2024-09-03T15:12:16.467000 CVE-2024-34466,0,0,dd736f9a85d19253650a199739cba2301673ec6ec2adc5e7de09970e86411685,2024-05-06T15:15:24.473000 -CVE-2024-34467,0,0,b4b501a44911fc29cd1dfd8936e9c9246fe8b98d60d69e16425b421d96d3dfd2,2024-11-21T09:18:44.753000 -CVE-2024-34468,0,0,0967e4676677f3ff0d9f3a0b6fa2c062d9e58ba74339aeb0175afbbd4d6df0ca,2024-12-04T21:15:23.670000 -CVE-2024-34469,0,0,cdd44b1793d41a3b3a67bb1b2500085dce48ced5238a362ac77a5ad6abef309d,2024-11-21T09:18:45.113000 +CVE-2024-34467,0,1,cb57e08e27272a690dd670b692b34cbc958446f13ab29fef8aa2b9b6d018d2c0,2025-06-17T15:02:34.373000 +CVE-2024-34468,0,1,e9c477071da567ce03c30377feab83a8559ce5d1eb96ea80e6ccb20697cf24e0,2025-06-17T15:01:01.797000 +CVE-2024-34469,0,1,422e4f879b3815ee23e8ba7fdee3e31a4776bd407f44eac86678a62956047e51,2025-06-17T14:57:03.317000 CVE-2024-3447,0,0,d7c710c7b992f06ef458aae6cd6e918ae32484ca56505cfe7a1fd360e54ab636,2025-04-25T23:15:16.290000 CVE-2024-34470,0,0,292fb64b156320622fc1082b75cc0498d752537ee346b0f6b99ba7b952a88f8f,2024-11-21T09:18:45.320000 CVE-2024-34471,0,0,f3707f53cbf5a683fc549af8ff5a624b2bbfddd27b768847b399688d672e30db,2024-11-21T09:18:45.537000 @@ -261011,7 +261011,7 @@ CVE-2024-34489,0,0,e38724172e0a0c52a247f1048d162135594d6d51d73ed3946e5efab6231bf CVE-2024-3449,0,0,e1530ccb36d47a9f2f107bc6ba4716b9b546171ff116ec5264773a56f263e670,2025-02-11T02:15:34.650000 CVE-2024-34490,0,0,99bee308a871b5c1e5cc8ac5d90e0aff0732098a9a5af8f52bdfc4827b12fbed,2024-11-21T09:18:49.207000 CVE-2024-34500,0,0,890c3fc863628ee6244d3590d0d4f94a07e3f72d4f15b7f39f4ce19c729fc4da,2025-06-11T14:44:14.040000 -CVE-2024-34502,0,0,338d39b72ab456fa86fb9314090f9e7e98dd2d9d1523cf8ae26694cfdce445aa,2024-11-21T09:18:49.567000 +CVE-2024-34502,0,1,15dea431ce0f6adb30a276051e461203533805d59d10a126d79f4b81b4ca634a,2025-06-17T14:53:28.127000 CVE-2024-34506,0,0,9657cf36ce800011233d0de3e350ee7aca3ee399d1710f2bfa61b7f6e411c133,2024-11-21T09:18:49.790000 CVE-2024-34507,0,0,902d55ea469135e76bf3b19c5d45d00e5cd5bced5de6856a936da36d3b559b2d,2024-11-21T09:18:49.997000 CVE-2024-34508,0,0,c837d85f215debfd4876cf202e711a6ae35fdcbae2f4f24a57d2ef7ef10c5af2,2025-06-10T17:44:33.870000 @@ -265577,7 +265577,7 @@ CVE-2024-40116,0,0,19134811427fbe9dee5753b9d0c099a969fd07ce07ff2e8eb545bbcd0f670 CVE-2024-40117,0,0,2a65d8ca9f0e21ab04eb67f5b55ddbb907f00fc8747a1174398adffad7e2c4b6,2024-11-21T09:30:57.700000 CVE-2024-40119,0,0,350b537a9703bb479d3aeed53ee034530a7a303e34e5836f5efa11a1efa4ddeb,2024-11-21T09:30:57.907000 CVE-2024-4012,0,0,072e2e877b4c908d6a63775f432a4c14231de854a8f0ac87700711aa9cb1d6cc,2025-02-11T02:15:34.820000 -CVE-2024-40120,0,0,5593595ad54e3b756a48fc98b139cca1c34c0e40a23ef1690ce715be427b8f9e,2025-05-16T16:15:28.017000 +CVE-2024-40120,0,1,5d9b3b81ead272121a8ce02b05dc2129b506310c0ab1c5311395f2a533f38032,2025-06-17T14:09:04.597000 CVE-2024-40124,0,0,014b29933366ffb9c3823329696a0e76ec49ac298abc09e3bf6758a82bfeb6dc,2025-04-18T15:15:53.500000 CVE-2024-40125,0,0,57e8115a80c9b9f12fd5deace805e359b1c0496310a714f1357da458e7b0ab1c,2024-09-25T14:46:52.523000 CVE-2024-40129,0,0,7c740ef58e2f8edbf4cfbf5628c1b2c6225d3dfa101d000fcff834181790eea7,2024-11-21T09:30:58.343000 @@ -268685,7 +268685,7 @@ CVE-2024-44062,0,0,4bd2e0780e1a51ad3b5d60ebf93e8122058e9278dfce27d0a83fe1ef3c611 CVE-2024-44063,0,0,73e2c5e97616f5ebcabbe7735a5a5a87ac0a2a5cfac961d02472e13c4526110c,2024-09-27T14:31:05.703000 CVE-2024-44064,0,0,ecf83431146b0295f6bc30765a2140783d036e87322482c4395acae8f3433615,2024-09-24T18:15:30.537000 CVE-2024-44067,0,0,98036d11111f59de553ac779421f041b7c09eb61a5a994cf61b3bfac69d169a7,2024-08-20T20:35:34.497000 -CVE-2024-44068,0,0,0d4fdd456f30eea2dd6a3d7b53ab5d2927037a853ab0c642f3a5381559e2d449,2024-10-10T12:57:21.987000 +CVE-2024-44068,0,1,4d6fc25aaf2fe9dd06936a1eb6398e2376542de214cd5ddaef278ab3c596de52,2025-06-17T15:52:59.677000 CVE-2024-44069,0,0,4ac8db02d9f56f3f702dee09d4ab72717ce0fa62311fae6286862c3e96445b35,2024-10-29T21:35:13.500000 CVE-2024-44070,0,0,4361fce329ea8cf63b5fdc5538540737043c7f31eb3f4a05af4865507e0f7724,2024-08-30T16:19:49.587000 CVE-2024-44072,0,0,d4503c851bd9b82ec710900cb757453562f6efd65262542d624d0efa7b8fbb80,2024-09-10T20:35:09.990000 @@ -269380,7 +269380,7 @@ CVE-2024-4518,0,0,3635b659635ea21861f605e45b1e68ee75a0df2a35b6ca0b0569d0059abae3 CVE-2024-45180,0,0,21b07801d36cc3d756204c3207b5af3e7b329356676c352984cb9362561c3bbb,2025-03-18T14:15:40.437000 CVE-2024-45181,0,0,d85fe8450b776dd12e0896d567762d1e44709075751ae449df1ef8eef94490fd,2024-09-18T20:26:26.873000 CVE-2024-45182,0,0,744b0118419398ffc2eda737132cfe2e67a6694bc69f7527796471f039572fdd,2024-10-29T21:35:21.720000 -CVE-2024-45184,0,0,a4d02cc2bd5327bb0d83b612cef47c9a87348bd0612071b847fc093b842fdf43,2024-11-06T17:35:34.223000 +CVE-2024-45184,0,1,af48f5b27e3bb542d6c11f5a94c54ad38a8bd57944a2b597b2b825f12ce63564,2025-06-17T15:42:26.653000 CVE-2024-45185,0,0,453431423bc5a84832b248eae53e7a874307b24cfd6421fbd648db47d882bfaa,2024-11-06T19:35:16.420000 CVE-2024-45186,0,0,8d50db94043ec6ff8c7dd55f76aa816bcaa54ccbca527c7c1ac0b681f0640a5c,2024-10-04T13:50:43.727000 CVE-2024-45187,0,0,11c130c28d0e3153483c9dc3100e74cdbbf21e05ab0d8ab36b565f8ea3b0eef6,2024-11-25T13:15:06.577000 @@ -270112,7 +270112,7 @@ CVE-2024-46276,0,0,7d55d5b3c78e7b1cb07d93cf904b6cdffa90be9a2c801450cf936d1eb8f87 CVE-2024-46278,0,0,1704078d4a9454cbf1e1f7e9b21be0fad2fc0fb37065e498ff15fc4f4f78696b,2025-06-04T17:08:35.510000 CVE-2024-46280,0,0,ab3566e0063e53ac2e5b5f7c85459fe370bba081cd349a76be524da46e7b1f30,2024-10-04T13:51:25.567000 CVE-2024-4629,0,0,251a39637b21bb7dfc1b06d2efb86be683ad7108e31cf9c5aaf3c8bfdb6f2912,2024-11-21T09:43:14.917000 -CVE-2024-46292,0,0,6e543ec70c022ed438a1862317450c67dfdfcc236273b05b6735216c507a4b5e,2024-10-21T00:15:12.240000 +CVE-2024-46292,0,1,ee367288d14a4d95598991e5c1ac22ec83065d793cb5cb99ec3d9535ead227da,2025-06-17T15:49:56.567000 CVE-2024-46293,0,0,b59006c822257037824625fe8c51a58b5d91150e1f4543395f1748194b2a8210,2025-04-28T18:07:39.903000 CVE-2024-4630,0,0,82a11161e7dad25328c03408fa02b9b902b87dd7b721653ce57b8b6de91fa741,2024-11-21T09:43:15.090000 CVE-2024-46300,0,0,6a8d7c1dfb1358af3b6a2d888860f4bd0f51cc893ec305be3d651f975d853514,2024-10-10T18:52:42.790000 @@ -270222,7 +270222,7 @@ CVE-2024-46535,0,0,0db09cdc25f6399278d3de8427309909cfbb4f1a148fef767bc166298eca9 CVE-2024-46538,0,0,36ab03c909d91ed67f1af19450c3d6e48453f6f51660df666d70bd09393db805,2024-10-30T20:45:35.240000 CVE-2024-46539,0,0,ae91e2d70102a1f16abd97afb097daba74795893f1a3d024416684e8f573e136,2024-10-10T12:56:30.817000 CVE-2024-4654,0,0,3ba1a7fb0c9b6d7f54909c48e7df48bad4f328f4a19665a74071d60aed80ba01,2024-11-21T09:43:18.787000 -CVE-2024-46540,0,0,88bf0938e627cd2cb1af3791906414d29eb039f552c0680f3395cbe56e596009,2024-10-04T13:51:25.567000 +CVE-2024-46540,0,1,309f72066062fc0e66c67a6700acb22109752e0233b308bc286adc81d3dee00a,2025-06-17T15:57:20.630000 CVE-2024-46542,0,0,2f841a9877ebc0112f187af65596acc00891c149fd8d436bb90a8a1d424c4377,2024-12-30T18:15:09.557000 CVE-2024-46544,0,0,18fdd73b046b2ee0cd6f9e6a9d70043cfeda335681c354a0d0e609ab48ccce27,2024-11-21T09:38:43.193000 CVE-2024-46546,0,0,b4a5fd1f0b824587a413e4265b7c6f103ee9ea3a5e1a8473ed35e4d0bbf42692,2025-04-23T14:08:13.383000 @@ -271493,7 +271493,7 @@ CVE-2024-4791,0,0,aa21c4639e6724eba05bf92d264947b88d3a7d0da19d77cdf870f114750641 CVE-2024-47910,0,0,2b512b73d2b6b5c66fe1cf4c33853e3228b1071f06eada4fd9fbf32862f1d5d5,2024-10-07T19:37:43.677000 CVE-2024-47911,0,0,9da230739db9762f60b9328a7c487492879939e8c1f91c0f150a53ab317bef59,2024-10-07T19:37:44.613000 CVE-2024-47912,0,0,c5bf458f83a8a3b847a8800a1e9ea3c061b356ca4ce5400292be1747d5b0c972,2024-10-23T15:12:34.673000 -CVE-2024-47913,0,0,55b8d6114d811df7c11a9bb0f084ab9a31ee686968c724d4af6cc9de7dab1034,2024-12-06T21:15:08.590000 +CVE-2024-47913,0,1,c28963fe042ac457b9c3e8a219910f1e7f2da3ee53652ed3f5fe314f8628a058,2025-06-17T15:54:48.687000 CVE-2024-47914,0,0,d45aeab404253ce96cfa100c7ced4195a1c3af09497362e0f731698d9e730204,2024-11-15T13:58:08.913000 CVE-2024-47915,0,0,9a22be8027040fe480da003180194741f42a15279e6f925652bfe19345653927,2024-11-15T13:58:08.913000 CVE-2024-47916,0,0,33932b79d79c6af0ee005a6e7fc2e2bb088bcfe0a7b5481ded4f6ce2add3e31c,2024-11-15T13:58:08.913000 @@ -271616,7 +271616,7 @@ CVE-2024-48093,0,0,5d2687b42ea5091a471e0a05e1b5da269e599c88de65d10bf1edcc9d58bd7 CVE-2024-4810,0,0,67f5293ce6e2b07ebd74483d90aa4bd648288e3b70a7100b0946bf9b81e90029,2024-05-29T08:15:33.960000 CVE-2024-48107,0,0,dca179e75ca6ead53de2ec552c414cf9b4ba6c22bd8cb870392e80db1545a5b8,2025-04-18T01:19:44.297000 CVE-2024-4811,0,0,915f672b7f988abc754bd7b97d58f0edb23fd3edeaf5b2a0e3bdcdf831f36175,2024-11-21T09:43:40.057000 -CVE-2024-48112,0,0,c864593babcbf708e494c29a26e6604812b72eecc2e71e537de564b4211d800d,2024-11-01T12:57:03.417000 +CVE-2024-48112,0,1,fae8a6ac6daede3aa5e0f01bfc2c3dddfd1efe64dc43f2a9b02931ed06a21173,2025-06-17T15:38:05.447000 CVE-2024-48119,0,0,baa21abf94b191e4316bf16893ebdf390866a932a6251e9efb907f2e6f573b4f,2024-10-30T14:32:43.217000 CVE-2024-4812,0,0,8ef04e2594d9b88fdf0c6c095b09aa229bb7a9aa44c0aa25b1242cac8134f5e7,2024-11-21T09:43:40.183000 CVE-2024-48120,0,0,b0e650c739b138b707281499471fca0d2a4e71d5ab6d1ef4874ee3da12eccefd,2024-10-29T20:57:53.360000 @@ -271856,7 +271856,7 @@ CVE-2024-4868,0,0,3a702d800934f1c705b4227281b3c66c8289f779d8e4537a1a3de6c882aba3 CVE-2024-4869,0,0,a498392e92d4315a3c1a63f0751024c8b7def437eeab49123db178ff4b1bb7ed,2024-11-21T09:43:45.670000 CVE-2024-48694,0,0,faeae9ab327b97202e086aff921470e6b984670cc294f1289742129b482c0fbd,2024-11-21T17:15:20.110000 CVE-2024-4870,0,0,0ea27412573995f30563e69813626323b1c481b1ce23f80a057c978dadba8008,2024-11-21T09:43:45.780000 -CVE-2024-48700,0,0,2f007153fe0295d1ad8ebf533194dc6bb57db16cb9d2aa25efe774389c4cc9db,2024-10-29T19:35:24.643000 +CVE-2024-48700,0,1,77172939a7779f121186435bac7dd16fc357a432a150b3148e465000d565b423,2025-06-17T15:40:35.690000 CVE-2024-48702,0,0,ba3f6c6bbe6ef3a4806734266bb65891fcc2897db0e2e54b24b1fcc51c133716,2025-05-29T16:15:38.883000 CVE-2024-48703,0,0,66b49a296cfb94ace483912b990b744b957f247ff107c8ad1fc8f2d7eabd4b79,2024-12-11T17:15:16.880000 CVE-2024-48704,0,0,2b84775ad07d2290bfbdc672a4a017f9455b894d83830eacd9ff125f3476cbc1,2025-06-09T19:00:51.830000 @@ -278479,8 +278479,8 @@ CVE-2024-58130,0,0,b1da61426890522f6374bed5d854c2d8adfdac7556fa6282fde3bf2122dc7 CVE-2024-58131,0,0,bc4908e979254be0dc1e1176cc36e7e2691904c3630b2abae16ce8f2a4516d81,2025-04-08T16:45:17.107000 CVE-2024-58132,0,0,87fc99e96492ae47f7ae88aebc39cca10a37119d96d5c66e6cef7cf588ab7762,2025-04-07T14:17:50.220000 CVE-2024-58133,0,0,4511afb6f4930bee53375abc516811f9928c158d8decf5ac029097e07f67929b,2025-04-07T14:17:50.220000 -CVE-2024-58134,0,0,21a8e783c37f6eb8edbb5187c9585f6d5078c0991d1b7cbf2aafe7abd1b02279,2025-05-12T19:15:48.523000 -CVE-2024-58135,0,0,50cfd95ca9b82e7f28b0433a71d1cbebd1b3b3d6e36b417b5889aba328a5379d,2025-05-12T19:15:48.663000 +CVE-2024-58134,0,1,844a76db9bacdb50c7fcf71e68cc136b602f3c1509d90d723fb49873a95dca47,2025-06-17T14:15:38.223000 +CVE-2024-58135,0,1,7cdc7efbe819097e576076697eb454c9fdf45442388154a5d0c82ad2cc532f7e,2025-06-17T14:16:05.757000 CVE-2024-58136,0,0,7d42d622ee4e18724ac12c03124fafd081de4815b0d827e3b883d9598d043c28,2025-05-03T01:00:02.097000 CVE-2024-5814,0,0,409f119643711fe465e9fd028af3caf838fd31e85495ee2ac73938edab3d7b3e,2024-08-28T12:57:39.090000 CVE-2024-5815,0,0,aa6c60bd870ff05880c843bf9053a612a42ac0af7385b9bf8cbbf1b2da2f2182,2024-11-21T09:48:23.203000 @@ -282655,6 +282655,7 @@ CVE-2025-0315,0,0,1ff8648b10dc9fe9f28c345597d79391544a396f8fd51d0f157a1ccc4feb9d CVE-2025-0316,0,0,25fd7fe5edf79101ae2318703f4978f3c60d73f85c2ce3aafc07a98a04e1c521,2025-02-08T22:15:28.477000 CVE-2025-0317,0,0,1123791ff2d58b6f495de598eaa7b07d475197b92f1bcee30e0f8801714b425c,2025-04-02T16:07:20.300000 CVE-2025-0318,0,0,1adf5fbf909f385869a8e3e2c4143fad7dfe52742d5225eb605180883ed9373b,2025-02-25T22:09:05.680000 +CVE-2025-0320,1,1,2898086a300522527e0156bf3b1d758a0af77aa7eb352bfea981631e5db19a41,2025-06-17T14:15:30.270000 CVE-2025-0321,0,0,949a46e9b053903a4a5e7760dec47f1d94e986bd99c2cdf86cabc314ed2bfdb6,2025-01-30T17:39:45.447000 CVE-2025-0324,0,0,d8583250aa5e3dd7ed8b49a9aec89d75b9eb22bea4e3f5aaedb046d143c4ae3b,2025-06-02T17:32:17.397000 CVE-2025-0325,0,0,54eeea6f8ae32938f0c6f29e0878a276380af014b58afa7e3c77859033a70b91,2025-06-02T17:32:17.397000 @@ -284943,7 +284944,7 @@ CVE-2025-21569,0,0,5df0154e36384276f1807ec7f051b457b9528fd8420a266b3a9f61e681a5e CVE-2025-2157,0,0,e2df632411484423da0dd94bead77ab351b9e4ebaaf65b7778d5ffe9db34b712,2025-03-15T07:15:34.930000 CVE-2025-21570,0,0,b28326c47b14b69b19a069f1ed11649147fe9c6663ede1af03861dfbff7e1099,2025-04-29T20:01:53.187000 CVE-2025-21571,0,0,7b3f6734d1d076e0bd10fd3b66cbef65ade1dab215987281ca5d4e947e8dcc9a,2025-04-29T20:02:23.943000 -CVE-2025-21572,0,0,7fd7ee2c9017a34d6e667f89378d7c55949debb43ce6aa6ea612ab10579ffa2c,2025-05-06T15:16:01.123000 +CVE-2025-21572,0,1,e670a7e3d9451566a4ce75751bf96eb395dbc3b88df33777e25b95963c7b9f26,2025-06-17T14:16:23.633000 CVE-2025-21573,0,0,2598ec8d7febcff1e0a5e65179cccbef467406fab2d07cf71fc59e6c1e207b57,2025-04-17T21:36:01.050000 CVE-2025-21574,0,0,04b8d47dbcc5a61aaa6f655abdc28e8c079e590bd3978c86803a5e3b2354caab,2025-04-17T21:35:46.023000 CVE-2025-21575,0,0,aa0eda4b0d889c269ea4754b8c9a7d8dc5a4cc04292f53391b6772dad4162bdb,2025-04-17T21:35:38.430000 @@ -287835,6 +287836,7 @@ CVE-2025-24755,0,0,817a6f4676c47a1165c3ef71cf774d5099a4b3fffe7ab21f2fd661b2cbf35 CVE-2025-24756,0,0,00090c21b036cb18f500635475c1d0d07432c00656603d0706e690db1dac0d4c,2025-01-24T18:15:49.307000 CVE-2025-24758,0,0,32f18f9fde7b9c98057db303ccb0ef7fae2b4bd1295433bfb8994fab92023627,2025-03-03T14:15:49.300000 CVE-2025-2476,0,0,cb20178503f5107240f603d37b12152fa4cba62b4b4f5e2e6646619a7113db65,2025-04-01T20:37:56.963000 +CVE-2025-24761,1,1,5823115c25632d984ee0e9f5554230207cb2abd23f7e6a20cc3075b2e158df6a,2025-06-17T15:15:40.800000 CVE-2025-24762,0,0,894e659a1a178aa9d531cd7df56fa726ae70cf96ed97a3663ab30f3dfab73a43,2025-06-06T14:06:58.193000 CVE-2025-24763,0,0,79f7b62e2c27806e3f9461410effa35fd2516a997202c5333c9106a47a7186ce,2025-06-06T14:06:58.193000 CVE-2025-24767,0,0,1c214db83a47e8769c514849bbcc4d5986d7655cf1c36824fb9639640f04fe8e,2025-06-12T16:06:47.857000 @@ -287842,6 +287844,7 @@ CVE-2025-24768,0,0,9189c2bd9d601f25f78d69a9ed75ee394b9e6a5a348dad3498cc8567cf03a CVE-2025-2477,0,0,3686d026975337c8b88c9fe51616f10734ea4310f92df921905ea60f68804787,2025-03-22T07:15:24.780000 CVE-2025-24770,0,0,fdf52f6ec826aca9cec8dc178d0c6ac549801c2a9257299df2336712d666c437,2025-06-12T16:06:47.857000 CVE-2025-24772,0,0,547afdd5349c8fcce2c64d6c10c715e5d3569a1830eade75c5bf4072200b32a0,2025-06-06T14:06:58.193000 +CVE-2025-24773,1,1,09f047fe5a42a18b8dc44d337c7d2ddeb99a4879cb0735c25bae656e5ee45d78,2025-06-17T15:15:40.940000 CVE-2025-24776,0,0,c9ddd5a50b6ab340b7f808209038fd5f4594e33d9ce5f72a4815066c12e3c3b8,2025-06-06T14:06:58.193000 CVE-2025-24778,0,0,882f4200212085da2b27c56d01fef020fd88d760c8f828c4b6e08199c67ae033,2025-06-06T14:06:58.193000 CVE-2025-2478,0,0,1f250b1c3a01cc2aeb8f8a30a3c88313a7c6df2af4f8c1676f1452abfadd344c,2025-03-22T07:15:24.963000 @@ -288346,7 +288349,7 @@ CVE-2025-2549,0,0,81bc1419bc2ca032b7d3a3129fa4aec6b83ee02f25c21613bfc61816baf003 CVE-2025-25497,0,0,342cc8c3073c7b4fb963ce6919474125872366956f79f35d55abc4517740c1dc,2025-03-07T20:15:38.013000 CVE-2025-2550,0,0,4a61e93674e502a8c0bed02381936602716218efa1f9f7373841b1b6041298c4,2025-03-20T17:15:38.903000 CVE-2025-25500,0,0,a1cec532f59d25097e0632a95c39ff5912afe6aa2e047571892eabc9906831ea,2025-05-22T19:52:28.640000 -CVE-2025-25504,0,0,dea419789978e3f0e5eb4da466afbb09e752fec727d8822e341eac9e9d99c3ef,2025-05-05T20:54:19.760000 +CVE-2025-25504,0,1,e0fa20f26e56935fc356033f68165b5601539f34b78c65d99eee3b1985ec9bfb,2025-06-17T14:13:16.263000 CVE-2025-25505,0,0,e9c1c4e7fd17d69fb175176fd0aebef11f3e6fa5ba62e87e57c2aa8b17ea4735,2025-04-10T13:37:15.333000 CVE-2025-25507,0,0,99fcc628e72eaef3ab2758be4c7c5d9b6fb666ee1ec31a8fdfbf52e5a6e3d4f3,2025-04-10T13:37:05.443000 CVE-2025-2551,0,0,70be67e63aae83c04048736ff89759931da9700ea07f97a5f0016d4208b5a4fc,2025-03-20T17:15:39.090000 @@ -289851,7 +289854,7 @@ CVE-2025-27835,0,0,bfd55bfd7467fd1074b48c9c5b6d2f6f88f9d233c37b427ef5473af1632e7 CVE-2025-27836,0,0,f465c8991d790bdb41314bcd1316c06a9f596110c7a85fa30ce1c38f1408796a,2025-04-01T16:35:25.050000 CVE-2025-27837,0,0,198388712cbc69d26c62c3d088f09d0e18143dea1a79e5577fb06110d422e550,2025-04-01T16:35:15.650000 CVE-2025-27839,0,0,2897e6016e5e328d150ac9e956e1e3698f33d754fabb81cbdb31c6766dbfb22d,2025-03-08T00:15:38.340000 -CVE-2025-2784,0,1,77ed6b62ff3dc36886f80bf5f954c5e0fb16bb5b2e8578c5b46a66eada554cd1,2025-06-17T12:15:22.167000 +CVE-2025-2784,0,0,77ed6b62ff3dc36886f80bf5f954c5e0fb16bb5b2e8578c5b46a66eada554cd1,2025-06-17T12:15:22.167000 CVE-2025-27840,0,0,4f077c11cd42874f9ea8d03fc4b2dba1a597eef072d62ce316763a23259bd33d,2025-03-12T14:58:54.130000 CVE-2025-2786,0,0,e956eb7658768af7a71ab8b6f13dbc2bb5f58d8f62cbc9c5c71f0b357f132e17,2025-04-09T21:16:25.720000 CVE-2025-27867,0,0,706ccc11683336c438698de97765a7b785ce156810f1f1b352bcbe344a4419e0,2025-03-21T21:15:36.910000 @@ -289929,7 +289932,7 @@ CVE-2025-28056,0,0,b4c5ed87181d52dc5e9bd019277d34161f11d988d640f052c8d45472fa8ab CVE-2025-28057,0,0,631e6e6f013829d26e8d01802f279e396e4ee4a0af8a44f7acb3a0f54ba8ecf5,2025-05-14T15:15:57.120000 CVE-2025-28059,0,0,0b528bcd391ca7d8898ab4bd4553bb61f607c8c85b3fa32f1b18963847081036,2025-04-22T15:16:10.627000 CVE-2025-2806,0,0,6b6d32bab86f8065f4651aeecc3deaaa96ebe10ed3b688f80b2cc292ba9dad1d,2025-06-04T22:53:20.850000 -CVE-2025-28062,0,0,dc508b948f082c48b56a61fbabaf3d91e3ac81a58a13d67d85ad5b0b7ab6ac97,2025-05-13T20:15:27.343000 +CVE-2025-28062,0,1,2ba74ab5de5bcda72403c5be428cbfd816217a9c13f99384f9f8ef669e45570f,2025-06-17T14:13:04.563000 CVE-2025-2807,0,0,f8faf57b374faab8743fa15c01545fe02708770c7c9d6b7c7888f61e54c92b92,2025-04-08T18:13:53.347000 CVE-2025-28072,0,0,9d11ce673db5bded08078d90348ac835537e426481654f68c0b7843b05bb341e,2025-04-28T17:38:00.493000 CVE-2025-28073,0,0,1c0c4e9c9eacc02ea973621ca34fd6b1d8eb844ef7a9eed854de9668bfe84de6,2025-06-16T18:39:32.657000 @@ -289970,7 +289973,7 @@ CVE-2025-28145,0,0,f7cb8550c771e1ecfdbfb7b5a33b47f3e562fa1cb415f334ceae3bd2faf80 CVE-2025-28146,0,0,82e73e5d16f34a784475ab443e60423174d142466e77e35b25746d0a292cf775,2025-05-28T17:53:37.343000 CVE-2025-2815,0,0,242155fff6e988a29170d3e8e0a0ff904f29004fb7975cc06cbc247a50a0c090,2025-03-28T18:11:40.180000 CVE-2025-2816,0,0,a8ded0ab2e19cf63ea62d3b02a3f6575ee232c3a778f97857dbd64a1da80c4f8,2025-05-12T19:38:14.733000 -CVE-2025-28168,0,0,2ae007f854139b38a2c5176628d3ee319281dd635997744c2876c666d84ca10c,2025-05-08T18:15:42.197000 +CVE-2025-28168,0,1,ce82f8e90a3bc9496c485446285f7287da71e41e0b80c444d00a4316307c0f01,2025-06-17T14:15:20.720000 CVE-2025-28169,0,0,daded7404590ead49179714046cf4550734ad214e781473e5f10c5129c2c88e7,2025-04-29T13:52:47.470000 CVE-2025-2817,0,0,18419359e2e874c01b97d55b78d8711de2b9ca053ab524d82cfee19902431b39,2025-06-13T18:53:56.077000 CVE-2025-2819,0,0,38e9c36ae873a346ecdd7625eb6881a65dff946dea1e4d5fe1469a7230964dac,2025-03-27T16:45:27.850000 @@ -290188,6 +290191,7 @@ CVE-2025-28958,0,0,d9eebea06aebd4f4602b4099a0e69e3b14141e06d1b195456acb942884339 CVE-2025-2896,0,0,4558970bb5260d917e5a373371764eb8c9ff16148bd2cda59741f4495076314c,2025-06-09T18:08:36.257000 CVE-2025-28964,0,0,5941c6471c783811f736b1cd6a2de0d6e846c0f5ab5d7f88d39ac0e5c46376df,2025-06-06T14:06:58.193000 CVE-2025-28966,0,0,a9a888da79337c47e1f2f230b623b8e1e6b96aab7deecf98c76f3f9f345b2049,2025-06-06T14:06:58.193000 +CVE-2025-28972,1,1,a94174fa0dd8c78a67792752d909a25a5ac627cd740db2109775701fdedd9fbc,2025-06-17T15:15:41.077000 CVE-2025-28974,0,0,e17e6dc9b84000fcffa09ada9585e56145630617cef399b7f12d810b2629175f,2025-06-06T14:06:58.193000 CVE-2025-2898,0,0,47f67442cb55ba411e4669d13ef4529f1239e4e6ba72061becfb6f7e592e31cd,2025-05-16T20:02:07.950000 CVE-2025-28981,0,0,bb036b80f7f84e8c41aa9257be84aaa70ba5720599d544c5ddd5af62806b9e7e,2025-06-06T14:06:58.193000 @@ -290195,12 +290199,14 @@ CVE-2025-28984,0,0,9ef7f986d96117439d40b90e2fda225b43bc8fa4b7f4173f4395b7739bf2f CVE-2025-28985,0,0,9bc036525a100347f01ae377d4a458e90eef123681201c669ca0c05249f59f10,2025-06-06T14:06:58.193000 CVE-2025-28986,0,0,1361618036e60c533ef72231d02393dbc213b1b36c2bad113d5bda9efbecbc7b,2025-06-06T14:06:58.193000 CVE-2025-28989,0,0,19a3ef0d3dd79134e204deb24321bd5754c79f734cf16a54fa973556acc63098,2025-06-06T14:06:58.193000 +CVE-2025-28991,1,1,cba1c150ca46c1efe65825cc4bd12f6d92404a48a8a1dbcf4d5b354d94a5015e,2025-06-17T15:15:41.210000 CVE-2025-28992,0,0,975452dd424789c44f98e5723c5be288820ccbde23b860ee6a47de096ae298a3,2025-06-12T16:06:47.857000 CVE-2025-28994,0,0,21e3ebe28dc6630edd4ea4ad98bcf7da4cc2a4a2824176016aa8ed83181cb3ed,2025-06-06T14:06:58.193000 CVE-2025-28995,0,0,ecd926ca3e5c3a5f04ab68c4217c460f382af91580ada1d8a950fc6b44ffa870,2025-06-06T14:06:58.193000 CVE-2025-28996,0,0,a3c81f0844ae31cf1718dfeab90e32c3f1e46bce363be53a0629b3286d4565ed,2025-06-06T14:06:58.193000 CVE-2025-28997,0,0,201cbfd0ddb9fce280a7e07e55636b02e759e63e03e9f9c18fe553768df5e39d,2025-06-06T14:06:58.193000 CVE-2025-2900,0,0,7fae831f047ecd7346a160d93b21af917548a04e8f5cc7bcbad0aaded0bb8d22,2025-05-16T14:43:56.797000 +CVE-2025-29002,1,1,bd34cff8ec52998ba39b8752120afdead88ff855f9053f2be70c4d384a8bf4ac,2025-06-17T15:15:41.360000 CVE-2025-29003,0,0,ac4e6c10cc78a574f687bbb129b00b12f05050f35ac2c9c265488283397963d9,2025-06-06T14:06:58.193000 CVE-2025-29005,0,0,c9f8dbfedc641b5548bf37c246299e6accbd08e55b091ed72183877cf47bcc48,2025-06-06T14:06:58.193000 CVE-2025-29006,0,0,4d1d38cd7a0c468226e8aca886cb106ca62c5b00f9e00f7f812545f9eaf5dd09,2025-06-06T14:06:58.193000 @@ -291028,6 +291034,7 @@ CVE-2025-30559,0,0,35d567dae51326c272326fd1ad46fe1a9fa4c3e31f83eb87077ea7b71563d CVE-2025-3056,0,0,a676602af8fcc39fe973093556d364d95ed4647c106a50e39a9fcea8fda534b2,2025-04-21T14:23:45.950000 CVE-2025-30560,0,0,d65ab8f0fe34177baf190fd136d781cccbfc187c572b66fae92504331257b6ba,2025-03-27T16:44:44.143000 CVE-2025-30561,0,0,807a983c59a39d34b7031b8ca5ea01e804f6f789e50e63803ea31b39b407baa3,2025-03-27T16:44:44.143000 +CVE-2025-30562,1,1,8f23f02433485ff402ed9bb238b5bae033e32688fcd37cd5981c491c056f210c,2025-06-17T15:15:41.507000 CVE-2025-30563,0,0,29a38ee73e713ee9c8a75dbd238ee18ec709e417c2441fcd368b809eb66dd8fa,2025-04-01T20:26:11.547000 CVE-2025-30564,0,0,8ff729f6f53be23b41fbccbc3f8f7b9a34118cda75b7737519686fcc4123d3d4,2025-03-27T16:44:44.143000 CVE-2025-30565,0,0,242441067faf6d08b583408d69923ff5a0722b9f6175a491b7bf7f8915405099,2025-03-27T16:44:44.143000 @@ -291088,6 +291095,7 @@ CVE-2025-30614,0,0,5dfdc083cb9680a6bcb162abc7bcbe37afbdc64a1696fd11cda0f2014cf04 CVE-2025-30615,0,0,12254e1e5a9bf6df32594f8859495f558e53af8a30f333827891cbe7462c6e33,2025-03-27T16:44:44.143000 CVE-2025-30616,0,0,206da150c5b3587e782fa0c6870c4f5d10fc72df0b7660c7a2bff86b86ca90bf,2025-04-07T14:18:34.453000 CVE-2025-30617,0,0,96a2170e35bfa0565f616657a20e77a22f6adbc3a2ffebb29c467b0218588229,2025-03-27T16:44:44.143000 +CVE-2025-30618,1,1,da80ca3c2a73358e3518919e6e4b99370aa61b8411e3db47adeeb7b6af198a8c,2025-06-17T15:15:41.650000 CVE-2025-30619,0,0,f97cb6d261a22354867f9064db313f9b626b3063c07f056198e438c30c115bd6,2025-03-27T16:44:44.143000 CVE-2025-3062,0,0,ef1b5c531480f2851a5c90acd3bf2a3b521701e8d1101b60cc1525eaa9141994,2025-04-01T20:26:11.547000 CVE-2025-30620,0,0,c08b515269c7c0e04b1b49f9e6c2ffe9756d4e917a1b7d90dc4cbb85983697a0,2025-03-27T16:44:44.143000 @@ -291426,6 +291434,7 @@ CVE-2025-30984,0,0,034a74e0caa7bd14ced17a5c80bc778777c5654b7ca69176fb0d7f7ebaf75 CVE-2025-30985,0,0,ca9a8afa18a1db635c78d3851e268c038dfdb21f929339aade64c19290b707f9,2025-04-15T18:39:27.967000 CVE-2025-30986,0,0,89cc7ea8131810f7d73ab3e657854dd73f775377299662852ec1f5270e30b06e,2025-06-06T14:06:58.193000 CVE-2025-30987,0,0,1ddeca9f293b13339e82c187149d285418438fc60231797e7c68c5fcad6fe64b,2025-04-01T20:26:30.593000 +CVE-2025-30988,1,1,ab762eb644c48d89f96650f6b800d47b0db853a7da926e4ee54fb299f2a9b595,2025-06-17T15:15:41.793000 CVE-2025-30989,0,0,f4c6fe15be31d7920318067cf3efac06086078422a7fd774f7af0404eee6bddb,2025-06-06T14:06:58.193000 CVE-2025-3099,0,0,8b5b94044c5b312a61081eb6466602886f5edc420174286cf66115736f8de591,2025-04-02T14:58:07.527000 CVE-2025-30990,0,0,bc20a697a44ebb291e68137290fbf14f5126715b241c976deca618ed994e463d,2025-06-06T14:06:58.193000 @@ -292251,6 +292260,7 @@ CVE-2025-31915,0,0,b01a878c422d271ef24a4733824978564b49331599f05f69f543cfd09dc29 CVE-2025-31916,0,0,aa294dbd83ddf02d422d1958d2813b84f3b1794a0c8c3ce02d4fad24f40c5b31,2025-05-23T15:54:42.643000 CVE-2025-31917,0,0,826d76344cd9795536a25df1776f56082e7ff83324a9465399c2207a1eaf6aca,2025-06-12T16:06:47.857000 CVE-2025-31918,0,0,6c5d50e6ddbf7ea515c203028d337691e1a6a78bdb1de4d23092fa5a5b4a3a8c,2025-05-23T15:54:42.643000 +CVE-2025-31919,1,1,370b92ff611bdcc308a05fd943f1e06d0a157c5ec28f9c8de1f122133525ada2,2025-06-17T15:15:41.943000 CVE-2025-3192,0,0,14f88a64f4f058599196fb894b7652f55d55387666faa45a3d02f24f7d0ecfe8,2025-04-07T14:18:15.560000 CVE-2025-31920,0,0,650137e4a921ccab4e886b2ea04529770c073eeb8a43cf9a70010f3d4543f01e,2025-06-12T16:06:47.857000 CVE-2025-31921,0,0,388d68bd80dd43a130bcfd421c1e4aea94db2871694b753a893d06aa5a1833e5,2025-05-19T13:35:50.497000 @@ -292310,7 +292320,7 @@ CVE-2025-32036,0,0,392ced4a7ceffb3860fa36c03a132228e0c351b485f1983727787214d9a82 CVE-2025-3204,0,0,640564153dde48d17342c52eff358ea56840605e43f6aab84cda78f222b9e0c5,2025-04-15T18:48:43.403000 CVE-2025-32044,0,0,47cfb11ddd4f798b88407ee947b6b37b38d63eb788ec0beb1a8b1f88d22243d0,2025-04-29T13:52:28.490000 CVE-2025-32045,0,0,6307eda7e5fecbb45ee3cd67e3b1e28bbd97fe6280c52237a8c534b3b8db6479,2025-04-29T13:52:28.490000 -CVE-2025-32049,0,1,2126caebd122da73b658d5e9f6578921e4e60d0d550219a2c8f83732d71a392e,2025-06-17T12:15:24.733000 +CVE-2025-32049,0,0,2126caebd122da73b658d5e9f6578921e4e60d0d550219a2c8f83732d71a392e,2025-06-17T12:15:24.733000 CVE-2025-3205,0,0,2fbe92de3997566680a1052e42bc5ae830a44caf727a733907db3320a0fb983b,2025-05-07T15:58:51.537000 CVE-2025-32050,0,0,d0a186287f84675d733fc8adf7b721e0ef8373d24cc78f737949580577a7a0c2,2025-05-29T07:15:22.560000 CVE-2025-32051,0,0,c5601bf30a2280db534481dc10ccb3d4bc49f5f6486729ed8c2da54db3bdca25,2025-04-07T14:18:34.453000 @@ -292679,6 +292689,7 @@ CVE-2025-32507,0,0,f8c6aaf2d87e886a15acf214ae77cea962b3ec2cfc28baf5011f0b2a20bb7 CVE-2025-32508,0,0,b88d86f51262ea13acbcf184506c00b8b608101709099ff1fe3fc01e0477468e,2025-04-17T20:21:05.203000 CVE-2025-32509,0,0,ecb483df86b066705aa236b66cf761eb622f1d1fe441630337ff9d3bb84d04e9,2025-04-11T15:39:52.920000 CVE-2025-3251,0,0,40d0b8ce477fd906963245c3f47c46ed7c4260a43feb20789c6a6db271395106,2025-04-07T14:18:15.560000 +CVE-2025-32510,1,1,1814fc7eebeac8e2d48051b941a85493d55ba316c2c97a37a16b6a24c79f794a,2025-06-17T15:15:42.093000 CVE-2025-32511,0,0,246c79a355121ae53cb1109b690016ac8ad919b31905ccd4827a747812a2d974,2025-04-17T20:21:05.203000 CVE-2025-32512,0,0,f75046d3b6350e2cbdf36f4fb1824bae839d7441932cb90b5c04e1bd773dfc87,2025-04-17T20:21:05.203000 CVE-2025-32513,0,0,467c66f11c1a7469d1f46e6980710737ae1f7dde3a81cc9b64cc8e6cf4d57b74,2025-04-17T20:21:05.203000 @@ -292720,6 +292731,7 @@ CVE-2025-32545,0,0,85d16f8dde3f67c917c249d74db44124368ccbf415fe5e4bcfdc19dea08b4 CVE-2025-32546,0,0,8fe0a3b7b2087dfab864a288b56640a780fe6db36cc3825ce224e0f4da82de94,2025-04-17T20:21:05.203000 CVE-2025-32547,0,0,5c89f4f081a50da795aed38cf58a1893dffebbf046663f20795b9a5873e64eb2,2025-04-09T20:02:41.860000 CVE-2025-32548,0,0,51f9ca95095cc3335f023f3cd57a3b9c2736cbe3b20f2ec84c37dfc7229c4357,2025-04-17T20:21:05.203000 +CVE-2025-32549,1,1,3b4759510b542719a86fda5f5ed47506101af99d924150b6d58a20230a9bf584,2025-06-17T15:15:42.247000 CVE-2025-3255,0,0,d5353c58983edc47cfd68b6813d92152b05623ed0e06ed0dacfb65f3d812b06b,2025-04-07T14:17:50.220000 CVE-2025-32550,0,0,0d4c615097256a13cc479ea60d0d4d2caeab929e7fcd6b0932b9a19b45f1a275,2025-04-09T20:02:41.860000 CVE-2025-32551,0,0,28cd9e7a2983ff8ec815d18ebb86efac9600b285820b5afab7a5b6c87d080cd5,2025-04-11T15:39:52.920000 @@ -293041,15 +293053,15 @@ CVE-2025-32888,0,0,851f5838ac3b9022b83107af55b659a3aafc0e2822e0c3d7c62be76cdae08 CVE-2025-32889,0,0,c5001261168b52d1fcafa5e758115761d50fb6c85872f50dce10dea30446578f,2025-05-02T13:52:51.693000 CVE-2025-3289,0,0,2dce3ef8eb88e8d6d3c6bdcdd7b6d448658ce48e819de5faca8e16dde3fc5df6,2025-04-08T18:13:53.347000 CVE-2025-32890,0,0,14fe3680ce0a694763f118a1c4280330bb31bbe10888a63507689bf1688fafee,2025-05-02T13:52:51.693000 -CVE-2025-32906,0,1,ed269622d928bd2aa475c3656dbb221e908c6bab45b25018cc828ee7bd119edc,2025-06-17T12:15:24.950000 +CVE-2025-32906,0,0,ed269622d928bd2aa475c3656dbb221e908c6bab45b25018cc828ee7bd119edc,2025-06-17T12:15:24.950000 CVE-2025-32907,0,0,213f7e42abba53cbe091599b6e08ac02e165cca9f4b70fa3a4b5acdea9942c00,2025-05-29T07:15:24.333000 CVE-2025-32908,0,0,d04d5cbb3961125d5a394946a9211c5953b759f1c35584196afe4caf2db9d0fd,2025-05-13T21:16:14.597000 CVE-2025-32909,0,0,28834e670b20d61ecd1abc0fbc6573b4598f1e3282cb36a80b5124dae9557e4a,2025-05-29T07:15:24.480000 CVE-2025-32910,0,0,240d5c7ee2b4c85daa5f41c88c38a0b1ff00089c1fa83111393e2a6ccde411d9,2025-05-29T07:15:24.627000 -CVE-2025-32911,0,1,19da778239563f465f677d260c2c125ecbe4ab224e433d4e0167f6baf25baa85,2025-06-17T12:15:25.213000 +CVE-2025-32911,0,0,19da778239563f465f677d260c2c125ecbe4ab224e433d4e0167f6baf25baa85,2025-06-17T12:15:25.213000 CVE-2025-32912,0,0,537b35ec8e3e7b56fc525d652e56f2627ca353a9690e505ad216d07c70358d3f,2025-05-14T00:15:18.100000 -CVE-2025-32913,0,1,e1927d0860bc1d6760527c56e49e831eec072989d1ced890c45db58ff9e96f68,2025-06-17T12:15:25.447000 -CVE-2025-32914,0,1,3af3067d70bd81f91455998b87224657ddcf7d162a47d749db58a95e606833a2,2025-06-17T12:15:25.657000 +CVE-2025-32913,0,0,e1927d0860bc1d6760527c56e49e831eec072989d1ced890c45db58ff9e96f68,2025-06-17T12:15:25.447000 +CVE-2025-32914,0,0,3af3067d70bd81f91455998b87224657ddcf7d162a47d749db58a95e606833a2,2025-06-17T12:15:25.657000 CVE-2025-32915,0,0,2d5afa660948b242629afd805b42088f6d76764cd20288c422f89dd9fe02bb30,2025-05-23T15:55:02.040000 CVE-2025-32917,0,0,621a83e4e955a5402f378188c4f01b4aff8a0585cec439fee69248f2294167f0,2025-05-13T19:35:18.080000 CVE-2025-3292,0,0,118c173f186dcc5720366632802764bcff206cc9d545c82cefbfbd5ae3208b31,2025-04-15T18:39:27.967000 @@ -293307,6 +293319,7 @@ CVE-2025-3446,0,0,585a0b92d77798e0e611702273d669ff3e45200ab62b3f80a42dfdf269fcf8 CVE-2025-34489,0,0,8b746314f9cb91db9a160f3ea93a0ab6fa8e64b1a0ed63def5bd835662a466d5,2025-05-10T00:59:16.850000 CVE-2025-34490,0,0,ff6ccf68d08b2145b1b0c3fd30524d8f343b67a475d00c1c0efae114546b620e,2025-05-10T00:58:59.130000 CVE-2025-34491,0,0,faad48875b9db7a8e22a3e33d04e2680f19102abb22a8bb70d5a70d93b5c1ed5,2025-05-10T00:58:12.427000 +CVE-2025-34508,1,1,ea68ec694a9f0a9fe2d2293feea593ef8437239dcc672306b5268c8441efd23b,2025-06-17T15:15:42.407000 CVE-2025-3452,0,0,a0af240b89728ab4c39e75e741754c068d979812f93583676566bf2c295ab7ec,2025-05-06T15:35:58.647000 CVE-2025-3453,0,0,6d4c3756403d2c169f24bd9cd170cc74dc819f8c072954929ebcb8b579bf19de,2025-04-17T20:21:48.243000 CVE-2025-3454,0,0,4237309546c7f67c43ed4306317e4be2d74b3a324e1d901b3aa918c9e8066030,2025-06-02T17:32:17.397000 @@ -293366,7 +293379,7 @@ CVE-2025-3513,0,0,30697186a140035be04a508cb924b9ecf131ebffede275cea415703e58a234 CVE-2025-3514,0,0,c86807ed5e4a9fbddc1ff156b508ea32337a1a14e6f5794c2a643d10915e3635,2025-05-28T16:01:47.180000 CVE-2025-3515,0,0,9cb0da5ac32bc54ba8096e84919be59f07816d81250d2794ed30b9d4e01f9064,2025-06-17T10:15:23.507000 CVE-2025-3516,0,0,a2df3bab698f4cdb6459b7ab07371b26a8ad28a7c62a1c7ac29ca859a1d3cf58,2025-05-22T17:03:25.230000 -CVE-2025-3517,0,0,b833d94ab9d25f1395ed59764d2646b6bfd238c131bbe071db47d2fa76a973c3,2025-05-02T13:52:51.693000 +CVE-2025-3517,0,1,e0149e510ca37c53578f8610de83edb394c23977dd02ae84bb4a628a9dc9f788,2025-06-17T14:18:39.783000 CVE-2025-3518,0,0,7497563947f75b629887a4413d991889fb74f762947f73f77cc72069a35bed4e,2025-04-24T15:15:58.393000 CVE-2025-3519,0,0,7a1e772e7e1a4f83fd384db353598690580e540b87458701710d69fa7ae08b1c,2025-04-23T14:08:13.383000 CVE-2025-3520,0,0,7c7eeccf15cf970d93a11f89bdf4e7c6995461b0f04fc2e4a054f485b85dec3a,2025-04-21T14:23:45.950000 @@ -293986,7 +293999,7 @@ CVE-2025-3876,0,0,98fa4965cd0fb5896f08763a0582c93ea252014e67d6fd79d41bdf5071b00a CVE-2025-3877,0,0,a620192bb17052afd6333e66b5a40238ba021cbb671fc7173692c585e43df3dd,2025-06-11T13:15:24.007000 CVE-2025-3878,0,0,6edc0413060b870ca8db342e4d416bc7330af04d97c4384be96b3d4817bff1e1,2025-05-21T13:36:16.070000 CVE-2025-3879,0,0,d832e10f3f5a35fa6f778cb83701763ba1ca0a6464dece4429751c1aa0bef5fb,2025-05-05T20:54:19.760000 -CVE-2025-3880,1,1,8ed22a4c02edd3320caae58970e266c82043d9121ffcc8e5ff9fb4666cb29edc,2025-06-17T12:15:25.870000 +CVE-2025-3880,0,0,8ed22a4c02edd3320caae58970e266c82043d9121ffcc8e5ff9fb4666cb29edc,2025-06-17T12:15:25.870000 CVE-2025-3881,0,0,24b54933e846a45dd97d5a9a438a485d3ead998ef41689a70b444bb5ab176e29,2025-05-23T15:55:02.040000 CVE-2025-3882,0,0,c9ae33678e4df5b1046892b754c3ed5475864c05c1f0abd762dbc5e3ccf7733b,2025-05-23T15:55:02.040000 CVE-2025-3883,0,0,901aa57afaa8d1ca1c754809ac2893eff5bb9ad10a88b170dcc77060f45ed8f8,2025-05-23T15:55:02.040000 @@ -294029,7 +294042,7 @@ CVE-2025-3923,0,0,ee152c7f1a42d63e1ca21cb1c49adcbe2fb8c27f05521d2bf1672c2da0c269 CVE-2025-3924,0,0,7b87f51ca3c311667e1b7a4df04e30967e599dbb013055d4845862729654e283,2025-05-07T14:13:20.483000 CVE-2025-39240,0,0,be458de6ec89c952ea651d2b3d5e8d16b4a85d2b671af57a81ccbad3734ae7c9,2025-06-16T12:32:18.840000 CVE-2025-3925,0,0,a768d137ba057feede97294fe198f51837b892f84c1c07da5c135848de68ae8c,2025-05-08T14:39:09.683000 -CVE-2025-3927,0,0,8e887169e2b89290db9113fa0a8d0ac70dc89b409e16089658a987265ba9ed66,2025-05-12T16:15:24.823000 +CVE-2025-3927,0,1,f971cde40bf3a635bb3406c2ee9618482b9311f48d97affcd31bb58e563463e0,2025-06-17T14:18:20.087000 CVE-2025-3928,0,0,b8f573bcf4c9f6295f3b239508ff59d7f2be020729128e557b8061ff337a956f,2025-05-28T20:51:43.700000 CVE-2025-3929,0,0,5162b69ea0e0de88b7097aa8543c36bd2d38af32bc3451e023c40c6ad38194fb,2025-05-12T19:35:32.720000 CVE-2025-3931,0,0,1df28a65d58b1b11dd55fb48e21c28c39df5dac9e59f3f4980170b9f3362a2e1,2025-05-16T14:43:56.797000 @@ -294167,10 +294180,12 @@ CVE-2025-39472,0,0,bb2f2cb88d690511a4cd39d1b1efb90424abbd9f68741fae65c0ada479855 CVE-2025-39473,0,0,2ff3a01ad82077d7df867b6a19d016b90c40ef786295af9896c63bca19c18aac,2025-06-12T16:06:47.857000 CVE-2025-39475,0,0,32a5b659afe4d538721756c664ed7a7e24f3a64283f6baeaa96b7cd3a0bed85e,2025-06-12T16:06:47.857000 CVE-2025-39476,0,0,3723c4b08f699d2cbc1541947de3107a0f53bcdf6ee1fe9b6aaa8efeee3bc345,2025-06-12T16:06:47.857000 +CVE-2025-39479,1,1,b853d4d86ef2536cacf19c6c1a69b693e3dd4086aff02c3cb3ba28bc140214ef,2025-06-17T15:15:42.567000 CVE-2025-39480,0,0,339ca3a785b41e56bc901bd68b8ae900170b561cf9584e47581955799fe339b6,2025-05-23T15:54:42.643000 CVE-2025-39481,0,0,ffc38075b9c9e137d0a9f220b07f654268d9b6b192ff077aaa96738d747f33c5,2025-05-21T14:23:08.503000 CVE-2025-39482,0,0,f44ca390a511cc4fa9864ad222a12fd65c81c88e214777e055d5294de44cc742,2025-06-06T21:54:00.823000 CVE-2025-39485,0,0,70335b3403cfdaaf341612abdd2f1cd24b67724d9af1078263285d5edb296bf1,2025-05-23T15:54:42.643000 +CVE-2025-39486,1,1,4036c248bf78e8f9be33e8fb256bcff2973b09fbe8f541a8f0e532a3d6b0071e,2025-06-17T15:15:42.727000 CVE-2025-39489,0,0,b80eceb8e17f53f167eb1f01a46351e47168a0eeeb436f1c1624f43d9e9a40e7,2025-05-23T15:54:42.643000 CVE-2025-3949,0,0,168e2abe66849b76f108d2275699dc7aa3f34d482497d50c4cedde8b889e7a83,2025-05-12T17:32:32.760000 CVE-2025-39490,0,0,f0d25e79c4e7c5558bc8cb946406ec85778837a0f23ea484a78138e93c7f9ab1,2025-05-23T15:54:42.643000 @@ -294189,6 +294204,7 @@ CVE-2025-39504,0,0,9ac91081610b44d0d449fe35d56559e679e58a436a44146d591099340af0e CVE-2025-39505,0,0,0677fac6beec77521e6cb7a2462dcfabf24b73771e71144370fe1fac1a5cd152,2025-05-23T15:54:42.643000 CVE-2025-39506,0,0,c041a0372538698a8f9d605ef133903ae98a32f47f46be4c5902cd3007028990,2025-05-23T15:54:42.643000 CVE-2025-39507,0,0,f4092fa6938581d2fec34f603e8d9da1ff63ce2168f9d8d79950973af21fb914,2025-06-06T22:09:50.510000 +CVE-2025-39508,1,1,e66f08fe50cc142934c43c0a48cc169de20eacad9f02b2e83ed8661120f40b7b,2025-06-17T15:15:42.873000 CVE-2025-39509,0,0,4cda2ae66fff6b98719931220bbe9865bb1af095a0727aa2e0da55520a402d90,2025-06-06T22:17:25.023000 CVE-2025-3951,0,0,a186d4600189095b21b27b0961d6c94b7a09ed6de2c34822a987042e93d2ec7f,2025-06-09T20:54:55.080000 CVE-2025-39511,0,0,d1cd3b593a6bc9ec2ee93f4d941fbe7cd265026aabb51b68a4d91ed88ef77e9f,2025-05-19T13:35:50.497000 @@ -294639,7 +294655,7 @@ CVE-2025-4174,0,0,374a4c7153fd6e36d67a39d51e1e6a753f33240eda49b0fa60c0eb795e601f CVE-2025-4175,0,0,0e49e508397d52b97eca58de7f67fa4365215dc6eedf4faf92e674efc7be9789,2025-05-10T06:15:49.270000 CVE-2025-4176,0,0,02ad6ed70196134b94db0e4139435e59de2aaaa51a657ae3a4c51dcac9e3ae92,2025-05-09T13:42:13.533000 CVE-2025-4177,0,0,18882226d44879b1f094083770c0f8395e91f3c42f8d54dee40ba14e25fbf6b1,2025-05-06T15:40:15.200000 -CVE-2025-4178,0,0,e26786a4d733e008391b9a00852a8679e480c5d249ef3bae86e46e5c800590c7,2025-05-02T18:15:27.780000 +CVE-2025-4178,0,1,e5c379b5321537546fccda070980225ef436b361722bfeb963e2d3422eb2762b,2025-06-17T14:18:28.283000 CVE-2025-4179,0,0,58e3ae8a640fe7e1ccd9c7c62f9a1e331010ae4aae6ad20441aed2a3954df9b5,2025-05-06T15:41:48.960000 CVE-2025-4180,0,0,e231cdc01e64e0db7424f72494f90420ae9cfe9f7ffa6d9b59d6b4eef15cdc5d,2025-05-13T20:27:24.070000 CVE-2025-4181,0,0,5081752cace6cb3631f85c944034bab0e35d4d315cac6182313ffd374a735581,2025-05-13T20:27:15.200000 @@ -294672,10 +294688,10 @@ CVE-2025-4210,0,0,75198efe0de18159aec1a87785e7e16a89c8de06da580116a7e14d570aed6e CVE-2025-4211,0,0,404e0b904354aed3b5baa7e207d5cfca573f55dcef658a41b4b3c736c556ad3a,2025-05-16T14:42:18.700000 CVE-2025-4213,0,0,ebe18be5ee5e37fbd0ec843f8652f96ea5e7e69c1b8a34e3e1bad241a91a7771,2025-05-28T20:56:16.840000 CVE-2025-4214,0,0,1d60003a6cdf25de6477c856dc27cfd829a89b1b822b87cc832b4debc042c00e,2025-05-28T21:09:07.673000 -CVE-2025-4215,0,0,13f69b38d2b1e302bff37f8893b3cf84efb228fa376f3a79933e482ce0a6fcf9,2025-06-12T01:15:26.443000 +CVE-2025-4215,0,1,4d07cb0e3407575065cf588c292bbc657ef257af0c8b1cca6196935534684429,2025-06-17T14:17:53.467000 CVE-2025-4216,0,0,7eb365d911e363692a256ed2ff09b39562549cbfdc8b1161fd87e44864143e38,2025-06-16T12:32:18.840000 CVE-2025-4217,0,0,62c15aedce5780b22253f9cbd9800a9e9b8ad351bc24efee5e47483ed5db566c,2025-05-21T20:24:58.133000 -CVE-2025-4218,0,0,24dafb9f25b27632257205877032b71f77bf5a78f6ac8f03574a5a3949342dbe,2025-05-05T20:54:19.760000 +CVE-2025-4218,0,1,0dd4abc984639b5fa790404c5ef87d07e8c81cacdcb59b57bdb27d222afa066e,2025-06-17T14:16:53.353000 CVE-2025-4219,0,0,1dbb3268c116fdb31206945d2c84e6a62b85afd7dbbb78abb2fd21bb825a5ad4,2025-05-21T20:24:58.133000 CVE-2025-4220,0,0,5c86caee7e1d137cda1341728be0ecf7fbbff93f4260af3080c92a642cb60159,2025-05-07T14:13:20.483000 CVE-2025-4221,0,0,0fd12a0e5b55ee42c307389a259ec1bd53c25a7a1b0cd952ead8bf19842b795b,2025-05-21T20:24:58.133000 @@ -294801,10 +294817,10 @@ CVE-2025-4312,0,0,b020ac5d93c94e4243097f7603b6eb31d5f3637b9a07a16410872c1ee6380b CVE-2025-4313,0,0,96adfe49118b3dc0ffa2d766514becfcea2a2e173aec97c2971381d69b1c7c38,2025-05-14T20:57:03.937000 CVE-2025-4314,0,0,89cfceef9bbe0699f164e05975fe9dcf3155dc1437b8d0bc5f6540ae67e31e0a,2025-05-14T20:57:14.900000 CVE-2025-4315,0,0,321394bc3849af4ab9b6cd61bfefb289f1f6cc25ce89390fc43856f033319044,2025-06-12T16:06:20.180000 -CVE-2025-4316,0,0,a850e49ba627f858db58117c4cb778bc199e996d4e90b919c7290f94c5d139b8,2025-05-14T13:15:48.907000 +CVE-2025-4316,0,1,6aaddf5549b0f7479d8c49d6a9b5c7691f1b55ee85c73fba6e69072dabf8b35c,2025-06-17T14:13:42.267000 CVE-2025-4317,0,0,f983c055783da6de4e51f0e6cd7b6401724e0ab142e6ae06607742ab65cbbc38,2025-05-13T19:35:18.080000 CVE-2025-4318,0,0,5887b3ce06385074832e5ab93ef36220685a1c2570be13ee561ec8804f3cb15a,2025-06-10T01:15:23.483000 -CVE-2025-43200,0,0,9710703982249ba3a3dcf44dada92bd72097bf86e8cc07bec5185c64c928b9fd,2025-06-17T01:00:02.367000 +CVE-2025-43200,0,1,3c1876f5afadc2be08bb8567fafbb39fa9bd843987e6dc0af602b61ff096a205,2025-06-17T15:52:31.157000 CVE-2025-4322,0,0,e2ee1e5545786d5194d1f34f3de88e5515751a08a7c9f4ad7a4ef29aeb6cb910,2025-05-21T20:25:16.407000 CVE-2025-4323,0,0,c1269792d01afee15d189426619dce99f2b7fd20ca7e7484441a414f66a84606,2025-05-07T14:13:35.980000 CVE-2025-4324,0,0,322bfee86bcfcb6ca23d23a1743d3ee5a6951408d15d6bec55f13d4d4fd25fa3,2025-05-07T14:13:35.980000 @@ -294889,7 +294905,7 @@ CVE-2025-4361,0,0,c901020b27e28024d1599c8415c6ec2466e7bee98c3672b14f162db733e59f CVE-2025-4362,0,0,4627ae0f53a83149a3759c09c97520a453789139fc5cb142d52ea024ade64abf,2025-05-28T20:00:58.567000 CVE-2025-4363,0,0,cfc7942feeb9a0f9f6312b42fa943d50981f3a9d84068f01e49e58a260df8ff8,2025-05-13T20:19:50.420000 CVE-2025-4364,0,0,7abc96b4496bfef1269854d9d4450b426753c52eb291c976d683ed2fcf48245a,2025-05-21T20:24:58.133000 -CVE-2025-4365,1,1,80f72b37820c31a5a3c8a3538a52350ac02157f5db7e533e07ed3217cd8fcf8a,2025-06-17T13:15:20.690000 +CVE-2025-4365,0,0,80f72b37820c31a5a3c8a3538a52350ac02157f5db7e533e07ed3217cd8fcf8a,2025-06-17T13:15:20.690000 CVE-2025-4366,0,0,231ab1d570625e15497e22d5b442eb1495badc7a98e284eaa21b6f30c183c146,2025-05-23T15:55:02.040000 CVE-2025-4368,0,0,5060346bbf213853af51c9b1f1ab82f240c6c047743a52b24483fa7453a5d04f,2025-05-13T20:19:54.440000 CVE-2025-43697,0,0,f1043efe55ac8e178b55f78e087508d0bf6544d27eb7c45213c2e77f7aa48499,2025-06-12T16:06:39.330000 @@ -294962,7 +294978,7 @@ CVE-2025-43900,0,0,8ae3246d09152552bbb6cdca3332360753ff66f5c97b078c8130a1d2fe184 CVE-2025-43901,0,0,98878e012cf8d6baa1ac5ec62480882e6fac2e6450aa75eeb2862c95e2d438b9,2025-04-19T03:15:14.487000 CVE-2025-43903,0,0,00b37505e4bad1c011979aeeb7ac0f46d600f0a3a2ddd582ccd8bfed7356ed02,2025-04-21T14:23:45.950000 CVE-2025-4391,0,0,d2d6594523c66be9dd0fb48abb4713134f21019fde19241be08ffd54c8c0984d,2025-05-19T13:35:20.460000 -CVE-2025-43915,0,0,25a7aba1d0c80a0ff70c6b3ac18754c11e83dd25c0c331abda863f4f1ea74592,2025-05-19T16:15:30.010000 +CVE-2025-43915,0,1,49512d0f6103beaceac1085b724d59991acc6d96689234cdda25418b2075f829,2025-06-17T14:12:57.600000 CVE-2025-43916,0,0,681d8be38d92746749b1aa52bc81a99ae8dcb7d5c6c1be22a9ecf0d141bf9654,2025-04-21T14:23:45.950000 CVE-2025-43917,0,0,6cbc8a0cc4b5f4a260ea1bcaa2e61bc873dc43de357e9552c071e8ec2a49bca5,2025-04-21T14:23:45.950000 CVE-2025-43918,0,0,c6804f12f91fd2a33114034d2a7e21d55151c0cf36b011a784bd1cc327d47c14,2025-04-21T14:23:45.950000 @@ -295005,6 +295021,7 @@ CVE-2025-44023,0,0,dd8462de68aec0eefae4f74877d4a0096c0b0b7c788a64dabe51a09973639 CVE-2025-44024,0,0,9a6e90ca8c9fd22a614240a93227346aae4f630541c9ceee0dede71783be3310,2025-05-16T14:43:26.160000 CVE-2025-4403,0,0,a597524215bcc55cf95efb619760b46f4cfae80b1fccf565ab77d2156ec46259,2025-05-12T17:32:32.760000 CVE-2025-44039,0,0,e526d2ea964b8df9e1d271dd8836298e821a1312ecb07527aee6d82ed8db4da5,2025-05-13T19:35:18.080000 +CVE-2025-4404,1,1,a80b4132bd87fdd88e063f5d4798aa84f9dd8cdec552d646baaea20bb563cb95,2025-06-17T15:15:53.147000 CVE-2025-44040,0,0,b4bc9c9a135c852b34fde590233a20aefa279834e43ffbaee5fef18c63b73890,2025-06-10T19:34:47.497000 CVE-2025-44043,0,0,f983fd6775af7bdc8ab78a20bce8e1b19b8eb825c5abb2a0346f7f1dfac8055b,2025-06-12T16:06:39.330000 CVE-2025-44044,0,0,ef11e11c0fe30e59419a8d78f3327af40c66740008c471edabcecdac32f67577,2025-06-12T16:06:39.330000 @@ -295205,7 +295222,7 @@ CVE-2025-45238,0,0,b39549f1b61e24807431d3a951f2254a17eb0dbb519151422154254ab9990 CVE-2025-45239,0,0,991350366fb0c83185e15ef1dc4c822dd146409f9225ec787d11246fc95065fc,2025-06-12T17:34:08.947000 CVE-2025-4524,0,0,9f2ebfa9f8ca01d98c78b645fd8edee7f81ea49ceedcaa7d6aa7658167675b4b,2025-05-21T20:24:58.133000 CVE-2025-45240,0,0,6c0fe819ab7a4c1498c5fdd6d23a12d4d5c435ed3c03b2f01a54119a7edb3de9,2025-06-12T17:44:27.277000 -CVE-2025-45242,0,0,328829963a7b6768e90508dbdc472c73d11877215ea48ec0f64c98ea54ebff4d,2025-05-05T20:54:19.760000 +CVE-2025-45242,0,1,091207a637e01f16df70ef5f92ff2ddd497dba1d44742f24f47b6101007a10bf,2025-06-17T14:12:39.773000 CVE-2025-4525,0,0,e5068efff3345b6299bf1d3b4c556a2d330551e5529391b80301dc64e770c372,2025-05-12T17:32:32.760000 CVE-2025-45250,0,0,1295737dd945a4b775ec304e443102ab54877a6f262027aa1c35545a3ea136c4,2025-05-07T14:13:20.483000 CVE-2025-4526,0,0,f2bf7395bd181059c847672fe1aa1c5f9c6c13bc21884d0e91df36f089d2f9b6,2025-05-12T17:32:32.760000 @@ -295625,8 +295642,8 @@ CVE-2025-46559,0,0,6f9c7ce4b09e8d2873d9fa1c8ec5bc239aba3f166b5bb4136391a9939ada4 CVE-2025-46560,0,0,6a0b92fa9b29effaffc6e89d51a92fd2337a6f1c3f6c1149eb2801e9c0d0f8d6,2025-05-28T19:15:56.887000 CVE-2025-46565,0,0,c6310b0d16caffb5c4fca228b199569c838bec718e60758c1fab4e44d373407a,2025-05-02T18:15:27.060000 CVE-2025-46566,0,0,24d113192be0c68059a74a8b38378d8007a4303882cf168243cb6e7bc5606a7f,2025-05-28T16:02:36.163000 -CVE-2025-46567,0,0,2ea2873954b30732112fbaa0b8b56ed34113a9fd3699c3d8ec28e8eac8aba8d7,2025-05-02T18:15:27.260000 -CVE-2025-46568,0,0,f0ef5595015a51ac6204f7ffcd1cfa61bd33cea77c8a3576cb558dbc13895987,2025-05-02T14:15:19.860000 +CVE-2025-46567,0,1,bc82994034cac9d270d67e3ad4b581e4a047083d44f54435e8936072aa047d70,2025-06-17T14:19:39.290000 +CVE-2025-46568,0,1,74c299788a3c6fb1d3c1e3efa08198b5d781f2674e99fc634be9d4c153a96da1,2025-06-17T14:19:19.067000 CVE-2025-46569,0,0,596192ea2f2bcb27dcfadc2be8975c11484ebb4929879c1b0161098a09bd2300,2025-05-02T13:52:51.693000 CVE-2025-46570,0,0,c9d322beba0c1f0146d887e23a2e6c307af266e63d39230ac97363c9427dccb7,2025-05-30T16:31:03.107000 CVE-2025-46571,0,0,cdbded98c3bfffd8b6a3671147eb587438dc6ec5bb1e3245b51e2fda19e5f0e6,2025-05-05T20:54:19.760000 @@ -295712,7 +295729,7 @@ CVE-2025-46720,0,0,4c7236595d2f87b0b5d063c4e69a2cbdebfbdb7c2550f3a068081936f8a24 CVE-2025-46721,0,0,5e50b3dbcf6470803d075fa512b6ebc1828bcf6f2f10959b66c310bc472274ee,2025-05-13T20:15:30.217000 CVE-2025-46722,0,0,cf46ef2e6249b8935c48334672e28d50cf3343c6c1aff5e7300e5238080dc235,2025-05-30T16:31:03.107000 CVE-2025-46723,0,0,23909492a9ee443fd9ae3060d2ebc8db94328dcc9cf17248e4a0a9a7d6a6e953,2025-05-05T20:54:19.760000 -CVE-2025-46724,0,0,2d46a81e4cb809fc869f341d9b8a9706a0c422558d73a76003fb8fea65096c00,2025-05-21T20:24:58.133000 +CVE-2025-46724,0,1,e9c56e50a6ab4789521e42f1b57dca0731674d1f66af8a8445523cd7498bdd5d,2025-06-17T14:11:48.377000 CVE-2025-46725,0,0,8e8c8e4075573d4fde69baf7d78b34a0d5c2e139e0809a70649a8b9ab0bae8da,2025-05-21T20:24:58.133000 CVE-2025-46726,0,0,fa180990f47bce9e4992ba4f1ef95a0b12697cb033887f81ca50681b5a814ffa,2025-05-05T20:54:19.760000 CVE-2025-46727,0,0,fec1ae7c7c8b69043c7f3691ee002971040b665b8f0bc57300f4c333a1b0ac1d,2025-05-08T14:39:09.683000 @@ -296157,6 +296174,7 @@ CVE-2025-47449,0,0,cda5a820088ca281751b990bfe65cbd773742c453054bb772d34764ad0c98 CVE-2025-4745,0,0,3898aa409c4167a9d1ef0e397f59a453497f6e026cd86533d2587a6d070bc419,2025-05-28T15:21:57.510000 CVE-2025-47450,0,0,fb5ee50089aefceb73ff9a1ef8fdc244747ca1a94db05fe50fc7cb6e59aa2443,2025-05-08T14:39:18.800000 CVE-2025-47451,0,0,4c2f8ca02012503686d908884244bfb40ddbe4423330d55b60f766d84fe4c1ea,2025-05-08T14:39:18.800000 +CVE-2025-47452,1,1,9e2c19c3dd61b7c33a48b58e06484c6e99e117f3fcb03354d9aa985fdbf46c0c,2025-06-17T15:15:43.227000 CVE-2025-47453,0,0,ec40b83812ac34b90e02ee5f2d7868311db56811161d09a742b351bd6b0ad97a,2025-05-23T15:54:42.643000 CVE-2025-47454,0,0,1f465b81532e5955de59cf7baf48fd395f3823d52d1723fd370d5d74b95caf81,2025-05-08T14:39:18.800000 CVE-2025-47455,0,0,f42ff0545d5706d0d1836ec21ce7726977f83b2cb8bc2a7fc2d984cd7e223f8e,2025-05-08T14:39:18.800000 @@ -296248,6 +296266,7 @@ CVE-2025-47535,0,0,efb928a78fd100590d3f216ac98a70ac07ad42a00a82415ffb8ae51dc6f07 CVE-2025-47537,0,0,ec99457b56cbb00305479743e07a55f5a22c2d4fb689ff948519b19e18d85b8b,2025-05-08T14:39:18.800000 CVE-2025-47538,0,0,14ba1016f0e3a65098eafca0592f72eddcd029d8a2d7aad5d253065d3c462cdb,2025-06-09T17:02:49.720000 CVE-2025-47539,0,0,c3761e209ddba0b551c2e657f393922bb50271a7d4f01fd27c8f4c7638d0081e,2025-05-23T15:54:42.643000 +CVE-2025-4754,1,1,f20350bce288f8c59b8a4f6791c89db1caff634de83ec279afc357ee0f8bdf97,2025-06-17T15:15:53.273000 CVE-2025-47540,0,0,55d8d4a206487308d2f526fcb2868faa0ebb095c5ddaf1495187adbed1e3dca2,2025-06-09T17:04:28.477000 CVE-2025-47541,0,0,abfce1eefeffb0429ea17dd63476994eb46b97459479258fa484aeb781b43a2c,2025-05-23T15:54:42.643000 CVE-2025-47542,0,0,1b8b0dfe2acc7592714b60ac74c401c771cb1a6a316e5848101e603d1cbc03e9,2025-06-09T17:05:30.240000 @@ -296264,6 +296283,7 @@ CVE-2025-47551,0,0,1ff47bb4d657c7e33aa1dcc67f35e113ebaf811e1c3c764c0a360a72784cc CVE-2025-47556,0,0,06063b9894785c3f6de11ab2418874bc9eef693faf7cbeeae3efc54dd06a8e64,2025-05-19T13:35:50.497000 CVE-2025-47557,0,0,30fe5baef7cb4352c2f9471d036fd77d02b114de359294a33b494a876933071c,2025-05-19T13:35:50.497000 CVE-2025-47558,0,0,5a74e129f72833ac1e6a0fa080819cbdc1546e5fefdc4651557e3c28f898f0bb,2025-05-23T15:54:42.643000 +CVE-2025-47559,1,1,357b7883352218c91c4766823df2d6ebc0cf668c0f33b8284f1325ab91dd1f0b,2025-06-17T15:15:43.397000 CVE-2025-4756,0,0,b935e91bacb1926bc8cf1fe1b0f1de476b8b7bfbf44789827c7a23f8c6f1b349,2025-05-21T13:40:10.450000 CVE-2025-47560,0,0,c42216d7ef93cb02bf2cefc33ab7720ff1060436a899db11fa007bd5ae21264e,2025-05-19T13:35:50.497000 CVE-2025-47561,0,0,7c2e31eb14ef216ee64d78f4363da8a42e01fa0856268b610d5e29743f219312,2025-06-12T16:06:47.857000 @@ -296273,6 +296293,8 @@ CVE-2025-47564,0,0,758c7c233976a079425cfa725a742dd6e7231873de27eacf12a1e47dc1325 CVE-2025-47567,0,0,8bd59bb6ff8c472a7ea16c76eaaa9fb8be8e5bf93dec95aa6197eaff663abf08,2025-05-19T13:35:50.497000 CVE-2025-47568,0,0,816122bf6ee3258a91c70b57c27a64864503daf9f011fa2dfdbf1808df01ccc4,2025-05-23T15:54:42.643000 CVE-2025-4757,0,0,aff32a5dd8531f1cf16b47f2eaa3e2f3dcb4fa067452c943f1a1e24c22fb61c9,2025-05-27T19:49:21.437000 +CVE-2025-47572,1,1,477504497e2b36db6f9fdd31b2b3f9a8d3d986d4898cba2caf0a3d9f034da691,2025-06-17T15:15:43.573000 +CVE-2025-47573,1,1,430dce13521808251f1d17720da6b9a51388f37585b0d46cbba38f5974bc977c,2025-06-17T15:15:43.947000 CVE-2025-47575,0,0,3856dc014fc47893d7ef5712b0e151680734365e77cbdf4b14af12b94f83ad85,2025-05-23T15:54:42.643000 CVE-2025-47576,0,0,edb28b0afb2590818e704b2b702bc94672987057adfe446ab20f50ce396f0510,2025-05-21T20:25:16.407000 CVE-2025-47577,0,0,e6bf35f708db79d6247522f1af460f531b906a5c3729299a5379bdb63ca6b1e2,2025-06-05T09:15:22.680000 @@ -296567,7 +296589,7 @@ CVE-2025-48015,0,0,97195b1375e738b78c3c892de114d387c5901e8ee163a174bd7cc7d86bb80 CVE-2025-48016,0,0,7f338d05ff0bf5457b003e53823b639de05c7abe792c9baaaefb3f53dc116634,2025-05-21T20:24:58.133000 CVE-2025-48017,0,0,9a34c5624691c4b31b9da6fd15ca0fc4e18270c4bd854af7ea9f4320e05751f7,2025-05-21T20:24:58.133000 CVE-2025-48018,0,0,7761e8e3612ee9775c346d4dd8ae962e705b15ee05a70aaa71be1ec26a1b2484,2025-05-21T20:24:58.133000 -CVE-2025-4802,0,0,b9c461780ec4dddd36da10478bc364d5e87d85cefbc798ab90254eed00c7662d,2025-05-20T14:15:51.347000 +CVE-2025-4802,0,1,9b6a9418451eb684dbaf46149299384f3fd784fd4730d7af0d79543a6096d43d,2025-06-17T14:09:23.137000 CVE-2025-48024,0,0,ac746fb497cccde7b671eda6326e72522381250e5b7c54697735594cf6f8aedc,2025-05-16T14:43:26.160000 CVE-2025-48027,0,0,1553e3de579c54b8c12347894e7e439de00450ca8ef6f8ae1617a684639bd852,2025-05-16T14:43:26.160000 CVE-2025-4803,0,0,73c30a61e3c897c21c431bf31e162f151c5503d3c44c21d44160de67be34a09b,2025-05-21T20:24:58.133000 @@ -296601,12 +296623,14 @@ CVE-2025-48080,0,0,3ac40a2ee2ffbe53ef86e322d55a6c979dec23087ec5d5ea5075b108588d8 CVE-2025-4809,0,0,e3f6cc20f5a1533fd1b852392735aed9d9901924729604ad889c6054553c7632,2025-05-24T01:11:08.893000 CVE-2025-4810,0,0,270051aac468f4554d569120b6bb36c00d35de9491f4fec83a0d57158b5a4129,2025-05-24T01:12:25.480000 CVE-2025-4811,0,0,9eab4f494d5f43b25905ba1aef66dad40a6ed677e4ef5df5ebd840c9262f21a3,2025-06-04T16:08:27.713000 +CVE-2025-48111,1,1,c2e15c56fb33f7dba199dada8d160ac80d818399e2e38affa2eac020de941985,2025-06-17T15:15:44.133000 CVE-2025-48112,0,0,976815afd2fb42028021011ea43bb142b13a0c9c3e80002f7b0d573f54fa6d7c,2025-05-19T13:35:50.497000 CVE-2025-48113,0,0,51710f8008eb009f623ba9ad7117267a6f6ef7e2a71905860ef82abbed94c16b,2025-05-19T13:35:50.497000 CVE-2025-48114,0,0,9c95208d284ddde5af152b75439a4d7729badefde1419894481163834feec957,2025-05-19T13:35:50.497000 CVE-2025-48115,0,0,54486d4f6775ae008124ab58f33018d36241ba62026db2289f4702f23ed6ea3b,2025-05-19T13:35:50.497000 CVE-2025-48116,0,0,d6a71dc365b726b23656b34d44d97915530d8852a939d09e283cec085f55a593,2025-05-19T13:35:20.460000 CVE-2025-48117,0,0,a7d0e1055f1272a4f509cadfa7e2a8dc4c2099ff120f62c92c5f52eec0ea7137,2025-05-19T13:35:20.460000 +CVE-2025-48118,1,1,a03594566aae9d62794044463b741c8f5297fc894ddd7e37e33f5d745990e0cf,2025-06-17T15:15:44.350000 CVE-2025-48119,0,0,4feda773c81ee4897f2976ea61ec02d33e4025df17c7693669a0a4d6a4590844,2025-05-19T13:35:20.460000 CVE-2025-4812,0,0,42218508a0309649b34bc39191117b5420dff6316bab0950768b4789d15f10de,2025-06-04T16:08:39.880000 CVE-2025-48120,0,0,2659007c9b26f8d290992dde9f498830d4c41050333088bc2e3cc8f9d34413b9,2025-05-19T13:35:20.460000 @@ -296635,6 +296659,7 @@ CVE-2025-48140,0,0,a29cda877b51f0776bee61c5994dd7d896db708e1c171df5cefeefa9152eb CVE-2025-48141,0,0,e3c0aa5debd1d2cb7d0d816751febe5ca0c400edd2ee18b5b814ab5412ffb366,2025-06-12T16:06:47.857000 CVE-2025-48143,0,0,4945e05ff909df05afaeff94cfcd91ad3cd14634c19f51f496c7e38202aa7d5c,2025-06-12T16:06:47.857000 CVE-2025-48144,0,0,915ef69f7620231f2c6e2a32616b16609cf357d74e4b81e5126994688d251650,2025-05-30T15:20:12.500000 +CVE-2025-48145,1,1,ac7b2cd0071623577f8a64f35b2264f16c1c55e5ef075a223e378638a8268ff0,2025-06-17T15:15:44.513000 CVE-2025-48146,0,0,44edda46a6e454799db1266c87b76373fb03553b5180641f5297dee2b0d7de37,2025-06-06T22:23:28.070000 CVE-2025-48147,0,0,d66fc5f0d4a515039630f4bce27a90f7dd008308f73336ecb1c7033f2767da20,2025-06-12T16:06:47.857000 CVE-2025-4815,0,0,31cc1cd9ba179e2e20111ed224a5d1f55b5f28081bf7ef82d4c48c2315ce9fb6,2025-05-28T17:08:54.983000 @@ -296700,8 +296725,9 @@ CVE-2025-48269,0,0,f92f6497a4c0d6ec5dda04beeadf5b9056b09a0f6fcbf3c45be0dfbd4fb99 CVE-2025-4827,0,0,d47a71d05b44889e1baa543d22084cfefaa52c46e4e9470b39e886fbf66c5cf8,2025-05-23T15:51:49.310000 CVE-2025-48270,0,0,133fff98e194972f33f1094510d8ec4d32c15dd7e4436e5da8670dbbe1e924ad,2025-05-21T20:25:33.823000 CVE-2025-48271,0,0,0d70c386c119c388d6a35958b80bfcca32a964cf1daaeb05cdf206898628a3db,2025-05-23T15:54:42.643000 -CVE-2025-48272,0,0,dfe6729b5d59f8e18a798da367cdab53cba3463e2c4fffc72730fce17d16c9fa,2025-05-21T20:25:33.823000 +CVE-2025-48272,0,1,ef1d1975800386c78d6ca4b6bc18290441d554a80fc7cd7a85f2b4b3a85069b3,2025-06-17T14:10:18.237000 CVE-2025-48273,0,0,67cd492822cbe488d3e17d3a0b555d0c75e1160c730171b1f2bc8ec2a9e3702d,2025-05-23T15:54:42.643000 +CVE-2025-48274,1,1,ae0c17e1978ccbb60f210fc78aaf3d2249ad87bdb625f24a66f89e8db1a385e4,2025-06-17T15:15:44.700000 CVE-2025-48275,0,0,06271179e2a87da02697af4b0abc688b6bd5dc4ddeaf28630e532e9232bd6560,2025-05-23T15:54:42.643000 CVE-2025-48276,0,0,0e141f1bba6aa60f05739d7c11f150d7139abee4704e3e4b24e80ad758f6c866,2025-05-21T20:25:33.823000 CVE-2025-48277,0,0,22dca5b7c56418f77c0bce203490c523fc4aff3e411af80d1d258902607a715a,2025-05-21T20:25:33.823000 @@ -296726,6 +296752,7 @@ CVE-2025-48328,0,0,17048bb7a62026f8a508465a37dd897b445dbfd7430f4937f92fd8ab7c1e3 CVE-2025-48329,0,0,0cc07453c466449db0eb2f0279eb9cf0939be49d6e9012c00dd75c095e62d25f,2025-06-06T14:06:58.193000 CVE-2025-4833,0,0,524b74208b998ac185cb2f32a80e77b8ca0d39465baae0b1b3d7710a8e9aad50,2025-05-23T15:50:46.407000 CVE-2025-48331,0,0,2e293173c8bdd95f274569d90c4fc672d4dd2c84b398ba10c7c764970ea66904,2025-05-30T16:31:03.107000 +CVE-2025-48333,1,1,eae717a448752695f5581b368ffc781c605f59e60bfcdf721cf14ac0f5df89ed,2025-06-17T15:15:44.867000 CVE-2025-48334,0,0,65fc2027acba858836e737fb0f1df3a72d4113a56a3d69faba9cd52176926fa8,2025-06-04T18:30:00.867000 CVE-2025-48335,0,0,87f81215624ab7fa933489f1136327ae141577518dc9a399bc9c4199ad6f2bc5,2025-06-06T14:06:58.193000 CVE-2025-48336,0,0,cde5f5f8ee74c92259e7bd148625c213e9829c471551e9e911ca67e0b81ffb00,2025-05-30T16:31:03.107000 @@ -296874,6 +296901,7 @@ CVE-2025-48786,0,0,f50aaac9f92c144768e9e142fb469bf7a9185ea8612853ffcab58fc99faca CVE-2025-48787,0,0,4b7bd6f1d69bc3cf7a319e9ab5da04edbd1d30e2a286b1215a7dfbc7e5141741,2025-05-27T04:15:37.790000 CVE-2025-48788,0,0,40192fd92abec275e6be0428bdab55955c730474910e75d2e7f599231d088c1a,2025-05-27T04:15:37.863000 CVE-2025-48789,0,0,acb8ec9dbdddd2cfee50a7bcb54c538d55fd6f22ec2c115cd21c6bd267f9a9d1,2025-05-27T04:15:37.930000 +CVE-2025-4879,1,1,a0199f2d39692f2083b27417364092852c1167d5199703a14d55e3555bc46613,2025-06-17T14:15:33.170000 CVE-2025-48790,0,0,196e741e31b05371800ef80b27db765120988d2687c4d597d4ed409d2fb300b2,2025-05-27T04:15:38 CVE-2025-48791,0,0,f473bc2cd6c95e87c8ededc18c0e1328425c2533235516a499378ad086e8a35a,2025-05-27T04:15:40.417000 CVE-2025-48792,0,0,2c0b02c33ee81c6b1c7f3bc9767aecae1b833af65e4351c0dd81998c4a11944a,2025-05-27T04:15:41.020000 @@ -296978,7 +297006,7 @@ CVE-2025-48960,0,0,6388a249faff67cc5a4d2fa4bca8d3989a10ec11030dddacff72a168ec292 CVE-2025-48961,0,0,44e1cee69124b46bd6b795101bc0b7c9c4699ce00a138653c66e2e8aeff53be4,2025-06-04T14:54:33.783000 CVE-2025-48962,0,0,4b2d64282106eed58f9e4647aa4bdcfb03945a2468e53d084f7081033bf14af0,2025-06-04T14:54:33.783000 CVE-2025-4897,0,0,104730cc5ad0680860a774881c7ad06896ad7afe2bb00c017480a43cf79011cd,2025-05-27T16:30:05.410000 -CVE-2025-48976,0,0,ab1bc5562757eff2a298b7ce1b2f60f8d15bbc3717ff9ce51046390347fc9b0e,2025-06-16T20:15:27.350000 +CVE-2025-48976,0,1,a64a66a6390133c2073ddcc8e54b821846b71771507c30ff5fd6a0f91da50a45,2025-06-17T14:15:30.637000 CVE-2025-4898,0,0,088de021e18707e0dc4ec8499500601b39900fc456f0a7d4c0f7a0b50fbac254,2025-05-21T19:37:41.533000 CVE-2025-48988,0,0,af79b0d56ade70d464da7381544626bd5b7c0be41380335aba730b61b05234c6,2025-06-16T20:15:27.447000 CVE-2025-4899,0,0,384aad67823f1c19c564c5975182391c80467536acba8235a635dfd93a5393e3,2025-05-21T19:37:31.280000 @@ -297013,6 +297041,7 @@ CVE-2025-49067,0,0,691f1062539c729cb34ba7b80fbff1950eab310a0c7af6dba9c9e83b1bdcd CVE-2025-49068,0,0,3797c73d2b9edaa67883a9553985689bdbba75f4cce7b860c4953ec6ac0de3ac,2025-06-06T14:06:58.193000 CVE-2025-49069,0,0,85c17ca27d4707197d4656ead7a2d4a3e357783b382cc504f2810ab6c0682e62,2025-06-04T14:54:33.783000 CVE-2025-4907,0,0,faa33c63c7cecd77dfa79228df8feba1d9b9297d2893ae52af491eb90f07f770,2025-05-21T17:33:11.603000 +CVE-2025-49071,1,1,44b70972355edfe61ca4442ca983825c8aacb6375de82492c5f656ddaff1844f,2025-06-17T15:15:45.130000 CVE-2025-49072,0,0,cc91acb325984d61f014d985d75bbf7e0e9082962c9e96f3405c74646c593528,2025-06-06T14:06:58.193000 CVE-2025-49073,0,0,1520b38b23f181db334ec4a13a2dd7df7cacf51643f5e8d527931755cb4ee618,2025-06-06T14:06:58.193000 CVE-2025-49074,0,0,4152be62bb51dd5d098024935ab32bfce8e488f76b611a97c7c64c32f2499fec,2025-06-06T14:06:58.193000 @@ -297029,8 +297058,8 @@ CVE-2025-4911,0,0,8165f0d1dc1e78afded21e50626575112805e2ff63d8f266295fb56c02f369 CVE-2025-49112,0,0,53acc03eb5f34e287cf80e6f2606bfb4760fb16ea2fe509fc70b20f7de56218f,2025-06-02T17:32:17.397000 CVE-2025-49113,0,0,56a8fd04a9ef82f1d5c677d3aef05bbaae629657949015a38e21cc671f31eeb2,2025-06-12T17:15:29.310000 CVE-2025-4912,0,0,952cc1697455c59886c397e61a80308747f6eedd0f377c0531d621b366fc5d7d,2025-05-21T17:41:21.063000 -CVE-2025-49124,0,0,3c217f37578e1849840faa6b85bf65635ac11a99332db91c6d0115ed08f141be,2025-06-16T20:15:27.557000 -CVE-2025-49125,0,0,5e8874247a201cb56394c3b5234a03113a560a96bb6f82b09d2c3dfa5cdcf8fd,2025-06-16T20:15:27.650000 +CVE-2025-49124,0,1,76fb37c4c83122f2e1395d40274a1fc50860999b923bcb68aeb793e376f49758,2025-06-17T14:15:30.940000 +CVE-2025-49125,0,1,a5111c74c74ecddf83caca7fbd1c9b8fe7c2dff8d91049308e2589f705f0a024,2025-06-17T14:15:31.747000 CVE-2025-49127,0,0,3f4889eef877e3cbd48aa702e8cb35c833e3234501017b5b4ce4fc613f23b00a,2025-06-09T16:15:44.833000 CVE-2025-49128,0,0,be74e1e3636b4e3c68c2e5f707126adefa5b42c030884a0a961eb0fa96655c19,2025-06-09T16:15:44.947000 CVE-2025-4913,0,0,53b3af32223266d4fefa6288fa7668d3e6278e5d2f6f83bce997bdbd90d149c2,2025-05-19T17:37:22.390000 @@ -297056,7 +297085,13 @@ CVE-2025-49162,0,0,30d8f0e974a690ba3faf665b7cd4695ab5fb985c2cad4bb0465fb4c9980fa CVE-2025-49163,0,0,643a72915169b3c81852832f164c7ce28984b32bf8cbac1ededba1c30e43e026,2025-06-04T14:54:33.783000 CVE-2025-49164,0,0,d5b91c5cc8e76d4adf3dda6a9132b65234dcdefc36da28ceddedfd5530304934,2025-06-04T14:54:33.783000 CVE-2025-4917,0,0,402a8702a0d07685076d8d3bbf70a58c8189448c063fea494a0fac6dd2626eee,2025-05-19T17:38:05.883000 +CVE-2025-49175,1,1,1b4791a695362fbf70b3f7e58e9ae0d1fad0d96766b28e2bd341baf22cdca3f3,2025-06-17T15:15:45.290000 +CVE-2025-49176,1,1,666125fcadfd551d8af6388c5a597a35ee88ae7468fddbc2741a1182abee980e,2025-06-17T15:15:45.470000 +CVE-2025-49177,1,1,f9e2975b77916f058a32fe1ba49a6fbdc0cccc845c330540f47bd382a12e9957,2025-06-17T15:15:45.650000 +CVE-2025-49178,1,1,10c1e49413d5bc947b568a61b53a1a71af47f1e96aa2697f8b83acdbefce0980,2025-06-17T15:15:45.813000 +CVE-2025-49179,1,1,985c01b01d39cbfa4e5ec2bc6e5477a66432ffb4e5214b0969feb17c3cec481d,2025-06-17T15:15:46 CVE-2025-4918,0,0,ab4c079e1da6cd4dfa69cf1fcc57b5e852fcef00a973643da3dd71ab3f3ec47e,2025-05-28T14:05:35.853000 +CVE-2025-49180,1,1,ea4b2733b4e6e174c01974e9eeb1ebbc40ca83066688f6eeba2855492605c3c3,2025-06-17T15:15:46.183000 CVE-2025-49181,0,0,65f8ea01de63d019d8688de775c40b302b8c0b1e44c040e53e46324e69435218,2025-06-12T16:06:20.180000 CVE-2025-49182,0,0,8adc8833944dbbffb6c925bafc811eee2574582f2d7b7b09537e334080770141,2025-06-13T09:15:20.130000 CVE-2025-49183,0,0,c9c3ab65e477d8e9a4d5c9adaf45822d49f0873835d0971680386eb894e72562,2025-06-12T16:06:20.180000 @@ -297092,6 +297127,7 @@ CVE-2025-49210,0,0,0d98b9f5865953f1015e0875c4ef02572a5474d0f348f574d55b17a2fdab9 CVE-2025-4922,0,0,eeb2f7bc3e91bff166f7667b5f0380f0e970675884828f2c4af23f3b3bd11f43,2025-06-12T16:06:20.180000 CVE-2025-49223,0,0,648cfa7c40c96de295e183f0ea98c44bf314195a3ae5c64b8746fcff08134939,2025-06-06T19:30:16.060000 CVE-2025-4923,0,0,9beba7071c51eba6c1d71d0a324059e1f5260406f92dc4aea21591df042815db,2025-05-28T12:50:28.590000 +CVE-2025-49234,1,1,03f1ae8db0d0c7ab1d461a29f5d8f05f67ca2389d82ea5c0613eebaec1885eed,2025-06-17T15:15:46.353000 CVE-2025-49235,0,0,439aeb4e39d29770ee1770d78ffba65d62479d19f680ab0cedaa4772533e9007,2025-06-06T14:06:58.193000 CVE-2025-49236,0,0,ab3b464d545511369fec3881bcd8c3f06974cc474eb4992e9f050866d10fd640,2025-06-06T14:06:58.193000 CVE-2025-49237,0,0,8497f8bd12040c65d8a787dcad0a5e7b31feb1826bf1da8b3e5e63ede5916e11,2025-06-06T14:06:58.193000 @@ -297107,10 +297143,22 @@ CVE-2025-49246,0,0,c4f00883a12b7639ec4f097be449bb342bd0c987bc06f581d137de0d958bd CVE-2025-49248,0,0,db1641a9d43ab4f081dc759f5beaf5cd220fbde11ca36fb8965e1fb35e92f72f,2025-06-06T14:06:58.193000 CVE-2025-4925,0,0,c7c7b57edd485a39535f310e5e884e623df880c83d50cc9504511597c6a8f4a8,2025-05-21T12:58:28.507000 CVE-2025-49250,0,0,427d3d2370ad4ed43da6ad5bd181602d6f79f8a5d6eb3d4e04409b35d996f102,2025-06-06T14:06:58.193000 +CVE-2025-49251,1,1,e27f99022ea4a351b0ad515d66def48b36bef78e37525a436c7e316efebb6d9f,2025-06-17T15:15:46.517000 +CVE-2025-49252,1,1,27cd69bb6afc002aad426f7bd29465c6cea7754c7f30bcb4c719ec12e976321f,2025-06-17T15:15:46.663000 +CVE-2025-49253,1,1,7c50bbfdc8b3730bcbb05275650e1ec86760e101e7e4ed50925d5ed7ae43df1e,2025-06-17T15:15:46.817000 +CVE-2025-49254,1,1,40cdfd410360df86fc977791a1bbcacafd2b5d9ccc8ffb0de3ea9807c9d1ccc5,2025-06-17T15:15:46.973000 +CVE-2025-49255,1,1,12773e939e2a4e115681477b644f5e5ab8f00dd3da9edba1a2aca25c61f6656e,2025-06-17T15:15:47.127000 +CVE-2025-49256,1,1,7d61049176ff48d486b9ac13f0300e95eaec2950d2216eb7b58f2ca6df187065,2025-06-17T15:15:47.283000 +CVE-2025-49257,1,1,da1cef90c97ac3ea9afd6b75fd8b932e5be71d03d6089a95281d1b836aca9866,2025-06-17T15:15:47.423000 +CVE-2025-49258,1,1,8d318158cbc6dddc56c447ba69e1cef4319e510d94b663c6caaf4d54ea045ef7,2025-06-17T15:15:47.587000 +CVE-2025-49259,1,1,6cac8cbc5a176cbc5fb4878bb1dd5301f767bed9e3e6fc745f0b01cecf4f924c,2025-06-17T15:15:47.733000 CVE-2025-4926,0,0,321f7efe7ac33228adea3a7bf6c22d3279632b362ddc9dd47d64aee357b84d4f,2025-05-21T12:46:59.150000 +CVE-2025-49260,1,1,0046a446d65930747194fade38af3f57e9cb5df6b2289cde1df48fbd2ebc22ff,2025-06-17T15:15:47.880000 +CVE-2025-49261,1,1,8c87daecee14bb96e55bf0ff2b7b9f37e03583ca9451d7b04a099e01a40dc4d0,2025-06-17T15:15:48.033000 CVE-2025-49262,0,0,c8ecb38e2a6bbb509b5464e93a8e807cf4fe47f70ed1e288b103f2145fd0fbb6,2025-06-06T14:06:58.193000 CVE-2025-49263,0,0,38aa1f55e3d42e2ae1c5f0e906030fae07b5739b8521b0ba5395b28e605e2da3,2025-06-06T14:06:58.193000 CVE-2025-49265,0,0,93f04cd3c02c56137db8c1a60ed5bdbd759fe4413ddae7beafb034d9122bdb3e,2025-06-12T16:06:47.857000 +CVE-2025-49266,1,1,a285964ddde4dd1922ac89681765df553234c4c3d16887c5df53a060aa42c8b3,2025-06-17T15:15:48.210000 CVE-2025-49268,0,0,7a4642a71cc533dd84da24d896ac1a1105d5f210090e1f07a3e32251a0f356c5,2025-06-06T14:06:58.193000 CVE-2025-49269,0,0,68969e280e0a646abbb5ce1c41a8a6ea848bb946aef936a7dfcfb73ba0cf4796,2025-06-06T14:06:58.193000 CVE-2025-4927,0,0,2750a792f3319584debfa65553b14ad85f4e2aa32076ab9798f492c480349e76,2025-05-21T12:42:13.543000 @@ -297154,12 +297202,14 @@ CVE-2025-49309,0,0,db5fdaaca819b138ea1335982321c3b229e5e07a269ed90154e99acecbad3 CVE-2025-4931,0,0,bc0a5af0735c1e7e6fc09ae7285bfaf11f654581b772fc97823d8075c0b5791a,2025-05-28T12:49:41.367000 CVE-2025-49310,0,0,5ee1359ff1f878c7a414d2367624efcd37fe328469ad7a584182061828ad0439,2025-06-06T14:06:58.193000 CVE-2025-49311,0,0,b1c3eb08201f6e7380bb57b302ab3428cb9c747368c860128cdc8e0d909755f1,2025-06-06T14:06:58.193000 +CVE-2025-49312,1,1,53604ef4d0e41a6c2cb5dfaa6169152678aa0000ab5e2fd3438feb5038dda299,2025-06-17T15:15:48.363000 CVE-2025-49313,0,0,0f9ded60e8e8119ac883a6ad0031f075cd1304377a4d2b0157894fcda480a7a4,2025-06-06T14:06:58.193000 CVE-2025-49314,0,0,6d35a1eee9f83d75d7eee775d4f6b4e79dddf97a24d4d8787890634f9d3f360d,2025-06-06T14:06:58.193000 CVE-2025-49315,0,0,8f024d0a5fef5dff919b25d94794bf3986d9d7bb9943a0c50b03203fdcbfc9a1,2025-06-06T14:06:58.193000 +CVE-2025-49316,1,1,a2cddf34f1c78d6dcc328875e15ac161dcb5ca4e53ceb6e34345c79fa72575e5,2025-06-17T15:15:48.510000 CVE-2025-49317,0,0,a76f4807ead6e3634025a6dec4eefb6c0436f24a416114bf7c2a4410e3b6cb48,2025-06-06T14:06:58.193000 CVE-2025-49318,0,0,e5c0f86272b2bd1ebdfc069dc27de22b8462fec25e92bb0457eb7358a6bd25e3,2025-06-06T14:06:58.193000 -CVE-2025-4932,0,0,e41c8c7120f6be787f778775691442ae3f684922a5cb2fdd2af424e8de0f069f,2025-05-19T13:35:20.460000 +CVE-2025-4932,0,1,cc74071416333ac0a75c5334272714813fd0375ba687afd5ec3f00a34f35afed,2025-06-17T14:09:35.493000 CVE-2025-49320,0,0,cbceaa89252364f62a21623de389b25103307a69ca7df1a12cb36905fc71f7ae,2025-06-06T14:06:58.193000 CVE-2025-49322,0,0,38a19d165ed906aa86d8cc9f9e5726bc4a2e215eea107d7a353651c373805e2e,2025-06-06T14:06:58.193000 CVE-2025-49323,0,0,b895262833147fad70a1259f437c18b4212e269748ef150a9e31d85282ddf653,2025-06-06T14:06:58.193000 @@ -297170,6 +297220,8 @@ CVE-2025-49327,0,0,42a4c4ed26058e2226bfcd6eaed86bbdf80b2a7cbe13405997b86b6778580 CVE-2025-49328,0,0,2e2af5668a409c9eee5a9daaa439b1980a35d6ca1d6581a018e16dd1d8ac1df8,2025-06-06T14:06:58.193000 CVE-2025-49329,0,0,c1111ed93bc4e0add410dc3107b548c2cb1dfb7b12273ca8569bfb6aaa91d606,2025-06-06T14:06:58.193000 CVE-2025-4933,0,0,0fbe7adf27b85ffbb28114888a777d26eb2d318b5f12830f1886cb4f39dc30e8,2025-05-21T17:43:51.150000 +CVE-2025-49330,1,1,5256bb1e5281f8520a0ae50cef43251e99f521cce3d2c2064023c05782971751,2025-06-17T15:15:48.673000 +CVE-2025-49331,1,1,0b5b73e5d84c9a2128938a78944d0bbb70b47fcee48c29f403e7965f0c7f8b2a,2025-06-17T15:15:48.830000 CVE-2025-49332,0,0,29b5346b1af80f267c46014779934c3939aa3b0bdcccc69fdde27771f4d4ce98,2025-06-06T14:06:58.193000 CVE-2025-49333,0,0,fb9a36f3ebda61734f4791b5b62bc96084a388568dc1c223d9d5cd967745faaf,2025-06-06T14:06:58.193000 CVE-2025-4934,0,0,661cbc97b2adf4ec313661a8210ecceab635f3c4c1dd76317d718414fbabce61,2025-05-28T12:45:54.230000 @@ -297180,6 +297232,7 @@ CVE-2025-4938,0,0,9bfbb8aefdfbb754eacbb83a30a05c557a118de2c85e31be873a9e69bcb3ee CVE-2025-4939,0,0,5ec31620a920403386badd8ed8c9ad70156a6e4853cf1462dcd01754dc60b7d3,2025-05-28T01:32:20.263000 CVE-2025-4940,0,0,260d8b62a32cfda7d1f9cdbe4bba3d30912c7644fed6c87e919fb1700ed93983,2025-06-12T16:24:13.067000 CVE-2025-4941,0,0,7ee6643b2dca5855a4c8910cf9fb3433ecd0901f54d071fbb7ffd69250830b9c,2025-05-28T01:31:03.773000 +CVE-2025-49415,1,1,1cbf4db1e318ae0c9f6134fd4d5b8e14bc7081cd361facab6383df371ce75dbd,2025-06-17T15:15:48.977000 CVE-2025-49419,0,0,85038d062ad76809afc89d292d3481b55710d3abc066574e74740256fb04fd24,2025-06-06T14:06:58.193000 CVE-2025-49421,0,0,44f56b132253671d91321e10d79bc87df372212fcb6d1bb27ad166d07a72fc32,2025-06-06T14:06:58.193000 CVE-2025-49425,0,0,e1fe97c376de5a4e19ac419b1615599b7ee42807d954ef5670e99aa67f0186aa,2025-06-06T14:06:58.193000 @@ -297193,11 +297246,15 @@ CVE-2025-49440,0,0,d94f670c6d576e1a7844a924a8674aad9b08c1e3232d530cfe91d0f7111b7 CVE-2025-49441,0,0,78621d86663ec8375fa885963fd0a5ef9d9b0d3d0909dc40f060bf0364ee11cc,2025-06-06T14:06:58.193000 CVE-2025-49442,0,0,a03d0098bdf97bff0cf5d300d1ce590464b8ec3138f936953de4105c061129b0,2025-06-06T14:06:58.193000 CVE-2025-49443,0,0,adb0bea7aa04f5f077513719d5ce50364e24a1a86418a47d11b2f0ef89d03d6f,2025-06-06T14:06:58.193000 +CVE-2025-49444,1,1,575d210b43f5a7d1817e6e8f8e0cc888dd0331890357b8adf5fe4c083a9185a0,2025-06-17T15:15:49.127000 CVE-2025-49445,0,0,f60bf669c0e4e5a0e35c6a92e30aa1bfda3f3fd2fad4b5eb42991763bd7b5eee,2025-06-06T14:06:58.193000 CVE-2025-49446,0,0,4a60c84d6d9edfc5bac793b7fa075e27f2b5d546a1d935927e4891fdf1b2b3f5,2025-06-06T14:06:58.193000 +CVE-2025-49447,1,1,bab18862a099189555cd33111bd6ef2afc0ad078247913185af2f27d1e7f05b5,2025-06-17T15:15:49.273000 CVE-2025-49449,0,0,0d697cd8e2657fa1de80516a3f9d24c8d0aece4b7b6ce292b70d5d242971d137,2025-06-06T14:06:58.193000 CVE-2025-4945,0,0,7c1921d824c0ffc4efae3fdac0f07df6ef4c8b0fbdbb004d6249658d4756d858,2025-05-21T20:25:16.407000 CVE-2025-49450,0,0,90130af9185941b6c9463f758e97094467c86e05a17a9bfaaa1b7426680ecb37,2025-06-06T14:06:58.193000 +CVE-2025-49451,1,1,36e05030385be66edf410ac0bfb02d8c4d6cd6d9e7020f72e91329d763c27b38,2025-06-17T15:15:49.420000 +CVE-2025-49452,1,1,492bcac3dd41ee280289872600a39c2537944750896bc3f6a35025caee480bf3,2025-06-17T15:15:49.573000 CVE-2025-49453,0,0,3157ba29483ae9ad8da12a1daabc7d18b2cfb9c2cba53b98371ffd33eab12393,2025-06-06T14:06:58.193000 CVE-2025-49454,0,0,091aeaab97f5fa1c2eb9e3109965e6baec7c6ea4954746cd56a5731b4f1911fd,2025-06-12T16:06:39.330000 CVE-2025-49455,0,0,aacf2547bf7940724be705df1042942dff4350ea62c9bec849294a19022c507d,2025-06-12T16:06:39.330000 @@ -297205,9 +297262,10 @@ CVE-2025-49466,0,0,de46ae3d5a998ef3ced57f414f3a55cc0272bb310a4e787f30dd6b349d92f CVE-2025-49467,0,0,110ebae3ea82a19af4e25ef45b2ac9df8589c2692e3973927cf1b47933c6584e,2025-06-16T12:32:18.840000 CVE-2025-49468,0,0,0c5705ec6b92f3b27c448d7bfd07d08f75a2e07abc56bbaacb783501986cd119,2025-06-16T12:32:18.840000 CVE-2025-4947,0,0,5a2596b46f41daf47fb71d339aa3ece981233d1a2e1afb5f6d90d81a432acb92,2025-05-28T15:01:30.720000 -CVE-2025-4948,0,1,0e7df54c260456a30951ec3ca271c8ecd68713b1dbf742cd867d5b3aa598f5dd,2025-06-17T12:15:27.520000 -CVE-2025-4949,0,0,e32a5af3d2c9a475d779933f61691d18d401479a397ade091e3e4be748dec076,2025-05-23T07:15:21.160000 +CVE-2025-4948,0,0,0e7df54c260456a30951ec3ca271c8ecd68713b1dbf742cd867d5b3aa598f5dd,2025-06-17T12:15:27.520000 +CVE-2025-4949,0,1,0316997b060f0791f7006e3582f42d4352e21f331c0768bafb1b692dffdd3405,2025-06-17T14:10:34.853000 CVE-2025-49507,0,0,8df57474dbf672acfe3170fcfeb7ba8c285d0e6636e6db25f644b19e631f2cda,2025-06-12T16:06:39.330000 +CVE-2025-49508,1,1,66a4fc39fadc062448cded59634d6813d3b223a46b5c523a24c6d22414d19b34,2025-06-17T15:15:49.720000 CVE-2025-49509,0,0,83d7c029291217af9a97963b6a105646b66e999b31aeea3bf105eeb0ecb2ab96,2025-06-12T16:06:39.330000 CVE-2025-4951,0,0,8d2965f90ffa46a261e1b06cd533aeb358abbd5115dc1f57a5b34acf12ab582b,2025-05-21T20:25:16.407000 CVE-2025-49510,0,0,3bb8122e36ad249db39449b81c1d9bb5005e0826a2addc079025211cebc0dc64,2025-06-12T16:06:39.330000 @@ -297273,10 +297331,33 @@ CVE-2025-49822,0,0,de49443b576bc1f584b5a6900459b73ba17d0494708f2396f6ea98c8b4c73 CVE-2025-49823,0,0,b95732f009a3f7e54813cac9b912d073b350c6d912829a668cd726c1d72dd06a,2025-06-17T03:15:24.580000 CVE-2025-4983,0,0,8b53f9fcac717498609c6596ba194e3872474340efe5891a55ff7cfbe70e31d1,2025-05-30T16:31:03.107000 CVE-2025-4984,0,0,8011ca13e469a81f6afb4511e42cccafc7f5c3edf7ae8617debc1cb5fd406589,2025-05-30T16:31:03.107000 +CVE-2025-49842,1,1,5976fa2a2cd22507464cdb0ce9ea69e21397c94e079b2f73b3f1b211ccec64c7,2025-06-17T14:15:32.170000 CVE-2025-4985,0,0,88151f8f37213547b95261cc34f75717fde2a8ef982c36b2d93a8904176e3178,2025-05-30T16:31:03.107000 +CVE-2025-49854,1,1,08137cb88c2ade98efa751d052dc233224d8a1d069645cb7d82c5dd109baec25,2025-06-17T15:15:49.877000 +CVE-2025-49855,1,1,70e1911a2b3a70165e0312b746592cc58b8a8466d5e1f55569bf2c371309b931,2025-06-17T15:15:50.030000 +CVE-2025-49856,1,1,07bdf5c5eb6ac6c6b2be5fea40fdd8c1d005f25089c07ac3be8904e908215e12,2025-06-17T15:15:50.187000 +CVE-2025-49857,1,1,d7e2cacc678bd1a56fe9a358ae06af56c78edd3fa5675dd5328125aa0db04ffc,2025-06-17T15:15:50.333000 +CVE-2025-49858,1,1,14198d656aa177dff7dd71470df06fdad02b4c7a9ee147ba14294e213687124b,2025-06-17T15:15:50.487000 +CVE-2025-49859,1,1,95887cd93f0149a6d8cee52544262ab63060b5e0192d8f5b4f534ee76507b7dc,2025-06-17T15:15:50.640000 CVE-2025-4986,0,0,0d635bfcd5ea7157ed48c7c5f6511d7b519fc07571e2245e906f4237ec28c07f,2025-05-30T16:31:03.107000 +CVE-2025-49861,1,1,e2dc2709dde660f8261a176073f3491d15149262ef502a52b695546d0cdfe3d6,2025-06-17T15:15:50.790000 +CVE-2025-49862,1,1,dbe37c8f01bb1eb62357478d1e9113f13112d762e8d6c0fe66130e9a8dd46969,2025-06-17T15:15:50.930000 +CVE-2025-49863,1,1,3f1c962d336c51f496f35f9f28102b781b02a6b0d8709b4127f7ebabd1bc3ab8,2025-06-17T15:15:51.083000 +CVE-2025-49864,1,1,960c8264883ed21ec3c179e7c3373dc8b88cbcff9482cb8fcef86e4230520914,2025-06-17T15:15:51.233000 +CVE-2025-49865,1,1,e2ef38175304edeba3664d2352c04f3b1fb788be0a4e30aedfd0d7b7bda1e0d6,2025-06-17T15:15:51.383000 +CVE-2025-49868,1,1,0f5304f748c71eae42a2d40bf7470cb88791956c2c3207ba8c512950d0ae79ef,2025-06-17T15:15:51.533000 CVE-2025-4987,0,0,c7c39e2e9c9954a29f9a19f48f2a034a7ab3e4a411a4b09beb0620c0b311c40d,2025-06-16T12:32:18.840000 +CVE-2025-49871,1,1,9e591bb028fecdb78037e0f8a8502a27f03fba0456024692e41bb873608b3dda,2025-06-17T15:15:51.687000 +CVE-2025-49872,1,1,6eddac5e18ac0b5e649392ba03216e565ea76aa1605c77dd182c0cf38d049901,2025-06-17T15:15:51.830000 +CVE-2025-49874,1,1,23358be4014d55e12131c66a942d4027c46c7b0ae6017b63de4fe53eb51c33e1,2025-06-17T15:15:51.980000 +CVE-2025-49875,1,1,6cb08a563178a02666ef25758f6457aa1b6421e126bd2654c7ee92d12691ce60,2025-06-17T15:15:52.123000 +CVE-2025-49877,1,1,a0af25ebe635153baff75f7fb457d56d0f6a529066e03afa9cd53b8f86ebb054,2025-06-17T15:15:52.270000 +CVE-2025-49878,1,1,42f8e522bab795441a2a1cc14c0a174dfa4bcca6b5397fec216b8d063e785921,2025-06-17T15:15:52.420000 +CVE-2025-49879,1,1,dc8a20e74a9901c7ccf7b1c48194e68ec44d2d0c7bb2aa93c2f8c8bfdb76c573,2025-06-17T15:15:52.567000 CVE-2025-4988,0,0,a7c799add205e04161903a2f90e2fafc16c75a5a4daac88e051c1af2ef20204f,2025-05-30T16:31:03.107000 +CVE-2025-49880,1,1,35d319c02d62afde8f845660b7fc99ccf3cfc810af91b29b1c46fd7aa267974c,2025-06-17T15:15:52.707000 +CVE-2025-49881,1,1,4349555224c3cee0758ed0e7828f4047d4ed53fb472e8acd4ac3f18675686e17,2025-06-17T15:15:52.853000 +CVE-2025-49882,1,1,349644ac73920c7f76510b3be4bbaecfa41086ebe3826195c92df93a2b7c0449,2025-06-17T15:15:52.997000 CVE-2025-4989,0,0,74686f3d4372e905fa27c624734660eade1cfc1a7c1d6b7d7fe07ac62f07c46a,2025-05-30T16:31:03.107000 CVE-2025-4990,0,0,11128ad236ff0bbb6407ba12ca704aae39e79d15ca91d8e93c05e36bda39beb6,2025-05-30T16:31:03.107000 CVE-2025-4991,0,0,67056c54ed0af796c00b82147df15690931ae5839b2ce0ae3dfbe8c6af0dc82c,2025-05-30T16:31:03.107000 @@ -297286,17 +297367,17 @@ CVE-2025-4997,0,0,17df11423bba66ddb6339ed723346d4b79206f94abe64d75a525849e1b0c71 CVE-2025-4998,0,0,a06730a0691f90a016a49869bfa33e7c322397c4e2518cd0a37207b150756354,2025-05-21T20:24:58.133000 CVE-2025-4999,0,0,8043ad69949e942625703ec992d9f0bcf342f6427fd4b42b3a0d85b4a3c8ce57,2025-06-12T16:20:24.230000 CVE-2025-5000,0,0,d40e8111499b77359b7a0a9c1cd41a5a755c7f3dc8d3091cc7aa679293d082e5,2025-06-12T16:20:34.127000 -CVE-2025-5001,0,0,bd7dac0fa595b3badd367c1a7f55c1a1fa4dd95b36e44ff9c8b861dc70c831eb,2025-05-21T20:24:58.133000 +CVE-2025-5001,0,1,b64491bbb1391613046d76652bbd2812fd56eb7a9cd44436fc32c64724d74d29,2025-06-17T14:11:34.640000 CVE-2025-5002,0,0,971f36c284dfb1e294c2db4acf298a0f7591c6e0e260cfb633ad289f7903a4d3,2025-05-28T01:25:25.310000 CVE-2025-5003,0,0,8e5e1d9761ca938d3fd35aea708db39277e66b20b656a3195e150358582db8aa,2025-05-28T01:24:21.800000 CVE-2025-5004,0,0,d7fd9b6c8114c9ac860c14fa88897684c73b2b8251dca41c12cda3a8ce9d421c,2025-05-28T01:20:50.517000 CVE-2025-5006,0,0,681cabb0d000288ea3de1bc96c248c8dc62af67d94cda924b490a24cb5ce4b87,2025-05-28T01:16:17.537000 CVE-2025-5007,0,0,90fd6cc505f919e9193a4f785ead55c22de48a03da4d584106515fa806e84a62,2025-05-21T20:24:58.133000 CVE-2025-5008,0,0,a44de43d4fdee78a58fb0f23f855e641b712c558235d8e8c4b331b29571b8d57,2025-05-28T01:06:49.867000 -CVE-2025-5010,0,0,868814c0bc3624d803fe1ac9e43c06be48a793b4be1e065d60f5fc8f711ef7b8,2025-05-21T23:15:55.330000 -CVE-2025-5011,0,0,6b437fc4edc2de69ea98726264ee47cf7b5cf9003bac080237f83260663560cd,2025-05-21T23:15:55.447000 +CVE-2025-5010,0,1,378e343c5bbddee87b45f94f2f1fd76512f5e1ec33b0f0fab421b27f0b0e4cd6,2025-06-17T14:11:21.613000 +CVE-2025-5011,0,1,41cba4a19108fa201d7350dc043c416f678b4c3290e3c20187f1da42ed6ecb70,2025-06-17T14:11:05.917000 CVE-2025-5012,0,0,108c4a85dd9ec28dbd0d5302959945049615400f448641a47fbee9222bc53fe4,2025-06-12T16:06:20.180000 -CVE-2025-5013,0,0,ead340e742e05afb4587abad260042c0ae241237325a24b2276704d459de60bc,2025-05-21T23:15:55.563000 +CVE-2025-5013,0,1,39609cc7be62bab5e0dcdb82a67ea2f685567abbda8b6a9de4ad396fb54bfac3,2025-06-17T14:10:53.597000 CVE-2025-50142,0,0,96e95955d25317e057785db9a58810528a1898027eb53c5d652f8d851e70c8f5,2025-06-14T03:15:21.693000 CVE-2025-50143,0,0,efc3fe49e91ba655ae48efde63259826b6655f9ef2d53032c81a7a1aa6c27271,2025-06-14T03:15:21.793000 CVE-2025-50144,0,0,04c95302e89959e408256fefa1a3e7d8e97b5f9af8b61e29ad6e6bb5ba52428f,2025-06-14T03:15:21.860000 @@ -297443,7 +297524,7 @@ CVE-2025-5205,0,0,4e2cf941cdcf5c4895f1e6095123f642f58566d13011fecdf14fc65595d0e6 CVE-2025-5206,0,0,feed10da244a1180a12944193b9a34afaab380339e02b711b6b86c10a65dd729,2025-06-05T14:14:49.180000 CVE-2025-5207,0,0,e402cb7000c0d3ec5faf704526317d521bb7be7fab48c7474536b7fb38ce6981,2025-06-05T14:14:30.010000 CVE-2025-5208,0,0,9e9535cfb50c25096d995fee715ad33ab744750f67296c60cac7b3a386d28ef1,2025-06-05T14:14:06.397000 -CVE-2025-5209,0,0,18de08a2c0ee6029700d8d70a51689f7a0861aee6fd04242ed819b2ba538811e,2025-06-17T06:15:21.870000 +CVE-2025-5209,0,1,bf2ac3879f44b16dab662eab0425d2562f61a3be720dd388f1f1d547263ef56d,2025-06-17T14:15:33.303000 CVE-2025-5210,0,0,7f798974cbc440c4e4dd8009e513c3eb9007b33b9ead67a41eab0bd81192fbbf,2025-06-05T14:13:54.527000 CVE-2025-5211,0,0,8f4ed9a6be734738ba7e8af34dfd90276884a544fade7898e9f11540d4e9c7c6,2025-06-05T14:13:12.777000 CVE-2025-5212,0,0,09bde77c0a73fbc6c1f35bedb61d3c4c409f9d9416e30903b1d4777f1733a256,2025-06-05T14:12:55.247000 @@ -297519,7 +297600,7 @@ CVE-2025-5286,0,0,05e7ca3386f0ef15ac2b01314d8e06913e02de8c1752e75b99b02bac231214 CVE-2025-5287,0,0,b8300f230839e0ad3335fdc92731d9b07abc7f3405256834dd55febc4f9b0133,2025-05-28T15:01:30.720000 CVE-2025-5288,0,0,5b20c7a865ed486d932e1f5165bbcfd30ae2f04bc0acfb20d9396799c2c655a3,2025-06-16T12:32:18.840000 CVE-2025-5290,0,0,ad45f62f849dd27deb380b44d26b94809d4f0499166fbd95cf7b52d6d8099374,2025-06-02T17:32:17.397000 -CVE-2025-5291,1,1,57cbf478f5d3961a545c3ba09fe26bef82982bd5321cff116130b5bab4a81f5b,2025-06-17T12:15:27.747000 +CVE-2025-5291,0,0,57cbf478f5d3961a545c3ba09fe26bef82982bd5321cff116130b5bab4a81f5b,2025-06-17T12:15:27.747000 CVE-2025-5292,0,0,30cec8bd4cde62e6ca85175b601b2d9fd7dc117c201a288e7f0e6414bd251b48,2025-06-02T17:32:17.397000 CVE-2025-5295,0,0,d0e6aa3b032b1532910154b10cc32ceaaf64a98256f38c6f6f628cd0a1c4bacc,2025-05-28T15:01:30.720000 CVE-2025-5297,0,0,32219ebb357b11c35687ad82e2d72808a3fe88681e14d78b6d0829c9d1dbc7ef,2025-06-10T19:33:01.990000 @@ -297546,7 +297627,7 @@ CVE-2025-5336,0,0,51ebbfc8a6c001d043ad92fbb70974a3ccedacbc8290bd5643cc8faeb9732c CVE-2025-5337,0,0,f5b214301a56cadaeebc0b9a86ddeaf885fbd4e9b8e681558e7ccfb718bae2b0,2025-06-16T12:32:18.840000 CVE-2025-5340,0,0,9b48da383be5dfbe2bc488480a2be183877451ec75241964210e2e3aad9a2ceb,2025-06-04T14:54:33.783000 CVE-2025-5341,0,0,2f7555dddd47395f556aef803e272926d99b2be1a7b798f5f5a29577ec1f1191,2025-06-05T20:12:23.777000 -CVE-2025-5349,1,1,7168ab1bd0564ec8dff103c05ed831dd4e82333b396710610b87d7abc2d9b7fa,2025-06-17T13:15:21.377000 +CVE-2025-5349,0,0,7168ab1bd0564ec8dff103c05ed831dd4e82333b396710610b87d7abc2d9b7fa,2025-06-17T13:15:21.377000 CVE-2025-5353,0,0,a9d9e9f405a59eeaccd7ee5466c700cdd9eae2ba20f2bc9c98c5c42953abdf75,2025-06-12T16:06:39.330000 CVE-2025-5356,0,0,6a764e64fb18f100210c21c80183447ce555b33b694a7918c938b363fa173ac7,2025-06-02T17:32:17.397000 CVE-2025-5357,0,0,907468d4a23bb292098ec30159d44f17f5a58704c8b53f5a961af7ce379d277f,2025-06-16T16:26:46.080000 @@ -297803,7 +297884,7 @@ CVE-2025-5685,0,0,9300f7d7685cfc359ac44cb8501f97431249edd5f4608a9c2df4c4def65731 CVE-2025-5686,0,0,ceecb4c8c9b6240c3c4cf6461703c0b505d1b9b8eeadd71aabaf7a72390230d4,2025-06-06T14:07:28.330000 CVE-2025-5687,0,0,e33a8d5b6be662e1a0e241a33814bebad69a67bd26678880d068e7933b6c7f3d,2025-06-12T16:06:20.180000 CVE-2025-5688,0,0,8859de4a9377955821b5e59f7a118128be39b8ffcd1a35e1ff851cd9073a522a,2025-06-05T20:12:23.777000 -CVE-2025-5689,0,0,6be61e620ec3a8061fa0bfd0dd4a337a5e52ae0ea1d9e6d3b253fe6449410f44,2025-06-16T12:32:18.840000 +CVE-2025-5689,0,1,558494aa74adc28219d89fe864e04925102600f165cf74edca9260522c988f6b,2025-06-17T15:15:53.433000 CVE-2025-5690,0,0,2e6ec95a91973b0c3c4a92b7ee6f9cd8669b2bfbe2e8890344ec60c22753f2e7,2025-06-05T20:12:23.777000 CVE-2025-5693,0,0,3eb6fccacf1bd20f2333db0bbaacd99059fce8b8a971e8a4304fa128bcdb0cb9,2025-06-10T15:01:27.903000 CVE-2025-5694,0,0,903ae591483b4ac578a133192ea3d236171a92fe2d64e5248fd0b8468b1bbb6b,2025-06-10T15:01:17.830000 @@ -297812,7 +297893,7 @@ CVE-2025-5696,0,0,b4091ee0fb4fa532c5f66065f45fdcbfe956ac564f6752fbce6c2f5c6e7f4f CVE-2025-5697,0,0,e16a3d80fb06f7ce0327380d6c48a4da47ce2498c4d874e03daa95c5a77d2485,2025-06-06T14:07:28.330000 CVE-2025-5698,0,0,516450620243a6336d536db4f711e75cf0a3068f72ea66a45708384556a39a46,2025-06-06T14:07:28.330000 CVE-2025-5699,0,0,0a1565e1ee571962b106c0d60bfe684a5661c8b79bdbf83ccaf5e242dffe56c7,2025-06-06T14:07:28.330000 -CVE-2025-5700,1,1,d57912b209ba5821e1822fbc1032095ee702c6848222caead3b7a5ddd8f2be11,2025-06-17T12:15:27.960000 +CVE-2025-5700,0,0,d57912b209ba5821e1822fbc1032095ee702c6848222caead3b7a5ddd8f2be11,2025-06-17T12:15:27.960000 CVE-2025-5701,0,0,873890d0d7ee46e4c64243a1f1cf0740948dafdadf78be33a983ccdb225e9602,2025-06-05T20:12:23.777000 CVE-2025-5702,0,0,f4b41a5876bf80125fd2f1b602bb755c8f57b5d1f34dfd56969670098c786271,2025-06-05T21:15:22.873000 CVE-2025-5703,0,0,94709a108b8c052e235b42f888b0029894770c90f72ee62feea2d3d3af8ba023,2025-06-06T14:07:28.330000 @@ -297869,7 +297950,7 @@ CVE-2025-5763,0,0,a15a3a2b0366b1c66dcf3b366b895c7439dfb4d30e432b0e7f8ed791e648ad CVE-2025-5764,0,0,2d28a1f65a433690f9d2f8261def9db24023e822b530c5b66d4068781293abda,2025-06-10T19:29:57.893000 CVE-2025-5765,0,0,cf1c505b8511f3d7107b049f561769a46f8060e4722ef9f239daeb196ff8da86,2025-06-10T19:29:44.973000 CVE-2025-5766,0,0,28ff5fc5d5092ea27c0ea445f8523dc92a0b61bbfca49399a743b91e6135f816,2025-06-10T19:29:34.820000 -CVE-2025-5777,1,1,1bd9c5a365e0cd2cbe3fe7b6231443e98e5b388d00167129faf1f606cf559ac0,2025-06-17T13:15:21.523000 +CVE-2025-5777,0,0,1bd9c5a365e0cd2cbe3fe7b6231443e98e5b388d00167129faf1f606cf559ac0,2025-06-17T13:15:21.523000 CVE-2025-5778,0,0,5f200e53fd6421895a453b111aeb1386ab25cc3e45de20df15c46216ef4a37f8,2025-06-09T12:15:47.880000 CVE-2025-5779,0,0,1e700fadb20c430a15a195537975215f0a5a558e649a2a5a5d9bb126f7483d20,2025-06-10T19:26:20.883000 CVE-2025-5780,0,0,291144f4a381da80b9438fe643e4a6c8cc152547ccff2703d0e51362f127b808,2025-06-10T19:26:11.937000 @@ -298013,7 +298094,7 @@ CVE-2025-6007,0,0,0a6b30e00b610d68c64f9ae664f6748f210976b9ca69a527a02472b830ffa8 CVE-2025-6008,0,0,bdfd3cc3e4441917f3e7587cffe8368d1b175ba60e9dbe2f7dbae2a1b2f94481,2025-06-12T16:06:20.180000 CVE-2025-6009,0,0,45d2cd3c349eec086d7dbf8e5d3677c0ad4a90d0009e476cec317ccc54ba0f3a,2025-06-12T16:06:20.180000 CVE-2025-6012,0,0,26f2f66d87f45d6aa756cc004552cfa11ed42d44708395d664a6658fe8d21b45,2025-06-16T12:32:18.840000 -CVE-2025-6020,1,1,15461c4f32d00084c271b3d4be305f7f9e815d30c9797d34455d7765b875a35c,2025-06-17T13:15:21.660000 +CVE-2025-6020,0,0,15461c4f32d00084c271b3d4be305f7f9e815d30c9797d34455d7765b875a35c,2025-06-17T13:15:21.660000 CVE-2025-6021,0,0,4d6c316d6b2265feaa5a1f1976caab5acbb233a1583e3791720a0a82dcf439c4,2025-06-12T16:06:20.180000 CVE-2025-6029,0,0,e9108be7e98d0780991a9dbc9771d79381463de686ea76ad25b1212ca465841e,2025-06-16T12:32:18.840000 CVE-2025-6030,0,0,e2d083f85b4980fab673be25fe64ff6c58fe5f2e84e15893b8c80d92f1561a4f,2025-06-16T12:32:18.840000 @@ -298029,6 +298110,7 @@ CVE-2025-6062,0,0,5bf9e4ece70cbb53a8f33b39f23213ffcbb9e338a70925ebae7177b4c04411 CVE-2025-6063,0,0,4b692343ef267dff5c6a1fea04bb04a19ebd1cc0cba19e4fc7878765a9d82379,2025-06-16T12:32:18.840000 CVE-2025-6064,0,0,979f98e59c93c3db1b1e3d8ca32b91237e3a41952bd15c0b929b60ca805f9fcb,2025-06-16T12:32:18.840000 CVE-2025-6065,0,0,b54a72f9a0b99c16c66aef6c3f604cf5fb2ce5dc53cfc18dad9d67742adfbf62,2025-06-16T12:32:18.840000 +CVE-2025-6069,1,1,ba5eeb1543b82900be5267fd5665e3514736b7e708a6fda6e16a0178e6951e06,2025-06-17T14:15:33.677000 CVE-2025-6070,0,0,c5bf4414dfa4d281aa3a990feec25cc21fddd34f58ddd67c6eaf8ae460160cc5,2025-06-16T12:32:18.840000 CVE-2025-6083,0,0,b33f55da80da8b54015e6694bf27d7fb64e15676e9297ecd61b06510d2a00a90,2025-06-16T12:32:18.840000 CVE-2025-6087,0,0,2da0d92f0565405a999fcd75345b78a22ecbc1edc6e3e50e5ecf2e457fcee31e,2025-06-16T19:15:33.837000 @@ -298094,8 +298176,8 @@ CVE-2025-6147,0,0,64f811f1ad35d30d4634773c22ec6076c9724c6ce2a8e2adad3f1f7a01786d CVE-2025-6148,0,0,ed46144a74af3d43d1d2a9db5399b5a46907773866eafc7f018973eaa9a20577,2025-06-17T01:15:22.757000 CVE-2025-6149,0,0,b8c74a34caddc5aedccc5c27b3a8895bf480989637bc3bee8d371141d3bd485f,2025-06-17T01:15:22.943000 CVE-2025-6150,0,0,66cd6648bb2126787c38bf421cb766554afbe49a507a351a79d6e99c28076ceb,2025-06-17T01:15:23.130000 -CVE-2025-6151,0,0,627c7a04c1ac8d52f9d55728752e65257775271fa3c167c2c5e792750dee59cd,2025-06-17T01:15:23.313000 -CVE-2025-6152,0,0,aa3ddef2fafbae4ee80d66c1a53f2da1dc0d65b7d57f398d4498b20c80fedc42,2025-06-17T02:15:20.213000 +CVE-2025-6151,0,1,96311bd8b89e098277553b4e12fa1ba3c0f3f82135289f8ab520e613799d1055,2025-06-17T15:15:53.710000 +CVE-2025-6152,0,1,c710282dd7c7f70e125d1ee781d65b554eb6add8afd789d03fa21207d0dbbb5e,2025-06-17T15:15:53.837000 CVE-2025-6153,0,0,9b18af700a1f541aac9efe3b9f546df8adee80cd5ddad623a543dd6443a60240,2025-06-17T03:15:25.743000 CVE-2025-6154,0,0,62ffd39fc3a940cd0efdfe8e44c0667e93ba73cb6c6d3e0c17d7cb698c7867da,2025-06-17T03:15:25.947000 CVE-2025-6155,0,0,dac96adcb5d333d8f59da04e36da8a65c1e8e36c50dad572a02e404405e5cef7,2025-06-17T03:15:26.147000 @@ -298110,10 +298192,12 @@ CVE-2025-6163,0,0,7bc2b2f48c2420316b423e722c94da079d7d1613e6a363e835137d32165dbd CVE-2025-6164,0,0,829b92e5c4f317cd5a0872b32057c9a2f75419abedff68edd26f6957c7ebe18e,2025-06-17T06:15:22.023000 CVE-2025-6165,0,0,41b2370d3cc27ce834842f6ceb221fed031ba52a73c12b0d4604f06ea0872dbf,2025-06-17T06:15:22.260000 CVE-2025-6166,0,0,84d7790ab9d838ce3eaafa1616fc3786a151d0d2725a5e07d244018d733bfa16,2025-06-17T06:15:22.467000 -CVE-2025-6167,0,0,2795af94fd7d4d295d3d1376b505259446423090eb7abd25b203e8b7a501cc61,2025-06-17T07:15:18.330000 +CVE-2025-6167,0,1,72134d1668148f9a9f7082d1d907751ddc6ddebdc970e72e22a0f56a30409cc3,2025-06-17T15:15:53.960000 CVE-2025-6169,0,0,24b56c63dd5c2b9799043dae6dc3b75a3e06e9ee630be707f681a9bb09cd5b58,2025-06-16T12:32:18.840000 CVE-2025-6170,0,0,b6c9e594edbf46197f9f9a30d565b603f055d40c252eab039c7ec60bb43a9554,2025-06-16T16:15:20.430000 CVE-2025-6172,0,0,df5b11377ae2bcb860baea092fdadde3351cf8aeca30edf92e0d7977024948be,2025-06-16T17:15:31.503000 CVE-2025-6173,0,0,b45a6b702ab24652eaa476aa59a0195c34f8c8dfa2fb7597b68d873f98cdb621,2025-06-17T07:15:18.630000 CVE-2025-6177,0,0,4366e6ccec4e1fee6021c14403a53e901267cccb403243623e65ac51819fb0ad,2025-06-16T18:15:22.210000 -CVE-2025-6179,0,0,e03ccb1aee3fb84a10b1e8e244344864b6bf168e1fae419ef2706d5012538f33,2025-06-16T17:15:32.053000 +CVE-2025-6179,0,1,2c928016c07cbd25bd49ef9545db7c6b4c5d93d46e522cc4ee692e252c184ad7,2025-06-17T14:15:34.673000 +CVE-2025-6196,1,1,707ac388beb52db16bc29d476470d9c1c12bafc5a6b2a281708a93f08e985d29,2025-06-17T15:15:54.140000 +CVE-2025-6199,1,1,3030ea9fa12e3c1a2b76720db899edff880a9b25d40bebedd1c8970d9ce786f7,2025-06-17T15:15:54.307000