From 86060ac0d490d4bebbd00319b54b34b6cb9fd64a Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 22 Apr 2025 16:03:56 +0000 Subject: [PATCH] Auto-Update: 2025-04-22T16:00:20.994607+00:00 --- CVE-2013/CVE-2013-48xx/CVE-2013-4809.json | 12 +- CVE-2013/CVE-2013-48xx/CVE-2013-4811.json | 12 +- CVE-2013/CVE-2013-48xx/CVE-2013-4812.json | 12 +- CVE-2013/CVE-2013-48xx/CVE-2013-4813.json | 12 +- CVE-2020/CVE-2020-239xx/CVE-2020-23935.json | 6 +- CVE-2021/CVE-2021-09xx/CVE-2021-0934.json | 32 +- CVE-2021/CVE-2021-333xx/CVE-2021-33371.json | 6 +- CVE-2021/CVE-2021-450xx/CVE-2021-45003.json | 6 +- CVE-2021/CVE-2021-460xx/CVE-2021-46027.json | 6 +- CVE-2022/CVE-2022-204xx/CVE-2022-20449.json | 32 +- CVE-2022/CVE-2022-204xx/CVE-2022-20466.json | 32 +- CVE-2022/CVE-2022-204xx/CVE-2022-20468.json | 32 +- CVE-2022/CVE-2022-204xx/CVE-2022-20469.json | 32 +- CVE-2022/CVE-2022-204xx/CVE-2022-20470.json | 32 +- CVE-2022/CVE-2022-204xx/CVE-2022-20471.json | 32 +- CVE-2022/CVE-2022-204xx/CVE-2022-20472.json | 32 +- CVE-2022/CVE-2022-204xx/CVE-2022-20473.json | 32 +- CVE-2022/CVE-2022-204xx/CVE-2022-20474.json | 32 +- CVE-2022/CVE-2022-204xx/CVE-2022-20475.json | 32 +- CVE-2022/CVE-2022-204xx/CVE-2022-20486.json | 32 +- CVE-2022/CVE-2022-204xx/CVE-2022-20487.json | 32 +- CVE-2022/CVE-2022-204xx/CVE-2022-20488.json | 32 +- CVE-2022/CVE-2022-204xx/CVE-2022-20491.json | 32 +- CVE-2022/CVE-2022-204xx/CVE-2022-20495.json | 32 +- CVE-2022/CVE-2022-204xx/CVE-2022-20496.json | 32 +- CVE-2022/CVE-2022-204xx/CVE-2022-20497.json | 32 +- CVE-2022/CVE-2022-204xx/CVE-2022-20498.json | 32 +- CVE-2022/CVE-2022-205xx/CVE-2022-20500.json | 32 +- CVE-2022/CVE-2022-273xx/CVE-2022-27333.json | 6 +- CVE-2022/CVE-2022-293xx/CVE-2022-29309.json | 6 +- CVE-2022/CVE-2022-312xx/CVE-2022-31294.json | 6 +- CVE-2022/CVE-2022-312xx/CVE-2022-31295.json | 6 +- CVE-2022/CVE-2022-319xx/CVE-2022-31911.json | 6 +- CVE-2022/CVE-2022-319xx/CVE-2022-31913.json | 6 +- CVE-2022/CVE-2022-31xx/CVE-2022-3105.json | 24 +- CVE-2022/CVE-2022-31xx/CVE-2022-3107.json | 32 +- CVE-2022/CVE-2022-31xx/CVE-2022-3108.json | 32 +- CVE-2022/CVE-2022-31xx/CVE-2022-3110.json | 24 +- CVE-2022/CVE-2022-31xx/CVE-2022-3111.json | 32 +- CVE-2022/CVE-2022-31xx/CVE-2022-3112.json | 32 +- CVE-2022/CVE-2022-31xx/CVE-2022-3113.json | 32 +- CVE-2022/CVE-2022-31xx/CVE-2022-3114.json | 32 +- CVE-2022/CVE-2022-31xx/CVE-2022-3115.json | 32 +- CVE-2022/CVE-2022-332xx/CVE-2022-33238.json | 12 +- CVE-2022/CVE-2022-332xx/CVE-2022-33268.json | 12 +- CVE-2022/CVE-2022-35xx/CVE-2022-3509.json | 12 +- CVE-2022/CVE-2022-35xx/CVE-2022-3510.json | 12 +- CVE-2022/CVE-2022-36xx/CVE-2022-3605.json | 22 +- CVE-2022/CVE-2022-36xx/CVE-2022-3609.json | 22 +- CVE-2022/CVE-2022-38xx/CVE-2022-3853.json | 22 +- CVE-2022/CVE-2022-38xx/CVE-2022-3862.json | 22 +- CVE-2022/CVE-2022-39xx/CVE-2022-3900.json | 22 +- CVE-2022/CVE-2022-39xx/CVE-2022-3915.json | 22 +- CVE-2022/CVE-2022-39xx/CVE-2022-3919.json | 22 +- CVE-2022/CVE-2022-39xx/CVE-2022-3921.json | 22 +- CVE-2022/CVE-2022-39xx/CVE-2022-3925.json | 22 +- CVE-2022/CVE-2022-39xx/CVE-2022-3933.json | 22 +- CVE-2022/CVE-2022-39xx/CVE-2022-3934.json | 22 +- CVE-2022/CVE-2022-39xx/CVE-2022-3935.json | 22 +- CVE-2022/CVE-2022-39xx/CVE-2022-3981.json | 22 +- CVE-2022/CVE-2022-39xx/CVE-2022-3982.json | 22 +- CVE-2022/CVE-2022-39xx/CVE-2022-3989.json | 22 +- CVE-2022/CVE-2022-39xx/CVE-2022-3999.json | 22 +- CVE-2022/CVE-2022-40xx/CVE-2022-4000.json | 22 +- CVE-2022/CVE-2022-40xx/CVE-2022-4004.json | 22 +- CVE-2022/CVE-2022-40xx/CVE-2022-4005.json | 22 +- CVE-2022/CVE-2022-40xx/CVE-2022-4016.json | 22 +- CVE-2022/CVE-2022-428xx/CVE-2022-42800.json | 32 +- CVE-2022/CVE-2022-428xx/CVE-2022-42801.json | 32 +- CVE-2022/CVE-2022-428xx/CVE-2022-42803.json | 32 +- CVE-2022/CVE-2022-428xx/CVE-2022-42806.json | 32 +- CVE-2022/CVE-2022-428xx/CVE-2022-42808.json | 32 +- CVE-2022/CVE-2022-428xx/CVE-2022-42809.json | 32 +- CVE-2022/CVE-2022-428xx/CVE-2022-42810.json | 32 +- CVE-2022/CVE-2022-428xx/CVE-2022-42811.json | 32 +- CVE-2022/CVE-2022-428xx/CVE-2022-42813.json | 32 +- CVE-2022/CVE-2022-428xx/CVE-2022-42814.json | 32 +- CVE-2022/CVE-2022-439xx/CVE-2022-43996.json | 32 +- CVE-2022/CVE-2022-443xx/CVE-2022-44303.json | 32 +- CVE-2022/CVE-2022-448xx/CVE-2022-44832.json | 32 +- CVE-2022/CVE-2022-448xx/CVE-2022-44898.json | 32 +- CVE-2022/CVE-2022-456xx/CVE-2022-45689.json | 32 +- CVE-2022/CVE-2022-456xx/CVE-2022-45690.json | 32 +- CVE-2022/CVE-2022-456xx/CVE-2022-45693.json | 32 +- CVE-2022/CVE-2022-458xx/CVE-2022-45871.json | 12 +- CVE-2022/CVE-2022-459xx/CVE-2022-45936.json | 22 +- CVE-2022/CVE-2022-460xx/CVE-2022-46047.json | 32 +- CVE-2022/CVE-2022-460xx/CVE-2022-46051.json | 32 +- CVE-2022/CVE-2022-460xx/CVE-2022-46058.json | 32 +- CVE-2022/CVE-2022-460xx/CVE-2022-46059.json | 32 +- CVE-2022/CVE-2022-461xx/CVE-2022-46118.json | 32 +- CVE-2022/CVE-2022-461xx/CVE-2022-46119.json | 32 +- CVE-2022/CVE-2022-461xx/CVE-2022-46120.json | 32 +- CVE-2022/CVE-2022-461xx/CVE-2022-46121.json | 32 +- CVE-2022/CVE-2022-461xx/CVE-2022-46122.json | 32 +- CVE-2022/CVE-2022-463xx/CVE-2022-46354.json | 22 +- CVE-2022/CVE-2022-463xx/CVE-2022-46355.json | 22 +- CVE-2022/CVE-2022-463xx/CVE-2022-46381.json | 32 +- CVE-2022/CVE-2022-464xx/CVE-2022-46404.json | 12 +- CVE-2022/CVE-2022-464xx/CVE-2022-46443.json | 32 +- CVE-2022/CVE-2022-466xx/CVE-2022-46609.json | 22 +- CVE-2022/CVE-2022-468xx/CVE-2022-46833.json | 22 +- CVE-2022/CVE-2022-468xx/CVE-2022-46834.json | 22 +- CVE-2023/CVE-2023-284xx/CVE-2023-28451.json | 31 +- CVE-2023/CVE-2023-284xx/CVE-2023-28455.json | 32 +- CVE-2023/CVE-2023-284xx/CVE-2023-28456.json | 32 +- CVE-2023/CVE-2023-284xx/CVE-2023-28457.json | 32 +- CVE-2023/CVE-2023-30xx/CVE-2023-3007.json | 6 +- CVE-2023/CVE-2023-30xx/CVE-2023-3008.json | 6 +- CVE-2023/CVE-2023-31xx/CVE-2023-3143.json | 6 +- CVE-2023/CVE-2023-31xx/CVE-2023-3144.json | 6 +- CVE-2023/CVE-2023-31xx/CVE-2023-3145.json | 6 +- CVE-2023/CVE-2023-31xx/CVE-2023-3146.json | 6 +- CVE-2023/CVE-2023-31xx/CVE-2023-3147.json | 6 +- CVE-2023/CVE-2023-31xx/CVE-2023-3148.json | 6 +- CVE-2023/CVE-2023-31xx/CVE-2023-3149.json | 6 +- CVE-2023/CVE-2023-31xx/CVE-2023-3150.json | 6 +- CVE-2023/CVE-2023-31xx/CVE-2023-3151.json | 6 +- CVE-2023/CVE-2023-31xx/CVE-2023-3152.json | 6 +- CVE-2023/CVE-2023-401xx/CVE-2023-40108.json | 41 +- CVE-2023/CVE-2023-401xx/CVE-2023-40132.json | 41 +- CVE-2023/CVE-2023-513xx/CVE-2023-51316.json | 33 +- CVE-2023/CVE-2023-513xx/CVE-2023-51317.json | 33 +- CVE-2023/CVE-2023-513xx/CVE-2023-51318.json | 40 +- CVE-2023/CVE-2023-513xx/CVE-2023-51319.json | 33 +- CVE-2023/CVE-2023-513xx/CVE-2023-51320.json | 33 +- CVE-2024/CVE-2024-129xx/CVE-2024-12951.json | 76 ++- CVE-2024/CVE-2024-129xx/CVE-2024-12953.json | 76 ++- CVE-2024/CVE-2024-129xx/CVE-2024-12954.json | 76 ++- CVE-2024/CVE-2024-129xx/CVE-2024-12956.json | 76 ++- CVE-2024/CVE-2024-129xx/CVE-2024-12958.json | 76 ++- CVE-2024/CVE-2024-129xx/CVE-2024-12961.json | 76 ++- CVE-2024/CVE-2024-129xx/CVE-2024-12965.json | 76 ++- CVE-2024/CVE-2024-130xx/CVE-2024-13002.json | 76 ++- CVE-2024/CVE-2024-130xx/CVE-2024-13003.json | 76 ++- CVE-2024/CVE-2024-135xx/CVE-2024-13569.json | 31 +- CVE-2024/CVE-2024-21xx/CVE-2024-2145.json | 75 ++- CVE-2024/CVE-2024-21xx/CVE-2024-2155.json | 73 ++- CVE-2024/CVE-2024-258xx/CVE-2024-25854.json | 31 +- CVE-2024/CVE-2024-296xx/CVE-2024-29643.json | 47 +- CVE-2024/CVE-2024-347xx/CVE-2024-34730.json | 41 +- CVE-2024/CVE-2024-366xx/CVE-2024-36694.json | 56 +- CVE-2024/CVE-2024-400xx/CVE-2024-40071.json | 47 +- CVE-2024/CVE-2024-400xx/CVE-2024-40072.json | 47 +- CVE-2024/CVE-2024-400xx/CVE-2024-40073.json | 47 +- CVE-2024/CVE-2024-404xx/CVE-2024-40445.json | 33 ++ CVE-2024/CVE-2024-404xx/CVE-2024-40446.json | 25 + CVE-2024/CVE-2024-406xx/CVE-2024-40674.json | 31 +- CVE-2024/CVE-2024-406xx/CVE-2024-40675.json | 46 +- CVE-2024/CVE-2024-406xx/CVE-2024-40676.json | 51 +- CVE-2024/CVE-2024-406xx/CVE-2024-40677.json | 51 +- CVE-2024/CVE-2024-430xx/CVE-2024-43095.json | 46 +- CVE-2024/CVE-2024-430xx/CVE-2024-43096.json | 46 +- CVE-2024/CVE-2024-437xx/CVE-2024-43763.json | 46 +- CVE-2024/CVE-2024-437xx/CVE-2024-43765.json | 46 +- CVE-2024/CVE-2024-437xx/CVE-2024-43770.json | 46 +- CVE-2024/CVE-2024-437xx/CVE-2024-43771.json | 46 +- CVE-2024/CVE-2024-447xx/CVE-2024-44724.json | 28 +- CVE-2024/CVE-2024-447xx/CVE-2024-44725.json | 28 +- CVE-2024/CVE-2024-448xx/CVE-2024-44838.json | 28 +- CVE-2024/CVE-2024-448xx/CVE-2024-44839.json | 28 +- CVE-2024/CVE-2024-457xx/CVE-2024-45771.json | 28 +- CVE-2024/CVE-2024-465xx/CVE-2024-46546.json | 64 +++ CVE-2024/CVE-2024-497xx/CVE-2024-49724.json | 46 +- CVE-2024/CVE-2024-497xx/CVE-2024-49732.json | 26 +- CVE-2024/CVE-2024-497xx/CVE-2024-49733.json | 46 +- CVE-2024/CVE-2024-497xx/CVE-2024-49734.json | 31 +- CVE-2024/CVE-2024-497xx/CVE-2024-49735.json | 26 +- CVE-2024/CVE-2024-497xx/CVE-2024-49736.json | 41 +- CVE-2024/CVE-2024-497xx/CVE-2024-49737.json | 36 +- CVE-2024/CVE-2024-497xx/CVE-2024-49738.json | 46 +- CVE-2024/CVE-2024-497xx/CVE-2024-49742.json | 46 +- CVE-2024/CVE-2024-497xx/CVE-2024-49744.json | 46 +- CVE-2024/CVE-2024-497xx/CVE-2024-49745.json | 46 +- CVE-2024/CVE-2024-497xx/CVE-2024-49747.json | 46 +- CVE-2024/CVE-2024-497xx/CVE-2024-49748.json | 46 +- CVE-2024/CVE-2024-497xx/CVE-2024-49749.json | 46 +- CVE-2024/CVE-2024-506xx/CVE-2024-50608.json | 37 +- CVE-2024/CVE-2024-506xx/CVE-2024-50609.json | 37 +- CVE-2024/CVE-2024-539xx/CVE-2024-53924.json | 47 +- CVE-2024/CVE-2024-547xx/CVE-2024-54775.json | 32 +- CVE-2024/CVE-2024-561xx/CVE-2024-56170.json | 27 +- CVE-2024/CVE-2024-563xx/CVE-2024-56310.json | 33 +- CVE-2024/CVE-2024-563xx/CVE-2024-56311.json | 33 +- CVE-2024/CVE-2024-563xx/CVE-2024-56312.json | 33 +- CVE-2024/CVE-2024-563xx/CVE-2024-56313.json | 33 +- CVE-2024/CVE-2024-563xx/CVE-2024-56314.json | 33 +- CVE-2024/CVE-2024-563xx/CVE-2024-56375.json | 37 +- CVE-2024/CVE-2024-565xx/CVE-2024-56518.json | 43 +- CVE-2024/CVE-2024-569xx/CVE-2024-56921.json | 43 +- CVE-2024/CVE-2024-574xx/CVE-2024-57433.json | 27 +- CVE-2024/CVE-2024-574xx/CVE-2024-57434.json | 33 +- CVE-2024/CVE-2024-574xx/CVE-2024-57435.json | 33 +- CVE-2024/CVE-2024-574xx/CVE-2024-57493.json | 43 +- CVE-2024/CVE-2024-575xx/CVE-2024-57536.json | 45 +- CVE-2024/CVE-2024-575xx/CVE-2024-57537.json | 45 +- CVE-2024/CVE-2024-575xx/CVE-2024-57538.json | 39 +- CVE-2024/CVE-2024-575xx/CVE-2024-57539.json | 39 +- CVE-2024/CVE-2024-575xx/CVE-2024-57540.json | 39 +- CVE-2024/CVE-2024-575xx/CVE-2024-57541.json | 45 +- CVE-2024/CVE-2024-575xx/CVE-2024-57542.json | 45 +- CVE-2024/CVE-2024-575xx/CVE-2024-57543.json | 45 +- CVE-2024/CVE-2024-575xx/CVE-2024-57544.json | 45 +- CVE-2024/CVE-2024-575xx/CVE-2024-57545.json | 45 +- CVE-2024/CVE-2024-79xx/CVE-2024-7916.json | 6 +- CVE-2024/CVE-2024-82xx/CVE-2024-8208.json | 6 +- CVE-2024/CVE-2024-82xx/CVE-2024-8209.json | 6 +- CVE-2024/CVE-2024-82xx/CVE-2024-8216.json | 6 +- CVE-2025/CVE-2025-09xx/CVE-2025-0948.json | 82 ++- CVE-2025/CVE-2025-09xx/CVE-2025-0949.json | 82 ++- CVE-2025/CVE-2025-19xx/CVE-2025-1950.json | 56 ++ CVE-2025/CVE-2025-19xx/CVE-2025-1951.json | 56 ++ CVE-2025/CVE-2025-229xx/CVE-2025-22957.json | 35 +- CVE-2025/CVE-2025-231xx/CVE-2025-23176.json | 56 ++ CVE-2025/CVE-2025-25xx/CVE-2025-2594.json | 31 +- CVE-2025/CVE-2025-270xx/CVE-2025-27086.json | 43 +- CVE-2025/CVE-2025-280xx/CVE-2025-28032.json | 21 + CVE-2025/CVE-2025-280xx/CVE-2025-28033.json | 21 + CVE-2025/CVE-2025-280xx/CVE-2025-28034.json | 21 + CVE-2025/CVE-2025-280xx/CVE-2025-28059.json | 39 +- CVE-2025/CVE-2025-281xx/CVE-2025-28197.json | 39 +- CVE-2025/CVE-2025-282xx/CVE-2025-28228.json | 47 +- CVE-2025/CVE-2025-282xx/CVE-2025-28229.json | 47 +- CVE-2025/CVE-2025-282xx/CVE-2025-28230.json | 47 +- CVE-2025/CVE-2025-282xx/CVE-2025-28231.json | 43 +- CVE-2025/CVE-2025-282xx/CVE-2025-28232.json | 47 +- CVE-2025/CVE-2025-282xx/CVE-2025-28233.json | 43 +- CVE-2025/CVE-2025-282xx/CVE-2025-28235.json | 43 +- CVE-2025/CVE-2025-282xx/CVE-2025-28236.json | 43 +- CVE-2025/CVE-2025-282xx/CVE-2025-28237.json | 43 +- CVE-2025/CVE-2025-282xx/CVE-2025-28238.json | 43 +- CVE-2025/CVE-2025-282xx/CVE-2025-28242.json | 43 +- CVE-2025/CVE-2025-292xx/CVE-2025-29209.json | 47 +- CVE-2025/CVE-2025-293xx/CVE-2025-29316.json | 47 +- CVE-2025/CVE-2025-293xx/CVE-2025-29369.json | 32 +- CVE-2025/CVE-2025-295xx/CVE-2025-29547.json | 25 + CVE-2025/CVE-2025-35xx/CVE-2025-3577.json | 14 +- README.md | 76 +-- _state.csv | 608 ++++++++++---------- 239 files changed, 7511 insertions(+), 952 deletions(-) create mode 100644 CVE-2024/CVE-2024-404xx/CVE-2024-40445.json create mode 100644 CVE-2024/CVE-2024-404xx/CVE-2024-40446.json create mode 100644 CVE-2024/CVE-2024-465xx/CVE-2024-46546.json create mode 100644 CVE-2025/CVE-2025-19xx/CVE-2025-1950.json create mode 100644 CVE-2025/CVE-2025-19xx/CVE-2025-1951.json create mode 100644 CVE-2025/CVE-2025-231xx/CVE-2025-23176.json create mode 100644 CVE-2025/CVE-2025-280xx/CVE-2025-28032.json create mode 100644 CVE-2025/CVE-2025-280xx/CVE-2025-28033.json create mode 100644 CVE-2025/CVE-2025-280xx/CVE-2025-28034.json create mode 100644 CVE-2025/CVE-2025-295xx/CVE-2025-29547.json diff --git a/CVE-2013/CVE-2013-48xx/CVE-2013-4809.json b/CVE-2013/CVE-2013-48xx/CVE-2013-4809.json index e9796ee6eb9..e59e970f0a0 100644 --- a/CVE-2013/CVE-2013-48xx/CVE-2013-4809.json +++ b/CVE-2013/CVE-2013-48xx/CVE-2013-4809.json @@ -2,7 +2,7 @@ "id": "CVE-2013-4809", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2013-09-16T13:01:46.190", - "lastModified": "2025-04-11T00:51:21.963", + "lastModified": "2025-04-22T14:51:37.563", "vulnStatus": "Deferred", "cveTags": [], "descriptions": [ @@ -71,20 +71,10 @@ "criteria": "cpe:2.3:a:hp:procurve_manager:3.20:*:*:*:*:*:*:*", "matchCriteriaId": "07C125F5-3219-479F-8532-51043CADF585" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:hp:procurve_manager:3.20:*:*:*:*:plus:*:*", - "matchCriteriaId": "3F072161-6C3C-4509-8857-EDD535F40ADE" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:hp:procurve_manager:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "079151A1-D257-43EE-B1BB-80405AEE5501" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:hp:procurve_manager:4.0:*:*:*:*:plus:*:*", - "matchCriteriaId": "6A81C312-DAC2-48AB-AD87-0CD64D3088A1" } ] } diff --git a/CVE-2013/CVE-2013-48xx/CVE-2013-4811.json b/CVE-2013/CVE-2013-48xx/CVE-2013-4811.json index 21d640956e9..a55786c7c8e 100644 --- a/CVE-2013/CVE-2013-48xx/CVE-2013-4811.json +++ b/CVE-2013/CVE-2013-48xx/CVE-2013-4811.json @@ -2,7 +2,7 @@ "id": "CVE-2013-4811", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2013-09-16T13:01:46.220", - "lastModified": "2025-04-11T00:51:21.963", + "lastModified": "2025-04-22T14:51:37.563", "vulnStatus": "Deferred", "cveTags": [], "descriptions": [ @@ -71,20 +71,10 @@ "criteria": "cpe:2.3:a:hp:procurve_manager:3.20:*:*:*:*:*:*:*", "matchCriteriaId": "07C125F5-3219-479F-8532-51043CADF585" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:hp:procurve_manager:3.20:*:*:*:*:plus:*:*", - "matchCriteriaId": "3F072161-6C3C-4509-8857-EDD535F40ADE" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:hp:procurve_manager:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "079151A1-D257-43EE-B1BB-80405AEE5501" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:hp:procurve_manager:4.0:*:*:*:*:plus:*:*", - "matchCriteriaId": "6A81C312-DAC2-48AB-AD87-0CD64D3088A1" } ] } diff --git a/CVE-2013/CVE-2013-48xx/CVE-2013-4812.json b/CVE-2013/CVE-2013-48xx/CVE-2013-4812.json index 9e75c982610..56471cfde04 100644 --- a/CVE-2013/CVE-2013-48xx/CVE-2013-4812.json +++ b/CVE-2013/CVE-2013-48xx/CVE-2013-4812.json @@ -2,7 +2,7 @@ "id": "CVE-2013-4812", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2013-09-16T13:01:46.220", - "lastModified": "2025-04-11T00:51:21.963", + "lastModified": "2025-04-22T14:51:37.563", "vulnStatus": "Deferred", "cveTags": [], "descriptions": [ @@ -71,20 +71,10 @@ "criteria": "cpe:2.3:a:hp:procurve_manager:3.20:*:*:*:*:*:*:*", "matchCriteriaId": "07C125F5-3219-479F-8532-51043CADF585" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:hp:procurve_manager:3.20:*:*:*:*:plus:*:*", - "matchCriteriaId": "3F072161-6C3C-4509-8857-EDD535F40ADE" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:hp:procurve_manager:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "079151A1-D257-43EE-B1BB-80405AEE5501" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:hp:procurve_manager:4.0:*:*:*:*:plus:*:*", - "matchCriteriaId": "6A81C312-DAC2-48AB-AD87-0CD64D3088A1" } ] } diff --git a/CVE-2013/CVE-2013-48xx/CVE-2013-4813.json b/CVE-2013/CVE-2013-48xx/CVE-2013-4813.json index ef4571a49e6..0e5744819b7 100644 --- a/CVE-2013/CVE-2013-48xx/CVE-2013-4813.json +++ b/CVE-2013/CVE-2013-48xx/CVE-2013-4813.json @@ -2,7 +2,7 @@ "id": "CVE-2013-4813", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2013-09-16T13:01:46.237", - "lastModified": "2025-04-11T00:51:21.963", + "lastModified": "2025-04-22T14:51:37.563", "vulnStatus": "Deferred", "cveTags": [], "descriptions": [ @@ -71,20 +71,10 @@ "criteria": "cpe:2.3:a:hp:procurve_manager:3.20:*:*:*:*:*:*:*", "matchCriteriaId": "07C125F5-3219-479F-8532-51043CADF585" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:hp:procurve_manager:3.20:*:*:*:*:plus:*:*", - "matchCriteriaId": "3F072161-6C3C-4509-8857-EDD535F40ADE" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:hp:procurve_manager:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "079151A1-D257-43EE-B1BB-80405AEE5501" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:hp:procurve_manager:4.0:*:*:*:*:plus:*:*", - "matchCriteriaId": "6A81C312-DAC2-48AB-AD87-0CD64D3088A1" } ] } diff --git a/CVE-2020/CVE-2020-239xx/CVE-2020-23935.json b/CVE-2020/CVE-2020-239xx/CVE-2020-23935.json index b4f89120282..19e36fc2f08 100644 --- a/CVE-2020/CVE-2020-239xx/CVE-2020-23935.json +++ b/CVE-2020/CVE-2020-239xx/CVE-2020-23935.json @@ -2,7 +2,7 @@ "id": "CVE-2020-23935", "sourceIdentifier": "cve@mitre.org", "published": "2020-08-20T15:15:15.967", - "lastModified": "2024-11-21T05:14:14.883", + "lastModified": "2025-04-22T14:51:37.563", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -85,8 +85,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:student_management_system_project:student_management_system:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "A7B8D380-AE4F-4AA2-AFFA-EA5477647B41" + "criteria": "cpe:2.3:a:kabir-m-alhasan:student_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "DE34A5BA-7A78-468F-B9C4-52C04171930C" } ] } diff --git a/CVE-2021/CVE-2021-09xx/CVE-2021-0934.json b/CVE-2021/CVE-2021-09xx/CVE-2021-0934.json index 81c9e6d24fb..f01f8e44888 100644 --- a/CVE-2021/CVE-2021-09xx/CVE-2021-0934.json +++ b/CVE-2021/CVE-2021-09xx/CVE-2021-0934.json @@ -2,7 +2,7 @@ "id": "CVE-2021-0934", "sourceIdentifier": "security@android.com", "published": "2022-12-13T16:15:14.223", - "lastModified": "2024-11-21T05:43:16.373", + "lastModified": "2025-04-22T15:15:56.460", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-1284" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1284" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-333xx/CVE-2021-33371.json b/CVE-2021/CVE-2021-333xx/CVE-2021-33371.json index bb119c47735..7a63dbfea1f 100644 --- a/CVE-2021/CVE-2021-333xx/CVE-2021-33371.json +++ b/CVE-2021/CVE-2021-333xx/CVE-2021-33371.json @@ -2,7 +2,7 @@ "id": "CVE-2021-33371", "sourceIdentifier": "cve@mitre.org", "published": "2022-07-28T00:15:08.223", - "lastModified": "2024-11-21T06:08:46.860", + "lastModified": "2025-04-22T14:51:37.563", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -60,8 +60,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:student_management_system_project:student_management_system:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "A7B8D380-AE4F-4AA2-AFFA-EA5477647B41" + "criteria": "cpe:2.3:a:kabir-m-alhasan:student_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "DE34A5BA-7A78-468F-B9C4-52C04171930C" } ] } diff --git a/CVE-2021/CVE-2021-450xx/CVE-2021-45003.json b/CVE-2021/CVE-2021-450xx/CVE-2021-45003.json index 26425b24c76..52014e1b071 100644 --- a/CVE-2021/CVE-2021-450xx/CVE-2021-45003.json +++ b/CVE-2021/CVE-2021-450xx/CVE-2021-45003.json @@ -2,7 +2,7 @@ "id": "CVE-2021-45003", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-10T14:10:26.627", - "lastModified": "2024-11-21T06:31:47.653", + "lastModified": "2025-04-22T14:51:37.563", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -85,8 +85,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:laundry_booking_management_system_project:laundry_booking_management_system:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "3AA42CF2-7275-4C71-A85B-B29E24D240F8" + "criteria": "cpe:2.3:a:nikhil-bhalerao:laundry_booking_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "39168D3B-8638-4B64-8BEA-D1CB02B91CC1" } ] } diff --git a/CVE-2021/CVE-2021-460xx/CVE-2021-46027.json b/CVE-2021/CVE-2021-460xx/CVE-2021-46027.json index 75d8fe9a84d..98be8d6cc09 100644 --- a/CVE-2021/CVE-2021-460xx/CVE-2021-46027.json +++ b/CVE-2021/CVE-2021-460xx/CVE-2021-46027.json @@ -2,7 +2,7 @@ "id": "CVE-2021-46027", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-19T23:15:08.073", - "lastModified": "2024-11-21T06:33:30.003", + "lastModified": "2025-04-22T14:51:37.563", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -85,8 +85,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mysiteforme_project:mysiteforme:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0BB9FF90-E8DD-4B4E-B75E-4574D3A5A4D5" + "criteria": "cpe:2.3:a:wangl1989:mysiteforme:-:*:*:*:*:*:*:*", + "matchCriteriaId": "057D4523-098A-46E0-9B77-2F622B119FA5" } ] } diff --git a/CVE-2022/CVE-2022-204xx/CVE-2022-20449.json b/CVE-2022/CVE-2022-204xx/CVE-2022-20449.json index 465d2c81129..673bfe6eb43 100644 --- a/CVE-2022/CVE-2022-204xx/CVE-2022-20449.json +++ b/CVE-2022/CVE-2022-204xx/CVE-2022-20449.json @@ -2,7 +2,7 @@ "id": "CVE-2022-20449", "sourceIdentifier": "security@android.com", "published": "2022-12-13T16:15:15.417", - "lastModified": "2024-11-21T06:42:49.947", + "lastModified": "2025-04-22T15:15:57.563", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-204xx/CVE-2022-20466.json b/CVE-2022/CVE-2022-204xx/CVE-2022-20466.json index c3b22782373..e59dea856c1 100644 --- a/CVE-2022/CVE-2022-204xx/CVE-2022-20466.json +++ b/CVE-2022/CVE-2022-204xx/CVE-2022-20466.json @@ -2,7 +2,7 @@ "id": "CVE-2022-20466", "sourceIdentifier": "security@android.com", "published": "2022-12-13T16:15:15.473", - "lastModified": "2024-11-21T06:42:51.893", + "lastModified": "2025-04-22T15:15:57.723", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-1188" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1188" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-204xx/CVE-2022-20468.json b/CVE-2022/CVE-2022-204xx/CVE-2022-20468.json index f4adf52a37b..3fe0b6c9172 100644 --- a/CVE-2022/CVE-2022-204xx/CVE-2022-20468.json +++ b/CVE-2022/CVE-2022-204xx/CVE-2022-20468.json @@ -2,7 +2,7 @@ "id": "CVE-2022-20468", "sourceIdentifier": "security@android.com", "published": "2022-12-13T16:15:15.533", - "lastModified": "2024-11-21T06:42:52.140", + "lastModified": "2025-04-22T15:15:57.880", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-204xx/CVE-2022-20469.json b/CVE-2022/CVE-2022-204xx/CVE-2022-20469.json index 0e60001fbe3..a2062f620b9 100644 --- a/CVE-2022/CVE-2022-204xx/CVE-2022-20469.json +++ b/CVE-2022/CVE-2022-204xx/CVE-2022-20469.json @@ -2,7 +2,7 @@ "id": "CVE-2022-20469", "sourceIdentifier": "security@android.com", "published": "2022-12-13T16:15:15.617", - "lastModified": "2024-11-21T06:42:52.270", + "lastModified": "2025-04-22T15:15:58.030", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-204xx/CVE-2022-20470.json b/CVE-2022/CVE-2022-204xx/CVE-2022-20470.json index 796d898e0f9..0a4d84ee41a 100644 --- a/CVE-2022/CVE-2022-204xx/CVE-2022-20470.json +++ b/CVE-2022/CVE-2022-204xx/CVE-2022-20470.json @@ -2,7 +2,7 @@ "id": "CVE-2022-20470", "sourceIdentifier": "security@android.com", "published": "2022-12-13T16:15:15.697", - "lastModified": "2024-11-21T06:42:52.383", + "lastModified": "2025-04-22T15:15:58.183", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-204xx/CVE-2022-20471.json b/CVE-2022/CVE-2022-204xx/CVE-2022-20471.json index 58c7111e8c5..deae1d97bfa 100644 --- a/CVE-2022/CVE-2022-204xx/CVE-2022-20471.json +++ b/CVE-2022/CVE-2022-204xx/CVE-2022-20471.json @@ -2,7 +2,7 @@ "id": "CVE-2022-20471", "sourceIdentifier": "security@android.com", "published": "2022-12-13T16:15:15.797", - "lastModified": "2024-11-21T06:42:52.500", + "lastModified": "2025-04-22T15:15:58.337", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-204xx/CVE-2022-20472.json b/CVE-2022/CVE-2022-204xx/CVE-2022-20472.json index 5b17d863ad1..bd7149db74f 100644 --- a/CVE-2022/CVE-2022-204xx/CVE-2022-20472.json +++ b/CVE-2022/CVE-2022-204xx/CVE-2022-20472.json @@ -2,7 +2,7 @@ "id": "CVE-2022-20472", "sourceIdentifier": "security@android.com", "published": "2022-12-13T16:15:15.947", - "lastModified": "2024-11-21T06:42:52.620", + "lastModified": "2025-04-22T15:15:58.483", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-204xx/CVE-2022-20473.json b/CVE-2022/CVE-2022-204xx/CVE-2022-20473.json index 0035e53a8f8..fa598c1fd05 100644 --- a/CVE-2022/CVE-2022-204xx/CVE-2022-20473.json +++ b/CVE-2022/CVE-2022-204xx/CVE-2022-20473.json @@ -2,7 +2,7 @@ "id": "CVE-2022-20473", "sourceIdentifier": "security@android.com", "published": "2022-12-13T16:15:16.000", - "lastModified": "2024-11-21T06:42:52.743", + "lastModified": "2025-04-22T15:15:58.640", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-204xx/CVE-2022-20474.json b/CVE-2022/CVE-2022-204xx/CVE-2022-20474.json index 8ff98da2418..79e55f951b6 100644 --- a/CVE-2022/CVE-2022-204xx/CVE-2022-20474.json +++ b/CVE-2022/CVE-2022-204xx/CVE-2022-20474.json @@ -2,7 +2,7 @@ "id": "CVE-2022-20474", "sourceIdentifier": "security@android.com", "published": "2022-12-13T16:15:16.050", - "lastModified": "2024-11-21T06:42:52.870", + "lastModified": "2025-04-22T15:15:58.793", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-204xx/CVE-2022-20475.json b/CVE-2022/CVE-2022-204xx/CVE-2022-20475.json index 0638a6ed40f..e11f5274e78 100644 --- a/CVE-2022/CVE-2022-204xx/CVE-2022-20475.json +++ b/CVE-2022/CVE-2022-204xx/CVE-2022-20475.json @@ -2,7 +2,7 @@ "id": "CVE-2022-20475", "sourceIdentifier": "security@android.com", "published": "2022-12-13T16:15:16.107", - "lastModified": "2024-11-21T06:42:52.987", + "lastModified": "2025-04-22T15:15:58.953", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-204xx/CVE-2022-20486.json b/CVE-2022/CVE-2022-204xx/CVE-2022-20486.json index 44ca1a3ea6f..ecc1f12495a 100644 --- a/CVE-2022/CVE-2022-204xx/CVE-2022-20486.json +++ b/CVE-2022/CVE-2022-204xx/CVE-2022-20486.json @@ -2,7 +2,7 @@ "id": "CVE-2022-20486", "sourceIdentifier": "security@android.com", "published": "2022-12-13T16:15:16.640", - "lastModified": "2024-11-21T06:42:54.310", + "lastModified": "2025-04-22T14:15:16.630", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-770" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-204xx/CVE-2022-20487.json b/CVE-2022/CVE-2022-204xx/CVE-2022-20487.json index ae38b958c36..8d6834df8ad 100644 --- a/CVE-2022/CVE-2022-204xx/CVE-2022-20487.json +++ b/CVE-2022/CVE-2022-204xx/CVE-2022-20487.json @@ -2,7 +2,7 @@ "id": "CVE-2022-20487", "sourceIdentifier": "security@android.com", "published": "2022-12-13T16:15:16.693", - "lastModified": "2024-11-21T06:42:54.423", + "lastModified": "2025-04-22T14:15:17.450", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-770" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-204xx/CVE-2022-20488.json b/CVE-2022/CVE-2022-204xx/CVE-2022-20488.json index dc05cb0bcd4..e946552d634 100644 --- a/CVE-2022/CVE-2022-204xx/CVE-2022-20488.json +++ b/CVE-2022/CVE-2022-204xx/CVE-2022-20488.json @@ -2,7 +2,7 @@ "id": "CVE-2022-20488", "sourceIdentifier": "security@android.com", "published": "2022-12-13T16:15:16.747", - "lastModified": "2024-11-21T06:42:54.543", + "lastModified": "2025-04-22T14:15:17.607", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-1284" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1284" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-204xx/CVE-2022-20491.json b/CVE-2022/CVE-2022-204xx/CVE-2022-20491.json index d0b883dfb31..a67e1b358cc 100644 --- a/CVE-2022/CVE-2022-204xx/CVE-2022-20491.json +++ b/CVE-2022/CVE-2022-204xx/CVE-2022-20491.json @@ -2,7 +2,7 @@ "id": "CVE-2022-20491", "sourceIdentifier": "security@android.com", "published": "2022-12-13T16:15:16.803", - "lastModified": "2024-11-21T06:42:54.930", + "lastModified": "2025-04-22T14:15:17.763", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-1284" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1284" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-204xx/CVE-2022-20495.json b/CVE-2022/CVE-2022-204xx/CVE-2022-20495.json index 3936d8ce14f..1cf4fe6290c 100644 --- a/CVE-2022/CVE-2022-204xx/CVE-2022-20495.json +++ b/CVE-2022/CVE-2022-204xx/CVE-2022-20495.json @@ -2,7 +2,7 @@ "id": "CVE-2022-20495", "sourceIdentifier": "security@android.com", "published": "2022-12-13T16:15:16.863", - "lastModified": "2024-11-21T06:42:55.393", + "lastModified": "2025-04-22T14:15:17.917", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-204xx/CVE-2022-20496.json b/CVE-2022/CVE-2022-204xx/CVE-2022-20496.json index e38e986e5bd..c6770dcf802 100644 --- a/CVE-2022/CVE-2022-204xx/CVE-2022-20496.json +++ b/CVE-2022/CVE-2022-204xx/CVE-2022-20496.json @@ -2,7 +2,7 @@ "id": "CVE-2022-20496", "sourceIdentifier": "security@android.com", "published": "2022-12-13T16:15:16.920", - "lastModified": "2024-11-21T06:42:55.523", + "lastModified": "2025-04-22T14:15:18.073", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-204xx/CVE-2022-20497.json b/CVE-2022/CVE-2022-204xx/CVE-2022-20497.json index 737cdaa5f4a..a8c0d70066e 100644 --- a/CVE-2022/CVE-2022-204xx/CVE-2022-20497.json +++ b/CVE-2022/CVE-2022-204xx/CVE-2022-20497.json @@ -2,7 +2,7 @@ "id": "CVE-2022-20497", "sourceIdentifier": "security@android.com", "published": "2022-12-13T16:15:16.980", - "lastModified": "2024-11-21T06:42:55.640", + "lastModified": "2025-04-22T14:15:18.230", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.6, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-204xx/CVE-2022-20498.json b/CVE-2022/CVE-2022-204xx/CVE-2022-20498.json index 2361bebc3bd..1a71807b5c9 100644 --- a/CVE-2022/CVE-2022-204xx/CVE-2022-20498.json +++ b/CVE-2022/CVE-2022-204xx/CVE-2022-20498.json @@ -2,7 +2,7 @@ "id": "CVE-2022-20498", "sourceIdentifier": "security@android.com", "published": "2022-12-13T16:15:17.040", - "lastModified": "2024-11-21T06:42:55.750", + "lastModified": "2025-04-22T14:15:18.393", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-205xx/CVE-2022-20500.json b/CVE-2022/CVE-2022-205xx/CVE-2022-20500.json index c552a85d1cf..900350f0a21 100644 --- a/CVE-2022/CVE-2022-205xx/CVE-2022-20500.json +++ b/CVE-2022/CVE-2022-205xx/CVE-2022-20500.json @@ -2,7 +2,7 @@ "id": "CVE-2022-20500", "sourceIdentifier": "security@android.com", "published": "2022-12-13T16:15:17.100", - "lastModified": "2024-11-21T06:42:55.973", + "lastModified": "2025-04-22T14:15:18.550", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-755" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-755" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-273xx/CVE-2022-27333.json b/CVE-2022/CVE-2022-273xx/CVE-2022-27333.json index fa7652dcea8..8f38e685d3e 100644 --- a/CVE-2022/CVE-2022-273xx/CVE-2022-27333.json +++ b/CVE-2022/CVE-2022-273xx/CVE-2022-27333.json @@ -2,7 +2,7 @@ "id": "CVE-2022-27333", "sourceIdentifier": "cve@mitre.org", "published": "2022-03-21T22:15:08.110", - "lastModified": "2024-11-21T06:55:36.013", + "lastModified": "2025-04-22T14:51:37.563", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -85,8 +85,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:idccms_project:idccms:1.10:*:*:*:*:*:*:*", - "matchCriteriaId": "376CCE06-1162-4C22-9A69-90AAE350B665" + "criteria": "cpe:2.3:a:idccms:idccms:1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "7E2F2265-5A4C-4466-A064-4CFD8427C990" } ] } diff --git a/CVE-2022/CVE-2022-293xx/CVE-2022-29309.json b/CVE-2022/CVE-2022-293xx/CVE-2022-29309.json index 9ce08d168e9..f018c033ff3 100644 --- a/CVE-2022/CVE-2022-293xx/CVE-2022-29309.json +++ b/CVE-2022/CVE-2022-293xx/CVE-2022-29309.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29309", "sourceIdentifier": "cve@mitre.org", "published": "2022-05-24T03:15:09.257", - "lastModified": "2024-11-21T06:58:53.493", + "lastModified": "2025-04-22T14:51:37.563", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -85,8 +85,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mysiteforme_project:mysiteforme:2.2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "80CC9D76-A43A-45CC-A740-005CFDDD6708" + "criteria": "cpe:2.3:a:wangl1989:mysiteforme:2.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "68F952AD-83AB-4890-B918-AA441C9199E2" } ] } diff --git a/CVE-2022/CVE-2022-312xx/CVE-2022-31294.json b/CVE-2022/CVE-2022-312xx/CVE-2022-31294.json index d9532e66617..d3080f48ef5 100644 --- a/CVE-2022/CVE-2022-312xx/CVE-2022-31294.json +++ b/CVE-2022/CVE-2022-312xx/CVE-2022-31294.json @@ -2,7 +2,7 @@ "id": "CVE-2022-31294", "sourceIdentifier": "cve@mitre.org", "published": "2022-06-16T18:15:10.790", - "lastModified": "2024-11-21T07:04:17.400", + "lastModified": "2025-04-22T14:51:37.563", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -85,8 +85,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:online_discussion_forum_site_project:online_discussion_forum_site:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "424B4A51-6600-4C40-86AF-B3EC4FE2070E" + "criteria": "cpe:2.3:a:razormist:online_discussion_forum_site:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F1F9F37D-C115-4EC6-A1DD-FFB3869E79C0" } ] } diff --git a/CVE-2022/CVE-2022-312xx/CVE-2022-31295.json b/CVE-2022/CVE-2022-312xx/CVE-2022-31295.json index 063ba7c53ee..be6ca3b9ebc 100644 --- a/CVE-2022/CVE-2022-312xx/CVE-2022-31295.json +++ b/CVE-2022/CVE-2022-312xx/CVE-2022-31295.json @@ -2,7 +2,7 @@ "id": "CVE-2022-31295", "sourceIdentifier": "cve@mitre.org", "published": "2022-06-16T20:15:08.093", - "lastModified": "2024-11-21T07:04:17.543", + "lastModified": "2025-04-22T14:51:37.563", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -85,8 +85,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:online_discussion_forum_site_project:online_discussion_forum_site:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "424B4A51-6600-4C40-86AF-B3EC4FE2070E" + "criteria": "cpe:2.3:a:razormist:online_discussion_forum_site:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F1F9F37D-C115-4EC6-A1DD-FFB3869E79C0" } ] } diff --git a/CVE-2022/CVE-2022-319xx/CVE-2022-31911.json b/CVE-2022/CVE-2022-319xx/CVE-2022-31911.json index ecc950bc534..860b98394be 100644 --- a/CVE-2022/CVE-2022-319xx/CVE-2022-31911.json +++ b/CVE-2022/CVE-2022-319xx/CVE-2022-31911.json @@ -2,7 +2,7 @@ "id": "CVE-2022-31911", "sourceIdentifier": "cve@mitre.org", "published": "2022-06-16T15:15:09.607", - "lastModified": "2024-11-21T07:05:28.673", + "lastModified": "2025-04-22T14:51:37.563", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -85,8 +85,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:online_discussion_forum_site_project:online_discussion_forum_site:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "424B4A51-6600-4C40-86AF-B3EC4FE2070E" + "criteria": "cpe:2.3:a:razormist:online_discussion_forum_site:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F1F9F37D-C115-4EC6-A1DD-FFB3869E79C0" } ] } diff --git a/CVE-2022/CVE-2022-319xx/CVE-2022-31913.json b/CVE-2022/CVE-2022-319xx/CVE-2022-31913.json index 833e05100dc..c0c0265da15 100644 --- a/CVE-2022/CVE-2022-319xx/CVE-2022-31913.json +++ b/CVE-2022/CVE-2022-319xx/CVE-2022-31913.json @@ -2,7 +2,7 @@ "id": "CVE-2022-31913", "sourceIdentifier": "cve@mitre.org", "published": "2022-06-16T15:15:09.697", - "lastModified": "2024-11-21T07:05:28.970", + "lastModified": "2025-04-22T14:51:37.563", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -85,8 +85,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:online_discussion_forum_site_project:online_discussion_forum_site:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "424B4A51-6600-4C40-86AF-B3EC4FE2070E" + "criteria": "cpe:2.3:a:razormist:online_discussion_forum_site:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F1F9F37D-C115-4EC6-A1DD-FFB3869E79C0" } ] } diff --git a/CVE-2022/CVE-2022-31xx/CVE-2022-3105.json b/CVE-2022/CVE-2022-31xx/CVE-2022-3105.json index 37dc852a340..3650c5c0310 100644 --- a/CVE-2022/CVE-2022-31xx/CVE-2022-3105.json +++ b/CVE-2022/CVE-2022-31xx/CVE-2022-3105.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3105", "sourceIdentifier": "secalert@redhat.com", "published": "2022-12-14T21:15:11.567", - "lastModified": "2024-11-21T07:18:50.190", + "lastModified": "2025-04-22T15:15:59.113", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,13 +36,33 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-31xx/CVE-2022-3107.json b/CVE-2022/CVE-2022-31xx/CVE-2022-3107.json index c213452b231..24d1fd337a9 100644 --- a/CVE-2022/CVE-2022-31xx/CVE-2022-3107.json +++ b/CVE-2022/CVE-2022-31xx/CVE-2022-3107.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3107", "sourceIdentifier": "secalert@redhat.com", "published": "2022-12-14T21:15:11.943", - "lastModified": "2024-11-21T07:18:50.430", + "lastModified": "2025-04-22T15:15:59.307", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-476" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-31xx/CVE-2022-3108.json b/CVE-2022/CVE-2022-31xx/CVE-2022-3108.json index 180be99bc7a..94316c6e807 100644 --- a/CVE-2022/CVE-2022-31xx/CVE-2022-3108.json +++ b/CVE-2022/CVE-2022-31xx/CVE-2022-3108.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3108", "sourceIdentifier": "secalert@redhat.com", "published": "2022-12-14T21:15:12.087", - "lastModified": "2024-11-21T07:18:50.553", + "lastModified": "2025-04-22T15:15:59.493", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-252" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-252" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-31xx/CVE-2022-3110.json b/CVE-2022/CVE-2022-31xx/CVE-2022-3110.json index 662e914d1ad..2fde0d1e88e 100644 --- a/CVE-2022/CVE-2022-31xx/CVE-2022-3110.json +++ b/CVE-2022/CVE-2022-31xx/CVE-2022-3110.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3110", "sourceIdentifier": "secalert@redhat.com", "published": "2022-12-14T21:15:12.257", - "lastModified": "2024-11-21T07:18:50.813", + "lastModified": "2025-04-22T14:15:19.660", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,13 +36,33 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-31xx/CVE-2022-3111.json b/CVE-2022/CVE-2022-31xx/CVE-2022-3111.json index 4030009a3ef..29bb42f547a 100644 --- a/CVE-2022/CVE-2022-31xx/CVE-2022-3111.json +++ b/CVE-2022/CVE-2022-31xx/CVE-2022-3111.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3111", "sourceIdentifier": "secalert@redhat.com", "published": "2022-12-14T21:15:12.407", - "lastModified": "2024-11-21T07:18:50.950", + "lastModified": "2025-04-22T14:15:19.850", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-476" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-31xx/CVE-2022-3112.json b/CVE-2022/CVE-2022-31xx/CVE-2022-3112.json index b16e2df9b2c..997d2b88785 100644 --- a/CVE-2022/CVE-2022-31xx/CVE-2022-3112.json +++ b/CVE-2022/CVE-2022-31xx/CVE-2022-3112.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3112", "sourceIdentifier": "secalert@redhat.com", "published": "2022-12-14T21:15:12.527", - "lastModified": "2024-11-21T07:18:51.087", + "lastModified": "2025-04-22T14:15:20.037", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-476" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-31xx/CVE-2022-3113.json b/CVE-2022/CVE-2022-31xx/CVE-2022-3113.json index da85c0f401b..c4a60336db8 100644 --- a/CVE-2022/CVE-2022-31xx/CVE-2022-3113.json +++ b/CVE-2022/CVE-2022-31xx/CVE-2022-3113.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3113", "sourceIdentifier": "secalert@redhat.com", "published": "2022-12-14T21:15:12.653", - "lastModified": "2024-11-21T07:18:51.223", + "lastModified": "2025-04-22T14:15:20.220", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-476" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-31xx/CVE-2022-3114.json b/CVE-2022/CVE-2022-31xx/CVE-2022-3114.json index 3a122064aab..68ccf82e259 100644 --- a/CVE-2022/CVE-2022-31xx/CVE-2022-3114.json +++ b/CVE-2022/CVE-2022-31xx/CVE-2022-3114.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3114", "sourceIdentifier": "secalert@redhat.com", "published": "2022-12-14T21:15:12.783", - "lastModified": "2024-11-21T07:18:51.347", + "lastModified": "2025-04-22T14:15:21.347", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-476" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-31xx/CVE-2022-3115.json b/CVE-2022/CVE-2022-31xx/CVE-2022-3115.json index 0752830f828..61973360ba9 100644 --- a/CVE-2022/CVE-2022-31xx/CVE-2022-3115.json +++ b/CVE-2022/CVE-2022-31xx/CVE-2022-3115.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3115", "sourceIdentifier": "secalert@redhat.com", "published": "2022-12-14T21:15:12.917", - "lastModified": "2024-11-21T07:18:51.477", + "lastModified": "2025-04-22T14:15:21.723", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-476" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33238.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33238.json index 85b697a114b..352ae4399ba 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33238.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33238.json @@ -2,7 +2,7 @@ "id": "CVE-2022-33238", "sourceIdentifier": "product-security@qualcomm.com", "published": "2022-12-13T16:15:21.287", - "lastModified": "2024-11-21T07:07:49.897", + "lastModified": "2025-04-22T14:15:18.717", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-835" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-835" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33268.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33268.json index b8d3b480492..f37f837718f 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33268.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33268.json @@ -2,7 +2,7 @@ "id": "CVE-2022-33268", "sourceIdentifier": "product-security@qualcomm.com", "published": "2022-12-13T16:15:21.363", - "lastModified": "2024-11-21T07:07:57.623", + "lastModified": "2025-04-22T14:15:19.420", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-35xx/CVE-2022-3509.json b/CVE-2022/CVE-2022-35xx/CVE-2022-3509.json index 57d7ef957c4..4bc79c3f532 100644 --- a/CVE-2022/CVE-2022-35xx/CVE-2022-3509.json +++ b/CVE-2022/CVE-2022-35xx/CVE-2022-3509.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3509", "sourceIdentifier": "cve-coordination@google.com", "published": "2022-12-12T13:15:14.607", - "lastModified": "2024-11-21T07:19:40.570", + "lastModified": "2025-04-22T15:15:59.683", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-35xx/CVE-2022-3510.json b/CVE-2022/CVE-2022-35xx/CVE-2022-3510.json index f98a1ae9048..42b2d789892 100644 --- a/CVE-2022/CVE-2022-35xx/CVE-2022-3510.json +++ b/CVE-2022/CVE-2022-35xx/CVE-2022-3510.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3510", "sourceIdentifier": "cve-coordination@google.com", "published": "2022-12-12T13:15:14.670", - "lastModified": "2024-11-21T07:19:40.690", + "lastModified": "2025-04-22T15:15:59.860", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-36xx/CVE-2022-3605.json b/CVE-2022/CVE-2022-36xx/CVE-2022-3605.json index 29c444ecfa0..66087450538 100644 --- a/CVE-2022/CVE-2022-36xx/CVE-2022-3605.json +++ b/CVE-2022/CVE-2022-36xx/CVE-2022-3605.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3605", "sourceIdentifier": "contact@wpscan.com", "published": "2022-12-12T18:15:10.727", - "lastModified": "2024-11-21T07:19:52.013", + "lastModified": "2025-04-22T15:16:00.027", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2022/CVE-2022-36xx/CVE-2022-3609.json b/CVE-2022/CVE-2022-36xx/CVE-2022-3609.json index 16a4fc5089b..cc3cf14f40d 100644 --- a/CVE-2022/CVE-2022-36xx/CVE-2022-3609.json +++ b/CVE-2022/CVE-2022-36xx/CVE-2022-3609.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3609", "sourceIdentifier": "contact@wpscan.com", "published": "2022-12-12T18:15:10.840", - "lastModified": "2024-11-21T07:19:52.543", + "lastModified": "2025-04-22T15:16:00.213", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-38xx/CVE-2022-3853.json b/CVE-2022/CVE-2022-38xx/CVE-2022-3853.json index 271ad342554..afae0060885 100644 --- a/CVE-2022/CVE-2022-38xx/CVE-2022-3853.json +++ b/CVE-2022/CVE-2022-38xx/CVE-2022-3853.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3853", "sourceIdentifier": "contact@wpscan.com", "published": "2022-12-12T18:15:10.907", - "lastModified": "2024-11-21T07:20:22.193", + "lastModified": "2025-04-22T15:16:00.377", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-38xx/CVE-2022-3862.json b/CVE-2022/CVE-2022-38xx/CVE-2022-3862.json index 0e580a7a034..33d9f4189c8 100644 --- a/CVE-2022/CVE-2022-38xx/CVE-2022-3862.json +++ b/CVE-2022/CVE-2022-38xx/CVE-2022-3862.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3862", "sourceIdentifier": "contact@wpscan.com", "published": "2022-12-12T18:15:10.977", - "lastModified": "2024-11-21T07:20:23.193", + "lastModified": "2025-04-22T15:16:00.560", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-39xx/CVE-2022-3900.json b/CVE-2022/CVE-2022-39xx/CVE-2022-3900.json index 06250a190ca..565e85fa382 100644 --- a/CVE-2022/CVE-2022-39xx/CVE-2022-3900.json +++ b/CVE-2022/CVE-2022-39xx/CVE-2022-3900.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3900", "sourceIdentifier": "contact@wpscan.com", "published": "2022-12-12T18:15:11.410", - "lastModified": "2024-11-21T07:20:29.713", + "lastModified": "2025-04-22T15:16:00.807", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2022/CVE-2022-39xx/CVE-2022-3915.json b/CVE-2022/CVE-2022-39xx/CVE-2022-3915.json index a174e1a598f..6294a61b77e 100644 --- a/CVE-2022/CVE-2022-39xx/CVE-2022-3915.json +++ b/CVE-2022/CVE-2022-39xx/CVE-2022-3915.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3915", "sourceIdentifier": "contact@wpscan.com", "published": "2022-12-12T18:15:11.817", - "lastModified": "2024-11-21T07:20:31.363", + "lastModified": "2025-04-22T15:16:00.967", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2022/CVE-2022-39xx/CVE-2022-3919.json b/CVE-2022/CVE-2022-39xx/CVE-2022-3919.json index f03819702a6..1ed2c6e4ff8 100644 --- a/CVE-2022/CVE-2022-39xx/CVE-2022-3919.json +++ b/CVE-2022/CVE-2022-39xx/CVE-2022-3919.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3919", "sourceIdentifier": "contact@wpscan.com", "published": "2022-12-12T18:15:11.887", - "lastModified": "2024-11-21T07:20:31.937", + "lastModified": "2025-04-22T15:16:01.110", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-39xx/CVE-2022-3921.json b/CVE-2022/CVE-2022-39xx/CVE-2022-3921.json index f70407604fb..6ca79a9dcc9 100644 --- a/CVE-2022/CVE-2022-39xx/CVE-2022-3921.json +++ b/CVE-2022/CVE-2022-39xx/CVE-2022-3921.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3921", "sourceIdentifier": "contact@wpscan.com", "published": "2022-12-12T18:15:11.970", - "lastModified": "2024-11-21T07:20:32.240", + "lastModified": "2025-04-22T15:16:01.260", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2022/CVE-2022-39xx/CVE-2022-3925.json b/CVE-2022/CVE-2022-39xx/CVE-2022-3925.json index b2e19297b3d..9c988fcddb7 100644 --- a/CVE-2022/CVE-2022-39xx/CVE-2022-3925.json +++ b/CVE-2022/CVE-2022-39xx/CVE-2022-3925.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3925", "sourceIdentifier": "contact@wpscan.com", "published": "2022-12-12T18:15:12.037", - "lastModified": "2024-11-21T07:20:32.760", + "lastModified": "2025-04-22T15:16:01.403", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, diff --git a/CVE-2022/CVE-2022-39xx/CVE-2022-3933.json b/CVE-2022/CVE-2022-39xx/CVE-2022-3933.json index 90051ddbd4e..d6a845fc2e1 100644 --- a/CVE-2022/CVE-2022-39xx/CVE-2022-3933.json +++ b/CVE-2022/CVE-2022-39xx/CVE-2022-3933.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3933", "sourceIdentifier": "contact@wpscan.com", "published": "2022-12-12T18:15:12.167", - "lastModified": "2024-11-21T07:20:33.560", + "lastModified": "2025-04-22T15:16:01.557", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-39xx/CVE-2022-3934.json b/CVE-2022/CVE-2022-39xx/CVE-2022-3934.json index 4785fa1964a..a81b3ba7fc7 100644 --- a/CVE-2022/CVE-2022-39xx/CVE-2022-3934.json +++ b/CVE-2022/CVE-2022-39xx/CVE-2022-3934.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3934", "sourceIdentifier": "contact@wpscan.com", "published": "2022-12-12T18:15:12.230", - "lastModified": "2024-11-21T07:20:33.677", + "lastModified": "2025-04-22T15:16:01.710", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-39xx/CVE-2022-3935.json b/CVE-2022/CVE-2022-39xx/CVE-2022-3935.json index c0fc4745519..9a25856d408 100644 --- a/CVE-2022/CVE-2022-39xx/CVE-2022-3935.json +++ b/CVE-2022/CVE-2022-39xx/CVE-2022-3935.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3935", "sourceIdentifier": "contact@wpscan.com", "published": "2022-12-12T18:15:12.293", - "lastModified": "2025-02-20T18:34:50.990", + "lastModified": "2025-04-22T15:16:01.853", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-39xx/CVE-2022-3981.json b/CVE-2022/CVE-2022-39xx/CVE-2022-3981.json index 5f42b01b7e0..411578c343b 100644 --- a/CVE-2022/CVE-2022-39xx/CVE-2022-3981.json +++ b/CVE-2022/CVE-2022-39xx/CVE-2022-3981.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3981", "sourceIdentifier": "contact@wpscan.com", "published": "2022-12-12T18:15:12.423", - "lastModified": "2024-11-21T07:20:40.197", + "lastModified": "2025-04-22T15:16:02.000", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2022/CVE-2022-39xx/CVE-2022-3982.json b/CVE-2022/CVE-2022-39xx/CVE-2022-3982.json index 9b92648a71c..061379bd393 100644 --- a/CVE-2022/CVE-2022-39xx/CVE-2022-3982.json +++ b/CVE-2022/CVE-2022-39xx/CVE-2022-3982.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3982", "sourceIdentifier": "contact@wpscan.com", "published": "2022-12-12T18:15:12.487", - "lastModified": "2024-11-21T07:20:40.313", + "lastModified": "2025-04-22T15:16:02.157", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2022/CVE-2022-39xx/CVE-2022-3989.json b/CVE-2022/CVE-2022-39xx/CVE-2022-3989.json index 491d1cf9047..238dfdd3940 100644 --- a/CVE-2022/CVE-2022-39xx/CVE-2022-3989.json +++ b/CVE-2022/CVE-2022-39xx/CVE-2022-3989.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3989", "sourceIdentifier": "contact@wpscan.com", "published": "2022-12-12T18:15:12.553", - "lastModified": "2024-11-21T07:20:41.140", + "lastModified": "2025-04-22T15:16:02.310", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2022/CVE-2022-39xx/CVE-2022-3999.json b/CVE-2022/CVE-2022-39xx/CVE-2022-3999.json index 31717dbbdaf..9ade741f0e9 100644 --- a/CVE-2022/CVE-2022-39xx/CVE-2022-3999.json +++ b/CVE-2022/CVE-2022-39xx/CVE-2022-3999.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3999", "sourceIdentifier": "contact@wpscan.com", "published": "2022-12-12T18:15:12.620", - "lastModified": "2024-11-21T07:20:42.517", + "lastModified": "2025-04-22T15:16:02.473", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 } ] }, diff --git a/CVE-2022/CVE-2022-40xx/CVE-2022-4000.json b/CVE-2022/CVE-2022-40xx/CVE-2022-4000.json index acea514c054..968ddf7d996 100644 --- a/CVE-2022/CVE-2022-40xx/CVE-2022-4000.json +++ b/CVE-2022/CVE-2022-40xx/CVE-2022-4000.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4000", "sourceIdentifier": "contact@wpscan.com", "published": "2022-12-12T18:15:12.890", - "lastModified": "2024-11-21T07:34:25.327", + "lastModified": "2025-04-22T15:16:08.140", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-40xx/CVE-2022-4004.json b/CVE-2022/CVE-2022-40xx/CVE-2022-4004.json index 390c84973a9..0337c0f729b 100644 --- a/CVE-2022/CVE-2022-40xx/CVE-2022-4004.json +++ b/CVE-2022/CVE-2022-40xx/CVE-2022-4004.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4004", "sourceIdentifier": "contact@wpscan.com", "published": "2022-12-12T18:15:12.957", - "lastModified": "2024-11-21T07:34:25.797", + "lastModified": "2025-04-22T15:16:08.287", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, diff --git a/CVE-2022/CVE-2022-40xx/CVE-2022-4005.json b/CVE-2022/CVE-2022-40xx/CVE-2022-4005.json index 9753059f8cd..921f231c594 100644 --- a/CVE-2022/CVE-2022-40xx/CVE-2022-4005.json +++ b/CVE-2022/CVE-2022-40xx/CVE-2022-4005.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4005", "sourceIdentifier": "contact@wpscan.com", "published": "2022-12-12T18:15:13.023", - "lastModified": "2024-11-21T07:34:25.913", + "lastModified": "2025-04-22T15:16:08.433", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-40xx/CVE-2022-4016.json b/CVE-2022/CVE-2022-40xx/CVE-2022-4016.json index 1f438bfc30e..b7628356043 100644 --- a/CVE-2022/CVE-2022-40xx/CVE-2022-4016.json +++ b/CVE-2022/CVE-2022-40xx/CVE-2022-4016.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4016", "sourceIdentifier": "contact@wpscan.com", "published": "2022-12-12T18:15:13.167", - "lastModified": "2024-11-21T07:34:27.160", + "lastModified": "2025-04-22T15:16:08.583", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-428xx/CVE-2022-42800.json b/CVE-2022/CVE-2022-428xx/CVE-2022-42800.json index e7437ff990e..5c63fb25d83 100644 --- a/CVE-2022/CVE-2022-428xx/CVE-2022-42800.json +++ b/CVE-2022/CVE-2022-428xx/CVE-2022-42800.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42800", "sourceIdentifier": "product-security@apple.com", "published": "2022-11-01T20:15:22.970", - "lastModified": "2024-11-21T07:25:22.513", + "lastModified": "2025-04-22T15:16:02.973", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-428xx/CVE-2022-42801.json b/CVE-2022/CVE-2022-428xx/CVE-2022-42801.json index 489d6b31855..239764ede6c 100644 --- a/CVE-2022/CVE-2022-428xx/CVE-2022-42801.json +++ b/CVE-2022/CVE-2022-428xx/CVE-2022-42801.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42801", "sourceIdentifier": "product-security@apple.com", "published": "2022-11-01T20:15:23.053", - "lastModified": "2024-11-21T07:25:22.653", + "lastModified": "2025-04-22T15:16:03.253", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-693" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-428xx/CVE-2022-42803.json b/CVE-2022/CVE-2022-428xx/CVE-2022-42803.json index b6214fc02f0..92736ea50b4 100644 --- a/CVE-2022/CVE-2022-428xx/CVE-2022-42803.json +++ b/CVE-2022/CVE-2022-428xx/CVE-2022-42803.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42803", "sourceIdentifier": "product-security@apple.com", "published": "2022-11-01T20:15:23.137", - "lastModified": "2024-11-21T07:25:22.807", + "lastModified": "2025-04-22T15:16:03.427", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.0, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-362" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-428xx/CVE-2022-42806.json b/CVE-2022/CVE-2022-428xx/CVE-2022-42806.json index f6b8b28781d..09eeda9621e 100644 --- a/CVE-2022/CVE-2022-428xx/CVE-2022-42806.json +++ b/CVE-2022/CVE-2022-428xx/CVE-2022-42806.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42806", "sourceIdentifier": "product-security@apple.com", "published": "2022-11-01T20:15:23.217", - "lastModified": "2024-11-21T07:25:23.100", + "lastModified": "2025-04-22T15:16:03.597", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.0, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-362" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-428xx/CVE-2022-42808.json b/CVE-2022/CVE-2022-428xx/CVE-2022-42808.json index e6ce9a1dce8..ca61d9a3807 100644 --- a/CVE-2022/CVE-2022-428xx/CVE-2022-42808.json +++ b/CVE-2022/CVE-2022-428xx/CVE-2022-42808.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42808", "sourceIdentifier": "product-security@apple.com", "published": "2022-11-01T20:15:23.297", - "lastModified": "2024-11-21T07:25:23.350", + "lastModified": "2025-04-22T15:16:03.757", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-428xx/CVE-2022-42809.json b/CVE-2022/CVE-2022-428xx/CVE-2022-42809.json index dfc6131a377..4c426d0d782 100644 --- a/CVE-2022/CVE-2022-428xx/CVE-2022-42809.json +++ b/CVE-2022/CVE-2022-428xx/CVE-2022-42809.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42809", "sourceIdentifier": "product-security@apple.com", "published": "2022-11-01T20:15:23.370", - "lastModified": "2024-11-21T07:25:23.510", + "lastModified": "2025-04-22T15:16:03.920", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-428xx/CVE-2022-42810.json b/CVE-2022/CVE-2022-428xx/CVE-2022-42810.json index 3f25d967db1..0db7911114f 100644 --- a/CVE-2022/CVE-2022-428xx/CVE-2022-42810.json +++ b/CVE-2022/CVE-2022-428xx/CVE-2022-42810.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42810", "sourceIdentifier": "product-security@apple.com", "published": "2022-11-01T20:15:23.440", - "lastModified": "2024-11-21T07:25:23.640", + "lastModified": "2025-04-22T15:16:04.123", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-428xx/CVE-2022-42811.json b/CVE-2022/CVE-2022-428xx/CVE-2022-42811.json index d884b1b08ce..bfeb7727c6f 100644 --- a/CVE-2022/CVE-2022-428xx/CVE-2022-42811.json +++ b/CVE-2022/CVE-2022-428xx/CVE-2022-42811.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42811", "sourceIdentifier": "product-security@apple.com", "published": "2022-11-01T20:15:23.513", - "lastModified": "2024-11-21T07:25:23.780", + "lastModified": "2025-04-22T15:16:04.277", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-428xx/CVE-2022-42813.json b/CVE-2022/CVE-2022-428xx/CVE-2022-42813.json index 315645ce8eb..37fc743f6d5 100644 --- a/CVE-2022/CVE-2022-428xx/CVE-2022-42813.json +++ b/CVE-2022/CVE-2022-428xx/CVE-2022-42813.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42813", "sourceIdentifier": "product-security@apple.com", "published": "2022-11-01T20:15:23.587", - "lastModified": "2024-11-21T07:25:23.910", + "lastModified": "2025-04-22T14:15:22.040", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-295" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-428xx/CVE-2022-42814.json b/CVE-2022/CVE-2022-428xx/CVE-2022-42814.json index cc43f335c01..084040acb2f 100644 --- a/CVE-2022/CVE-2022-428xx/CVE-2022-42814.json +++ b/CVE-2022/CVE-2022-428xx/CVE-2022-42814.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42814", "sourceIdentifier": "product-security@apple.com", "published": "2022-11-01T20:15:23.663", - "lastModified": "2024-11-21T07:25:24.043", + "lastModified": "2025-04-22T14:15:22.297", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-439xx/CVE-2022-43996.json b/CVE-2022/CVE-2022-439xx/CVE-2022-43996.json index 75c8ac2a22f..5a7205af287 100644 --- a/CVE-2022/CVE-2022-439xx/CVE-2022-43996.json +++ b/CVE-2022/CVE-2022-439xx/CVE-2022-43996.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43996", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-13T22:15:10.247", - "lastModified": "2024-11-21T07:27:29.550", + "lastModified": "2025-04-22T15:16:04.453", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-443xx/CVE-2022-44303.json b/CVE-2022/CVE-2022-443xx/CVE-2022-44303.json index 6545fb5dfc2..c6c0f545eda 100644 --- a/CVE-2022/CVE-2022-443xx/CVE-2022-44303.json +++ b/CVE-2022/CVE-2022-443xx/CVE-2022-44303.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44303", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-13T15:15:11.107", - "lastModified": "2024-11-21T07:27:51.750", + "lastModified": "2025-04-22T15:16:04.667", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-448xx/CVE-2022-44832.json b/CVE-2022/CVE-2022-448xx/CVE-2022-44832.json index c421f896923..235c9539b8c 100644 --- a/CVE-2022/CVE-2022-448xx/CVE-2022-44832.json +++ b/CVE-2022/CVE-2022-448xx/CVE-2022-44832.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44832", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-14T15:15:10.467", - "lastModified": "2024-11-21T07:28:29.550", + "lastModified": "2025-04-22T14:15:22.500", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-448xx/CVE-2022-44898.json b/CVE-2022/CVE-2022-448xx/CVE-2022-44898.json index abbbc1abf47..f448d2be977 100644 --- a/CVE-2022/CVE-2022-448xx/CVE-2022-44898.json +++ b/CVE-2022/CVE-2022-448xx/CVE-2022-44898.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44898", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-14T15:15:10.657", - "lastModified": "2024-11-21T07:28:31.563", + "lastModified": "2025-04-22T14:15:22.893", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-456xx/CVE-2022-45689.json b/CVE-2022/CVE-2022-456xx/CVE-2022-45689.json index 0613e44c3f6..72de6bad8e5 100644 --- a/CVE-2022/CVE-2022-456xx/CVE-2022-45689.json +++ b/CVE-2022/CVE-2022-456xx/CVE-2022-45689.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45689", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-13T15:15:11.323", - "lastModified": "2024-11-21T07:29:35.707", + "lastModified": "2025-04-22T15:16:04.870", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-456xx/CVE-2022-45690.json b/CVE-2022/CVE-2022-456xx/CVE-2022-45690.json index e127f754c45..4500fb8607a 100644 --- a/CVE-2022/CVE-2022-456xx/CVE-2022-45690.json +++ b/CVE-2022/CVE-2022-456xx/CVE-2022-45690.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45690", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-13T15:15:11.387", - "lastModified": "2024-11-21T07:29:35.860", + "lastModified": "2025-04-22T15:16:05.057", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-456xx/CVE-2022-45693.json b/CVE-2022/CVE-2022-456xx/CVE-2022-45693.json index 2843382acf2..2e8fcd2bf0f 100644 --- a/CVE-2022/CVE-2022-456xx/CVE-2022-45693.json +++ b/CVE-2022/CVE-2022-456xx/CVE-2022-45693.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45693", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-13T15:15:11.447", - "lastModified": "2024-11-21T07:29:36.013", + "lastModified": "2025-04-22T15:16:05.277", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-458xx/CVE-2022-45871.json b/CVE-2022/CVE-2022-458xx/CVE-2022-45871.json index d75afbbf24d..2af6bff9656 100644 --- a/CVE-2022/CVE-2022-458xx/CVE-2022-45871.json +++ b/CVE-2022/CVE-2022-458xx/CVE-2022-45871.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45871", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-13T15:15:11.527", - "lastModified": "2024-11-21T07:29:52.380", + "lastModified": "2025-04-22T15:16:05.497", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-459xx/CVE-2022-45936.json b/CVE-2022/CVE-2022-459xx/CVE-2022-45936.json index 4f3f52cc202..e4e7bbe8f73 100644 --- a/CVE-2022/CVE-2022-459xx/CVE-2022-45936.json +++ b/CVE-2022/CVE-2022-459xx/CVE-2022-45936.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45936", "sourceIdentifier": "productcert@siemens.com", "published": "2022-12-13T16:15:24.830", - "lastModified": "2024-11-21T07:29:59.960", + "lastModified": "2025-04-22T15:16:05.693", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 } ] }, diff --git a/CVE-2022/CVE-2022-460xx/CVE-2022-46047.json b/CVE-2022/CVE-2022-460xx/CVE-2022-46047.json index b6c6b749e92..f91051cfbdf 100644 --- a/CVE-2022/CVE-2022-460xx/CVE-2022-46047.json +++ b/CVE-2022/CVE-2022-460xx/CVE-2022-46047.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46047", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-13T14:15:10.130", - "lastModified": "2024-11-21T07:30:04.213", + "lastModified": "2025-04-22T15:16:05.870", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-460xx/CVE-2022-46051.json b/CVE-2022/CVE-2022-460xx/CVE-2022-46051.json index 1940b9bbbe8..2b8baa1f043 100644 --- a/CVE-2022/CVE-2022-460xx/CVE-2022-46051.json +++ b/CVE-2022/CVE-2022-460xx/CVE-2022-46051.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46051", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-13T16:15:24.953", - "lastModified": "2024-11-21T07:30:04.360", + "lastModified": "2025-04-22T15:16:06.060", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-460xx/CVE-2022-46058.json b/CVE-2022/CVE-2022-460xx/CVE-2022-46058.json index d34e65d2677..9c3b28edd54 100644 --- a/CVE-2022/CVE-2022-460xx/CVE-2022-46058.json +++ b/CVE-2022/CVE-2022-460xx/CVE-2022-46058.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46058", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-13T14:15:10.180", - "lastModified": "2024-11-21T07:30:04.527", + "lastModified": "2025-04-22T15:16:06.250", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-460xx/CVE-2022-46059.json b/CVE-2022/CVE-2022-460xx/CVE-2022-46059.json index aaa0d89fb01..bb6326313f9 100644 --- a/CVE-2022/CVE-2022-460xx/CVE-2022-46059.json +++ b/CVE-2022/CVE-2022-460xx/CVE-2022-46059.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46059", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-13T15:15:11.603", - "lastModified": "2024-11-21T07:30:04.677", + "lastModified": "2025-04-22T15:16:06.440", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-461xx/CVE-2022-46118.json b/CVE-2022/CVE-2022-461xx/CVE-2022-46118.json index 969e4d89815..35cfc2a6bbc 100644 --- a/CVE-2022/CVE-2022-461xx/CVE-2022-46118.json +++ b/CVE-2022/CVE-2022-461xx/CVE-2022-46118.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46118", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-14T17:15:12.057", - "lastModified": "2024-11-21T07:30:08.530", + "lastModified": "2025-04-22T14:15:23.097", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-461xx/CVE-2022-46119.json b/CVE-2022/CVE-2022-461xx/CVE-2022-46119.json index 5822a1e9b12..f93c6fa7317 100644 --- a/CVE-2022/CVE-2022-461xx/CVE-2022-46119.json +++ b/CVE-2022/CVE-2022-461xx/CVE-2022-46119.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46119", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-14T17:15:12.273", - "lastModified": "2024-11-21T07:30:08.667", + "lastModified": "2025-04-22T14:15:23.283", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-461xx/CVE-2022-46120.json b/CVE-2022/CVE-2022-461xx/CVE-2022-46120.json index c789a3ab7b2..dc0df28089b 100644 --- a/CVE-2022/CVE-2022-461xx/CVE-2022-46120.json +++ b/CVE-2022/CVE-2022-461xx/CVE-2022-46120.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46120", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-14T17:15:12.523", - "lastModified": "2024-11-21T07:30:08.800", + "lastModified": "2025-04-22T14:15:23.497", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-461xx/CVE-2022-46121.json b/CVE-2022/CVE-2022-461xx/CVE-2022-46121.json index bc4b270ee0b..45274cd9c18 100644 --- a/CVE-2022/CVE-2022-461xx/CVE-2022-46121.json +++ b/CVE-2022/CVE-2022-461xx/CVE-2022-46121.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46121", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-14T17:15:12.767", - "lastModified": "2024-11-21T07:30:08.940", + "lastModified": "2025-04-22T14:15:23.710", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-461xx/CVE-2022-46122.json b/CVE-2022/CVE-2022-461xx/CVE-2022-46122.json index 25d9dffdd37..42afaa7712c 100644 --- a/CVE-2022/CVE-2022-461xx/CVE-2022-46122.json +++ b/CVE-2022/CVE-2022-461xx/CVE-2022-46122.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46122", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-14T17:15:13.033", - "lastModified": "2024-11-21T07:30:09.087", + "lastModified": "2025-04-22T14:15:23.890", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-463xx/CVE-2022-46354.json b/CVE-2022/CVE-2022-463xx/CVE-2022-46354.json index 014947aa809..b0483123861 100644 --- a/CVE-2022/CVE-2022-463xx/CVE-2022-46354.json +++ b/CVE-2022/CVE-2022-463xx/CVE-2022-46354.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46354", "sourceIdentifier": "productcert@siemens.com", "published": "2022-12-13T16:15:25.917", - "lastModified": "2024-11-21T07:30:26.940", + "lastModified": "2025-04-22T15:16:06.610", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, diff --git a/CVE-2022/CVE-2022-463xx/CVE-2022-46355.json b/CVE-2022/CVE-2022-463xx/CVE-2022-46355.json index 8255a406a49..b047047b156 100644 --- a/CVE-2022/CVE-2022-463xx/CVE-2022-46355.json +++ b/CVE-2022/CVE-2022-463xx/CVE-2022-46355.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46355", "sourceIdentifier": "productcert@siemens.com", "published": "2022-12-13T16:15:25.977", - "lastModified": "2024-11-21T07:30:27.060", + "lastModified": "2025-04-22T15:16:06.800", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-463xx/CVE-2022-46381.json b/CVE-2022/CVE-2022-463xx/CVE-2022-46381.json index e37e8dc8dc1..81cc307b908 100644 --- a/CVE-2022/CVE-2022-463xx/CVE-2022-46381.json +++ b/CVE-2022/CVE-2022-463xx/CVE-2022-46381.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46381", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-13T22:15:10.300", - "lastModified": "2024-11-21T07:30:29.540", + "lastModified": "2025-04-22T15:16:06.970", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-464xx/CVE-2022-46404.json b/CVE-2022/CVE-2022-464xx/CVE-2022-46404.json index 1ea88b95dfc..dabcd9a4055 100644 --- a/CVE-2022/CVE-2022-464xx/CVE-2022-46404.json +++ b/CVE-2022/CVE-2022-464xx/CVE-2022-46404.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46404", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-13T21:15:11.800", - "lastModified": "2024-11-21T07:30:32.277", + "lastModified": "2025-04-22T15:16:07.160", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-464xx/CVE-2022-46443.json b/CVE-2022/CVE-2022-464xx/CVE-2022-46443.json index b077da72466..ac5450f2dc1 100644 --- a/CVE-2022/CVE-2022-464xx/CVE-2022-46443.json +++ b/CVE-2022/CVE-2022-464xx/CVE-2022-46443.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46443", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-14T18:15:23.920", - "lastModified": "2024-11-21T07:30:35.950", + "lastModified": "2025-04-22T15:16:07.333", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-466xx/CVE-2022-46609.json b/CVE-2022/CVE-2022-466xx/CVE-2022-46609.json index a8511450c3b..99eeeb7085c 100644 --- a/CVE-2022/CVE-2022-466xx/CVE-2022-46609.json +++ b/CVE-2022/CVE-2022-466xx/CVE-2022-46609.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46609", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-14T15:15:10.720", - "lastModified": "2024-11-21T07:30:48.933", + "lastModified": "2025-04-22T15:16:07.530", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2022/CVE-2022-468xx/CVE-2022-46833.json b/CVE-2022/CVE-2022-468xx/CVE-2022-46833.json index bc364d7ca18..2b52d035d68 100644 --- a/CVE-2022/CVE-2022-468xx/CVE-2022-46833.json +++ b/CVE-2022/CVE-2022-468xx/CVE-2022-46833.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46833", "sourceIdentifier": "psirt@sick.de", "published": "2022-12-13T16:15:26.160", - "lastModified": "2024-11-21T07:31:08.473", + "lastModified": "2025-04-22T15:16:07.727", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-468xx/CVE-2022-46834.json b/CVE-2022/CVE-2022-468xx/CVE-2022-46834.json index 69d65799841..3a4ef5f7e27 100644 --- a/CVE-2022/CVE-2022-468xx/CVE-2022-46834.json +++ b/CVE-2022/CVE-2022-468xx/CVE-2022-46834.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46834", "sourceIdentifier": "psirt@sick.de", "published": "2022-12-13T16:15:26.217", - "lastModified": "2024-11-21T07:31:08.637", + "lastModified": "2025-04-22T15:16:07.967", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-284xx/CVE-2023-28451.json b/CVE-2023/CVE-2023-284xx/CVE-2023-28451.json index 1df31f42246..756a19ef6ff 100644 --- a/CVE-2023/CVE-2023-284xx/CVE-2023-28451.json +++ b/CVE-2023/CVE-2023-284xx/CVE-2023-28451.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28451", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-18T15:15:13.900", - "lastModified": "2024-09-20T12:30:17.483", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-22T14:18:15.017", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:technitium:dnsserver:11.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "EEEBE7B3-3742-4A49-97C2-18AFC6BD3368" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/idealeer/89947ca07836fd0f7e9761198ca9a0f3.", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://technitium.com/dns/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-284xx/CVE-2023-28455.json b/CVE-2023/CVE-2023-284xx/CVE-2023-28455.json index 482caa5b059..670096d815f 100644 --- a/CVE-2023/CVE-2023-284xx/CVE-2023-28455.json +++ b/CVE-2023/CVE-2023-284xx/CVE-2023-28455.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28455", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-18T15:15:14.020", - "lastModified": "2024-09-20T12:30:17.483", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-22T14:19:00.513", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:technitium:dnsserver:*:*:*:*:*:*:*:*", + "versionEndIncluding": "11.0.2", + "matchCriteriaId": "BD942BFE-BB3C-48EB-89F8-786EBB97D52F" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/idealeer/89947ca07836fd0f7e9761198ca9a0f3", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://technitium.com/dns/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-284xx/CVE-2023-28456.json b/CVE-2023/CVE-2023-284xx/CVE-2023-28456.json index f46c9af0bc2..a7df0a6eaa4 100644 --- a/CVE-2023/CVE-2023-284xx/CVE-2023-28456.json +++ b/CVE-2023/CVE-2023-284xx/CVE-2023-28456.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28456", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-18T15:15:14.083", - "lastModified": "2024-09-20T12:30:17.483", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-22T14:19:10.400", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:technitium:dnsserver:*:*:*:*:*:*:*:*", + "versionEndIncluding": "11.0.2", + "matchCriteriaId": "BD942BFE-BB3C-48EB-89F8-786EBB97D52F" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/idealeer/89947ca07836fd0f7e9761198ca9a0f3", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://technitium.com/dns/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-284xx/CVE-2023-28457.json b/CVE-2023/CVE-2023-284xx/CVE-2023-28457.json index 63d6b3ef43e..39942ede2be 100644 --- a/CVE-2023/CVE-2023-284xx/CVE-2023-28457.json +++ b/CVE-2023/CVE-2023-284xx/CVE-2023-28457.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28457", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-18T15:15:14.143", - "lastModified": "2024-09-20T12:30:17.483", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-22T14:19:21.567", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:technitium:dnsserver:*:*:*:*:*:*:*:*", + "versionEndIncluding": "11.0.3", + "matchCriteriaId": "65D1D150-9715-488D-8FC8-C29A0DEC0A7B" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/idealeer/89947ca07836fd0f7e9761198ca9a0f3", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://technitium.com/dns/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3007.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3007.json index 6b31e0fed7f..680f79adbbd 100644 --- a/CVE-2023/CVE-2023-30xx/CVE-2023-3007.json +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3007.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3007", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-31T12:15:09.550", - "lastModified": "2024-11-21T08:16:13.547", + "lastModified": "2025-04-22T14:51:37.563", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -111,8 +111,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:student_management_system_project:student_management_system:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "A7B8D380-AE4F-4AA2-AFFA-EA5477647B41" + "criteria": "cpe:2.3:a:kabir-m-alhasan:student_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "DE34A5BA-7A78-468F-B9C4-52C04171930C" } ] } diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3008.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3008.json index 44c2e278c38..c0c00fa2ea9 100644 --- a/CVE-2023/CVE-2023-30xx/CVE-2023-3008.json +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3008.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3008", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-31T12:15:09.640", - "lastModified": "2024-11-21T08:16:13.703", + "lastModified": "2025-04-22T14:51:37.563", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -101,8 +101,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:student_management_system_project:student_management_system:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "A7B8D380-AE4F-4AA2-AFFA-EA5477647B41" + "criteria": "cpe:2.3:a:kabir-m-alhasan:student_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "DE34A5BA-7A78-468F-B9C4-52C04171930C" } ] } diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3143.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3143.json index 378f7b46e70..3554379efe0 100644 --- a/CVE-2023/CVE-2023-31xx/CVE-2023-3143.json +++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3143.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3143", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-07T15:15:09.617", - "lastModified": "2024-11-21T08:16:33.157", + "lastModified": "2025-04-22T14:51:37.563", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -101,8 +101,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:online_discussion_forum_site_project:online_discussion_forum_site:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "424B4A51-6600-4C40-86AF-B3EC4FE2070E" + "criteria": "cpe:2.3:a:razormist:online_discussion_forum_site:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F1F9F37D-C115-4EC6-A1DD-FFB3869E79C0" } ] } diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3144.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3144.json index cdae0ccb7b7..2c56e4cfbe5 100644 --- a/CVE-2023/CVE-2023-31xx/CVE-2023-3144.json +++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3144.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3144", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-07T15:15:09.710", - "lastModified": "2024-11-21T08:16:33.300", + "lastModified": "2025-04-22T14:51:37.563", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -101,8 +101,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:online_discussion_forum_site_project:online_discussion_forum_site:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "424B4A51-6600-4C40-86AF-B3EC4FE2070E" + "criteria": "cpe:2.3:a:razormist:online_discussion_forum_site:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F1F9F37D-C115-4EC6-A1DD-FFB3869E79C0" } ] } diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3145.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3145.json index bbfc63901b5..6d1204bfb3b 100644 --- a/CVE-2023/CVE-2023-31xx/CVE-2023-3145.json +++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3145.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3145", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-07T15:15:09.793", - "lastModified": "2024-11-21T08:16:33.450", + "lastModified": "2025-04-22T14:51:37.563", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -111,8 +111,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:online_discussion_forum_site_project:online_discussion_forum_site:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "424B4A51-6600-4C40-86AF-B3EC4FE2070E" + "criteria": "cpe:2.3:a:razormist:online_discussion_forum_site:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F1F9F37D-C115-4EC6-A1DD-FFB3869E79C0" } ] } diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3146.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3146.json index c56e213446f..8bcd8e75b93 100644 --- a/CVE-2023/CVE-2023-31xx/CVE-2023-3146.json +++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3146.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3146", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-07T16:15:09.523", - "lastModified": "2024-11-21T08:16:33.593", + "lastModified": "2025-04-22T14:51:37.563", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -101,8 +101,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:online_discussion_forum_site_project:online_discussion_forum_site:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "424B4A51-6600-4C40-86AF-B3EC4FE2070E" + "criteria": "cpe:2.3:a:razormist:online_discussion_forum_site:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F1F9F37D-C115-4EC6-A1DD-FFB3869E79C0" } ] } diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3147.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3147.json index d8f5b937252..78534705790 100644 --- a/CVE-2023/CVE-2023-31xx/CVE-2023-3147.json +++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3147.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3147", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-07T16:15:09.630", - "lastModified": "2024-11-21T08:16:33.767", + "lastModified": "2025-04-22T14:51:37.563", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -101,8 +101,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:online_discussion_forum_site_project:online_discussion_forum_site:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "424B4A51-6600-4C40-86AF-B3EC4FE2070E" + "criteria": "cpe:2.3:a:razormist:online_discussion_forum_site:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F1F9F37D-C115-4EC6-A1DD-FFB3869E79C0" } ] } diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3148.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3148.json index a024816f982..d7223561cf4 100644 --- a/CVE-2023/CVE-2023-31xx/CVE-2023-3148.json +++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3148.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3148", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-07T17:15:10.397", - "lastModified": "2024-11-21T08:16:33.907", + "lastModified": "2025-04-22T14:51:37.563", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -101,8 +101,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:online_discussion_forum_site_project:online_discussion_forum_site:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "424B4A51-6600-4C40-86AF-B3EC4FE2070E" + "criteria": "cpe:2.3:a:razormist:online_discussion_forum_site:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F1F9F37D-C115-4EC6-A1DD-FFB3869E79C0" } ] } diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3149.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3149.json index ddb71977e5c..af57e2029d1 100644 --- a/CVE-2023/CVE-2023-31xx/CVE-2023-3149.json +++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3149.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3149", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-07T17:15:10.483", - "lastModified": "2024-11-21T08:16:34.067", + "lastModified": "2025-04-22T14:51:37.563", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -101,8 +101,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:online_discussion_forum_site_project:online_discussion_forum_site:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "424B4A51-6600-4C40-86AF-B3EC4FE2070E" + "criteria": "cpe:2.3:a:razormist:online_discussion_forum_site:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F1F9F37D-C115-4EC6-A1DD-FFB3869E79C0" } ] } diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3150.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3150.json index f6f9baad1a5..716c880bd4a 100644 --- a/CVE-2023/CVE-2023-31xx/CVE-2023-3150.json +++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3150.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3150", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-07T18:15:10.050", - "lastModified": "2024-11-21T08:16:34.220", + "lastModified": "2025-04-22T14:51:37.563", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -101,8 +101,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:online_discussion_forum_site_project:online_discussion_forum_site:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "424B4A51-6600-4C40-86AF-B3EC4FE2070E" + "criteria": "cpe:2.3:a:razormist:online_discussion_forum_site:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F1F9F37D-C115-4EC6-A1DD-FFB3869E79C0" } ] } diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3151.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3151.json index f7fb128ee3a..db28d794be1 100644 --- a/CVE-2023/CVE-2023-31xx/CVE-2023-3151.json +++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3151.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3151", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-07T18:15:10.127", - "lastModified": "2024-11-21T08:16:34.370", + "lastModified": "2025-04-22T14:51:37.563", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -101,8 +101,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:online_discussion_forum_site_project:online_discussion_forum_site:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "424B4A51-6600-4C40-86AF-B3EC4FE2070E" + "criteria": "cpe:2.3:a:razormist:online_discussion_forum_site:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F1F9F37D-C115-4EC6-A1DD-FFB3869E79C0" } ] } diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3152.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3152.json index bd96fd23971..4e778156b26 100644 --- a/CVE-2023/CVE-2023-31xx/CVE-2023-3152.json +++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3152.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3152", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-07T18:15:10.193", - "lastModified": "2024-11-21T08:16:34.520", + "lastModified": "2025-04-22T14:51:37.563", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -101,8 +101,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:online_discussion_forum_site_project:online_discussion_forum_site:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "424B4A51-6600-4C40-86AF-B3EC4FE2070E" + "criteria": "cpe:2.3:a:razormist:online_discussion_forum_site:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F1F9F37D-C115-4EC6-A1DD-FFB3869E79C0" } ] } diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40108.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40108.json index ea4db676934..929b95a1f3a 100644 --- a/CVE-2023/CVE-2023-401xx/CVE-2023-40108.json +++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40108.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40108", "sourceIdentifier": "security@android.com", "published": "2025-01-21T23:15:11.320", - "lastModified": "2025-03-18T15:15:46.217", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-22T14:32:11.403", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2025-01-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40132.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40132.json index 2441bbb791f..d34cb042a76 100644 --- a/CVE-2023/CVE-2023-401xx/CVE-2023-40132.json +++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40132.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40132", "sourceIdentifier": "security@android.com", "published": "2025-01-21T23:15:11.437", - "lastModified": "2025-03-24T17:15:15.680", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-22T14:32:26.373", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2025-01-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51316.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51316.json index 51dbccc1098..cb5e29370b3 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51316.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51316.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51316", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-20T15:15:12.810", - "lastModified": "2025-02-21T18:15:15.783", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-22T14:15:36.210", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpjabbers:bus_reservation_system:1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "D9A5D665-0DAF-4372-B457-095D7E0A6DC7" + } + ] + } + ] + } + ], "references": [ { "url": "https://packetstorm.news/files/id/176497", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "VDB Entry", + "Third Party Advisory" + ] }, { "url": "https://www.phpjabbers.com/bus-reservation-system/#sectionDemo", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51317.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51317.json index 42e0b6c65dc..09d465b689e 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51317.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51317.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51317", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-20T16:15:34.600", - "lastModified": "2025-02-21T20:15:33.510", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-22T14:10:46.450", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpjabbers:restaurant_booking_system:3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "11956F41-0164-4C1D-88E0-60ED8EEEE8B2" + } + ] + } + ] + } + ], "references": [ { "url": "https://packetstorm.news/files/id/176493", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "VDB Entry", + "Third Party Advisory" + ] }, { "url": "https://www.phpjabbers.com/restaurant-booking-system/#sectionDemo", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51318.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51318.json index 1edd4059f93..5bc048e9265 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51318.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51318.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51318", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-20T16:15:34.703", - "lastModified": "2025-02-20T18:15:23.683", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-22T14:05:53.427", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,48 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpjabbers:bus_reservation_system:1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "D9A5D665-0DAF-4372-B457-095D7E0A6DC7" + } + ] + } + ] + } + ], "references": [ { "url": "https://packetstorm.news/files/id/176499", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "VDB Entry", + "Third Party Advisory" + ] }, { "url": "https://www.phpjabbers.com/bus-reservation-system/#sectionDemo", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://packetstorm.news/files/id/176499", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "VDB Entry", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51319.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51319.json index 9986edf32d0..e4d96b4208c 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51319.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51319.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51319", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-20T16:15:34.803", - "lastModified": "2025-02-20T20:15:45.180", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-22T14:04:57.650", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpjabbers:bus_reservation_system:1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "D9A5D665-0DAF-4372-B457-095D7E0A6DC7" + } + ] + } + ] + } + ], "references": [ { "url": "https://packetstorm.news/files/id/176500", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "VDB Entry", + "Third Party Advisory" + ] }, { "url": "https://www.phpjabbers.com/bus-reservation-system/#sectionDemo", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51320.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51320.json index a1395e756f5..d9754702545 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51320.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51320.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51320", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-20T16:15:34.903", - "lastModified": "2025-02-21T20:15:33.667", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-22T14:01:11.920", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpjabbers:night_club_booking_software:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "14F7D9E4-B1AA-4701-9E38-D40377D6FD17" + } + ] + } + ] + } + ], "references": [ { "url": "https://packetstorm.news/files/id/176501", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "VDB Entry", + "Third Party Advisory" + ] }, { "url": "https://www.phpjabbers.com/night-club-booking-software/#sectionDemo", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12951.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12951.json index 8340168627f..ea53cc926c3 100644 --- a/CVE-2024/CVE-2024-129xx/CVE-2024-12951.json +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12951.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12951", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-26T13:15:05.667", - "lastModified": "2024-12-26T16:15:06.730", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-22T15:09:08.513", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,30 +144,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:1000projects:portfolio_management_system_mca:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C2EA77A4-2402-463E-9E5D-A08E8B927CE2" + } + ] + } + ] + } + ], "references": [ { "url": "https://1000projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/dawatermelon/CVE/blob/main/Portfolio%20Management%20System%20MCA%20Project/README3.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.289314", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.289314", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.468644", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/dawatermelon/CVE/blob/main/Portfolio%20Management%20System%20MCA%20Project/README3.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12953.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12953.json index ee3914f9a8d..14ad630d688 100644 --- a/CVE-2024/CVE-2024-129xx/CVE-2024-12953.json +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12953.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12953", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-26T14:15:05.147", - "lastModified": "2024-12-26T16:15:14.487", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-22T15:09:40.237", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,30 +144,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:1000projects:portfolio_management_system_mca:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C2EA77A4-2402-463E-9E5D-A08E8B927CE2" + } + ] + } + ] + } + ], "references": [ { "url": "https://1000projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/dawatermelon/CVE/blob/main/Portfolio%20Management%20System%20MCA%20Project/README4.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.289316", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.289316", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.468769", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/dawatermelon/CVE/blob/main/Portfolio%20Management%20System%20MCA%20Project/README4.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12954.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12954.json index b9a381aac69..24f6879363f 100644 --- a/CVE-2024/CVE-2024-129xx/CVE-2024-12954.json +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12954.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12954", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-26T14:15:06.000", - "lastModified": "2024-12-26T16:15:17.510", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-22T15:10:56.467", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,30 +144,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:1000projects:portfolio_management_system_mca:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C2EA77A4-2402-463E-9E5D-A08E8B927CE2" + } + ] + } + ] + } + ], "references": [ { "url": "https://1000projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/dawatermelon/CVE/blob/main/Portfolio%20Management%20System%20MCA%20Project/README5.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.289317", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.289317", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.468772", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/dawatermelon/CVE/blob/main/Portfolio%20Management%20System%20MCA%20Project/README5.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12956.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12956.json index 5704698a4c8..0a54a1532c8 100644 --- a/CVE-2024/CVE-2024-129xx/CVE-2024-12956.json +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12956.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12956", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-26T15:15:06.953", - "lastModified": "2024-12-26T16:15:22.847", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-22T15:11:03.530", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,30 +144,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:1000projects:portfolio_management_system_mca:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C2EA77A4-2402-463E-9E5D-A08E8B927CE2" + } + ] + } + ] + } + ], "references": [ { "url": "https://1000projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/dawatermelon/CVE/blob/main/Portfolio%20Management%20System%20MCA%20Project/README2.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.289319", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.289319", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.468540", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/dawatermelon/CVE/blob/main/Portfolio%20Management%20System%20MCA%20Project/README2.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12958.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12958.json index 074151d040b..164ee96ee5c 100644 --- a/CVE-2024/CVE-2024-129xx/CVE-2024-12958.json +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12958.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12958", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-26T16:15:25.667", - "lastModified": "2024-12-27T15:15:11.510", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-22T15:11:11.763", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,30 +144,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:1000projects:portfolio_management_system_mca:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C2EA77A4-2402-463E-9E5D-A08E8B927CE2" + } + ] + } + ] + } + ], "references": [ { "url": "https://1000projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/dawatermelon/CVE/blob/main/Portfolio%20Management%20System%20MCA%20Project/README6.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.289323", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.289323", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.468799", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/dawatermelon/CVE/blob/main/Portfolio%20Management%20System%20MCA%20Project/README6.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12961.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12961.json index efb50f5b3c9..e9c2443f871 100644 --- a/CVE-2024/CVE-2024-129xx/CVE-2024-12961.json +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12961.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12961", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-26T18:15:23.463", - "lastModified": "2024-12-26T19:15:07.563", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-22T15:11:20.787", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,30 +144,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:1000projects:portfolio_management_system_mca:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C2EA77A4-2402-463E-9E5D-A08E8B927CE2" + } + ] + } + ] + } + ], "references": [ { "url": "https://1000projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/dawatermelon/CVE/blob/main/Portfolio%20Management%20System%20MCA%20Project/README9.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.289326", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.289326", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.468805", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/dawatermelon/CVE/blob/main/Portfolio%20Management%20System%20MCA%20Project/README9.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12965.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12965.json index 4b0cb0aefce..bea55398868 100644 --- a/CVE-2024/CVE-2024-129xx/CVE-2024-12965.json +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12965.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12965", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-26T21:15:05.767", - "lastModified": "2024-12-27T17:15:07.593", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-22T15:11:51.223", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,30 +144,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:1000projects:portfolio_management_system_mca:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C2EA77A4-2402-463E-9E5D-A08E8B927CE2" + } + ] + } + ] + } + ], "references": [ { "url": "https://1000projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/dawatermelon/CVE/blob/main/Portfolio%20Management%20System%20MCA%20Project/README10.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.289330", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.289330", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.468989", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/dawatermelon/CVE/blob/main/Portfolio%20Management%20System%20MCA%20Project/README10.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13002.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13002.json index e8621eff6c9..7b67c0421e2 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13002.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13002.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13002", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-29T04:15:05.443", - "lastModified": "2024-12-31T17:15:07.460", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-22T15:11:30.947", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,30 +144,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:1000projects:bookstore_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F0449A3F-C6E8-468B-ABBC-9932801A9EEE" + } + ] + } + ] + } + ], "references": [ { "url": "https://1000projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/writeke/CVE/blob/main/BookstoreManagementSystemSQL.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.289663", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.289663", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.469394", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/writeke/CVE/blob/main/BookstoreManagementSystemSQL.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13003.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13003.json index 2ed52f3632a..9489e700927 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13003.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13003.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13003", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-29T04:15:06.620", - "lastModified": "2024-12-31T17:15:07.870", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-22T15:11:41.333", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,30 +144,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:1000projects:portfolio_management_system_mca:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C2EA77A4-2402-463E-9E5D-A08E8B927CE2" + } + ] + } + ] + } + ], "references": [ { "url": "https://1000projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/naotuo/CVE/blob/main/SQL_Injection_in_Portfolio_Management_System.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.289664", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.289664", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.469452", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/naotuo/CVE/blob/main/SQL_Injection_in_Portfolio_Management_System.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13569.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13569.json index 00331018b38..29990cdec0b 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13569.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13569.json @@ -2,16 +2,43 @@ "id": "CVE-2024-13569", "sourceIdentifier": "contact@wpscan.com", "published": "2025-04-22T06:15:44.120", - "lastModified": "2025-04-22T06:15:44.120", + "lastModified": "2025-04-22T15:16:08.767", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Front End Users WordPress plugin through 3.2.32 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin." + }, + { + "lang": "es", + "value": "El complemento Front End Users de WordPress hasta la versi\u00f3n 3.2.32 no depura ni escapa un par\u00e1metro antes de mostrarlo nuevamente en la p\u00e1gina, lo que genera un Cross-Site Scripting reflejado que podr\u00eda usarse contra usuarios con privilegios altos, como el administrador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/b9742440-0e36-4900-b58e-41c9854a62b2/", diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2145.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2145.json index d20bad48702..93c4fb99218 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2145.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2145.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2145", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-03T14:15:52.383", - "lastModified": "2024-11-21T09:09:07.667", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-22T14:55:51.197", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -76,30 +96,69 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:online_mobile_store_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "690877F8-6E16-4F20-91D5-7E411FBB1365" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/vanitashtml/CVE-Dumps/blob/main/Stored%20XSS%20Mobile%20Management%20Store.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.255498", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.255498", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/vanitashtml/CVE-Dumps/blob/main/Stored%20XSS%20Mobile%20Management%20Store.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.255498", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.255498", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2155.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2155.json index 99bd12e90f5..ff7d8e42236 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2155.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2155.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2155", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-04T01:15:07.437", - "lastModified": "2024-11-21T09:09:09.070", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-22T14:46:00.307", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ], "cvssMetricV2": [ @@ -76,30 +96,67 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:best_pos_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A86D4E42-CD06-4E87-A2FE-378E9BABE3A6" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/wkeyi0x1/vul-report/blob/main/Best%20pos%20management%20system%20in%20php/report.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.255587", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.255587", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/wkeyi0x1/vul-report/blob/main/Best%20pos%20management%20system%20in%20php/report.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.255587", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.255587", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-258xx/CVE-2024-25854.json b/CVE-2024/CVE-2024-258xx/CVE-2024-25854.json index ea9bace9e3a..614a9516f43 100644 --- a/CVE-2024/CVE-2024-258xx/CVE-2024-25854.json +++ b/CVE-2024/CVE-2024-258xx/CVE-2024-25854.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25854", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-11T22:15:55.210", - "lastModified": "2024-11-21T09:01:27.533", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-22T14:50:48.157", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:munyweki:insurance_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "826B7388-F683-45AE-908E-A26D1D12CCAD" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/hakkitoklu/hunt/blob/main/Insurance%20Management%20System%20PHP%20and%20MySQL%201.0/xss.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://github.com/hakkitoklu/hunt/blob/main/Insurance%20Management%20System%20PHP%20and%20MySQL%201.0/xss.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-296xx/CVE-2024-29643.json b/CVE-2024/CVE-2024-296xx/CVE-2024-29643.json index 05bf4b549d0..dddbb6744a8 100644 --- a/CVE-2024/CVE-2024-296xx/CVE-2024-29643.json +++ b/CVE-2024/CVE-2024-296xx/CVE-2024-29643.json @@ -2,20 +2,63 @@ "id": "CVE-2024-29643", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-18T15:15:53.197", - "lastModified": "2025-04-21T14:23:45.950", + "lastModified": "2025-04-22T15:16:08.917", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in croogo v.3.0.2 allows an attacker to perform Host header injection via the feed.rss component." + }, + { + "lang": "es", + "value": "Un problema en croogo v.3.0.2 permite a un atacante realizar una inyecci\u00f3n de encabezado de host a trav\u00e9s del componente feed.rss." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-444" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://medium.com/@christbowel6/cve-2024-29643-host-header-injection-in-croogo-v3-0-2-0aded525f574", "source": "cve@mitre.org" + }, + { + "url": "https://medium.com/@christbowel6/cve-2024-29643-host-header-injection-in-croogo-v3-0-2-0aded525f574", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34730.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34730.json index b616317bcca..432cc110052 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34730.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34730.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34730", "sourceIdentifier": "security@android.com", "published": "2025-01-21T23:15:13.297", - "lastModified": "2025-01-22T18:15:18.827", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-22T14:32:46.433", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2025-01-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-366xx/CVE-2024-36694.json b/CVE-2024/CVE-2024-366xx/CVE-2024-36694.json index 0811be4266d..a5d8ea61480 100644 --- a/CVE-2024/CVE-2024-366xx/CVE-2024-36694.json +++ b/CVE-2024/CVE-2024-366xx/CVE-2024-36694.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36694", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-18T20:15:22.637", - "lastModified": "2025-01-23T21:15:14.453", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-22T15:36:02.527", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,30 +51,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:opencart:opencart:4.0.2.3:*:*:*:*:*:*:*", + "matchCriteriaId": "DD96665F-1AB5-44A9-80A4-CFB60B5916CF" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/A3h1nt/CVEs/blob/main/OpenCart/Readme.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/PawaritSanguanpang/CVEs/blob/main/OpenCart/CVE-2024-36694/README.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/opencart/opencart/issues/13863", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://github.com/opencart/opencart/releases/tag/4.0.2.3", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://medium.com/@pawarit.sanguanpang/opencart-v4-0-2-3-server-side-template-injection-0b173a3bdcf9", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://medium.com/@pawarit.sanguanpang/opencart-v4-0-2-3-server-side-template-injection-0b173a3bdcf9", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-400xx/CVE-2024-40071.json b/CVE-2024/CVE-2024-400xx/CVE-2024-40071.json index 58a28c8c9bf..a9f87be6cd1 100644 --- a/CVE-2024/CVE-2024-400xx/CVE-2024-40071.json +++ b/CVE-2024/CVE-2024-400xx/CVE-2024-40071.json @@ -2,20 +2,63 @@ "id": "CVE-2024-40071", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-16T17:15:48.957", - "lastModified": "2025-04-17T20:22:16.240", + "lastModified": "2025-04-22T15:16:09.087", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sourcecodester Online ID Generator System 1.0 was discovered to contain an arbitrary file upload vulnerability via id_generator/classes/SystemSettings.php?f=update_settings. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Sourcecodester Online ID Generator System 1.0 conten\u00eda una vulnerabilidad de carga de archivos arbitrarios mediante id_generator/classes/SystemSettings.php?f=update_settings. Esta vulnerabilidad permite a los atacantes ejecutar c\u00f3digo arbitrario mediante un archivo PHP manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/DiliLearngent/BugReport/blob/main/php/Online-ID-Generator-System/bug2-File-upload-img.md", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/DiliLearngent/BugReport/blob/main/php/Online-ID-Generator-System/bug2-File-upload-img.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-400xx/CVE-2024-40072.json b/CVE-2024/CVE-2024-400xx/CVE-2024-40072.json index 4779db15404..59a43440bd4 100644 --- a/CVE-2024/CVE-2024-400xx/CVE-2024-40072.json +++ b/CVE-2024/CVE-2024-400xx/CVE-2024-40072.json @@ -2,20 +2,63 @@ "id": "CVE-2024-40072", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-16T17:15:49.063", - "lastModified": "2025-04-17T20:22:16.240", + "lastModified": "2025-04-22T15:16:09.297", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sourcecodester Online ID Generator System 1.0 was discovered to contain a SQL injection vulnerability via the id parameter at id_generator/admin/?page=generate/index&id=1." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Sourcecodester Online ID Generator System 1.0 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro id en id_generator/admin/?page=generate/index&id=1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/DiliLearngent/BugReport/blob/main/php/Online-ID-Generator-System/bug3-SQL-Injection-id1.md", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/DiliLearngent/BugReport/blob/main/php/Online-ID-Generator-System/bug3-SQL-Injection-id1.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-400xx/CVE-2024-40073.json b/CVE-2024/CVE-2024-400xx/CVE-2024-40073.json index 3165c0554a1..b6afa1a2f7c 100644 --- a/CVE-2024/CVE-2024-400xx/CVE-2024-40073.json +++ b/CVE-2024/CVE-2024-400xx/CVE-2024-40073.json @@ -2,20 +2,63 @@ "id": "CVE-2024-40073", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-16T17:15:49.170", - "lastModified": "2025-04-17T20:22:16.240", + "lastModified": "2025-04-22T15:16:09.490", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sourcecodester Online ID Generator System 1.0 was discovered to contain a SQL injection vulnerability via the template parameter at id_generator/admin/?page=generate&template=4." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Sourcecodester Online ID Generator System 1.0 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro de plantilla en id_generator/admin/?page=generate&template=4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/DiliLearngent/BugReport/blob/main/php/Online-ID-Generator-System/bug4-SQL-Injection-template.md", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/DiliLearngent/BugReport/blob/main/php/Online-ID-Generator-System/bug4-SQL-Injection-template.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40445.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40445.json new file mode 100644 index 00000000000..2cee42bb26a --- /dev/null +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40445.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-40445", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-22T14:15:24.173", + "lastModified": "2025-04-22T14:15:24.173", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Directory Traversal vulnerability in forkosh Mime Tex before v.1.77 allows an attacker to execute arbitrary code via a crafted file upload" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Oefenweb/mimetex/blob/master/mimetex.c#L12414-L12423", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/TaiYou-TW/CVE-2024-40445_CVE-2024-40446/", + "source": "cve@mitre.org" + }, + { + "url": "https://youtu.be/OII16TteaJw", + "source": "cve@mitre.org" + }, + { + "url": "https://youtu.be/W2KPHFNfgrg", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40446.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40446.json new file mode 100644 index 00000000000..7a5b2de4231 --- /dev/null +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40446.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-40446", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-22T14:15:24.327", + "lastModified": "2025-04-22T14:15:24.327", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in forkosh Mime Tex before v.1.77 allows an attacker to execute arbitrary code via a crafted script" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/TaiYou-TW/CVE-2024-40445_CVE-2024-40446/", + "source": "cve@mitre.org" + }, + { + "url": "https://youtu.be/S3cmZkWIi6o", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40674.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40674.json index 0abb13000df..a8ce96bf6ea 100644 --- a/CVE-2024/CVE-2024-406xx/CVE-2024-40674.json +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40674.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40674", "sourceIdentifier": "security@android.com", "published": "2025-01-28T20:15:49.620", - "lastModified": "2025-02-03T16:15:32.973", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-22T14:27:35.300", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/packages/modules/Wifi/+/debc548ac085ba1ab0582172b97d965e9a1ea43a", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Product" + ] }, { "url": "https://source.android.com/security/bulletin/2024-10-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40675.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40675.json index 85a80339e6b..7f8981cb382 100644 --- a/CVE-2024/CVE-2024-406xx/CVE-2024-40675.json +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40675.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40675", "sourceIdentifier": "security@android.com", "published": "2025-01-28T20:15:49.710", - "lastModified": "2025-02-06T16:15:37.277", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-22T14:27:40.080", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/c6b5490ec659b5854fd429f453f75de5befa6359", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Product" + ] }, { "url": "https://source.android.com/security/bulletin/2024-10-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40676.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40676.json index cb97d9c0dbd..5d92c367702 100644 --- a/CVE-2024/CVE-2024-406xx/CVE-2024-40676.json +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40676.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40676", "sourceIdentifier": "security@android.com", "published": "2025-01-28T20:15:49.800", - "lastModified": "2025-02-06T16:15:37.443", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-22T14:27:53.403", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,57 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/e8a53246607b52b15269f97aef9ba7e928ba2473", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Product" + ] }, { "url": "https://source.android.com/security/bulletin/2024-10-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40677.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40677.json index 180ba527784..06db6230997 100644 --- a/CVE-2024/CVE-2024-406xx/CVE-2024-40677.json +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40677.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40677", "sourceIdentifier": "security@android.com", "published": "2025-01-28T20:15:49.890", - "lastModified": "2025-01-28T21:15:17.797", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-22T14:28:04.243", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,57 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/packages/apps/Settings/+/db26138f07db830e3fb78283d37de3c0296d93cb", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Product" + ] }, { "url": "https://source.android.com/security/bulletin/2024-10-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43095.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43095.json index 4dcda089d11..60de567f4d5 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43095.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43095.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43095", "sourceIdentifier": "security@android.com", "published": "2025-01-21T23:15:13.393", - "lastModified": "2025-01-22T18:15:19.013", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-22T14:32:54.713", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,50 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2025-01-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43096.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43096.json index d8aa76c0f43..e26c6d1e7b7 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43096.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43096.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43096", "sourceIdentifier": "security@android.com", "published": "2025-01-21T23:15:13.497", - "lastModified": "2025-03-19T14:15:36.567", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-22T14:33:03.290", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,50 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2025-01-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43763.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43763.json index 60423e16adc..4a867122d33 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43763.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43763.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43763", "sourceIdentifier": "security@android.com", "published": "2025-01-21T23:15:13.600", - "lastModified": "2025-03-17T17:15:29.567", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-22T14:33:13.450", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,50 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2025-01-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43765.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43765.json index d65ebb93826..27682cd0f0b 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43765.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43765.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43765", "sourceIdentifier": "security@android.com", "published": "2025-01-21T23:15:13.690", - "lastModified": "2025-03-18T14:15:39.920", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-22T14:33:28.127", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,50 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2025-01-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43770.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43770.json index e65b89050c9..e92702da4f3 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43770.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43770.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43770", "sourceIdentifier": "security@android.com", "published": "2025-01-21T23:15:13.790", - "lastModified": "2025-03-18T15:15:53.527", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-22T14:33:37.910", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,50 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2025-01-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43771.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43771.json index bc591e20244..d39501120a9 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43771.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43771.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43771", "sourceIdentifier": "security@android.com", "published": "2025-01-21T23:15:13.880", - "lastModified": "2025-03-18T14:15:40.117", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-22T14:33:48.483", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,50 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2025-01-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-447xx/CVE-2024-44724.json b/CVE-2024/CVE-2024-447xx/CVE-2024-44724.json index 9876b1366ab..cee267c8686 100644 --- a/CVE-2024/CVE-2024-447xx/CVE-2024-44724.json +++ b/CVE-2024/CVE-2024-447xx/CVE-2024-44724.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44724", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-09T20:15:05.050", - "lastModified": "2024-09-10T12:09:50.377", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-22T14:09:05.767", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:autocms_project:autocms:5.4:*:*:*:*:*:*:*", + "matchCriteriaId": "07746BD9-33B7-43BD-A742-EA1878F842D4" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Hebing123/cve/issues/68", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-447xx/CVE-2024-44725.json b/CVE-2024/CVE-2024-447xx/CVE-2024-44725.json index e144ad0fbe8..0fa08486811 100644 --- a/CVE-2024/CVE-2024-447xx/CVE-2024-44725.json +++ b/CVE-2024/CVE-2024-447xx/CVE-2024-44725.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44725", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-09T20:15:05.107", - "lastModified": "2024-09-10T12:09:50.377", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-22T14:08:25.380", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:autocms_project:autocms:5.4:*:*:*:*:*:*:*", + "matchCriteriaId": "07746BD9-33B7-43BD-A742-EA1878F842D4" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Hebing123/cve/issues/69", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-448xx/CVE-2024-44838.json b/CVE-2024/CVE-2024-448xx/CVE-2024-44838.json index 3a2a9decd8f..d173e440ec3 100644 --- a/CVE-2024/CVE-2024-448xx/CVE-2024-44838.json +++ b/CVE-2024/CVE-2024-448xx/CVE-2024-44838.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44838", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-06T22:15:02.147", - "lastModified": "2024-09-09T14:35:06.773", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-22T14:04:24.433", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openrapid:rapidcms:1.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "D66CF166-4A08-45F5-9577-38D3CE25AFBA" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/OpenRapid/rapidcms/issues/17", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-448xx/CVE-2024-44839.json b/CVE-2024/CVE-2024-448xx/CVE-2024-44839.json index c12130e8056..6c48fddb6c6 100644 --- a/CVE-2024/CVE-2024-448xx/CVE-2024-44839.json +++ b/CVE-2024/CVE-2024-448xx/CVE-2024-44839.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44839", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-06T22:15:02.210", - "lastModified": "2024-09-09T15:35:10.797", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-22T14:03:59.667", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openrapid:rapidcms:1.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "D66CF166-4A08-45F5-9577-38D3CE25AFBA" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/OpenRapid/rapidcms/issues/18", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-457xx/CVE-2024-45771.json b/CVE-2024/CVE-2024-457xx/CVE-2024-45771.json index 62215ef8a25..e670c089446 100644 --- a/CVE-2024/CVE-2024-457xx/CVE-2024-45771.json +++ b/CVE-2024/CVE-2024-457xx/CVE-2024-45771.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45771", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-06T22:15:02.267", - "lastModified": "2024-09-09T15:35:11.567", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-22T14:03:43.640", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openrapid:rapidcms:1.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "D66CF166-4A08-45F5-9577-38D3CE25AFBA" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/OpenRapid/rapidcms/issues/17", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-465xx/CVE-2024-46546.json b/CVE-2024/CVE-2024-465xx/CVE-2024-46546.json new file mode 100644 index 00000000000..d2b5e3acb1d --- /dev/null +++ b/CVE-2024/CVE-2024-465xx/CVE-2024-46546.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-46546", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-22T14:15:24.440", + "lastModified": "2025-04-22T15:16:09.687", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "NEXTU FLETA AX1500 WIFI6 Router v1.0.3 was discovered to contain a stack overflow via the url parameter at /boafrm/formFilter. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://ez-net.co.kr/new_2012/customer/download_view.php?cid=&sid=&goods=&cate=&q=&seq=233", + "source": "cve@mitre.org" + }, + { + "url": "https://ez-net.co.kr/new_2012/product/view.php?cid=461&sid=467&q=%C7%C3%B7%B9%C5%B8&seq=3479&page=", + "source": "cve@mitre.org" + }, + { + "url": "https://gist.github.com/laskdjlaskdj12/5b29b8b68f8a2279c9294708f080496b", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49724.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49724.json index 1f5a3787460..5efa0dd635c 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49724.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49724.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49724", "sourceIdentifier": "security@android.com", "published": "2025-01-21T23:15:14.000", - "lastModified": "2025-03-24T18:15:19.873", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-22T14:38:27.650", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,50 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2025-01-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49732.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49732.json index 79731ece85a..81c126c843b 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49732.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49732.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49732", "sourceIdentifier": "security@android.com", "published": "2025-01-21T23:15:14.100", - "lastModified": "2025-03-13T21:15:42.357", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-22T14:38:50.980", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2025-01-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49733.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49733.json index 9c628ddfb6b..b4a2e10c5ae 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49733.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49733.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49733", "sourceIdentifier": "security@android.com", "published": "2025-01-21T23:15:14.197", - "lastModified": "2025-03-25T14:15:26.410", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-22T14:39:04.533", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,50 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2025-01-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49734.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49734.json index 01fe06f0c64..39051c04cc1 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49734.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49734.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49734", "sourceIdentifier": "security@android.com", "published": "2025-01-21T23:15:14.307", - "lastModified": "2025-03-24T17:15:19.163", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-22T14:39:15.560", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,35 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2025-01-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49735.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49735.json index 6b974d3b9b1..5db0cded49b 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49735.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49735.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49735", "sourceIdentifier": "security@android.com", "published": "2025-01-21T23:15:14.393", - "lastModified": "2025-03-19T21:15:36.973", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-22T14:39:30.223", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2025-01-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49736.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49736.json index 5708cd5b6a3..30797798a54 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49736.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49736.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49736", "sourceIdentifier": "security@android.com", "published": "2025-01-21T23:15:14.490", - "lastModified": "2025-03-24T16:15:19.087", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-22T14:39:39.123", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2025-01-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49737.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49737.json index 31d144be2ef..a634524cb09 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49737.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49737.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49737", "sourceIdentifier": "security@android.com", "published": "2025-01-21T23:15:14.593", - "lastModified": "2025-03-18T15:15:55.933", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-22T14:39:48.390", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2025-01-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49738.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49738.json index 1f5db63cd84..01685f2a3d7 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49738.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49738.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49738", "sourceIdentifier": "security@android.com", "published": "2025-01-21T23:15:14.687", - "lastModified": "2025-03-19T15:15:51.480", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-22T14:39:56.780", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,50 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2025-01-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49742.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49742.json index 31d32daea70..34d8cfce93b 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49742.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49742.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49742", "sourceIdentifier": "security@android.com", "published": "2025-01-21T23:15:14.783", - "lastModified": "2025-03-13T14:15:32.930", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-22T14:40:07.417", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,50 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2025-01-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49744.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49744.json index 96df1bfe3d4..bdf5be6e67c 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49744.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49744.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49744", "sourceIdentifier": "security@android.com", "published": "2025-01-21T23:15:14.880", - "lastModified": "2025-03-18T19:15:45.477", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-22T14:40:24.940", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,50 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2025-01-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49745.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49745.json index eece8995b36..3092160e420 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49745.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49745.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49745", "sourceIdentifier": "security@android.com", "published": "2025-01-21T23:15:14.993", - "lastModified": "2025-01-22T15:15:13.707", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-22T14:25:49.193", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,50 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2025-01-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49747.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49747.json index 7f0e14d3826..8fccde30924 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49747.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49747.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49747", "sourceIdentifier": "security@android.com", "published": "2025-01-21T23:15:15.100", - "lastModified": "2025-03-18T15:15:56.117", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-22T14:26:29.657", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,50 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2025-01-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49748.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49748.json index 36e2e7513fd..eca530856c0 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49748.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49748.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49748", "sourceIdentifier": "security@android.com", "published": "2025-01-21T23:15:15.197", - "lastModified": "2025-03-17T16:15:23.360", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-22T14:26:57.320", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,50 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2025-01-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49749.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49749.json index ea0450eb2ec..d38904a23ab 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49749.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49749.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49749", "sourceIdentifier": "security@android.com", "published": "2025-01-21T23:15:15.283", - "lastModified": "2025-03-20T15:15:43.360", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-22T14:27:20.653", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,50 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2025-01-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50608.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50608.json index 6941b075807..39d476f8e8a 100644 --- a/CVE-2024/CVE-2024-506xx/CVE-2024-50608.json +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50608.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50608", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-18T18:15:25.667", - "lastModified": "2025-02-19T15:15:13.970", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-22T14:54:16.733", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:treasuredata:fluent_bit:3.1.9:*:*:*:*:*:*:*", + "matchCriteriaId": "0365AE96-83F3-401B-A605-62703B78773F" + } + ] + } + ] + } + ], "references": [ { "url": "https://fluentbit.io/announcements/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/fluent/fluent-bit/releases", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.ebryx.com/blogs/exploring-cve-2024-50608-and-cve-2024-50609", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50609.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50609.json index 16bba535f45..5a94f3490cf 100644 --- a/CVE-2024/CVE-2024-506xx/CVE-2024-50609.json +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50609.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50609", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-18T18:15:25.833", - "lastModified": "2025-02-19T15:15:14.497", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-22T14:48:17.650", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:treasuredata:fluent_bit:3.1.9:*:*:*:*:*:*:*", + "matchCriteriaId": "0365AE96-83F3-401B-A605-62703B78773F" + } + ] + } + ] + } + ], "references": [ { "url": "https://fluentbit.io/announcements/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/fluent/fluent-bit/releases", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.ebryx.com/blogs/exploring-cve-2024-50608-and-cve-2024-50609", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53924.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53924.json index 09ebbd4659b..1f2e5a4b60c 100644 --- a/CVE-2024/CVE-2024-539xx/CVE-2024-53924.json +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53924.json @@ -2,16 +2,55 @@ "id": "CVE-2024-53924", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-17T18:15:47.603", - "lastModified": "2025-04-17T20:21:05.203", + "lastModified": "2025-04-22T15:16:09.847", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Pycel through 1.0b30, when operating on an untrusted spreadsheet, allows code execution via a crafted formula in a cell, such as one beginning with the =IF(A1=200, eval(\"__import__('os').system( substring." + }, + { + "lang": "es", + "value": "Pycel hasta la versi\u00f3n 1.0b30, cuando se opera en una hoja de c\u00e1lculo no confiable, permite la ejecuci\u00f3n de c\u00f3digo a trav\u00e9s de una f\u00f3rmula creada en una celda, como una que comienza con la subcadena =IF(A1=200, eval(\"__import__('os').system( )." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/aelmosalamy/cb098e61939718d2bb248fd1cc94f287", @@ -28,6 +67,10 @@ { "url": "https://pypi.org/project/pycel/", "source": "cve@mitre.org" + }, + { + "url": "https://gist.github.com/aelmosalamy/cb098e61939718d2bb248fd1cc94f287", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-547xx/CVE-2024-54775.json b/CVE-2024/CVE-2024-547xx/CVE-2024-54775.json index 5935aa303dc..4d35f2d8a34 100644 --- a/CVE-2024/CVE-2024-547xx/CVE-2024-54775.json +++ b/CVE-2024/CVE-2024-547xx/CVE-2024-54775.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54775", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-27T22:15:12.117", - "lastModified": "2024-12-28T17:15:07.733", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-22T15:46:43.310", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,36 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dcatadmin:dcat_admin:2.2.0:beta:*:*:*:*:*:*", + "matchCriteriaId": "FDDF8F51-8D1A-4BB6-AFAD-C2320CDD4DFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dcatadmin:dcat_admin:2.2.2:beta:*:*:*:*:*:*", + "matchCriteriaId": "CAE044DD-27C5-49C2-BDF6-81BFB0E648D9" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/taynes-llllzt/taynes/issues/5", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-561xx/CVE-2024-56170.json b/CVE-2024/CVE-2024-561xx/CVE-2024-56170.json index 22a56dd2efb..69920277605 100644 --- a/CVE-2024/CVE-2024-561xx/CVE-2024-56170.json +++ b/CVE-2024/CVE-2024-561xx/CVE-2024-56170.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56170", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-18T05:15:09.093", - "lastModified": "2024-12-26T19:15:08.283", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-22T15:35:05.487", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nicmx:fort-validator:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.6.6", + "matchCriteriaId": "A7AF0CB2-A742-4215-8885-81068A9382B3" + } + ] + } + ] + } + ], "references": [ { "url": "https://nicmx.github.io/FORT-validator/CVE.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-563xx/CVE-2024-56310.json b/CVE-2024/CVE-2024-563xx/CVE-2024-56310.json index 7fd5c30dc99..2e36fb2435f 100644 --- a/CVE-2024/CVE-2024-563xx/CVE-2024-56310.json +++ b/CVE-2024/CVE-2024-563xx/CVE-2024-56310.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56310", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-22T21:15:16.433", - "lastModified": "2025-03-19T14:15:37.850", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-22T15:37:46.670", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vanderbilt:redcap:*:*:*:*:*:*:*:*", + "versionEndIncluding": "14.9.6", + "matchCriteriaId": "08C656CE-426D-43CB-BB3A-92EDFA9B40B6" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ping-oui-no/Vulnerability-Research-CVESS/tree/main/RedCap", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.evms.edu/research/resources_services/redcap/redcap_change_log/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-563xx/CVE-2024-56311.json b/CVE-2024/CVE-2024-563xx/CVE-2024-56311.json index 8160f926370..ce8b597c2a7 100644 --- a/CVE-2024/CVE-2024-563xx/CVE-2024-56311.json +++ b/CVE-2024/CVE-2024-563xx/CVE-2024-56311.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56311", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-22T21:15:16.600", - "lastModified": "2025-03-13T19:15:48.973", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-22T15:43:27.140", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vanderbilt:redcap:*:*:*:*:*:*:*:*", + "versionEndIncluding": "14.9.6", + "matchCriteriaId": "08C656CE-426D-43CB-BB3A-92EDFA9B40B6" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ping-oui-no/Vulnerability-Research-CVESS/tree/main/RedCap", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.evms.edu/research/resources_services/redcap/redcap_change_log/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-563xx/CVE-2024-56312.json b/CVE-2024/CVE-2024-563xx/CVE-2024-56312.json index ae04f0db988..97fca4bbdd2 100644 --- a/CVE-2024/CVE-2024-563xx/CVE-2024-56312.json +++ b/CVE-2024/CVE-2024-563xx/CVE-2024-56312.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56312", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-22T22:15:05.630", - "lastModified": "2025-03-18T15:15:57.893", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-22T15:43:32.430", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vanderbilt:redcap:*:*:*:*:*:*:*:*", + "versionEndIncluding": "14.9.6", + "matchCriteriaId": "08C656CE-426D-43CB-BB3A-92EDFA9B40B6" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ping-oui-no/Vulnerability-Research-CVESS/tree/main/RedCap", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.evms.edu/research/resources_services/redcap/redcap_change_log/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-563xx/CVE-2024-56313.json b/CVE-2024/CVE-2024-563xx/CVE-2024-56313.json index 09d69a04698..e1666575b92 100644 --- a/CVE-2024/CVE-2024-563xx/CVE-2024-56313.json +++ b/CVE-2024/CVE-2024-563xx/CVE-2024-56313.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56313", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-22T22:15:06.540", - "lastModified": "2025-03-18T14:15:40.837", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-22T15:43:40.670", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vanderbilt:redcap:*:*:*:*:*:*:*:*", + "versionEndIncluding": "14.9.6", + "matchCriteriaId": "08C656CE-426D-43CB-BB3A-92EDFA9B40B6" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ping-oui-no/Vulnerability-Research-CVESS/tree/main/RedCap", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.evms.edu/research/resources_services/redcap/redcap_change_log/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-563xx/CVE-2024-56314.json b/CVE-2024/CVE-2024-563xx/CVE-2024-56314.json index b7a4d4a88bc..18fa4abf4f4 100644 --- a/CVE-2024/CVE-2024-563xx/CVE-2024-56314.json +++ b/CVE-2024/CVE-2024-563xx/CVE-2024-56314.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56314", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-22T22:15:06.670", - "lastModified": "2025-03-17T17:15:34.553", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-22T15:43:45.323", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vanderbilt:redcap:*:*:*:*:*:*:*:*", + "versionEndIncluding": "14.9.6", + "matchCriteriaId": "08C656CE-426D-43CB-BB3A-92EDFA9B40B6" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ping-oui-no/Vulnerability-Research-CVESS/tree/main/RedCap", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.evms.edu/research/resources_services/redcap/redcap_change_log/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-563xx/CVE-2024-56375.json b/CVE-2024/CVE-2024-563xx/CVE-2024-56375.json index 2275afdd219..e7e26f4fd4a 100644 --- a/CVE-2024/CVE-2024-563xx/CVE-2024-56375.json +++ b/CVE-2024/CVE-2024-563xx/CVE-2024-56375.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56375", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-22T23:15:06.613", - "lastModified": "2024-12-26T06:15:06.203", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-22T15:54:43.887", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,14 +61,43 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nicmx:fort_validator:1.6.3:*:*:*:*:*:*:*", + "matchCriteriaId": "2E9FD78E-6B64-44C5-B008-E8C80D24E293" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nicmx:fort_validator:1.6.4:*:*:*:*:*:*:*", + "matchCriteriaId": "AE6BA852-9F48-4736-AC29-B6B4E48974EF" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/NICMx/FORT-validator/issues/154", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://nicmx.github.io/FORT-validator/CVE.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-565xx/CVE-2024-56518.json b/CVE-2024/CVE-2024-565xx/CVE-2024-56518.json index 6111e80fc59..72bd21edbc4 100644 --- a/CVE-2024/CVE-2024-565xx/CVE-2024-56518.json +++ b/CVE-2024/CVE-2024-565xx/CVE-2024-56518.json @@ -2,16 +2,55 @@ "id": "CVE-2024-56518", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-17T16:15:27.900", - "lastModified": "2025-04-17T20:21:48.243", + "lastModified": "2025-04-22T15:16:10.023", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Hazelcast Management Center through 6.0 allows remote code execution via a JndiLoginModule user.provider.url in a hazelcast-client XML document (aka a client configuration file), which can be uploaded at the /cluster-connections URI." + }, + { + "lang": "es", + "value": "Hazelcast Management Center hasta la versi\u00f3n 6.0 permite la ejecuci\u00f3n remota de c\u00f3digo a trav\u00e9s de un JndiLoginModule user.provider.url en un documento XML de hazelcast-client (tambi\u00e9n conocido como archivo de configuraci\u00f3n de cliente), que se puede cargar en la URI /cluster-connections." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://docs.hazelcast.com/management-center/6.0-snapshot/getting-started/install", diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56921.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56921.json index c3cb5ac2919..b1657dd6a7f 100644 --- a/CVE-2024/CVE-2024-569xx/CVE-2024-56921.json +++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56921.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56921", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-03T20:15:33.610", - "lastModified": "2025-03-22T14:15:15.787", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-22T14:58:46.420", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +61,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open5gs:open5gs:2.7.2:*:*:*:*:*:*:*", + "matchCriteriaId": "EF9D15AB-E6DD-49A1-8E1A-7310086EF4D9" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/open5gs/open5gs/commit/f780f9af45c27b6f49987d96ba71dedb3dd85840", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/open5gs/open5gs/issues/3608", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-574xx/CVE-2024-57433.json b/CVE-2024/CVE-2024-574xx/CVE-2024-57433.json index ebc42b266a6..b9b636b833e 100644 --- a/CVE-2024/CVE-2024-574xx/CVE-2024-57433.json +++ b/CVE-2024/CVE-2024-574xx/CVE-2024-57433.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57433", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-31T22:15:12.383", - "lastModified": "2025-03-18T19:15:46.680", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-22T15:32:09.543", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:macrozheng:mall-tiny:1.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "47F662EE-DFD9-48F0-9F7C-8474EF417F1E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/peccc/restful_vul/blob/main/mall_tiny_logout_failed/mall_tiny_logout_failed.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-574xx/CVE-2024-57434.json b/CVE-2024/CVE-2024-574xx/CVE-2024-57434.json index c7571b1146a..ef8a379b45c 100644 --- a/CVE-2024/CVE-2024-574xx/CVE-2024-57434.json +++ b/CVE-2024/CVE-2024-574xx/CVE-2024-57434.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57434", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-31T22:15:12.613", - "lastModified": "2025-02-03T21:15:14.600", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-22T15:29:06.090", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:macrozheng:mall-tiny:1.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "47F662EE-DFD9-48F0-9F7C-8474EF417F1E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/peccc/restful_vul/blob/main/mall_tiny_weak_password/mall_tiny_weak_password.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/peccc/restful_vul/blob/main/mall_tiny_weak_password/mall_tiny_weak_password.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-574xx/CVE-2024-57435.json b/CVE-2024/CVE-2024-574xx/CVE-2024-57435.json index d54497e32c0..20dfa8c75d8 100644 --- a/CVE-2024/CVE-2024-574xx/CVE-2024-57435.json +++ b/CVE-2024/CVE-2024-574xx/CVE-2024-57435.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57435", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-31T22:15:13.103", - "lastModified": "2025-02-03T21:15:14.747", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-22T15:27:10.410", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:macrozheng:mall-tiny:1.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "47F662EE-DFD9-48F0-9F7C-8474EF417F1E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/peccc/restful_vul/blob/main/mall_tiny_dos/mall_tiny_dos.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/peccc/restful_vul/blob/main/mall_tiny_dos/mall_tiny_dos.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-574xx/CVE-2024-57493.json b/CVE-2024/CVE-2024-574xx/CVE-2024-57493.json index 05f8eef1b53..79555e6ab72 100644 --- a/CVE-2024/CVE-2024-574xx/CVE-2024-57493.json +++ b/CVE-2024/CVE-2024-574xx/CVE-2024-57493.json @@ -2,7 +2,7 @@ "id": "CVE-2024-57493", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-18T20:15:15.913", - "lastModified": "2025-04-21T14:23:45.950", + "lastModified": "2025-04-22T14:15:24.613", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en redoxOS relibc antes de el commit 98aa4ea5 permite que un atacante local provoque una denegaci\u00f3n de servicio a trav\u00e9s de la funci\u00f3n setsockopt." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-404" + } + ] + } + ], "references": [ { "url": "https://github.com/Marsman1996/pocs/tree/master/redox/CVE-2024-57493", @@ -28,6 +63,10 @@ { "url": "https://gitlab.redox-os.org/redox-os/relibc/-/merge_requests/566", "source": "cve@mitre.org" + }, + { + "url": "https://gitlab.redox-os.org/redox-os/relibc/-/issues/201", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57536.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57536.json index 098e654c5a2..8c23a1a0909 100644 --- a/CVE-2024/CVE-2024-575xx/CVE-2024-57536.json +++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57536.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57536", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T21:15:11.563", - "lastModified": "2025-01-22T21:15:10.100", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-22T14:11:56.087", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linksys:e8450_firmware:1.2.00.360516:*:*:*:*:*:*:*", + "matchCriteriaId": "DDF62C66-AF67-4A60-A41E-77C0FB526D53" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:linksys:e8450:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CFEF3B59-D5D1-4234-9925-FCB53E45AC1A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Wood1314/Linksys_E8450_vul/blob/main/8/8.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/Wood1314/Linksys_E8450_vul/blob/main/8/8.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57537.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57537.json index 1472eceb25a..987f6d8ce44 100644 --- a/CVE-2024/CVE-2024-575xx/CVE-2024-57537.json +++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57537.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57537", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T21:15:11.683", - "lastModified": "2025-01-22T21:15:10.287", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-22T14:11:50.577", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linksys:e8450_firmware:1.2.00.360516:*:*:*:*:*:*:*", + "matchCriteriaId": "DDF62C66-AF67-4A60-A41E-77C0FB526D53" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:linksys:e8450:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CFEF3B59-D5D1-4234-9925-FCB53E45AC1A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Wood1314/Linksys_E8450_vul/blob/main/1/1.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/Wood1314/Linksys_E8450_vul/blob/main/1/1.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57538.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57538.json index 2a45b200d55..deb776950a6 100644 --- a/CVE-2024/CVE-2024-575xx/CVE-2024-57538.json +++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57538.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57538", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T21:15:11.803", - "lastModified": "2025-02-04T16:15:40.017", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-22T14:11:47.103", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,43 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linksys:e8450_firmware:1.2.00.360516:*:*:*:*:*:*:*", + "matchCriteriaId": "DDF62C66-AF67-4A60-A41E-77C0FB526D53" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:linksys:e8450:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CFEF3B59-D5D1-4234-9925-FCB53E45AC1A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Wood1314/Linksys_E8450_vul/blob/main/10/10.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57539.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57539.json index bcb0ed47f22..69581e157c2 100644 --- a/CVE-2024/CVE-2024-575xx/CVE-2024-57539.json +++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57539.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57539", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T21:15:11.920", - "lastModified": "2025-02-04T16:15:40.180", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-22T14:11:43.080", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,43 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linksys:e8450_firmware:1.2.00.360516:*:*:*:*:*:*:*", + "matchCriteriaId": "DDF62C66-AF67-4A60-A41E-77C0FB526D53" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:linksys:e8450:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CFEF3B59-D5D1-4234-9925-FCB53E45AC1A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Wood1314/Linksys_E8450_vul/blob/main/3/3.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57540.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57540.json index fe00be58349..255757680b3 100644 --- a/CVE-2024/CVE-2024-575xx/CVE-2024-57540.json +++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57540.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57540", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T21:15:12.040", - "lastModified": "2025-02-04T16:15:40.340", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-22T14:11:39.350", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,43 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linksys:e8450_firmware:1.2.00.360516:*:*:*:*:*:*:*", + "matchCriteriaId": "DDF62C66-AF67-4A60-A41E-77C0FB526D53" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:linksys:e8450:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CFEF3B59-D5D1-4234-9925-FCB53E45AC1A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Wood1314/Linksys_E8450_vul/blob/main/2/2.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57541.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57541.json index ad02312af92..f1459a0436c 100644 --- a/CVE-2024/CVE-2024-575xx/CVE-2024-57541.json +++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57541.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57541", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T21:15:12.150", - "lastModified": "2025-01-22T21:15:10.453", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-22T14:11:35.027", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linksys:e8450_firmware:1.2.00.360516:*:*:*:*:*:*:*", + "matchCriteriaId": "DDF62C66-AF67-4A60-A41E-77C0FB526D53" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:linksys:e8450:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CFEF3B59-D5D1-4234-9925-FCB53E45AC1A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Wood1314/Linksys_E8450_vul/blob/main/9/9.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/Wood1314/Linksys_E8450_vul/blob/main/9/9.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57542.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57542.json index 81112cbd0be..ca4a2aaa275 100644 --- a/CVE-2024/CVE-2024-575xx/CVE-2024-57542.json +++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57542.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57542", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T21:15:12.273", - "lastModified": "2025-01-22T21:15:10.630", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-22T14:11:31.513", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linksys:e8450_firmware:1.2.00.360516:*:*:*:*:*:*:*", + "matchCriteriaId": "DDF62C66-AF67-4A60-A41E-77C0FB526D53" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:linksys:e8450:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CFEF3B59-D5D1-4234-9925-FCB53E45AC1A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Wood1314/Linksys_E8450_vul/blob/main/4/4.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/Wood1314/Linksys_E8450_vul/blob/main/4/4.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57543.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57543.json index 55bda4d9379..a2c605f3da5 100644 --- a/CVE-2024/CVE-2024-575xx/CVE-2024-57543.json +++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57543.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57543", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T21:15:12.393", - "lastModified": "2025-01-22T21:15:10.837", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-22T14:11:27.543", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linksys:e8450_firmware:1.2.00.360516:*:*:*:*:*:*:*", + "matchCriteriaId": "DDF62C66-AF67-4A60-A41E-77C0FB526D53" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:linksys:e8450:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CFEF3B59-D5D1-4234-9925-FCB53E45AC1A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Wood1314/Linksys_E8450_vul/blob/main/7/7.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/Wood1314/Linksys_E8450_vul/blob/main/7/7.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57544.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57544.json index ab87bbdb262..d8ffd2b69f3 100644 --- a/CVE-2024/CVE-2024-575xx/CVE-2024-57544.json +++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57544.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57544", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T21:15:12.510", - "lastModified": "2025-01-22T22:15:09.613", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-22T14:11:20.973", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linksys:e8450_firmware:1.2.00.360516:*:*:*:*:*:*:*", + "matchCriteriaId": "DDF62C66-AF67-4A60-A41E-77C0FB526D53" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:linksys:e8450:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CFEF3B59-D5D1-4234-9925-FCB53E45AC1A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Wood1314/Linksys_E8450_vul/blob/main/6/6.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/Wood1314/Linksys_E8450_vul/blob/main/6/6.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57545.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57545.json index 6b6c4fb62e6..aa6a7ab9aa5 100644 --- a/CVE-2024/CVE-2024-575xx/CVE-2024-57545.json +++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57545.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57545", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T21:15:12.633", - "lastModified": "2025-01-22T22:15:09.790", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-22T14:11:13.730", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linksys:e8450_firmware:1.2.00.360516:*:*:*:*:*:*:*", + "matchCriteriaId": "DDF62C66-AF67-4A60-A41E-77C0FB526D53" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:linksys:e8450:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CFEF3B59-D5D1-4234-9925-FCB53E45AC1A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Wood1314/Linksys_E8450_vul/blob/main/5/5.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/Wood1314/Linksys_E8450_vul/blob/main/5/5.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7916.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7916.json index 34c2270ea35..abfe4adbca7 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7916.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7916.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7916", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-18T23:15:03.780", - "lastModified": "2024-08-20T19:38:11.163", + "lastModified": "2025-04-22T15:57:26.610", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -149,8 +149,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:insurance_management_system_project:insurance_management_system:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "54E656E7-6742-4ADF-B32D-96350623AEA1" + "criteria": "cpe:2.3:a:nafisulbari:life_insurance_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2F04BFA2-3DE8-4B10-83F7-15FB70301D5F" } ] } diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8208.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8208.json index 73fb0c1c6bb..f6e48c765ba 100644 --- a/CVE-2024/CVE-2024-82xx/CVE-2024-8208.json +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8208.json @@ -2,7 +2,7 @@ "id": "CVE-2024-8208", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-27T18:15:15.950", - "lastModified": "2024-08-29T17:27:02.397", + "lastModified": "2025-04-22T15:55:57.023", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -149,8 +149,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:insurance_management_system_project:insurance_management_system:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "54E656E7-6742-4ADF-B32D-96350623AEA1" + "criteria": "cpe:2.3:a:nafisulbari:life_insurance_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2F04BFA2-3DE8-4B10-83F7-15FB70301D5F" } ] } diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8209.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8209.json index a2c8262ee47..5f712779d15 100644 --- a/CVE-2024/CVE-2024-82xx/CVE-2024-8209.json +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8209.json @@ -2,7 +2,7 @@ "id": "CVE-2024-8209", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-27T18:15:16.617", - "lastModified": "2024-08-29T17:23:42.873", + "lastModified": "2025-04-22T15:56:37.080", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -159,8 +159,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:insurance_management_system_project:insurance_management_system:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "54E656E7-6742-4ADF-B32D-96350623AEA1" + "criteria": "cpe:2.3:a:nafisulbari:life_insurance_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2F04BFA2-3DE8-4B10-83F7-15FB70301D5F" } ] } diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8216.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8216.json index 21958cc35cc..5f431d22fce 100644 --- a/CVE-2024/CVE-2024-82xx/CVE-2024-8216.json +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8216.json @@ -2,7 +2,7 @@ "id": "CVE-2024-8216", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-27T21:15:07.830", - "lastModified": "2024-08-29T15:41:34.107", + "lastModified": "2025-04-22T15:56:56.470", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -159,8 +159,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:insurance_management_system_project:insurance_management_system:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "54E656E7-6742-4ADF-B32D-96350623AEA1" + "criteria": "cpe:2.3:a:nafisulbari:life_insurance_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2F04BFA2-3DE8-4B10-83F7-15FB70301D5F" } ] } diff --git a/CVE-2025/CVE-2025-09xx/CVE-2025-0948.json b/CVE-2025/CVE-2025-09xx/CVE-2025-0948.json index 183f8072cc1..f4e598287b1 100644 --- a/CVE-2025/CVE-2025-09xx/CVE-2025-0948.json +++ b/CVE-2025/CVE-2025-09xx/CVE-2025-0948.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0948", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-01T18:15:27.087", - "lastModified": "2025-02-03T18:15:41.580", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-22T15:19:14.103", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,76 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/magic2353112890/cve/issues/7", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://itsourcecode.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.294303", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.294303", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/magic2353112890/cve/issues/7", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-09xx/CVE-2025-0949.json b/CVE-2025/CVE-2025-09xx/CVE-2025-0949.json index 9cf9656792a..59877a9de5d 100644 --- a/CVE-2025/CVE-2025-09xx/CVE-2025-0949.json +++ b/CVE-2025/CVE-2025-09xx/CVE-2025-0949.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0949", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-01T19:15:08.990", - "lastModified": "2025-02-03T18:15:41.727", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-22T15:12:43.517", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,76 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/magic2353112890/cve/issues/7", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://itsourcecode.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.294304", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.294304", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/magic2353112890/cve/issues/7", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1950.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1950.json new file mode 100644 index 00000000000..6a9c23ef387 --- /dev/null +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1950.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-1950", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-04-22T15:16:10.187", + "lastModified": "2025-04-22T15:16:10.187", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Hardware Management Console - Power Systems V10.2.1030.0 and V10.3.1050.0 could allow a local user to execute commands locally due to improper validation of libraries of an untrusted source." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-114" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7231507", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1951.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1951.json new file mode 100644 index 00000000000..5b624e77c52 --- /dev/null +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1951.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-1951", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-04-22T15:16:10.337", + "lastModified": "2025-04-22T15:16:10.337", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Hardware Management Console - Power Systems V10.2.1030.0 and V10.3.1050.0 could allow a local user to execute commands as a privileged user due to execution of commands with unnecessary privileges." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-250" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7231389", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22957.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22957.json index 0e2e85326c0..0e1cb91c48c 100644 --- a/CVE-2025/CVE-2025-229xx/CVE-2025-22957.json +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22957.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22957", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-31T17:15:16.583", - "lastModified": "2025-03-20T16:15:16.223", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-22T15:37:40.030", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,41 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zzcms:zzcms:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2023", + "matchCriteriaId": "8FD00C13-599B-4944-99F6-83C9F44DB42F" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.zzcms.net/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Product" + ] }, { "url": "https://github.com/youyouiooi/vulnerability-reports/blob/main/CVE-2025-22957/REANDE.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23176.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23176.json new file mode 100644 index 00000000000..03065d2eb80 --- /dev/null +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23176.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23176", + "sourceIdentifier": "cna@cyber.gov.il", + "published": "2025-04-22T15:16:10.480", + "lastModified": "2025-04-22T15:16:10.480", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@cyber.gov.il", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "cna@cyber.gov.il", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0", + "source": "cna@cyber.gov.il" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-25xx/CVE-2025-2594.json b/CVE-2025/CVE-2025-25xx/CVE-2025-2594.json index 70b79e76852..36d7ee6ff39 100644 --- a/CVE-2025/CVE-2025-25xx/CVE-2025-2594.json +++ b/CVE-2025/CVE-2025-25xx/CVE-2025-2594.json @@ -2,16 +2,43 @@ "id": "CVE-2025-2594", "sourceIdentifier": "contact@wpscan.com", "published": "2025-04-22T06:15:44.860", - "lastModified": "2025-04-22T06:15:44.860", + "lastModified": "2025-04-22T15:16:12.563", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The User Registration & Membership WordPress plugin before 4.1.3 does not properly validate data in an AJAX action when the Membership Addon is enabled, allowing attackers to authenticate as any user, including administrators, by simply using the target account's user ID." + }, + { + "lang": "es", + "value": "El complemento User Registration & Membership de WordPress anterior a la versi\u00f3n 4.1.3 no valida correctamente los datos en una acci\u00f3n AJAX cuando el complemento de membres\u00eda est\u00e1 habilitado, lo que permite a los atacantes autenticarse como cualquier usuario, incluidos los administradores, simplemente usando el ID de usuario de la cuenta de destino." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/1c1be47a-d5c0-4ac1-b9fd-475b382a7d8f/", diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27086.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27086.json index 6bbbf726516..7066bbaa749 100644 --- a/CVE-2025/CVE-2025-270xx/CVE-2025-27086.json +++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27086.json @@ -2,16 +2,55 @@ "id": "CVE-2025-27086", "sourceIdentifier": "security-alert@hpe.com", "published": "2025-04-21T18:15:21.113", - "lastModified": "2025-04-21T19:15:19.620", + "lastModified": "2025-04-22T14:15:24.880", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the HPE Performance Cluster Manager (HPCM) GUI could allow an attacker to bypass authentication." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la GUI de HPE Performance Cluster Manager (HPCM) podr\u00eda permitir que un atacante eluda la autenticaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbcr04842en_us&docLocale=en_US", diff --git a/CVE-2025/CVE-2025-280xx/CVE-2025-28032.json b/CVE-2025/CVE-2025-280xx/CVE-2025-28032.json new file mode 100644 index 00000000000..d299670b05a --- /dev/null +++ b/CVE-2025/CVE-2025-280xx/CVE-2025-28032.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-28032", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-22T14:15:25.017", + "lastModified": "2025-04-22T14:15:25.017", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "TOTOLINK A800R V4.1.2cu.5137_B20200730, A810R V4.1.2cu.5182_B20201026, A830R V4.1.2cu.5182_B20201102, A950RG V4.1.2cu.5161_B20200903, A3000RU V5.9c.5185_B20201128, and A3100R V4.1.2cu.5247_B20211129 contain a pre-auth buffer overflow vulnerability in the setNoticeCfg function through the IpForm parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://locrian-lightning-dc7.notion.site/BufferOverflow6-19f8e5e2b1a28052bda1f6ede9db341d", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-280xx/CVE-2025-28033.json b/CVE-2025/CVE-2025-280xx/CVE-2025-28033.json new file mode 100644 index 00000000000..68416fb8819 --- /dev/null +++ b/CVE-2025/CVE-2025-280xx/CVE-2025-28033.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-28033", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-22T14:15:25.150", + "lastModified": "2025-04-22T14:15:25.150", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "TOTOLINK A800R V4.1.2cu.5137_B20200730, A810R V4.1.2cu.5182_B20201026, A830R V4.1.2cu.5182_B20201102, A950RG V4.1.2cu.5161_B20200903, A3000RU V5.9c.5185_B20201128, and A3100R V4.1.2cu.5247_B20211129 were found to contain a pre-auth buffer overflow vulnerability in the setNoticeCfg function through the IpTo parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://locrian-lightning-dc7.notion.site/BufferOverflow7-1a98e5e2b1a280708d6ec6155ce88d8c", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-280xx/CVE-2025-28034.json b/CVE-2025/CVE-2025-280xx/CVE-2025-28034.json new file mode 100644 index 00000000000..2a4549312bd --- /dev/null +++ b/CVE-2025/CVE-2025-280xx/CVE-2025-28034.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-28034", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-22T14:15:25.263", + "lastModified": "2025-04-22T14:15:25.263", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "TOTOLINK A800R V4.1.2cu.5137_B20200730, A810R V4.1.2cu.5182_B20201026, A830R V4.1.2cu.5182_B20201102, A950RG V4.1.2cu.5161_B20200903, A3000RU V5.9c.5185_B20201128, and A3100R V4.1.2cu.5247_B20211129 were found to contain a pre-auth remote command execution vulnerability in the NTPSyncWithHost function through the hostTime parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://locrian-lightning-dc7.notion.site/RCE2-1a98e5e2b1a280bebf53d868f1b1a711?pvs=74", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-280xx/CVE-2025-28059.json b/CVE-2025/CVE-2025-280xx/CVE-2025-28059.json index b89b0fda1b3..5716bc0b13d 100644 --- a/CVE-2025/CVE-2025-280xx/CVE-2025-28059.json +++ b/CVE-2025/CVE-2025-280xx/CVE-2025-28059.json @@ -2,7 +2,7 @@ "id": "CVE-2025-28059", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-18T17:15:34.700", - "lastModified": "2025-04-21T14:23:45.950", + "lastModified": "2025-04-22T15:16:10.627", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de control de acceso en Nagios Network Analyzer 2024R1.0.3 permite que usuarios eliminados conserven el acceso a los recursos del sistema debido a la invalidaci\u00f3n incorrecta de sesiones y al manejo de tokens obsoletos. Cuando un administrador elimina una cuenta de usuario, el backend no finaliza las sesiones activas ni revoca los tokens de API asociados, lo que permite el acceso no autorizado a funciones restringidas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-613" + } + ] + } + ], "references": [ { "url": "https://github.com/aakashtyal/Residual-Data-Access-Post-User-Deletion-in-Nagios-Network-Analyzer-Version-2024R1", diff --git a/CVE-2025/CVE-2025-281xx/CVE-2025-28197.json b/CVE-2025/CVE-2025-281xx/CVE-2025-28197.json index 5619f27061a..76e0e1ab418 100644 --- a/CVE-2025/CVE-2025-281xx/CVE-2025-28197.json +++ b/CVE-2025/CVE-2025-281xx/CVE-2025-28197.json @@ -2,7 +2,7 @@ "id": "CVE-2025-28197", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-18T20:15:16.450", - "lastModified": "2025-04-21T14:23:45.950", + "lastModified": "2025-04-22T14:15:25.370", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Crawl4AI <=0.4.247 es vulnerable a SSRF en /crawl4ai/async_dispatcher.py." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/AndrewDzzz/f49e79b09ce0643ee1fc2a829e8875e0", diff --git a/CVE-2025/CVE-2025-282xx/CVE-2025-28228.json b/CVE-2025/CVE-2025-282xx/CVE-2025-28228.json index 537ccdd66c0..32884b2dc37 100644 --- a/CVE-2025/CVE-2025-282xx/CVE-2025-28228.json +++ b/CVE-2025/CVE-2025-282xx/CVE-2025-28228.json @@ -2,20 +2,63 @@ "id": "CVE-2025-28228", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-18T15:15:58.070", - "lastModified": "2025-04-21T14:23:45.950", + "lastModified": "2025-04-22T15:16:10.817", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A credential exposure vulnerability in Electrolink 500W, 1kW, 2kW Medium DAB Transmitter Web v01.09, v01.08, v01.07, and Display v1.4, v1.2 allows unauthorized attackers to access credentials in plaintext." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de exposici\u00f3n de credenciales en Electrolink 500W, 1kW, 2kW Medium DAB Transmitter Web v01.09, v01.08, v01.07, y Display v1.4, v1.2 permite a atacantes no autorizados acceder a credenciales en texto sin formato. " + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-28228", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-28228", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-282xx/CVE-2025-28229.json b/CVE-2025/CVE-2025-282xx/CVE-2025-28229.json index ab972f315aa..a42da75de44 100644 --- a/CVE-2025/CVE-2025-282xx/CVE-2025-28229.json +++ b/CVE-2025/CVE-2025-282xx/CVE-2025-28229.json @@ -2,20 +2,63 @@ "id": "CVE-2025-28229", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-18T15:15:58.170", - "lastModified": "2025-04-21T14:23:45.950", + "lastModified": "2025-04-22T15:16:10.997", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect access control in Orban OPTIMOD 5950 Firmware v1.0.0.2 and System v2.2.15 allows attackers to bypass authentication and gain Administrator privileges." + }, + { + "lang": "es", + "value": "El control de acceso incorrecto en Orban OPTIMOD 5950 Firmware v1.0.0.2 and System v2.2.15 permite a los atacantes eludir la autenticaci\u00f3n y obtener privilegios de administrador." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-28229", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-28229", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-282xx/CVE-2025-28230.json b/CVE-2025/CVE-2025-282xx/CVE-2025-28230.json index 1f9882a6c55..6d450758f68 100644 --- a/CVE-2025/CVE-2025-282xx/CVE-2025-28230.json +++ b/CVE-2025/CVE-2025-282xx/CVE-2025-28230.json @@ -2,20 +2,63 @@ "id": "CVE-2025-28230", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-18T15:15:58.280", - "lastModified": "2025-04-21T14:23:45.950", + "lastModified": "2025-04-22T15:16:11.173", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect access control in JMBroadcast JMB0150 Firmware v1.0 allows attackers to access hardcoded administrator credentials." + }, + { + "lang": "es", + "value": "El control de acceso incorrecto en el firmware JMBroadcast JMB0150 v1.0 permite a los atacantes acceder a credenciales de administrador codificadas." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-28230", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-28230", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-282xx/CVE-2025-28231.json b/CVE-2025/CVE-2025-282xx/CVE-2025-28231.json index 7d44eb725aa..44e9fff92c8 100644 --- a/CVE-2025/CVE-2025-282xx/CVE-2025-28231.json +++ b/CVE-2025/CVE-2025-282xx/CVE-2025-28231.json @@ -2,7 +2,7 @@ "id": "CVE-2025-28231", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-18T18:15:44.883", - "lastModified": "2025-04-21T14:23:45.950", + "lastModified": "2025-04-22T15:16:11.337", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,11 +15,50 @@ "value": "El control de acceso incorrecto en Itel Electronics IP Stream v1.7.0.6 permite a atacantes no autorizados ejecutar comandos arbitrarios con privilegios de administrador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-28231", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-28231", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-282xx/CVE-2025-28232.json b/CVE-2025/CVE-2025-282xx/CVE-2025-28232.json index 078aa44b211..34f6667a2d9 100644 --- a/CVE-2025/CVE-2025-282xx/CVE-2025-28232.json +++ b/CVE-2025/CVE-2025-282xx/CVE-2025-28232.json @@ -2,20 +2,63 @@ "id": "CVE-2025-28232", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-18T15:15:58.387", - "lastModified": "2025-04-21T14:23:45.950", + "lastModified": "2025-04-22T15:16:11.497", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect access control in the HOME.php endpoint of JMBroadcast JMB0150 Firmware v1.0 allows attackers to access the Admin panel without authentication." + }, + { + "lang": "es", + "value": "El control de acceso incorrecto en el endpoint HOME.php del firmware JMBroadcast JMB0150 v1.0 permite a los atacantes acceder al panel de administraci\u00f3n sin autenticaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-28232", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-28232", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-282xx/CVE-2025-28233.json b/CVE-2025/CVE-2025-282xx/CVE-2025-28233.json index 58ea988272d..13ed3f8df9e 100644 --- a/CVE-2025/CVE-2025-282xx/CVE-2025-28233.json +++ b/CVE-2025/CVE-2025-282xx/CVE-2025-28233.json @@ -2,7 +2,7 @@ "id": "CVE-2025-28233", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-18T18:15:45.307", - "lastModified": "2025-04-21T14:23:45.950", + "lastModified": "2025-04-22T15:16:11.657", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,11 +15,50 @@ "value": "El control de acceso incorrecto en BW Broadcast TX600 (14980), TX300 (32990) (31448), TX150, TX1000, TX30 y TX50 Versi\u00f3n de hardware: 2, Versi\u00f3n de software: 1.6.0, Versi\u00f3n de control: 1.0, Versi\u00f3n de firmware AIO: 1.7 permite a los atacantes acceder a archivos de registro y extraer identificadores de sesi\u00f3n para ejecutar un ataque de secuestro de sesi\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-28233", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-28233", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-282xx/CVE-2025-28235.json b/CVE-2025/CVE-2025-282xx/CVE-2025-28235.json index 0c76695b7ea..cf60502c9f0 100644 --- a/CVE-2025/CVE-2025-282xx/CVE-2025-28235.json +++ b/CVE-2025/CVE-2025-282xx/CVE-2025-28235.json @@ -2,7 +2,7 @@ "id": "CVE-2025-28235", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-18T18:15:45.723", - "lastModified": "2025-04-21T14:23:45.950", + "lastModified": "2025-04-22T15:16:11.813", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,11 +15,50 @@ "value": "Una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en el componente /socket.io/1/websocket/ de los modelos Ui12 y Ui16 de Soundcraft Ui Series Firmware v1.0.7x y v1.0.5x permite a los atacantes acceder a las credenciales de administrador en texto sin formato." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-28235", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-28235", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-282xx/CVE-2025-28236.json b/CVE-2025/CVE-2025-282xx/CVE-2025-28236.json index 48c804b736c..7479ea8b61c 100644 --- a/CVE-2025/CVE-2025-282xx/CVE-2025-28236.json +++ b/CVE-2025/CVE-2025-282xx/CVE-2025-28236.json @@ -2,7 +2,7 @@ "id": "CVE-2025-28236", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-18T18:15:46.113", - "lastModified": "2025-04-21T14:23:45.950", + "lastModified": "2025-04-22T15:16:11.970", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,11 +15,50 @@ "value": "Se descubri\u00f3 que Nautel VX Series transmitters VX SW v6.4.0 y anteriores contienen una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) durante el proceso de actualizaci\u00f3n del firmware. Esta vulnerabilidad permite a los atacantes ejecutar c\u00f3digo arbitrario mediante el suministro de un paquete de actualizaci\u00f3n manipulado al endpoint /#/software/upgrades." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-494" + } + ] + } + ], "references": [ { "url": "https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-28236", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-28236", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-282xx/CVE-2025-28237.json b/CVE-2025/CVE-2025-282xx/CVE-2025-28237.json index f259fe54c20..c2255d9528f 100644 --- a/CVE-2025/CVE-2025-282xx/CVE-2025-28237.json +++ b/CVE-2025/CVE-2025-282xx/CVE-2025-28237.json @@ -2,7 +2,7 @@ "id": "CVE-2025-28237", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-18T18:15:46.507", - "lastModified": "2025-04-21T14:23:45.950", + "lastModified": "2025-04-22T14:15:25.543", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,11 +15,50 @@ "value": "Un problema en WorldCast Systems ECRESO FM/DAB/TV Transmitter v1.10.1 permite a atacantes autenticados escalar privilegios a trav\u00e9s de un payload JSON manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-28237", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-28237", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-282xx/CVE-2025-28238.json b/CVE-2025/CVE-2025-282xx/CVE-2025-28238.json index c0ca78e211c..9cac8e621bc 100644 --- a/CVE-2025/CVE-2025-282xx/CVE-2025-28238.json +++ b/CVE-2025/CVE-2025-282xx/CVE-2025-28238.json @@ -2,7 +2,7 @@ "id": "CVE-2025-28238", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-18T18:15:46.913", - "lastModified": "2025-04-21T14:23:45.950", + "lastModified": "2025-04-22T14:15:25.720", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,11 +15,50 @@ "value": "La gesti\u00f3n incorrecta de sesiones en Elber REBLE310 Firmware v5.5.1.R, modelo de equipo: REBLE310/RX10/4ASI permite a los atacantes ejecutar un ataque de secuestro de sesi\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-384" + } + ] + } + ], "references": [ { "url": "https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-28238", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-28238", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-282xx/CVE-2025-28242.json b/CVE-2025/CVE-2025-282xx/CVE-2025-28242.json index 8550787e6f1..b0d3d6cdbe9 100644 --- a/CVE-2025/CVE-2025-282xx/CVE-2025-28242.json +++ b/CVE-2025/CVE-2025-282xx/CVE-2025-28242.json @@ -2,7 +2,7 @@ "id": "CVE-2025-28242", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-18T18:15:47.327", - "lastModified": "2025-04-21T14:23:45.950", + "lastModified": "2025-04-22T14:15:25.897", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,11 +15,50 @@ "value": "La gesti\u00f3n incorrecta de sesiones en el endpoint /login_ok.htm de DAEnetIP4 METO v1.25 permite a los atacantes ejecutar un ataque de secuestro de sesi\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-384" + } + ] + } + ], "references": [ { "url": "https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-28242", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-28242", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-292xx/CVE-2025-29209.json b/CVE-2025/CVE-2025-292xx/CVE-2025-29209.json index c221dbf8ba3..36ea4459667 100644 --- a/CVE-2025/CVE-2025-292xx/CVE-2025-29209.json +++ b/CVE-2025/CVE-2025-292xx/CVE-2025-29209.json @@ -2,20 +2,63 @@ "id": "CVE-2025-29209", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-18T15:15:58.653", - "lastModified": "2025-04-21T14:23:45.950", + "lastModified": "2025-04-22T15:16:12.130", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "TOTOLINK X18 v9.1.0cu.2024_B20220329 has an unauthorized arbitrary command execution in the enable parameter' of the sub_41105C function of cstecgi .cgi." + }, + { + "lang": "es", + "value": "TOTOLINK X18 v9.1.0cu.2024_B20220329 tiene una ejecuci\u00f3n de comando arbitraria no autorizada en el par\u00e1metro enable de la funci\u00f3n sub_41105C de cstecgi .cgi." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/LZY0522/CVE/blob/main/X18-sub_41105c.md", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/LZY0522/CVE/blob/main/X18-sub_41105c.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-293xx/CVE-2025-29316.json b/CVE-2025/CVE-2025-293xx/CVE-2025-29316.json index b01c78b9ba1..24e2fe295b2 100644 --- a/CVE-2025/CVE-2025-293xx/CVE-2025-29316.json +++ b/CVE-2025/CVE-2025-293xx/CVE-2025-29316.json @@ -2,16 +2,55 @@ "id": "CVE-2025-29316", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-17T19:16:08.913", - "lastModified": "2025-04-17T20:21:05.203", + "lastModified": "2025-04-22T15:16:12.287", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in DataPatrol Screenshot watermark, printing watermark agent v.3.5.2.0 allows a physically proximate attacker to obtain sensitive information" + }, + { + "lang": "es", + "value": "Un problema en DataPatrol Screenshot watermark, printing watermark agent v.3.5.2.0 permite que un atacante f\u00edsicamente pr\u00f3ximo obtenga informaci\u00f3n confidencial" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.2, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://app.filemail.com/d/fjyvgdkchxdzefl", @@ -20,6 +59,10 @@ { "url": "https://gist.github.com/Donsat12/c9295859e6f7ce406b787ded72701ea4?short_path=0e57ef8", "source": "cve@mitre.org" + }, + { + "url": "https://gist.github.com/Donsat12/c9295859e6f7ce406b787ded72701ea4?short_path=0e57ef8", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-293xx/CVE-2025-29369.json b/CVE-2025/CVE-2025-293xx/CVE-2025-29369.json index 18cb9f79264..ff157244f34 100644 --- a/CVE-2025/CVE-2025-293xx/CVE-2025-29369.json +++ b/CVE-2025/CVE-2025-293xx/CVE-2025-29369.json @@ -2,8 +2,8 @@ "id": "CVE-2025-29369", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-03T14:15:31.950", - "lastModified": "2025-04-10T21:15:48.673", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-22T15:20:07.247", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:carmelogarcia:matrimonial_site:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "EDFF9703-296D-43E8-A5AB-1C515FDBF682" + } + ] + } + ] + } + ], "references": [ { "url": "https://code-projects.org/matrimonial-site-in-php-with-source-code/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/sqs404/tesc", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-295xx/CVE-2025-29547.json b/CVE-2025/CVE-2025-295xx/CVE-2025-29547.json new file mode 100644 index 00000000000..5616af4a3c0 --- /dev/null +++ b/CVE-2025/CVE-2025-295xx/CVE-2025-29547.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-29547", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-22T15:16:12.447", + "lastModified": "2025-04-22T15:16:12.447", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Rollback Rx Professional 12.8.0.0, the driver file shieldm.sys allows local users to cause a denial of service because of a null pointer dereference from IOCtl 0x96202000." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://horizondatasys.com/rollback-rx-time-machine/rollback-rx-professional/", + "source": "cve@mitre.org" + }, + { + "url": "https://packetstorm.news/files/id/190491/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-35xx/CVE-2025-3577.json b/CVE-2025/CVE-2025-35xx/CVE-2025-3577.json index 02c61b30171..8d38634c7b8 100644 --- a/CVE-2025/CVE-2025-35xx/CVE-2025-3577.json +++ b/CVE-2025/CVE-2025-35xx/CVE-2025-3577.json @@ -2,7 +2,7 @@ "id": "CVE-2025-3577", "sourceIdentifier": "security@zyxel.com.tw", "published": "2025-04-22T03:15:21.637", - "lastModified": "2025-04-22T03:15:21.637", + "lastModified": "2025-04-22T14:15:26.490", "vulnStatus": "Received", "cveTags": [ { @@ -16,13 +16,17 @@ { "lang": "en", "value": "**UNSUPPORTED WHEN ASSIGNED** A path traversal vulnerability in the web management interface of the Zyxel\u00a0AMG1302-T10B firmware version\u00a02.00(AAJC.16)C0 could allow an authenticated attacker with\u00a0administrator privileges to\u00a0access restricted directories by sending a crafted HTTP request to an affected device." + }, + { + "lang": "es", + "value": "**NO COMPATIBLE CUANDO SE ASIGN\u00d3** Una vulnerabilidad de path traversal en la interfaz de administraci\u00f3n web de la versi\u00f3n de firmware 2.00(AAJC.16)C0 del Zyxel AMG1302-T10B podr\u00eda permitir que un atacante autenticado con privilegios de administrador acceda a directorios restringidos mediante el env\u00edo de una solicitud HTTP manipulada a un dispositivo afectado." } ], "metrics": { "cvssMetricV31": [ { "source": "security@zyxel.com.tw", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", @@ -45,7 +49,7 @@ "weaknesses": [ { "source": "security@zyxel.com.tw", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -62,6 +66,10 @@ { "url": "https://www.zyxel.com/service-provider/global/en/security-advisories/end-of-life", "source": "security@zyxel.com.tw" + }, + { + "url": "https://github.com/Jiangxiazhe/IOT_Vulnerability/blob/main/README.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/README.md b/README.md index cd8e749f97b..20770ed137a 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-04-22T14:00:19.882747+00:00 +2025-04-22T16:00:20.994607+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-04-22T13:59:54.240000+00:00 +2025-04-22T15:57:26.610000+00:00 ``` ### Last Data Feed Release @@ -33,50 +33,54 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -291058 +291068 ``` ### CVEs added in the last Commit -Recently added CVEs: `6` +Recently added CVEs: `10` -- [CVE-2024-11299](CVE-2024/CVE-2024-112xx/CVE-2024-11299.json) (`2025-04-22T12:15:14.677`) -- [CVE-2025-2092](CVE-2025/CVE-2025-20xx/CVE-2025-2092.json) (`2025-04-22T12:15:15.847`) -- [CVE-2025-23175](CVE-2025/CVE-2025-231xx/CVE-2025-23175.json) (`2025-04-22T13:15:42.460`) -- [CVE-2025-3457](CVE-2025/CVE-2025-34xx/CVE-2025-3457.json) (`2025-04-22T12:15:16.350`) -- [CVE-2025-3458](CVE-2025/CVE-2025-34xx/CVE-2025-3458.json) (`2025-04-22T12:15:16.507`) -- [CVE-2025-3472](CVE-2025/CVE-2025-34xx/CVE-2025-3472.json) (`2025-04-22T12:15:16.657`) +- [CVE-2024-40445](CVE-2024/CVE-2024-404xx/CVE-2024-40445.json) (`2025-04-22T14:15:24.173`) +- [CVE-2024-40446](CVE-2024/CVE-2024-404xx/CVE-2024-40446.json) (`2025-04-22T14:15:24.327`) +- [CVE-2024-46546](CVE-2024/CVE-2024-465xx/CVE-2024-46546.json) (`2025-04-22T14:15:24.440`) +- [CVE-2025-1950](CVE-2025/CVE-2025-19xx/CVE-2025-1950.json) (`2025-04-22T15:16:10.187`) +- [CVE-2025-1951](CVE-2025/CVE-2025-19xx/CVE-2025-1951.json) (`2025-04-22T15:16:10.337`) +- [CVE-2025-23176](CVE-2025/CVE-2025-231xx/CVE-2025-23176.json) (`2025-04-22T15:16:10.480`) +- [CVE-2025-28032](CVE-2025/CVE-2025-280xx/CVE-2025-28032.json) (`2025-04-22T14:15:25.017`) +- [CVE-2025-28033](CVE-2025/CVE-2025-280xx/CVE-2025-28033.json) (`2025-04-22T14:15:25.150`) +- [CVE-2025-28034](CVE-2025/CVE-2025-280xx/CVE-2025-28034.json) (`2025-04-22T14:15:25.263`) +- [CVE-2025-29547](CVE-2025/CVE-2025-295xx/CVE-2025-29547.json) (`2025-04-22T15:16:12.447`) ### CVEs modified in the last Commit -Recently modified CVEs: `66` +Recently modified CVEs: `227` -- [CVE-2024-41373](CVE-2024/CVE-2024-413xx/CVE-2024-41373.json) (`2025-04-22T13:59:24.697`) -- [CVE-2024-41374](CVE-2024/CVE-2024-413xx/CVE-2024-41374.json) (`2025-04-22T13:59:40.947`) -- [CVE-2024-41375](CVE-2024/CVE-2024-413xx/CVE-2024-41375.json) (`2025-04-22T13:59:54.240`) -- [CVE-2025-20631](CVE-2025/CVE-2025-206xx/CVE-2025-20631.json) (`2025-04-22T13:50:41.370`) -- [CVE-2025-20632](CVE-2025/CVE-2025-206xx/CVE-2025-20632.json) (`2025-04-22T13:50:45.063`) -- [CVE-2025-20644](CVE-2025/CVE-2025-206xx/CVE-2025-20644.json) (`2025-04-22T13:48:09.680`) -- [CVE-2025-20645](CVE-2025/CVE-2025-206xx/CVE-2025-20645.json) (`2025-04-22T13:47:27.490`) -- [CVE-2025-20646](CVE-2025/CVE-2025-206xx/CVE-2025-20646.json) (`2025-04-22T13:47:23.380`) -- [CVE-2025-20648](CVE-2025/CVE-2025-206xx/CVE-2025-20648.json) (`2025-04-22T13:46:59.780`) -- [CVE-2025-20649](CVE-2025/CVE-2025-206xx/CVE-2025-20649.json) (`2025-04-22T13:46:37.947`) -- [CVE-2025-20650](CVE-2025/CVE-2025-206xx/CVE-2025-20650.json) (`2025-04-22T13:46:22.380`) -- [CVE-2025-20651](CVE-2025/CVE-2025-206xx/CVE-2025-20651.json) (`2025-04-22T13:46:09.310`) -- [CVE-2025-20652](CVE-2025/CVE-2025-206xx/CVE-2025-20652.json) (`2025-04-22T13:44:46.517`) -- [CVE-2025-20653](CVE-2025/CVE-2025-206xx/CVE-2025-20653.json) (`2025-04-22T13:43:58.053`) -- [CVE-2025-25767](CVE-2025/CVE-2025-257xx/CVE-2025-25767.json) (`2025-04-22T12:58:05.743`) -- [CVE-2025-25958](CVE-2025/CVE-2025-259xx/CVE-2025-25958.json) (`2025-04-22T13:09:31.147`) -- [CVE-2025-25960](CVE-2025/CVE-2025-259xx/CVE-2025-25960.json) (`2025-04-22T13:09:06.197`) -- [CVE-2025-26304](CVE-2025/CVE-2025-263xx/CVE-2025-26304.json) (`2025-04-22T13:11:17.910`) -- [CVE-2025-26305](CVE-2025/CVE-2025-263xx/CVE-2025-26305.json) (`2025-04-22T13:10:07.217`) -- [CVE-2025-27135](CVE-2025/CVE-2025-271xx/CVE-2025-27135.json) (`2025-04-22T12:57:00.213`) -- [CVE-2025-2721](CVE-2025/CVE-2025-27xx/CVE-2025-2721.json) (`2025-04-22T13:15:42.990`) -- [CVE-2025-2722](CVE-2025/CVE-2025-27xx/CVE-2025-2722.json) (`2025-04-22T13:15:43.080`) -- [CVE-2025-2723](CVE-2025/CVE-2025-27xx/CVE-2025-2723.json) (`2025-04-22T13:15:43.140`) -- [CVE-2025-2724](CVE-2025/CVE-2025-27xx/CVE-2025-2724.json) (`2025-04-22T13:15:43.203`) -- [CVE-2025-2953](CVE-2025/CVE-2025-29xx/CVE-2025-2953.json) (`2025-04-22T12:15:16.043`) +- [CVE-2024-8208](CVE-2024/CVE-2024-82xx/CVE-2024-8208.json) (`2025-04-22T15:55:57.023`) +- [CVE-2024-8209](CVE-2024/CVE-2024-82xx/CVE-2024-8209.json) (`2025-04-22T15:56:37.080`) +- [CVE-2024-8216](CVE-2024/CVE-2024-82xx/CVE-2024-8216.json) (`2025-04-22T15:56:56.470`) +- [CVE-2025-0948](CVE-2025/CVE-2025-09xx/CVE-2025-0948.json) (`2025-04-22T15:19:14.103`) +- [CVE-2025-0949](CVE-2025/CVE-2025-09xx/CVE-2025-0949.json) (`2025-04-22T15:12:43.517`) +- [CVE-2025-22957](CVE-2025/CVE-2025-229xx/CVE-2025-22957.json) (`2025-04-22T15:37:40.030`) +- [CVE-2025-2594](CVE-2025/CVE-2025-25xx/CVE-2025-2594.json) (`2025-04-22T15:16:12.563`) +- [CVE-2025-27086](CVE-2025/CVE-2025-270xx/CVE-2025-27086.json) (`2025-04-22T14:15:24.880`) +- [CVE-2025-28059](CVE-2025/CVE-2025-280xx/CVE-2025-28059.json) (`2025-04-22T15:16:10.627`) +- [CVE-2025-28197](CVE-2025/CVE-2025-281xx/CVE-2025-28197.json) (`2025-04-22T14:15:25.370`) +- [CVE-2025-28228](CVE-2025/CVE-2025-282xx/CVE-2025-28228.json) (`2025-04-22T15:16:10.817`) +- [CVE-2025-28229](CVE-2025/CVE-2025-282xx/CVE-2025-28229.json) (`2025-04-22T15:16:10.997`) +- [CVE-2025-28230](CVE-2025/CVE-2025-282xx/CVE-2025-28230.json) (`2025-04-22T15:16:11.173`) +- [CVE-2025-28231](CVE-2025/CVE-2025-282xx/CVE-2025-28231.json) (`2025-04-22T15:16:11.337`) +- [CVE-2025-28232](CVE-2025/CVE-2025-282xx/CVE-2025-28232.json) (`2025-04-22T15:16:11.497`) +- [CVE-2025-28233](CVE-2025/CVE-2025-282xx/CVE-2025-28233.json) (`2025-04-22T15:16:11.657`) +- [CVE-2025-28235](CVE-2025/CVE-2025-282xx/CVE-2025-28235.json) (`2025-04-22T15:16:11.813`) +- [CVE-2025-28236](CVE-2025/CVE-2025-282xx/CVE-2025-28236.json) (`2025-04-22T15:16:11.970`) +- [CVE-2025-28237](CVE-2025/CVE-2025-282xx/CVE-2025-28237.json) (`2025-04-22T14:15:25.543`) +- [CVE-2025-28238](CVE-2025/CVE-2025-282xx/CVE-2025-28238.json) (`2025-04-22T14:15:25.720`) +- [CVE-2025-28242](CVE-2025/CVE-2025-282xx/CVE-2025-28242.json) (`2025-04-22T14:15:25.897`) +- [CVE-2025-29209](CVE-2025/CVE-2025-292xx/CVE-2025-29209.json) (`2025-04-22T15:16:12.130`) +- [CVE-2025-29316](CVE-2025/CVE-2025-293xx/CVE-2025-29316.json) (`2025-04-22T15:16:12.287`) +- [CVE-2025-29369](CVE-2025/CVE-2025-293xx/CVE-2025-29369.json) (`2025-04-22T15:20:07.247`) +- [CVE-2025-3577](CVE-2025/CVE-2025-35xx/CVE-2025-3577.json) (`2025-04-22T14:15:26.490`) ## Download and Usage diff --git a/_state.csv b/_state.csv index cf810c6f643..b20783d568c 100644 --- a/_state.csv +++ b/_state.csv @@ -62157,11 +62157,11 @@ CVE-2013-4805,0,0,1a02d50f3f36e1480bd205bcf9a8f4dc3b30573cf30c217741dfbcf2f44cc2 CVE-2013-4806,0,0,aef1bd81a2470f8f9b62f30c6cd71b488b42eee209f670d8edfd04787f8972dc,2025-04-11T00:51:21.963000 CVE-2013-4807,0,0,c2c75de4dcf99bb9a8f04330bce82f769e015fd01b025da1e9cc96f35e98e912,2025-04-11T00:51:21.963000 CVE-2013-4808,0,0,ebb8f04f4f97214597016938817cdadbad37789c44c7165938752d280be4758f,2025-04-11T00:51:21.963000 -CVE-2013-4809,0,0,efa09ab59e4f4d7348c4276cf7cc35724dce3eaa61bb3b54421991b14e7f3907,2025-04-11T00:51:21.963000 +CVE-2013-4809,0,1,638c28d0359d4f86ef8c94ac8f23b0845d01d479ee803ea06b2fd0d243a3c3a7,2025-04-22T14:51:37.563000 CVE-2013-4810,0,0,8e415fa5e475baa3a2d98590b753f5ea51fd5653c06cf6480db768684199cf70,2025-04-11T00:51:21.963000 -CVE-2013-4811,0,0,6e6f0ba6dd21196c9d72835a55e957c73120f157c6ac8714ce687f900423dd0c,2025-04-11T00:51:21.963000 -CVE-2013-4812,0,0,da3e0fa85c06ac15b4a4c5b630f47b6c08c30b4a853d6a8cdd77f6a5ee226b7d,2025-04-11T00:51:21.963000 -CVE-2013-4813,0,0,f5b4051167c95e39947dac5b4f65338ec052799bd60958698ecdd0651ad9f0f7,2025-04-11T00:51:21.963000 +CVE-2013-4811,0,1,93e28709520901194e412c50baa0a0798d4d5f6baa8240ad918f8b157c15da19,2025-04-22T14:51:37.563000 +CVE-2013-4812,0,1,bb82677d160504dccd05fbd0f3b1bb50fe72f84859f1fb4c17111c3cb09e149c,2025-04-22T14:51:37.563000 +CVE-2013-4813,0,1,a1281dbf26fc592fb70c017843d4677e331888923646ab1e1d50695c9007afe0,2025-04-22T14:51:37.563000 CVE-2013-4814,0,0,ac7aacbaa6cb06e55c81e20b590b1b42fc44dbb97d5747d56f07a954246f944d,2025-04-11T00:51:21.963000 CVE-2013-4815,0,0,4b0f2a57cddec2dee22c296183a3518d7c1195492923d16761a964b1923c2396,2025-04-11T00:51:21.963000 CVE-2013-4816,0,0,79957449a58cd3a5871fed473f0ee7715dd39be6d2c4dfdb7a7110ae36510c52,2023-11-07T02:16:23.593000 @@ -154017,7 +154017,7 @@ CVE-2020-23931,0,0,9fe2477826acc49c41fc65f0caa07fd59eae7b1a2d96a5b90462f6b4ba9b7 CVE-2020-23932,0,0,62a30e2ab6484c342b79b298d8006085c76fc62383d56c36e5e239092cd0831f,2024-11-21T05:14:14.600000 CVE-2020-23933,0,0,a6071d7fac7745aa879f14baf6219e302470cecec42fa3a141bba7ea789838db,2023-11-07T03:19:50.353000 CVE-2020-23934,0,0,513e91aa73ead15079a360ae87aa7f87eefc6434920625caf2b25f4665489975,2024-11-21T05:14:14.747000 -CVE-2020-23935,0,0,c4791cb9810b46d7cdbb5d4a7f2365e3c4b5b385e67e597000bddd919ed86a01,2024-11-21T05:14:14.883000 +CVE-2020-23935,0,1,076032c4bda6257fd183c94112e93f3380f234822b5d9a8944419db4f16717da,2025-04-22T14:51:37.563000 CVE-2020-23936,0,0,27cda398b2b3940bd8beb296bec19135300254a1ae4861ed757c8b3f71099e36,2024-11-21T05:14:15.030000 CVE-2020-23938,0,0,c87c1507ffc53c836e8a1059034a659ec7afb63218e0cbde8ed30ef2d1472072,2023-11-07T03:19:50.410000 CVE-2020-23945,0,0,840d0a19b1cc93cf79092261ed12b29668dc6a8248b892b84b1469a60a88d675,2024-11-21T05:14:15.177000 @@ -165643,7 +165643,7 @@ CVE-2021-0930,0,0,3389c98d8704aaf442f6ab57b4377a5c0e44a53cd7e39c98c4b2e917562970 CVE-2021-0931,0,0,5ddbfce18d9819c188e02ab2f34cd3abb123b86f0bc6f27f42ce0df800365b12,2024-11-21T05:43:16.083000 CVE-2021-0932,0,0,6a47eecb2f892f93f5b57e006d2f65b3c134b79e7f8a5dadb48a774b6ebfb5df,2024-11-21T05:43:16.180000 CVE-2021-0933,0,0,6bde843f3ea67e5087551fa5ea18c2c3ab3b55156b6aa24155000d76db454c52,2024-11-21T05:43:16.277000 -CVE-2021-0934,0,0,1579f47cc051c4f77d298ffb29a749876fe38c6f68afa6c228869fb903619c03,2024-11-21T05:43:16.373000 +CVE-2021-0934,0,1,a8adb11eec80de6befefb30fa36ad5d3bdd3e3154d205b687e09d01c6a9b5edb,2025-04-22T15:15:56.460000 CVE-2021-0935,0,0,d2c570a23cc1b9c4facbfa37c259fe6bbd0f862509c65f5fa1d1c10d78888c25,2024-11-21T05:43:16.490000 CVE-2021-0936,0,0,892a8d6203a256e6c13e6c01e5a46aedb9811a62ee7c6f8e4a944d7a71629168,2024-11-21T05:43:16.587000 CVE-2021-0937,0,0,0ab0ebd905cc5f7e1a6a28f3a4b525ee87a676e82a7a87d1f020e7f91f594d92,2024-12-05T22:15:19.270000 @@ -177272,7 +177272,7 @@ CVE-2021-33365,0,0,09fc857bd0be01019502167ca1b49f3cf0db369d53632c7547f6d5aace3ae CVE-2021-33366,0,0,40aa739edfd4ae2d39351174a8a58fbcb219e77fc479a961d6e6bce995476ab0,2024-11-21T06:08:46.543000 CVE-2021-33367,0,0,6f9ef5961728c0e8e5a6dfcc8efa79cb617eebafd8c76144c3678fa72030f8c6,2024-11-21T06:08:46.703000 CVE-2021-3337,0,0,488e25829e8bbace39bd3c2789f2bac342ac5ecbd467ee8441763a8bbef5a1e3,2024-11-21T06:21:19.560000 -CVE-2021-33371,0,0,0db8a34879419ddf97d315d9aea8e95c0a94971b557f2bc4967e539b63bb81db,2024-11-21T06:08:46.860000 +CVE-2021-33371,0,1,30a370ec1a2ff57cb7bf59426d7c25eb7edbb4ecd751b23ac171485255f4ca4c,2025-04-22T14:51:37.563000 CVE-2021-33387,0,0,697b29ae5d4aaed3a7399c8646d581a402f16e09f0c0c42e99a4df2422132ba0,2025-03-12T16:15:15.963000 CVE-2021-33388,0,0,c04249fd9c3857399a784d26d8f42f0a259c06bb0c638f91db5951b39859e6a4,2024-11-21T06:08:47.173000 CVE-2021-3339,0,0,b80da59fee86f2e40b3cd721122adc0d7f79eea63d6cabd06ed9ce562295dd00,2024-11-21T06:21:19.727000 @@ -185984,7 +185984,7 @@ CVE-2021-44988,0,0,baf2de3f5637f04f6a2029b9c6d0aca64a94b846d9170eec9603171650cad CVE-2021-44992,0,0,e0749b3e832effa401f8836d970f095727c5af41f39c4b91942c8f0e63b59a65,2024-11-21T06:31:47.153000 CVE-2021-44993,0,0,7a0322509a905fe6cd29234d9d7cf1b59f6475b6e2e63f15836269b689537403,2024-11-21T06:31:47.327000 CVE-2021-44994,0,0,aaf10d39b302f1dd7f3903425d179f9886ab83ae447e4f56bec2abd6d5289215,2024-11-21T06:31:47.487000 -CVE-2021-45003,0,0,3edc9ffe19f19d245d71f4e22e3d32bceb7871de819af32c0f44c2ce49240e1e,2024-11-21T06:31:47.653000 +CVE-2021-45003,0,1,807ad9d8bc834d095158e1775ed3fa7d0df31d27925e5ed28b36ca7229e4d048,2025-04-22T14:51:37.563000 CVE-2021-45005,0,0,6224dd231197dd0cc52bed37a2b8e2dc427d638abc816296d7b52d9ca4bda6cd,2024-11-21T06:31:47.800000 CVE-2021-45007,0,0,0a96d07c0baf7e8cd51bb83442b296556d230f7f21ccda635122292cb0f6e361,2024-11-21T06:31:47.950000 CVE-2021-45008,0,0,999d88bb30ee8e97b5422c887f02eb84bdb35179a9542cb94b90208318c419ad,2024-11-21T06:31:48.117000 @@ -186636,7 +186636,7 @@ CVE-2021-46023,0,0,c13cf42f2615c1cb7f67b1bf101af2360dcf84688631bc016857da8c25b5d CVE-2021-46024,0,0,7c7c666dc68aa0f1a6134c194c79d1fec790008fcbe7c885a97a60b8b0c4eb4a,2024-11-21T06:33:29.573000 CVE-2021-46025,0,0,9d34663c4676e4b485a4ab6b9827f2342652c5a2057846b85b95fc25a8f5b9f4,2024-11-21T06:33:29.707000 CVE-2021-46026,0,0,ec0d7341b10fbb689381b7d725ff82d5983a4ebc96eacf1db56051bd00590773,2025-04-10T15:46:17.727000 -CVE-2021-46027,0,0,337e35b641f69f7cc58efc0f217860342e1b32c73b26f878d4bd0d06031710ce,2024-11-21T06:33:30.003000 +CVE-2021-46027,0,1,502b4aad3d454f3360a090dc0618720a193f037788760f428f0ca8c2cf46f438,2025-04-22T14:51:37.563000 CVE-2021-46028,0,0,c14c5fd2af0acc2c8df84fbca4f164c559c38af3d0e2e90d95bf38f55764773f,2024-11-21T06:33:30.147000 CVE-2021-46030,0,0,3b094a042de839b60e5f6ef4d56468e1cd975d7395aa99ecd92b07345303bec5,2024-11-21T06:33:30.297000 CVE-2021-46033,0,0,e7a5eacc4553f26eb49ed7abf546e4994a1c04d2556f92c4034dfcd14d1ce592,2024-11-21T06:33:30.450000 @@ -190323,7 +190323,7 @@ CVE-2022-20445,0,0,5878ce1af2db5b947bbe17f3e8adf30c9ab0ffa0428ed2812284e21c61d21 CVE-2022-20446,0,0,ea1c163204c9466cf2620ca19ddac7eed7be14cc0b0ca8631055e03a79ddd865,2024-11-21T06:42:49.620000 CVE-2022-20447,0,0,c9f51dce6a58011cca18dc7b0b29088d706938da16da544ba0eebf6301f92926,2024-11-21T06:42:49.727000 CVE-2022-20448,0,0,59656cf414bc9672cd4be5a9d3a76f9ba503fa01de1a3dfe7ddc4fec778749b1,2024-11-21T06:42:49.850000 -CVE-2022-20449,0,0,b74b236b300c3965b43ea6c4a68bd1078f29a3ee916de1191c107c43509a9432,2024-11-21T06:42:49.947000 +CVE-2022-20449,0,1,64fe09924204bbc19799d95784c6105a9284ac7286c5dea47bc8b8f328ac0f31,2025-04-22T15:15:57.563000 CVE-2022-20450,0,0,2b27b31479e43adecfbc87eaa8d4f4a3f9b0ac3b18968535aca6b76ba67684d0,2024-11-21T06:42:50.060000 CVE-2022-20451,0,0,ea12e93f3edeff660964b58c618c6d99b9c2a126cf06273394300771e93d2c3e,2024-11-21T06:42:50.177000 CVE-2022-20452,0,0,3871231639f9c9b0b00ec1a82792c5c7bce8a76fb0ee0d59a61077eb38b7354a,2024-11-21T06:42:50.310000 @@ -190341,17 +190341,17 @@ CVE-2022-20462,0,0,de64f96653642f33c8982731ab2b6d6f26bf25e74a32801ba6db0441b455b CVE-2022-20463,0,0,f740ca12bd3ad11a241afab7b7f7cf6b59dd2ba49cf45cb3de7e3d883d4bdd8d,2023-11-07T03:42:26.920000 CVE-2022-20464,0,0,924ac0a427fcdb5d15a9bf14c8336ad304f74297ac2ad48bdef4b94f344cb0e4,2024-11-21T06:42:51.647000 CVE-2022-20465,0,0,57d7367c78c2147772238aea84e8db3dcf4efba2509eae14c2e80467bbb9a5b1,2024-11-21T06:42:51.770000 -CVE-2022-20466,0,0,32a0433bed28941a8103b3344d1447b9cb911f7efc25d6bbfb1496836a908a64,2024-11-21T06:42:51.893000 +CVE-2022-20466,0,1,d6783191631addd20f8d812f362d1303b9e2340c05f4e708f7280ea541143aaa,2025-04-22T15:15:57.723000 CVE-2022-20467,0,0,584132663346540064320e798d49e2aa4fbdf54a027a5f0c50ff68159bf30e0e,2025-02-28T20:15:38.990000 -CVE-2022-20468,0,0,9151d324d88787d69f259c8dbdfe3acec69b9a15e7ec128a5933db2090baa8e0,2024-11-21T06:42:52.140000 -CVE-2022-20469,0,0,19bb0e53183e02ee3a8962b45e7e9265744ef4217b69cff6d041c870d24d8dbd,2024-11-21T06:42:52.270000 +CVE-2022-20468,0,1,3f7dfd0a56856992c2242edf422ecf1283f389a83381bfb57d7c5949f0c9b1ac,2025-04-22T15:15:57.880000 +CVE-2022-20469,0,1,0c5f7220082e436710f6c877a3da662034bc59b27bf813c37d44e214156005c2,2025-04-22T15:15:58.030000 CVE-2022-2047,0,0,809879af7488392da6cd8bb497d9ed2446df52f5a2aabcb79fa3c240fbc918e2,2024-11-21T07:00:13.840000 -CVE-2022-20470,0,0,448cce16bbb6e03743818923a8a714610296ff0327254dc131dad3f447dd6036,2024-11-21T06:42:52.383000 -CVE-2022-20471,0,0,bf2f3fa26f03c7c3356c46b7476e8d396533fa246f2959debdad3fc64a2744aa,2024-11-21T06:42:52.500000 -CVE-2022-20472,0,0,cd5b8e540889839f9a1ae51d3889b97ae759593cbbf8ebd7cefc9f03a01cc8f4,2024-11-21T06:42:52.620000 -CVE-2022-20473,0,0,b74ea9ff8020520652da7e3e35175e0fc9cb815b1800418f5b2382a5f078507b,2024-11-21T06:42:52.743000 -CVE-2022-20474,0,0,ac549695343fce3015f86fd9489f5fa829df959d6c24a21f66f8699f56ce60f3,2024-11-21T06:42:52.870000 -CVE-2022-20475,0,0,6e73c169253624cfc774f57b6eb902209dba14d2591f9df8f9ce753899f3bc0b,2024-11-21T06:42:52.987000 +CVE-2022-20470,0,1,61ea4f129e8749111df28547e7f915ad42ac2115d00cd5dbfe4be04a21a72537,2025-04-22T15:15:58.183000 +CVE-2022-20471,0,1,4120c25cc0c947435b8c9e46803433db44462c3abb103b1f542e946f345b7c78,2025-04-22T15:15:58.337000 +CVE-2022-20472,0,1,dcce5a6f04ad09e3be80a417ce6b011a045f05bc4ae668b7836f7ad5eb55f0a1,2025-04-22T15:15:58.483000 +CVE-2022-20473,0,1,93d73a25f3db142365fc2fea53d09f5cadca725d7418abc0e1f74b9e64dcd081,2025-04-22T15:15:58.640000 +CVE-2022-20474,0,1,7e7fc32602bdacd44376c59543b9ac7e597a08d5200917375704fe0ca7deece7,2025-04-22T15:15:58.793000 +CVE-2022-20475,0,1,09fa5942f56b77e2dee4de4a3f0f5c86f2679f021c86f45e31c48807868c2a15,2025-04-22T15:15:58.953000 CVE-2022-20476,0,0,70b537e8640ab8fe4addeb7192834cc3d434d6e7046c1cd4ae3e563467256018,2024-11-21T06:42:53.110000 CVE-2022-20477,0,0,af68583f29536da61b9ec94a9013c6d51733194482138ad97497f6b08ff538ea,2024-11-21T06:42:53.230000 CVE-2022-20478,0,0,76a496682e6eb342c24426e1b94578eaa64ec7e4faad072c270b2d640951209e,2024-11-21T06:42:53.350000 @@ -190363,23 +190363,23 @@ CVE-2022-20482,0,0,f6243b44c02f36253aed4e392ff85988096796156bcb988a52233649640db CVE-2022-20483,0,0,b2b636295dc20f324a5dba58bba02215bbfdb769b61d23439295240446cafe7b,2024-11-21T06:42:53.950000 CVE-2022-20484,0,0,c05411bcedf0455018fca08729cb7eb82689653ec92bb274c2520a910077b35a,2024-11-21T06:42:54.073000 CVE-2022-20485,0,0,b3e1bd6f119b6e938ac76dabe8f80037d067b3885be747eca2a20b3c499a586c,2024-11-21T06:42:54.190000 -CVE-2022-20486,0,0,49f38981967c53a9ce0fed80c18be662900b498ff67f868fffd8d13a890b8ce7,2024-11-21T06:42:54.310000 -CVE-2022-20487,0,0,31e6990f8e35ab24b292213ac7296203d5ceb5a6104f973f0bf258d49c538047,2024-11-21T06:42:54.423000 -CVE-2022-20488,0,0,14550d5f9d4a2918adafe2bc09569a5d3f3b694459004490a9e3b9c75f53be8e,2024-11-21T06:42:54.543000 +CVE-2022-20486,0,1,2562d9a10dd28be6da04b637cf4b48935aa87483e18655ecf35c2cf8dcbf69e4,2025-04-22T14:15:16.630000 +CVE-2022-20487,0,1,a5b80b6c81f412aadab0670380ebcbc04ac32c01b27d597f84540bc7c616858d,2025-04-22T14:15:17.450000 +CVE-2022-20488,0,1,ca343057758a8fb67663f148f61f04526b50ef068e2ec1bef70b2e60a96bf8d4,2025-04-22T14:15:17.607000 CVE-2022-20489,0,0,43c2eca00c0e25a0443a2d0ada58a66f28766c58e82166760014195fcb49255a,2025-04-02T16:15:20.460000 CVE-2022-2049,0,0,d9328e6fc09d53acd66d17f5865dd467625a85a0714f2e8b06b0b1374617b801,2024-11-21T07:00:14.110000 CVE-2022-20490,0,0,5ba98b02a8726b7937238fe7114cdd456a38748e0033ce477289864da5183824,2025-04-01T20:15:15.700000 -CVE-2022-20491,0,0,41eaa6307dbb77b5b00c3f98ba7f032745bf7f082a9dace499f31d55a440fa1b,2024-11-21T06:42:54.930000 +CVE-2022-20491,0,1,7d1674291fd2724614642ab0ad0ae63e65f0d179748d43f0bd59d63ada1eb417,2025-04-22T14:15:17.763000 CVE-2022-20492,0,0,d6e735cecfef934bfdb87af946f826357e891b5515d6396bcd17de866932b822,2025-04-03T20:15:16.587000 CVE-2022-20493,0,0,7ca7cfbe0450498127b0a2ef675389ce070c4c2973566e2f4c12af4b6e134e8a,2025-04-03T20:15:16.793000 CVE-2022-20494,0,0,d6bb3961936e1100a4635e3c448b818fc7c1a00926a5e845ed97b1cd18fe6884,2025-04-03T21:15:37.523000 -CVE-2022-20495,0,0,21ad4e5b9b5d1c0d56cc0ef67c2f0759937846d2aa7e72708898439c2a4b4d3e,2024-11-21T06:42:55.393000 -CVE-2022-20496,0,0,497a123efc361bc88daf1d6be6a9218cd9d8132728563eb2b2b72eef9db95f25,2024-11-21T06:42:55.523000 -CVE-2022-20497,0,0,7079a93c3c8e1db9ad47b5d7e9397c6e9d81e511293ccf4fd65da2bec3caadbd,2024-11-21T06:42:55.640000 -CVE-2022-20498,0,0,a9cc13963965e24d05819fb724d3ae95ce3070b2708b014d334c1353dfb294fe,2024-11-21T06:42:55.750000 +CVE-2022-20495,0,1,84506edc1287e1d11509252fb20043cfbfc534c79fa56f2724793f62cf303ecb,2025-04-22T14:15:17.917000 +CVE-2022-20496,0,1,804ba6cb8aec3f91ce71e393d73dc4ef6ca127f8a2ff6e4083f7d50fd96d552d,2025-04-22T14:15:18.073000 +CVE-2022-20497,0,1,f7b8584a7f012a0b6349b182b0dc502d9cd4e4d633e78ea646d8f7a8ea4eb59c,2025-04-22T14:15:18.230000 +CVE-2022-20498,0,1,be6b68477d9d29a18955556693749e04daabaed1a7797a78a717f8cc2e561525,2025-04-22T14:15:18.393000 CVE-2022-20499,0,0,877e44e366e643c1614f7ddfe19db6480f131d92c9de4223d1d6c47aeba61347,2025-02-28T20:15:39.160000 CVE-2022-2050,0,0,65167bb8fbf844311b8804ba174c061c4decb2dabb828b56ce409f93a3c4cdbf,2024-11-21T07:00:14.217000 -CVE-2022-20500,0,0,d55c16770263b57db932a1375eff15a0b98edf158a7f94d8a5a9d4a08bcd968a,2024-11-21T06:42:55.973000 +CVE-2022-20500,0,1,4cf38267c3a89ecc0b20378721710855d75137f99d0f9a239eaee770d775ff85,2025-04-22T14:15:18.550000 CVE-2022-20501,0,0,55e265ce782a4aac411ee1b5f173a652cbf2894482298e7d9d6f4b9d22fb93ba,2024-11-21T06:42:56.087000 CVE-2022-20502,0,0,798ae34812043ea163ec293af89104e2e6b83e3c8422b5f2b3e3160057a6cbe3,2024-11-21T06:42:56.193000 CVE-2022-20503,0,0,970bd0b54141c152c4c8cb591ed25cd9b3ceebd61bfe3ebf8941b55d0ad5d8df,2025-04-21T14:15:22.280000 @@ -196431,7 +196431,7 @@ CVE-2022-2733,0,0,f02d64a1436fa7767e401580bf467fa7aab7daf104d903047310e92cfceba4 CVE-2022-27330,0,0,34b5f796f026859a1b5a470725daa1d5af16dff340c39c761033b413a88472cc,2024-11-21T06:55:35.593000 CVE-2022-27331,0,0,6b75bf99357a634a1649afdba0a963eaa821ccc5c3d0bef005ea31f95b041ab6,2024-11-21T06:55:35.730000 CVE-2022-27332,0,0,eda9e683f4d24c29dbdeb7182954db55af02da9e842e403f23a3f9b0b88af99a,2024-11-21T06:55:35.867000 -CVE-2022-27333,0,0,903e17418fa1687fb65c4b207477f09dc05345eba932b1382e7b484abf65145c,2024-11-21T06:55:36.013000 +CVE-2022-27333,0,1,94b8bce87ad74c8e2eb7ff11aeab62de0018f1943f97b53e2efaee3a465b1bac,2025-04-22T14:51:37.563000 CVE-2022-27336,0,0,af36ab1791985d77dde2c5b47802f3b6a75e7796fe64045e94f8ed13c27bde3f,2024-11-21T06:55:36.150000 CVE-2022-27337,0,0,0a7815cfa3fefb40bc8cc7175b42af3abf99315f172d4d2324ed67caeda52b0f,2024-11-21T06:55:36.283000 CVE-2022-2734,0,0,55c27c71ea97b26a65ddbc0bbb1fef049c30dc92bd46c062f35b01a5ca5b6a49,2024-11-21T07:01:36.313000 @@ -198050,7 +198050,7 @@ CVE-2022-29304,0,0,286010f5fb7696fe98fb1306af778d8a3fe29ffcc19e7b6815a41595ad07b CVE-2022-29305,0,0,ffb5fc95d769406d41de93b50401c5d6e167a36adc7ab7d035469268016137a9,2024-11-21T06:58:53.077000 CVE-2022-29306,0,0,ff286ac6c7c82916128568a846f797c6254ca1725cd85a12d9219d4a075111e0,2024-11-21T06:58:53.217000 CVE-2022-29307,0,0,34bad57d387fb2b6e1e5275ca03742cdc950218530c50c2176aba1d6789e3643,2024-11-21T06:58:53.363000 -CVE-2022-29309,0,0,d44f1664a9ad5864aeaa6229b1f789627f7deedd576ba41cb996ee1397d8fe4a,2024-11-21T06:58:53.493000 +CVE-2022-29309,0,1,fdb0601a24783cf85fb1d06ed96951c1dcb3bcc47f4f21d712f7a209204332f6,2025-04-22T14:51:37.563000 CVE-2022-2931,0,0,c69c76bea595291aff140620e0f5741197ff66b6b5ad103f9a97374e8266d2e1,2024-11-21T07:01:56.597000 CVE-2022-29315,0,0,58822fb3f851892806dfe99f988211c2288eb425086d9aa4b0d26755684a9dda,2024-11-21T06:58:53.630000 CVE-2022-29316,0,0,3fcacd28cb1d02d392bd7b6afb072fee6886752e7281b6bab2a6c0c2ae230f22,2024-11-21T06:58:53.770000 @@ -199484,7 +199484,7 @@ CVE-2022-31046,0,0,ff1272676133a219e73de8e9ee0e07061d15190f8536899c5f64fea68e5c6 CVE-2022-31047,0,0,ef380be59755e2a3cccdf149e6c9de4b12b3325ea4c18b4c1b7f490eb5298def,2024-11-21T07:03:46.937000 CVE-2022-31048,0,0,235386afa0467fec3b93e5c55382e21421bc3e75a25d67fa6c165329e5413fee,2024-11-21T07:03:47.067000 CVE-2022-31049,0,0,02eb7058e108a08446a5fe3a09298b154e4bb9e15231acfe445b53f53fef1358,2024-11-21T07:03:47.193000 -CVE-2022-3105,0,0,dbb43feb5b2789538f9a0ae261aa048c4066877b00b5125e6086e44ce45545f6,2024-11-21T07:18:50.190000 +CVE-2022-3105,0,1,de82466b2a9d4f2e8d6da13234bc17000556a196223f16b91ffa2df796d19aa8,2025-04-22T15:15:59.113000 CVE-2022-31050,0,0,c8f04396dacbe86b56be2691318668cff5541ed6611d4efd8ea283722a2d6b63,2024-11-21T07:03:47.317000 CVE-2022-31051,0,0,72ba9b0c0797800e6a911527dcb5df6c06c483c192ff0d8d120aff27e73569cc,2024-11-21T07:03:47.440000 CVE-2022-31052,0,0,b65d4184be827574cef568b23e9f1598a9ece69e5ab62981926587a603504291,2024-11-21T07:03:47.603000 @@ -199505,7 +199505,7 @@ CVE-2022-31065,0,0,7515c0f3ccbcc3218a039058309dd7b296bdcccd5adf52eb781e1e1120ae1 CVE-2022-31066,0,0,9fc03edda1f57cefc517352b35b085644a8a63478a54d42c158656c93b40cb3a,2024-11-21T07:03:49.483000 CVE-2022-31068,0,0,4fd3488b9c7c2ff0be4fe0ceb6deaf2a385ad2c786e492cd96b3392f2c7c964c,2024-11-21T07:03:49.630000 CVE-2022-31069,0,0,a8d13bbd2cba6dab86c1261bbcbe7f7785e1983f4ea9bb6a479d92bc912cff31,2024-11-21T07:03:49.767000 -CVE-2022-3107,0,0,f74d3cecf686ebf48c95e4d81368af44ea8843f0e6cf4e9292e127f10be67cf7,2024-11-21T07:18:50.430000 +CVE-2022-3107,0,1,b6ab6fb8f1d603606cf8009be0cefbc60ce6fe39199954138ed420d9493d6b1e,2025-04-22T15:15:59.307000 CVE-2022-31070,0,0,b62df3f35370bc0bc5d0116ea77f9390e5db18957d186d1f0ef6939858bece01,2024-11-21T07:03:49.903000 CVE-2022-31071,0,0,d186abc4fa0717bd99c797ed1222f779278b877555e89df94fdbfd9959538901,2024-11-21T07:03:50.040000 CVE-2022-31072,0,0,36102056605fccb6b8d1bf6050e9ad4fa48064740023277d74a5c8dc5ad309e7,2024-11-21T07:03:50.180000 @@ -199516,7 +199516,7 @@ CVE-2022-31076,0,0,10d8b68041364e5faf7c217e9915b448d4e0a4e3741249d9280a4313575a4 CVE-2022-31077,0,0,29da9535b202e3836bb065e1e99b730fb24a65a50487819ff1174ff3d45e9013,2024-11-21T07:03:50.837000 CVE-2022-31078,0,0,79a3a52e09dbd185b57ddabe0cfdea70280c166342167c147131eb5eaf0f41df,2024-11-21T07:03:50.967000 CVE-2022-31079,0,0,da15dcf9c5bbd09a10695baab895d1fad9536fe796a74909052ac615bffab37f,2024-11-21T07:03:51.100000 -CVE-2022-3108,0,0,c7d03c7b74e473a139e9810e20f815c3001a35faf6cbc10940e82e833f6cbe03,2024-11-21T07:18:50.553000 +CVE-2022-3108,0,1,5ab18c4af1c7bc72b5f9f136c645de976bb9bfe8223deee77451fe4a03945e8a,2025-04-22T15:15:59.493000 CVE-2022-31080,0,0,4d68cafcb92d400561d40d9b189b4fbcb8afcae32f825b43d3cdff61508a5cb0,2024-11-21T07:03:51.223000 CVE-2022-31081,0,0,483c260abe5d7392d6c5051e0e3a70050cdcf44859174af86482903eb65d187d,2024-11-21T07:03:51.340000 CVE-2022-31082,0,0,f1ac68bfe8c9d63ff60d57c1922f8047a808296e3837bfef0f3641f6b6dec181,2024-11-21T07:03:51.483000 @@ -199538,7 +199538,7 @@ CVE-2022-31096,0,0,5876433a1701b388c84585791fcf8fa28e0ade390e13ca9071c86306c16e4 CVE-2022-31097,0,0,5b86196b4914d9774128095369fa08894a84b8bc6e9fc90221d9ffc46fb6ac5e,2024-11-21T07:03:53.317000 CVE-2022-31098,0,0,0cecfdda7149924193438b60970b7d39415a99d331bcb0e0ed5dc7fefcf1d033,2024-11-21T07:03:53.440000 CVE-2022-31099,0,0,554c774c4e73c9bd5d245e3f0777fcbec6718f88094ad211f428bf87e653c901,2024-11-21T07:03:53.550000 -CVE-2022-3110,0,0,fc64150c7e47f400ef83074241eea4f2dc6fc0f602275c178447765b05ebece3,2024-11-21T07:18:50.813000 +CVE-2022-3110,0,1,12e65db693110ca0eef45a8bd0527a3d55640fec1f0f3c19582ec780655a0525,2025-04-22T14:15:19.660000 CVE-2022-31100,0,0,e7ac9e0c034575a295b04f031dbd3e4e00336e7dbaed71dc59ff42ad05635dc1,2024-11-21T07:03:53.663000 CVE-2022-31101,0,0,55a5918762d667f9e569314a77188a98867041fdf9642b80613aef4792d5906a,2024-11-21T07:03:53.770000 CVE-2022-31102,0,0,16886004729ae5070d68b2986135b885febe7ae8f7ef6d71562105c2365f4720,2024-11-21T07:03:53.887000 @@ -199549,7 +199549,7 @@ CVE-2022-31106,0,0,2d5b7e66adedcd69098f41cf5fe42975c128eeb93075c865c05da7d4030f4 CVE-2022-31107,0,0,7a5fa8a7ce54ff50c2a65b54eae6534c24fb52274e728f22f519d1bf3f40e60d,2024-11-21T07:03:54.563000 CVE-2022-31108,0,0,b6f98ef9f20c1be5a58726f8228ea95f68ec6502cc132eca5040945e94a47fff,2024-11-21T07:03:54.697000 CVE-2022-31109,0,0,eeceb3b3dd94001cf00151245cb6872d7bb011c3561e5b7c1ed16b26bed08955,2024-11-21T07:03:54.830000 -CVE-2022-3111,0,0,8972376d63be4fd22a2c3e467d16fc2c872ddb73085613c53140d0493975b0d0,2024-11-21T07:18:50.950000 +CVE-2022-3111,0,1,ad36ce761fb5932ca301603021668fc7695360b55637547356d0e0ea6dd33d1e,2025-04-22T14:15:19.850000 CVE-2022-31110,0,0,96e81c750d1dd3a2e470cfc73454fb7dd8b97d0883b30eb453417b22bdc6239e,2024-11-21T07:03:54.970000 CVE-2022-31111,0,0,dcd4dbc8c220ca3773f9815993c0fb5e301e360dd8c8ca7cf0518e144db28f95,2024-11-21T07:03:55.113000 CVE-2022-31112,0,0,8c85a0f2258d1b9357cec9d201afd7be9522312dcaa4fd9ba1eb07656cdd6a7a,2024-11-21T07:03:55.237000 @@ -199559,7 +199559,7 @@ CVE-2022-31116,0,0,c9d6d57b7ac0ad9a8eaa863754e27eeb6da01292c9cf4c7b7c653ba4dbe67 CVE-2022-31117,0,0,479bc41286b6efca44bd32b979a92f6fd3d563161ae875a32e2c749c1bf327eb,2024-11-21T07:03:55.823000 CVE-2022-31118,0,0,606502d039e36be2a249ba029e0a5a64c14da53b220ea74ab5f79137e079bde6,2024-11-21T07:03:55.947000 CVE-2022-31119,0,0,1751377f339ff7e093cb69782097dc33e17994aac23855e9e40879bbe5d33df3,2024-11-21T07:03:56.073000 -CVE-2022-3112,0,0,032d3f245c195dfd8a5577693b6d0bc8df79cd8c72d911f969f6f61fce6f4d43,2024-11-21T07:18:51.087000 +CVE-2022-3112,0,1,a390f38d97f66efa351b40723d9266f70ccf530a891250cc43fcb1348eeb90cc,2025-04-22T14:15:20.037000 CVE-2022-31120,0,0,1799b47dd975368d2d810ab3c36eb5884fca82e4657ba03d2f9ff4125ae19426,2024-11-21T07:03:56.207000 CVE-2022-31121,0,0,3aa5b5fd0c79eec0b6dfede1f2e1ca318cb2951e14a23229557d7abf7b4c1996,2024-11-21T07:03:56.330000 CVE-2022-31122,0,0,5a7ad6a6c15e9fac5f02cbd9f3710166045e0c2f68043996657530568db4c2f7,2024-11-21T07:03:56.460000 @@ -199570,7 +199570,7 @@ CVE-2022-31126,0,0,cc0523820f87bc5d34c71a793ed82fb2bf419a23f914c84f14976ed8eb222 CVE-2022-31127,0,0,87cdcb65926884ac7b850639d751cf7b4550c732368ffdba8171784718c4927a,2024-11-21T07:03:57.163000 CVE-2022-31128,0,0,93c6ec90409e1a60118a5dfdf5f7796a98f0a903425a50c1f368bebc2fc1fe7d,2024-11-21T07:03:57.300000 CVE-2022-31129,0,0,fe8a623a62af5db8360789f1fbc99d78a00d0d7425e5108cbe88a64a81f2f7f7,2024-11-21T07:03:57.430000 -CVE-2022-3113,0,0,c7db44604e5b360687c7c2c83dcd713bf9fead1c302192f041da1e36d64a1237,2024-11-21T07:18:51.223000 +CVE-2022-3113,0,1,4d42aac48078122fb4fc9aa6bd84ee7f4ec3beb9a8955bba233f2667d8ff3fa4,2025-04-22T14:15:20.220000 CVE-2022-31130,0,0,48c34845f0c9d9637fc437bc6745f2aa7e6c8f422fa7abd9643526d03d165aa9,2024-11-21T07:03:57.583000 CVE-2022-31131,0,0,65c7eac4a98c4e0dac18cd0be4f81aee27575a1fef2f11712dbbb27d9a9e695f,2024-11-21T07:03:57.733000 CVE-2022-31132,0,0,88e42abd9c1d127c502f5354419ec2ed16e77cd96ddf5765c21c209c37abe9a0,2024-11-21T07:03:57.897000 @@ -199581,7 +199581,7 @@ CVE-2022-31136,0,0,5e774444d75f829944d03346410ecc1720ffd08c678862c554e1df8ebf826 CVE-2022-31137,0,0,1ec16f03bd33c6d0cf993cd77a798c62d89433c834063408f6b0f11dda0fe125,2024-11-21T07:03:58.540000 CVE-2022-31138,0,0,97972349537f64a45f4f4d542df5aed4ca4b2366c098b55199f172d9a8381ec7,2024-11-21T07:03:58.673000 CVE-2022-31139,0,0,c1edb569d684827846df7eae899ec6c455f80af3d582d82f754a491befc275a1,2024-11-21T07:03:58.807000 -CVE-2022-3114,0,0,56d8d3e8e3af5ea593aaa4e6abd57a8e9b5340f120ec14c09042711421d9bc1d,2024-11-21T07:18:51.347000 +CVE-2022-3114,0,1,9259ec6ebdc9e7e5ad93c97748ebbbe4c99081f502ef94f5d19f43ced6196eb1,2025-04-22T14:15:21.347000 CVE-2022-31140,0,0,266270386883b30003f07d3a1c1709e4be598135def6699b0100f8b5869192da,2024-11-21T07:03:58.947000 CVE-2022-31142,0,0,fedf3f1d76f576f3f2eab22706a410bdf546879ec756ed173d84273c30fbb01b,2024-11-21T07:03:59.073000 CVE-2022-31143,0,0,1f6322439e1cca04f638cf47031550b05b7bf49c47c23df3c2170ae3bf818bd7,2024-11-21T07:03:59.207000 @@ -199591,7 +199591,7 @@ CVE-2022-31146,0,0,3df230e4cf551144d64d8274b76b8d5a057b60a46321d2072793e8753e54a CVE-2022-31147,0,0,a3e3d875acc49e976a21bbd6b03089cc599f71df13e3dee726860f0eb0f27cf1,2024-11-21T07:03:59.793000 CVE-2022-31148,0,0,b61270e32b441f6d4a5eef1d5c5313fe930c2ccbf8abd75b13737c691dfe2b6a,2024-11-21T07:03:59.930000 CVE-2022-31149,0,0,eacb882f1715e290857c5b412a5f6119e83b4e8ccddc17c1b829ffbd09fdd3c3,2024-11-21T07:04:00.063000 -CVE-2022-3115,0,0,a03a2d50d0b5f2f31ba6665ddf303565bbb002af58c705fa86b09ac7e2a17663,2024-11-21T07:18:51.477000 +CVE-2022-3115,0,1,67a2afed07d67a5ed0bfcd7bb82ad687ba42fe69bbbb7d43de1f58246ebdcdb4,2025-04-22T14:15:21.723000 CVE-2022-31150,0,0,68b86343ec122ebf95148370b33b57abc07dc9d3b5055c82ac34c8ee3c1d9ab2,2024-11-21T07:04:00.207000 CVE-2022-31151,0,0,14d034785ecef74e5541b98073fbb3cb3262c343e9cffe5362d0ff08579f98a4,2024-11-21T07:04:00.370000 CVE-2022-31152,0,0,00db6541cec9d593bdfdbda910645f6c87ef1ab8954d325dad19aeb11f101b8f,2024-11-21T07:04:00.550000 @@ -199727,8 +199727,8 @@ CVE-2022-31289,0,0,0e330b3e2d9ad615e7004f15dbabfdf5265dcd5e59397822a646ccc1a4a81 CVE-2022-3129,0,0,1a4cb0e766a761c6ceba8e678de58abacb2977938e63df5a03728e12da36c96f,2024-11-21T07:18:53.177000 CVE-2022-31290,0,0,07d75bdb9393d475311946335dd85a7be0313a78fe2ad95edcd5ededa119f213,2024-11-21T07:04:17.073000 CVE-2022-31291,0,0,cc2ca802f88c245b95bee52f4a21ed35eb7bc480aac0e90100953aeec298a53b,2024-11-21T07:04:17.240000 -CVE-2022-31294,0,0,f6ed0465d8899d02807c7a09c9f169ab7f7e1fdf3e95d6e4020cb58782c8a09a,2024-11-21T07:04:17.400000 -CVE-2022-31295,0,0,922d79529d589433072fc51b2e0598421a7c20db45ee296ce171f4fd2812fd00,2024-11-21T07:04:17.543000 +CVE-2022-31294,0,1,50fe913e07786252e0f2a81326a0c9e8e2c8bc3599a10dcca472ffe18a9b212b,2025-04-22T14:51:37.563000 +CVE-2022-31295,0,1,32964895beaf248270b3c5746532672b25c6d0ff1ca9270e5dfd06b20d00cfcc,2025-04-22T14:51:37.563000 CVE-2022-31296,0,0,9e38db9a99f318cc628564570f30fabf2b2df909252acc70a8ae04dc5447593c,2024-11-21T07:04:17.700000 CVE-2022-31298,0,0,32f723a26bd39d92eaed169a5d0d82a94413c98d2422042152719ebee6176043,2024-11-21T07:04:17.870000 CVE-2022-31299,0,0,e88380845f1ae758a87305c62a6cf1272664edea3eb9bd83bfcbb718486d627b,2024-11-21T07:04:18.030000 @@ -200212,9 +200212,9 @@ CVE-2022-31906,0,0,421001b487d5e4df7924229d9e2d98878f2bed28b5ec1537ad5f76e14809b CVE-2022-31908,0,0,0f0387f8b2c7662b482422e1183eadbfc20468a614a66f28dad910b2d436ed4b,2024-11-21T07:05:28.370000 CVE-2022-3191,0,0,cff546348c1fc78b5aa7427937b256dc4fff3fdff34a7902bd11b676a133c796,2024-11-21T07:19:00.800000 CVE-2022-31910,0,0,dfacf4906b98430e1718189747ccd888b23ffef27cfc4e8641d2ee4ffd910a9e,2024-11-21T07:05:28.523000 -CVE-2022-31911,0,0,65f94eb3334d8b919a1adf929e6c62ac0cb9c4c7bd292d158850a2847410597a,2024-11-21T07:05:28.673000 +CVE-2022-31911,0,1,3cc2a4535e1c8ee26bed7b6b63ed0070b06023b7755dfd038fc7118083d61f6c,2025-04-22T14:51:37.563000 CVE-2022-31912,0,0,750785a292ffcfdf8708323f26a3aaa274c628622f9f7be71cf7a68fa06fd742,2024-11-21T07:05:28.820000 -CVE-2022-31913,0,0,54bfa33aa81a58023e2cbf82ce1e841324e9f35138c6fc4bc217d2d285d77fa7,2024-11-21T07:05:28.970000 +CVE-2022-31913,0,1,b4f2142b8f6a4905549c3b380229ffbe55d073387dc108fc712f6e59e6befa9f,2025-04-22T14:51:37.563000 CVE-2022-31914,0,0,3a1a6b80fb505fdc695ca589a3da392725da80d5fa2f4a08b1220fcd2123b3a6,2024-11-21T07:05:29.123000 CVE-2022-3192,0,0,d05c69f980131813123cc19d7fcd21d28fd2a836595dbbb51fd2e7386affddd5,2024-11-21T07:19:00.950000 CVE-2022-3193,0,0,46937496a034b0541c6f1a0969845b6bdd3657242d78675e13193aceebdc23ea,2024-11-21T07:19:01.110000 @@ -201366,7 +201366,7 @@ CVE-2022-33234,0,0,217f4af0a8a738e7a5adbd98ed0a4ea067895335e784b86da7c4833681868 CVE-2022-33235,0,0,d1978bbc342ce02dcefd054f4c64c9462e4053e1b2771e878c3b5a857e55ba2c,2024-11-21T07:07:48.813000 CVE-2022-33236,0,0,d65e01eace8e41bda2de1705d397ba828362bef632ad82a432bc925a818e1dc0,2024-11-21T07:07:49.263000 CVE-2022-33237,0,0,aa45fd0fad66c891d116416039278ae90576a949fba6b22c87d4d7770ed07cac,2024-11-21T07:07:49.480000 -CVE-2022-33238,0,0,e47ea3d1608f4d73dfde8b837c8d2cd57597ce50f40e5087e0c8622f89d0de81,2024-11-21T07:07:49.897000 +CVE-2022-33238,0,1,2e8dd1c574b04399a4ebed39c3460e6e532b20ed6563a5a14abc96dea200c365,2025-04-22T14:15:18.717000 CVE-2022-33239,0,0,25e681cb4579aa771fe19d04eb4e4c7e02b9410a139d8829304651db0f4d92d2,2024-11-21T07:07:51.277000 CVE-2022-3324,0,0,6f6fdf48dee0c6504d37be611a979d8820c9eac2089fbc011b9f6f160fdec8cf,2024-11-21T07:19:17.890000 CVE-2022-33240,0,0,876d4a1f30062ca5f57d702f122e0db7094749a0508a851ace7558a90253627c,2024-11-21T07:07:51.673000 @@ -201394,7 +201394,7 @@ CVE-2022-33264,0,0,ca9b2686263b92a0933e8fd5332d446af8fcd43ed6c66321749fd4b592129 CVE-2022-33265,0,0,a414bf673f33309598f97704184579925dbc28f6c36f4403687d7b892f1e7df9,2025-04-09T15:15:47.750000 CVE-2022-33266,0,0,12711c11812b1efecdc6238d61a78a6572cd2434bb5cced73c2493645b1f34d0,2025-04-09T20:15:21.087000 CVE-2022-33267,0,0,a9cca259787d01c618d74556a173e4491021166139d6c942f023dd3fce58b4c0,2024-11-21T07:07:57.400000 -CVE-2022-33268,0,0,e67499947adb10825c171fce0fab9c18164316d07fad687e3adf05151c0994be,2024-11-21T07:07:57.623000 +CVE-2022-33268,0,1,80bd69aa6b5915aa9587665355919f8f7dfd9a89e18ff002097a5cc74533e8c1,2025-04-22T14:15:19.420000 CVE-2022-33269,0,0,70ecd604cd5f23105f41ce40dbd97a985411d8da8370da3bc41d2d3ccfd43d0d,2024-11-21T07:07:57.867000 CVE-2022-3327,0,0,06ade91c020d413fabebe4ca34d64d4ba1a820460598070bc2d7d85968aa0d45,2024-11-21T07:19:18.293000 CVE-2022-33270,0,0,3ff5b16804f4142fd93ccd129f0648eb47cf391ab30aff38dbe5ee4abaf670e5,2024-11-21T07:07:58.100000 @@ -202699,7 +202699,7 @@ CVE-2022-35086,0,0,74ddf231cf5568cbcb2aa934f7d5f20beb349155ca76140ccc2717458ab91 CVE-2022-35087,0,0,92c5b727a490db2e3c78c2fb9e766b94fb318b6f1c11469aab59c35ee7f97ebe,2024-11-21T07:10:43.377000 CVE-2022-35088,0,0,f7cd02f2103f6f8abe9961dacdf39b053c379903942b87876697b193b93fcf25,2024-11-21T07:10:43.527000 CVE-2022-35089,0,0,de7c830ba1f10a5e3c26cbec5e3397c3022c4b99a785d7cad5b52bafa892bb9a,2024-11-21T07:10:43.670000 -CVE-2022-3509,0,0,139537737a02dcb0abd794a2c24c99aba163314b0ba81609b2c8d38fdb26ae7d,2024-11-21T07:19:40.570000 +CVE-2022-3509,0,1,167927e64a9fe2e1b55ecc9fb96431cc5fb9b588d2292e3b54a927913daf32e8,2025-04-22T15:15:59.683000 CVE-2022-35090,0,0,9c61a67eded9d38394149c082e0ff1edd835bf214e2277ce9bd0785f79c25487,2024-11-21T07:10:43.803000 CVE-2022-35091,0,0,133aad6e3bbb87dfa6b6b9409afa85f50561ffd04833d244d7b003dde2140772,2024-11-21T07:10:43.950000 CVE-2022-35092,0,0,2f4f480f3457501e6d3265b700a8c534665e11cefc4875c4d358e1ce6ce94164,2024-11-21T07:10:44.083000 @@ -202710,7 +202710,7 @@ CVE-2022-35096,0,0,1c2b81a24c07d767aeb442272ef84bf32f710b70820c03b0854b197183691 CVE-2022-35097,0,0,5cb8a460096b118c8c948207f5df572a041c6566bf725d0bc0a841fcfbabb998,2024-11-21T07:10:44.747000 CVE-2022-35098,0,0,2f231f6ad7da610315470072693a353e447270c2038efe995f0f94f8a4da5259,2024-11-21T07:10:44.880000 CVE-2022-35099,0,0,0b84716716c8366e4dc7808e6bf0e6463fdc3ed5d60ee22e4f3c5f4e56af4c6a,2024-11-21T07:10:45.007000 -CVE-2022-3510,0,0,0b8073277767514b61e0db1b91632cf678afd2e902a58e6158206218122bd564,2024-11-21T07:19:40.690000 +CVE-2022-3510,0,1,c8a94a483289ccac73899a04314566ddaf61960641413e5d9ee9e825773edf3f,2025-04-22T15:15:59.860000 CVE-2022-35100,0,0,59fdd1bf805557b6874d4748ac71ed422f32f52330fae2f3a3bde0b629556a91,2024-11-21T07:10:45.137000 CVE-2022-35101,0,0,130b97265e562c79603950d5214c0dca96bbc7d451a015484045e7a71fb642bd,2024-11-21T07:10:45.267000 CVE-2022-35104,0,0,e1c6a6e2084dc2601f82f65ef2c7e731209de0fe95b91f1bf2632a92bb08cb19,2024-11-21T07:10:45.420000 @@ -203544,7 +203544,7 @@ CVE-2022-36045,0,0,7a7866e2cb2e19a5c1b6b230d6476b376452a6a3748a4f012664209509892 CVE-2022-36046,0,0,7eddeb2ebc0466773b6d485cf597e817e967a02fabe92a52b518245e1d648195,2024-11-21T07:12:15.827000 CVE-2022-36048,0,0,1546454427b60fe14f4dc92d63ba370ab5bc400ce621285909789b1e115c6ace,2024-11-21T07:12:15.960000 CVE-2022-36049,0,0,31fb92eb4bdb290ab7b3448a3082403a4968f0e11bfab01e1b37e1f7329ecbb0,2024-11-21T07:12:16.093000 -CVE-2022-3605,0,0,0499ff48e118433ceeb6074e50b0e18c2fa5fd5be36f0186cca1d2d7fa9f9184,2024-11-21T07:19:52.013000 +CVE-2022-3605,0,1,eff9bbcf0fa88d72fa672f228331c584464a2d31ad29be29f75794844ce46de1,2025-04-22T15:16:00.027000 CVE-2022-36051,0,0,b092cf74d3e3109b287bdeebbe76cb060da63687e8b80a784387fd91e7917981,2024-11-21T07:12:16.227000 CVE-2022-36052,0,0,45f6114d939900814caeedfc08557eea9b3985b5874d97aa5f05ee02305cb478,2024-11-21T07:12:16.370000 CVE-2022-36053,0,0,fdc9204cda35affa7dbe007f30da0e202bf182be62d297ac7c0efc768bbf6ecc,2024-11-21T07:12:16.510000 @@ -203587,7 +203587,7 @@ CVE-2022-36086,0,0,31016bedc902613628f76b07d0eb430762d56dd2b67b0e9cd308196cf1354 CVE-2022-36087,0,0,d3b670268fd2d9c475904bd72bebbca457f7d73b22ab0131bc2d81c3cb25f500,2024-11-21T07:12:21.413000 CVE-2022-36088,0,0,526e80920ff781d24df4cf541eea3b2b042a06bb27df9ce42b42d33c72f91a77,2024-11-21T07:12:21.570000 CVE-2022-36089,0,0,8cadf449baca1f09a97b3595fe6d93e148b7905a41d14247e4788f26e4afcc7a,2024-11-21T07:12:21.707000 -CVE-2022-3609,0,0,5e572390769e155174f8887ce1c3d3705d9ddb51bea6d38524d05ec5bad44913,2024-11-21T07:19:52.543000 +CVE-2022-3609,0,1,0cfc0a0284e7cf2ecdf281fc753c06cd3206a7502d8eb9318bca7f0d8d8354d1,2025-04-22T15:16:00.213000 CVE-2022-36090,0,0,4dde8028080218997fbae91bb19f079065f54cfbf282b2216388082ee726725e,2024-11-21T07:12:21.833000 CVE-2022-36091,0,0,dfb89097f6128341f83da1da3539bae699d38edc36d7d041205122e8b6bdc6f7,2024-11-21T07:12:21.977000 CVE-2022-36092,0,0,403098705a74d246543322a40c0da93e596933e3476f8b8d5cb4763aa895f115,2024-11-21T07:12:22.110000 @@ -205461,7 +205461,7 @@ CVE-2022-3852,0,0,e12d34b5d5e8e131f6f0c5eb41ce8b48ab45f42b1e25ee547fd87255208271 CVE-2022-38527,0,0,329298c6cacc52914fdaee826328f0a44e086ad03ad4aec725f733e0cd9f70d6,2024-11-21T07:16:36.650000 CVE-2022-38528,0,0,538c5489e174d307d2c86e8bcd702e853bca98ec6eb1e5d9483bdb9bf33847c5,2024-11-21T07:16:36.813000 CVE-2022-38529,0,0,1fb356aba79c135e8c79f590cae908af779b8592b30c6775ad8db2191a9c102f,2024-11-21T07:16:36.960000 -CVE-2022-3853,0,0,fbf8ca2c1d7e3819b18ffa3cdcf1e0f115876424ac473ecc5fc99ede4fe57d04,2024-11-21T07:20:22.193000 +CVE-2022-3853,0,1,e439020a3e013f888f4f723d1d9e0833b6d63bf50ffd4b1cd78d913ea42bc3ae,2025-04-22T15:16:00.377000 CVE-2022-38530,0,0,18b8753cf885dd8a79922d1afda90477eb1aa8a57bf40169f8c813b16d2fe63a,2024-11-21T07:16:37.100000 CVE-2022-38531,0,0,bf80977707c63bb1e834ef627efe7968a8d148d4e3d8d3dadc9c7d4eccbb37a8,2024-11-21T07:16:37.270000 CVE-2022-38532,0,0,69cc26a3b260ea29b3d7f61eb05fd4c8d81435ee2d0c518c9ecde4baae5683fc,2024-11-21T07:16:37.430000 @@ -205522,7 +205522,7 @@ CVE-2022-38616,0,0,34cdb416a2838779e0f2676aafbb1ee271a908b7286ca1e02a3f1dacced06 CVE-2022-38617,0,0,3d04e3ab49952b10b6e229c814d2bd05de8737e4a62c6b7997f8ddb136fd48d8,2024-11-21T07:16:49.590000 CVE-2022-38618,0,0,c5b59724a3b7fccdc7493ceded9c98df794888573ab0bdf6bf89bab0950f6dcc,2024-11-21T07:16:49.743000 CVE-2022-38619,0,0,896e257ba61ae4b6d10942e7b0a4df1a14975b5ce90fc1784f59be3a8e84d422,2024-11-21T07:16:49.890000 -CVE-2022-3862,0,0,fa49a7af9928a6a2b872687b9d92c9eb70f9f0f66fe429319a6eac440d05cbd6,2024-11-21T07:20:23.193000 +CVE-2022-3862,0,1,a2f250d82275be360e603a322da3060a10db9da703bf65cc9e5f88e3947e175c,2025-04-22T15:16:00.560000 CVE-2022-38621,0,0,2b3bd4dd35715dca351d1664fd6ccc8a69c56f99bf832b49ff73591a6d9ad183,2024-11-21T07:16:50.057000 CVE-2022-38625,0,0,3cb444358ce9281d3961ae8e4a551252fcd50778bc77bb1780a6a122c28e14e8,2024-11-21T07:16:50.200000 CVE-2022-38627,0,0,2502c9652a66a1204ea06a366a518119de8ce91553c1b2e185f614fd3ed8d11a,2025-04-10T16:15:20.270000 @@ -205781,7 +205781,7 @@ CVE-2022-38996,0,0,1744c23d9454e4191fc7066e66cdde4068dc73a4fa109b909698ec9c372dd CVE-2022-38997,0,0,f21621df63072a1a3843950fc0f8dca91a743255febbe0b9d2989208c930dea6,2024-11-21T07:17:20.427000 CVE-2022-38998,0,0,c2d37ee5fb737ee0e8be96b18c8c030226ad06be0a38ea4700f9c75a3807cdb4,2024-11-21T07:17:20.540000 CVE-2022-38999,0,0,4f34f40057d02e40b8401f4b45b912221e26c6b481a4845400c5090dbd0066b4,2024-11-21T07:17:20.660000 -CVE-2022-3900,0,0,122e84229c055f6ee8dcccab8ef093ce16e9fe854c1c029e2b888237d17ac91f,2024-11-21T07:20:29.713000 +CVE-2022-3900,0,1,dda49e708fd68b57130dd982a52f6e209b7ef87466a1b96ea1c659a8edce9bd4,2025-04-22T15:16:00.807000 CVE-2022-39000,0,0,4e100375984005ea03bb38082a8fdb882696db7e45d2aac50ddd7b696a253f5d,2024-11-21T07:17:20.783000 CVE-2022-39001,0,0,1addc513b99bd9c37497b5f0685fed0a3e15f337813a22b9a229b6f913c5816e,2024-11-21T07:17:20.907000 CVE-2022-39002,0,0,0b0819462618cb1759d6dbc2431c2ceb63c0ccb46025f53c5cae23bb670c532d,2024-11-21T07:17:21.063000 @@ -205941,7 +205941,7 @@ CVE-2022-39146,0,0,1a701e7660a20563a7c4687d775332485e0d46fb70d06e77e355e1316fa0a CVE-2022-39147,0,0,d7f972d8515b9f15e8e772617c05a7353bb63818c19537053266fbc80c372321,2024-11-21T07:17:40.203000 CVE-2022-39148,0,0,047f1bac7687b1b6009187320e2581fb3f3f6e99c9c5d9eb2dd5bace15e677df,2024-11-21T07:17:40.320000 CVE-2022-39149,0,0,81d2e2b6f92fbefa64ab8c9c263a6a1d9eee3400f3fdbd9aacaea134a0af76d7,2024-11-21T07:17:40.430000 -CVE-2022-3915,0,0,ca0502cbfc6b929b624c64a3bd95aacf659d6b81e46c7e636dedc51ed6d7118f,2024-11-21T07:20:31.363000 +CVE-2022-3915,0,1,ba7e5818c5d78d197bc5ddf71f6d363fc94da960d56643a76404cf3a0fca44ae,2025-04-22T15:16:00.967000 CVE-2022-39150,0,0,1357c673c1b0f0d7e5cd7c45e9b0dd29b2298adaa06cb8854cb0054d3101aeda,2024-11-21T07:17:40.533000 CVE-2022-39151,0,0,d3b665cc7d95929a7e1978d4ce1d24284d85aa7f6e54d230ee26385bdf3a68c3,2024-11-21T07:17:40.647000 CVE-2022-39152,0,0,3983f862863c3bc81b35ae8184c705cce5e74e1f9ad2bbe72bc6ebc92ddf7387,2024-11-21T07:17:40.760000 @@ -205980,7 +205980,7 @@ CVE-2022-39186,0,0,b805ad8d45068084a4254f674393bb5cb7e86aea77d534a0b3a23061da961 CVE-2022-39187,0,0,b5f1b7966bb90a1aa419561f959fede63329920de80365ca966f3e2daa44a930,2024-11-21T07:17:44.687000 CVE-2022-39188,0,0,5b4e2ad23c1bc7d895a22f4bed7ff540dbbb27d4dff7392f9960fd083798054e,2024-11-21T07:17:44.817000 CVE-2022-39189,0,0,a50cac57b23778fa0cac2b5a5317f54862ed8ca0cd2dc4ba2b24db7e15fcba1f,2024-11-21T07:17:45.003000 -CVE-2022-3919,0,0,2f20f4155e2e20c7018e9d601630dce9aeca056fb36dc50afd5b1164bd67aa61,2024-11-21T07:20:31.937000 +CVE-2022-3919,0,1,f5217d16088444436fbca46a71642f671e1e3df1b95d345d45b44c33f4a5f928,2025-04-22T15:16:01.110000 CVE-2022-39190,0,0,6cb35d67691510584c4bd6888823b5ed35dd2078c318a9a2f94bd5691c19f37f,2024-11-21T07:17:45.207000 CVE-2022-39193,0,0,58085b8bb1a3b1a064ec3d426063e7410eb24c27e02f6facc9371fb82b8a2b62,2025-04-03T16:15:23.657000 CVE-2022-39194,0,0,46c8a570d410731976d04ee364f2f8e06f9ddaea94b4c2cf8db59b17e6c55d40,2024-11-21T07:17:45.533000 @@ -205999,7 +205999,7 @@ CVE-2022-39206,0,0,db35d1b4130db428a3f68dd4f88de7f5839f7ca784a0b8b51812565688af9 CVE-2022-39207,0,0,fb8390741c2e93b85149aae27fad18592e349b1095e52c2d757a47916dccb34b,2024-11-21T07:17:47.227000 CVE-2022-39208,0,0,421622e4d97ed0f25714a824a52708841f72e43342110e1f2b10f7cad8ff9bc2,2024-11-21T07:17:47.353000 CVE-2022-39209,0,0,8ce3a78d40b6b182e0e052ebd0f8aac3ce205413e3cf02089e04b7b06297ecbe,2024-11-21T07:17:47.487000 -CVE-2022-3921,0,0,47aab62c501cbcb087f38611585736f7ae11589a1e2e127232431b1906669ed7,2024-11-21T07:20:32.240000 +CVE-2022-3921,0,1,2a804b032b8168439755b9f9e96cad9529a08fc423ccee37a3dc4bcdf2c8e3da,2025-04-22T15:16:01.260000 CVE-2022-39210,0,0,84a0a717b9e6389a2de86c90e9df13d009b157bc562a7fc4674d993618953ded,2024-11-21T07:17:47.643000 CVE-2022-39211,0,0,9e760c4fc3bdb554bbb1b30b834d6f7d926c050aafeb5e89d5a45869bcbdac15,2024-11-21T07:17:47.770000 CVE-2022-39212,0,0,7200628240cc5cdc2795bfd7402b50bd9429ff06718b553e28992cc7059d1745,2024-11-21T07:17:47.910000 @@ -206040,7 +206040,7 @@ CVE-2022-39245,0,0,078153310123370f9897616bfb456126fcc58003d6f77bb6008b4af65a89c CVE-2022-39246,0,0,5e4b7028f772a3bb5db6b0204159e48891658e1a107ac2b1c97b4bf825f0825c,2024-11-21T07:17:52.157000 CVE-2022-39248,0,0,9af15b70aacfd2183ee36add4c4c046f597cf6f6a5d0efa16e68ba195c9ae973,2024-11-21T07:17:52.300000 CVE-2022-39249,0,0,7121546959076ee583df91296bf885e6281e9ef1bb1638214227bc3b34aaed83,2024-11-21T07:17:52.443000 -CVE-2022-3925,0,0,808d0951126631515779614f06c380ed3595d618944dce18e6dca465e8aaf975,2024-11-21T07:20:32.760000 +CVE-2022-3925,0,1,35e966d426428fc783c32555fd96e6ecba42143c4dd36d5ca3265fb0b897f4ee,2025-04-22T15:16:01.403000 CVE-2022-39250,0,0,04f7e383b33eab1c4c97799cf2d7d83d5d59384aff3021736fa86546768d9a69,2024-11-21T07:17:52.587000 CVE-2022-39251,0,0,8fdaac31d23108637ad4d53959abd79d4f041f0ec28e02a2683aebefd129ffbe,2024-11-21T07:17:52.733000 CVE-2022-39252,0,0,7abb95c32986c7d70ff894194b2418065b6397e7f7778f9fc66f3e0e81b6a2eb,2024-11-21T07:17:52.873000 @@ -206127,7 +206127,7 @@ CVE-2022-39326,0,0,36d442fd7494581c002367017f5f4e0c65dadf9c6e7d11800bad3e8c2eb31 CVE-2022-39327,0,0,ac22f0fa48a1ddc01f591b6cd24db9d93850e662c496dd102b742ecc7a97e36e,2024-11-21T07:18:02.780000 CVE-2022-39328,0,0,3fc8a78ce93b9f55eb5fd7a5784b224380376a84885d083621898721004ed173,2024-11-21T07:18:02.917000 CVE-2022-39329,0,0,022d601b64ca105589c62c151c67e4bd9dae84a27e6b0087d83569fbba001284,2024-11-21T07:18:03.057000 -CVE-2022-3933,0,0,d056537a2a10216b8fc78047bbdfeff672cb5f63ba4e07b038485a98290da4bc,2024-11-21T07:20:33.560000 +CVE-2022-3933,0,1,eec7f60d9c26a33ce89cbcc04a3ef91bcb0de6eec2c6c9a81af112b5d770c47c,2025-04-22T15:16:01.557000 CVE-2022-39330,0,0,ec9e3e0822470e4325f634758ec512c3a4559c809c50e87160ecf3940f3e75a0,2024-11-21T07:18:03.193000 CVE-2022-39331,0,0,842a7bfb302f76db56639cf0ccdcd2d9ff7a528e288084961bdf8a71193afeaf,2024-11-21T07:18:03.333000 CVE-2022-39332,0,0,a9a88962b83aeca8edcd867e0f350e54043d6284808f42f1dea02f2f6f78c9e4,2024-11-21T07:18:03.457000 @@ -206137,7 +206137,7 @@ CVE-2022-39335,0,0,2f4cb87b1fcf92832f3fa5b04348389116bc0f96c95abc7bf4adf9344a18b CVE-2022-39337,0,0,010a43c6880b18d0f0b52a068ffa3c94b3bc9ca66e69b41cfc5ad7c705380155,2024-11-21T07:18:03.993000 CVE-2022-39338,0,0,0f73b33a773835a648ca3fb70cc86b3c780261acd1401f8bdd64ea5a44f6430c,2024-11-21T07:18:04.137000 CVE-2022-39339,0,0,467c276bfc62f5add4e10e8644376c18d0d483f69d3dd48f054e5f106934747c,2024-11-21T07:18:04.260000 -CVE-2022-3934,0,0,926219aeb65010e8022ccd807a56394f0bc00442709d2b6d428215757aafaca9,2024-11-21T07:20:33.677000 +CVE-2022-3934,0,1,98c92861851685d5eb5f2a9e9f1928b96c0895cc947a24226e4a397de89bf649,2025-04-22T15:16:01.710000 CVE-2022-39340,0,0,c4321a4b50327e64eeb3061ad910fc76db385a674bf63f80e3713afc9430d9ed,2024-11-21T07:18:04.393000 CVE-2022-39341,0,0,941a11d93eeeed1fb0c288eb0ed1ea323b8fd510dae7ce08fb6445098845c645,2024-11-21T07:18:04.517000 CVE-2022-39342,0,0,a8831237ad53229f221d3913259f48a525ff059c2d6b8da530cb73f2fb083692,2024-11-21T07:18:04.627000 @@ -206148,7 +206148,7 @@ CVE-2022-39346,0,0,6f96ae0d6cb2161bb8cbd15fd8f5ebb7d460662735f1fc173e8b082d66f11 CVE-2022-39347,0,0,d4a9a30b92d340cef8780f6e37e0412aa0f8aeb3180bc1cc00665a4e5e63a168,2024-11-21T07:18:05.243000 CVE-2022-39348,0,0,14a772d30d8064b4c726670b85ab408eddd9b49d913bb04ad19491852ed0f35f,2024-11-25T18:12:24.673000 CVE-2022-39349,0,0,d9eb9faa07e80f1d180cbde0331ee8cbc227032de1b8da0c3fe934149355d7d7,2024-11-21T07:18:05.543000 -CVE-2022-3935,0,0,ad2e7888561fab62ba438c4dacf5056e22bb1e53f31f072012c6145e9aebee3c,2025-02-20T18:34:50.990000 +CVE-2022-3935,0,1,63b977356319978893c9f13316f71c7cf4acb6a26fc4a8adcb3e4bc6c3b495cf,2025-04-22T15:16:01.853000 CVE-2022-39350,0,0,975455911476cfc36b24f6e872afea362a2c241ae6d8c090820244014a9c4e17,2024-11-21T07:18:05.670000 CVE-2022-39351,0,0,20bceefea9d8b1fd505df359a8cc931d6eb1058fd84be3fe6fd9a0b30d2c92ab,2024-11-21T07:18:05.790000 CVE-2022-39352,0,0,619ffeee8a97413d83d42824216aa98c6965291b4b040f24d2421b03c8d94492,2024-11-21T07:18:05.920000 @@ -206276,7 +206276,7 @@ CVE-2022-39806,0,0,bb81036f54bf4cbaf81be08fe26d85da3216a6d99ba7fef21a7d740bfad60 CVE-2022-39807,0,0,3a024c7c85d731ccab2b5058d4965c18470a4e941394b88824208ab84de653d5,2024-11-21T07:18:17.470000 CVE-2022-39808,0,0,3636b33db58bbf251dc4e800056841131782b39797b1e5a7265ad44ba7993786,2024-11-21T07:18:17.620000 CVE-2022-39809,0,0,fed2d82a12a1316f0f3a6acd3a39143d55dd552d7f7651fd8d2e6285bad0d04b,2024-11-21T07:18:17.763000 -CVE-2022-3981,0,0,9f4272e39a1d3aad5a17e987654868572589bfa65d1647b3337f7b76f538913a,2024-11-21T07:20:40.197000 +CVE-2022-3981,0,1,13efc99f44e67e4b518cdf0ce1edd42c1a69769e5528de254e16fd6ade1bddf4,2025-04-22T15:16:02 CVE-2022-39810,0,0,bc47ffcda09cb8fc998ef91f7a27928da05feea8b54741d13d8913eea75a2991,2024-11-21T07:18:17.927000 CVE-2022-39811,0,0,2a92a2d6b14767381ede7e0220dfe54359e876db14f6487f73fb45595074a58b,2025-03-28T18:15:15.327000 CVE-2022-39812,0,0,c6e01b07cf30005a72dfaba5b62d625e36c911b026635e93395b8408d53ff80c,2025-03-28T20:15:17.130000 @@ -206287,7 +206287,7 @@ CVE-2022-39816,0,0,4f3979eb5b578c796651302ea9fe6f6428d637b14fcf5bc7c06d32f12496f CVE-2022-39817,0,0,1155eba1c476e5b51ae68f744b71f3a8534a029a094cf58f8a4a12f2b02e75e1,2024-11-21T07:18:19.003000 CVE-2022-39818,0,0,2f8a01dd96b55baaf56295c5d782d9c85e80f6b3e79f0ce9e167a6bd4185be47,2024-11-21T07:18:19.153000 CVE-2022-39819,0,0,434f59773d1d1af012f7edef971dab9c8ac3a5bdf448f8e76561f48592d4033b,2024-11-21T07:18:19.300000 -CVE-2022-3982,0,0,c86dd9245043c0a0d5fcbd4f36d9148295cae8967aa7f9656900010e8d1649d3,2024-11-21T07:20:40.313000 +CVE-2022-3982,0,1,f7fef0f2949494cc4f5910047ac07c680dcc88386fd36ce81abe120f6c2f94f5,2025-04-22T15:16:02.157000 CVE-2022-39820,0,0,b0585b0f366fa360073c7fdd13ca8bf281656ef06a8d98411a7bbeda6c0b34bd,2024-11-21T07:18:19.447000 CVE-2022-39821,0,0,bb52f325ea74c88eb50b7405a24c8ae5563cf740e899e47a685e2b678b3b66c5,2024-11-21T07:18:19.593000 CVE-2022-39822,0,0,9a4848125d71fb739c1f7414861fe741bd4641ec37650aecf1a1f09b785ed783,2024-11-21T07:18:19.747000 @@ -206359,7 +206359,7 @@ CVE-2022-39885,0,0,e21bfa83f8512b69b0ff1ac9d48ccb798bb2955d6f578ac3567cb59fa8d99 CVE-2022-39886,0,0,314b3a9dc00bd63166b036a2d30733220057ac6c58d4352ad096d2ba4e53086b,2024-11-21T07:18:27.827000 CVE-2022-39887,0,0,9810d6b236e35b948947ace77b8f18b186504439197c0381c1c605e92732af29,2024-11-21T07:18:27.950000 CVE-2022-39889,0,0,2ae110234ae429abbad6ecf36095aae8064e20dfab6659917b811190791b078a,2024-11-21T07:18:28.070000 -CVE-2022-3989,0,0,010eb923324a00201fb091b11f66b5cf8c62c151cf38d4e4309ae467bedea7a1,2024-11-21T07:20:41.140000 +CVE-2022-3989,0,1,8d52c2ae43a67972a31869c70f26435009f68172224d85ca66e3e018b79e569c,2025-04-22T15:16:02.310000 CVE-2022-39890,0,0,0592b38cd55ff29c19b77c287955087fe60bb1fa09a0d5baed6a8da11be611b8,2024-11-21T07:18:28.200000 CVE-2022-39891,0,0,99e6f8e6366e7cdff6d53018669271b75df1ed7daa1a23a5eed73b6b6c34f51c,2024-11-21T07:18:28.320000 CVE-2022-39892,0,0,2c96ab45065dd5d3b9dedd8b52f3dda07de10c51b15e557aed0816fd745e5d05,2024-11-21T07:18:28.443000 @@ -206450,10 +206450,10 @@ CVE-2022-39986,0,0,ac3638b12207e818dd8346ff605beb2ad382e746904b3b577fb7649b2aaa2 CVE-2022-39987,0,0,0639ed3ec223340e0a1ce994aacc5b15c810901371d1ce93005fd91bd185fb29,2024-11-21T07:18:36.020000 CVE-2022-39988,0,0,f781f0435b53b799b414191e1d32a77ffd6638cb9986b9c981bf2e2cca0a8db1,2024-11-21T07:18:36.170000 CVE-2022-39989,0,0,299a14fc052cea8146d677b00e4db887faf38fcda93a4f66dc6a7dc96413846f,2025-02-03T18:15:28.123000 -CVE-2022-3999,0,0,571a1816800574cbd80fb145285b2033bb26f6b7b06f41b2b54bc32c95c9e5d5,2024-11-21T07:20:42.517000 +CVE-2022-3999,0,1,8a4c44aecde6b148cf1f51b5e197c675eb186963678768401bbd44af28d937a4,2025-04-22T15:16:02.473000 CVE-2022-39996,0,0,68142def67fc8eea22147f7c5fcf85c2d8d207b5f060a7771cbd7aeb2d185b94,2024-08-30T15:17:40.717000 CVE-2022-39997,0,0,83812d35c7b8f7ac5e2ccfc93842f8cdae7fd34c8e4a34faf2289335c67b9482,2024-08-28T14:35:01.570000 -CVE-2022-4000,0,0,1a5c0073628a44761b23d02296b410024ee5d2c69eb3f32038d46f1a46d81d79,2024-11-21T07:34:25.327000 +CVE-2022-4000,0,1,a508ae3a9c943ef6f95b4195d6fc7991e82ce476eaba99eec8e4df37b602faa6,2025-04-22T15:16:08.140000 CVE-2022-40000,0,0,5ef12db80bd48a0ecf4c67cb511b3c3c8b61626aff68cb9924034e1ad874bdd1,2025-04-21T16:15:50.587000 CVE-2022-40001,0,0,3b562c8836c45a95230e8f4f41d28baf92160998dfb0f26bf0b3c754ddb56f31,2025-04-21T16:15:50.793000 CVE-2022-40002,0,0,ca7beefb9896cf299331217c37721f24e078c0248ebd0989ff92f0a588c7bee0,2025-04-21T16:15:50.970000 @@ -206480,13 +206480,13 @@ CVE-2022-40034,0,0,3bee6be8524717775f4c98b84ca2d3b80d4750d2fb7f7d41073735f45fcfe CVE-2022-40035,0,0,d7710fed0ee5647ddae97e41bbc3292a75803625cba940ec147ca6d07036beff,2025-04-01T16:15:16.547000 CVE-2022-40036,0,0,2b71373545a471f2eab2c9a04aacda2896ac58882364dce37fabd33866702d95,2025-04-02T15:15:47.313000 CVE-2022-40037,0,0,723f08359974d40602294acbe8080461b92e62986c6ffa9338ff080be0eb69f9,2025-04-02T15:15:47.550000 -CVE-2022-4004,0,0,0e7db3cf278aca5029a95129edfd412e469229e9fd2888084457ba42613c532b,2024-11-21T07:34:25.797000 +CVE-2022-4004,0,1,cad01140a5f1d5d258f6c8fd4fa6a21b6383096482e6501bdfac27ca5ff3ffc8,2025-04-22T15:16:08.287000 CVE-2022-40043,0,0,7eaa75bb8cfa4664d7a466de101be5934ce23c7239afd0dba36c5dcabdfa45ff,2024-11-21T07:20:46.213000 CVE-2022-40044,0,0,da71698ade01181f344e6072bf6ad5ae64c92245a839e5cb14808d2419686dc2,2024-11-21T07:20:46.367000 CVE-2022-40047,0,0,ebc677feaf5541a07a056fdfbbd87d1e876e415d51d5d61ef0360d0bc826e9dc,2024-11-21T07:20:46.517000 CVE-2022-40048,0,0,8ca79790260e2af786fadbf9d4d4baea3b6575ecd4c4f92b213a56664023d77b,2024-11-21T07:20:46.670000 CVE-2022-40049,0,0,ed1cfcad99a60524657b306296ca9cd2486fd040fdac429a518e9f57c8fc48a9,2025-04-10T14:15:23.130000 -CVE-2022-4005,0,0,1779ba4a35409b38b50d0aacbe888ba454ad43acccd5a766ed4e11fc9cf2a0c6,2024-11-21T07:34:25.913000 +CVE-2022-4005,0,1,f1e049e50634fee00e8cd3db30df28bca1394ea7feede416b8806f36a0a51851,2025-04-22T15:16:08.433000 CVE-2022-40050,0,0,610e2fa5628d9a571b61f806cf7c74add088bb2b44ac3200cbd5f3a6667a454d,2024-11-21T07:20:46.997000 CVE-2022-40055,0,0,cb5fe816e9ed155225cf1cbd4cbccc258e5f77969b80363a86fea4ddb9a5e2c0,2024-11-21T07:20:47.150000 CVE-2022-4006,0,0,eb050ed895c1b2fe7776baa84bc33ee5f7991b0ba41664f74bf776cbb2b51f21,2024-11-21T07:34:26.027000 @@ -206580,7 +206580,7 @@ CVE-2022-40156,0,0,70a5311cb0970fbb283283ad8df6850ac4afcef1a4bb90c6e8aaefdb489e6 CVE-2022-40157,0,0,ea9c30f0a4b8d7f1480bd88d9467e159dde77a90110c12fcd0dbe2a8258f8d2f,2023-11-07T03:52:07.127000 CVE-2022-40158,0,0,0dcf69968a476cb52aa6082ba5a99c7087d4cf5dfc47b2ec6d6498fe3bf861bf,2023-11-07T03:52:07.400000 CVE-2022-40159,0,0,fb9e0d955773bd343bff1395d02e74995964a15651f3ce5fcbc71ce950821343,2024-11-21T07:20:59.520000 -CVE-2022-4016,0,0,2c1686779a86929c9ca0fe0246b54dfd40041d539ff21404317f6c6fb9f0d478,2024-11-21T07:34:27.160000 +CVE-2022-4016,0,1,6da2724658c514d747fb29319db417eed113bc76258bd3305759ceaf2aaaa7fb,2025-04-22T15:16:08.583000 CVE-2022-40160,0,0,5b367d55c2b7611a5e5a3abd3f9568625122b5c39c5530664c93116d1716cba1,2024-11-21T07:20:59.640000 CVE-2022-40161,0,0,65bf4625485d61c5cad03be6f8de0c8850fac55694a4bbe6e10d8b22eeb8b093,2023-11-07T03:52:08.223000 CVE-2022-40162,0,0,ebd850fd71b9cf10fe149097fc1f1806b5bf2f99593a98fa287f7b2b9084fe11,2023-11-07T03:52:08.477000 @@ -208715,21 +208715,21 @@ CVE-2022-42797,0,0,0c0025ced0347dd1ddd700a3a9909b285c560f4816aec19aebbb6f2cc05e2 CVE-2022-42798,0,0,81b8ded0fc60a70cd0e8f6962818aeed711730652d23a1304326f9eb0ef33cf2,2024-11-21T07:25:22.160000 CVE-2022-42799,0,0,70a9bec5be0ed2a232ca6909b3069688e2bff87c3f9857f68e41079d30cf037b,2024-11-21T07:25:22.333000 CVE-2022-4280,0,0,390276d4dad7a1f69f9788777b9a1fb689a09cfb5853e7a5f9526f70776fbb6e,2024-11-21T07:34:56.003000 -CVE-2022-42800,0,0,be203eb88dad734e5c918e69a558027d5c53f26a4ca93820bd8861a64bb0232a,2024-11-21T07:25:22.513000 -CVE-2022-42801,0,0,2a67325cb0f588175b58cf45c0a4fba29e074879b3d0f910989a4e30cccb7bbb,2024-11-21T07:25:22.653000 +CVE-2022-42800,0,1,bbbad610238024ee7ace23dcccc19a60db5935ebc3c39260617f3526dfb9ef0f,2025-04-22T15:16:02.973000 +CVE-2022-42801,0,1,ab754ed47daa63d13926ca2fe2c81a4132d394cb3a8a5b6074a5c6ff02e44ce6,2025-04-22T15:16:03.253000 CVE-2022-42802,0,0,6cd477344e7afaa3cae3d8040097a49f69d4e7b18b79dadfa673bee6a6c34e41,2023-11-07T03:53:35.360000 -CVE-2022-42803,0,0,e5530e505663bd4d38bb565c1e95fb83e8e8a7036d84b3cf82907f79fc5d6974,2024-11-21T07:25:22.807000 +CVE-2022-42803,0,1,fa1dfb280ef0699c67d992e8e508b8ed3289c2a21d75a6eae1d1c07deea4942e,2025-04-22T15:16:03.427000 CVE-2022-42804,0,0,7ad07265a1dbd23848c67cb5f7ae35a783b7bcacb37b71cfb0cfce76be4518db,2023-11-07T03:53:35.837000 CVE-2022-42805,0,0,83996d0086cb7b1eab55a07e7d4f67dcfc26ab438bed5cc458a9479e06942385,2025-04-21T17:15:19.353000 -CVE-2022-42806,0,0,76a7c554c0765c98c6c7bab682663bc440ad90147322f4806a61a3c5458b02fa,2024-11-21T07:25:23.100000 +CVE-2022-42806,0,1,a471bbb228c6656626271bd4ed3f3bf9590ff757ee6df2d1305cb67f572bbb73,2025-04-22T15:16:03.597000 CVE-2022-42807,0,0,a29a0d1e49344c8e051603e50443d8ffa0163fe130ddb3d62de566d6cabd8f27,2024-12-06T19:15:09.130000 -CVE-2022-42808,0,0,e1b49a88551f045375012edf65da2bca4537eb41cdf388890dbaedede7391310,2024-11-21T07:25:23.350000 -CVE-2022-42809,0,0,16ca37f3e4f6856b6170a7c12cf83e7c23c7463ae298d0bab285d5244a253c94,2024-11-21T07:25:23.510000 +CVE-2022-42808,0,1,369413938b8573399e0ee75f912779ae7fc00f9e9558f3d4cdb28180e7a55bc9,2025-04-22T15:16:03.757000 +CVE-2022-42809,0,1,8c7ac58cf509595d3e88c71f70fc1ac406647253e1cf17976f6adf251021d60e,2025-04-22T15:16:03.920000 CVE-2022-4281,0,0,a7dbf1665ad9605ac70a432223a2d4681e3ba7157d5bd88613f275b9685c488f,2024-11-21T07:34:56.127000 -CVE-2022-42810,0,0,5d8af5ccfd00069e8b07a6d0fe56cff070bee07c08c32080c915cc0b37876cbc,2024-11-21T07:25:23.640000 -CVE-2022-42811,0,0,b39c184175501425a36ee7d47dc92accb50288a10e65def0ffa69c54e1ad77ef,2024-11-21T07:25:23.780000 -CVE-2022-42813,0,0,ae9d03d17176eaf55a740e092fb2d435c19739e91bffeb99763e92239b76ad0f,2024-11-21T07:25:23.910000 -CVE-2022-42814,0,0,78b77073ec22cc09e260eabb4fe8f39e3ba9dba3a7938e2cbe4d73a7739d69cd,2024-11-21T07:25:24.043000 +CVE-2022-42810,0,1,87e5fe4e7ec39cdea79a337b0d123c59871888c533c0026a6a322be5abe4f043,2025-04-22T15:16:04.123000 +CVE-2022-42811,0,1,5d0707c05756defbb8b7e2aa8e632125a4f0a6521a6570d4030c21c141f8ee05,2025-04-22T15:16:04.277000 +CVE-2022-42813,0,1,ab6831c7186536126211d0d893fbc9250ffc3924b8664b6e272e4c59af7a5b59,2025-04-22T14:15:22.040000 +CVE-2022-42814,0,1,9a02e1f97e966c45ed908c0244a592e10c1cf4521146f8e1af1cbaf224afbcd7,2025-04-22T14:15:22.297000 CVE-2022-42815,0,0,8c3fd23e5ac41c749c48fb61bb3a7cab1b5f15922c2c779455b5c5a7bdd70d4e,2025-04-21T21:15:20.323000 CVE-2022-42816,0,0,f4efd54e11c4fa9d6882dc61665ad665806ff0991dd3c958b65ffb864faecdc2,2024-11-21T07:25:24.283000 CVE-2022-42817,0,0,7364637f817ad3076f5f6fab35a8b2c5a76355d6aa5aab4ea3c6a977dbbb60af,2025-04-21T20:15:17.633000 @@ -209697,7 +209697,7 @@ CVE-2022-43989,0,0,374e547b05b20db43351e8931f46ba78a5e281be3b644dfdfc4d5540c878f CVE-2022-4399,0,0,94fdc7d9e4920644df524811c5d8899c45d13acd8330ad6e2ba1760742651413,2024-11-21T07:35:11.977000 CVE-2022-43990,0,0,7dd25d1ddb9f90d09fd38f1b198920c9cde96f3b24d8a7d6b0e95f4d5c051987,2024-11-21T07:27:29.280000 CVE-2022-43995,0,0,b86b14e0f07245dae778575d22a4e55917b16ced308a45ac369a1ab9adc0e4b8,2024-11-21T07:27:29.393000 -CVE-2022-43996,0,0,9fb53fd400517b2a1549e9a62f89dcab1ed30bf2f52b3a0b601fad453657b0da,2024-11-21T07:27:29.550000 +CVE-2022-43996,0,1,00ba630828c18e66aeb76fab15609ed58e95a9331f043719b477fc96b704e6fe,2025-04-22T15:16:04.453000 CVE-2022-43997,0,0,5d2bff4fe8b21210545ccc85ef46ec6b03ff5710a78f3299f547d07e2df48f96,2025-04-01T16:15:16.800000 CVE-2022-43999,0,0,6d8adcea081fff96f9265406fdf4abf89c087e276a9f9902723cfec6c5bc4aeb,2024-11-21T07:27:29.837000 CVE-2022-4400,0,0,9d4cfb592ba893bedee7b3ac66c5190c96977f219ffb228c2acad620bb068c4a,2024-11-21T07:35:12.117000 @@ -209869,7 +209869,7 @@ CVE-2022-44296,0,0,7649a4fa26d775b1f335af01076e6fd037e2e30d459c85beba18d63ea728e CVE-2022-44297,0,0,714bd75efbc7ed32a384c2a9a61ddee8e01257597043f794fe8a7326c79b21f2,2025-03-31T18:15:32.340000 CVE-2022-44298,0,0,69edc3dce983df3c9b5e495ef31c54ebf4e519fcc6525f1ed747f9af4e6eaf26,2025-03-28T15:15:42.390000 CVE-2022-44299,0,0,5adbf77681e09b8399532a96a6a9d4ae34eead786fe1c0029300fa2d65f72929,2025-03-19T15:15:41.873000 -CVE-2022-44303,0,0,d9191fcb3c264206571cc2273401cd659061e66b5b01af1a0d6f1bcc3f8d893f,2024-11-21T07:27:51.750000 +CVE-2022-44303,0,1,2b4ae38475bbb8e115a6d75edadb94690a1d2e2156007458fc4083144ea93be8,2025-04-22T15:16:04.667000 CVE-2022-4431,0,0,723db002c5699096c9126aa7688dc656d3723d7dde55c074d8c392948d015d8a,2025-04-04T21:15:42.073000 CVE-2022-44310,0,0,7a72af122186838fc7bfed1392316c46767978b12ec7c0f1861ca40c49475bed,2025-03-12T16:15:17.480000 CVE-2022-44311,0,0,1390ad964710d376d223686d1d0a0aa9a2e60ff70e3e9e276eaf20d3340a2e87,2024-11-21T07:27:52.043000 @@ -210228,7 +210228,7 @@ CVE-2022-4482,0,0,148453268811ff6a98c89dbada4ca5bd175fac48f4a07e6ea20e99c247b188 CVE-2022-44820,0,0,983eb0c0c9ef3521386c511e70613a1e6fc2530624b8e7447286ca7ceb4c9aea,2024-11-21T07:28:29.283000 CVE-2022-4483,0,0,7551eba602b372786f7ade92fc3e8f29917a2fb615a80923df06a0f85c40bac2,2025-04-04T18:15:45.227000 CVE-2022-44830,0,0,713a5276c1031baaf2867b5b7e234d0191e47e04fd0d7ab864719d90ba8f3450,2024-11-21T07:28:29.423000 -CVE-2022-44832,0,0,4bf59a2795763225cf9ec0e31a3243dc96c265e2e8ec7feae4ddfccf9bb64a6f,2024-11-21T07:28:29.550000 +CVE-2022-44832,0,1,a062988e538bfdbfcba1aa70a5f20670d4de33d2420a400b3e0de9b5ef27fb2d,2025-04-22T14:15:22.500000 CVE-2022-44838,0,0,3139ee0aa0a8d41cd56ffe02169565648b91606bc49997b68062760672554cbf,2024-11-21T07:28:29.703000 CVE-2022-4484,0,0,d36f936d86e1490741f7335e2311cd794f3bd9da3ac1c9068866f1b71d251bf4,2025-04-08T20:15:18.410000 CVE-2022-44840,0,0,94d664d508c513fdc8a022e76295f4726fb8373563dda02895b1a54d1c48b5a9,2024-11-21T07:28:29.847000 @@ -210248,7 +210248,7 @@ CVE-2022-44877,0,0,167abc48a2718fbfa505946198c84dfdbf826f76a0d0d30de7dfaf553c886 CVE-2022-4488,0,0,ed51282757cc08b2ef8e1fc16c7fd96328eb1436aad4d8e25872a241809bd756,2025-03-21T20:15:13.943000 CVE-2022-4489,0,0,bb7fe018f0ddef0541d111f1d005c348ecad97d486d6027cfd82d62ef07cb837,2025-03-25T18:15:29.370000 CVE-2022-44897,0,0,f2ce2222aad98b15722e805eaf7ff574143cc8421ca9aa5c80a27ceafc26bb7b,2025-03-27T15:15:38.357000 -CVE-2022-44898,0,0,e598ff335afcba3db9b3c480d0a934b2f1404512710eff58974c561277ec04a2,2024-11-21T07:28:31.563000 +CVE-2022-44898,0,1,eb6aa6d1551a73d209a808b2fbee9854bf43de4f6cb32d8ed06fec708f930a7a,2025-04-22T14:15:22.893000 CVE-2022-44900,0,0,4273656bcc7ff880ee5d763e12d79f06dddcceec1d544b43fdb0767b6e6abbf4,2024-11-21T07:28:31.730000 CVE-2022-4491,0,0,7f5f8254bee14988a2744d87aaae4cbfa4cf44402a87bfb5b3dd5cd3a21468c3,2025-04-09T19:15:46.247000 CVE-2022-44910,0,0,7f798590a89b32f025652aa7a56477f7d1417476759842e78237d89ba4507368,2025-04-22T03:15:18.257000 @@ -210791,10 +210791,10 @@ CVE-2022-45677,0,0,43919b690ca911b467815606707b1186a37bc08bcec4c57689a4e4e1708d8 CVE-2022-4568,0,0,ee6ffc57bf7a69ab5e6be1a916004699612e2373f90b2f7d4925230d76802177,2025-01-30T16:15:28.620000 CVE-2022-45685,0,0,df0f53d28103ac6a23f08aa6415a74ad54ee3f1117f84c062447701fdadad32a,2025-04-22T04:15:23.807000 CVE-2022-45688,0,0,f7a87c81feb967e52f819d86ab276782335eae8e157e1b7ca1ca0a3e74c8939e,2025-04-22T03:15:18.457000 -CVE-2022-45689,0,0,d279eb426897f1a5c4c640557c1d2cd4d189cd451fee6c89666245857dc180d2,2024-11-21T07:29:35.707000 +CVE-2022-45689,0,1,870ab60a5c6ea98825b9fbdd39954a2b15960e07d0b89207657712821345ec89,2025-04-22T15:16:04.870000 CVE-2022-4569,0,0,4a2599063fefb513ab23f360a9f2529d620d0c97fa1dc35085c7a5a3cf63116b,2024-11-21T07:35:30.753000 -CVE-2022-45690,0,0,60bd70496b899e82c07add93ab398ff18b0fed1cb0600805d08475850b553aef,2024-11-21T07:29:35.860000 -CVE-2022-45693,0,0,fc3fe5af36456f18b36e45bc254568b5fd18a3793cf5d8c73cb97ef02fc53ce1,2024-11-21T07:29:36.013000 +CVE-2022-45690,0,1,a5861ee59215405b9e0a67e2b46d796e8da8b6e78efaf9946949642c0238c19c,2025-04-22T15:16:05.057000 +CVE-2022-45693,0,1,16e0fdae126746a476c4d8896dad9274b38ecbc704e8591fb4b8e1894c95050a,2025-04-22T15:16:05.277000 CVE-2022-45697,0,0,34e5f81a9d7d780bc32c7f8e99772f6393c876c7e4c870d659e3da43d3fa8093,2024-11-21T07:29:36.173000 CVE-2022-45699,0,0,993747c3106f132bb26b1e09067560ba6f6141a50dc13c027a61ab2f43495beb,2025-03-24T18:15:15.653000 CVE-2022-4570,0,0,652e15e74f170db1f925bb2be4df601dc66acc8744718cac77f424af8ede0b47,2025-04-02T16:15:25.590000 @@ -210932,7 +210932,7 @@ CVE-2022-45867,0,0,7d2e1133ec67de3abdc62203a810fe87e7475d37b16b9d2bae9586a274f78 CVE-2022-45868,0,0,80b9445c4364c8194c9e46b75b1b1f764c0aa073fe35122541db4dac46bae7c6,2024-11-21T07:29:52.050000 CVE-2022-45869,0,0,8f064b33883615d85ac7a1071dec27308a9625356228e54e41829e8ddb4ce6bd,2024-11-21T07:29:52.223000 CVE-2022-4587,0,0,883ef7e3e0962999a7d6d8c14d8ecab8eeccd5fb2faf7db48642e497d80404be,2024-11-21T07:35:32.837000 -CVE-2022-45871,0,0,364df7a5a838e5a94b333392ec849c0420042b51bd0d583a8effd20596b0f219,2024-11-21T07:29:52.380000 +CVE-2022-45871,0,1,c27af02067ce41d5a47121feba27daf1574ce18c13314e3d5d85e910e44631a5,2025-04-22T15:16:05.497000 CVE-2022-45872,0,0,a907443ce4f03e99a976737e2d47cb015ba05e3816eae1b1e624fcdd2161183d,2024-11-21T07:29:52.530000 CVE-2022-45873,0,0,42c6c1129d53ef778f4baa826bc586cb39ac06b30554c1745f3ebd88089eac8c,2024-11-21T07:29:52.680000 CVE-2022-45874,0,0,3198226534d2d5b8f6108cb213a5a0cb79874fbf2f09ef45ca0b9f2d612a2fbe,2025-04-11T16:15:17.270000 @@ -210989,7 +210989,7 @@ CVE-2022-45932,0,0,8da83d3ffac55b457f4a1cf32c96cf948339ad5bf0a82a155160d912b5bcb CVE-2022-45933,0,0,ba7305f2498a9939d306374adaea0f9f1a8ffd9e16e6eee9a3e33a546c156bb1,2024-11-21T07:29:59.503000 CVE-2022-45934,0,0,95d666c63cea594383479db201548f268bfa41fe27eb58b5bd631e620697e4b0,2024-11-21T07:29:59.647000 CVE-2022-45935,0,0,356368f3b741381996c3f64633c9e538205146999945bc761ff0c0afef7bb5b5,2025-04-10T14:15:24.033000 -CVE-2022-45936,0,0,9541f99a3982f001a14bb6af6cc6d638d6334a4c3a7e212d1e8540c498ff8a34,2024-11-21T07:29:59.960000 +CVE-2022-45936,0,1,e340e8f1ba820cf7dea16567f63656d1cccb9c913d99b683d7305cf15a6d9489,2025-04-22T15:16:05.693000 CVE-2022-45937,0,0,47315c9d43c79b2922c077c6a985073909f30d82387fb62bb70aa6dd010f89fa,2024-11-21T07:30:00.073000 CVE-2022-45938,0,0,42bfe1ed0e2389cd89bd79fb11a7537d4900c3c6e9f1b3ac70f9168368a13506,2025-01-10T19:15:30.380000 CVE-2022-45939,0,0,9f2d0eb61d012e0718ca37900aa590dca21df4c3a352cefbd70dd796868216ac,2024-11-21T07:30:00.373000 @@ -211025,11 +211025,11 @@ CVE-2022-46021,0,0,de363721c25a4499f34dc24ef8182fc5846be800e41385c821c878a6d4b8f CVE-2022-46025,0,0,fb87909a50274888cb952a531e37e238790ce29adbfdc98f2c0f61341a167cf0,2024-11-21T07:30:03.940000 CVE-2022-4603,0,0,3ae9bc688ef79af8f63f39d896eaee85f7870996ba97b8e376697d5795fb133c,2024-11-21T07:35:34.797000 CVE-2022-4604,0,0,7afbc949b85cb029bbca8ddb19475fb9843a68fa25e057425a2970e7112fc480,2024-11-21T07:35:34.920000 -CVE-2022-46047,0,0,99da35980c48a0a34c5ef33e72c93a6984c9ff2e5a4470df63c74366cc211742,2024-11-21T07:30:04.213000 +CVE-2022-46047,0,1,0089bfdf40f93eaf5a1f6b66cd35632c9e1dcb18bcb3dd0828c5dda300215221,2025-04-22T15:16:05.870000 CVE-2022-4605,0,0,aafc042138832a0b4882e980fbbaa381e15cebf9b5bcfa781a2ec90e2937bc05,2024-11-21T07:35:35.040000 -CVE-2022-46051,0,0,e186846ccdb834553ce45fa6c1479268f81f4de95a904b93ba3d4bc4aa366560,2024-11-21T07:30:04.360000 -CVE-2022-46058,0,0,1ee8ca09badf49f4f8d633c558019211cadc0ab4bf5bd93ba52ed68435a34f89,2024-11-21T07:30:04.527000 -CVE-2022-46059,0,0,633fba6fcc71b6e12afc1583834d50baca4ec55c55cd99b8f15cce3280f86cbe,2024-11-21T07:30:04.677000 +CVE-2022-46051,0,1,85d0c5e8893f28d91aa931d24d42ee443319eccf2a14b491a72726c641a7f4ca,2025-04-22T15:16:06.060000 +CVE-2022-46058,0,1,193e7b6e359ec8fa8754ff9fe9d4bf30ff26948e189f38c5a8e1dd49cfbf044a,2025-04-22T15:16:06.250000 +CVE-2022-46059,0,1,2e545b6676b6e5a8dc3a6857ec96ab564d1bb012f9ae23818a01e8954097c386,2025-04-22T15:16:06.440000 CVE-2022-4606,0,0,beac2a53e583b356feec7e0dd5b9faebcc7522f5fb76726d2953e036f6e17cec,2024-11-21T07:35:35.153000 CVE-2022-46061,0,0,ce8050425bf28bebc9ee9d05a212e6f4919aaba789f7ea904651722c801370e2,2025-04-22T03:15:18.677000 CVE-2022-46062,0,0,d82385cc979d034738d3fb9baba114270ab11c9dac5eb978463b15dc065f3a7a,2025-04-22T03:15:18.883000 @@ -211057,12 +211057,12 @@ CVE-2022-46102,0,0,4c00a7a0a9d764a286d900594ac7cdb1f274427bbbe466a7f8ba751dff829 CVE-2022-46109,0,0,4118e1dba5a13c2589463e26dbcd054fafe051bcd884bc8ce6cfde3af445d9bb,2025-04-17T18:15:44.560000 CVE-2022-4611,0,0,e7ac0deadc94e1429edc607c065ffeb7559f1b9634b4fa7eb0189eb24e1bba3f,2024-11-21T07:35:35.763000 CVE-2022-46117,0,0,58fdee83e2054653e48d8ad73266964ed4359908bf5626b7f5adeb9a138a18e6,2025-04-22T03:15:19.820000 -CVE-2022-46118,0,0,2bd1f413a4d8819d8cca325ad7a1cd8651117c7401d2c56a571689372bb00bef,2024-11-21T07:30:08.530000 -CVE-2022-46119,0,0,b24a6af81571913eb5cc008925f89ef6b665ddb6ae30e6f47d571b699fd2c3ec,2024-11-21T07:30:08.667000 +CVE-2022-46118,0,1,06106c5237bec66b4d47f82a7b60044dab8f57a2b73aeb986fec6bcf906ab072,2025-04-22T14:15:23.097000 +CVE-2022-46119,0,1,bc4f2ae00a174ae8692cbf1a802beb1d56f29d0219a1cd14199d2b5ac4c22a6b,2025-04-22T14:15:23.283000 CVE-2022-4612,0,0,78b49419ee681703024b9b4d6006354881534a73d1642ee07adbe89c373ec39e,2024-11-21T07:35:35.887000 -CVE-2022-46120,0,0,cd192e1e44aca0d30043fdc10cd8b8795e0045c41d35b6aa15fe1483c8f16a21,2024-11-21T07:30:08.800000 -CVE-2022-46121,0,0,f2128fa2eeb9bf6b2eb0d0cca887c1ee6be82e9fc118eec7f26ebfc66624048a,2024-11-21T07:30:08.940000 -CVE-2022-46122,0,0,3107e580770870ea3a53a2f8c3fb6819b216c58757623599a5542a79070310d4,2024-11-21T07:30:09.087000 +CVE-2022-46120,0,1,e05869e195ee520e7b837c40905175d4b39a00936c589ac48922eb3682560f72,2025-04-22T14:15:23.497000 +CVE-2022-46121,0,1,296cb532e89b7ef914697a16d8c9af5ca6df1e3b37ffc5d7c3a58facdaad5428,2025-04-22T14:15:23.710000 +CVE-2022-46122,0,1,4ed4b9f9d7389a4203c80c6621f9ff81350106e3b762a9893c26589196cb145b,2025-04-22T14:15:23.890000 CVE-2022-46123,0,0,aaca72ffc1cfc9bb9c2752fbe1ec0b444847b48a3bef6409b09cfe6b3c80494c,2025-04-21T20:15:18.480000 CVE-2022-46124,0,0,73f766f76cb51a23655f78aac24f1edfff95c67b9c1b15e85bdd6534476fc6fd,2025-04-21T20:15:18.633000 CVE-2022-46125,0,0,6b8404fd078c32329c379a373bc28c1a0f1f12612d63599c278a2548e9f4d07b,2025-04-21T20:15:18.790000 @@ -211273,8 +211273,8 @@ CVE-2022-46350,0,0,12975a8ab0cf772e1f1063fc4e9282bcca357c7f9bf9ca90d73da56cec2ae CVE-2022-46351,0,0,4b765e4ca8981e8ad350b5383d09a4e7abb742ec057a9e8c9934342c94588f5e,2025-04-22T03:15:20.190000 CVE-2022-46352,0,0,707c3915f028a9d4ae8a8aa45820c54e93763f1abb162b8eb5af678d30349c71,2025-04-22T03:15:20.370000 CVE-2022-46353,0,0,a40da2d3ede62484b698631af7fae6e9663263708bb7f0d2fa6df4f033d99a68,2025-04-22T03:15:20.540000 -CVE-2022-46354,0,0,b54e101d98bcc7bdf3369d8e22b533068f967b06511fa3684503bc3291cd0106,2024-11-21T07:30:26.940000 -CVE-2022-46355,0,0,305a6a49c47ba6f068e02b03054bb94be666adcbdda42b6f54058d176f63c547,2024-11-21T07:30:27.060000 +CVE-2022-46354,0,1,21cbf2c57841ba1849e315e4f8164810f1240cda02522f6f08a4526259cba243,2025-04-22T15:16:06.610000 +CVE-2022-46355,0,1,f6a6c51004257ff570b3e993d374de9b2b34cb3ad685dd1ec2759105a5e8f0b9,2025-04-22T15:16:06.800000 CVE-2022-46356,0,0,17ca9ad9399acc0a981ea70d03ac8944e2e5914be2c741108861286b4fe17cd2,2025-03-28T16:15:21.900000 CVE-2022-46357,0,0,7a513a0d79208916fc0a2b920e5168ea7a1b12910c6484334fe4a011f8aeb3a8,2025-03-28T16:15:22.077000 CVE-2022-46358,0,0,7514a28206684427404b865b5de71c9ba4e7415c25842706199e499397de5437,2025-03-28T16:15:22.247000 @@ -211296,7 +211296,7 @@ CVE-2022-46372,0,0,3434786e7d9d128428693875c4c031d27d92744cabb0f3d1b255b00eaa657 CVE-2022-46377,0,0,7f258f11854d0e6249897caec0c1673632adad0764264972d143aa135e804236,2024-11-21T07:30:29.293000 CVE-2022-46378,0,0,3addbf38a9985a8a7f8bd9f5a12ab3c2ace117d5902ca83582c61d9ba28795a6,2024-11-21T07:30:29.413000 CVE-2022-4638,0,0,e3a5a50e7ac2ac39012753b769aea11ea0793f9f98c14bbcfb811f189710174b,2024-11-21T07:35:38.760000 -CVE-2022-46381,0,0,d1fe3c125e482e70dcf6c71d65a02deb5b0ca3233895390f31606db60a36c232,2024-11-21T07:30:29.540000 +CVE-2022-46381,0,1,92ea8dd2740f0a9982f035dfb53d1498184d9c4f5f46a6b9740046fd4dff9c18,2025-04-22T15:16:06.970000 CVE-2022-46382,0,0,9fb21bb30be8a238df02381811c0ac0a2681c5bc5039cbdfee414980618d0db0,2024-11-21T07:30:29.690000 CVE-2022-46383,0,0,3739c21c9235ad3575c11b3e55e97ce4a44bfa58d4b7aa01cd24002cbfbba0cb,2024-11-21T07:30:29.837000 CVE-2022-46387,0,0,f8aab40a16199437ac68e03eec129c4ee63439d151fbf5526b417c6e71cc0a0d,2025-02-19T19:15:11.013000 @@ -211315,7 +211315,7 @@ CVE-2022-46400,0,0,8272b5f4d6fb25b8a2405d6ccf20232381e4b293431dc835435e86dc02874 CVE-2022-46401,0,0,77d5644189a94adf77d3dc4e5f332eff613c32e57083795fee0263c832d2c706,2025-04-17T15:15:51.693000 CVE-2022-46402,0,0,61f3103fe1ed9f9c7967524794298ecae290888253a91fcdbdc7a881cd5c9337,2025-04-17T15:15:51.913000 CVE-2022-46403,0,0,c566cd1dd7684a37027c87db7b53558a3a2850f0f4ebd0b3ba9c6ca70e4e4aec,2025-04-17T15:15:52.123000 -CVE-2022-46404,0,0,fd629043e20328c3e8b322682cc6a46eb2738132ab8a08d3427bee294ca7460e,2024-11-21T07:30:32.277000 +CVE-2022-46404,0,1,3062aabb789c7317ce9bd9a953744b66453726fd9d47d72cdd8c3eb2e508a9cf,2025-04-22T15:16:07.160000 CVE-2022-46405,0,0,c4973a944778c4cc8cd8c5d7cb82f6404c734971f440b363b9d3522f04fd87eb,2024-11-21T07:30:32.440000 CVE-2022-46407,0,0,b8ba94a0a84ee71a638a9e126b33294f251846229e546358c5bfd3dfb4f6d284,2024-11-21T07:30:32.600000 CVE-2022-46408,0,0,c365352e12e7ac5d3f75ddbaf596772abe72caeb15ad39739c3f1a40e6af2967,2024-11-21T07:30:32.743000 @@ -211342,7 +211342,7 @@ CVE-2022-46438,0,0,bb35f3e66bb2bc4405f6635683d45618ed53434af44aab782321cc74ba84f CVE-2022-4644,0,0,7dfe02c37bac2353c0e860315551e7136ea0c14949d1852241c80b14909ffb69,2024-11-21T07:35:39.593000 CVE-2022-46440,0,0,5e9f025b62b475de280b45d71c727fff77b65691cda61d6d9fb615377c4e7b76,2025-03-12T16:15:17.650000 CVE-2022-46442,0,0,678b9820b0106459aa0248d67124ad88518cc774d3433978e9228bbb322737be,2025-04-11T15:15:40.300000 -CVE-2022-46443,0,0,55a7c896ac0c0497c368be2c3b16324841fa8a1208a8cd554b930b672ebe23b6,2024-11-21T07:30:35.950000 +CVE-2022-46443,0,1,f512f5bf613a929f2107de9c7318219bdbc645c37299ed2ed2fc7c7c2d5d0be5,2025-04-22T15:16:07.333000 CVE-2022-46449,0,0,01fed2dd68d6025c1d1f5ac3e39810312ed20f1850f542b79104a0163a073c03,2025-04-09T16:15:21.380000 CVE-2022-4645,0,0,3000346fedbe219373d8ceb4b6222d6ef062a5121441e73ca6be59d55cec24de,2025-04-04T21:15:42.243000 CVE-2022-46456,0,0,1caf185d160d2c007724a768c1968eaef8a178b82fd16840f5b68f045b2d425d,2025-04-10T15:15:55.343000 @@ -211440,7 +211440,7 @@ CVE-2022-46600,0,0,d239ffacff0a026786692d5e4a0d86044061564edf1a00b2499ae675cc098 CVE-2022-46601,0,0,a2baa156e1ba53fcf9ce3c6d268d48991a46384ea1413f56572a22952cb435f6,2025-04-11T15:15:41.937000 CVE-2022-46603,0,0,9594bb8d8c3dec9fac628c4501904cdeaf37752a22a5b0cbe9965b603248d36c,2025-04-09T15:15:52.667000 CVE-2022-46604,0,0,de612da47cdcd1f7d9e43a25f458186e5ab8b3ce1e464294fa3bf23711bc0f0c,2025-03-27T14:15:19.900000 -CVE-2022-46609,0,0,d09923216e91d7621ef5afebe22fb939f9ebfd5f40672a2db23294481c3c6f9e,2024-11-21T07:30:48.933000 +CVE-2022-46609,0,1,3c930c08b605eeb93c171b63b5a0dd104976f13c2962f0b4da5de99fd3aeb658,2025-04-22T15:16:07.530000 CVE-2022-4661,0,0,1e28131ba1d31dd12baeb447a6825a54498d00dd6f704d79a34fe226717d412c,2025-02-27T16:15:35.253000 CVE-2022-46610,0,0,c11ae706d9857c16b3a3b475003f80154089f09620827809bf73e838db90abeb,2025-04-09T16:15:21.600000 CVE-2022-4662,0,0,9ade5ac634310a5d46504630f0c94d5108b45e1da5cc8522c56c06a999d783b4,2025-04-09T19:15:46.523000 @@ -211632,8 +211632,8 @@ CVE-2022-4683,0,0,786b20242caf0980d025230b275b394eed4618137c89d5d8d797556868510f CVE-2022-46830,0,0,04dd95497571553652188d100f56cbb63dbba824ac35278ebeec11972cde2dd4,2024-11-21T07:31:08.050000 CVE-2022-46831,0,0,114fe3d8b100e455842f61fc42da0c756c9da64c139bdce0b213b8646de9e3fd,2024-11-21T07:31:08.173000 CVE-2022-46832,0,0,5299c41f123fd9fefefd065f242cb3828167e83b8de3379cf73e52916d3baab3,2025-04-21T16:15:53.493000 -CVE-2022-46833,0,0,871672df89dd109cdc0a7a431dea9e23afa77523572cfb59d1ab993b3bd8a583,2024-11-21T07:31:08.473000 -CVE-2022-46834,0,0,ca1a90b5be2c06dbd4e86ac51c8a41ba0ae74db46ef935ac88794e6efcd3c563,2024-11-21T07:31:08.637000 +CVE-2022-46833,0,1,227026626fa48a0bffa61a8e99602bee0ad4413f07061aa0b6db03eaee4aed8e,2025-04-22T15:16:07.727000 +CVE-2022-46834,0,1,c071bb09b0e87c4847ffbc0ea43cc92f3326d3ea5e6dbfeb003e187537dd3541,2025-04-22T15:16:07.967000 CVE-2022-46835,0,0,950f453b766bb49c19de99ea1c474962e39f43a2b0f512d5f6ced1a9ed8d6f74,2024-11-21T07:31:08.867000 CVE-2022-46836,0,0,24dc2b3a6ffea34a58bc919a28a88347b03c1605b32ab87c3fc6b7898f3f54d2,2024-11-21T07:31:08.993000 CVE-2022-46838,0,0,20c0217cb62fb63a62c2489d2fc0d44d866f193522d07971e4927b1f24afc733,2024-12-13T15:15:09.423000 @@ -223028,11 +223028,11 @@ CVE-2023-28447,0,0,02c07b9cff5252674c6711b950500b4c2f1006551e6c7b5550d2c3d437280 CVE-2023-28448,0,0,da95841442841e56c60aea1d5f2ca09f81e1c5ad064cbee52c5cb75c9a952aad,2024-11-21T07:55:06.097000 CVE-2023-2845,0,0,11b6648a3a4b87d55811c4d9099676c6e005ea78c46d80f3e5e1d6a49200eaf4,2024-11-21T07:59:24.327000 CVE-2023-28450,0,0,d08116373d36f12aa0e24fa01fa029e07d949338bb9948367a4b577c829ba70c,2025-02-26T22:15:10.620000 -CVE-2023-28451,0,0,a6e6d872ac31b07eead649a9345579adfa30b2c89a401702889e9ed1ec2cb9b7,2024-09-20T12:30:17.483000 +CVE-2023-28451,0,1,3d379085aabdab77e458aa13574c64547e8b5fb6225489bc7639fa41dd5d71fe,2025-04-22T14:18:15.017000 CVE-2023-28452,0,0,86ac8989387e0a52574e5b8d3443315d362960d9f0123d04fc240909764b0036,2025-03-19T21:15:33.880000 -CVE-2023-28455,0,0,7b8d3caa09e9aba111c9e74f28f240ab583a82a79146e9a6853438b621d0ef4e,2024-09-20T12:30:17.483000 -CVE-2023-28456,0,0,c8b3989ca280bf9a4cb9da66d7d30386c0429da09b34452752b40cbfdf26839a,2024-09-20T12:30:17.483000 -CVE-2023-28457,0,0,b920b4fec82e5006c4c530e4796c3d3b3514ca7413b4ed3bb506d8ed1602e656,2024-09-20T12:30:17.483000 +CVE-2023-28455,0,1,7c2f02dddf16187f279d49b9483fb390b016c0b336d18fdb2460317aa3a442ac,2025-04-22T14:19:00.513000 +CVE-2023-28456,0,1,1af4de7466a7139c6470df0cba98abf6710a0ec6f4cdb99cfbaa061660763457,2025-04-22T14:19:10.400000 +CVE-2023-28457,0,1,ce3ce5db48e0a1e6a0d82c7175c8ee8e06f15f2669d0ee81c36a24122896c2a1,2025-04-22T14:19:21.567000 CVE-2023-28458,0,0,684fdbe0aeb7a6b004b1659801326dbb0a943e2916f24604f089deeac708b770,2025-02-05T17:15:19.327000 CVE-2023-28459,0,0,7c76063992eae86526662d50ecc282263d634e7f03574dc400a654ae98dc6654,2025-02-05T17:15:19.507000 CVE-2023-2846,0,0,7a507d7d271106d46b171e5e924f7857037c5f72738c2f9476b291552ffdb11b,2024-11-21T07:59:24.447000 @@ -224298,12 +224298,12 @@ CVE-2023-3006,0,0,57110f4979d3de6105b8e337e633736e1bd96816739ef045414e50bfe2f4ef CVE-2023-30061,0,0,44d8cc46dd8286395b41f25d8d4b34dd2d4e3f034d1a70776191aeddd14859e8,2025-01-30T18:15:29.740000 CVE-2023-30063,0,0,100e408460bc510f63b856e99bd8d362b458470bafa148964e558f6edb7dca2c,2025-01-30T18:15:30.587000 CVE-2023-30065,0,0,26a5814b4662731086b3c3d85417ca8bd31edc0c535576d71952cc8dd5b16fed,2025-01-29T18:15:46.160000 -CVE-2023-3007,0,0,f0355e13f4eb14c81beaf2179390fb6061e9d5c3a775947390412e14a9933299,2024-11-21T08:16:13.547000 +CVE-2023-3007,0,1,2fee130947050fcf9e93aa1058b4b9a0f99865e6ef0f4b5a226820138d395559,2025-04-22T14:51:37.563000 CVE-2023-30076,0,0,9ce3e61d1601301bbdcb455bb70afc153badc0235c37aa47b5c2e6e9896a7337,2025-02-05T17:15:20.343000 CVE-2023-30077,0,0,482a59315e6ecb44b69a15206b1a9d71b4c61e87270f14332701c20638a80431,2025-01-29T20:15:31.980000 CVE-2023-30078,0,0,b59993147a62c797f33e7c496e57076f579e3cbe18fcb581691b3e11b875ebeb,2023-11-07T04:13:39.507000 CVE-2023-30079,0,0,1864953fe33081a6ea74d96fafa4bcbdbe00bfd5214eb8cad4b963faa87f65ad,2023-11-07T04:13:39.547000 -CVE-2023-3008,0,0,b8bd483b2ec70b6ad2626cdc7694f3bc2e5a2939898ff1ee6f945c20cd116aa1,2024-11-21T08:16:13.703000 +CVE-2023-3008,0,1,6e107653abce3bd5076edaf9495eee7d5ca13c019af942719487ede35ad01ee0,2025-04-22T14:51:37.563000 CVE-2023-30082,0,0,9bb92d956ae82dd34b1e5eff81dd134b18a6dbb5022b10b0299f85bc1e4eed12,2025-01-06T17:15:12.460000 CVE-2023-30083,0,0,8888e61bd828ffb4ab2bc9196072c75f60937c3595712f3dab71d9b2499fbdd3,2025-01-28T20:15:29.483000 CVE-2023-30084,0,0,18193f6f8e54d5a50ca7411131bbbd46b380735954c901e8f373361ff6ca2dbd,2025-01-29T15:15:15.093000 @@ -225341,7 +225341,7 @@ CVE-2023-31426,0,0,819447cb4207899fe2f01f68c36ca71335a291285c22399c49b52ef5e2f6e CVE-2023-31427,0,0,126746dc886c389e9c21d1632e058c6ab04183e9ee360017e44d81ee466f5d39,2025-02-13T17:16:28.123000 CVE-2023-31428,0,0,3ede5ae85c416f96132c8d987115f893c5e1425fd4039f21ad0c620c949c645d,2025-02-13T17:16:28.247000 CVE-2023-31429,0,0,510a584a1e2b284aad1be3d0adac013cc705f61961277ebbc262f4d8e5c842c3,2024-11-21T08:01:50.640000 -CVE-2023-3143,0,0,769641956bb4a1a099c459ee8bdc0f59d7d76a66a17d909e26e47cc4bb000831,2024-11-21T08:16:33.157000 +CVE-2023-3143,0,1,e9d38362fde6e77e3cc4c1c13a4ab8461dabb65aadaa0d0b41f1bf6b7858852f,2025-04-22T14:51:37.563000 CVE-2023-31430,0,0,f90d039fa5f724bfc6613056d40914b6c9d75b5e8d7d8be8eb77197d2c5dc3b9,2025-02-13T17:16:28.367000 CVE-2023-31431,0,0,a89df09b2fc53c3a4303c3efa9eb88678d077fb718ecff2180e3fb47c16bd85d,2025-02-13T17:16:28.480000 CVE-2023-31432,0,0,690285d7df8713d5a3593cdc7a6854553f027197642a9eb91f791b71fc95f836,2025-02-13T17:16:28.593000 @@ -225352,7 +225352,7 @@ CVE-2023-31436,0,0,236b8d7c5c60c87c0a3fa3d17d411ff5711f6da9af190ca4ef240e060af93 CVE-2023-31437,0,0,c5e7ed934c3f95337e0d6747d269ce2e9b68f3156ad84cfdd526ed7bfce9f109,2025-01-03T20:15:26.457000 CVE-2023-31438,0,0,3726b6e286f72d60d8d2a50ce86e3f9f77d34b7c0ec484f35df8ee9bcadc8009,2024-11-21T08:01:51.953000 CVE-2023-31439,0,0,71c5ca81c263f26893e008a16a18cf6cc6811e232fe39b6b1d8b56ee72d485bd,2024-11-21T08:01:52.097000 -CVE-2023-3144,0,0,13312dea69babaa16688124c8963ccc0c3d3042ee3236638219215f53f650b10,2024-11-21T08:16:33.300000 +CVE-2023-3144,0,1,e49302b5061b93b4a292b0a9fd8bef7a99e462999c100fc15a3f6b6adc85f5da,2025-04-22T14:51:37.563000 CVE-2023-31441,0,0,31ba3f04728b3e018f7177d9f506a5f3215259327deb1a558991108968e399d5,2024-11-21T08:01:52.240000 CVE-2023-31442,0,0,e620b4a8ea050d381ac679c88639cd42816debc6c034bb2d87dc20b8e407224e,2025-01-27T17:15:13.690000 CVE-2023-31444,0,0,888579027d1be4cf1096f418378c53be0a4a7405309c567a7bd11d8d2a2239d1,2025-01-31T16:15:29.310000 @@ -225361,7 +225361,7 @@ CVE-2023-31446,0,0,355d87959b5bc897f91518742ab93eab54dfb8d8ac9a3053ee86fa4d1b32b CVE-2023-31447,0,0,7f1a900fc94bdb351469814f2e57991d228be8194278bd5d10c161563e9aafdf,2024-11-21T08:01:52.957000 CVE-2023-31448,0,0,20baa9e995117ab8a1b0887fb921add49893fffa39f4afadeafa4afe0c714de8,2024-11-21T08:01:53.120000 CVE-2023-31449,0,0,dabf2232122bcb967cac82ac342dc2cc08a473e59f69401c5e3e20917449527d,2024-11-21T08:01:53.290000 -CVE-2023-3145,0,0,91403363205a4b78fd1a2c65e92f05256fafcd518a02e004df50e0b21d2da101,2024-11-21T08:16:33.450000 +CVE-2023-3145,0,1,d288378adfa3a7575aaa20c96c3565454bc17c3ddd0bf1ffdce2868e1431b966,2025-04-22T14:51:37.563000 CVE-2023-31450,0,0,e21b96c0d481c8f2f045b8c86801b3100a2bf8130cb41af250f6f91d3c4fbcb9,2024-11-21T08:01:53.433000 CVE-2023-31452,0,0,c5b0c9d807ec4dd1cb1fffa88bae57eba9b190fc367abd4e0897826d3136e609,2024-11-21T08:01:53.570000 CVE-2023-31453,0,0,c0a15f5981026664dda8df3607ae04677c95f400d3ba55dae989b7893784793a,2024-11-21T08:01:53.757000 @@ -225371,7 +225371,7 @@ CVE-2023-31456,0,0,892307a3b7639df38c20750833e789e54a7f2f4bbee234336f7c493f0c094 CVE-2023-31457,0,0,14019b67767311576904367a9a09a12ba912fd39be81b53a2e8e90c5016f0021,2025-01-31T14:15:32.490000 CVE-2023-31458,0,0,9a4bc419e6f5589fc2653b2a6511a554aeb930ddd46b628e771b89b62a839c7f,2025-01-31T14:15:32.707000 CVE-2023-31459,0,0,56722a72067aa7e0e5049522abc5ab3aefe0b87f6214968439cd5ea775f32124,2025-01-31T14:15:32.890000 -CVE-2023-3146,0,0,a92412cd988aa6ff0bc3b0898c63e001cf6fb14dd9ed650fbe1c4739e2be77ad,2024-11-21T08:16:33.593000 +CVE-2023-3146,0,1,bcd7831257c3f5c72a64fb3f6e0b86fd734d09ef9a6f3e0d0d456a0c69229eb3,2025-04-22T14:51:37.563000 CVE-2023-31460,0,0,399f5194158468eea7684d6c87f39de09e9b06a69db2ecb2f5dd7a188aee61eb,2025-01-31T14:15:33.087000 CVE-2023-31461,0,0,76df74b6505af362ebc51bb5a9e2770dbaa3a2fe4e8cafa6fac973092b0d9382,2024-11-21T08:01:55.023000 CVE-2023-31462,0,0,14f80d56a444f41364bc20af86bdcdd07269a9e998effdebd639b3f353b9419a,2024-11-21T08:01:55.170000 @@ -225379,7 +225379,7 @@ CVE-2023-31465,0,0,71fe12fdfc0d0c937345c630b551c2368788e8aae322c6ff59cd75655d39e CVE-2023-31466,0,0,bc15c9c02efa6b91982ff17f06ce628f35ab912d1753b22877102d0117dcca8b,2024-11-21T08:01:55.477000 CVE-2023-31468,0,0,f5a1f6999de9f6620fa087c3295dfd25cf92014b79bc320ffc38acef87af2bf8,2024-11-21T08:01:55.613000 CVE-2023-31469,0,0,e2ed88be9004039ca0daea185383b327532781f1edfdadfcb9b53d89e36a0a10,2024-11-21T08:01:55.840000 -CVE-2023-3147,0,0,56604f93dd20b44d8140c36ba767f07bd6ce689a7788f3df02be30ad8c574a22,2024-11-21T08:16:33.767000 +CVE-2023-3147,0,1,b8c4f91dd0ebb83d839c0e2c6501092783ec8d9618fafce72cb89506dc1c6eaf,2025-04-22T14:51:37.563000 CVE-2023-31470,0,0,9859820606b14814fce23c46e6e43761dfbfe932123567acef5b122a67359fad,2025-01-31T16:15:29.460000 CVE-2023-31471,0,0,deed1dee14a8a8f371f8a12f6ed70f0aaf06d061dec752d35f7e8a5ad4d5d5cd,2025-01-27T20:15:31.320000 CVE-2023-31472,0,0,321f83eeb40ccf486096f0ba5e686284346b40f93e6cec71580a6b658a468fd4,2025-01-29T21:15:19.723000 @@ -225389,29 +225389,29 @@ CVE-2023-31475,0,0,d951c773bb9751afa15b7c5979977675a78847a547c9e67d97edfbdf62ee6 CVE-2023-31476,0,0,5754408f4097401c0b532598f18001415e2df955b5933f9a71bbb86df2a8c36f,2025-01-29T21:15:20.103000 CVE-2023-31477,0,0,e10baebb415aa7ec15bcf01cba0d43652df664abd71fbb7953500b53d735e205,2025-01-27T18:15:34.210000 CVE-2023-31478,0,0,87d66437bb997d32cc1fc0dc593730c51f56e461df19242c13c95b6849969c47,2025-01-29T21:15:20.273000 -CVE-2023-3148,0,0,9236ef71fc0458d505ab03b01d49be5b44ba8909a5ef5119004368313b8abe3a,2024-11-21T08:16:33.907000 +CVE-2023-3148,0,1,10af664f76e1f395b78b9c8ebe7581baef27d5b652edd99ab1e87a3f52b29140,2025-04-22T14:51:37.563000 CVE-2023-31483,0,0,caa29b9d2c69fb8b5f1c1169ba1ed633aa5a0a840c4821483d7509a848613b04,2025-01-31T20:15:30.147000 CVE-2023-31484,0,0,ac8044426721e93fc87d0e5d5467129d6b0022bd19bc1007e3e36549118fd8cb,2024-11-21T08:01:57.707000 CVE-2023-31485,0,0,3514d734d4aed0823f3c94a806dc76730bd821bd9aaeae5cf41ef41a0bef1a8c,2025-01-31T20:15:30.330000 CVE-2023-31486,0,0,d38250d2e093246198acd1201cbdb68b6bc49fb9b9e38744443377ce9de99ea6,2025-01-30T20:15:32.297000 CVE-2023-31488,0,0,94d2bf236ac6daa5715166465e0b7e10e06d184e0318c00b1cd3ef51756b85dd,2024-11-21T08:01:58.237000 CVE-2023-31489,0,0,bc328c2d0f93306e05e68d84815df5005bf7c9ceb3dd7621b7d0866ee9a28b65,2024-11-21T08:01:58.453000 -CVE-2023-3149,0,0,c00821dd1818f517bfa5a1fd3e0f2f402c593877879e7a9264f9788304c549d2,2024-11-21T08:16:34.067000 +CVE-2023-3149,0,1,74d2c30bde865a6a3e4271b33806ff98c6569d7891202ffaf0344bc9f0ac1fb2,2025-04-22T14:51:37.563000 CVE-2023-31490,0,0,ba44baa16933ee7fb56e5ca7ccdad5e45e5737c4603d73d73c9a43eddb4128bd,2024-11-21T08:01:58.593000 CVE-2023-31492,0,0,ab94b48b95747f1dd268773c2870b232f3ee8c1585864f065007fa8078479e18,2024-11-21T08:01:58.740000 CVE-2023-31493,0,0,8ae4f2f9882a91a3883f3e868300ce5a690269ec9f7f48649f5e5389dbd259b7,2024-10-16T19:35:04.040000 CVE-2023-31497,0,0,80cf15c197eff3f01ea9605c6ed4248241b61d594f483b4431ef071d58c6a699,2025-01-27T18:15:34.437000 CVE-2023-31498,0,0,0d4c1e7a0cd4aeddb32086ff86825f303b7dfae54d84ae71e39be1f2b0088f55,2025-01-27T18:15:34.630000 -CVE-2023-3150,0,0,a3fa8d6069753cb23f1e5e11e86e9c466366dcc9f74d5d0a1459eb95f7a3bca8,2024-11-21T08:16:34.220000 +CVE-2023-3150,0,1,0229f64cab2153232ef27c21a9e14c1b2c8a2ee65b2489281a2345870816a5a8,2025-04-22T14:51:37.563000 CVE-2023-31502,0,0,7437bc1185aadcf6fd74fe6f6ac1b7bd1772021ffe7a2781f76a295aeea83081,2025-01-27T18:15:34.863000 CVE-2023-31505,0,0,4c07c8ce04347721c87f09b0872ae928000ece07aeeb0fd88ee56618ef7bf252,2024-11-21T08:01:59.510000 CVE-2023-31506,0,0,b69783c256e9b2fe4d3fd0bc3adaf237cfca0b69092218bcd86c0a612bc7a808,2024-11-21T08:01:59.647000 CVE-2023-31508,0,0,383f087cc1c90d8f094ea0cb33f3780c04e928cedb43e11082afe0e7450127cb,2023-11-07T04:14:20.410000 -CVE-2023-3151,0,0,ec3a941d8fbbf001a7ac2ad14d4443a7e83b4134046b1c2fcc557d2dee9ee35e,2024-11-21T08:16:34.370000 +CVE-2023-3151,0,1,4b24a462d4b678e198fa8a3ae8df3044df5a89f9e4bfd8715b018de5abb47fd6,2025-04-22T14:51:37.563000 CVE-2023-31517,0,0,1d8d4dc687680917486b8f83f7d514574a637d13656773f6e6ed3f56dbf3dade,2024-11-21T08:01:59.810000 CVE-2023-31518,0,0,6c5df094f55220c6e5736afa5fa7490334ace814ec6c9e37f8976d1638abd3bf,2025-01-31T14:15:33.290000 CVE-2023-31519,0,0,c7c3e2dd6ac487f6491ccfb052103ea5ca9da1ab6078826fb082db918527b824,2025-01-23T18:15:27.823000 -CVE-2023-3152,0,0,76258561f7bdc822eccdbeeafbc62142c30393010515b59bd36d13db3dfea256,2024-11-21T08:16:34.520000 +CVE-2023-3152,0,1,f80a34906b466d752d32d54a9389e63f6d229d4aced386a2591269d449cd0eff,2025-04-22T14:51:37.563000 CVE-2023-31528,0,0,5e0ac407c171e6d79543330153807b12dd0b8b88f1a16b3ec03f9b6d19f8fb2b,2025-01-27T17:15:13.867000 CVE-2023-31529,0,0,a21c7d9a684766ef0495db5a31ac146a605708e6632389608f6662de20b7bb0b,2025-01-27T17:15:14.060000 CVE-2023-3153,0,0,3dac5c9e8c7817f4c5ff144086a66d106b21472b1e694119f96778f0a879c85b,2024-11-21T08:16:34.670000 @@ -232116,7 +232116,7 @@ CVE-2023-40104,0,0,b3b514fe5c5c90b3fd96bac202151426665bbebe93179878299d731c6e6b4 CVE-2023-40105,0,0,99fd48612470195f9c737f8096f56e0b77060289b39968dc0daaaa2383cd197e,2024-12-13T21:27:40.283000 CVE-2023-40106,0,0,dd94462a1cc0ecff68b893d4c352cb3561e324fb5a1af15f4a62c1d3f1ffd1ae,2024-12-13T21:20:34.837000 CVE-2023-40107,0,0,cbfd670fe9974a0bf3a935ebb0bae79e008c2a28e1b9f32ec59b9835bda81f23,2024-12-13T21:02:17.693000 -CVE-2023-40108,0,0,f1e39f4a01d8718099dce4fcf3a5ff5ce7e06ae43c54e921a5c94fc2e54b10d6,2025-03-18T15:15:46.217000 +CVE-2023-40108,0,1,7e2c1138d3c6a0003d15bdd5c7b2e2289f8736de0b57282ccb0e49c6f1c90893,2025-04-22T14:32:11.403000 CVE-2023-40109,0,0,e4c3773b4535f894e1bed277d66aa40ca3b1bf83f795fb073a350f209e5bc2e6,2024-12-16T19:34:04.793000 CVE-2023-4011,0,0,77e08656072a7907646eb543cf48d306dfce66e36e2f14dc48363fc6a8adc3bd,2024-11-21T08:34:13.530000 CVE-2023-40110,0,0,d02efcd8e2c066a2da1fa504eeff129c65768425ed78adce38c5d8aac1bd2d14,2025-03-19T16:15:22.657000 @@ -232140,7 +232140,7 @@ CVE-2023-40129,0,0,4dd2dc96251ed33b386eb4bf36dbfc8133a1074a121884b0e6efce82c7a5e CVE-2023-4013,0,0,81a1814e2860a38e869ad893f24750f16a5c3c351a223a2f4d9b78f2288f9401,2024-11-21T08:34:13.823000 CVE-2023-40130,0,0,73b56fd8bff33c5840eb190bfaff74aa5558771cf7c7277c3137c479f8e1a15c,2024-11-21T08:18:50.080000 CVE-2023-40131,0,0,d299c70704211e34f2f3042a44222799ffd6635ecde64b088a69c82024d8983d,2024-11-21T08:18:50.290000 -CVE-2023-40132,0,0,d125600ac25f772630026cd73514c7f77cd5af80d31b0308835de9b63adbd567,2025-03-24T17:15:15.680000 +CVE-2023-40132,0,1,6dcae37bf6a24ecdc1a16f70e484fb244fa320dda202aec3f00803ce56ebc0f4,2025-04-22T14:32:26.373000 CVE-2023-40133,0,0,6fefa73958d1b96e5e74a310e07325347682bbd679ff777a3ac2fea0d81edadd,2024-11-21T08:18:50.427000 CVE-2023-40134,0,0,1263dafd545707095a277b1240280c9a53625615d402a194a4fa0dfe676e5495,2024-11-21T08:18:50.570000 CVE-2023-40135,0,0,963325a31ec9de455dea7fe77240c283d9fc28ae4b896f1eb180d999fadb14b7,2024-11-21T08:18:50.693000 @@ -240217,22 +240217,22 @@ CVE-2023-51312,0,0,2b77c2f97fe8ce0d02c6c4bb3045b7901d79294df524f0fcd3b936d305b84 CVE-2023-51313,0,0,b4228879cadc5b6a30c0bb739048501435f416e93eb381e021873a3470a10c3f,2025-02-21T18:15:15.350000 CVE-2023-51314,0,0,652fe6a615306a34a78a51d13f8f214d11e73d2aa8cc674c7744fa37c4403189,2025-02-21T18:15:15.567000 CVE-2023-51315,0,0,5712be8071c48b48083e116e132f397e5501797e2b823f7904b4fd75e4afd91c,2025-02-20T18:15:23.490000 -CVE-2023-51316,0,0,21070328aaa1c7dbb0a2854fec6984ea01cb049f139abebdf8b4059c73cefe11,2025-02-21T18:15:15.783000 -CVE-2023-51317,0,0,0ffa423eb9dab411d40a147ddf0106ddaada7e6d93285e9262cee1d5808d4d68,2025-02-21T20:15:33.510000 -CVE-2023-51318,0,0,6afbe9575d318be5a9ca4af3fb5e0143d13c9914757cf1096df2be43e32fd670,2025-02-20T18:15:23.683000 -CVE-2023-51319,0,0,fa859b3b7fb4af8eec2b81f2cd3bb0331d4ae53ff0ab3acd3075cfed5cb7d2c1,2025-02-20T20:15:45.180000 +CVE-2023-51316,0,1,29ccbb9d8e733728443a6f153411d31509b2e782f8c6a2b7dca86dc839d7a24e,2025-04-22T14:15:36.210000 +CVE-2023-51317,0,1,13fd0bf1aa0758c70fb07649a8078194efdab3e8da8e5d5af40c80ef08555791,2025-04-22T14:10:46.450000 +CVE-2023-51318,0,1,68d9c19d233b1b30a24e94b2854c1f98fa5ab4d7902f5c023e98509a809c141a,2025-04-22T14:05:53.427000 +CVE-2023-51319,0,1,883a415a8a806ece9b6821b7c52d442f8c5819f2456becc67c774c6d6cadff2d,2025-04-22T14:04:57.650000 CVE-2023-5132,0,0,3a50c79f3182856bf1a8f272b84346a7ecfc5aa8bca0e713ce49774805195cc4,2024-11-21T08:41:07.540000 -CVE-2023-51320,0,0,09739480bd96bdd5cf1b984ac75a47359cf92bab9e0bb52c3dfa04a9290aba11,2025-02-21T20:15:33.667000 -CVE-2023-51321,0,1,99ad6390efefeab9637b82beb4aea4d9fbac47a7efba2776d78f0b742ed21a46,2025-04-22T13:59:49.250000 -CVE-2023-51323,0,1,401b42d26aed5df37ef9f321532bc85d36944315d743e6de1f6d419dd7a38fbe,2025-04-22T13:54:39.787000 -CVE-2023-51324,0,1,fb2b41176be4f1dcd969c1e97961109adc5e85a2b2f04ed443550bcd933b2de2,2025-04-22T13:50:01.553000 -CVE-2023-51325,0,1,5875d459fefc9249b78339d79cbeccb0bcbf01b30f17a94f0a2721a4df335102,2025-04-22T13:37:32.723000 +CVE-2023-51320,0,1,863971d1ca0af45244d3127f965fc1e407e336b97c6cc7e5bf5793d6d88a9960,2025-04-22T14:01:11.920000 +CVE-2023-51321,0,0,99ad6390efefeab9637b82beb4aea4d9fbac47a7efba2776d78f0b742ed21a46,2025-04-22T13:59:49.250000 +CVE-2023-51323,0,0,401b42d26aed5df37ef9f321532bc85d36944315d743e6de1f6d419dd7a38fbe,2025-04-22T13:54:39.787000 +CVE-2023-51324,0,0,fb2b41176be4f1dcd969c1e97961109adc5e85a2b2f04ed443550bcd933b2de2,2025-04-22T13:50:01.553000 +CVE-2023-51325,0,0,5875d459fefc9249b78339d79cbeccb0bcbf01b30f17a94f0a2721a4df335102,2025-04-22T13:37:32.723000 CVE-2023-51326,0,0,5370b84ab1dcb02aa92f5f822da66d6244b53b4bf7b177a67bcfbec130fc942d,2025-02-21T21:15:13.133000 CVE-2023-51327,0,0,64c53d8204d12159909f0d5beb999c2f88023cfa4601261682b5a581ddeb8ae4,2025-02-21T21:15:13.280000 CVE-2023-5133,0,0,0018a6a351ee401af2daab5bec3a8b6563a0922f375ff71fcd99140986e7d09f,2024-11-21T08:41:07.690000 -CVE-2023-51330,0,1,d494d69da83d09bff4a5d25cf180c5f24c80d48b45ae0c94b3d27cbfc2351841,2025-04-22T13:27:34.957000 -CVE-2023-51331,0,1,3d4b54bf1b44aaac402e3275f12c2b6cbbd5453bf95aa036960c03e584f61155,2025-04-22T13:22:46.187000 -CVE-2023-51332,0,1,e00adc76820251aab0bdb3b6ba8f9033bc14e3c0c57b55e5de40f2cb3b7256c0,2025-04-22T13:20:44.980000 +CVE-2023-51330,0,0,d494d69da83d09bff4a5d25cf180c5f24c80d48b45ae0c94b3d27cbfc2351841,2025-04-22T13:27:34.957000 +CVE-2023-51331,0,0,3d4b54bf1b44aaac402e3275f12c2b6cbbd5453bf95aa036960c03e584f61155,2025-04-22T13:22:46.187000 +CVE-2023-51332,0,0,e00adc76820251aab0bdb3b6ba8f9033bc14e3c0c57b55e5de40f2cb3b7256c0,2025-04-22T13:20:44.980000 CVE-2023-51333,0,0,d430b10d0cc7b7c74f340ff5752759f45c7748d7340a0825db0e0a8135dad973,2025-04-10T19:56:32.980000 CVE-2023-51334,0,0,0e2ad3922a4699c87e2bbc27f421843fafc7c505548dfd8c4c28e0bab2198b73,2025-04-17T18:02:33.360000 CVE-2023-51335,0,0,8f031692f711e1bf12853d84fafb89c0dc1f19a86e134cf9e243569a3b05c30f,2025-04-10T19:37:31.427000 @@ -245806,7 +245806,7 @@ CVE-2024-11295,0,0,daf1e87bfad04e12bfa7ad18000186885dfa1c89e1d5fad04ebfd1bc4aed9 CVE-2024-11296,0,0,fb7d94da02b5205207d7d82f7728d17cf0d45360472acb20ff8132fc89a748af,2024-11-22T23:15:04.507000 CVE-2024-11297,0,0,71ce10fedec1c85ff215a977a1373e8d6c96e84b0bccc7f200797c8573787df1,2024-12-20T16:15:22.107000 CVE-2024-11298,0,0,cd8027ff7c1e39b70cf43f7d5a6cec3a72565a042c79fb93ed3ff58ccba5dece,2024-11-22T23:15:04.983000 -CVE-2024-11299,1,1,ae07ab90821bd5e232273f350a0696f9bac2a888cafd10af9adaea371e0bb112,2025-04-22T12:15:14.677000 +CVE-2024-11299,0,0,ae07ab90821bd5e232273f350a0696f9bac2a888cafd10af9adaea371e0bb112,2025-04-22T12:15:14.677000 CVE-2024-1130,0,0,679ee2f34d13ebb9df2fe1e2f1252066bb0e47c7a2921656bbd7730c6eaa121e,2025-01-15T17:29:06.433000 CVE-2024-11300,0,0,17e6044959868c1f0bfbb5c535147bb16853bb47032cabda2a83334d5515df63,2025-04-01T20:35:24.003000 CVE-2024-11301,0,0,6bc5810ef3e816290502217a0822b9a4fd42d48506ddfb4141c56c52ed5d3d4a,2025-03-20T10:15:24.890000 @@ -247449,22 +247449,22 @@ CVE-2024-12948,0,0,8a0f5d3c1fc1755c7bf26ac47b67e882b4269014f117c1b8df8936a0faf41 CVE-2024-12949,0,0,c0d72c08e20d7d41036fb7ba004e80016a051d20d7be2064c97fce41a5c0ab40,2025-04-03T16:26:56.777000 CVE-2024-1295,0,0,58e65e331ff11f824ceffb79237c2ca705e423c379ee489ababaab58413247e4,2024-11-21T08:50:15.410000 CVE-2024-12950,0,0,337183b93b04c93ec8a8b584a100f3430632a01d6833f0f006078f1dd50980b1,2025-04-03T16:27:40.060000 -CVE-2024-12951,0,0,0e4888f54aece3afad5f1d33ad34b72a72a8e9cb743a65d64a0c8d7fb59d78f9,2024-12-26T16:15:06.730000 +CVE-2024-12951,0,1,3803b69eec63458dffb1607404bb50eb2d06da8ca6db14918c2e0bea40f6aaf5,2025-04-22T15:09:08.513000 CVE-2024-12952,0,0,5b3fe07b4ee37c9593938d2f3bdefc1818a0886552b2a517ca99441e36c712dd,2024-12-26T16:15:10.540000 -CVE-2024-12953,0,0,2f78cb657dcd2f38d909bc96eebd38b1883a292cd4545af251b40f8f8586d470,2024-12-26T16:15:14.487000 -CVE-2024-12954,0,0,6f8f8bcec24095aaa3ca61904dab150e084242c3a22c7e64e0443b65ca79100e,2024-12-26T16:15:17.510000 +CVE-2024-12953,0,1,66285571c7dee08ea8df1d6d9aa780871d25246873232680b8c9291666615d51,2025-04-22T15:09:40.237000 +CVE-2024-12954,0,1,362f8a7a950fd296720b8049e4f648c5d64bd82a723c602018068e0bf81f3b0a,2025-04-22T15:10:56.467000 CVE-2024-12955,0,0,b9c882a01f16b01521cddb444159e092a3c1322d0bb558560de6f1bcef344f79,2025-04-03T16:27:55.240000 -CVE-2024-12956,0,0,2668c3ad906249d1517aa1703947fdc042247efca13d397d4afeac581fc5dfd1,2024-12-26T16:15:22.847000 +CVE-2024-12956,0,1,7686fdb2feca24c5cb2493feab3c70c61d510dabc02a0552e8690d76f02b6649,2025-04-22T15:11:03.530000 CVE-2024-12957,0,0,64905565d3b550f9fb874d7a5d3b874bec23d8b7ec048a30e0f6c1a24dbf4cfe,2025-01-23T10:15:06.867000 -CVE-2024-12958,0,0,a648e17888b1e45585aec9dcc552a6b61d7fb8bf3b2cdc0fb1abb90426e73104,2024-12-27T15:15:11.510000 +CVE-2024-12958,0,1,fb035b553ed4b32358ce707d595c26420d2846de243c8dc7fd59ed79b1822aac,2025-04-22T15:11:11.763000 CVE-2024-12959,0,0,e794f762403766f393f7319c6d3c7e011beced73c96140fecda9e1321c6921b6,2025-03-03T19:33:39.540000 CVE-2024-1296,0,0,bc7ff5b77e78e698d15576309eb7ce4c3d0e54ba3e687f3aa36d053363066caf,2025-01-16T15:27:56.237000 CVE-2024-12960,0,0,21e253544ce10be5a1e2ec6818aa6cbe498e0edc1ae4e89d7640bf0c4f8d219b,2025-02-28T23:14:17.290000 -CVE-2024-12961,0,0,258d4ef8fb961ccafed75d69f1fc7307c7a8816df190c0ac8d84ac77fd69b53e,2024-12-26T19:15:07.563000 +CVE-2024-12961,0,1,69d843e7e9ad88dc8b84c67c62accf341917881b1fbe47d2ae7a53531a6a7f7d,2025-04-22T15:11:20.787000 CVE-2024-12962,0,0,4380fe386ab6593003338fc07db5ce6bccf435d15cc000d0075a74562f4a4b02,2025-02-18T18:51:27.840000 CVE-2024-12963,0,0,365b38dfb2138c20c56515af98bb65de5279d5316367e7321482d4b1320b3003,2025-04-03T13:35:16.403000 CVE-2024-12964,0,0,dbdd090c5fd59ecffdfe4261b10d51097e2896ede42db594112c42c0d0e62538,2024-12-27T17:15:07.477000 -CVE-2024-12965,0,0,da8c6ab28cc2b34137be07155a862e7bf1f082dc2ba9f4a6760e921794d4930d,2024-12-27T17:15:07.593000 +CVE-2024-12965,0,1,429c876b1dd124192be63fc97aade087d3caa70ea9b4881b22e2bccbc700aa58,2025-04-22T15:11:51.223000 CVE-2024-12966,0,0,02ae5806502ede0f1c25011ff26333d563ecd74237dd0ee3a6a4d4ecc82eb92d,2025-04-03T13:29:35.940000 CVE-2024-12967,0,0,4bd9bef3b5873571b98c18cbcad95c48c85d49db2323d06157e09be11af31d53,2025-04-03T13:26:49.747000 CVE-2024-12968,0,0,7af498e2c861e3a14adbc7117c3c881564ff7353c7ac8e674d0983bb98941501,2025-04-03T13:21:37.250000 @@ -247502,8 +247502,8 @@ CVE-2024-12999,0,0,cef46f50781baf217473f51d55cd419e9cb6a34f142f75461329fcd7fecc8 CVE-2024-1300,0,0,cd5e94fcfe97597e01cd14e77d002316d1f6043211ecf00bfd2ed45a32b95c9e,2024-11-25T03:15:10.053000 CVE-2024-13000,0,0,bc161add052684ff88735e2b18fbd0186cf4b5d7e82bd795e40644a35f7cfe8c,2025-02-18T19:02:13.137000 CVE-2024-13001,0,0,e6dcab3a6ec0085a27cb2844da6ba288f835eca90218958dd587871b99e9809a,2025-04-03T12:35:17.997000 -CVE-2024-13002,0,0,73f802eb9f8b9e1d720b28d5d5fec7836df95b40b314e093b6ac0ef85aa4689b,2024-12-31T17:15:07.460000 -CVE-2024-13003,0,0,8ea4a997164608756dd4ca16f93d14ecebb42d80183088df88f6df822d4c84d1,2024-12-31T17:15:07.870000 +CVE-2024-13002,0,1,d951aca45f2994115ffa6162087a4a62c286812e90807115a4f29701c7e96c79,2025-04-22T15:11:30.947000 +CVE-2024-13003,0,1,ecef2a0251a4a205e51f6a2992504ca23ba2306773f82d5c20be1091e8661850,2025-04-22T15:11:41.333000 CVE-2024-13004,0,0,d9296ebcaec17706ed90f78b84cadbb2b745cc88e840577bd0fd14881b6dd0cc,2025-03-03T16:10:56.670000 CVE-2024-13005,0,0,f5b9d60cc98712d8070438c8a074b650251171fa1a546678657305f556f2f08c,2025-03-05T18:43:05.930000 CVE-2024-13006,0,0,c406d8454112deb00495297508d7bc3a3d460a398bf0bd7a3644801aaee746fd,2025-03-03T19:31:55.350000 @@ -248080,7 +248080,7 @@ CVE-2024-13565,0,0,684f7f6c469aa690c31498d8006cc3528a7f9ba92e597c468d835d0a7ab8e CVE-2024-13566,0,0,4e1012bf67cdbac097d1c63a1c7fd79c8a8116508864b50fb7c66cdc833178a3,2025-01-31T09:15:06.847000 CVE-2024-13567,0,0,d123d65fa99071e0741ab501c15c4c7f9d688ac84bc56954eb217f3ce4092780,2025-04-01T20:26:11.547000 CVE-2024-13568,0,0,9e74afb56722f02929d754afa7c3b344f0fb3d262b0b29f693d93e682755b19b,2025-03-01T05:15:14.883000 -CVE-2024-13569,0,0,93e38ac3ad46507fa98f415da897dc4c3c83d13a1b96c6d608ea7ff38b467b16,2025-04-22T06:15:44.120000 +CVE-2024-13569,0,1,473ab32c48f746617a5fe527a3346c852c5909ae0731d2a9a98b0778caf05c61,2025-04-22T15:16:08.767000 CVE-2024-1357,0,0,25eaf5b978f8da82b4d3e5ed8aa890834adc21c061c9c9c169613a72fe6996b1,2024-11-21T08:50:24.283000 CVE-2024-13570,0,0,5f3f1655b91dc3bee949d16de77a481687b9936ecee52594dcd7e9a641c4eac8,2025-02-20T16:12:22.823000 CVE-2024-13571,0,0,ab309a8c78e09a2ce738fdc24b971e3cca9be1cecd7a9446e1d144bb91a81bc0,2025-02-26T16:15:15.210000 @@ -249115,56 +249115,56 @@ CVE-2024-20101,0,0,1b0fb6e30099544a0610e30130e11f942644076950411627a0f652b03e31c CVE-2024-20102,0,0,213b2653005a8502face2976cb57da28ce2dc01d95d8ec089881065d74704696,2025-03-13T19:15:42.127000 CVE-2024-20103,0,0,b3d4791efc226cea589196d5aa87bb175b0cd70d652f826dda4aaaf08c792fe4,2024-10-07T19:36:43.530000 CVE-2024-20104,0,0,279f9fe03a80621edf85d2b9a94aa3e729ef63f418ac218ae57c55ba1b018348,2024-11-04T18:50:05.607000 -CVE-2024-20105,0,1,eca6b7652feccd2b14832fea541d32d233828e864edcd9b84231a7b938ac0010,2025-04-22T13:49:48.913000 +CVE-2024-20105,0,0,eca6b7652feccd2b14832fea541d32d233828e864edcd9b84231a7b938ac0010,2025-04-22T13:49:48.913000 CVE-2024-20106,0,0,9ed0edd0d93f818e255d40207e291113a66f7f07a64b246dc551c45e71818d67,2024-11-04T18:50:05.607000 CVE-2024-20107,0,0,d68c82e7ac5cc57e7b2ad3153d74aa648615bf6a91a48360aabd997b2db586b8,2024-11-04T18:50:05.607000 -CVE-2024-20108,0,1,f8d4d925da80b6646b7928b23d8e5bfc7d89eb94dea1bae6b48795b3976a9342,2025-04-22T13:53:18.823000 -CVE-2024-20109,0,1,d9da2c8e48db6f6082c857b19f019561241423e8f696e1c2354d4430555c9087,2025-04-22T13:53:16.270000 +CVE-2024-20108,0,0,f8d4d925da80b6646b7928b23d8e5bfc7d89eb94dea1bae6b48795b3976a9342,2025-04-22T13:53:18.823000 +CVE-2024-20109,0,0,d9da2c8e48db6f6082c857b19f019561241423e8f696e1c2354d4430555c9087,2025-04-22T13:53:16.270000 CVE-2024-2011,0,0,9a5ec92cf66d01c9d41e73e55f014b333e2f85b3899d7384d5dad77eaaadd606,2024-11-21T09:08:48.397000 -CVE-2024-20110,0,1,b415b03f55a1451d7be8c751441e585988d1e504c676c5f099abacecc1ff05d0,2025-04-22T13:53:12.060000 +CVE-2024-20110,0,0,b415b03f55a1451d7be8c751441e585988d1e504c676c5f099abacecc1ff05d0,2025-04-22T13:53:12.060000 CVE-2024-20111,0,0,15382fa89c4dca466d4eb01dd3b0e7e35311b81fa6eba7fe809d777afa435e7f,2025-03-13T17:15:26.357000 -CVE-2024-20112,0,1,b83a25874af379b57aff09fda63155abbf5dc6fb984cc56f6900d681ffe7673e,2025-04-22T13:52:45.073000 -CVE-2024-20113,0,1,11f7fc229bf49e5fef8412508950707d217e52c240caecd64ff5ce749b13c4ba,2025-04-22T13:52:36.983000 +CVE-2024-20112,0,0,b83a25874af379b57aff09fda63155abbf5dc6fb984cc56f6900d681ffe7673e,2025-04-22T13:52:45.073000 +CVE-2024-20113,0,0,11f7fc229bf49e5fef8412508950707d217e52c240caecd64ff5ce749b13c4ba,2025-04-22T13:52:36.983000 CVE-2024-20114,0,0,37e3a1e5d5c56411420e9afc0f0dcb25c90e78c6ed313cda1e77408da2c0755e,2025-03-13T15:15:40.723000 -CVE-2024-20115,0,1,eac45f14914dd5984e3370294d8142edd32f86a3919418894ec92fe8effa3c32,2025-04-22T13:52:31.220000 -CVE-2024-20116,0,1,cf378ab67a21a4d9d2bbfaf7039230b09fb24530c33d1fa55c9e743f28d35689,2025-04-22T13:52:27.537000 -CVE-2024-20117,0,1,296081245ae6674e91a712137c9c156268ac4d434a85b5ca1b6c96048540a9c3,2025-04-22T13:52:21.197000 -CVE-2024-20118,0,1,d6c119ed367dec6a7730c155ace3e62f339353b673890d7f643cdd3ba94add80,2025-04-22T13:51:56.660000 -CVE-2024-20119,0,1,657e97bcc70416f1989f69582d5cb0cbbda966f690694c7b47ade370ea2b5453,2025-04-22T13:54:43.667000 +CVE-2024-20115,0,0,eac45f14914dd5984e3370294d8142edd32f86a3919418894ec92fe8effa3c32,2025-04-22T13:52:31.220000 +CVE-2024-20116,0,0,cf378ab67a21a4d9d2bbfaf7039230b09fb24530c33d1fa55c9e743f28d35689,2025-04-22T13:52:27.537000 +CVE-2024-20117,0,0,296081245ae6674e91a712137c9c156268ac4d434a85b5ca1b6c96048540a9c3,2025-04-22T13:52:21.197000 +CVE-2024-20118,0,0,d6c119ed367dec6a7730c155ace3e62f339353b673890d7f643cdd3ba94add80,2025-04-22T13:51:56.660000 +CVE-2024-20119,0,0,657e97bcc70416f1989f69582d5cb0cbbda966f690694c7b47ade370ea2b5453,2025-04-22T13:54:43.667000 CVE-2024-2012,0,0,b5d05e8c211f97f1679a5ae1a349a2338d463ec4faf487383fe8307125729ba8,2024-11-21T09:08:48.537000 -CVE-2024-20120,0,1,565347e5a8a610fa2cad84a5012a6f66677a1582ad1530aa80c071394829a9be,2025-04-22T13:54:39.553000 -CVE-2024-20121,0,1,d23fa05652a4b0fb208b2333570d8c82f781bb1781393f0f84a7ff1145d0698c,2025-04-22T13:54:35.757000 -CVE-2024-20122,0,1,ebaefd087ba59547450ddf13d35eaad7f26a8c8f20d09fdbde8106a16f914ab2,2025-04-22T13:54:31.797000 -CVE-2024-20123,0,1,ae761b51a457c7c9560397456f4d03dbb07d6d58802ce6a6b45f206b2fadb45c,2025-04-22T13:54:25.663000 -CVE-2024-20124,0,1,1bab79d72ec2985f0d0c345267eb6f5bcd8fe10944556d8abc2acd5931fce78f,2025-04-22T13:54:22.327000 -CVE-2024-20125,0,1,0020e504b30a21e16723292fa7c11a462dfa551af2600976f69e43e3fff55033,2025-04-22T13:54:17.490000 -CVE-2024-20127,0,1,10a512f7f5ade4912546b301801244652fa4276e65465098d8323c000a4ea4f3,2025-04-22T13:54:09.467000 -CVE-2024-20128,0,1,b9d661dcd5803e8f8c11fa1bad13d5172714b4f8d0e5e01e21664874f991dbb9,2025-04-22T13:54:05.037000 +CVE-2024-20120,0,0,565347e5a8a610fa2cad84a5012a6f66677a1582ad1530aa80c071394829a9be,2025-04-22T13:54:39.553000 +CVE-2024-20121,0,0,d23fa05652a4b0fb208b2333570d8c82f781bb1781393f0f84a7ff1145d0698c,2025-04-22T13:54:35.757000 +CVE-2024-20122,0,0,ebaefd087ba59547450ddf13d35eaad7f26a8c8f20d09fdbde8106a16f914ab2,2025-04-22T13:54:31.797000 +CVE-2024-20123,0,0,ae761b51a457c7c9560397456f4d03dbb07d6d58802ce6a6b45f206b2fadb45c,2025-04-22T13:54:25.663000 +CVE-2024-20124,0,0,1bab79d72ec2985f0d0c345267eb6f5bcd8fe10944556d8abc2acd5931fce78f,2025-04-22T13:54:22.327000 +CVE-2024-20125,0,0,0020e504b30a21e16723292fa7c11a462dfa551af2600976f69e43e3fff55033,2025-04-22T13:54:17.490000 +CVE-2024-20127,0,0,10a512f7f5ade4912546b301801244652fa4276e65465098d8323c000a4ea4f3,2025-04-22T13:54:09.467000 +CVE-2024-20128,0,0,b9d661dcd5803e8f8c11fa1bad13d5172714b4f8d0e5e01e21664874f991dbb9,2025-04-22T13:54:05.037000 CVE-2024-20129,0,0,59a07694c4ce64a7fcbb281050774c9a8033feb0ffb505e2e524a19c36297a2c,2025-03-13T18:15:37.080000 CVE-2024-2013,0,0,2d1608ffc6046704b03ee6d685b760a5a5d2d260fb3c1ece913c5d36d369916c,2024-11-21T09:08:48.677000 -CVE-2024-20130,0,1,c5d6e6062a1d0b0d59a26ed46e23cecc282d4a51b9c9afc57133fadec1312528,2025-04-22T13:56:31.350000 -CVE-2024-20131,0,1,4f0390d601472759369012f9f1e758577578e85613723711da4a1d2716ae7ae5,2025-04-22T13:56:27.550000 +CVE-2024-20130,0,0,c5d6e6062a1d0b0d59a26ed46e23cecc282d4a51b9c9afc57133fadec1312528,2025-04-22T13:56:31.350000 +CVE-2024-20131,0,0,4f0390d601472759369012f9f1e758577578e85613723711da4a1d2716ae7ae5,2025-04-22T13:56:27.550000 CVE-2024-20132,0,0,f4cc91744b8a6b3af86e4e8d184a868c2fc84388570327f87327ebff157bcaa8,2024-12-02T16:15:07.557000 -CVE-2024-20133,0,1,0da94232297099c3cb863792864c88c7c904a72e05098289528c6055bbf20e01,2025-04-22T13:56:23.960000 -CVE-2024-20134,0,1,306b38ce386e6494df6a769736f2a742f7968b82c8497755297d1a4820027e45,2025-04-22T13:55:51.233000 -CVE-2024-20135,0,1,3d949bd2ad9beb5a49c98ca0e46499a73a244b85110dc7632e50265a6ba2549d,2025-04-22T13:55:47.877000 -CVE-2024-20136,0,1,c08b511836a85061db428d8cb757d0b13e3a951b12cbc0ee6c9d2a102646c37f,2025-04-22T13:55:43.890000 +CVE-2024-20133,0,0,0da94232297099c3cb863792864c88c7c904a72e05098289528c6055bbf20e01,2025-04-22T13:56:23.960000 +CVE-2024-20134,0,0,306b38ce386e6494df6a769736f2a742f7968b82c8497755297d1a4820027e45,2025-04-22T13:55:51.233000 +CVE-2024-20135,0,0,3d949bd2ad9beb5a49c98ca0e46499a73a244b85110dc7632e50265a6ba2549d,2025-04-22T13:55:47.877000 +CVE-2024-20136,0,0,c08b511836a85061db428d8cb757d0b13e3a951b12cbc0ee6c9d2a102646c37f,2025-04-22T13:55:43.890000 CVE-2024-20137,0,0,53377c7194035f3c7335cd23304ae7e34fb32383669eff1b9c9a22598ab07b98,2024-12-02T16:15:08.433000 -CVE-2024-20138,0,1,886bb7d7c97cdb4be6cad09778f0b70147c715ef9e57c2ab56b0875bdad89d49,2025-04-22T13:49:26.753000 +CVE-2024-20138,0,0,886bb7d7c97cdb4be6cad09778f0b70147c715ef9e57c2ab56b0875bdad89d49,2025-04-22T13:49:26.753000 CVE-2024-20139,0,0,434bf1878b4edcc6ee42c87512888b556d261e46d1cb8ef2e233401120fa701b,2024-12-02T16:15:08.770000 CVE-2024-2014,0,0,9c6b7427d7e4ecbb91bf5ac0c5393a05c9efb2a90a5cef1334b8ef37b43c6713,2024-11-21T09:08:48.813000 -CVE-2024-20140,0,1,eff59c6acb6ffd50544f1f3b57209482e63f60fd8e02a5a6155d307a624af6f1,2025-04-22T13:49:53.800000 +CVE-2024-20140,0,0,eff59c6acb6ffd50544f1f3b57209482e63f60fd8e02a5a6155d307a624af6f1,2025-04-22T13:49:53.800000 CVE-2024-20141,0,0,53f591ef00ee7db8befbfc4282361095e78006cb6f69f96c7f9ff56db8caeac1,2025-02-03T19:37:54.117000 CVE-2024-20142,0,0,846522d3548e0f4e2e1d286c74e60f77f1106fafe9da3c5f4841d6858709b35f,2025-02-03T18:15:33.520000 -CVE-2024-20143,0,1,4ffc561500b112e16e9deb751fba60258ce7c20812b1c088a97e51e504f555dd,2025-04-22T13:49:57.393000 -CVE-2024-20144,0,1,091e7799732d50eb4dade2ff7bc2a51e3b7ee41eb783fa5ab55c6e69739febc8,2025-04-22T13:50:01.453000 -CVE-2024-20145,0,1,09be1af6f5c2480f17ebdf167889994d10cb6f4e2b46ab88289f2186dfbd96b4,2025-04-22T13:50:07.340000 -CVE-2024-20146,0,1,a911fcb6d886ecddbb8c87f647272a838943bfb1298f2e169f8f2a11e14310df,2025-04-22T13:50:11.693000 -CVE-2024-20147,0,1,a000a2a23af1519487cf61795b755e8b43514a4c748e309f14e19b20a591c156,2025-04-22T13:50:37.573000 -CVE-2024-20148,0,1,dca84fcd58f711a4603e839c81df0ca5d053bb78b6edf09bfd8bd83f9a599e6e,2025-04-22T13:50:16.450000 +CVE-2024-20143,0,0,4ffc561500b112e16e9deb751fba60258ce7c20812b1c088a97e51e504f555dd,2025-04-22T13:49:57.393000 +CVE-2024-20144,0,0,091e7799732d50eb4dade2ff7bc2a51e3b7ee41eb783fa5ab55c6e69739febc8,2025-04-22T13:50:01.453000 +CVE-2024-20145,0,0,09be1af6f5c2480f17ebdf167889994d10cb6f4e2b46ab88289f2186dfbd96b4,2025-04-22T13:50:07.340000 +CVE-2024-20146,0,0,a911fcb6d886ecddbb8c87f647272a838943bfb1298f2e169f8f2a11e14310df,2025-04-22T13:50:11.693000 +CVE-2024-20147,0,0,a000a2a23af1519487cf61795b755e8b43514a4c748e309f14e19b20a591c156,2025-04-22T13:50:37.573000 +CVE-2024-20148,0,0,dca84fcd58f711a4603e839c81df0ca5d053bb78b6edf09bfd8bd83f9a599e6e,2025-04-22T13:50:16.450000 CVE-2024-20149,0,0,568ee02819888360cfcfe668f6e33aef2b41d5b7206273582d0fafdca3736f77,2025-01-06T15:15:12.523000 CVE-2024-2015,0,0,4b2b7166fa9575a7c1050901ca90dd43f109899611c303f2828bf2e2cf52681a,2024-11-21T09:08:48.950000 -CVE-2024-20150,0,1,e9b5a3a0ded3fb6596746997cc72e750e4e61287c03d8a25ece145759d2592ed,2025-04-22T13:50:21.513000 +CVE-2024-20150,0,0,e9b5a3a0ded3fb6596746997cc72e750e4e61287c03d8a25ece145759d2592ed,2025-04-22T13:50:21.513000 CVE-2024-20151,0,0,d04bbcef870cc61ec04ed8901f4506bcc530c2158aa6f3a373421e76d733682b,2025-04-21T17:13:45.390000 CVE-2024-20152,0,0,9c99dd824aebbc709d06cec2fa1a75a18ade6c8ff9ae76f5f8fb93d76ddbfb73,2025-04-21T17:12:10.883000 CVE-2024-20153,0,0,e167e5a4f372d1993cd50bcde2902a5a41097ebede83c7cb6f8dc0db1653bbd9,2025-01-06T15:15:13.173000 @@ -250312,7 +250312,7 @@ CVE-2024-21446,0,0,1d25b1a54af05f55312301bd56b496026ee3090541c3b748cb8719e548642 CVE-2024-21447,0,0,fdcd6d9a7f1e89cf247e7842eb079a19961ab3b94ad5ee3d699defddda88fdf3,2025-01-08T16:43:32.287000 CVE-2024-21448,0,0,662a8d78dc95444dfa75b79f55ad6daf690c1b6637524a2d1f68b4c8d4242c98,2024-12-05T03:19:21.767000 CVE-2024-21449,0,0,7896fc6d2aa5851cb5662df05cdedd5d1007bba8cae9edda90e1131ebd165eec,2024-11-21T08:54:23.507000 -CVE-2024-2145,0,0,cd8a4d5dbfc9265ce43625b1c7d94fa09f2df8f9d2bedbc3c7c2e4a17f147f9d,2024-11-21T09:09:07.667000 +CVE-2024-2145,0,1,2a5d8f860c7caa64f978656fb0811cb479e56a768fc12d19c746051cc0e274de,2025-04-22T14:55:51.197000 CVE-2024-21450,0,0,1e33831596949857b3614d5486ea0f7c5609506ceba2cf233faabaeab7a8e21e,2024-12-05T03:19:41.673000 CVE-2024-21451,0,0,10656af4bcd9bdb5f04e34a9c848c1f5888a156ccf937276d3b30e7a5ae48e37,2024-12-05T03:19:51.647000 CVE-2024-21452,0,0,69916a2cb634b56400fe89413eee3f5a3e0fda26a12cbda3800fa184c9d4bc38,2025-01-13T21:53:25.160000 @@ -250420,7 +250420,7 @@ CVE-2024-21546,0,0,83d1851723d10c5fa70ef389a5046dc8e42fa28e9f070c6780e94cc898a7a CVE-2024-21547,0,0,e90f13a2aa4124ee61f5da955288e307e1de4f192c06641e47843a06e722a36f,2024-12-18T06:15:23.187000 CVE-2024-21548,0,0,d3f1927101f522f159d239787f562dc4ab3414fb27436d593d30ab54b28f8084,2024-12-18T15:15:09.947000 CVE-2024-21549,0,0,5307004490b776cb852c6c4ce8fc4f671ed960c84b50288c16fa6b95e9db64af,2025-02-04T17:15:17.253000 -CVE-2024-2155,0,0,c4046476de717845ad993f72042c777e8830cb00c2720514d4f4bc09d623807e,2024-11-21T09:09:09.070000 +CVE-2024-2155,0,1,b5c00b09b1933717af724f5dad7fd33241d97e4fcc6a495cd8d8ba2a0fb5df65,2025-04-22T14:46:00.307000 CVE-2024-21550,0,0,6b574e14ae55a92be9fd93a1bb9ebb56cb79876aa6e47f41fbbb48bbd5163e82,2024-08-13T17:33:13.537000 CVE-2024-21552,0,0,3511199af539fa92e1c2d7637f006a31f2e0de3850c5a9391f1377c23517a9d0,2024-11-21T08:54:39.323000 CVE-2024-2156,0,0,73e2279c5d0173c5c9856369522b6959041cfa28f4050cfccd6081ca9cb05e53,2024-12-23T15:14:55.947000 @@ -253544,7 +253544,7 @@ CVE-2024-2585,0,0,d9d93859e5e3284cb2bdc1438f43d213cf4edd23b8c2d8b20f88b8f07aa4c0 CVE-2024-25850,0,0,55179944fddc433c0323293658753090900ae504a85ed3315876dc507f4364e9,2025-04-03T13:18:56.597000 CVE-2024-25851,0,0,1b5997130a1972ee6380cdffd7d0b86375452f194e58ed3021fd3f9770919e9a,2025-04-03T13:18:49.410000 CVE-2024-25852,0,0,5168a334b2b38e4578bd25dcc0cf32bd39c16c5efd9deeb1d0d54f814df180b1,2024-11-21T09:01:27.317000 -CVE-2024-25854,0,0,327432ec4000a93b58400c613e5e656de24e91ec57db60ad2ea588baf6258454,2024-11-21T09:01:27.533000 +CVE-2024-25854,0,1,d390c1571d4a2b58720d699efae025e7e007489f7b68764da63f5e0230bf5943,2025-04-22T14:50:48.157000 CVE-2024-25858,0,0,685d86bdc0e60e67aba92b13f4ecb066f0797838f800c9dddc63ef3418739afc,2025-03-29T00:15:19.037000 CVE-2024-25859,0,0,34b3066024d487e69b7e4402052d02a767e3807f28bf8d04e6b68bff8e2c3131,2024-11-21T09:01:27.973000 CVE-2024-2586,0,0,4f1880d295dcbba4ae5bd79fa01e4dbdb2f22f184a0ee199861440134401fba8,2025-04-11T14:47:01.320000 @@ -256450,7 +256450,7 @@ CVE-2024-2962,0,0,89a3331e528f6bca440fb1e5ac52085937df2cf4d043afb751bb1e4bc331e9 CVE-2024-2963,0,0,485ac60afc60faa14523910ac7974001eb71cee90b70313f8d0abd674f3d0ffb,2025-03-06T15:30:20.320000 CVE-2024-2964,0,0,5047b0a863f4f9be4d53fcfc2cea2462d2b5bb0566fbfee55c722c01caec7386,2025-03-06T15:43:34.153000 CVE-2024-29640,0,0,65d6530699a7099d302e2fbf8d4b7ca80d9e1a53023aa40de7aef2cea04c7ef6,2024-11-21T09:08:07.760000 -CVE-2024-29643,0,0,6f69baed483437f2ce6162e294736a093c21a8fb7ea236a465f5f7b2fd3fb315,2025-04-21T14:23:45.950000 +CVE-2024-29643,0,1,902c674243c06094d582b74ce541a466ece0b159a36cfdc507edce24fd5fda33,2025-04-22T15:16:08.917000 CVE-2024-29644,0,0,40fd36286b11a67665c0c1e768c6cae16a7e27cf9dff2d06385cdeeab4901261,2025-03-24T16:15:18.193000 CVE-2024-29645,0,0,73d798b604d7483a3c4ec922abe2eb5e4bc5fe813f77a3e0d68ccd7367a2b94f,2025-03-13T16:15:18.670000 CVE-2024-29646,0,0,eb8af73bea0df40f2bca567fbb3142009d4b42ca68ce28f98a67d8f285123231,2024-12-18T16:15:12.513000 @@ -260476,7 +260476,7 @@ CVE-2024-34726,0,0,bdf1c10bad500e5f1e09d27cd2da23e006e09b1ecb18278113f96b8780dfa CVE-2024-34727,0,0,5f7942a7e2b76623b7b4bf04afaf0f2c498083f53ca50d98ca06d42cf8c7436f,2025-03-19T16:15:25.187000 CVE-2024-34729,0,0,a9c60c9154b250ad0ad8fb09f024d8d1b9a123940a86c93e901bc505dc2f9470,2024-12-17T19:39:04.070000 CVE-2024-3473,0,0,635984728ea9670d6b9cfdf6ab19079fff83892dfbc983db637b3e272784b4e4,2024-11-21T09:29:40.730000 -CVE-2024-34730,0,0,2364b1c2e19c35bd3b5082cd754923ced824e8f2a994f5fc90d303407c244f23,2025-01-22T18:15:18.827000 +CVE-2024-34730,0,1,6b67cdf248bd89d92c96770ff9a6355a9cbfa992ecfbe34caa440d6bd923adb2,2025-04-22T14:32:46.433000 CVE-2024-34731,0,0,dabcba1d59e1f025a63b5ba7e0e668c40ba804a6e53f3f2f1868cf15359d53cd,2024-12-17T18:12:43.217000 CVE-2024-34732,0,0,1aa672530668c42431606c411b7d1dfffb8ade85062e53693f7a470fac63d036,2025-01-28T21:15:16.583000 CVE-2024-34733,0,0,2fe660e769266b1fa5c93008fb27cabdb2d210c0d6d20c1e917b4b5a393b099f,2025-01-28T21:15:16.713000 @@ -261995,7 +261995,7 @@ CVE-2024-36683,0,0,be595454ef8171db03a002d73c28446849c4fd224f6bc90a988dfe37de330 CVE-2024-36684,0,0,8fab043b3364ae1eeedff575a1f0cbfbc03fa998f9cc28dd8bada425bf4a8acf,2024-11-21T09:22:32.807000 CVE-2024-3669,0,0,02585285b55d3b22720f479645776af5de87f56059e5af08132b9e0c023c8175,2024-11-21T09:30:08.690000 CVE-2024-36691,0,0,3dfc8ca2b0f56703968ad393c59292478596f8672b0393464c33aed3c63780aa,2024-11-21T09:22:33.040000 -CVE-2024-36694,0,0,0accdcf10e4c7d2d86611b4d7b3e9cf5d8a1cc26189b4435603c3fb110b3ab99,2025-01-23T21:15:14.453000 +CVE-2024-36694,0,1,97e39bbb6c67fa2d3fcd0bc2d169d009680f66af761bc61f98a7f5a4b2e194ab,2025-04-22T15:36:02.527000 CVE-2024-36699,0,0,f519eb157e638490c5e16aa33d3cf222cb0f0828212475d05c477400a1f8b777,2024-06-14T15:15:50.967000 CVE-2024-3670,0,0,011df7aa7dd67fee8fa9e90a9f41b6f2c6e7db6b1976b1ea32e3493be7d0fa3a,2024-11-21T09:30:08.863000 CVE-2024-36702,0,0,11a423e8b76e0ae816b52eb2a97a90ec57ed54a684cfbef050a165eeffd8c59a,2024-11-21T09:22:33.263000 @@ -264761,9 +264761,9 @@ CVE-2024-40068,0,0,3808dd3b26fa52ef2b48d906f6482e6c09edafa2295d41be847cbacb1278d CVE-2024-40069,0,0,5c1386ac1a9f8e1982e37f68b817b04f96ca07f12f6e779bf7d7b70cc5d917d3,2025-04-17T21:15:48.580000 CVE-2024-4007,0,0,3dd9d5c3a9450c96ea7d10f2bffa2679fd00a403615d465b187f095d51be54f6,2024-11-21T09:42:01.227000 CVE-2024-40070,0,0,69dc7c00c65d2e99be2fefdac45b07fd392ad84178e76e86bf231de0c71e63a2,2025-04-17T20:22:16.240000 -CVE-2024-40071,0,0,a387cf1bc730cb8a32cc55bbc8f10a29202d341abef16fb1612d728a46230e43,2025-04-17T20:22:16.240000 -CVE-2024-40072,0,0,fcd4fb0e6c1422e5b0f79d5fb4740b772c421977a1791605bb23ec92d4160593,2025-04-17T20:22:16.240000 -CVE-2024-40073,0,0,f1407f041ce3a2e379aceb8e5b2e56e232d0ba73339c2e5555b4759edfa073c5,2025-04-17T20:22:16.240000 +CVE-2024-40071,0,1,170e7166175471270713565b5d123d971f7fb246742ec4858231582fbfd7d6f2,2025-04-22T15:16:09.087000 +CVE-2024-40072,0,1,ad6e220f90eecf311d5da216efb4aa82077c878bc1a28e7d5b918fa4a1042f8b,2025-04-22T15:16:09.297000 +CVE-2024-40073,0,1,0b6880f3fb26593ad04a3e8c06858e8904450749c438efdd5cc702d012e11935,2025-04-22T15:16:09.490000 CVE-2024-40074,0,0,a62f2091fe1a373966f167b92c2b39878c115b0b70897d55e20a36863c57b66d,2025-04-18T12:15:13.960000 CVE-2024-40075,0,0,696bebca65ab8531e554637eea9876932f9a084e6d9912735f3ae614eec7aa18,2024-12-02T18:15:10.760000 CVE-2024-4008,0,0,fb2d806ef2abb9abf3788fec7ed21d9b3c4b495ec50044c32ac89845e7ebb6d1,2024-11-21T09:42:01.397000 @@ -264863,6 +264863,8 @@ CVE-2024-4044,0,0,01aada30b695e7d560576a60975ec8e82150fda0d77225fe8e43f6b57e0df3 CVE-2024-40441,0,0,9c641a9199d7b49691eb0d0ccc6b07376d4badef46335bcb9698dfcaf7f96c2e,2024-09-26T13:32:55.343000 CVE-2024-40442,0,0,2f4e5d396d491f4f4f7019855f484e167cf80b7edaec8e55b61d220cacfb6bc0,2024-09-26T13:32:55.343000 CVE-2024-40443,0,0,6b2e292f0a4bc06bc5ac32664ca3d52dbbfb1340d75ba0655f0a35cbb69b4b35,2025-04-16T15:06:12.843000 +CVE-2024-40445,1,1,f1e972aae36e5a7546a2a35c5eddda46271cfa0ac20d37cb248c43b309fe8ba5,2025-04-22T14:15:24.173000 +CVE-2024-40446,1,1,4fa9f6d18e4a702acff2c6c787cf8c2dd88752f4db149b18209ac7b5f906fe34,2025-04-22T14:15:24.327000 CVE-2024-4045,0,0,f4ea98769850930c051ddc885b28524cc4af702b69cedf5723780c9f7bd76361,2024-11-21T09:42:05.710000 CVE-2024-40453,0,0,44028ded5df7ca69cdf493f195db9cc0d99fa7bb7b128c31936f66f8a0891140,2024-08-23T17:35:05.463000 CVE-2024-40455,0,0,5878b4f11374ce80d4d41d44d59efbce20daedbc5c85efc7aca55090bd0e4410,2025-03-13T15:15:46.557000 @@ -265019,10 +265021,10 @@ CVE-2024-40670,0,0,865eb4e5a07857fa990b38cb66883e1af0d25fd9eb617b3cf24619f02ce8a CVE-2024-40671,0,0,4520d06fdb2a855ee77cf9a82325fd4ddc6fdfedc3ecf68cb89582eb0d5cc2c7,2024-12-17T19:30:29.457000 CVE-2024-40672,0,0,d3743aadd79960e77effe0a6f9751b92a7870c95b6a5c2283fc8c7d25b6ee06c,2025-04-18T02:14:14.330000 CVE-2024-40673,0,0,986d27c15d8942220d686ac719e54d45fe7da72a19c8de771af715ad9b29e94a,2025-04-18T02:13:10.757000 -CVE-2024-40674,0,0,34d6dd8846341cdae08ba1bc6453f0b0bc5680a43490dc5354d1637c7a7c0e28,2025-02-03T16:15:32.973000 -CVE-2024-40675,0,0,04e239a70c04b5910b2d2c1693de6cb96e1b5881e0804dff78fb6ea8cb9f6564,2025-02-06T16:15:37.277000 -CVE-2024-40676,0,0,bbe6cbf1e09f92df03cc374046e370ae1c79220315e4a4cd9090f0da6c20c19b,2025-02-06T16:15:37.443000 -CVE-2024-40677,0,0,b49f5d92489aa23b1e37f0f95c62b0e8fb7ce2ec46b6e8910bdcac70d8aae7c6,2025-01-28T21:15:17.797000 +CVE-2024-40674,0,1,720e4538d9864c6654df7ff3b06d022d1fee62ea6ac3015193ba5f0fd685bca6,2025-04-22T14:27:35.300000 +CVE-2024-40675,0,1,0bbfd6cd20ba81ad92aecee118de33c3946c26b87bb3a17829e27278c87bbf01,2025-04-22T14:27:40.080000 +CVE-2024-40676,0,1,e5eff3f2436e535e8746671038a26e6229f8b7d37f0a4f32ca2184061f0d8a62,2025-04-22T14:27:53.403000 +CVE-2024-40677,0,1,a633d69d12f614552f5d2a5f8d1e618aec3488008940b8b8c08c0341b80255c6,2025-04-22T14:28:04.243000 CVE-2024-40679,0,0,ab37f5e30f32673081958808596357f8a003dc4d5169bfc16913d632a4e3eccc,2025-01-31T17:14:12.627000 CVE-2024-4068,0,0,6064b7191c4bfe6385dfb9559ff0d900f6a3c128ca3c30b46fda682863dc73a3,2024-11-21T09:42:07.710000 CVE-2024-40680,0,0,bd67df4a239df055ff0046ce7193fc2f150970ac8a25905d079ed701abf99ef9,2024-10-31T17:15:12.990000 @@ -265607,9 +265609,9 @@ CVE-2024-41369,0,0,1d5c860be899a76bd59cc0664e4bc948798d6e0c7a0ab88e951a5baff6a33 CVE-2024-41370,0,0,b7cee48e1fa9da27259e715a85e010df1e26ae4d970848e29f465fbc9b4c359c,2024-09-04T16:08:08.497000 CVE-2024-41371,0,0,6836435b9e0ed028a1e45d8c32c0445ea7e5125e766007f02076154993aa9074,2024-09-04T16:08:15.693000 CVE-2024-41372,0,0,befc82be128f47464885dc2541e3b620464d334f79f8887701a36c27d42ea138,2024-09-04T16:08:28.387000 -CVE-2024-41373,0,1,83da052fe744384dcf76d1cef07c86d36e96b81ac7a041d3c14fe55febcc4e66,2025-04-22T13:59:24.697000 -CVE-2024-41374,0,1,777b084bead47e8719234acf077054bc21670ac2616a1702e202a188033eb0ef,2025-04-22T13:59:40.947000 -CVE-2024-41375,0,1,7fc511b84eca078b635b565af2f770611c8d603012b6a0cd644974bf43feba1d,2025-04-22T13:59:54.240000 +CVE-2024-41373,0,0,83da052fe744384dcf76d1cef07c86d36e96b81ac7a041d3c14fe55febcc4e66,2025-04-22T13:59:24.697000 +CVE-2024-41374,0,0,777b084bead47e8719234acf077054bc21670ac2616a1702e202a188033eb0ef,2025-04-22T13:59:40.947000 +CVE-2024-41375,0,0,7fc511b84eca078b635b565af2f770611c8d603012b6a0cd644974bf43feba1d,2025-04-22T13:59:54.240000 CVE-2024-41376,0,0,93a68142e1a4433b876d142a06727fa70420b3e1c4115d5cb6803d64e3523cde,2024-08-06T16:30:24.547000 CVE-2024-4138,0,0,d4631fd754e2feb1de7591be4d67815017981a891ab1e9eee4cbd28f01dd43c1,2024-11-21T09:42:15.500000 CVE-2024-41380,0,0,c91ee5fe749e3ef01fe04ca7e47de96f927a3f244bc8d6d4ebc7a2827921e593,2024-08-07T19:35:09.550000 @@ -266897,8 +266899,8 @@ CVE-2024-4309,0,0,b35331fabc1a76b4b389b8268c3bae8ab7e28bad0ebfdd7a403ab8e34e4191 CVE-2024-43090,0,0,bfb455ba3b27b8e5f909736d7638aa4c244eafab69b7641e19b79e78332f1fbf,2024-12-17T20:43:24.893000 CVE-2024-43091,0,0,18a7813067907079929e1aa7a03c2ea14a6eb858fe26b9c9489160580668468c,2024-12-17T20:35:58.717000 CVE-2024-43093,0,0,3f092629a0cce74f6f59bab52d6247e2ce3f3aaa2972aab5920268e0f2acfa91,2024-11-14T21:42:34.923000 -CVE-2024-43095,0,0,d3f123b759b43b94783fabaff89bd745c360a4e68de62aee43d34e520e8ba346,2025-01-22T18:15:19.013000 -CVE-2024-43096,0,0,6148513943abcc2e17f60ce5baa8bbca1d47566e48171bca3387211d49398e02,2025-03-19T14:15:36.567000 +CVE-2024-43095,0,1,371f325042a4b2f17d7e347c578f14e2042c4985e0c640af29866ca980b00a67,2025-04-22T14:32:54.713000 +CVE-2024-43096,0,1,ef52488c84355a102d2ab25ae33192cf8d6469cdf2f09441bf5ff4996c44fd0a,2025-04-22T14:33:03.290000 CVE-2024-43097,0,0,004c4d6e0d21742822f66f64708df4b2724897f8929303b830f9e30aebcf9183,2025-01-03T22:15:07.503000 CVE-2024-43098,0,0,e6cfab1a6a9535db9ca658414c0bc9df5fe4048cd784e47787ef38dd04ca751f,2025-02-03T15:15:19.603000 CVE-2024-43099,0,0,7fb5b3a3641a114d0dbda5969491e20e79493c82b2229b8431c4fab73912a211,2024-09-14T11:47:14.677000 @@ -267539,15 +267541,15 @@ CVE-2024-43759,0,0,4270d1c80d4da61f734b4e2d0cec7cefaa5eece74e1d071a8d6c550e1b894 CVE-2024-4376,0,0,dbe4e9d8f2663e8bb2fcb94d44ccb172ebc9983e208169b15baf349baf189407,2025-01-15T17:55:38.783000 CVE-2024-43760,0,0,0699b036c3a09290ea9d3ac93f3f512789df4a5bccdc81b41420a254e04019cc,2024-09-13T17:00:30.440000 CVE-2024-43762,0,0,b8dfe10bc41a54941c91e23f33f7c446be6ae8c1200d07b09e86c0c499c65832,2025-01-03T22:15:07.640000 -CVE-2024-43763,0,0,5fc0aea13a5c27635b964fa8715260e456055530c368ff45c3238134e512d142,2025-03-17T17:15:29.567000 +CVE-2024-43763,0,1,65b98cf9893e7c127eb50b152454b2e1e4e629a4248ab94f807c6f0bdb0724c0,2025-04-22T14:33:13.450000 CVE-2024-43764,0,0,b8a70c9b4bf3da07474f063814c421df50a0a0e7358525550868f9c97beac2b0,2025-01-03T22:15:07.783000 -CVE-2024-43765,0,0,8cf84ea44310579bb0c818dc4d80dbe0989c2ce9c97d8153c88912a96cf20e68,2025-03-18T14:15:39.920000 +CVE-2024-43765,0,1,9b3a1572ae7e3c93abcc7ead9159a41556f4d488b56464aebda81b78d98f5edd,2025-04-22T14:33:28.127000 CVE-2024-43767,0,0,61df9e37f87eb839be7381851ac197e79c037fd5becd27a9b7147888a69a6b55,2025-04-21T17:00:09.550000 CVE-2024-43768,0,0,658dd717296513c1f2a793c3c98ad8e284f6f64eb3cf038201a59757e1f57ef2,2025-04-21T16:59:38.920000 CVE-2024-43769,0,0,4b6f3d713b9f6c38232f6a4fae96538177836acf6848ea99df18e9305b4bf170,2025-04-21T16:59:07.287000 CVE-2024-4377,0,0,9e469d2c6e38c9024d3118d881da3bdecf42eee078f84183253e0517e0cefe8c,2024-11-21T09:42:43.760000 -CVE-2024-43770,0,0,a480769a6cb36653329f0d93b36ee3dbce022630f7513a5de95e28e730a2663a,2025-03-18T15:15:53.527000 -CVE-2024-43771,0,0,df8527e96e574cb8f89cd4efcb816ebaa4b1e906834d3fcb9ea31ec70abe00fe,2025-03-18T14:15:40.117000 +CVE-2024-43770,0,1,1f66d16371c3bfdcea0a5dfff79a0b6d886591dd85db7b4b391803064c367a92,2025-04-22T14:33:37.910000 +CVE-2024-43771,0,1,af269699a1c087b75937332d4d0e5870e776b6f12c09cc2fd4b633ddd533df83,2025-04-22T14:33:48.483000 CVE-2024-43772,0,0,1ec9a5f39a4ef31a76fb428e7b3fe8d8c7cda3e7616b1dfc52864acd3e1bbbdb,2024-09-04T12:11:13.073000 CVE-2024-43773,0,0,2ee2804dd1e6aeea0733948db3d41a2e2f68fd10b6eded825d34c62d3248e740,2024-09-04T12:26:08.270000 CVE-2024-43774,0,0,dc2b3ecb213be315188d094eacf95425288510151e247e800354d794585eef91,2024-09-04T12:26:42.387000 @@ -268201,8 +268203,8 @@ CVE-2024-44717,0,0,28835ef45f8c757da4f84d3e4d46deb3e182087351464cd64123c7754c0c9 CVE-2024-4472,0,0,2d0dd46df0a6e7b4eb0651fee4fc9d375b73198d6bbccb8e20ef63d21d06a787,2024-11-21T09:42:53.583000 CVE-2024-44720,0,0,7d16eba6acf5b6c096ee82be9d3b491d6cf51dcf8fa09b2d931752aca95a1170,2025-03-28T17:12:30.353000 CVE-2024-44721,0,0,db5120d774100e9f74ff1b95f8244b90f8761d80bd6264e397c8b346b6dcd4ae,2025-03-28T17:12:27.743000 -CVE-2024-44724,0,0,37a5c3f901916ac962e30312efd57052975a228832e5b198f09fac4ab5c9c220,2024-09-10T12:09:50.377000 -CVE-2024-44725,0,0,5d03fbf29a09dbf374136b4c807f05b4d0cfa0797b657e998fde915b7e7fe01b,2024-09-10T12:09:50.377000 +CVE-2024-44724,0,1,7c462db005f4e22c9eb1b633a9e14129af90a41c65fed17d04699d164ca65fce,2025-04-22T14:09:05.767000 +CVE-2024-44725,0,1,3738b62b6142cdcafed5cbe9b52b367dabec78520689568ca85f2f96fa6f892e,2025-04-22T14:08:25.380000 CVE-2024-44727,0,0,992840f3b5ba93b49e710d4d2c703c837890dd4ff56786a9bf7956d09cad2a4d,2024-09-06T13:15:09.567000 CVE-2024-44728,0,0,57fd3c325a301508d2251a388be054758349c86a2fd38ccf04df83982cbd5399,2024-09-06T13:23:23.743000 CVE-2024-44729,0,0,d3a63942c8155b311f7bb4226c5a577ade71dc0cab4804bf2056b024fe3c1d32,2024-10-16T19:35:07.543000 @@ -268255,8 +268257,8 @@ CVE-2024-44821,0,0,d21cb9f63a0a58ad7bf9377326ed3ee21fd747bd0a1ba5749d3966acbf2bd CVE-2024-44825,0,0,039b828b1e9a42081d23a81e6d1ee2014868d798b4a5152650f7fa5c02133f24,2024-09-26T16:35:23.717000 CVE-2024-4483,0,0,a55a3b2cc06753411045c8b7d716cded925104b5b68a44935bafd4b74de2139d,2024-11-21T09:42:55.060000 CVE-2024-44837,0,0,d99be13bd28102fab04d2436e2423a9abe7e5510be44a84cf457d3b46476bfa0,2024-09-12T16:17:57.797000 -CVE-2024-44838,0,0,8ef70988103e51dc4546d04ed45c1f4523ec2ff5adb03a98be12a06de591d2b3,2024-09-09T14:35:06.773000 -CVE-2024-44839,0,0,f484f46ed8cccf0d4010714c14a09a3b376ab6c06f631b960d58be1ad1af6b56,2024-09-09T15:35:10.797000 +CVE-2024-44838,0,1,9093e17cf998d701a84ce478930b56745dc53c30e5c24288b738f85259303dbe,2025-04-22T14:04:24.433000 +CVE-2024-44839,0,1,33d150fc27b9ef149e93cbc27429d77af0da7d079044cf380a62d22825038bbf,2025-04-22T14:03:59.667000 CVE-2024-4484,0,0,e9d9ab7a181084a2609fc26ec989da9dcf4a22d48b5c7405b3d8209db6a264e7,2025-01-29T18:26:19.747000 CVE-2024-44843,0,0,cda71abfe685303eda8c4dff547c050f57170488e9976596e6cefbb516c76492,2025-04-16T19:15:52.177000 CVE-2024-44844,0,0,543b67798b80c9f433394b5371f67242f69c06e81a35f5031e65aa2bc37f2c80,2024-09-11T16:24:51.660000 @@ -269031,7 +269033,7 @@ CVE-2024-45767,0,0,7c5b48c8e706e6c8ae501761d8be0d401e1b87d8e52b758c1a580381e866a CVE-2024-45769,0,0,b04be771ec22a94fd636520cce7793ef84bf69518cc6b17c7f3bae1b59effde1,2024-11-12T18:15:35.427000 CVE-2024-4577,0,0,d0fa159b4741afb83a3b240f8c8a3f769329bb7a38feb781505372c4d7939d09,2025-03-28T15:12:44.513000 CVE-2024-45770,0,0,267f93e21ecc31e4fc632c3f76596fa0f17b118159b4949d285e04a4fd4cf0a5,2024-11-12T18:15:35.643000 -CVE-2024-45771,0,0,71725de488b78840f0fb525a7784cf9a1882318f6f42e457f08747f907fcee03,2024-09-09T15:35:11.567000 +CVE-2024-45771,0,1,b93737a6b761d16fb95931af4e6fe4a3be174ae05d21a2819b214d9b3898ae4c,2025-04-22T14:03:43.640000 CVE-2024-45772,0,0,749d9c0457e8d2cebf6e758f71d81f70d7548cb8ba90f16f72c767b31006b29b,2024-12-12T17:15:10.457000 CVE-2024-45773,0,0,fa133c6be41b30498db96f8cc8924c7e28e5e1652411403fbf684ea7526e1df8,2024-09-30T12:45:57.823000 CVE-2024-45774,0,0,0f073f588f71078dc679e01261e0d33f3593000f90e73943a466ec500a25e59b,2025-03-05T21:15:18.897000 @@ -269372,6 +269374,7 @@ CVE-2024-4654,0,0,3ba1a7fb0c9b6d7f54909c48e7df48bad4f328f4a19665a74071d60aed80ba CVE-2024-46540,0,0,5c4d8363d4bde694b44e99e56f90b2898aba08a12423dcef920dec1f4e57f71e,2024-10-04T13:51:25.567000 CVE-2024-46542,0,0,2f841a9877ebc0112f187af65596acc00891c149fd8d436bb90a8a1d424c4377,2024-12-30T18:15:09.557000 CVE-2024-46544,0,0,18fdd73b046b2ee0cd6f9e6a9d70043cfeda335681c354a0d0e609ab48ccce27,2024-11-21T09:38:43.193000 +CVE-2024-46546,1,1,867e5250a9da649a61261742a4ccd85cf4d555abd10f265896539337e94b291a,2025-04-22T15:16:09.687000 CVE-2024-46547,0,0,86eb89be00821f13d31344ba6fcc2c24d55708d9a9aae2e9fadfe4852acc82dd,2024-12-11T16:15:11.573000 CVE-2024-46548,0,0,ecfe181e9afdc259eed5f8be096dc10a92316fd358c5fa43e082d2e50cbd68ce,2024-10-04T13:51:25.567000 CVE-2024-46549,0,0,edbf216bf879ba7c923eff6c52eb6ed795f85072ffbfcbf3b9300da192237ee6,2024-10-04T13:51:25.567000 @@ -271779,22 +271782,22 @@ CVE-2024-49708,0,0,b45628aad7e96d8cdfed857ad91cd37098285133628f4a3432113eea8c19b CVE-2024-49709,0,0,5e61288f2d29ec31dab9220e7c255dc96f7d51d8eb3e0d69cdba42a02908a0fb,2025-04-15T18:39:27.967000 CVE-2024-4971,0,0,17f65e33f654be41e85b2c190603b91b92e7c1a1f8fa7f8e99556cdd76507595,2025-01-08T19:28:26.847000 CVE-2024-4972,0,0,43bdd225cdcbd9a9a4620ce805328bc918966049d5b1be691ed85664aa743f88,2025-02-18T18:38:56.967000 -CVE-2024-49724,0,0,c67ba19054c8f7b8ced478f50645ef7f59b3b8537699018456a2a0c0620bb7c1,2025-03-24T18:15:19.873000 +CVE-2024-49724,0,1,b8e57642014a3f46707d4529ac6ebe3613c177659f247ebe47690d79326a3322,2025-04-22T14:38:27.650000 CVE-2024-4973,0,0,0d4a4429ac22c60db3636e78dd6a1ce25bfdc7c23bbdbae2543d4549b2092bfc,2025-02-18T18:41:10.670000 -CVE-2024-49732,0,0,a72ee80d02cecf1d0662f27703176703f2f9cf0c83bcccaadb5a39697fe99293,2025-03-13T21:15:42.357000 -CVE-2024-49733,0,0,6f4e6fe96d83f793d9ceea564ae8432b5daad79305bc85835ea27832af44068d,2025-03-25T14:15:26.410000 -CVE-2024-49734,0,0,0b5e2c86d20d1ab774540826c3c321a67fcff72b31571afcb6098e09d5b11c12,2025-03-24T17:15:19.163000 -CVE-2024-49735,0,0,95faec060a3277a4d17d4e61b60b58f39fb88b381f6196420fdd3e7e04b71c91,2025-03-19T21:15:36.973000 -CVE-2024-49736,0,0,be3504ad2c18768d22b116b61e859229e3dd92eaebf6790738a5caf9b1bf3668,2025-03-24T16:15:19.087000 -CVE-2024-49737,0,0,400090b87bc6da5ebfb3094cec4a2666fe01d5179868b8de6c893b3512f1cd21,2025-03-18T15:15:55.933000 -CVE-2024-49738,0,0,c7d2f8eac3a8838ac0975f020915e6313d78bf059d0243bdfb1fa36272123c6b,2025-03-19T15:15:51.480000 +CVE-2024-49732,0,1,c2a90a21fa1bd7c2faa4a4ce6f6423b11aa0bde92f2daa838e00935afc97f2c7,2025-04-22T14:38:50.980000 +CVE-2024-49733,0,1,90a2a29e7f257759e16588bf9a3523c079c133a929517b7a67b6333638368509,2025-04-22T14:39:04.533000 +CVE-2024-49734,0,1,9785518a4215ad7ee04e03e15aa780e80320b2b6fcded6455bb6f36783fb6b47,2025-04-22T14:39:15.560000 +CVE-2024-49735,0,1,6d8cc27eead185918e107498ab6f74ce09094c201d39f717309cb31df5e2178a,2025-04-22T14:39:30.223000 +CVE-2024-49736,0,1,13187b4dfb24b7dba8e831276f81a1eb03e83bf45648581a57e9b8f9d46b46bc,2025-04-22T14:39:39.123000 +CVE-2024-49737,0,1,a9d983378844ac4bbc8612f852d959e71e7aa72ca031ecad4101a1fecbbb4c85,2025-04-22T14:39:48.390000 +CVE-2024-49738,0,1,8e8dceb92946629c58ea8f6ec849857826ac41d7e37b106ce6ac65ee37f43c69,2025-04-22T14:39:56.780000 CVE-2024-4974,0,0,df10473d46dc1c028342cd3968b988b90fadeeaf97ad191b88513417e8f0d1f0,2025-02-18T18:41:36.180000 -CVE-2024-49742,0,0,c348ef0c793413a31d24d9d34796281e683b12d0c10fbe5ce7a009d130cfb74d,2025-03-13T14:15:32.930000 -CVE-2024-49744,0,0,fae71d3bc9f562145b1b96cfb82790e7184751b9aae76fa8161ace9cc78986a5,2025-03-18T19:15:45.477000 -CVE-2024-49745,0,0,75e35304e19e0a20891dcdcb536e3d13dd5dfb86e563507a2ee22908301013bd,2025-01-22T15:15:13.707000 -CVE-2024-49747,0,0,1df59a67e9d64e20f7f91654be722fc4ea567c1f682376330d593926ba0358d0,2025-03-18T15:15:56.117000 -CVE-2024-49748,0,0,5db968fea0c370dd8d29cde43f4aba39c562d9deea8afa473af38a0abff20f52,2025-03-17T16:15:23.360000 -CVE-2024-49749,0,0,61c1bfdf71f59bbbcbfadc4a331d6a95e61b9824206008181543bf216fb20fbc,2025-03-20T15:15:43.360000 +CVE-2024-49742,0,1,ccf8b5143ef114c04d59d6619fbc964b5d929505e5ebc0f60820f131023548b0,2025-04-22T14:40:07.417000 +CVE-2024-49744,0,1,2e40deb55e4080a0e1fd5af9ac3dc2fc6621c0ec108bbb48ed3bd442cc02e374,2025-04-22T14:40:24.940000 +CVE-2024-49745,0,1,74e256fdc3ff25a28948f7d8f34f4560b129a6d6976de5438e09d9c5530473d4,2025-04-22T14:25:49.193000 +CVE-2024-49747,0,1,0d5160211be17529d45cec00105745466839822706de34d40dba0ab401febd22,2025-04-22T14:26:29.657000 +CVE-2024-49748,0,1,7a3d4a07d78622197ce9f80d14986d74cf9e8389792d4aa8dfce6c9c006a4780,2025-04-22T14:26:57.320000 +CVE-2024-49749,0,1,29b16f7f4c951f63a103bebd374fa3ad91f828a04b4fbfb7d1e54e20452d9786,2025-04-22T14:27:20.653000 CVE-2024-4975,0,0,370a0af7d7b761a64b8405da57fee2a1f2952152f7dd6a765f2bb24fa5ec733e,2025-02-18T18:42:21.327000 CVE-2024-49750,0,0,b8c0592657dc23f5dade6581318fd4431bb1aa3486d0f4172a6b42fac1aa50c3,2024-11-06T14:58:19.993000 CVE-2024-49751,0,0,e54ad9c09b257884173f87eb2cadd96ebff747ab0fa50977292d8ff7d11521a3,2024-10-25T12:56:36.827000 @@ -272672,8 +272675,8 @@ CVE-2024-50600,0,0,1f18a87c7801886bd3cde354ace808a7f14db6d1a9a3674ff94ef2cb61a86 CVE-2024-50601,0,0,f1ed1f41be3342c5f62bc0e6c95ce90f7003505883e3692b4481b9f4c5037234,2024-11-12T16:35:22.810000 CVE-2024-50602,0,0,c8679d01dce94350b3e4ccaad0dce0d8f82380fa70421ca1de89b3de391bf339,2025-04-04T23:15:41.537000 CVE-2024-50603,0,0,24fb0be84e47828c5797e34e5928a6606de2ff4bc3a8f0552606a200fb006b94,2025-01-23T20:44:04.367000 -CVE-2024-50608,0,0,51ecf10e9baf01633bbb5e85c324d80569aba0c84ef45dfc95415a77cf18f169,2025-02-19T15:15:13.970000 -CVE-2024-50609,0,0,13a80120c263e02c26f34abc2d26a7abd63cd9ad83e4a9b5fc5a520f4fc3fb3a,2025-02-19T15:15:14.497000 +CVE-2024-50608,0,1,b880197d1db729a4cddf64cc1d5f4a43efc3df1b6ce6e03b016488eafb4f1493,2025-04-22T14:54:16.733000 +CVE-2024-50609,0,1,b71a690a085e5efa650d5cc1e09e3b908799055c2b7eaae27617b48a530a49ed,2025-04-22T14:48:17.650000 CVE-2024-5061,0,0,9654397355be6aedfaab6f6a3d8afb7e3d2327090cc58e5161ccd13e41cf9460,2024-09-03T15:11:56.787000 CVE-2024-50610,0,0,a6949359060222ba84619cd69ce2c024dafba181530f6c2f1bcffd979ed6b752,2024-10-30T19:35:30.033000 CVE-2024-50611,0,0,b9620b3c83eac2420d030761399b3b8b0064775db1dd093c666a92cebb22685a,2024-10-30T19:35:30.853000 @@ -274935,7 +274938,7 @@ CVE-2024-5392,0,0,60fae8c26872cb4f3206eea248f78a49073c92f9c328f863f6f95ac5e2b00f CVE-2024-53920,0,0,049dcb338ee6fd2e9f26f41a9c311fcdc088bdca7a859bd3ebed6425caec675b,2025-03-13T20:15:23.877000 CVE-2024-53921,0,0,80ba8805361036f43b4514262b685ccd25900644ea805da6dca5ed5b14f2db17,2024-12-03T20:15:16.153000 CVE-2024-53923,0,0,555f40f110f5cc9cc3044cd555d315fd962ceb2a9297b9a92037b2bcd868c9b6,2025-01-24T19:15:12.777000 -CVE-2024-53924,0,0,332abe006da4bc265a1e5f58b0ba772cc08253cd3dc0f78a4b83b3ad58153e13,2025-04-17T20:21:05.203000 +CVE-2024-53924,0,1,d6be29eb3c3bbf13f24885b860d2f33468dc32a822e732be53fe53837b324693,2025-04-22T15:16:09.847000 CVE-2024-5393,0,0,cf2a8e70db0836da586f5dd07bdee5c4e317e635fb032229901d1ed28584671f,2025-02-10T16:23:40.037000 CVE-2024-53930,0,0,4c5164466e0edc2dc94be8460bd35fddb8be39646d6d12f4d1b2cb254100683a,2024-11-26T16:15:21.150000 CVE-2024-53931,0,0,66ab4af5c7bf6064acdc11817ab23c4178c3505b9395737ed6c6df4ecd45f67a,2025-01-23T18:15:30.897000 @@ -275568,7 +275571,7 @@ CVE-2024-54764,0,0,7108368b95c8c33cd12f1a88712752ff55f9a1ed7ed83d67f4ddea2a12f4e CVE-2024-54767,0,0,8c4bab4764e9a141ba548ee86cbb68266367c0b9186821635463f547e3a12a49,2025-04-02T14:15:44.820000 CVE-2024-54772,0,0,91a3697268affbf0eb80fdd37decc58bf196ba083d66dc0e72ebb567f63733a6,2025-02-24T16:15:12.213000 CVE-2024-54774,0,0,f4729f792bb626d0ad63a36553265557f43246eb9e15e58f6f629c134348456d,2025-04-21T17:00:56.877000 -CVE-2024-54775,0,0,3fdaf8fe1f78335459cdc17721da7bdc51023f16b45ae3c005b68536d3244569,2024-12-28T17:15:07.733000 +CVE-2024-54775,0,1,03de079a7c10eead9e4af05c09468a6683068e1ea25d6b843a97d0b7fa560373,2025-04-22T15:46:43.310000 CVE-2024-5478,0,0,db0e3beae9848430f36a4effd5045d24657a32915031caa2ccdcaa2667957312,2024-11-21T09:47:45.637000 CVE-2024-5479,0,0,f92bceb83a5a9014c15956c2e58b8be8249c2eaaa0c8984e346563da1cce7cef,2024-11-21T09:47:45.750000 CVE-2024-54790,0,0,48d8bba46ec998a5948fa28582284d921bffdee0d0feadc638247c192c149cb4,2025-03-27T16:30:36.077000 @@ -276137,7 +276140,7 @@ CVE-2024-56159,0,0,d6437f8167288212b0feaa31ad952f4a47211de648a6e462a65c30d1453de CVE-2024-5616,0,0,423edee4a921052dcb3d8ded851b7450a0c7bfa0bf926ae022e11e86747b1818,2024-11-21T09:48:01.540000 CVE-2024-56161,0,0,0d178b949303de8c713ee1a20dc301b7fd5ce9c07af4747a5e53f97976af5874,2025-04-02T22:15:17.963000 CVE-2024-56169,0,0,567a94aa793aa7d8ac0858cf8e15bf66684dbd548103356ddbc53b2c4594c82e,2025-02-10T23:15:15.203000 -CVE-2024-56170,0,0,32611264582c3e86fc6149b20f12d5acbffe58d1028228c5f9baa4ad2faec8d4,2024-12-26T19:15:08.283000 +CVE-2024-56170,0,1,20f53cca351db01f6629ba4ce37d6d02bca926c058919daece7e974f4421e9ea,2025-04-22T15:35:05.487000 CVE-2024-56171,0,0,f6d3110b767b8d3afcd970fbc47d832abca9ca5dd825fdae066e60289081341d,2025-03-28T15:15:46.003000 CVE-2024-56173,0,0,5336dffcdc7d9618ebdef949381efb90ee1b3998a2588e22f737fe5a77849f25,2024-12-18T16:15:15.600000 CVE-2024-56174,0,0,3281f470ed49ef5807bf603f02908731fff1047853105938ff5649e5ffd7e97c,2024-12-18T17:15:15.190000 @@ -276272,11 +276275,11 @@ CVE-2024-56300,0,0,fd8f91c54d7b2d2f0c20bf657c6cc558d46dbec655d8d7ad2230066619d3c CVE-2024-56301,0,0,f46c9c676999b63d81039c9a073e3c1760c3de4da85396c862849172997d41f7,2025-01-13T14:15:09.887000 CVE-2024-56302,0,0,3cc2e63549a8e725e4b4c7af568502951e05c6a235ad3d0ca614770a8ee20a50,2025-01-02T12:15:28.753000 CVE-2024-5631,0,0,1180039d5b51b355c10882902757c5bad7937e7ec31e81b99a019ddedc795440,2024-11-21T09:48:03.210000 -CVE-2024-56310,0,0,81cb9cd8f363d6d459acd5f1bfeec92cede3b03d846b7830ab32877ba7e765a8,2025-03-19T14:15:37.850000 -CVE-2024-56311,0,0,a5f3b806b958921d1fdd47ae934460856fc391070c28ff5582bd271a9abc04fa,2025-03-13T19:15:48.973000 -CVE-2024-56312,0,0,ec6ad9e3aff51a846de9bba86b7c3a52a17ae2fffb31510f4ca2dae81601a513,2025-03-18T15:15:57.893000 -CVE-2024-56313,0,0,1b88794497f6eabc0004fec8ac6a8d185d6145923adb3ec2e2c9ede1c7b79c65,2025-03-18T14:15:40.837000 -CVE-2024-56314,0,0,2ec81e76657f1aae1b2ad4a137a9dbaba36a59900a9638d6a55212d105f32134,2025-03-17T17:15:34.553000 +CVE-2024-56310,0,1,5ee18c92ab90bd80641dd8440a9ea597fae46e6e4eaf8d95d5b39f948f8beba7,2025-04-22T15:37:46.670000 +CVE-2024-56311,0,1,90382a74c2e8e16d0f3f769eba2373ac43fd5e27673435298d01d488fd1023fd,2025-04-22T15:43:27.140000 +CVE-2024-56312,0,1,d17eb700a2d508dc0e283fd1b0bf92999c7500513f22c1767147035e620d8da9,2025-04-22T15:43:32.430000 +CVE-2024-56313,0,1,975ad646cfb35d7bb9788f28a1d7bff74780ef92052eef14263ac0f3a59f5df1,2025-04-22T15:43:40.670000 +CVE-2024-56314,0,1,1d0677157b697ab894f6f390ec174f0ca433b7dc236d3cfe87184940a6e65595,2025-04-22T15:43:45.323000 CVE-2024-56316,0,0,cbe94587bc0fb5b8589f39655433a6e6725350771ffdee3bdca651a1d62b333a,2025-01-28T20:15:51.320000 CVE-2024-56317,0,0,8d6cb761ec1de8db3f8894652188d82bc1e600feec839db7f7746cdf2c5b129d,2025-01-02T20:16:06.723000 CVE-2024-56318,0,0,4614542827deff1ff7fc917535aa016ec46ffc813ff98610f6d274ec4b4e2e50,2025-01-02T20:16:06.917000 @@ -276333,7 +276336,7 @@ CVE-2024-5637,0,0,a5e32b0dfdcc3b00fa1c534a6efa8caef39b80f083f1c956c246ad8a83c6df CVE-2024-56370,0,0,64814417007881b32dae98a1a224beb7cfa2766c91befe86144583f2dc1808a5,2025-04-14T18:15:28.220000 CVE-2024-56372,0,0,90a1aabf121e4966bb6f781ef40b9ea4a8ff306749512dfc68df7e160a9b150b,2025-01-11T13:15:28.873000 CVE-2024-56374,0,0,91d6bf2640ab08f01eee0fcea596536908a920126e7285157c89b5a637fa554c,2025-01-23T18:15:32.820000 -CVE-2024-56375,0,0,1aeae50409e14309fb31af7dcf320eae7189e473177b68d63698866c2c62cd0b,2024-12-26T06:15:06.203000 +CVE-2024-56375,0,1,c7cceb8006d085eb4eac143948dc59062b9b8c3c369178aebcc34ce682f9b547,2025-04-22T15:54:43.887000 CVE-2024-56376,0,0,ec7afa265cfcfc2f0a337b9197d5ce2d94544a812119725f7a9fa6214b034f65,2025-01-16T21:10:10.170000 CVE-2024-56377,0,0,03aa288e6093633ce306b370432fa6bb1ec9d8f7ab6fce395565e9fb72d46471,2025-01-16T21:10:25.790000 CVE-2024-56378,0,0,fab67c7f7143f85c88660814de01440f680c12a24f807e1e2e38a3d85020bb03,2024-12-26T20:15:23.270000 @@ -276420,7 +276423,7 @@ CVE-2024-56514,0,0,03c513636a790023028c6faa50589cc350b03d2dba1eb97ec6199430a6c46 CVE-2024-56515,0,0,4a07e3e4d2a1308e0588ce8b7f05a8f9d332299ec2e52c6ef14eab15d40c8073,2025-01-16T20:15:33.197000 CVE-2024-56516,0,0,deb0078fb48b30046dee2e7c49991c12c9c4ce85a49510afdbad84b1e34b7c18,2024-12-30T17:15:09.687000 CVE-2024-56517,0,0,ebc4a8439ab89dec6c01da536e2da46e01c5afa35edd8eda7900d77b4b428d40,2024-12-30T17:15:09.840000 -CVE-2024-56518,0,0,2ca238cff9f1d1df49bc87224ad0d9218f578418780d9162efdb3ab23202ddb4,2025-04-17T20:21:48.243000 +CVE-2024-56518,0,1,d51ec806e31187682b74aa0037afbc95c56308e74df53adfb98a80dedbab21a4,2025-04-22T15:16:10.023000 CVE-2024-56519,0,0,9dbbee3ea936a250bcc973a508865de7eb896aac5f0d96eab4ea39c02c987769,2025-04-21T15:24:52.297000 CVE-2024-5652,0,0,da5e0aba357bd8fa7b5b0e931bc848bd0b9a30a1c28d30b4f779d7d557418851,2025-03-19T16:15:28.967000 CVE-2024-56520,0,0,ff4fb3d2adb6c71c503d044fa0b3b3389f24638650ec092efa0e72e1ef66ddd5,2025-01-02T20:16:07.280000 @@ -276750,7 +276753,7 @@ CVE-2024-56908,0,0,bbe0040508ad69151e90ab47c62a14618486e1b0815c01e094680be9e1e71 CVE-2024-5691,0,0,9505e4d65453e2558c96eeea1a67c071cea95e3c90b63f8d9e952db5959b044b,2025-03-19T21:15:37.710000 CVE-2024-56914,0,0,76cdd8d94ae11c2780ca41310bed1eae7879520cc428bb077f1f775e8c7b9036,2025-01-23T17:15:16.230000 CVE-2024-5692,0,0,7a0e93b4132c5556301f236baef387bd61eb187dcc76da3b0d3022ff1bfb1690,2025-03-27T20:07:17.167000 -CVE-2024-56921,0,0,4d71c9f9a12e1fc823778ed6ea679f8c9cb127996829cb8f6be70dc1f81fc40b,2025-03-22T14:15:15.787000 +CVE-2024-56921,0,1,65e4ee21eb8e6911078997661eaf48bf52901c948266f74aa9bcc9e4df1037c6,2025-04-22T14:58:46.420000 CVE-2024-56923,0,0,e2647403e0cf85e5fccf746b53a51e00d5aac61312608ca59ffcd83f3ff65dd9,2025-01-28T23:15:08.067000 CVE-2024-56924,0,0,255fb5d959e1f1b6d9220b28e96e646f40e846b04df600718295ece436269b5a,2025-01-23T17:15:16.710000 CVE-2024-5693,0,0,1d12910190fc65b94183c50b33ecc0f30f62a8f9021d779dc1e8f157aac98880,2025-03-27T20:02:24.947000 @@ -276967,9 +276970,9 @@ CVE-2024-57429,0,0,297eba09be9a31d8bb32c44b886b7969c1338623d7293e3f2a83e9f444bf0 CVE-2024-5743,0,0,8df1bf94ad8183aa6e1d1e737442c566d99a7f0b2a8ad07fdc7acab75f5a831f,2025-01-13T18:15:19.517000 CVE-2024-57430,0,0,63a6a1ac0822bad0ab26c02299c744fb745170f033551fdbc088f42c0259357b,2025-02-06T22:15:39.493000 CVE-2024-57432,0,0,380d211416623b84511e89447189d47b0683a0b0ccc670e5ff43709b349e197a,2025-03-13T14:15:34.393000 -CVE-2024-57433,0,0,b091819444f61817a6c1132debb1b85d4dfb565b67e7cda9bab62bb3e1fa30f6,2025-03-18T19:15:46.680000 -CVE-2024-57434,0,0,4cb782d653dc97e32efd3c538fcda0d8ae1d5de2464c175da5ed00584e2c5b3b,2025-02-03T21:15:14.600000 -CVE-2024-57435,0,0,134ca1f67bc68a11fbb69f0a724e0c3096b5963737c85b95313876fa3bad9ab7,2025-02-03T21:15:14.747000 +CVE-2024-57433,0,1,6410b406a0e0b152007902343f9fefbfa962b28d3b64850e594a5feb9fbf15e9,2025-04-22T15:32:09.543000 +CVE-2024-57434,0,1,4244b330e3a1885db4ab6f35e89cd62516d8c5c96589e07e344c7d548e1386e0,2025-04-22T15:29:06.090000 +CVE-2024-57435,0,1,2acd4a8fc6f5826cbdaa6cabaeed115c0920df9e4a3bbb6918530cb8753b9cc1,2025-04-22T15:27:10.410000 CVE-2024-57436,0,0,3d5f7a7afcf99c6d025cec3b59922304e5389dbde8d31acf382e0c8e658f02d2,2025-01-29T17:15:28.480000 CVE-2024-57437,0,0,55a481f741905a7b3529d8872203a5e96d5aa22ae442a522f6171609f0f649aa,2025-02-05T17:15:22.003000 CVE-2024-57438,0,0,292c153a266ebc62026bffb3e4c8820913e5e3d5c932130e53e50995b3f3b186,2025-02-06T16:15:40.660000 @@ -276993,7 +276996,7 @@ CVE-2024-57488,0,0,a6a8d84b525a0dc3d26ba5e4142d4fd29a34b96ea53e5fe7f7129f2be99bd CVE-2024-5749,0,0,36203d1040051e343d9d050a3c2e3f863a807627eb7d14e1470ca394531f4751,2024-10-16T16:38:43.170000 CVE-2024-57490,0,0,08cbee17964c266f01c15da6cb7fae39dade378b6389b62c9304e6305b5f2be6,2025-04-01T20:23:36.507000 CVE-2024-57492,0,0,d7bcfeae2f67d1dbdc17178fdc85652c1f2aae11bdc8f61b17ed6ececfef47dd,2025-03-24T18:58:00.923000 -CVE-2024-57493,0,0,52f9dc52934f01fec886f63732061be5de5c285aad563f1002793ae4725c46dc,2025-04-21T14:23:45.950000 +CVE-2024-57493,0,1,281144ea2b9ee03e20d71f965d381577551fee08c808915c54780fe5150b973c,2025-04-22T14:15:24.613000 CVE-2024-57498,0,0,3826c405fd29f665f0ad91bf9f453f7e5685abcd0e2ddebcfe40540a3c6b47f2,2025-02-04T20:15:49.423000 CVE-2024-5750,0,0,476ad6c00a3180d456740d0beb63c2959ea56c746a3fc254c90c1eef52867b01,2024-06-18T14:15:11.383000 CVE-2024-57509,0,0,c607c9da29bfb31a3cf0e4d4a7622a993cd72daf6b5f7b6cf0694edfad6158b9,2025-01-31T21:15:11.630000 @@ -277007,17 +277010,17 @@ CVE-2024-57520,0,0,b3f90fb26fb200b53ae4777fd3baed004f17dd559e6923e11bec593e0ff82 CVE-2024-57522,0,0,2b5ea53cc9f03dcd4176381c6af58429fd53941037b5107dcc3f71ab8ffc5853,2025-02-03T19:15:13.513000 CVE-2024-57523,0,0,c2aa16623249298cf2dcaf2abefca3317fb5f857f267cf74a214519dd70a3913,2025-02-06T20:15:40.050000 CVE-2024-5753,0,0,35e5857965ec4fb8ff4da87da0ad57743fc77f757356d105b68f8e07a9b9291a,2024-11-21T09:48:16.923000 -CVE-2024-57536,0,0,02e8c7373d9548e0be6ef2dd6f50d54d1dae50f3849a42bda8fca1e700f8b5b0,2025-01-22T21:15:10.100000 -CVE-2024-57537,0,0,7a57264ee99ea2cf07d8beff99c09ac577ded2e5e2c43aa0cae71e5949ab6ad2,2025-01-22T21:15:10.287000 -CVE-2024-57538,0,0,264c3f3e932919fe606b2937b3d87e9b80deee70cb4c78e0ad770d4314f6bbd0,2025-02-04T16:15:40.017000 -CVE-2024-57539,0,0,54d02e8762f98e37972371ee375b01c6507850d549c84e61792562ada531e3bd,2025-02-04T16:15:40.180000 +CVE-2024-57536,0,1,691bbe45b6c8dec1b3fb6ba4e32723d879ed3feb0eb9208588f95b190d231a22,2025-04-22T14:11:56.087000 +CVE-2024-57537,0,1,2907e2eda64c6ec8a608ebd4f389b1d60cc8d7e07d9c5be63960d897e0e4a121,2025-04-22T14:11:50.577000 +CVE-2024-57538,0,1,e0633d52dcc58a207e179c5daac1ec483eaa0e6e9b454926ed269448b599669d,2025-04-22T14:11:47.103000 +CVE-2024-57539,0,1,851944d9ca70b9b1608ca9caf64bb4e6e5df5f51851a2e7d49ceb70ff38d7e8f,2025-04-22T14:11:43.080000 CVE-2024-5754,0,0,f2c4f40343fb16d68e3a72c7a389800b829b93f31dea5ecdb29b9f34a3018f5d,2024-09-19T01:44:29.550000 -CVE-2024-57540,0,0,f0dad62ad37b9e1ea5d81c55e64b877cc4aaf0f0ee515c7fd104eaa86508b64a,2025-02-04T16:15:40.340000 -CVE-2024-57541,0,0,dd2049b57cd1989e6fcbdb2380ed3e62d7ed6520c2b79fda0eef8f38c76fb1b0,2025-01-22T21:15:10.453000 -CVE-2024-57542,0,0,9f4f21ed016285b89d83a6c564ff71907e5abf82e51bb01bf73b7d294ec7a6a8,2025-01-22T21:15:10.630000 -CVE-2024-57543,0,0,898d6f8a88c778c4280c4ecff7f0698ccecae47925ad74f2985898b4ac306118,2025-01-22T21:15:10.837000 -CVE-2024-57544,0,0,0d7692301f68e1a54af26539095dbcdd0b4efd46060b39551d96338252e7c0b8,2025-01-22T22:15:09.613000 -CVE-2024-57545,0,0,920e5d8c212074216a1e84000536dbfa8a4a938f249df8348a02d6e14021f484,2025-01-22T22:15:09.790000 +CVE-2024-57540,0,1,a5647128a95e3d73fc3e197c61c080132846af3af9cd83a2cae26fabb647b8d9,2025-04-22T14:11:39.350000 +CVE-2024-57541,0,1,91f84914e2537797b73d17ceb765d73a7abf049877810b25f7da2d6b24674577,2025-04-22T14:11:35.027000 +CVE-2024-57542,0,1,35d0b26c64bad9aa360d7b7bcbb20f7975a1eec1d360dda7c663e7852e375648,2025-04-22T14:11:31.513000 +CVE-2024-57543,0,1,6526502688aa329f2e9059eaf34589492567f840ac9b57128ef383251aba1520,2025-04-22T14:11:27.543000 +CVE-2024-57544,0,1,4e63f802016f36221be0d57d77dcb0b5b18b2f4f519404cad3312d8afbaddb44,2025-04-22T14:11:20.973000 +CVE-2024-57545,0,1,6e98f4c8336ea42b0b6488d2095f3c96bca949aa09bd7ff705ab7d4c0435a300,2025-04-22T14:11:13.730000 CVE-2024-57546,0,0,f51266d81347ef919bc78c6d7bd086e8ae34aa6ed1aa46ca60b2c6d259c25cea,2025-04-16T15:14:58.010000 CVE-2024-57547,0,0,8a6f220f5442d36379fa6287484d8c28cdbb6d2df21338d63915739665ff92d1,2025-04-11T19:09:56.007000 CVE-2024-57548,0,0,e198541f9320f3d78dbba5d35fcf2bf6e52664e87bbc197937815705861cd0e7,2025-04-11T19:06:19.687000 @@ -279430,7 +279433,7 @@ CVE-2024-7912,0,0,3c8ee10e9bca8d99f1b2d8bac1aee019b8c714209a36526f69e02668a04c79 CVE-2024-7913,0,0,4516c2c60d1745d54e8e16f596fe48b736d62d09be0fa2cc53f0796d06871dc0,2024-08-19T16:14:30.670000 CVE-2024-7914,0,0,314e3b4552148224bd7e0a883dd4251a63a16d4fc68c5debf684e47ae5c024ff,2024-08-19T16:12:51.837000 CVE-2024-7915,0,0,46332b99219307d18f77e826159c6af489a9288fd9b62af9a29c15b7d3359bb2,2024-11-25T18:15:14.530000 -CVE-2024-7916,0,0,9c297b51578f4de4a0e28332410bab9ab1993bb9b87c6dfdba885ad904c7b90b,2024-08-20T19:38:11.163000 +CVE-2024-7916,0,1,0b07d72c65436c1bdde466b3e922b9fe57f69510e38605d8824d6a00eee1ce42,2025-04-22T15:57:26.610000 CVE-2024-7917,0,0,46878e9f2743ac6b14eaae654c120213f305954712489a9b630a6245ab75d46b,2024-08-21T12:30:34.283000 CVE-2024-7918,0,0,1570277cab82eb1f40f2f8ae2cf3b87309fd8e9d38e55bf9f2d489a64cb7cdda,2024-10-07T16:56:28.940000 CVE-2024-7919,0,0,55964715d18f97bb66b7ea8d15ea9723741655f8a9906a5f533f141c2c198f5d,2024-08-21T12:30:01.187000 @@ -279690,15 +279693,15 @@ CVE-2024-8198,0,0,065f08af9cbfb73a05c97004831e0d17712c27c69b30d9180f5e5bba873bac CVE-2024-8199,0,0,c3b4b3b8504dfb976a447275acd6651d7875912c233624301ebfc006e33177d8,2024-08-30T15:04:28.803000 CVE-2024-8200,0,0,af8a94b4fddc54d7fa057bead6f22d020336f3ae65cc9e9466d46d840a1640c9,2024-08-30T15:08:24.643000 CVE-2024-8207,0,0,032f6b6a56b678b064ca23de39d9deadccf577eff2b0fd82d353405b750913d6,2024-08-30T13:07:46.613000 -CVE-2024-8208,0,0,10ee34e9119a7e0093b031925552e9be855250e580ea73d21935bce23d6a3b15,2024-08-29T17:27:02.397000 -CVE-2024-8209,0,0,4c9fa6f7eada6f4f38e2454ffbd2ea28e3908c2702716c18921882d7307467b3,2024-08-29T17:23:42.873000 +CVE-2024-8208,0,1,8d4946d87c398244d905fd845e11eaa7400018cc297becf6335fb47208d38225,2025-04-22T15:55:57.023000 +CVE-2024-8209,0,1,edc374f8b8b8e66f59d43887e08a9bb859db2dcbbdfdb6f65e2022551e0226eb,2025-04-22T15:56:37.080000 CVE-2024-8210,0,0,e2a7a0d1933d44cff68bc6a03df9a042e85385823e4385dbba1802c0291405db,2024-08-29T16:04:45.310000 CVE-2024-8211,0,0,cd5d8cf90a46274f618f6c7fc49ce5ca29c5040f7b6f7ea51e9586de25be8b62,2024-08-29T15:54:56.390000 CVE-2024-8212,0,0,983fa3124415b6828e2115930d1dff8c67d66db135e607f09c1eed609c47fd31,2024-08-29T15:53:02.077000 CVE-2024-8213,0,0,2a6489a12867671464d11aa0d776caf709ddf51abf91e21ccbea2d0618844a02,2024-08-29T15:51:33.390000 CVE-2024-8214,0,0,6751562fdf201493a5bbb7d5409d4522ef85795463c8f03bb796769ca7bd2e03,2024-08-29T15:44:45.280000 CVE-2024-8215,0,0,37a26c1b35e9bc1489658b27295d084c327e78c4623b8a32cfa7b592866236e6,2024-10-16T17:58:52.013000 -CVE-2024-8216,0,0,94e52ce9c07f0bcc6422035f6aa46b5e28d82563ff273d5c6ee16aac1b684830,2024-08-29T15:41:34.107000 +CVE-2024-8216,0,1,ae5d153e5cdc496940cfd4dd124ea7f23bbcad7d233f6bdd764fed9e8fc8bc7f,2025-04-22T15:56:56.470000 CVE-2024-8217,0,0,c9035576c675f2c51349a0c6db042fe71466f0b9b0db664be47403a36298c602,2024-08-29T15:39:43.643000 CVE-2024-8218,0,0,25bc4daac7c78bd5d5fe36238e408ddc51aa7b51118b26dad68ef72835af602e,2024-08-29T15:38:10.610000 CVE-2024-8219,0,0,38d5a7a174410d8ce42b382c1fed21fd835c967bebd83292deb809624cb5a99f,2024-08-29T15:35:28 @@ -281974,8 +281977,8 @@ CVE-2025-0944,0,0,d13b662667ebb11ccdf7df575aebea999f2f98df20cada3f9e187be25fb4f5 CVE-2025-0945,0,0,1a59820c4935e2d16009f5e71afda284dd2c717c729eccad6a055d3b163de706,2025-02-07T14:00:06.057000 CVE-2025-0946,0,0,0909da595a5f7f4c6f8342196a1226325f0a4b16120f2f3f79bac8b6ed6b816a,2025-02-07T13:53:05.147000 CVE-2025-0947,0,0,54992aef26727e095f19651dace58e0751a58da1d32b3005bb44e21372f29d6d,2025-02-01T17:15:08.207000 -CVE-2025-0948,0,0,b5575b5a39429b8bf246ca397f78c95557f4d74f40df009d22d23df86b4cc0f2,2025-02-03T18:15:41.580000 -CVE-2025-0949,0,0,d331677ba33a330f8c417f7e3ba725995ba37050cef15a9be9acfada2691a921,2025-02-03T18:15:41.727000 +CVE-2025-0948,0,1,7f405bbc1361281cdfdad0f29456534d576683697cb1761f98072ac6c878e742,2025-04-22T15:19:14.103000 +CVE-2025-0949,0,1,30d8793eb412d125f772cfbe87d01d673f6978d7e4f95573ff4edac2d69febe5,2025-04-22T15:12:43.517000 CVE-2025-0950,0,0,8db8561851676f328945b202b93b7d68ad38ab5f2f11455359e6720cd2611076,2025-04-18T02:05:44.110000 CVE-2025-0952,0,0,95e678d466c59370b1c485ab0db60bbd8e952fbf321c245c53fe936eabbc05c2,2025-03-14T06:15:24.683000 CVE-2025-0953,0,0,f2229571946d9750f38a8eb3cdb09afa35d6d6f6bb4b78d5ff1a0cc3662b0649,2025-03-05T21:34:18.653000 @@ -282694,6 +282697,8 @@ CVE-2025-1945,0,0,e75968144da97cf2313873c290abf618c508b1b9324a1cbe8ce723766acce3 CVE-2025-1946,0,0,25b5b8ea2ed00f65cfbf2fb57d2f7790b7c60f3c475c46923e654a729da72363,2025-03-04T19:15:37.583000 CVE-2025-1947,0,0,c93c63c6c02c21bf1500c6259ec75111daf7c25f75d402b9c87402b2d8cf463e,2025-03-04T19:15:37.760000 CVE-2025-1949,0,0,a5d6f04ba5dd72f47050611b0d11a784085f9d08ba3d9a07dc23d3d9e20a1224,2025-03-04T20:15:37.410000 +CVE-2025-1950,1,1,f62038d4451ca98bb9a4aec68f9fb1eca5f4f4cb3a01d3b6ff3e064254c195ee,2025-04-22T15:16:10.187000 +CVE-2025-1951,1,1,bf7c6de10bd5a54024268d58669850bffda285b9cebbb19d20e8270aabf76664,2025-04-22T15:16:10.337000 CVE-2025-1952,0,0,48d11dd9e3c9fde175b7dfbd4bb5191c5d29ff981ae8aba2ed276f3868143917,2025-04-03T13:31:17.857000 CVE-2025-1953,0,0,2c90b159f704d80556f6fbd39c129612beee1a10d98b5c1d8e7852c91636b6e4,2025-03-04T20:15:37.657000 CVE-2025-1954,0,0,c31420522446cbd87e78e89f94bfd090ab61f2c9cdb686294f425c5995d64ad2,2025-03-04T21:15:12.750000 @@ -282881,8 +282886,8 @@ CVE-2025-20621,0,0,060306fc4f84916fe909badb69a5829b34e2103b61fada341bb3713a68cfa CVE-2025-20626,0,0,b1427ec48095de804e13d264589b43c5c43def702cc0cb9ff2afa9edac7de148,2025-03-04T20:41:19.210000 CVE-2025-2063,0,0,038d4246ae8fa0373a417af84af0377292e57baedd6c7ae2e98ea265bc6bb50b,2025-03-07T04:15:10.060000 CVE-2025-20630,0,0,0cb6d1c0b91807d74fd49faca2a027b3e775f1213907ee8f88e4e58cb3b78a59,2025-01-16T19:15:30.110000 -CVE-2025-20631,0,1,5b2fba07e47ce36843c7004eeb870ab142832b090147bfc157fd32f6c894a942,2025-04-22T13:50:41.370000 -CVE-2025-20632,0,1,a816667b4799f614824e4d0cafaed0a0558e5785649ac53bf60354f038786230,2025-04-22T13:50:45.063000 +CVE-2025-20631,0,0,5b2fba07e47ce36843c7004eeb870ab142832b090147bfc157fd32f6c894a942,2025-04-22T13:50:41.370000 +CVE-2025-20632,0,0,a816667b4799f614824e4d0cafaed0a0558e5785649ac53bf60354f038786230,2025-04-22T13:50:45.063000 CVE-2025-20633,0,0,6bb11c096882f0fa2e53be93f073398b5914dda7109516b88148255d86708332,2025-03-18T19:15:47.673000 CVE-2025-20634,0,0,fc3c30b117b6bc8a9d8dd2703312cf2f61010370e7d8111081368f7b9b811b3c,2025-03-18T14:15:41.747000 CVE-2025-20635,0,0,8539c0947a7b8ea603fd19e11d259a5fccf8cdeabef5ef4676784c0a0d03499e,2025-03-13T20:15:25.597000 @@ -282895,17 +282900,17 @@ CVE-2025-20640,0,0,19242b4ab5555d3c296c9d663e46f0f6013cbb3b643a9a42576483affee44 CVE-2025-20641,0,0,8f64d7bdc38a4d4d6ffe4b925ecebf51da87177f825fd96d952c3b788cf66055,2025-02-04T15:22:10.670000 CVE-2025-20642,0,0,110f2bb3fd587df7b20a2739b2ed2dbc64fbe49db6605a51a1b388b3e56f194a,2025-02-04T15:20:21.300000 CVE-2025-20643,0,0,2e2366245f9f5bcad98b9838a1898890ae5530ce7393a7ea521ec6965e892894,2025-02-04T15:19:23.330000 -CVE-2025-20644,0,1,6891d2ed34c96fbe523a857086e9d9178e88c0bd0c03d12a45860ff9b3302b3e,2025-04-22T13:48:09.680000 -CVE-2025-20645,0,1,ea02192384156bea6d492cf503d1641d51e5982e74c6555b153e4a15e7b3d66c,2025-04-22T13:47:27.490000 -CVE-2025-20646,0,1,095105a3f42fba496317c61367a63d3e61e2427d586599ea30a2027dbeb3aad5,2025-04-22T13:47:23.380000 +CVE-2025-20644,0,0,6891d2ed34c96fbe523a857086e9d9178e88c0bd0c03d12a45860ff9b3302b3e,2025-04-22T13:48:09.680000 +CVE-2025-20645,0,0,ea02192384156bea6d492cf503d1641d51e5982e74c6555b153e4a15e7b3d66c,2025-04-22T13:47:27.490000 +CVE-2025-20646,0,0,095105a3f42fba496317c61367a63d3e61e2427d586599ea30a2027dbeb3aad5,2025-04-22T13:47:23.380000 CVE-2025-20647,0,0,0df6fe2f8cc747fa7a78197b8fa2f49a91c5405ae50efe8ab5f050f71cceb944,2025-03-03T15:15:16.880000 -CVE-2025-20648,0,1,b3bb7b4b39fb42b2ec52337051c0e25e3c18c981b82427131a9db6f1f41b1876,2025-04-22T13:46:59.780000 -CVE-2025-20649,0,1,686713b409053d07550128e28b6ca9bc76c7442a1e5562ebadeb28574a2d6433,2025-04-22T13:46:37.947000 +CVE-2025-20648,0,0,b3bb7b4b39fb42b2ec52337051c0e25e3c18c981b82427131a9db6f1f41b1876,2025-04-22T13:46:59.780000 +CVE-2025-20649,0,0,686713b409053d07550128e28b6ca9bc76c7442a1e5562ebadeb28574a2d6433,2025-04-22T13:46:37.947000 CVE-2025-2065,0,0,c289f628ef02afbd68c3c371d103499f2c6444f60c8e676344691e8994ad7bcf,2025-03-07T04:15:10.447000 -CVE-2025-20650,0,1,1d99c24007315ef5d8285b4a025c108433e135a6785829954c93166465f6f267,2025-04-22T13:46:22.380000 -CVE-2025-20651,0,1,534090db0fd7e1c2e74bc5f829814dbaaaed53152bff920520982450e552983b,2025-04-22T13:46:09.310000 -CVE-2025-20652,0,1,48a9a63bce78bb695de7c70ddcab290f8f6799d8f2d07e3eb5ce1f2009b8088c,2025-04-22T13:44:46.517000 -CVE-2025-20653,0,1,3c7540297b30470fd401688bcc91636104d19a00c7bb15c9f39b689f406173c9,2025-04-22T13:43:58.053000 +CVE-2025-20650,0,0,1d99c24007315ef5d8285b4a025c108433e135a6785829954c93166465f6f267,2025-04-22T13:46:22.380000 +CVE-2025-20651,0,0,534090db0fd7e1c2e74bc5f829814dbaaaed53152bff920520982450e552983b,2025-04-22T13:46:09.310000 +CVE-2025-20652,0,0,48a9a63bce78bb695de7c70ddcab290f8f6799d8f2d07e3eb5ce1f2009b8088c,2025-04-22T13:44:46.517000 +CVE-2025-20653,0,0,3c7540297b30470fd401688bcc91636104d19a00c7bb15c9f39b689f406173c9,2025-04-22T13:43:58.053000 CVE-2025-20654,0,0,4c8dfc811e7788417ed93b8b014b8790b2c64351d5337b984a9a00d1a2b8e17d,2025-04-09T15:46:21.793000 CVE-2025-20655,0,0,bebaa6240cde4949ca99b762121ae98080340f20e965c2502bb927238910c09f,2025-04-09T15:37:20.007000 CVE-2025-20656,0,0,02b48d07e913b7a66c8109a95b57b7f7711e6a047daa439250e21d994c897a18,2025-04-09T15:29:43.380000 @@ -282977,7 +282982,7 @@ CVE-2025-20916,0,0,ff3457bf3e70cfd4cfd3cbcb58ac2eb53e174d8d861b7c00209fc86fed032 CVE-2025-20917,0,0,dd4078a35d9088bafe9734f8d9884f48f731dce0f719aab5ebeec4f3781a7aaf,2025-03-06T05:15:18.683000 CVE-2025-20918,0,0,93649eabf562d75ea3236a78e2da7a892bbd581950aa8527c5cdcdbf845cfd18,2025-03-06T05:15:18.883000 CVE-2025-20919,0,0,4203fee58d249450913e455cda2de8dcf96a9c9860f0f1d0860d0b8737b68f21,2025-03-06T05:15:19.050000 -CVE-2025-2092,1,1,3e28f37ff91c42b9f781ccbd11795329fd6fe7bda67d0de52b4fefe424216eac,2025-04-22T12:15:15.847000 +CVE-2025-2092,0,0,3e28f37ff91c42b9f781ccbd11795329fd6fe7bda67d0de52b4fefe424216eac,2025-04-22T12:15:15.847000 CVE-2025-20920,0,0,bcb2a5b705788d8ed2d098824aac372a369a6a0c9963034e0ea4b54e01ca0a53,2025-03-06T05:15:19.203000 CVE-2025-20921,0,0,6b64d5f86316d81f1a343d19aa9ff7fbbf0ab2ea1622870bb5157d9588ca6af0,2025-03-06T05:15:19.347000 CVE-2025-20922,0,0,c92501f891a482c2d13386b759450ab9e1b582d15af1828e7a0ba2143130aa77,2025-03-06T05:15:19.533000 @@ -284673,7 +284678,7 @@ CVE-2025-2295,0,0,5afd41ba1c620aa8b1c09ed9d5c8905d7597b06ca6637c246ba28374bca35e CVE-2025-22952,0,0,8738861fe1665908aa1c319a7ebce3d9ea42370b11127fd19a92e609f78fcd8e,2025-03-03T16:15:40.010000 CVE-2025-22953,0,0,0c70a629b7d9b1ab5c6f118e3b9ce0f27314cbf90bdf7ace7b5b39f1514e19c5,2025-04-15T15:16:07.327000 CVE-2025-22954,0,0,7f3409fe8a848c0af5e5d301bd257dbf01b84794547ad3a40f7d0461b014ed94,2025-03-18T14:15:42.213000 -CVE-2025-22957,0,0,78c986249320701d31e3769659f247864a435f5c1d673688267deb95bbf3701f,2025-03-20T16:15:16.223000 +CVE-2025-22957,0,1,20f949abf8ce4135fd020d425d005216a081c7f1371687d8f6eb49edc3e67428,2025-04-22T15:37:40.030000 CVE-2025-22960,0,0,cc3ca59d93e0c0cb6135025d6f8dc37d0dc5645d22d9322f42b235e2a3f0c6b3,2025-03-17T19:15:25.750000 CVE-2025-22961,0,0,c2a3aa8716f6cada0d8a53e343e519973bc28bf36e56486c654940da963b9795,2025-03-12T19:15:38.433000 CVE-2025-22962,0,0,773f9192cf586f9a26d3c9055927917c829f6abfc86fb569ec71975a3edaca91,2025-02-14T16:15:34.803000 @@ -284802,7 +284807,8 @@ CVE-2025-23138,0,0,ae9cd5fe4206362aca010712a1563b5126e72c93b934fdcf69571567f32e5 CVE-2025-2314,0,0,da0d16bd7cdf67126af9cb8b7b9eae653178ef2aa94ef32791352e7cdd49eda9,2025-04-16T13:25:37.340000 CVE-2025-2317,0,0,9ea9ba34615d5bc5ee8806158627db355af143699ea415828af46066a4160dd0,2025-04-07T14:18:15.560000 CVE-2025-23174,0,0,dc5a1ad5db1d480f032659c0d01a9f11532250706a273391a7c2a34510239677,2025-04-21T17:15:23.270000 -CVE-2025-23175,1,1,8e2aaa33c24e98d97098ab1083fdfc0100260f1d84351529f8bf56f6608e2410,2025-04-22T13:15:42.460000 +CVE-2025-23175,0,0,8e2aaa33c24e98d97098ab1083fdfc0100260f1d84351529f8bf56f6608e2410,2025-04-22T13:15:42.460000 +CVE-2025-23176,1,1,eeedf3059f191d16e885882b2178af242fb4d33a8ef7ea17ba1bbff94784ad9b,2025-04-22T15:16:10.480000 CVE-2025-23184,0,0,d117de9ebd2827a8b285a215a95edfb5f2bc8c36d298a840f4f419212fe8e651,2025-02-15T01:15:11.010000 CVE-2025-23185,0,0,6a8fc3993811d2ce0c7ae31663c2f10b11720d00b7d18acd6d25289de30c4360,2025-03-11T01:15:34.330000 CVE-2025-23186,0,0,e24ff484abfeac0347aa2108d965b5fa2efbb5bbd9e6a6775e16a55a54369d2e,2025-04-08T18:13:53.347000 @@ -286686,7 +286692,7 @@ CVE-2025-25761,0,0,3d122abb559c1347f5f4789a88e1fe36670f73906a2607df5e82f753a675f CVE-2025-25763,0,0,929a22c6e16286b1fdbe20f1a31e0445b855c096791fb0d6f77563158b5a789d,2025-03-07T20:15:38.180000 CVE-2025-25765,0,0,2923d7915d6035a6850e005111894ae328546ff9c58781e55b22186f59fc7911,2025-03-28T19:10:06.070000 CVE-2025-25766,0,0,86ae21303cb31636d55dd718fcde7383667a9937c3f5476439f2258b675201b5,2025-03-28T18:46:37.557000 -CVE-2025-25767,0,1,c750ec7012ff05efa886abade47cf7ece5cfbf7baa047f37d4dd64d3702849e0,2025-04-22T12:58:05.743000 +CVE-2025-25767,0,0,c750ec7012ff05efa886abade47cf7ece5cfbf7baa047f37d4dd64d3702849e0,2025-04-22T12:58:05.743000 CVE-2025-25768,0,0,144de6a82436863c4ea31bb6abbbc08daf5c7c5f8f3b7d077640959e2f240ece,2025-04-04T15:26:56.353000 CVE-2025-25769,0,0,fe50ca46f9d7f1df8c92164ff5c574fd0b6420f9452c06e3d38d027c3dde7d66,2025-03-28T20:08:22.980000 CVE-2025-2577,0,0,b42cdd709191575ce088ec06e1554e25be2db50148fe53b9714dad89d20df02b,2025-03-22T12:15:27.013000 @@ -286753,7 +286759,7 @@ CVE-2025-25928,0,0,4d0126a70ece07e33b30b79d6fb0071d9ae75a48eb252843c096446d3c2cb CVE-2025-25929,0,0,6bf2d742d037270fd862a805d51ec3ddd6ef1eaaac8534caa6d76c7b5e4ebb4d,2025-03-12T16:15:23.767000 CVE-2025-2593,0,0,1b6e06a0ab7f9f28a3291450afbbc8dc96810beccd94ade76b2912bb384868f8,2025-04-01T20:23:07.257000 CVE-2025-25939,0,0,b8c954bd00c1572438e1260084236f900e4329b0f9362ba172af96a5853d2ee9,2025-03-06T12:25:31.947000 -CVE-2025-2594,0,0,d06536a3c9f86cb707b40fdb7ea96e2ddf9927fa049feedfd08971fc778e6032,2025-04-22T06:15:44.860000 +CVE-2025-2594,0,1,e9f50297b68d703b33e249a84bdd4555c49e5d29abd7f7d7b2351bc4696925bf,2025-04-22T15:16:12.563000 CVE-2025-25940,0,0,0c729de242bc4ae51f81d332fedc09616e9f113b2b488846046c92f3a5ddefa6,2025-03-12T19:15:39.967000 CVE-2025-25942,0,0,abb06ac2462106029cbb8bb08119f5129d89323ab66d1de7f80d7b48f0130201,2025-02-20T15:15:14.587000 CVE-2025-25943,0,0,ddbf4f2120cdf8c0c6ec76a602b8a3405d44d5883b4cc9347335166be4d0cf63,2025-02-20T15:15:14.743000 @@ -286768,9 +286774,9 @@ CVE-2025-25951,0,0,36590502128c2f462b2193bb1de5b4041627daeba96b84368d0be8f1fe9d0 CVE-2025-25952,0,0,cbe43ab15287a101ee4ca95bd9e2f758ef9364a9bb5d1471af4f5540683b58da,2025-04-18T14:15:22.117000 CVE-2025-25953,0,0,9801776d2473deb49d588bb836df3d6ea40a53fb0bb9457da637cbf0bdaad424,2025-04-18T14:15:22.280000 CVE-2025-25957,0,0,b65136edccab78b78b9c909881827ed1ed034886966746fcab259eb6d692acae,2025-02-21T15:15:13.067000 -CVE-2025-25958,0,1,177c6eb34465ffc8aac17021df235670914f868dfddc4be469bb5e241da9eab3,2025-04-22T13:09:31.147000 +CVE-2025-25958,0,0,177c6eb34465ffc8aac17021df235670914f868dfddc4be469bb5e241da9eab3,2025-04-22T13:09:31.147000 CVE-2025-2596,0,0,95591cddf94618143e623a63fbb26d2f99203e6a4b78fbe2714bba0e0a1ddf6a,2025-03-27T16:45:27.850000 -CVE-2025-25960,0,1,479d12f427b04800342d6481b780b7a5628b65f78b0f2b5e249fb2ad41b1c9f5,2025-04-22T13:09:06.197000 +CVE-2025-25960,0,0,479d12f427b04800342d6481b780b7a5628b65f78b0f2b5e249fb2ad41b1c9f5,2025-04-22T13:09:06.197000 CVE-2025-25967,0,0,989386a4237cbda80018de244f1663bcd7537e8be154d2ce1f656a6eb97ba253,2025-03-06T12:25:50.837000 CVE-2025-25968,0,0,aa03a40375072b5ed2e0cc97eadb8b6a24b2d3fca5df43f3cc84fd5f8cf62db9,2025-02-20T20:15:46.993000 CVE-2025-2597,0,0,8a0cbd8d0652062d16855875dcb2e41c8d1851bedcf685074602b342e91bb38d,2025-04-01T20:24:03.190000 @@ -286860,8 +286866,8 @@ CVE-2025-2627,0,0,2f3ad81f65de29cf1c1820e848f840cadf0a85c3d953dd25546251d732981b CVE-2025-2628,0,0,05d1547b9a4ba25743b9dcb0b6bd681f5330882c7d106990b2f631bde4178f60,2025-04-02T15:44:41.567000 CVE-2025-2629,0,0,92526d6802f82a60577f499f7428e085c5c9a3dc350eda35a33c257d8ff3ba9b,2025-04-09T20:02:41.860000 CVE-2025-2630,0,0,80b040beb7036e11c891371aafd2dfff8366fc5de7832ad4f7f7e7481376cd0f,2025-04-09T20:02:41.860000 -CVE-2025-26304,0,1,a5c11b073ada903ccb941b42287eb7945f8e844330c25e526268ba4941ae6db2,2025-04-22T13:11:17.910000 -CVE-2025-26305,0,1,8a8240bb1665c120549f8d099b1376c36e553d04555d8eff7458d5d92d4a51aa,2025-04-22T13:10:07.217000 +CVE-2025-26304,0,0,a5c11b073ada903ccb941b42287eb7945f8e844330c25e526268ba4941ae6db2,2025-04-22T13:11:17.910000 +CVE-2025-26305,0,0,8a8240bb1665c120549f8d099b1376c36e553d04555d8eff7458d5d92d4a51aa,2025-04-22T13:10:07.217000 CVE-2025-26306,0,0,04e5bf69c11a6850de7d972a5f1b858b63aee740054abf6debe47d3503845733,2025-04-17T18:34:03.680000 CVE-2025-26307,0,0,3b40e8391a80b59db3286990f6568a79abbaecaf5626280b23a33922d860f90d,2025-04-17T18:30:57.377000 CVE-2025-26308,0,0,e0f3670e76d7e18af75f73f0ed976e5c9de5276a2fbecd53a1b9b325b0df19d2,2025-04-17T18:24:30.660000 @@ -287390,7 +287396,7 @@ CVE-2025-27082,0,0,ffb20ffa027c4bd1d4d43e108dc1329f65254792bdc60837334e2fed50c76 CVE-2025-27083,0,0,9973aa4b40c39d6e58e7d53f3b7d373505a0c9f34314a4dc591ed39034ea7e8c,2025-04-09T18:15:44.707000 CVE-2025-27084,0,0,a49dd47a9f3ad17e2e49c3157e24c8752ed90f227d5203cc20e98f8211f13fff,2025-04-09T18:15:44.847000 CVE-2025-27085,0,0,a907717a65908c20d2d3ce3360c3a9477d73ea705f674b740feb47ed06abcb1d,2025-04-09T18:15:44.980000 -CVE-2025-27086,0,0,362c93b38b6897a75d4dab2bc7ba37843833b6fa3ae1c07f1c4619ab81ab1b3d,2025-04-21T19:15:19.620000 +CVE-2025-27086,0,1,eeb5e2aad1df2848b87ea481f5904c57ec60577feb95f2cf2e2e215ab5f5b2e8,2025-04-22T14:15:24.880000 CVE-2025-27088,0,0,fbdc36eed3cad3a0ad2022cbe7aca458560a9c5f707fbc00203d874cefc235d6,2025-02-21T22:15:13.673000 CVE-2025-27089,0,0,4c46df8a0eff7d16a653158eecc2014910418a0d0440d1d2334e56d23f56f25a,2025-02-27T20:31:27.267000 CVE-2025-2709,0,0,d6cc52b54cf9fe42db12e08a6931ac595590cbc41e2b6527b80a4b65b7cd7d63,2025-03-27T16:45:46.410000 @@ -287423,7 +287429,7 @@ CVE-2025-2712,0,0,f459821222a72c79cc7ff9a9b481a8bc6ba3bcc2247f05dabdfc4ed09d6e19 CVE-2025-2713,0,0,96d615228bbe2400210a94715d82e0cb4affc98dd4349c31070f30252b2cc770,2025-03-28T18:11:40.180000 CVE-2025-27130,0,0,a1dc5070cb706965f29565e1845bf948cc8ae12d305309227937d0f3062f821a,2025-04-01T20:26:11.547000 CVE-2025-27133,0,0,6a9a66aab6e9ca89b44a7c5cb67994f31f8bbf17a0a742bf21f793ab1c58a1a0,2025-02-28T16:49:04.283000 -CVE-2025-27135,0,1,42c245b352c28322ceaa01f8d09056ec5a9d4c1b14ee10a7d27b83e8e078260c,2025-04-22T12:57:00.213000 +CVE-2025-27135,0,0,42c245b352c28322ceaa01f8d09056ec5a9d4c1b14ee10a7d27b83e8e078260c,2025-04-22T12:57:00.213000 CVE-2025-27136,0,0,c01448066d938a954aacb43927a32ddc1070de1cae5a8be4183115a3e5216889,2025-03-10T19:15:40.770000 CVE-2025-27137,0,0,5824d60f023fc733adf708b73443cf5ddf0a1c321fa7b10d5058188a954ef313,2025-02-24T21:15:11.213000 CVE-2025-27138,0,0,51df3b05aad41c98a88fe0b061ed7e110b02a2b2eed44112c3eb8d323dce6520,2025-03-21T15:22:28.790000 @@ -287495,14 +287501,14 @@ CVE-2025-27201,0,0,e16a69f1e6ee9c10ddc82bfd85516ec2ecce4ab46419db4f3ca5e53d3f6d3 CVE-2025-27202,0,0,e2fb121a71de22e29c90f28400f5e2a8546243d6f41eee6c3fef551b0ae3b445,2025-04-15T19:50:43.587000 CVE-2025-27204,0,0,915ee58270bed657aa3414a33920c2828a16919cebf1c439beba158fba489933,2025-04-15T19:56:13.910000 CVE-2025-27205,0,0,622fc600a5f2cc0012bd82d989d2a6b6005bac37857e576b9cccf13c1f678ff5,2025-04-09T20:03:01.577000 -CVE-2025-2721,0,1,aa8959d6414ccd78b185fee276132fe2183524f73060666b030d6ef296f0e6b0,2025-04-22T13:15:42.990000 +CVE-2025-2721,0,0,aa8959d6414ccd78b185fee276132fe2183524f73060666b030d6ef296f0e6b0,2025-04-22T13:15:42.990000 CVE-2025-27218,0,0,a1f84aab7c20671025069586dc6eda2e424af576b61d56df1ec2458e5aa40a25,2025-02-20T21:15:26.510000 CVE-2025-27219,0,0,461867c9c6ad1aeffed9a753c37dda365d03d66745eecef158a52cad45739e4c,2025-03-05T14:08:20.493000 -CVE-2025-2722,0,1,5429e7ab595a3d641318e5e903d551e7af1ff80fa04c038e41577e9264377585,2025-04-22T13:15:43.080000 +CVE-2025-2722,0,0,5429e7ab595a3d641318e5e903d551e7af1ff80fa04c038e41577e9264377585,2025-04-22T13:15:43.080000 CVE-2025-27220,0,0,50b11b5fd40edf0e7c742f21d8cc3faaa1a9293941d08bd7591ca6c39e27baac,2025-03-05T14:58:14.463000 CVE-2025-27221,0,0,49e7be9560dc9cc77f297711484d4ecb5ba5b672bef56754e4d2d3990afad938,2025-03-05T14:58:05.300000 -CVE-2025-2723,0,1,52e45c0ba96402a35fab3eb286730cbe627c9a2787e2f2127fb3c173463fb2d6,2025-04-22T13:15:43.140000 -CVE-2025-2724,0,1,4610ac8ad922ea624cd2d35c755551566dc6e12e181c5f6d5e7e865b18b82086,2025-04-22T13:15:43.203000 +CVE-2025-2723,0,0,52e45c0ba96402a35fab3eb286730cbe627c9a2787e2f2127fb3c173463fb2d6,2025-04-22T13:15:43.140000 +CVE-2025-2724,0,0,4610ac8ad922ea624cd2d35c755551566dc6e12e181c5f6d5e7e865b18b82086,2025-04-22T13:15:43.203000 CVE-2025-27244,0,0,86fab9c76c6855c3f65d6fe655fad17ea7f4d78587bc5a57db26b5cf4b92bc76,2025-04-02T14:58:07.527000 CVE-2025-2725,0,0,4c49041f815970a2f0962172abde8e9b997e751be7cfde55bbadd432ffae1641,2025-04-11T20:15:22.937000 CVE-2025-27253,0,0,e6fd345c99af7ee03f79cb7784a5ae2d7ed62bc20a94544c634faa9f6cea75f1,2025-03-12T11:15:41.127000 @@ -287967,9 +287973,12 @@ CVE-2025-28010,0,0,716afcbc5cebfe3c684dbf7aa12e99a30e3cb54526d7e93ef8e97f615752b CVE-2025-28011,0,0,fdcb5591ea26e059e8d35048712169c6e42fd9f817189e1097ee50f0c5ccdc59,2025-03-28T20:00:36.220000 CVE-2025-28015,0,0,631137508e8a20a86b77040d3a1f398272eddb26c2d8f5274ce598561c73146c,2025-03-28T19:49:16.520000 CVE-2025-2803,0,0,e47ecd50bab8435762f20a0360685d74e0ceaca5cc3e5df3e0509ccc4da5c57f,2025-04-01T20:26:30.593000 +CVE-2025-28032,1,1,4ca94134f0b82e11e1a2aaca33c11b6c40f2dc9ba44126fcfeb6e62db730081d,2025-04-22T14:15:25.017000 +CVE-2025-28033,1,1,798e86e951abdef9a0d55f6764a5ec9e68a1229668840e4129e69b1ed6d59cc1,2025-04-22T14:15:25.150000 +CVE-2025-28034,1,1,810629de37a4da2ef7d4a69f7ba0d54d26a2c6f13dc48dff83602355f5bb7eaa,2025-04-22T14:15:25.263000 CVE-2025-2804,0,0,05befb6a988325f06e55dd5b0c814f5549862889b3223abfcf82e08eebaa0244,2025-03-28T18:11:40.180000 CVE-2025-2805,0,0,880e5f81bed603812ce823b5a2b526104be41586e76c7f27af893f077e49d084,2025-04-11T15:39:52.920000 -CVE-2025-28059,0,0,d6b12b4da71e002a88900b88960af93e3e1e72099850d52ace3cc71e68aaba6e,2025-04-21T14:23:45.950000 +CVE-2025-28059,0,1,0b528bcd391ca7d8898ab4bd4553bb61f607c8c85b3fa32f1b18963847081036,2025-04-22T15:16:10.627000 CVE-2025-2807,0,0,f8faf57b374faab8743fa15c01545fe02708770c7c9d6b7c7888f61e54c92b92,2025-04-08T18:13:53.347000 CVE-2025-28072,0,0,321583596f07ee7a11b5edcf4c985e43a00852706ec6a22ba926fc63543c9b04,2025-04-17T20:21:48.243000 CVE-2025-2808,0,0,2d9ef6fcbe323df90c90b4e91a51bb82e8f5ef9746894b9f5e9c32273a3c6988,2025-04-08T18:13:53.347000 @@ -288004,23 +288013,23 @@ CVE-2025-28145,0,0,5347d09d413796153393d4534b6aa0605cb9ad6607e3f87e9c15cab7816fd CVE-2025-28146,0,0,32c9b208c84d9df041320792b106820cf214078a35a3cb79372374645d1870eb,2025-04-15T15:16:08.660000 CVE-2025-2815,0,0,242155fff6e988a29170d3e8e0a0ff904f29004fb7975cc06cbc247a50a0c090,2025-03-28T18:11:40.180000 CVE-2025-2819,0,0,38e9c36ae873a346ecdd7625eb6881a65dff946dea1e4d5fe1469a7230964dac,2025-03-27T16:45:27.850000 -CVE-2025-28197,0,0,f708019a12f8f602fc9ff581bb4127f03829b50e76b6ecedec54a362163c790e,2025-04-21T14:23:45.950000 +CVE-2025-28197,0,1,6014e266f4224c57ab1bd75f113da4696d8d67e68cf26ea7681631f15433ac64,2025-04-22T14:15:25.370000 CVE-2025-28198,0,0,6f1341fc6b693ef754968d5d7823e6e3077e6e0e9d40d3a0c80f3a24c72b5647,2025-04-15T20:15:38.833000 CVE-2025-2820,0,0,6cdeb95f9b6504397d792f97c785fc6adf2ecfa6c7ab16f1c8d1d83356fe06c9,2025-03-27T16:45:27.850000 CVE-2025-28219,0,0,ec028a36263bbd1ae74e67661a16435fa8f188c14a8af517a9060f482a1d7fc7,2025-04-21T19:15:19.700000 CVE-2025-28220,0,0,8ea849100de99eadf0f1f692eee281fe3ae88b76d5aa3b6cb7e191d33a52a747,2025-04-21T19:15:19.847000 CVE-2025-28221,0,0,d9630d7d28086bc60cc43c1fe3942fba3a71b31ee46def7c504260d5a91ab975,2025-04-21T19:15:19.973000 -CVE-2025-28228,0,0,5d8e0bbabec06b95fd89f034c06b8c9c86f4bf4bbfc59e1ea68c98dffd7bb2ea,2025-04-21T14:23:45.950000 -CVE-2025-28229,0,0,a6fbda22c58add386416a38340baa71643d5a2e00a94925075f5efa0d90b44bb,2025-04-21T14:23:45.950000 -CVE-2025-28230,0,0,ff4d6ea2d32c6d72239ae60525fabf6394b2f78866524be8b12143e0b3341558,2025-04-21T14:23:45.950000 -CVE-2025-28231,0,0,2369d00b4aed6cbdffafdf0e0163863d11087b86b777f02852b55618079b51f9,2025-04-21T14:23:45.950000 -CVE-2025-28232,0,0,d64c7623344c8d350a3cb9fba72b36f5ae3d26ecc48ba87da369e16867aefe30,2025-04-21T14:23:45.950000 -CVE-2025-28233,0,0,f91e26f1646270d935fb3a43917625d57d5351b639d58cf3ed3d478e82034f88,2025-04-21T14:23:45.950000 -CVE-2025-28235,0,0,36f29e1b4f5cc16572206ce03e4ad08f8dbabbcdf700673f60e822d1d315d842,2025-04-21T14:23:45.950000 -CVE-2025-28236,0,0,7c2b4008a9fdfa0d8447630a9c44364faf667506e5d151818b988bcc3f55c9dd,2025-04-21T14:23:45.950000 -CVE-2025-28237,0,0,cae8b29cc1ded5c517d45a2a17004c340302415efad08f17becf6a6b6fd82b5e,2025-04-21T14:23:45.950000 -CVE-2025-28238,0,0,90ce5031a01424848e560a35930107cc4b8d527821a00c26eeaea8c9f5ccb8b0,2025-04-21T14:23:45.950000 -CVE-2025-28242,0,0,052ed2a922fd614ee9ac25da8ff7ca515def947754b2cac8558f8c8fb863bfd3,2025-04-21T14:23:45.950000 +CVE-2025-28228,0,1,8049707a4d8b13c0b8aabdf604ba50d14afbcccd2f51d39c0b43374a0646e314,2025-04-22T15:16:10.817000 +CVE-2025-28229,0,1,7e53335c31e1370b725de5088cf458b72182c4c469dca16f506218ab0468db89,2025-04-22T15:16:10.997000 +CVE-2025-28230,0,1,ca7f8a80ca7345fab2fd0c0e7c4a27acec049583f3bcb2d2776ae32176354b80,2025-04-22T15:16:11.173000 +CVE-2025-28231,0,1,65c5b2ac0ab33aa39e27fbd8cc0e76a2cee679405e06aab021f4ec7c9f65f529,2025-04-22T15:16:11.337000 +CVE-2025-28232,0,1,9633f63323e745a98aa6944e605f4f261604a9b117d789798251ca741844f7b9,2025-04-22T15:16:11.497000 +CVE-2025-28233,0,1,4cbf7698c4a198149a035b08d97a8569695f9f4941a9ce0866a9548cf7ca63f9,2025-04-22T15:16:11.657000 +CVE-2025-28235,0,1,8a4ca265cf3106e273b743d2fa252678458923ffbedb533987bf9cac0515f100,2025-04-22T15:16:11.813000 +CVE-2025-28236,0,1,a3c4befe20e136ddacdd33017ad3edeba093e2ce36cef176519dd7ade12356c7,2025-04-22T15:16:11.970000 +CVE-2025-28237,0,1,c78208c359a60dc1e76986248942a7a2572cb3f58994ae71a798b36c2f67f9a8,2025-04-22T14:15:25.543000 +CVE-2025-28238,0,1,a933d72a1464649edb2a94ea10b3a0578315fd1543dbe12b2c4492c757e59db1,2025-04-22T14:15:25.720000 +CVE-2025-28242,0,1,e0a5878d2d69348d79f7c97fa93e9198b1d3ff6e8dadc1c44404736c4ba1e61a,2025-04-22T14:15:25.897000 CVE-2025-2825,0,0,e4db2ec87b94dcda703a7cb29d9641a787a1d84d05d6f964d3ea9c8b54dfc722,2025-04-04T20:15:17.507000 CVE-2025-28253,0,0,0f48ac5a4456a4d9cddb64e8619772b132895c7269a2c8d0b95ac55f00e8e388,2025-04-07T20:15:20.173000 CVE-2025-28254,0,0,c097372640e42ad56d3f680e0895f3984d33f75010de2acc8d7dea3b37a08a9e,2025-04-07T14:42:18 @@ -288237,7 +288246,7 @@ CVE-2025-29189,0,0,bcaef2eccfb68961afd45581c25b3eaf1e8561c7adb00bd8a6ac861dc5bf6 CVE-2025-2919,0,0,1d818e3cdb60bc40bbb8474c5c52d97f9dd37ab065859a371a6909ea5f7a7aa2,2025-04-17T14:06:09.157000 CVE-2025-2920,0,0,2401864f099a711f30f8b2d38398a72d7195f85541e7f19ba35b8b1ff663c52a,2025-04-01T20:26:39.627000 CVE-2025-29208,0,0,67e2605039ee3d1f3c5ea9f6fc4b9f6bb3ff72ecfc77443b4593d17db1d38ecf,2025-04-14T18:15:29.100000 -CVE-2025-29209,0,0,fe13301c38da60317480f2a81620db02bdc76c2f337d22c641ec1254749e67ef,2025-04-21T14:23:45.950000 +CVE-2025-29209,0,1,8175b6f6ee212daa9c738df874a32007f6007f655ced52de08397463cd1fe189,2025-04-22T15:16:12.130000 CVE-2025-2921,0,0,9699494d9e2188360f8bb70978c1473b6fd42ed7b51cafd5be6de03ad5519768,2025-04-17T14:21:41.600000 CVE-2025-29213,0,0,1c38557b0c0521a6b19a8cbfdd3dd81bd8f54da83c96d0264e742ae4f5de31d4,2025-04-16T19:15:54.063000 CVE-2025-29214,0,0,2f3c93fd24943456f370bfa5c5d58e2eb2d54f2259ee734aa123f6beaa43463e,2025-03-25T17:37:42.507000 @@ -288266,7 +288275,7 @@ CVE-2025-29312,0,0,a83ab0803d593b7408ef47819047a8eed47716c263e6e6784a866c9451353 CVE-2025-29313,0,0,36b5dfbaccdc259f2b52ceac76431ece1292ff6ced8c88ea82c0057012874cbd,2025-03-27T16:45:46.410000 CVE-2025-29314,0,0,68cd136edb649d9eb6aec698b8b31c836ad747d7f35cb5e1d05f8aa177ad8f88,2025-03-27T16:45:46.410000 CVE-2025-29315,0,0,f907f053863754eafc89ac11a469f54443f6b549eee8182288b1596f75ccbd29,2025-03-27T16:45:46.410000 -CVE-2025-29316,0,0,2ff65e99b7df17988eca1243d01a3fda93e05fb43fb67a6ed5e37c302048bb37,2025-04-17T20:21:05.203000 +CVE-2025-29316,0,1,bb77a7975d8f74235562df4820ddab580b55345f4fd3fad332df3ae84b036bb0,2025-04-22T15:16:12.287000 CVE-2025-29322,0,0,2d154ec4512c8c4d705799afa2ea73c17ca8f22a9dcc44f2fe16f737f7f4c5a2,2025-04-08T19:15:48.650000 CVE-2025-2933,0,0,d2bf8266af3293189f2fc83d9c7224df7d9162ddc33d6ffbeb12c1b55081638f,2025-04-07T14:17:50.220000 CVE-2025-29357,0,0,eb014a723aa009227f0255b17dfaab32ae69c018e0a2e5c6777057d80a0cac3f,2025-04-02T20:33:45.110000 @@ -288276,7 +288285,7 @@ CVE-2025-29360,0,0,60f699fc34b226098331e73f5dff107c5ab8e409212cbdb73c8207fc1fe87 CVE-2025-29361,0,0,322d7e70dc3e8f2579651f6679eed85d5f370c246041794c07b65fd900fbc194,2025-04-02T20:32:57.520000 CVE-2025-29362,0,0,bfa31cd4a124a26307870a9d9d6babd629424e91f3b6053b6d28204c0f159dc2,2025-04-02T20:32:43.517000 CVE-2025-29363,0,0,e4ec5828630e799155852bea28251ca1beffb9188dcb723ce7aa88f673368bc6,2025-04-02T20:32:36.053000 -CVE-2025-29369,0,0,62e837c745ef086a2872d58ddd0f8721d3165a4f88f569603fe9575c8eabe936,2025-04-10T21:15:48.673000 +CVE-2025-29369,0,1,a98d3392b40832da04fc0e1b68fdd18273f24fb7f63efeafb19e7b1083ec0464,2025-04-22T15:20:07.247000 CVE-2025-29384,0,0,14456271181d2a6b38eac63454e7d903bdeae2563e5fc51ec6c8692dd53ec951,2025-03-19T19:15:49.133000 CVE-2025-29385,0,0,f60ee6091bef3db2d6081e2edd6e0a4a37d7ecd5c70fcec7c258e2d44478f256,2025-03-19T19:15:49.280000 CVE-2025-29386,0,0,f142ce16dea374d9a9926fc7db0f8c42e7cb63baff73e2c1cd84f28fd5ff529e,2025-03-19T19:15:49.423000 @@ -288343,8 +288352,9 @@ CVE-2025-2951,0,0,6a15654c1eca83ff82a596d5e3e3899275c59561438cb927263c33c03b7a3c CVE-2025-29512,0,0,3d19cdff5c09488138c092b6f82b68a41057f1e41fdd74cfdc0365f5e5e1ac45,2025-04-21T14:23:45.950000 CVE-2025-29513,0,0,515ae61a28c85140fea26d0dda962e2370ad1908366e341bda6f4872187d1b5c,2025-04-21T14:23:45.950000 CVE-2025-2952,0,0,8e511f60053de6e98a0a0d7d1bc3adcad4b08b5c7d212898526204e3a8631438,2025-04-15T17:46:20.793000 -CVE-2025-2953,0,1,63a058316a94f1860205db8db60c337f53057708ffe30b70ffabdee4df9a2fc5,2025-04-22T12:15:16.043000 +CVE-2025-2953,0,0,63a058316a94f1860205db8db60c337f53057708ffe30b70ffabdee4df9a2fc5,2025-04-22T12:15:16.043000 CVE-2025-2954,0,0,0672b048d9a1bc1b6cab4c4533c01031021ece5eaf46619f3aa405740d82e196,2025-04-15T17:57:44.213000 +CVE-2025-29547,1,1,6ca64a333009c467d83b71bfefc116cd2448c593b57d6e192bbd51171b932b43,2025-04-22T15:16:12.447000 CVE-2025-2955,0,0,f457e82bc0e34816f82e9412a70796d5f7c872fa43e3171fc313f275eba39469,2025-04-01T20:26:30.593000 CVE-2025-2956,0,0,12b742621d86c28d988776b85da597ef776ef6fe74e703c6823d14feeb258af7,2025-04-01T20:26:30.593000 CVE-2025-2957,0,0,d90251765154920d1060d5e6f1781980ec9f028972bb25184edb9ab3b3acf04f,2025-04-01T20:26:30.593000 @@ -290645,11 +290655,11 @@ CVE-2025-3439,0,0,fb1ddc5c039c3b7a25d68fd308a9eefeecaa8dbcd5e82fdc5ddbcb69530130 CVE-2025-3442,0,0,2a59e6aeb9a7ce85db231c9e4252568faabc9932311aa3489ec1af959c55a52f,2025-04-09T20:02:41.860000 CVE-2025-3445,0,0,9368fe2ffe41458977755cb44cb2101cef3e3cbb78b4473c7335a5f09fb177cb,2025-04-15T18:39:27.967000 CVE-2025-3453,0,0,08da8e36c96a5552d71a6a0c0c0752a2b518051d209eae2dce327d317b2980df,2025-04-17T20:21:48.243000 -CVE-2025-3457,1,1,7db45e8e4d545daacf945f339c559483f94b2a9f96fc413275d8bfab34dac3e7,2025-04-22T12:15:16.350000 -CVE-2025-3458,1,1,46f9a1ea2b5311b422ba6b4c11d0258b9e2a9f2bb55e20cbcee3717ffade46bd,2025-04-22T12:15:16.507000 +CVE-2025-3457,0,0,7db45e8e4d545daacf945f339c559483f94b2a9f96fc413275d8bfab34dac3e7,2025-04-22T12:15:16.350000 +CVE-2025-3458,0,0,46f9a1ea2b5311b422ba6b4c11d0258b9e2a9f2bb55e20cbcee3717ffade46bd,2025-04-22T12:15:16.507000 CVE-2025-3469,0,0,4bca5426f9919f93dad9a4b1c330f34d47eacab0082cc9b29903729bbc139092,2025-04-11T15:39:52.920000 CVE-2025-3470,0,0,19aa6171d68cb7df7c1f3be18d7bfe917a85b5b7f1d5f3673d31726045a39093,2025-04-15T18:39:27.967000 -CVE-2025-3472,1,1,6dc4a5a5a986c16f8bbcf3ff04305cc7bbfaa70952977e25f65ffd43972bb245,2025-04-22T12:15:16.657000 +CVE-2025-3472,0,0,6dc4a5a5a986c16f8bbcf3ff04305cc7bbfaa70952977e25f65ffd43972bb245,2025-04-22T12:15:16.657000 CVE-2025-3474,0,0,b6de92ac438f32870a4d6c552a2123f6f68213b92be966aee0e7401ddd248d53,2025-04-09T20:02:41.860000 CVE-2025-3475,0,0,ff2d6c8584b1bcdb40146c2b5f353ed3942d3a2ca7a36d451238afc4497ce8f1,2025-04-09T20:02:41.860000 CVE-2025-3479,0,0,4a9b4e9445de38b62c12aba6a3ccda4035e08e7a0e62519cbe5423e4b465840d,2025-04-17T20:21:48.243000 @@ -290709,7 +290719,7 @@ CVE-2025-3573,0,0,095399568374006bc1e93d539eebcb743d7cc965cdc4a121e4480938fddae5 CVE-2025-3574,0,0,94473ff233af08be74c232281156bfa5db699f8872e1802977040bd9e36c2d62,2025-04-15T18:39:27.967000 CVE-2025-3575,0,0,73e2cf1e3fbb3ccb86ef07985e1084456954c5cbbd5b3215dbed3da8318cbbf4,2025-04-15T18:39:27.967000 CVE-2025-3576,0,0,fcfdd1e678fdad628e7417f5b3843fb736313985ccb3419de0d7118ddd040472,2025-04-15T18:39:27.967000 -CVE-2025-3577,0,0,09785f673afbf3e63833e0fb9935fb61d41b58f6b4fcc2199cc9778b18043fc7,2025-04-22T03:15:21.637000 +CVE-2025-3577,0,1,fb23e0b695e73a1304199c693ffcb75fdf226dffe64394042254513a435c82d1,2025-04-22T14:15:26.490000 CVE-2025-3578,0,0,e13e840aaf0a24c67a679c44959c85bec14fbcb560caa6c65722eed662e1826f,2025-04-15T18:39:27.967000 CVE-2025-3579,0,0,6c0217c9a43a942438244f9ebf630b5c65085fd986d644363e1cb943f76ed2bf,2025-04-15T18:39:27.967000 CVE-2025-3585,0,0,a54288693643171c0acabc6ec95ab94f7327c2199882403bf0dab9c0f61422eb,2025-04-15T18:39:27.967000