From 8dac63d24ccaa15c4f109551e4aec5c872acf30d Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 9 Jun 2025 20:03:56 +0000 Subject: [PATCH] Auto-Update: 2025-06-09T20:00:19.599263+00:00 --- CVE-2023/CVE-2023-419xx/CVE-2023-41953.json | 27 +- CVE-2023/CVE-2023-487xx/CVE-2023-48774.json | 27 +- CVE-2023/CVE-2023-498xx/CVE-2023-49835.json | 27 +- CVE-2023/CVE-2023-500xx/CVE-2023-50082.json | 22 +- CVE-2023/CVE-2023-508xx/CVE-2023-50882.json | 27 +- CVE-2023/CVE-2023-512xx/CVE-2023-51210.json | 32 +- CVE-2023/CVE-2023-71xx/CVE-2023-7168.json | 46 +- CVE-2023/CVE-2023-72xx/CVE-2023-7239.json | 40 +- CVE-2023/CVE-2023-72xx/CVE-2023-7297.json | 40 +- CVE-2024/CVE-2024-02xx/CVE-2024-0249.json | 40 +- CVE-2024/CVE-2024-05xx/CVE-2024-0589.json | 32 +- CVE-2024/CVE-2024-09xx/CVE-2024-0970.json | 40 +- CVE-2024/CVE-2024-100xx/CVE-2024-10098.json | 46 +- CVE-2024/CVE-2024-101xx/CVE-2024-10149.json | 46 +- CVE-2024/CVE-2024-103xx/CVE-2024-10362.json | 46 +- CVE-2024/CVE-2024-104xx/CVE-2024-10475.json | 46 +- CVE-2024/CVE-2024-106xx/CVE-2024-10631.json | 46 +- CVE-2024/CVE-2024-106xx/CVE-2024-10632.json | 40 +- CVE-2024/CVE-2024-106xx/CVE-2024-10634.json | 46 +- CVE-2024/CVE-2024-111xx/CVE-2024-11140.json | 46 +- CVE-2024/CVE-2024-111xx/CVE-2024-11189.json | 46 +- CVE-2024/CVE-2024-113xx/CVE-2024-11372.json | 46 +- CVE-2024/CVE-2024-113xx/CVE-2024-11373.json | 46 +- CVE-2024/CVE-2024-115xx/CVE-2024-11502.json | 45 +- CVE-2024/CVE-2024-117xx/CVE-2024-11718.json | 46 +- CVE-2024/CVE-2024-117xx/CVE-2024-11719.json | 46 +- CVE-2024/CVE-2024-118xx/CVE-2024-11843.json | 46 +- CVE-2024/CVE-2024-122xx/CVE-2024-12282.json | 46 +- CVE-2024/CVE-2024-123xx/CVE-2024-12301.json | 46 +- CVE-2024/CVE-2024-127xx/CVE-2024-12750.json | 46 +- CVE-2024/CVE-2024-128xx/CVE-2024-12873.json | 46 +- CVE-2024/CVE-2024-228xx/CVE-2024-22860.json | 32 +- CVE-2024/CVE-2024-228xx/CVE-2024-22876.json | 32 +- CVE-2024/CVE-2024-243xx/CVE-2024-24330.json | 32 +- CVE-2024/CVE-2024-383xx/CVE-2024-38341.json | 74 ++- CVE-2024/CVE-2024-450xx/CVE-2024-45094.json | 134 ++++- CVE-2024/CVE-2024-470xx/CVE-2024-47081.json | 92 +++ CVE-2024/CVE-2024-480xx/CVE-2024-48019.json | 51 +- CVE-2024/CVE-2024-487xx/CVE-2024-48704.json | 33 +- CVE-2024/CVE-2024-493xx/CVE-2024-49350.json | 116 +++- CVE-2024/CVE-2024-514xx/CVE-2024-51453.json | 50 +- CVE-2024/CVE-2024-517xx/CVE-2024-51715.json | 27 +- CVE-2024/CVE-2024-519xx/CVE-2024-51941.json | 43 +- CVE-2024/CVE-2024-538xx/CVE-2024-53814.json | 27 +- CVE-2024/CVE-2024-539xx/CVE-2024-53908.json | 54 +- CVE-2024/CVE-2024-562xx/CVE-2024-56277.json | 27 +- CVE-2025/CVE-2025-14xx/CVE-2025-1499.json | 31 +- CVE-2025/CVE-2025-200xx/CVE-2025-20063.json | 51 +- CVE-2025/CVE-2025-210xx/CVE-2025-21082.json | 51 +- CVE-2025/CVE-2025-222xx/CVE-2025-22296.json | 27 +- CVE-2025/CVE-2025-231xx/CVE-2025-23195.json | 33 +- CVE-2025/CVE-2025-231xx/CVE-2025-23196.json | 33 +- CVE-2025/CVE-2025-232xx/CVE-2025-23235.json | 51 +- CVE-2025/CVE-2025-244xx/CVE-2025-24493.json | 51 +- CVE-2025/CVE-2025-245xx/CVE-2025-24543.json | 27 +- CVE-2025/CVE-2025-245xx/CVE-2025-24546.json | 27 +- CVE-2025/CVE-2025-246xx/CVE-2025-24650.json | 27 +- CVE-2025/CVE-2025-246xx/CVE-2025-24698.json | 27 +- CVE-2025/CVE-2025-247xx/CVE-2025-24715.json | 27 +- CVE-2025/CVE-2025-247xx/CVE-2025-24733.json | 57 +- CVE-2025/CVE-2025-247xx/CVE-2025-24736.json | 27 +- CVE-2025/CVE-2025-248xx/CVE-2025-24860.json | 53 +- CVE-2025/CVE-2025-250xx/CVE-2025-25044.json | 31 +- CVE-2025/CVE-2025-252xx/CVE-2025-25217.json | 51 +- CVE-2025/CVE-2025-25xx/CVE-2025-2518.json | 95 +++- CVE-2025/CVE-2025-266xx/CVE-2025-26691.json | 31 +- CVE-2025/CVE-2025-266xx/CVE-2025-26693.json | 51 +- CVE-2025/CVE-2025-271xx/CVE-2025-27131.json | 61 +- CVE-2025/CVE-2025-272xx/CVE-2025-27242.json | 61 +- CVE-2025/CVE-2025-272xx/CVE-2025-27247.json | 31 +- CVE-2025/CVE-2025-275xx/CVE-2025-27563.json | 51 +- CVE-2025/CVE-2025-28xx/CVE-2025-2896.json | 53 +- CVE-2025/CVE-2025-293xx/CVE-2025-29306.json | 8 +- CVE-2025/CVE-2025-300xx/CVE-2025-30087.json | 65 ++- CVE-2025/CVE-2025-308xx/CVE-2025-30867.json | 47 +- CVE-2025/CVE-2025-308xx/CVE-2025-30871.json | 27 +- CVE-2025/CVE-2025-308xx/CVE-2025-30873.json | 47 +- CVE-2025/CVE-2025-308xx/CVE-2025-30897.json | 27 +- CVE-2025/CVE-2025-30xx/CVE-2025-3050.json | 85 ++- CVE-2025/CVE-2025-315xx/CVE-2025-31500.json | 53 +- CVE-2025/CVE-2025-315xx/CVE-2025-31501.json | 60 +- CVE-2025/CVE-2025-322xx/CVE-2025-32238.json | 27 +- CVE-2025/CVE-2025-324xx/CVE-2025-32455.json | 8 +- CVE-2025/CVE-2025-324xx/CVE-2025-32456.json | 8 +- CVE-2025/CVE-2025-324xx/CVE-2025-32457.json | 8 +- CVE-2025/CVE-2025-324xx/CVE-2025-32458.json | 8 +- CVE-2025/CVE-2025-324xx/CVE-2025-32459.json | 8 +- CVE-2025/CVE-2025-330xx/CVE-2025-33004.json | 51 +- CVE-2025/CVE-2025-330xx/CVE-2025-33005.json | 63 ++- CVE-2025/CVE-2025-330xx/CVE-2025-33079.json | 46 +- CVE-2025/CVE-2025-33xx/CVE-2025-3357.json | 41 +- CVE-2025/CVE-2025-34xx/CVE-2025-3459.json | 8 +- CVE-2025/CVE-2025-34xx/CVE-2025-3460.json | 8 +- CVE-2025/CVE-2025-34xx/CVE-2025-3461.json | 8 +- CVE-2025/CVE-2025-365xx/CVE-2025-36572.json | 89 ++- CVE-2025/CVE-2025-439xx/CVE-2025-43923.json | 31 +- CVE-2025/CVE-2025-439xx/CVE-2025-43924.json | 31 +- CVE-2025/CVE-2025-441xx/CVE-2025-44148.json | 32 +- CVE-2025/CVE-2025-459xx/CVE-2025-45997.json | 32 +- CVE-2025/CVE-2025-461xx/CVE-2025-46154.json | 26 +- CVE-2025/CVE-2025-487xx/CVE-2025-48734.json | 50 +- CVE-2025/CVE-2025-487xx/CVE-2025-48743.json | 52 +- CVE-2025/CVE-2025-487xx/CVE-2025-48744.json | 52 +- CVE-2025/CVE-2025-496xx/CVE-2025-49651.json | 56 ++ CVE-2025/CVE-2025-496xx/CVE-2025-49652.json | 56 ++ CVE-2025/CVE-2025-496xx/CVE-2025-49653.json | 56 ++ CVE-2025/CVE-2025-52xx/CVE-2025-5219.json | 77 ++- CVE-2025/CVE-2025-52xx/CVE-2025-5220.json | 77 ++- CVE-2025/CVE-2025-52xx/CVE-2025-5252.json | 90 ++- CVE-2025/CVE-2025-53xx/CVE-2025-5334.json | 4 +- CVE-2025/CVE-2025-53xx/CVE-2025-5369.json | 88 ++- CVE-2025/CVE-2025-53xx/CVE-2025-5370.json | 88 ++- CVE-2025/CVE-2025-53xx/CVE-2025-5376.json | 88 ++- CVE-2025/CVE-2025-53xx/CVE-2025-5381.json | 77 ++- CVE-2025/CVE-2025-53xx/CVE-2025-5383.json | 77 ++- CVE-2025/CVE-2025-57xx/CVE-2025-5787.json | 82 ++- CVE-2025/CVE-2025-57xx/CVE-2025-5788.json | 82 ++- CVE-2025/CVE-2025-57xx/CVE-2025-5789.json | 82 ++- CVE-2025/CVE-2025-57xx/CVE-2025-5790.json | 82 ++- CVE-2025/CVE-2025-57xx/CVE-2025-5794.json | 66 ++- CVE-2025/CVE-2025-57xx/CVE-2025-5795.json | 67 ++- CVE-2025/CVE-2025-57xx/CVE-2025-5798.json | 67 ++- CVE-2025/CVE-2025-57xx/CVE-2025-5799.json | 67 ++- CVE-2025/CVE-2025-58xx/CVE-2025-5836.json | 67 ++- CVE-2025/CVE-2025-58xx/CVE-2025-5837.json | 88 ++- CVE-2025/CVE-2025-58xx/CVE-2025-5839.json | 61 +- CVE-2025/CVE-2025-58xx/CVE-2025-5847.json | 75 ++- CVE-2025/CVE-2025-58xx/CVE-2025-5848.json | 65 ++- CVE-2025/CVE-2025-58xx/CVE-2025-5849.json | 65 ++- CVE-2025/CVE-2025-58xx/CVE-2025-5850.json | 65 ++- CVE-2025/CVE-2025-58xx/CVE-2025-5851.json | 65 ++- CVE-2025/CVE-2025-58xx/CVE-2025-5852.json | 65 ++- CVE-2025/CVE-2025-58xx/CVE-2025-5853.json | 74 ++- CVE-2025/CVE-2025-58xx/CVE-2025-5854.json | 65 ++- CVE-2025/CVE-2025-58xx/CVE-2025-5855.json | 97 +++- CVE-2025/CVE-2025-58xx/CVE-2025-5859.json | 91 ++- CVE-2025/CVE-2025-58xx/CVE-2025-5860.json | 91 ++- CVE-2025/CVE-2025-58xx/CVE-2025-5861.json | 101 +++- CVE-2025/CVE-2025-58xx/CVE-2025-5862.json | 101 +++- CVE-2025/CVE-2025-58xx/CVE-2025-5863.json | 97 +++- CVE-2025/CVE-2025-58xx/CVE-2025-5888.json | 149 +++++ CVE-2025/CVE-2025-58xx/CVE-2025-5889.json | 145 +++++ CVE-2025/CVE-2025-58xx/CVE-2025-5890.json | 141 +++++ CVE-2025/CVE-2025-58xx/CVE-2025-5891.json | 145 +++++ README.md | 93 ++- _state.csv | 596 ++++++++++---------- 146 files changed, 7409 insertions(+), 935 deletions(-) create mode 100644 CVE-2024/CVE-2024-470xx/CVE-2024-47081.json create mode 100644 CVE-2025/CVE-2025-496xx/CVE-2025-49651.json create mode 100644 CVE-2025/CVE-2025-496xx/CVE-2025-49652.json create mode 100644 CVE-2025/CVE-2025-496xx/CVE-2025-49653.json create mode 100644 CVE-2025/CVE-2025-58xx/CVE-2025-5888.json create mode 100644 CVE-2025/CVE-2025-58xx/CVE-2025-5889.json create mode 100644 CVE-2025/CVE-2025-58xx/CVE-2025-5890.json create mode 100644 CVE-2025/CVE-2025-58xx/CVE-2025-5891.json diff --git a/CVE-2023/CVE-2023-419xx/CVE-2023-41953.json b/CVE-2023/CVE-2023-419xx/CVE-2023-41953.json index a9529335c50..3c4ccf58f51 100644 --- a/CVE-2023/CVE-2023-419xx/CVE-2023-41953.json +++ b/CVE-2023/CVE-2023-419xx/CVE-2023-41953.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41953", "sourceIdentifier": "audit@patchstack.com", "published": "2024-12-09T14:15:08.710", - "lastModified": "2024-12-09T14:15:08.710", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T19:29:02.470", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:properfraction:profilepress:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.13.2", + "matchCriteriaId": "EA7A6C96-3C3A-47BD-A4CA-78D686509C1B" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/wp-user-avatar/vulnerability/wordpress-profilepress-plugin-4-13-1-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-487xx/CVE-2023-48774.json b/CVE-2023/CVE-2023-487xx/CVE-2023-48774.json index 7302d6f703d..3c13752dd02 100644 --- a/CVE-2023/CVE-2023-487xx/CVE-2023-48774.json +++ b/CVE-2023/CVE-2023-487xx/CVE-2023-48774.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48774", "sourceIdentifier": "audit@patchstack.com", "published": "2024-12-09T13:15:33.937", - "lastModified": "2024-12-09T13:15:33.937", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T19:22:58.103", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:northernbeacheswebsites:ideapush:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "8.58", + "matchCriteriaId": "349E73F5-6A90-443F-B108-CBC178F8C876" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/ideapush/vulnerability/wordpress-ideapush-plugin-8-53-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-498xx/CVE-2023-49835.json b/CVE-2023/CVE-2023-498xx/CVE-2023-49835.json index b72c1bfc715..9c94eccb133 100644 --- a/CVE-2023/CVE-2023-498xx/CVE-2023-49835.json +++ b/CVE-2023/CVE-2023-498xx/CVE-2023-49835.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49835", "sourceIdentifier": "audit@patchstack.com", "published": "2024-12-09T13:15:36.733", - "lastModified": "2024-12-09T13:15:36.733", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T19:23:43.620", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:metaphorcreations:post_duplicator:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.32", + "matchCriteriaId": "9EB828FC-CA5C-430D-B023-8D905B202F3D" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/post-duplicator/vulnerability/wordpress-post-duplicator-plugin-2-31-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-500xx/CVE-2023-50082.json b/CVE-2023/CVE-2023-500xx/CVE-2023-50082.json index c87a107adff..e01c00bd047 100644 --- a/CVE-2023/CVE-2023-500xx/CVE-2023-50082.json +++ b/CVE-2023/CVE-2023-500xx/CVE-2023-50082.json @@ -2,7 +2,7 @@ "id": "CVE-2023-50082", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-04T08:15:08.993", - "lastModified": "2024-11-21T08:36:31.107", + "lastModified": "2025-06-09T18:15:23.050", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-508xx/CVE-2023-50882.json b/CVE-2023/CVE-2023-508xx/CVE-2023-50882.json index 7015287f036..edfcf3a1035 100644 --- a/CVE-2023/CVE-2023-508xx/CVE-2023-50882.json +++ b/CVE-2023/CVE-2023-508xx/CVE-2023-50882.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50882", "sourceIdentifier": "audit@patchstack.com", "published": "2024-12-09T13:15:38.720", - "lastModified": "2024-12-09T13:15:38.720", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T19:28:15.550", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:properfraction:profilepress:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.13.3", + "matchCriteriaId": "F655930E-1F4F-48AE-B39F-11CBF939F817" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/wp-user-avatar/vulnerability/wordpress-profilepress-plugin-4-13-2-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-512xx/CVE-2023-51210.json b/CVE-2023/CVE-2023-512xx/CVE-2023-51210.json index 6649848c59d..90d15240d84 100644 --- a/CVE-2023/CVE-2023-512xx/CVE-2023-51210.json +++ b/CVE-2023/CVE-2023-512xx/CVE-2023-51210.json @@ -2,7 +2,7 @@ "id": "CVE-2023-51210", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-23T19:15:08.230", - "lastModified": "2024-11-21T08:37:54.773", + "lastModified": "2025-06-09T19:15:22.553", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-71xx/CVE-2023-7168.json b/CVE-2023/CVE-2023-71xx/CVE-2023-7168.json index c2a801d3d5e..dc4c37e85d8 100644 --- a/CVE-2023/CVE-2023-71xx/CVE-2023-7168.json +++ b/CVE-2023/CVE-2023-71xx/CVE-2023-7168.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7168", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:30.120", - "lastModified": "2025-05-20T15:16:00.430", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:54:07.350", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:antonpug:better_flow_button_for_jetpack:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "8.0", + "matchCriteriaId": "2725FE3D-E0DF-4515-B8A4-AC19FA8C5C3B" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/715ded45-04ee-40c1-8acb-bd40d0fe30ec/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/715ded45-04ee-40c1-8acb-bd40d0fe30ec/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-72xx/CVE-2023-7239.json b/CVE-2023/CVE-2023-72xx/CVE-2023-7239.json index 6a057507456..702af771b96 100644 --- a/CVE-2023/CVE-2023-72xx/CVE-2023-7239.json +++ b/CVE-2023/CVE-2023-72xx/CVE-2023-7239.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7239", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:30.920", - "lastModified": "2025-05-16T17:15:49.190", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:31:08.873", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jeroensormani:wp_dashboard_notes:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.0.11", + "matchCriteriaId": "4503DC31-C24B-4A80-A58A-4F6E28CF5FEB" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/6e6afe50-27f9-41fa-a94b-f44df0850e2c/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-72xx/CVE-2023-7297.json b/CVE-2023/CVE-2023-72xx/CVE-2023-7297.json index e64636fcc31..f4abaa4f22b 100644 --- a/CVE-2023/CVE-2023-72xx/CVE-2023-7297.json +++ b/CVE-2023/CVE-2023-72xx/CVE-2023-7297.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7297", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:31.007", - "lastModified": "2025-05-16T17:15:49.340", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:29:35.413", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:reneade:twitterposts:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0.2", + "matchCriteriaId": "9729E6F4-715F-4107-94FA-42CC6DD61C64" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/3632dfa1-2948-4622-a8fd-31edb8b22383/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-02xx/CVE-2024-0249.json b/CVE-2024/CVE-2024-02xx/CVE-2024-0249.json index 3ed354a699c..2610273aa12 100644 --- a/CVE-2024/CVE-2024-02xx/CVE-2024-0249.json +++ b/CVE-2024/CVE-2024-02xx/CVE-2024-0249.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0249", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:31.090", - "lastModified": "2025-05-16T17:15:49.497", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:28:56.670", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hijiriworld:advanced_schedule_posts:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.1.8", + "matchCriteriaId": "B59B7AC2-FD82-4C4C-B8A7-009EFA93BDD1" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/e7ee3e73-1086-421f-b586-d415a45a6c8e/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0589.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0589.json index 50deb10f7b7..be736ce5bc2 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0589.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0589.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0589", "sourceIdentifier": "security@devolutions.net", "published": "2024-01-31T13:15:10.567", - "lastModified": "2024-11-21T08:46:57.360", + "lastModified": "2025-06-09T19:15:23.393", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0970.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0970.json index d9560a43017..d71fcfa7da8 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0970.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0970.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0970", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:32.200", - "lastModified": "2025-05-16T17:15:49.807", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:24:48.597", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mooveagency:user_activity_tracking_and_log:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.1.4", + "matchCriteriaId": "40EFB2E7-BE3F-40D9-AFC7-DF48EE5F3FD8" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/7df6877c-6640-41be-aacb-20c7da61e4db/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10098.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10098.json index 5bd13cab9cb..e352c1a8561 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10098.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10098.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10098", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:32.620", - "lastModified": "2025-05-20T16:15:24.010", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:23:28.110", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:spiderteams:applyonline_-_application_form_builder_and_manager:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.6.3", + "matchCriteriaId": "B9D0FFE7-0C88-47E9-95CC-C96CA189D45C" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/242dac1f-9a1f-4fde-b8c7-374bd451071d/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/242dac1f-9a1f-4fde-b8c7-374bd451071d/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10149.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10149.json index 280c61a5aa7..a970279de98 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10149.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10149.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10149", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:33.037", - "lastModified": "2025-05-20T16:15:24.687", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:20:18.567", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cm-wp:social_slider_widget:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.2.9", + "matchCriteriaId": "282EF2D0-EB5F-42E8-958E-FA885329DD75" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/1619dc4b-4e5e-4b82-820b-3c4e732db3ad/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/1619dc4b-4e5e-4b82-820b-3c4e732db3ad/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10362.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10362.json index bea1e5c0a16..7c2957e14c2 100644 --- a/CVE-2024/CVE-2024-103xx/CVE-2024-10362.json +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10362.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10362", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:33.120", - "lastModified": "2025-05-20T20:15:27.700", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:18:46.303", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:inisev:social_media_share_buttons_\\&_social_sharing_icons:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.9.1", + "matchCriteriaId": "D263A05F-9BFE-4577-AAF9-F6CA71217803" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/701f653b-a0c3-49b4-972e-f26c3633ad92/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/701f653b-a0c3-49b4-972e-f26c3633ad92/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10475.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10475.json index 406e0f82860..19158d39512 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10475.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10475.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10475", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:33.207", - "lastModified": "2025-05-20T20:15:27.857", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:17:46.647", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themehunk:contact_form_\\&_lead_form_elementor_builder:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.9.8", + "matchCriteriaId": "6EF48C59-DEDC-4685-AEA2-0542B8742120" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/faca59fb-6b59-45b0-8b97-c4125d9d3cb3/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/faca59fb-6b59-45b0-8b97-c4125d9d3cb3/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10631.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10631.json index e8d183da3d9..58aaa6f940e 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10631.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10631.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10631", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:33.380", - "lastModified": "2025-05-20T16:15:24.960", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:11:29.627", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:flickdevs:countdown_timer_for_wordpress_block_editor:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0.5", + "matchCriteriaId": "F7A4D390-73CD-4137-8AE1-761C316CB662" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/b153fb5e-7df2-491b-b61b-6f90314c7b04/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/b153fb5e-7df2-491b-b61b-6f90314c7b04/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10632.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10632.json index e868a536d71..925bfe40d6f 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10632.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10632.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10632", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:33.460", - "lastModified": "2025-05-20T20:15:28.010", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:10:20.487", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nokautpl:nokaut_offers_box:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.4.0", + "matchCriteriaId": "8DF02E58-E9D9-4F3D-BB1E-F446D17B4DAF" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/17afba70-f213-47f6-aea2-59288ca92549/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10634.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10634.json index e022aa27b28..356afbca8f0 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10634.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10634.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10634", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:33.543", - "lastModified": "2025-05-20T20:15:28.323", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:09:43.180", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nokautpl:nokaut_offers_box:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.4.0", + "matchCriteriaId": "8DF02E58-E9D9-4F3D-BB1E-F446D17B4DAF" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/97de2ca3-ee64-480b-a5b0-7549533c2936/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/97de2ca3-ee64-480b-a5b0-7549533c2936/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11140.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11140.json index bb8a87589dc..bb7a704fae0 100644 --- a/CVE-2024/CVE-2024-111xx/CVE-2024-11140.json +++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11140.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11140", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:33.970", - "lastModified": "2025-05-20T16:15:25.250", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:08:23.107", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vk011:real_wp_shop_lite_ajax_ecommerce_shopping_cart:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.0.8", + "matchCriteriaId": "484E4788-49D9-4970-BC48-94A30EDC58E6" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/b3448dff-a839-45aa-8d5a-d359e50ab7fd/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/b3448dff-a839-45aa-8d5a-d359e50ab7fd/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11189.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11189.json index da12a8da4af..fd0b84791b1 100644 --- a/CVE-2024/CVE-2024-111xx/CVE-2024-11189.json +++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11189.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11189", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:34.140", - "lastModified": "2025-05-20T20:15:29.040", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:53:11.783", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:reputeinfosystems:social_share_and_social_locker:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.4.2", + "matchCriteriaId": "E4E3A8F0-CF8D-42F2-BEB1-8AE69919E63D" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/f3d1473a-6d25-447d-af27-f315323fdd62/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/f3d1473a-6d25-447d-af27-f315323fdd62/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-113xx/CVE-2024-11372.json b/CVE-2024/CVE-2024-113xx/CVE-2024-11372.json index 45e83e8c4df..a28cec74b65 100644 --- a/CVE-2024/CVE-2024-113xx/CVE-2024-11372.json +++ b/CVE-2024/CVE-2024-113xx/CVE-2024-11372.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11372", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:35.013", - "lastModified": "2025-05-20T20:15:29.857", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:51:54.680", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:floriansimunek:connexion_logs:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "3.0.2", + "matchCriteriaId": "A96CF14D-40E8-4FDF-9B31-13E493358FD0" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/de74199a-001e-4388-82ae-70cfd5a49457/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/de74199a-001e-4388-82ae-70cfd5a49457/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-113xx/CVE-2024-11373.json b/CVE-2024/CVE-2024-113xx/CVE-2024-11373.json index ecf7bc369d0..7be3bd5c4d6 100644 --- a/CVE-2024/CVE-2024-113xx/CVE-2024-11373.json +++ b/CVE-2024/CVE-2024-113xx/CVE-2024-11373.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11373", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:35.193", - "lastModified": "2025-05-20T20:15:29.993", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:51:30.493", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:floriansimunek:connexion_logs:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "3.0.2", + "matchCriteriaId": "A96CF14D-40E8-4FDF-9B31-13E493358FD0" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/e9ef847f-3a3f-4030-828b-78db0044e142/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/e9ef847f-3a3f-4030-828b-78db0044e142/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-115xx/CVE-2024-11502.json b/CVE-2024/CVE-2024-115xx/CVE-2024-11502.json index fa1befe3430..6eac2dc37d7 100644 --- a/CVE-2024/CVE-2024-115xx/CVE-2024-11502.json +++ b/CVE-2024/CVE-2024-115xx/CVE-2024-11502.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11502", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:35.337", - "lastModified": "2025-05-20T20:15:30.143", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-09T18:49:53.787", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,51 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpchurchteam:planning_center_online_giving:1.0.0:*:*:*:*:wordpress:*:*", + "matchCriteriaId": "8B100963-6A81-487B-A8C3-FB465345BFE7" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/d9bea52e-af32-449f-97b6-1dcfb2051bda/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/d9bea52e-af32-449f-97b6-1dcfb2051bda/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-117xx/CVE-2024-11718.json b/CVE-2024/CVE-2024-117xx/CVE-2024-11718.json index 1e50bf02d75..edadd3397d6 100644 --- a/CVE-2024/CVE-2024-117xx/CVE-2024-11718.json +++ b/CVE-2024/CVE-2024-117xx/CVE-2024-11718.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11718", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:35.480", - "lastModified": "2025-05-20T20:15:30.280", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-09T18:47:33.240", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:couleurcitron:tarteaucitron-wp:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "0.3.0", + "matchCriteriaId": "001D5883-16E1-4241-A549-ABD0B739CAAA" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/02da3a49-20e4-4476-a78d-4c627994a90a/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/02da3a49-20e4-4476-a78d-4c627994a90a/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-117xx/CVE-2024-11719.json b/CVE-2024/CVE-2024-117xx/CVE-2024-11719.json index 0f4c285e1f8..db90fd3b96b 100644 --- a/CVE-2024/CVE-2024-117xx/CVE-2024-11719.json +++ b/CVE-2024/CVE-2024-117xx/CVE-2024-11719.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11719", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:35.577", - "lastModified": "2025-05-20T20:15:30.420", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-09T18:44:47.300", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:couleurcitron:tarteaucitron-wp:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "0.3.0", + "matchCriteriaId": "001D5883-16E1-4241-A549-ABD0B739CAAA" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/64c2a296-5fc6-450e-a12d-75cbf8b73e3a/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/64c2a296-5fc6-450e-a12d-75cbf8b73e3a/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-118xx/CVE-2024-11843.json b/CVE-2024/CVE-2024-118xx/CVE-2024-11843.json index bcf1faf53d7..75cb6584cf2 100644 --- a/CVE-2024/CVE-2024-118xx/CVE-2024-11843.json +++ b/CVE-2024/CVE-2024-118xx/CVE-2024-11843.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11843", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:35.660", - "lastModified": "2025-05-20T20:15:30.560", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-09T18:43:44.440", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:projectpanorama:panorama:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.5.1", + "matchCriteriaId": "D37E8514-92F3-4238-974B-7288CA514F36" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/0dd41559-d88a-4018-a0f0-c8944b6d6f0a/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/0dd41559-d88a-4018-a0f0-c8944b6d6f0a/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12282.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12282.json index 4fee843d829..caa45e84f2d 100644 --- a/CVE-2024/CVE-2024-122xx/CVE-2024-12282.json +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12282.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12282", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:35.740", - "lastModified": "2025-05-20T20:15:30.693", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-09T18:41:15.260", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:smyx:wp-connect:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.5.6", + "matchCriteriaId": "98DC3BAA-D609-45D0-9684-0BDB93C48B22" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/2d81f038-e2bb-4906-a954-78dc971ed793/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/2d81f038-e2bb-4906-a954-78dc971ed793/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12301.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12301.json index ad9a740122f..106afdbdf33 100644 --- a/CVE-2024/CVE-2024-123xx/CVE-2024-12301.json +++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12301.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12301", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:35.837", - "lastModified": "2025-05-20T20:15:30.827", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-09T18:42:17.283", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:joomlaserviceprovider:jsp_store_locator:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0", + "matchCriteriaId": "751745B9-D321-4FA9-AF57-F555723FBBFA" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/5d93db07-415f-475b-a76d-2e12f849a4dc/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/5d93db07-415f-475b-a76d-2e12f849a4dc/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12750.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12750.json index fc935aefe6e..848c68739e3 100644 --- a/CVE-2024/CVE-2024-127xx/CVE-2024-12750.json +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12750.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12750", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:37.090", - "lastModified": "2025-05-20T20:15:32.760", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-09T18:57:14.990", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:raiserweb:competition_form:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.0", + "matchCriteriaId": "8525BEF0-62E6-4E6C-8FE8-AFBD37F95972" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/f3570bdc-659f-4a03-96f8-b4f9f045f910/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/f3570bdc-659f-4a03-96f8-b4f9f045f910/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-128xx/CVE-2024-12873.json b/CVE-2024/CVE-2024-128xx/CVE-2024-12873.json index f4e52c5a0a2..88ddadbe390 100644 --- a/CVE-2024/CVE-2024-128xx/CVE-2024-12873.json +++ b/CVE-2024/CVE-2024-128xx/CVE-2024-12873.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12873", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:37.850", - "lastModified": "2025-05-20T19:15:48.787", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T19:57:23.357", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f1logic:custom_field_manager:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0", + "matchCriteriaId": "492EBE87-843E-4D18-9359-28EE4371B6AF" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/3e82d45f-7b8f-424e-a8d7-be64f5acf65e/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/3e82d45f-7b8f-424e-a8d7-be64f5acf65e/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-228xx/CVE-2024-22860.json b/CVE-2024/CVE-2024-228xx/CVE-2024-22860.json index 19cce8fd66e..03dabde815a 100644 --- a/CVE-2024/CVE-2024-228xx/CVE-2024-22860.json +++ b/CVE-2024/CVE-2024-228xx/CVE-2024-22860.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22860", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-27T06:15:48.430", - "lastModified": "2024-11-21T08:56:43.380", + "lastModified": "2025-06-09T19:15:23.640", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-190" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-228xx/CVE-2024-22876.json b/CVE-2024/CVE-2024-228xx/CVE-2024-22876.json index 82f29d94b73..3b5ba3483e8 100644 --- a/CVE-2024/CVE-2024-228xx/CVE-2024-22876.json +++ b/CVE-2024/CVE-2024-228xx/CVE-2024-22876.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22876", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-19T14:15:13.510", - "lastModified": "2024-11-21T08:56:44.390", + "lastModified": "2025-06-09T18:15:24.587", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-243xx/CVE-2024-24330.json b/CVE-2024/CVE-2024-243xx/CVE-2024-24330.json index 227de5e5629..33707a5bd68 100644 --- a/CVE-2024/CVE-2024-243xx/CVE-2024-24330.json +++ b/CVE-2024/CVE-2024-243xx/CVE-2024-24330.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24330", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-30T15:15:09.597", - "lastModified": "2024-11-21T08:59:11.363", + "lastModified": "2025-06-09T19:15:23.907", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-383xx/CVE-2024-38341.json b/CVE-2024/CVE-2024-383xx/CVE-2024-38341.json index 5266e6ab929..84849c92143 100644 --- a/CVE-2024/CVE-2024-383xx/CVE-2024-38341.json +++ b/CVE-2024/CVE-2024-383xx/CVE-2024-38341.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38341", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-05-28T16:15:32.847", - "lastModified": "2025-05-29T14:29:50.247", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:57:54.563", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,12 +69,58 @@ "value": "CWE-328" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-326" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:sterling_secure_proxy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.0.0.0", + "versionEndIncluding": "6.0.3.1", + "matchCriteriaId": "4C123481-383C-4001-B5DB-C0A31D48EDEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:sterling_secure_proxy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1.0.0", + "versionEndIncluding": "6.1.0.1", + "matchCriteriaId": "CE4CE662-8122-4C9E-992C-AA3E43D05460" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:sterling_secure_proxy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2.0.0", + "versionEndIncluding": "6.2.0.1", + "matchCriteriaId": "739F6EB7-6130-4EAD-AF39-2D0F2249BCF9" + } + ] + } + ] } ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7234888", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45094.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45094.json index 3fc4134963a..054031ef872 100644 --- a/CVE-2024/CVE-2024-450xx/CVE-2024-45094.json +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45094.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45094", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-05-27T23:15:21.093", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:51:17.193", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,10 +71,116 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ibm:hardware_management_console_r10.0_firmware:10.0.245.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C14D7ACA-A436-4336-9714-4A23704BEBC1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ibm:hardware_management_console_r10.0_firmware:10.1.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9C367DAF-0256-4BC0-A9B8-3BB74371C08A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:ibm:hardware_management_console_r10.0:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA58EDF6-EACA-4337-8EB7-6C5F375907A4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ibm:hardware_management_console_r9.4_firmware:89.40.83.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E66184DD-CC9A-4285-BBB4-72D09D5417EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ibm:hardware_management_console_r9.4_firmware:89.41.25.0:*:*:*:*:*:*:*", + "matchCriteriaId": "151F5EA6-A9F0-4470-91BE-049E87FEA507" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ibm:hardware_management_console_r9.4_firmware:89.42.18.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BB00FAC3-685F-41FC-BD7D-DCBB87E52958" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:ibm:hardware_management_console_r9.4:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B2F91BA-AE0A-4988-ABFB-02B545BCF1A2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ibm:hardware_management_console_r9.3_firmware:89.33.45.0:*:*:*:*:*:*:*", + "matchCriteriaId": "99A3CDB3-4A6D-499B-913E-A0B220C09B19" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ibm:hardware_management_console_r9.3_firmware:89.33.52.0:*:*:*:*:*:*:*", + "matchCriteriaId": "EEBC9010-19AC-48F2-A3B6-8659C8D87EFA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:ibm:hardware_management_console_r9.3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "392890ED-DB84-4904-AD60-A993A248FF85" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7234276", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47081.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47081.json new file mode 100644 index 00000000000..101c9ccd274 --- /dev/null +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47081.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-47081", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-06-09T18:15:24.983", + "lastModified": "2025-06-09T18:15:24.983", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Requests is a HTTP library. Due to a URL parsing issue, Requests releases prior to 2.32.4 may leak .netrc credentials to third parties for specific maliciously-crafted URLs. Users should upgrade to version 2.32.4 to receive a fix. For older versions of Requests, use of the .netrc file can be disabled with `trust_env=False` on one's Requests Session." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/psf/requests/pull/6965", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7", + "source": "security-advisories@github.com" + }, + { + "url": "https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env", + "source": "security-advisories@github.com" + }, + { + "url": "https://seclists.org/fulldisclosure/2025/Jun/2", + "source": "security-advisories@github.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2025/Jun/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2025/06/03/11", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2025/06/03/9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2025/06/04/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2025/06/04/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48019.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48019.json index ae5381526b8..face15c389e 100644 --- a/CVE-2024/CVE-2024-480xx/CVE-2024-48019.json +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48019.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48019", "sourceIdentifier": "security@apache.org", "published": "2025-02-04T19:15:31.733", - "lastModified": "2025-02-07T22:15:12.300", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T19:49:43.753", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -53,16 +53,59 @@ "value": "CWE-552" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:doris:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.1.0", + "versionEndExcluding": "2.1.8", + "matchCriteriaId": "F80E2297-7690-4751-9027-10D1A6B9964F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:doris:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0.0", + "versionEndExcluding": "3.0.3", + "matchCriteriaId": "A690C58E-4B42-402D-B627-1E7D79E8AA83" + } + ] + } + ] } ], "references": [ { "url": "https://lists.apache.org/thread/p70klgmyrgknhn0t195261wvwv5jw6hr", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2025/02/04/2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48704.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48704.json index 578fdc25e4e..21ec9dffe87 100644 --- a/CVE-2024/CVE-2024-487xx/CVE-2024-48704.json +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48704.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48704", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-23T16:15:24.403", - "lastModified": "2025-06-02T18:15:23.020", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T19:00:51.830", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:medical_card_generation_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "024186C5-26DF-43AC-BDEA-732C94D55DF8" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/0xBhushan/Writeups/blob/main/CVE/phpGurukul/Medical%20Card%20Generation%20System/HTML%20Injection%28pagedes%29.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/0xBhushan/Writeups/blob/main/CVE/phpGurukul/Medical%20Card%20Generation%20System/HTML%20Injection%28pagedes%29.pdf", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49350.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49350.json index 1daaa77572c..acfc7a78142 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49350.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49350.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49350", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-05-29T20:15:25.213", - "lastModified": "2025-05-30T16:31:03.107", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:59:11.143", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,12 +69,100 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:linux:*:*", + "versionStartIncluding": "11.1", + "versionEndIncluding": "11.1.4.7", + "matchCriteriaId": "DB12E021-90D2-456A-8538-109B4B4E937A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:unix:*:*", + "versionStartIncluding": "11.1", + "versionEndIncluding": "11.1.4.7", + "matchCriteriaId": "6DC85F9D-CD17-472B-B413-088145588214" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:windows:*:*", + "versionStartIncluding": "11.1", + "versionEndIncluding": "11.1.4.7", + "matchCriteriaId": "D396078C-3A43-4D93-9BBB-D68652D2C59B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:linux:*:*", + "versionStartIncluding": "11.5", + "versionEndIncluding": "11.5.9", + "matchCriteriaId": "A9058600-75B6-4228-9B77-C6DAF915F158" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:unix:*:*", + "versionStartIncluding": "11.5", + "versionEndIncluding": "11.5.9", + "matchCriteriaId": "A7C9B6A1-749A-4388-AC61-318F79DB4519" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:windows:*:*", + "versionStartIncluding": "11.5", + "versionEndIncluding": "11.5.9", + "matchCriteriaId": "C7DD6EFE-C2DA-42BC-931C-4C347F49BE72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:linux:*:*", + "versionStartIncluding": "12.1.0", + "versionEndIncluding": "12.1.1", + "matchCriteriaId": "685E5B9C-F82E-4BF5-84D2-709CA5FB7F3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:unix:*:*", + "versionStartIncluding": "12.1.0", + "versionEndIncluding": "12.1.1", + "matchCriteriaId": "41FD572B-97C2-4734-BCE7-2F9D59D38C22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:windows:*:*", + "versionStartIncluding": "12.1.0", + "versionEndIncluding": "12.1.1", + "matchCriteriaId": "21C731C8-8712-4B60-852E-70B5EB61C43A" + } + ] + } + ] } ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7235069", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51453.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51453.json index 93a25f6b0fc..9664cc09e95 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51453.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51453.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51453", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-05-28T16:15:33.043", - "lastModified": "2025-05-29T14:29:50.247", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:58:08.980", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -51,10 +71,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:sterling_secure_proxy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2.0.0", + "versionEndIncluding": "6.2.0.1", + "matchCriteriaId": "739F6EB7-6130-4EAD-AF39-2D0F2249BCF9" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7234887", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-517xx/CVE-2024-51715.json b/CVE-2024/CVE-2024-517xx/CVE-2024-51715.json index fa7b7c38ed1..5ce7118533c 100644 --- a/CVE-2024/CVE-2024-517xx/CVE-2024-51715.json +++ b/CVE-2024/CVE-2024-517xx/CVE-2024-51715.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51715", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:08.460", - "lastModified": "2025-01-07T11:15:08.460", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T19:30:31.537", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:flowdee:clickwhale:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.4.2", + "matchCriteriaId": "4B5BC4EB-40C7-4C8F-93FA-4F5D678E0893" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/clickwhale/vulnerability/wordpress-clickwhale-plugin-2-4-1-sql-injection-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-519xx/CVE-2024-51941.json b/CVE-2024/CVE-2024-519xx/CVE-2024-51941.json index c96aaa7762d..a37f0af3675 100644 --- a/CVE-2024/CVE-2024-519xx/CVE-2024-51941.json +++ b/CVE-2024/CVE-2024-519xx/CVE-2024-51941.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51941", "sourceIdentifier": "security@apache.org", "published": "2025-01-21T22:15:12.447", - "lastModified": "2025-01-22T15:15:14.247", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T19:35:29.127", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,51 @@ "value": "CWE-75" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:ambari:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.7.8", + "matchCriteriaId": "F657FE3D-6887-40EF-91E2-910EE1997D2D" + } + ] + } + ] } ], "references": [ { "url": "https://lists.apache.org/thread/xq50nlff7o7z1kq3y637clzzl6mjhl8j", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2025/01/21/9", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-538xx/CVE-2024-53814.json b/CVE-2024/CVE-2024-538xx/CVE-2024-53814.json index a274155dbcf..23536233b04 100644 --- a/CVE-2024/CVE-2024-538xx/CVE-2024-53814.json +++ b/CVE-2024/CVE-2024-538xx/CVE-2024-53814.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53814", "sourceIdentifier": "audit@patchstack.com", "published": "2024-12-09T14:15:12.003", - "lastModified": "2024-12-09T14:15:12.003", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T19:29:39.997", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:analytify:analytify_-_google_analytics_dashboard:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.5.0", + "matchCriteriaId": "4C9A7029-14CF-4914-A850-85CB6A5C8CE7" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/wp-analytify/vulnerability/wordpress-analytify-plugin-5-4-3-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53908.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53908.json index 4bb8465612c..04340e79efa 100644 --- a/CVE-2024/CVE-2024-539xx/CVE-2024-53908.json +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53908.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53908", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-06T12:15:18.583", - "lastModified": "2024-12-06T17:15:12.350", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T19:51:17.797", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.2", + "versionEndExcluding": "4.2.17", + "matchCriteriaId": "43AD4E98-EF36-4D24-9F42-3235DFBCFF75" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.0", + "versionEndExcluding": "5.0.10", + "matchCriteriaId": "6EAB5D22-7E1E-45E7-A577-95051DC91E5E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.1", + "versionEndExcluding": "5.1.4", + "matchCriteriaId": "1231C967-2BD2-4263-B892-500964ED3C12" + } + ] + } + ] + } + ], "references": [ { "url": "https://docs.djangoproject.com/en/dev/releases/security/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://groups.google.com/g/django-announce", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.openwall.com/lists/oss-security/2024/12/04/3", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-562xx/CVE-2024-56277.json b/CVE-2024/CVE-2024-562xx/CVE-2024-56277.json index fbf484bae8a..331a0163e06 100644 --- a/CVE-2024/CVE-2024-562xx/CVE-2024-56277.json +++ b/CVE-2024/CVE-2024-562xx/CVE-2024-56277.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56277", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-21T14:15:09.593", - "lastModified": "2025-01-21T14:15:09.593", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T19:33:43.953", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ays-pro:poll_maker:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "5.5.5", + "matchCriteriaId": "19A61F63-5617-455C-AA20-0CA79E7DA222" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/poll-maker/vulnerability/wordpress-poll-maker-plugin-5-5-5-html-injection-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1499.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1499.json index d9481150cff..b121f33b5fe 100644 --- a/CVE-2025/CVE-2025-14xx/CVE-2025-1499.json +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1499.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1499", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-06-01T12:15:24.230", - "lastModified": "2025-06-02T17:32:17.397", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:08:54.680", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,35 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:infosphere_information_server:11.7:*:*:*:*:*:*:*", + "matchCriteriaId": "4CED2F00-89E3-4BA9-A8FB-D43B308A59A8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:infosphere_information_server_on_cloud:11.7:*:*:*:*:*:*:*", + "matchCriteriaId": "7BCD0E05-A8D1-4F6E-B88C-A48CCE006EDB" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7233154", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-200xx/CVE-2025-20063.json b/CVE-2025/CVE-2025-200xx/CVE-2025-20063.json index 1f778ac49b9..799ed52de34 100644 --- a/CVE-2025/CVE-2025-200xx/CVE-2025-20063.json +++ b/CVE-2025/CVE-2025-200xx/CVE-2025-20063.json @@ -2,13 +2,17 @@ "id": "CVE-2025-20063", "sourceIdentifier": "scy@openharmony.io", "published": "2025-06-08T12:15:20.493", - "lastModified": "2025-06-09T12:15:47.880", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T19:07:27.137", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause apps crash through type confusion." + }, + { + "lang": "es", + "value": "En OpenHarmony v5.0.3 y versiones anteriores, permitir que un atacante local provoque que las aplicaciones se bloqueen mediante confusi\u00f3n de tipos." } ], "metrics": { @@ -32,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -47,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", + "versionEndIncluding": "5.0.3", + "matchCriteriaId": "3FF0EA48-E2F6-4535-A668-108850DFF515" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-210xx/CVE-2025-21082.json b/CVE-2025/CVE-2025-210xx/CVE-2025-21082.json index e0285db0f9f..ceaea9eb983 100644 --- a/CVE-2025/CVE-2025-210xx/CVE-2025-21082.json +++ b/CVE-2025/CVE-2025-210xx/CVE-2025-21082.json @@ -2,13 +2,17 @@ "id": "CVE-2025-21082", "sourceIdentifier": "scy@openharmony.io", "published": "2025-06-08T12:15:21.433", - "lastModified": "2025-06-09T12:15:47.880", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T19:07:20.283", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause apps crash through type confusion." + }, + { + "lang": "es", + "value": "En OpenHarmony v5.0.3 y versiones anteriores, permitir que un atacante local provoque que las aplicaciones se bloqueen mediante confusi\u00f3n de tipos." } ], "metrics": { @@ -32,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -47,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", + "versionEndIncluding": "5.0.3", + "matchCriteriaId": "3FF0EA48-E2F6-4535-A668-108850DFF515" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22296.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22296.json index 2f51bccab89..b954744fb6f 100644 --- a/CVE-2025/CVE-2025-222xx/CVE-2025-22296.json +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22296.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22296", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T17:15:32.520", - "lastModified": "2025-01-07T17:15:32.520", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T19:30:55.407", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hashthemes:hash_elements:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.5.1", + "matchCriteriaId": "9273F6A9-B73A-41EB-AFD4-F2ED3F762CFE" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/hash-elements/vulnerability/wordpress-hash-elements-plugin-1-4-9-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23195.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23195.json index 89998523313..c5b61972480 100644 --- a/CVE-2025/CVE-2025-231xx/CVE-2025-23195.json +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23195.json @@ -2,8 +2,8 @@ "id": "CVE-2025-23195", "sourceIdentifier": "security@apache.org", "published": "2025-01-21T22:15:12.863", - "lastModified": "2025-01-22T15:15:15.237", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T19:36:09.710", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:ambari:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.7.9", + "matchCriteriaId": "DAB94B88-4AAB-4690-8A00-DD223D72E8D4" + } + ] + } + ] + } + ], "references": [ { "url": "https://lists.apache.org/thread/hsb6mvxd7g37dq1ygtd0pd88gs9tfcwq", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2025/01/21/7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23196.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23196.json index 2adb3f2dc43..4cc2b4289b3 100644 --- a/CVE-2025/CVE-2025-231xx/CVE-2025-23196.json +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23196.json @@ -2,8 +2,8 @@ "id": "CVE-2025-23196", "sourceIdentifier": "security@apache.org", "published": "2025-01-21T22:15:12.987", - "lastModified": "2025-01-22T15:15:15.390", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T19:42:00.100", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:ambari:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.7.9", + "matchCriteriaId": "DAB94B88-4AAB-4690-8A00-DD223D72E8D4" + } + ] + } + ] + } + ], "references": [ { "url": "https://lists.apache.org/thread/70g1l5lxvko7kvhyxmtmklhhfrlon837", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2025/01/21/8", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-232xx/CVE-2025-23235.json b/CVE-2025/CVE-2025-232xx/CVE-2025-23235.json index c6bf781fda1..22479ab7b85 100644 --- a/CVE-2025/CVE-2025-232xx/CVE-2025-23235.json +++ b/CVE-2025/CVE-2025-232xx/CVE-2025-23235.json @@ -2,13 +2,17 @@ "id": "CVE-2025-23235", "sourceIdentifier": "scy@openharmony.io", "published": "2025-06-08T12:15:21.590", - "lastModified": "2025-06-09T12:15:47.880", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T19:07:15.063", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through out-of-bounds read." + }, + { + "lang": "es", + "value": "En OpenHarmony v5.0.3 y versiones anteriores se permite que un atacante local provoque un ataque DOS mediante lecturas fuera de los l\u00edmites." } ], "metrics": { @@ -32,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -47,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", + "versionEndIncluding": "5.0.3", + "matchCriteriaId": "3FF0EA48-E2F6-4535-A668-108850DFF515" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24493.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24493.json index 57222a9ff96..e8f010dc26d 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24493.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24493.json @@ -2,13 +2,17 @@ "id": "CVE-2025-24493", "sourceIdentifier": "scy@openharmony.io", "published": "2025-06-08T12:15:21.763", - "lastModified": "2025-06-09T12:15:47.880", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T19:07:08.100", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through race condition." + }, + { + "lang": "es", + "value": "En OpenHarmony v5.0.3 y versiones anteriores, permitir que un atacante local provoque una fuga de informaci\u00f3n a trav\u00e9s de una condici\u00f3n de ejecuci\u00f3n." } ], "metrics": { @@ -32,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 } ] }, @@ -47,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", + "versionEndIncluding": "5.0.3", + "matchCriteriaId": "3FF0EA48-E2F6-4535-A668-108850DFF515" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24543.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24543.json index 08bf58d2770..aa8c08a75f2 100644 --- a/CVE-2025/CVE-2025-245xx/CVE-2025-24543.json +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24543.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24543", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-24T18:15:32.703", - "lastModified": "2025-01-24T18:15:32.703", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T19:34:04.443", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rstheme:ultimate_coming_soon_\\&_maintenance:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.1.0", + "matchCriteriaId": "4859FD15-6E91-4829-A1A5-3452428F5586" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/ultimate-coming-soon/vulnerability/wordpress-ultimate-coming-soon-maintenance-plugin-1-0-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24546.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24546.json index 9d1741c8523..575ab24d0be 100644 --- a/CVE-2025/CVE-2025-245xx/CVE-2025-24546.json +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24546.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24546", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-24T18:15:32.893", - "lastModified": "2025-01-24T18:15:32.893", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T19:34:47.433", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rstheme:ultimate_coming_soon_\\&_maintenance:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.1.0", + "matchCriteriaId": "4859FD15-6E91-4829-A1A5-3452428F5586" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/ultimate-coming-soon/vulnerability/wordpress-ultimate-coming-soon-maintenance-plugin-1-0-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24650.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24650.json index 6fa66925e42..905aef31c69 100644 --- a/CVE-2025/CVE-2025-246xx/CVE-2025-24650.json +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24650.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24650", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-24T18:15:39.347", - "lastModified": "2025-01-24T18:15:39.347", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:53:22.317", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themefic:tourfic:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.15.4", + "matchCriteriaId": "9CE4D8B0-0461-441A-80F1-C1F9B8A7663E" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/tourfic/vulnerability/wordpress-tourfic-plugin-2-15-3-arbitrary-file-upload-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24698.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24698.json index b46e57d53e0..befe3d29604 100644 --- a/CVE-2025/CVE-2025-246xx/CVE-2025-24698.json +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24698.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24698", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-24T18:15:43.050", - "lastModified": "2025-01-24T18:15:43.050", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:54:46.353", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:g5plus:essential_real_estate:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.1.9", + "matchCriteriaId": "03557490-8DA3-47C6-BF6D-98B6519EE284" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/essential-real-estate/vulnerability/wordpress-essential-real-estate-plugin-5-1-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24715.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24715.json index 1d84506a91e..96d99d092f6 100644 --- a/CVE-2025/CVE-2025-247xx/CVE-2025-24715.json +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24715.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24715", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-24T18:15:44.913", - "lastModified": "2025-01-24T18:15:44.913", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:55:37.650", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wow-company:counter_box:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.0.6", + "matchCriteriaId": "510D2249-A147-4E35-A7C4-CAB3239FADD8" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/counter-box/vulnerability/wordpress-counter-box-plugin-2-0-5-cross-site-request-forgery-csrf-to-settings-change-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24733.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24733.json index 2ff8dcb39e5..94a7a5d1f97 100644 --- a/CVE-2025/CVE-2025-247xx/CVE-2025-24733.json +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24733.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24733", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-24T18:15:47.697", - "lastModified": "2025-01-24T18:15:47.697", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:56:58.550", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,12 +69,43 @@ "value": "CWE-98" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-706" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:addonmaster:post_grid_master:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.4.13", + "matchCriteriaId": "34808680-0416-4C78-876A-DA6892695A78" + } + ] + } + ] } ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/ajax-filter-posts/vulnerability/wordpress-post-grid-master-plugin-3-4-12-local-file-inclusion-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24736.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24736.json index 5123ed2e28e..671e2671a3b 100644 --- a/CVE-2025/CVE-2025-247xx/CVE-2025-24736.json +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24736.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24736", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-24T18:15:47.850", - "lastModified": "2025-01-24T18:15:47.850", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T19:00:07.100", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:metaphorcreations:post_duplicator:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.36", + "matchCriteriaId": "541EA3E3-67BC-48C1-B3F1-0EF0A834D303" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/post-duplicator/vulnerability/wordpress-post-duplicator-plugin-2-35-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24860.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24860.json index 0757b20227d..56a46ca872f 100644 --- a/CVE-2025/CVE-2025-248xx/CVE-2025-24860.json +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24860.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24860", "sourceIdentifier": "security@apache.org", "published": "2025-02-04T11:15:09.107", - "lastModified": "2025-02-15T01:15:11.327", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T19:43:36.840", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,61 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:cassandra:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.0.0", + "versionEndExcluding": "4.0.16", + "matchCriteriaId": "282DA169-6FCB-4381-9B68-CAA2D415E64D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:cassandra:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.1.0", + "versionEndExcluding": "4.1.8", + "matchCriteriaId": "B436C4E3-A38B-42E4-AFF4-C057BE7E156C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:cassandra:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.0.0", + "versionEndExcluding": "5.0.3", + "matchCriteriaId": "7BFBF10F-8408-495D-99E6-AE122CDD87CC" + } + ] + } + ] + } + ], "references": [ { "url": "https://lists.apache.org/thread/yjo5on4tf7s1r9qklc4byrz30b8vkm2d", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2025/02/03/3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20250214-0005/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25044.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25044.json index 9965276002a..0477cc6903a 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25044.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25044.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25044", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-06-01T12:15:25.317", - "lastModified": "2025-06-02T17:32:17.397", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:08:44.327", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,35 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:planning_analytics_local:2.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E647C68C-3438-4635-BEBA-D6F5076DA50F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:planning_analytics_local:2.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4ACFEF51-41FE-43CF-A0A4-0D2C355E2E3F" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7235182", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25217.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25217.json index b241df0aa8e..4bd39d70cfd 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25217.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25217.json @@ -2,13 +2,17 @@ "id": "CVE-2025-25217", "sourceIdentifier": "scy@openharmony.io", "published": "2025-06-08T12:15:21.933", - "lastModified": "2025-06-09T12:15:47.880", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T19:07:00.530", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference." + }, + { + "lang": "es", + "value": "En OpenHarmony v5.0.3 y versiones anteriores se permite que un atacante local cometa un ataque DOS mediante la desreferencia de un puntero NULL." } ], "metrics": { @@ -32,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -47,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", + "versionEndIncluding": "5.0.3", + "matchCriteriaId": "3FF0EA48-E2F6-4535-A668-108850DFF515" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-25xx/CVE-2025-2518.json b/CVE-2025/CVE-2025-25xx/CVE-2025-2518.json index 90d1969eb8b..d5055634147 100644 --- a/CVE-2025/CVE-2025-25xx/CVE-2025-2518.json +++ b/CVE-2025/CVE-2025-25xx/CVE-2025-2518.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2518", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-05-29T20:15:26.137", - "lastModified": "2025-05-30T16:31:03.107", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:59:23.160", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,12 +69,79 @@ "value": "CWE-789" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:linux:*:*", + "versionStartIncluding": "11.5", + "versionEndIncluding": "11.5.9", + "matchCriteriaId": "A9058600-75B6-4228-9B77-C6DAF915F158" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:unix:*:*", + "versionStartIncluding": "11.5", + "versionEndIncluding": "11.5.9", + "matchCriteriaId": "A7C9B6A1-749A-4388-AC61-318F79DB4519" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:windows:*:*", + "versionStartIncluding": "11.5", + "versionEndIncluding": "11.5.9", + "matchCriteriaId": "C7DD6EFE-C2DA-42BC-931C-4C347F49BE72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:linux:*:*", + "versionStartIncluding": "12.1.0", + "versionEndIncluding": "12.1.1", + "matchCriteriaId": "685E5B9C-F82E-4BF5-84D2-709CA5FB7F3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:unix:*:*", + "versionStartIncluding": "12.1.0", + "versionEndIncluding": "12.1.1", + "matchCriteriaId": "41FD572B-97C2-4734-BCE7-2F9D59D38C22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:windows:*:*", + "versionStartIncluding": "12.1.0", + "versionEndIncluding": "12.1.1", + "matchCriteriaId": "21C731C8-8712-4B60-852E-70B5EB61C43A" + } + ] + } + ] } ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7235072", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26691.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26691.json index b95b3d0cbae..742db5210ab 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26691.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26691.json @@ -2,13 +2,17 @@ "id": "CVE-2025-26691", "sourceIdentifier": "scy@openharmony.io", "published": "2025-06-08T12:15:22.093", - "lastModified": "2025-06-09T12:15:47.880", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T19:06:52.933", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission." + }, + { + "lang": "es", + "value": "En OpenHarmony v5.0.3 y versiones anteriores se permite que un atacante local cause fugas de informaci\u00f3n mediante la obtenci\u00f3n de permisos." } ], "metrics": { @@ -47,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", + "versionEndIncluding": "5.0.3", + "matchCriteriaId": "3FF0EA48-E2F6-4535-A668-108850DFF515" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26693.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26693.json index 03458518893..b9f8f066742 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26693.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26693.json @@ -2,13 +2,17 @@ "id": "CVE-2025-26693", "sourceIdentifier": "scy@openharmony.io", "published": "2025-06-08T12:15:22.260", - "lastModified": "2025-06-09T12:15:47.880", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T19:06:44.900", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission." + }, + { + "lang": "es", + "value": "En OpenHarmony v5.0.3 y versiones anteriores se permite que un atacante local cause fugas de informaci\u00f3n mediante la obtenci\u00f3n de permisos." } ], "metrics": { @@ -32,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -47,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", + "versionEndIncluding": "5.0.3", + "matchCriteriaId": "3FF0EA48-E2F6-4535-A668-108850DFF515" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27131.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27131.json index c58ed0d6bc8..876c8e90e48 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27131.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27131.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27131", "sourceIdentifier": "scy@openharmony.io", "published": "2025-06-08T12:15:22.423", - "lastModified": "2025-06-09T12:15:47.880", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T19:06:16.757", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS\u00a0through improper input." + }, + { + "lang": "es", + "value": "En OpenHarmony v5.0.3 y versiones anteriores se permite que un atacante local provoque un DOS a trav\u00e9s de una entrada incorrecta." } ], "metrics": { @@ -32,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 4.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,12 +69,43 @@ "value": "CWE-20" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", + "versionEndIncluding": "5.0.3", + "matchCriteriaId": "3FF0EA48-E2F6-4535-A668-108850DFF515" + } + ] + } + ] } ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27242.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27242.json index 4ba4ba95a3f..85280347c87 100644 --- a/CVE-2025/CVE-2025-272xx/CVE-2025-27242.json +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27242.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27242", "sourceIdentifier": "scy@openharmony.io", "published": "2025-06-08T12:15:22.583", - "lastModified": "2025-06-09T12:15:47.880", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T19:06:09.833", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through improper input." + }, + { + "lang": "es", + "value": "En OpenHarmony v5.0.3 y versiones anteriores se permite que un atacante local provoque un DOS a trav\u00e9s de una entrada incorrecta." } ], "metrics": { @@ -32,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,12 +69,43 @@ "value": "CWE-20" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", + "versionEndIncluding": "5.0.3", + "matchCriteriaId": "3FF0EA48-E2F6-4535-A668-108850DFF515" + } + ] + } + ] } ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27247.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27247.json index 685a615986b..d19d9ea0c56 100644 --- a/CVE-2025/CVE-2025-272xx/CVE-2025-27247.json +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27247.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27247", "sourceIdentifier": "scy@openharmony.io", "published": "2025-06-08T12:15:22.733", - "lastModified": "2025-06-09T12:15:47.880", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T19:05:57.987", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission." + }, + { + "lang": "es", + "value": "En OpenHarmony v5.0.3 y versiones anteriores se permite que un atacante local cause fugas de informaci\u00f3n mediante la obtenci\u00f3n de permisos." } ], "metrics": { @@ -47,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", + "versionEndIncluding": "5.0.3", + "matchCriteriaId": "3FF0EA48-E2F6-4535-A668-108850DFF515" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27563.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27563.json index b903c73cd4a..716930f98d3 100644 --- a/CVE-2025/CVE-2025-275xx/CVE-2025-27563.json +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27563.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27563", "sourceIdentifier": "scy@openharmony.io", "published": "2025-06-08T12:15:22.917", - "lastModified": "2025-06-09T12:15:47.880", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T19:05:03.483", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission." + }, + { + "lang": "es", + "value": "En OpenHarmony v5.0.3 y versiones anteriores se permite que un atacante local cause fugas de informaci\u00f3n mediante la obtenci\u00f3n de permisos." } ], "metrics": { @@ -32,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -47,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", + "versionEndIncluding": "5.0.3", + "matchCriteriaId": "3FF0EA48-E2F6-4535-A668-108850DFF515" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2896.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2896.json index 3d9bc6de1d6..a2ecec33193 100644 --- a/CVE-2025/CVE-2025-28xx/CVE-2025-2896.json +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2896.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2896", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-06-01T12:15:25.483", - "lastModified": "2025-06-02T17:32:17.397", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:08:36.257", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,10 +71,35 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:planning_analytics_local:2.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E647C68C-3438-4635-BEBA-D6F5076DA50F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:planning_analytics_local:2.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4ACFEF51-41FE-43CF-A0A4-0D2C355E2E3F" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7235182", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-293xx/CVE-2025-29306.json b/CVE-2025/CVE-2025-293xx/CVE-2025-29306.json index f4b848277c2..c07530ce7d2 100644 --- a/CVE-2025/CVE-2025-293xx/CVE-2025-29306.json +++ b/CVE-2025/CVE-2025-293xx/CVE-2025-29306.json @@ -2,8 +2,8 @@ "id": "CVE-2025-29306", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-27T19:15:49.290", - "lastModified": "2025-04-11T17:50:50.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:02:02.093", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,8 +61,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:foxcms:foxcms:*:*:*:*:*:*:*:*", - "versionEndExcluding": "1.2.00", - "matchCriteriaId": "1EB18EC9-B9F3-4B18-BF1C-D09B20463740" + "versionEndExcluding": "1.2", + "matchCriteriaId": "16581572-220B-4631-AFAD-1691D78AB612" } ] } diff --git a/CVE-2025/CVE-2025-300xx/CVE-2025-30087.json b/CVE-2025/CVE-2025-300xx/CVE-2025-30087.json index bccbb474034..68424e7c18f 100644 --- a/CVE-2025/CVE-2025-300xx/CVE-2025-30087.json +++ b/CVE-2025/CVE-2025-300xx/CVE-2025-30087.json @@ -2,8 +2,8 @@ "id": "CVE-2025-30087", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-28T18:15:26.540", - "lastModified": "2025-05-29T14:29:50.247", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:58:37.370", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -51,18 +71,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bestpractical:request_tracker:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.4.0", + "versionEndExcluding": "4.4.8", + "matchCriteriaId": "DBAC2A90-1130-4970-BEE6-C0217F1B2CDE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bestpractical:request_tracker:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.0.0", + "versionEndExcluding": "5.0.8", + "matchCriteriaId": "BF58D4AE-EBC9-4F20-8ADF-E65F88BEC12D" + } + ] + } + ] + } + ], "references": [ { "url": "https://docs.bestpractical.com/release-notes/rt/4.4.8", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://docs.bestpractical.com/release-notes/rt/5.0.8", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://docs.bestpractical.com/release-notes/rt/index.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-308xx/CVE-2025-30867.json b/CVE-2025/CVE-2025-308xx/CVE-2025-30867.json index 411351d1c54..fe8c3e0410c 100644 --- a/CVE-2025/CVE-2025-308xx/CVE-2025-30867.json +++ b/CVE-2025/CVE-2025-308xx/CVE-2025-30867.json @@ -2,8 +2,8 @@ "id": "CVE-2025-30867", "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-27T11:15:47.960", - "lastModified": "2025-03-27T16:45:12.210", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T19:01:19.517", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:searchiq:searchiq:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.8", + "matchCriteriaId": "D8A41B59-99A0-4E9C-97F2-1B719A56D167" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/searchiq/vulnerability/wordpress-searchiq-plugin-4-7-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-308xx/CVE-2025-30871.json b/CVE-2025/CVE-2025-308xx/CVE-2025-30871.json index 90e58002664..5b564d83af3 100644 --- a/CVE-2025/CVE-2025-308xx/CVE-2025-30871.json +++ b/CVE-2025/CVE-2025-308xx/CVE-2025-30871.json @@ -2,8 +2,8 @@ "id": "CVE-2025-30871", "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-27T11:15:48.243", - "lastModified": "2025-03-27T16:45:12.210", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T19:04:53.113", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wptravelengine:wp_travel_engine:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "6.3.6", + "matchCriteriaId": "810F9D66-5381-4EAE-B7E2-DAE0BC990392" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/wp-travel-engine/vulnerability/wordpress-wp-travel-engine-plugin-6-3-5-local-file-inclusion-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-308xx/CVE-2025-30873.json b/CVE-2025/CVE-2025-308xx/CVE-2025-30873.json index a51380ef8ea..9539891f138 100644 --- a/CVE-2025/CVE-2025-308xx/CVE-2025-30873.json +++ b/CVE-2025/CVE-2025-308xx/CVE-2025-30873.json @@ -2,8 +2,8 @@ "id": "CVE-2025-30873", "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-27T11:15:48.523", - "lastModified": "2025-03-27T16:45:12.210", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T19:16:48.280", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpsoul:greenshift:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "11.1", + "matchCriteriaId": "5E0B71B4-71B9-4D8A-8910-8A775C7B6483" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/greenshift-animation-and-page-builder-blocks/vulnerability/wordpress-greenshift-plugin-11-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-308xx/CVE-2025-30897.json b/CVE-2025/CVE-2025-308xx/CVE-2025-30897.json index 5270a27239c..73420de509c 100644 --- a/CVE-2025/CVE-2025-308xx/CVE-2025-30897.json +++ b/CVE-2025/CVE-2025-308xx/CVE-2025-30897.json @@ -2,8 +2,8 @@ "id": "CVE-2025-30897", "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-27T11:15:50.777", - "lastModified": "2025-03-27T16:45:12.210", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T19:18:55.140", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:analytify:analytify_-_google_analytics_dashboard:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "6.0.0", + "matchCriteriaId": "D2D2A1CC-6E26-4941-AC0B-C7F373D5647E" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/wp-analytify/vulnerability/wordpress-analytify-plugin-5-5-1-settings-change-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3050.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3050.json index c97186b2106..7a41612a9f8 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3050.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3050.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3050", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-05-29T20:15:26.690", - "lastModified": "2025-05-30T16:31:03.107", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:59:36.360", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -51,10 +71,67 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:linux:*:*", + "versionStartIncluding": "11.5", + "versionEndIncluding": "11.5.9", + "matchCriteriaId": "A9058600-75B6-4228-9B77-C6DAF915F158" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:unix:*:*", + "versionStartIncluding": "11.5", + "versionEndIncluding": "11.5.9", + "matchCriteriaId": "A7C9B6A1-749A-4388-AC61-318F79DB4519" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:windows:*:*", + "versionStartIncluding": "11.5", + "versionEndIncluding": "11.5.9", + "matchCriteriaId": "C7DD6EFE-C2DA-42BC-931C-4C347F49BE72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:linux:*:*", + "versionStartIncluding": "12.1.0", + "versionEndIncluding": "12.1.1", + "matchCriteriaId": "685E5B9C-F82E-4BF5-84D2-709CA5FB7F3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:unix:*:*", + "versionStartIncluding": "12.1.0", + "versionEndIncluding": "12.1.1", + "matchCriteriaId": "41FD572B-97C2-4734-BCE7-2F9D59D38C22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:windows:*:*", + "versionStartIncluding": "12.1.0", + "versionEndIncluding": "12.1.1", + "matchCriteriaId": "21C731C8-8712-4B60-852E-70B5EB61C43A" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7235073", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31500.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31500.json index c5ab06c9923..38528b62aa3 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31500.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31500.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31500", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-28T18:15:26.700", - "lastModified": "2025-05-29T14:29:50.247", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:58:52.700", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -51,14 +71,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bestpractical:request_tracker:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.0.0", + "versionEndExcluding": "5.0.8", + "matchCriteriaId": "BF58D4AE-EBC9-4F20-8ADF-E65F88BEC12D" + } + ] + } + ] + } + ], "references": [ { "url": "https://docs.bestpractical.com/release-notes/rt/5.0.8", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://docs.bestpractical.com/release-notes/rt/index.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31501.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31501.json index 313a1d2853f..f4ee6e144b1 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31501.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31501.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31501", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-28T18:15:26.857", - "lastModified": "2025-05-29T14:29:50.247", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:59:03.730", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -51,14 +71,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bestpractical:request_tracker:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.4.0", + "versionEndExcluding": "4.4.8", + "matchCriteriaId": "DBAC2A90-1130-4970-BEE6-C0217F1B2CDE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bestpractical:request_tracker:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.0.0", + "versionEndExcluding": "5.0.8", + "matchCriteriaId": "BF58D4AE-EBC9-4F20-8ADF-E65F88BEC12D" + } + ] + } + ] + } + ], "references": [ { "url": "https://docs.bestpractical.com/release-notes/rt/5.0.8", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://docs.bestpractical.com/release-notes/rt/index.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32238.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32238.json index 3185486f9a7..767455bbf6d 100644 --- a/CVE-2025/CVE-2025-322xx/CVE-2025-32238.json +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32238.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32238", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-04T16:15:33.233", - "lastModified": "2025-04-07T14:18:15.560", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T19:21:20.070", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vcita:online_booking_\\&_scheduling_calendar_for_wordpress_by_vcita:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "4.5.2", + "matchCriteriaId": "DDCB04AE-6003-4721-A867-6ABFB8CAD211" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/meeting-scheduler-by-vcita/vulnerability/wordpress-online-booking-scheduling-calendar-for-wordpress-by-vcita-plugin-4-5-2-sensitive-data-exposure-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32455.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32455.json index 70236762d74..963996a346c 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32455.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32455.json @@ -2,13 +2,17 @@ "id": "CVE-2025-32455", "sourceIdentifier": "cve@takeonme.org", "published": "2025-06-08T21:15:30.993", - "lastModified": "2025-06-09T12:15:47.880", + "lastModified": "2025-06-09T19:15:24.180", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the run_cmd argument), that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command ('Argument Injection'),\" and is estimated as a CVSS 7.7 ( CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) .\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset." + "value": "The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the run_cmd argument), that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command ('Argument Injection'),\" and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).\n\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset." + }, + { + "lang": "es", + "value": "El Chipset Wi-Fi Quantenna se entrega con un script de control local, router_command.sh (en el argumento run_cmd), vulnerable a la inyecci\u00f3n de comandos. Se trata de una instancia de CWE-88, \"Neutralizaci\u00f3n incorrecta de delimitadores de argumentos en un comando ('Inyecci\u00f3n de argumentos')\", y se estima como CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). Este problema afecta al chipset Quantenna Wi-Fi hasta la versi\u00f3n 8.0.0.28 del \u00faltimo SDK, y parece no tener parche en el momento de la primera publicaci\u00f3n de este registro CVE, aunque el proveedor ha publicado una gu\u00eda de mejores pr\u00e1cticas para los implementadores de este chipset." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32456.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32456.json index ef119096da8..b24e22a47a3 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32456.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32456.json @@ -2,13 +2,17 @@ "id": "CVE-2025-32456", "sourceIdentifier": "cve@takeonme.org", "published": "2025-06-08T21:15:31.267", - "lastModified": "2025-06-09T12:15:47.880", + "lastModified": "2025-06-09T19:15:24.287", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the put_file_to_qtn argument), that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command ('Argument Injection'),\" and is estimated as a CVSS 7.7 ( CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) .\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset." + "value": "The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the put_file_to_qtn argument), that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command ('Argument Injection'),\" and is estimated as a CVSS 7.7\u00a0(CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset." + }, + { + "lang": "es", + "value": "El Chipset Wi-Fi Quantenna se entrega con un script de control local, router_command.sh (en el argumento put_file_to_qtn), vulnerable a la inyecci\u00f3n de comandos. Se trata de una instancia de CWE-88, \"Neutralizaci\u00f3n incorrecta de delimitadores de argumentos en un comando ('Inyecci\u00f3n de argumentos')\", y se estima como CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). Este problema afecta al chipset Quantenna Wi-Fi hasta la versi\u00f3n 8.0.0.28 del \u00faltimo SDK, y parece no tener parche en el momento de la primera publicaci\u00f3n de este registro CVE, aunque el proveedor ha publicado una gu\u00eda de mejores pr\u00e1cticas para los implementadores de este chipset." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32457.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32457.json index 34269c0727a..519937b7981 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32457.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32457.json @@ -2,13 +2,17 @@ "id": "CVE-2025-32457", "sourceIdentifier": "cve@takeonme.org", "published": "2025-06-08T21:15:31.403", - "lastModified": "2025-06-09T12:15:47.880", + "lastModified": "2025-06-09T19:15:24.393", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the get_file_from_qtn argument), that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command ('Argument Injection'),\" and is estimated as a CVSS 7.7 ( CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) .\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset." + "value": "The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the get_file_from_qtn argument), that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command ('Argument Injection'),\" and is estimated as a CVSS 7.7\u00a0(CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset." + }, + { + "lang": "es", + "value": "El Chipset Wi-Fi Quantenna se entrega con un script de control local, router_command.sh (en el argumento get_file_from_qtn), vulnerable a la inyecci\u00f3n de comandos. Se trata de una instancia de CWE-88, \"Neutralizaci\u00f3n incorrecta de delimitadores de argumentos en un comando ('Inyecci\u00f3n de argumentos')\", y se estima como CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). Este problema afecta al chipset Quantenna Wi-Fi hasta la versi\u00f3n 8.0.0.28 del \u00faltimo SDK, y parece no tener parche en el momento de la primera publicaci\u00f3n de este registro CVE, aunque el proveedor ha publicado una gu\u00eda de mejores pr\u00e1cticas para los implementadores de este chipset." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32458.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32458.json index 05d5eddfca3..3d87d2f1f4f 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32458.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32458.json @@ -2,13 +2,17 @@ "id": "CVE-2025-32458", "sourceIdentifier": "cve@takeonme.org", "published": "2025-06-08T21:15:31.537", - "lastModified": "2025-06-09T12:15:47.880", + "lastModified": "2025-06-09T19:15:24.497", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the get_syslog_from_qtn argument), that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command ('Argument Injection'),\" and is estimated as a CVSS 7.7 ( CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) .\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset." + "value": "The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the get_syslog_from_qtn argument), that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command ('Argument Injection'),\" and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset." + }, + { + "lang": "es", + "value": "El Chipset Wi-Fi Quantenna se entrega con un script de control local, router_command.sh (en el argumento get_syslog_from_qtn), vulnerable a la inyecci\u00f3n de comandos. Se trata de una instancia de CWE-88, \"Neutralizaci\u00f3n incorrecta de delimitadores de argumentos en un comando ('Inyecci\u00f3n de argumentos')\", y se estima como CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). Este problema afecta al chipset Quantenna Wi-Fi hasta la versi\u00f3n 8.0.0.28 del \u00faltimo SDK, y parece no tener parche en el momento de la primera publicaci\u00f3n de este registro CVE, aunque el proveedor ha publicado una gu\u00eda de mejores pr\u00e1cticas para los implementadores de este chipset." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32459.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32459.json index dad803a9618..7c6314a3b7f 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32459.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32459.json @@ -2,13 +2,17 @@ "id": "CVE-2025-32459", "sourceIdentifier": "cve@takeonme.org", "published": "2025-06-08T21:15:31.673", - "lastModified": "2025-06-09T12:15:47.880", + "lastModified": "2025-06-09T19:15:24.597", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the sync_time argument), that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command ('Argument Injection'),\" and is estimated as a CVSS 7.7 ( CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) .\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset." + "value": "The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the sync_time argument), that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command ('Argument Injection'),\" and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).\n\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset." + }, + { + "lang": "es", + "value": "El Chipset Wi-Fi Quantenna se entrega con un script de control local, router_command.sh (en el argumento sync_time), vulnerable a la inyecci\u00f3n de comandos. Se trata de una instancia de CWE-88, \"Neutralizaci\u00f3n incorrecta de delimitadores de argumentos en un comando ('Inyecci\u00f3n de argumentos')\", y se estima como CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). Este problema afecta al chipset Quantenna Wi-Fi hasta la versi\u00f3n 8.0.0.28 del \u00faltimo SDK, y parece no tener parche en el momento de la primera publicaci\u00f3n de este registro CVE, aunque el proveedor ha publicado una gu\u00eda de mejores pr\u00e1cticas para los implementadores de este chipset." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-330xx/CVE-2025-33004.json b/CVE-2025/CVE-2025-330xx/CVE-2025-33004.json index 741b97d10db..121b19eee08 100644 --- a/CVE-2025/CVE-2025-330xx/CVE-2025-33004.json +++ b/CVE-2025/CVE-2025-330xx/CVE-2025-33004.json @@ -2,8 +2,8 @@ "id": "CVE-2025-33004", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-06-01T12:15:25.643", - "lastModified": "2025-06-02T17:32:17.397", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:08:21.600", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,6 +19,26 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.2 + }, + { + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -51,10 +71,35 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:planning_analytics_local:2.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E647C68C-3438-4635-BEBA-D6F5076DA50F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:planning_analytics_local:2.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4ACFEF51-41FE-43CF-A0A4-0D2C355E2E3F" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7235182", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-330xx/CVE-2025-33005.json b/CVE-2025/CVE-2025-330xx/CVE-2025-33005.json index dfb4a77af93..3f840f3a990 100644 --- a/CVE-2025/CVE-2025-330xx/CVE-2025-33005.json +++ b/CVE-2025/CVE-2025-330xx/CVE-2025-33005.json @@ -2,8 +2,8 @@ "id": "CVE-2025-33005", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-06-01T12:15:25.807", - "lastModified": "2025-06-02T17:32:17.397", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:07:39.407", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,12 +69,47 @@ "value": "CWE-613" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-613" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:planning_analytics_local:2.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E647C68C-3438-4635-BEBA-D6F5076DA50F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:planning_analytics_local:2.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4ACFEF51-41FE-43CF-A0A4-0D2C355E2E3F" + } + ] + } + ] } ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7235182", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-330xx/CVE-2025-33079.json b/CVE-2025/CVE-2025-330xx/CVE-2025-33079.json index 32945c2c5da..5f50b39e058 100644 --- a/CVE-2025/CVE-2025-330xx/CVE-2025-33079.json +++ b/CVE-2025/CVE-2025-330xx/CVE-2025-33079.json @@ -2,8 +2,8 @@ "id": "CVE-2025-33079", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-05-27T02:15:19.393", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:49:31.260", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,52 @@ "value": "CWE-256" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cognos_controller:11.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4BB85020-BF02-4C91-B494-93FB19185006" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cognos_controller:11.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "14DFBD62-8263-4F2F-90C5-A4A508E43B79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:controller:11.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4DB99931-249F-4650-9612-B96803DEE909" + } + ] + } + ] } ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7234720", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3357.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3357.json index 27da729146b..1b477b59314 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3357.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3357.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3357", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-05-28T15:15:24.737", - "lastModified": "2025-05-29T14:29:50.247", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:56:33.710", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,47 @@ "value": "CWE-1285" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:-:*:*:*:*:*:*", + "matchCriteriaId": "15633ADC-6913-4AA1-8524-F139895B1C9D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp19:*:*:*:*:*:*", + "matchCriteriaId": "2AAFF1A2-750F-4C08-B544-0D6BC56D2048" + } + ] + } + ] } ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7234923", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3459.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3459.json index 47b3bb08422..5b81aa289fc 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3459.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3459.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3459", "sourceIdentifier": "cve@takeonme.org", "published": "2025-06-08T21:15:32.770", - "lastModified": "2025-06-09T12:15:47.880", + "lastModified": "2025-06-09T19:15:24.707", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "The Quantenna Wi-Fi chipset ships with a local control script, transmit_file, that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command ('Argument Injection'),\" and is estimated as a CVSS 7.7 ( CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) .\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset." + "value": "The Quantenna Wi-Fi chipset ships with a local control script, transmit_file, that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command ('Argument Injection'),\" and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset." + }, + { + "lang": "es", + "value": "El Chipset Quantenna Wi-Fi se entrega con un script de control local, transmit_file, vulnerable a la inyecci\u00f3n de comandos. Se trata de una instancia de CWE-88, \"Neutralizaci\u00f3n incorrecta de delimitadores de argumentos en un comando ('Inyecci\u00f3n de argumentos')\", y se estima que es CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). Este problema afecta al chipset Quantenna Wi-Fi hasta la versi\u00f3n 8.0.0.28 del SDK m\u00e1s reciente y, al parecer, no se hab\u00eda corregido al momento de la publicaci\u00f3n inicial de este registro CVE, aunque el proveedor ha publicado una gu\u00eda de pr\u00e1cticas recomendadas para los implementadores de este chipset." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3460.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3460.json index ec44ad79b13..71c17812b28 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3460.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3460.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3460", "sourceIdentifier": "cve@takeonme.org", "published": "2025-06-08T21:15:32.900", - "lastModified": "2025-06-09T12:15:47.880", + "lastModified": "2025-06-09T19:15:24.810", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "The Quantenna Wi-Fi chipset ships with a local control script, set_tx_pow, that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command ('Argument Injection'),\" and is estimated as a CVSS 7.7 ( CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) .\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset." + "value": "The Quantenna Wi-Fi chipset ships with a local control script, set_tx_pow, that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command ('Argument Injection'),\" and is estimated as a CVSS 7.7\u00a0(CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset." + }, + { + "lang": "es", + "value": "El Chipset Wi-Fi Quantenna se entrega con un script de control local, set_tx_pow, vulnerable a la inyecci\u00f3n de comandos. Se trata de una instancia de CWE-88, \"Neutralizaci\u00f3n incorrecta de delimitadores de argumentos en un comando ('Inyecci\u00f3n de argumentos')\", y se estima como CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). Este problema afecta al chipset Quantenna Wi-Fi hasta la versi\u00f3n 8.0.0.28 del \u00faltimo SDK, y parece no tener parche en el momento de la primera publicaci\u00f3n de este registro CVE, aunque el proveedor ha publicado una gu\u00eda de mejores pr\u00e1cticas para los implementadores de este chipset." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3461.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3461.json index 6b8755df676..69e0258bf12 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3461.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3461.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3461", "sourceIdentifier": "cve@takeonme.org", "published": "2025-06-08T21:15:33.030", - "lastModified": "2025-06-09T12:15:47.880", + "lastModified": "2025-06-09T19:15:24.923", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "The Quantenna Wi-Fi chips ship with an unauthenticated telnet interface by default. This is an instance of CWE-306, \"Missing Authentication for Critical Function,\" and is estimated as a CVSS 9.1 ( CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) .\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset." + "value": "The Quantenna Wi-Fi chips ship with an unauthenticated telnet interface by default. This is an instance of CWE-306, \"Missing Authentication for Critical Function,\" and is estimated as a CVSS 9.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset." + }, + { + "lang": "es", + "value": "Los Chips Wi-Fi Quantenna se entregan con una interfaz Telnet no autenticada por defecto. Se trata de una instancia de CWE-306, \"Falta de autenticaci\u00f3n para funci\u00f3n cr\u00edtica\", y se estima que es un CVSS 9.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). Este problema afecta al chipset Wi-Fi Quantenna hasta la versi\u00f3n 8.0.0.28 del SDK m\u00e1s reciente y, al parecer, no se hab\u00eda corregido al momento de la publicaci\u00f3n inicial de este registro CVE, aunque el proveedor ha publicado una gu\u00eda de pr\u00e1cticas recomendadas para los implementadores de este chipset." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-365xx/CVE-2025-36572.json b/CVE-2025/CVE-2025-365xx/CVE-2025-36572.json index e43723fbd6a..7f4d4a99a2a 100644 --- a/CVE-2025/CVE-2025-365xx/CVE-2025-36572.json +++ b/CVE-2025/CVE-2025-365xx/CVE-2025-36572.json @@ -2,8 +2,8 @@ "id": "CVE-2025-36572", "sourceIdentifier": "security_alert@emc.com", "published": "2025-05-28T17:15:24.093", - "lastModified": "2025-05-29T14:29:50.247", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:58:23.397", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,93 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:powerstoreos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.0.1.3-2494147", + "matchCriteriaId": "ACB8A1DE-3010-4498-A606-72A916B45DB5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:powerstore_1000t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FD5BE2B0-BB56-4E6C-8818-26910B23CE31" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:powerstore_1200t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AB965674-7EBA-437E-A13B-39BC3F3FE139" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:powerstore_3000t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "861B5BE7-159A-41FF-9658-D243051CAC88" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:powerstore_3200q:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8456D5B0-3D6A-4020-B693-D949EE2BA12E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:powerstore_3200t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0A29ED1-5CE6-4D49-A079-7F4E6D782DE1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:powerstore_5000t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2D5EE934-AD08-4C2B-B3EA-878975EE825E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:powerstore_500t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B529671-71A1-428C-BC17-C8E002222FEA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:powerstore_5200t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F0FCFFD4-A989-4AF3-99DF-32AE2547D9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:powerstore_7000t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "37E8CD6E-65F4-48A0-B796-93E4EE51BD06" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:powerstore_9000t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D9BB1B88-C9C0-4B08-84C6-279C79E34CD3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:powerstore_9200t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F90EFCBC-F720-4426-8043-EB1489820C22" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000325205/dsa-2025-223-dell-powerstore-t-security-update-for-multiple-vulnerabilities", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-439xx/CVE-2025-43923.json b/CVE-2025/CVE-2025-439xx/CVE-2025-43923.json index 1bdbcca3348..07fed359717 100644 --- a/CVE-2025/CVE-2025-439xx/CVE-2025-43923.json +++ b/CVE-2025/CVE-2025-439xx/CVE-2025-43923.json @@ -2,8 +2,8 @@ "id": "CVE-2025-43923", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-03T15:15:58.767", - "lastModified": "2025-06-04T21:15:39.053", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:05:07.393", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:unicomsi:focal_point:7.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9D259EEA-3122-4331-84C7-5F7EEB8905C1" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.unicomsi.com/products/focal-point/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://www.unicomsi.com/security-advisory/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-439xx/CVE-2025-43924.json b/CVE-2025/CVE-2025-439xx/CVE-2025-43924.json index 813658d691f..4b3ff144a18 100644 --- a/CVE-2025/CVE-2025-439xx/CVE-2025-43924.json +++ b/CVE-2025/CVE-2025-439xx/CVE-2025-43924.json @@ -2,8 +2,8 @@ "id": "CVE-2025-43924", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-03T15:15:58.883", - "lastModified": "2025-06-04T21:15:39.213", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:04:54.137", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:unicomsi:focal_point:7.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9D259EEA-3122-4331-84C7-5F7EEB8905C1" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.unicomsi.com/products/focal-point/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://www.unicomsi.com/security-advisory/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-441xx/CVE-2025-44148.json b/CVE-2025/CVE-2025-441xx/CVE-2025-44148.json index 1823bbc585f..6f66e5cbaf5 100644 --- a/CVE-2025/CVE-2025-441xx/CVE-2025-44148.json +++ b/CVE-2025/CVE-2025-441xx/CVE-2025-44148.json @@ -2,8 +2,8 @@ "id": "CVE-2025-44148", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-03T16:15:25.210", - "lastModified": "2025-06-04T14:54:33.783", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:04:33.580", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mailenable:mailenable:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.00", + "matchCriteriaId": "931A5393-286E-4E7F-B608-51ACBEAD2AE7" + } + ] + } + ] + } + ], "references": [ { "url": "http://mailenable.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/barisbaydur/CVE-2025-44148", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-459xx/CVE-2025-45997.json b/CVE-2025/CVE-2025-459xx/CVE-2025-45997.json index 815c77dd7ed..eaba481732d 100644 --- a/CVE-2025/CVE-2025-459xx/CVE-2025-45997.json +++ b/CVE-2025/CVE-2025-459xx/CVE-2025-45997.json @@ -2,8 +2,8 @@ "id": "CVE-2025-45997", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-28T14:15:33.763", - "lastModified": "2025-05-28T15:15:24.900", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:53:36.927", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:senior-walter:web-based_pharmacy_product_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "DB2DA030-DE10-4DA9-86D7-3E3E9A22DABC" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/litsasuk/CVE-POC/blob/main/CVE-2025-45997.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.sourcecodester.com/php/17883/web-based-product-alert-system.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-461xx/CVE-2025-46154.json b/CVE-2025/CVE-2025-461xx/CVE-2025-46154.json index 7a7fdf5dd9b..5bef76446be 100644 --- a/CVE-2025/CVE-2025-461xx/CVE-2025-46154.json +++ b/CVE-2025/CVE-2025-461xx/CVE-2025-46154.json @@ -2,8 +2,8 @@ "id": "CVE-2025-46154", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-03T14:15:48.880", - "lastModified": "2025-06-04T14:54:33.783", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:06:28.423", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:foxcms:foxcms:1.25:*:*:*:*:*:*:*", + "matchCriteriaId": "65D3953A-E10D-496B-A9BB-BB5A287739AE" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Yf3te/CVE/blob/main/CVE-2025-46154", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-487xx/CVE-2025-48734.json b/CVE-2025/CVE-2025-487xx/CVE-2025-48734.json index 3024f66afb8..9420d735e65 100644 --- a/CVE-2025/CVE-2025-487xx/CVE-2025-48734.json +++ b/CVE-2025/CVE-2025-487xx/CVE-2025-48734.json @@ -2,8 +2,8 @@ "id": "CVE-2025-48734", "sourceIdentifier": "security@apache.org", "published": "2025-05-28T14:15:34.070", - "lastModified": "2025-05-28T18:15:27.410", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:56:26.370", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,58 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:commons_beanutils:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.0", + "versionEndExcluding": "1.11.0", + "matchCriteriaId": "3ABE6272-1A82-437E-8153-DE129760FD51" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:commons_beanutils:2.0.0:milestone1:*:*:*:*:*:*", + "matchCriteriaId": "D211BECE-15F4-4685-8B8C-BB6221A2CC83" + } + ] + } + ] } ], "references": [ { "url": "https://lists.apache.org/thread/s0hb3jkfj5f3ryx6c57zqtfohb0of1g9", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2025/05/28/6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-487xx/CVE-2025-48743.json b/CVE-2025/CVE-2025-487xx/CVE-2025-48743.json index 34d7f4f0a0d..44abefbaadb 100644 --- a/CVE-2025/CVE-2025-487xx/CVE-2025-48743.json +++ b/CVE-2025/CVE-2025-487xx/CVE-2025-48743.json @@ -2,8 +2,8 @@ "id": "CVE-2025-48743", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-27T03:15:23.487", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:50:50.927", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sigb:pmb:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.0.1.2", + "matchCriteriaId": "556A8FE3-0EC8-42E8-B1E0-9B512C169824" + } + ] + } + ] + } + ], "references": [ { "url": "https://forge.sigb.net/projects/pmb/wiki/Changelog_801#CHANGE-LOG-8012-2025-03-03", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.sigb.net/index.php?lvl=cmspage&pageid=6&id_rubrique=553&opac_view=1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-487xx/CVE-2025-48744.json b/CVE-2025/CVE-2025-487xx/CVE-2025-48744.json index a116649ee8b..bf28cf7d573 100644 --- a/CVE-2025/CVE-2025-487xx/CVE-2025-48744.json +++ b/CVE-2025/CVE-2025-487xx/CVE-2025-48744.json @@ -2,8 +2,8 @@ "id": "CVE-2025-48744", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-27T03:15:23.707", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:50:58.620", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sigb:pmb:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.0.1.2", + "matchCriteriaId": "556A8FE3-0EC8-42E8-B1E0-9B512C169824" + } + ] + } + ] + } + ], "references": [ { "url": "https://forge.sigb.net/projects/pmb/wiki/Changelog_801#CHANGE-LOG-8012-2025-03-03", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.sigb.net/index.php?lvl=cmspage&pageid=6&id_rubrique=553&opac_view=1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-496xx/CVE-2025-49651.json b/CVE-2025/CVE-2025-496xx/CVE-2025-49651.json new file mode 100644 index 00000000000..6c7f508fd85 --- /dev/null +++ b/CVE-2025/CVE-2025-496xx/CVE-2025-49651.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49651", + "sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "published": "2025-06-09T18:15:26.740", + "lastModified": "2025-06-09T18:15:26.740", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization in Lablup's BackendAI allows attackers to takeover all active sessions; Accessing, stealing, or altering any data accessible in the session. This vulnerability exists in all current versions of BackendAI." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://hiddenlayer.com/sai_security_advisor/2025-05-backendai-49653/", + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-496xx/CVE-2025-49652.json b/CVE-2025/CVE-2025-496xx/CVE-2025-49652.json new file mode 100644 index 00000000000..901bae5f0f8 --- /dev/null +++ b/CVE-2025/CVE-2025-496xx/CVE-2025-49652.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49652", + "sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "published": "2025-06-09T18:15:26.897", + "lastModified": "2025-06-09T18:15:26.897", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authentication in the registration feature of Lablup's BackendAI allows arbitrary users to create user accounts that can access private data even when registration is disabled." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "references": [ + { + "url": "https://hiddenlayer.com/sai_security_advisor/2025-05-backendai-49653/", + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-496xx/CVE-2025-49653.json b/CVE-2025/CVE-2025-496xx/CVE-2025-49653.json new file mode 100644 index 00000000000..9564608e8bb --- /dev/null +++ b/CVE-2025/CVE-2025-496xx/CVE-2025-49653.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49653", + "sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "published": "2025-06-09T18:15:27.033", + "lastModified": "2025-06-09T18:15:27.033", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Exposure of sensitive data in active sessions in Lablup's BackendAI allows attackers to retrieve credentials for users on the management platform." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.0, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://hiddenlayer.com/sai_security_advisor/2025-05-backendai-49653/", + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-52xx/CVE-2025-5219.json b/CVE-2025/CVE-2025-52xx/CVE-2025-5219.json index 567a11b5809..631f3cd093e 100644 --- a/CVE-2025/CVE-2025-52xx/CVE-2025-5219.json +++ b/CVE-2025/CVE-2025-52xx/CVE-2025-5219.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5219", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-27T01:15:19.493", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:49:18.863", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,24 +142,67 @@ "value": "CWE-120" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freefloat:ftp_server:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4425C709-720F-4D39-9983-525BF907CB66" + } + ] + } + ] } ], "references": [ { "url": "https://fitoxs.com/exploit/exploit-c4b40241c6bfa9b9e13cbb33e1bd5a471e8855e7eaf2eb12a997c72cb5de7611.txt", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.310315", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310315", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.582968", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-52xx/CVE-2025-5220.json b/CVE-2025/CVE-2025-52xx/CVE-2025-5220.json index 6fc70ad5f6d..49da6810f9b 100644 --- a/CVE-2025/CVE-2025-52xx/CVE-2025-5220.json +++ b/CVE-2025/CVE-2025-52xx/CVE-2025-5220.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5220", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-27T02:15:20.053", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:49:40.400", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,24 +142,67 @@ "value": "CWE-120" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freefloat:ftp_server:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4425C709-720F-4D39-9983-525BF907CB66" + } + ] + } + ] } ], "references": [ { "url": "https://fitoxs.com/exploit/exploit-1c5dc6c9823d6c734b7dd46458c5196ad7a8c902542c54c7465d38de84bc3ee2.txt", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.310316", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310316", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.582970", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-52xx/CVE-2025-5252.json b/CVE-2025/CVE-2025-52xx/CVE-2025-5252.json index 864d834f716..d689a4419f8 100644 --- a/CVE-2025/CVE-2025-52xx/CVE-2025-5252.json +++ b/CVE-2025/CVE-2025-52xx/CVE-2025-5252.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5252", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-27T18:15:31.763", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:51:06.110", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,32 +142,84 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:news_portal_project:4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C7A22B1B-0F21-4439-BCFD-81EAB5F70C3A" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/Schatten-42/MyCVE/issues/12", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.310354", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310354", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.584923", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/Schatten-42/MyCVE/issues/12", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5334.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5334.json index e7ec2968afd..78cf5aeca1a 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5334.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5334.json @@ -2,13 +2,13 @@ "id": "CVE-2025-5334", "sourceIdentifier": "security@devolutions.net", "published": "2025-05-29T15:15:34.650", - "lastModified": "2025-05-30T16:31:03.107", + "lastModified": "2025-06-09T18:15:27.170", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Exposure of private personal information to an unauthorized actor in the user vaults component of Devolutions Remote Desktop Manager\nallows an authenticated user to gain unauthorized access to private personal information. \n\n\n\nUnder specific circumstances, entries may be unintentionally moved from user vaults to shared vaults when edited by their owners, making them accessible to other users.\n\n\n\n\nThis issue affects the following versions :\n\n * Remote Desktop Manager Windows 2025.1.34.0 and earlier" + "value": "Exposure of private personal information to an unauthorized actor in the user vaults component of Devolutions Remote Desktop Manager\nallows an authenticated user to gain unauthorized access to private personal information. \n\n\n\nUnder specific circumstances, entries may be unintentionally moved from user vaults to shared vaults when edited by their owners, making them accessible to other users.\n\n\n\n\nThis issue affects the following versions :\n\n * Remote Desktop Manager Windows 2025.1.34.0 and earlier\n * \nRemote Desktop Manager Android 2025.1.3.3 and earlier\n * \nRemote Desktop Manager iOS 2025.1.6.0 and earlier" }, { "lang": "es", diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5369.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5369.json index 855b94d8b4f..ef75ed51581 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5369.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5369.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5369", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-31T05:15:19.087", - "lastModified": "2025-06-02T17:32:17.397", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:59:49.330", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,32 +142,84 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:razormist:display_username_after_login:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0DC2C572-A95E-4E43-B360-9EA4EEB7B976" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/shanranne/myCVE/issues/2", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.310662", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310662", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.587234", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/shanranne/myCVE/issues/2", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5370.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5370.json index c575f6f45bc..5aff79a2633 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5370.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5370.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5370", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-31T06:15:19.887", - "lastModified": "2025-06-02T17:32:17.397", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T18:59:58.197", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,32 +142,84 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:news_portal_project:4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C7A22B1B-0F21-4439-BCFD-81EAB5F70C3A" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/GarminYoung/myCVE/issues/5", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.310663", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310663", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.587365", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/GarminYoung/myCVE/issues/5", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5376.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5376.json index 4c28e69f408..8e6561dc5b9 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5376.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5376.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5376", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-31T12:15:21.157", - "lastModified": "2025-06-02T17:32:17.397", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T19:00:07.000", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,32 +142,84 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:razormist:health_center_patient_record_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CC1860E5-A2E5-4014-AC88-1B114E6C41A6" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/shanranne/myCVE/issues/5", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.310669", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310669", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.587405", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/shanranne/myCVE/issues/5", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5381.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5381.json index ef4497c4b6d..c98dc9941fb 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5381.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5381.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5381", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-31T15:15:20.017", - "lastModified": "2025-06-02T17:32:17.397", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T19:00:14.530", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -118,24 +138,69 @@ "value": "CWE-22" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wanglongcn:yifang:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.0.2", + "matchCriteriaId": "918619A5-B9F4-4D05-87DA-FF3C926DB6F1" + } + ] + } + ] } ], "references": [ { "url": "https://gitee.com/wanglongcn/yifang/issues/IC0RCX", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.310674", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310674", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://gitee.com/wanglongcn/yifang/issues/IC0RCX", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5383.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5383.json index 6873384f5de..a8910fbd18a 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5383.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5383.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5383", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-31T15:15:20.833", - "lastModified": "2025-06-02T17:32:17.397", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T19:00:27.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -122,24 +142,69 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wanglongcn:yifang:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.0.2", + "matchCriteriaId": "918619A5-B9F4-4D05-87DA-FF3C926DB6F1" + } + ] + } + ] } ], "references": [ { "url": "https://gitee.com/wanglongcn/yifang/issues/IC41YQ", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.310676", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310676", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://gitee.com/wanglongcn/yifang/issues/IC41YQ", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5787.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5787.json index 90014b0c7dd..e033fab7737 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5787.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5787.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5787", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T17:15:40.630", - "lastModified": "2025-06-09T12:15:47.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-09T19:08:58.440", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -124,26 +144,72 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:x15_firmware:1.0.0-b20230714.1105:*:*:*:*:*:*:*", + "matchCriteriaId": "72A1546F-1A48-42AC-9176-95E44E96445C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:x15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "87818B18-BF90-466D-90C6-D0B4DEBCE330" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Lena-lyy/cve/blob/main/9.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.311335", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.311335", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.591212", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.totolink.net/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5788.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5788.json index 7bb667f6976..2b2fc85efb9 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5788.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5788.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5788", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T17:15:41.797", - "lastModified": "2025-06-09T12:15:47.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-09T19:08:51.570", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -124,26 +144,72 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:x15_firmware:1.0.0-b20230714.1105:*:*:*:*:*:*:*", + "matchCriteriaId": "72A1546F-1A48-42AC-9176-95E44E96445C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:x15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "87818B18-BF90-466D-90C6-D0B4DEBCE330" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/awindog/cve/blob/main/10.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.311336", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Press/Media Coverage" + ] }, { "url": "https://vuldb.com/?id.311336", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.591217", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.totolink.net/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5789.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5789.json index e212d48e430..189944e8533 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5789.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5789.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5789", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T18:15:35.650", - "lastModified": "2025-06-09T12:15:47.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-09T19:08:42.200", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -124,26 +144,72 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:x15_firmware:1.0.0-b20230714.1105:*:*:*:*:*:*:*", + "matchCriteriaId": "72A1546F-1A48-42AC-9176-95E44E96445C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:x15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "87818B18-BF90-466D-90C6-D0B4DEBCE330" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/awindog/cve/blob/main/11.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Not Applicable" + ] }, { "url": "https://vuldb.com/?ctiid.311337", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.311337", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.591218", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.totolink.net/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5790.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5790.json index 485fc911aa4..450ce5855d8 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5790.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5790.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5790", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T18:15:35.840", - "lastModified": "2025-06-09T12:15:47.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-09T19:08:31.530", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -124,26 +144,72 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:x15_firmware:1.0.0-b20230714.1105:*:*:*:*:*:*:*", + "matchCriteriaId": "72A1546F-1A48-42AC-9176-95E44E96445C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:x15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "87818B18-BF90-466D-90C6-D0B4DEBCE330" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/awindog/cve/blob/main/12.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Not Applicable" + ] }, { "url": "https://vuldb.com/?ctiid.311338", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.311338", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.591219", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.totolink.net/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5794.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5794.json index c874844db20..d3c14a1a9db 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5794.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5794.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5794", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T19:15:28.393", - "lastModified": "2025-06-09T15:15:32.017", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-09T19:08:21.053", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -124,30 +124,80 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac5_firmware:15.03.06.47:*:*:*:*:*:*:*", + "matchCriteriaId": "2D94CA12-3FED-4730-B1B4-4F6AAA3AB17E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac5:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D141716B-56F0-4061-9D87-943B7858F2F4" + } + ] + } + ] + } + ], "references": [ { "url": "https://lavender-bicycle-a5a.notion.site/Tenda-AC5-formSetPPTPUserList-20a53a41781f806faf61cef61ed929c0?source=copy_link", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311348", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.311348", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.591223", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.tenda.com.cn/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://lavender-bicycle-a5a.notion.site/Tenda-AC5-formSetPPTPUserList-20a53a41781f806faf61cef61ed929c0", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5795.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5795.json index 0bd4dd27ba1..39b0a16ba4c 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5795.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5795.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5795", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T19:15:28.617", - "lastModified": "2025-06-09T15:15:32.137", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-09T19:08:11.737", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -124,30 +124,81 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac5_firmware:15.03.06.47:*:*:*:*:*:*:*", + "matchCriteriaId": "2D94CA12-3FED-4730-B1B4-4F6AAA3AB17E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac5:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D141716B-56F0-4061-9D87-943B7858F2F4" + } + ] + } + ] + } + ], "references": [ { "url": "https://lavender-bicycle-a5a.notion.site/Tenda-AC5-fromadvsetlanip-20a53a41781f805389dcd51fa04bc530?source=copy_link", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311349", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.311349", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.591224", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.tenda.com.cn/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://lavender-bicycle-a5a.notion.site/Tenda-AC5-fromadvsetlanip-20a53a41781f805389dcd51fa04bc530", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5798.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5798.json index d3b86f2de91..89449d01d29 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5798.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5798.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5798", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T20:15:23.577", - "lastModified": "2025-06-09T15:15:32.387", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T19:08:05.903", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -124,30 +124,81 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac8_firmware:16.03.34.09:*:*:*:*:*:*:*", + "matchCriteriaId": "EE69F412-6FC7-470D-BC7E-B3AAC6B4585F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac8:4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "655619B2-6E8B-4D2E-98E7-028E69597E80" + } + ] + } + ] + } + ], "references": [ { "url": "https://lavender-bicycle-a5a.notion.site/Tenda-AC8-fromSetSysTime-20a53a41781f807b9489fff42f262e11?source=copy_link", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311352", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.311352", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.591266", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.tenda.com.cn/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://lavender-bicycle-a5a.notion.site/Tenda-AC8-fromSetSysTime-20a53a41781f807b9489fff42f262e11", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5799.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5799.json index edd104a3194..4563d62d0d4 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5799.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5799.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5799", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T20:15:23.770", - "lastModified": "2025-06-09T15:15:32.530", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T19:07:59.197", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -124,30 +124,81 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac8_firmware:16.03.34.09:*:*:*:*:*:*:*", + "matchCriteriaId": "EE69F412-6FC7-470D-BC7E-B3AAC6B4585F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac8:4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "655619B2-6E8B-4D2E-98E7-028E69597E80" + } + ] + } + ] + } + ], "references": [ { "url": "https://lavender-bicycle-a5a.notion.site/Tenda-AC8-fromSetWirelessRepeat-20a53a41781f803d9156f0babaf94fca?source=copy_link", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311353", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.311353", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.591270", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.tenda.com.cn/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://lavender-bicycle-a5a.notion.site/Tenda-AC8-fromSetWirelessRepeat-20a53a41781f803d9156f0babaf94fca", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5836.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5836.json index 41a51659492..b0fce1088ea 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5836.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5836.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5836", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-07T14:15:22.500", - "lastModified": "2025-06-09T15:15:32.713", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T19:07:49.417", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -124,30 +124,81 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac9_firmware:15.03.2.13:*:*:*:*:*:*:*", + "matchCriteriaId": "3473D6FD-4D42-46D0-9D96-F95D6D856E8E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac9:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "566DA530-18FC-4A46-95B4-2A7D343A96A7" + } + ] + } + ] + } + ], "references": [ { "url": "https://candle-throne-f75.notion.site/Tenda-AC9-formSetIptv-209df0aa11858061ae2bcbf83918d034", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311579", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.311579", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.591363", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.tenda.com.cn/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://candle-throne-f75.notion.site/Tenda-AC9-formSetIptv-209df0aa11858061ae2bcbf83918d034", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5837.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5837.json index bab9c422493..a223d898579 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5837.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5837.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5837", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-07T14:15:22.803", - "lastModified": "2025-06-09T15:15:32.863", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T19:07:41.590", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,32 +142,84 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:employee_record_management_system:1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "EFF0DB24-A16B-4157-A0AA-66E6B1C08BC0" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/f1rstb100d/myCVE/issues/61", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.311580", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311580", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.591364", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/f1rstb100d/myCVE/issues/61", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5839.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5839.json index fc5a5ff3300..79cfd1d7508 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5839.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5839.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5839", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-07T18:15:25.080", - "lastModified": "2025-06-09T12:15:47.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-09T19:07:34.470", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -124,26 +124,73 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac9_firmware:15.03.2.13:*:*:*:*:*:*:*", + "matchCriteriaId": "3473D6FD-4D42-46D0-9D96-F95D6D856E8E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac9:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "566DA530-18FC-4A46-95B4-2A7D343A96A7" + } + ] + } + ] + } + ], "references": [ { "url": "https://candle-throne-f75.notion.site/Tenda-AC9-fromadvsetlanip-20adf0aa11858027b7c3c2f4e44bb867", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311582", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.311582", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.591369", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.tenda.com.cn/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5847.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5847.json index e306132bba2..906f624d5d3 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5847.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5847.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5847", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-08T14:15:21.097", - "lastModified": "2025-06-09T12:15:47.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-09T19:04:55.580", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in Tenda AC9 15.03.02.13 and classified as critical. Affected by this vulnerability is the function formSetSafeWanWebMan of the file /goform/SetRemoteWebCfg of the component HTTP POST Request Handler. The manipulation of the argument remoteIp leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en Tenda AC9 15.03.02.13, clasificada como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n formSetSafeWanWebMan del archivo /goform/SetRemoteWebCfg del componente HTTP POST Request Handler. La manipulaci\u00f3n del argumento remoteIp provoca un desbordamiento del b\u00fafer en la pila. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -118,28 +122,85 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac9_firmware:15.03.2.13:*:*:*:*:*:*:*", + "matchCriteriaId": "3473D6FD-4D42-46D0-9D96-F95D6D856E8E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac9:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "566DA530-18FC-4A46-95B4-2A7D343A96A7" + } + ] + } + ] } ], "references": [ { "url": "https://candle-throne-f75.notion.site/Tenda-AC9-formSetSafeWanWebMan-20adf0aa118580a29e80cef9109c947a", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311593", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.311593", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.591362", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.tenda.com.cn/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5848.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5848.json index 93c7fec7d1b..5f751bbba2b 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5848.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5848.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5848", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-08T22:15:21.200", - "lastModified": "2025-06-09T12:15:47.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-09T19:04:50.113", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Tenda AC15 15.03.05.19_multi and classified as critical. Affected by this issue is the function formSetPPTPUserList of the file /goform/setPptpUserList of the component HTTP POST Request Handler. The manipulation of the argument list leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Tenda AC15 15.03.05.19_multi, clasificada como cr\u00edtica. Este problema afecta a la funci\u00f3n formSetPPTPUserList del archivo /goform/setPptpUserList del componente HTTP POST Request Handler. La manipulaci\u00f3n de la lista de argumentos provoca un desbordamiento del b\u00fafer. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -120,26 +124,73 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac15_firmware:15.03.05.19_multi:*:*:*:*:*:*:*", + "matchCriteriaId": "C545936B-4A4D-4740-9895-596C7EC48502" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac15:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D5059CAD-BD1A-4808-BCED-006444E60701" + } + ] + } + ] + } + ], "references": [ { "url": "https://candle-throne-f75.notion.site/Tenda-AC15-formSetPPTPUserList-20adf0aa118580d080eacb031b89ddc6", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311594", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.311594", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.591372", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.tenda.com.cn/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5849.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5849.json index 6390ffc7b6c..6b9b77c3cf8 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5849.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5849.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5849", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-08T23:15:20.713", - "lastModified": "2025-06-09T12:15:47.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-09T19:04:44.777", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Tenda AC15 15.03.05.19_multi. It has been classified as critical. This affects the function formSetSafeWanWebMan of the file /goform/SetRemoteWebCfg of the component HTTP POST Request Handler. The manipulation of the argument remoteIp leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Tenda AC15 15.03.05.19_multi. Se ha clasificado como cr\u00edtica. Afecta a la funci\u00f3n formSetSafeWanWebMan del archivo /goform/SetRemoteWebCfg del componente HTTP POST Request Handler. La manipulaci\u00f3n del argumento remoteIp provoca un desbordamiento del b\u00fafer en la pila. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -120,26 +124,73 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac15_firmware:15.03.05.19_multi:*:*:*:*:*:*:*", + "matchCriteriaId": "C545936B-4A4D-4740-9895-596C7EC48502" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac15:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D5059CAD-BD1A-4808-BCED-006444E60701" + } + ] + } + ] + } + ], "references": [ { "url": "https://candle-throne-f75.notion.site/Tenda-AC15-formSetSafeWanWebMan-20adf0aa1185806daab3ebe0036266cb", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311595", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.311595", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.591375", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.tenda.com.cn/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5850.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5850.json index 24c113cc667..0f1293512ed 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5850.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5850.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5850", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-08T23:15:20.927", - "lastModified": "2025-06-09T12:15:47.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-09T19:04:38.610", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Tenda AC15 15.03.05.19_multi. It has been declared as critical. This vulnerability affects the function formsetschedled of the file /goform/SetLEDCf of the component HTTP POST Request Handler. The manipulation of the argument Time leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Tenda AC15 15.03.05.19_multi. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n formsetschedled del archivo /goform/SetLEDCf del componente HTTP POST Request Handler. La manipulaci\u00f3n del argumento Time provoca un desbordamiento del b\u00fafer. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -120,26 +124,73 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac15_firmware:15.03.05.19_multi:*:*:*:*:*:*:*", + "matchCriteriaId": "C545936B-4A4D-4740-9895-596C7EC48502" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac15:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D5059CAD-BD1A-4808-BCED-006444E60701" + } + ] + } + ] + } + ], "references": [ { "url": "https://candle-throne-f75.notion.site/Tenda-AC15-formsetschedled-20adf0aa118580d984d8fcdb98d9959c", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311596", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.311596", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.591376", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.tenda.com.cn/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5851.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5851.json index 729cf588f2e..a5d060a01e7 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5851.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5851.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5851", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-09T00:15:20.837", - "lastModified": "2025-06-09T12:15:47.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-09T19:04:27.920", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Tenda AC15 15.03.05.19_multi. It has been rated as critical. This issue affects the function fromadvsetlanip of the file /goform/AdvSetLanip of the component HTTP POST Request Handler. The manipulation of the argument lanMask leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Tenda AC15 15.03.05.19_multi. Se ha clasificado como cr\u00edtica. Este problema afecta a la funci\u00f3n fromadvsetlanip del archivo /goform/AdvSetLanip del componente HTTP POST Request Handler. La manipulaci\u00f3n del argumento lanMask provoca un desbordamiento del b\u00fafer. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -120,26 +124,73 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac15_firmware:15.03.05.19_multi:*:*:*:*:*:*:*", + "matchCriteriaId": "C545936B-4A4D-4740-9895-596C7EC48502" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac15:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D5059CAD-BD1A-4808-BCED-006444E60701" + } + ] + } + ] + } + ], "references": [ { "url": "https://candle-throne-f75.notion.site/Tenda-AC15-fromadvsetlanip-20adf0aa118580a09182c1c5c42079fc", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311597", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.311597", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.591384", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.tenda.com.cn/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5852.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5852.json index b6fb8beca38..b201756e368 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5852.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5852.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5852", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-09T01:15:20.633", - "lastModified": "2025-06-09T12:15:47.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-09T19:04:20.593", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in Tenda AC6 15.03.05.16. Affected is the function formSetPPTPUserList of the file /goform/setPptpUserList. The manipulation of the argument list leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad cr\u00edtica en Tenda AC6 15.03.05.16. La funci\u00f3n formSetPPTPUserList del archivo /goform/setPptpUserList se ve afectada. La manipulaci\u00f3n de la lista de argumentos provoca un desbordamiento del b\u00fafer. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -120,26 +124,73 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac6_firmware:15.03.05.16:*:*:*:*:*:*:*", + "matchCriteriaId": "6F60AFD7-74AF-4CA2-8232-2858D5AD023A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac6:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B622BF6D-85E6-475A-B7FB-11BA1A641191" + } + ] + } + ] + } + ], "references": [ { "url": "https://lavender-bicycle-a5a.notion.site/Tenda-AC6-formSetPPTPUserList-20a53a41781f801280e7e2dbdbd8625c?source=copy_link", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311598", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.311598", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.591392", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.tenda.com.cn/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5853.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5853.json index df3959f1541..605ccf8851d 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5853.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5853.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5853", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-09T01:15:21.583", - "lastModified": "2025-06-09T12:15:47.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-09T19:04:03.967", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in Tenda AC6 15.03.05.16. Affected by this vulnerability is the function formSetSafeWanWebMan of the file /goform/SetRemoteWebCfg. The manipulation of the argument remoteIp leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en Tenda AC6 15.03.05.16. Esta vulnerabilidad afecta a la funci\u00f3n formSetSafeWanWebMan del archivo /goform/SetRemoteWebCfg. La manipulaci\u00f3n del argumento remoteIp provoca un desbordamiento del b\u00fafer basado en la pila. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -118,28 +122,84 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac6_firmware:15.03.05.16:*:*:*:*:*:*:*", + "matchCriteriaId": "6F60AFD7-74AF-4CA2-8232-2858D5AD023A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac6:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B622BF6D-85E6-475A-B7FB-11BA1A641191" + } + ] + } + ] } ], "references": [ { "url": "https://lavender-bicycle-a5a.notion.site/Tenda-AC6-formSetSafeWanWebMan-20a53a41781f80f1a3ebc7931f32a29f?source=copy_link", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311599", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.311599", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.591419", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.tenda.com.cn/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5854.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5854.json index f223a386fa8..857d7eaecf3 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5854.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5854.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5854", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-09T01:15:21.777", - "lastModified": "2025-06-09T12:15:47.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-09T19:03:46.770", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in Tenda AC6 15.03.05.16. Affected by this issue is the function fromadvsetlanip of the file /goform/AdvSetLanip. The manipulation of the argument lanMask leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en Tenda AC6 15.03.05.16. Este problema afecta a la funci\u00f3n fromadvsetlanip del archivo /goform/AdvSetLanip. La manipulaci\u00f3n del argumento lanMask provoca un desbordamiento del b\u00fafer. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -120,26 +124,73 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac6_firmware:15.03.05.16:*:*:*:*:*:*:*", + "matchCriteriaId": "6F60AFD7-74AF-4CA2-8232-2858D5AD023A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac6:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B622BF6D-85E6-475A-B7FB-11BA1A641191" + } + ] + } + ] + } + ], "references": [ { "url": "https://lavender-bicycle-a5a.notion.site/Tenda-AC6-fromadvsetlanip-20a53a41781f80a29bdff7dca9a4773e?source=copy_link", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311600", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.311600", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.591420", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.tenda.com.cn/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5855.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5855.json index dc98a6321dd..f5070162b99 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5855.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5855.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5855", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-09T02:15:23.293", - "lastModified": "2025-06-09T12:15:47.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-09T19:03:39.630", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in Tenda AC6 15.03.05.16. This affects the function formSetRebootTimer of the file /goform/SetRebootTimer. The manipulation of the argument rebootTime leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en Tenda AC6 15.03.05.16. Esta afecta a la funci\u00f3n formSetRebootTimer del archivo /goform/SetRebootTimer. La manipulaci\u00f3n del argumento rebootTime provoca un desbordamiento del b\u00fafer en la pila. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -76,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -118,28 +142,85 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac6_firmware:15.03.05.16:*:*:*:*:*:*:*", + "matchCriteriaId": "6F60AFD7-74AF-4CA2-8232-2858D5AD023A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac6:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B622BF6D-85E6-475A-B7FB-11BA1A641191" + } + ] + } + ] } ], "references": [ { "url": "https://lavender-bicycle-a5a.notion.site/Tenda-AC6-formsetreboottimer-20a53a41781f80c5b6cac51008556c7e?source=copy_link", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311601", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.311601", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.591422", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.tenda.com.cn/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5859.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5859.json index 6e4d4f87cfb..403c2652e71 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5859.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5859.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5859", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-09T04:15:45.350", - "lastModified": "2025-06-09T13:15:25.350", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T19:03:29.737", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in PHPGurukul Nipah Virus Testing Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /test-details.php. The manipulation of the argument assignto leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en PHPGurukul Nipah Virus Testing Management System 1.0. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /test-details.php. La manipulaci\u00f3n del argumento \"assignto\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -76,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -118,32 +142,83 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:nipah_virus_testing_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "85D720C8-26A6-4C73-974C-285291A71100" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/f1rstb100d/myCVE/issues/65", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.311605", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.311605", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.591443", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/f1rstb100d/myCVE/issues/65", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5860.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5860.json index ea051d54ea5..c8ab69d4df4 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5860.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5860.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5860", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-09T04:15:48.427", - "lastModified": "2025-06-09T14:15:25.730", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T19:03:16.047", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in PHPGurukul Maid Hiring Management System 1.0. This affects an unknown part of the file /admin/search-booking-request.php. The manipulation of the argument searchdata leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Maid Hiring Management System 1.0. Esta afecta a una parte desconocida del archivo /admin/search-booking-request.php. La manipulaci\u00f3n del argumento \"searchdata\" provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -76,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -118,32 +142,83 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:maid_hiring_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "41ECF6D6-2D7F-47DA-9E36-EB00E8341EF2" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/kakalalaww/CVE/issues/2", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.311619", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.311619", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.591910", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/kakalalaww/CVE/issues/2", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5861.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5861.json index cc1a4616ac2..10bd5331f75 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5861.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5861.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5861", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-09T05:15:20.297", - "lastModified": "2025-06-09T14:15:25.853", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T19:03:01.067", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in Tenda AC7 15.03.06.44 and classified as critical. This vulnerability affects the function fromadvsetlanip of the file /goform/AdvSetLanip. The manipulation of the argument lanMask leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en Tenda AC7 15.03.06.44, clasificada como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n fromadvsetlanip del archivo /goform/AdvSetLanip. La manipulaci\u00f3n del argumento lanMask provoca un desbordamiento del b\u00fafer. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -76,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -118,32 +142,93 @@ "value": "CWE-120" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac7_firmware:15.03.06.44:*:*:*:*:*:*:*", + "matchCriteriaId": "4D94B37C-491D-4E7C-8273-F46FEDA62C9F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac7:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "96503617-6B69-4862-ADFE-4EF379876F0F" + } + ] + } + ] } ], "references": [ { "url": "https://lavender-bicycle-a5a.notion.site/Tenda-AC7-fromadvsetlanip-20a53a41781f80038f4fc4b9d927eb9a?source=copy_link", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311620", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.311620", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.591960", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.tenda.com.cn/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://lavender-bicycle-a5a.notion.site/Tenda-AC7-fromadvsetlanip-20a53a41781f80038f4fc4b9d927eb9a", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5862.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5862.json index 43a7134a498..a7673a7dec2 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5862.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5862.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5862", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-09T05:15:21.887", - "lastModified": "2025-06-09T14:15:25.980", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-09T19:02:54.097", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Tenda AC7 15.03.06.44 and classified as critical. This issue affects the function formSetPPTPUserList of the file /goform/setPptpUserList. The manipulation of the argument list leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Tenda AC7 15.03.06.44, clasificada como cr\u00edtica. Este problema afecta a la funci\u00f3n formSetPPTPUserList del archivo /goform/setPptpUserList. La manipulaci\u00f3n de la lista de argumentos provoca un desbordamiento del b\u00fafer. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -76,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -118,32 +142,93 @@ "value": "CWE-120" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac7_firmware:15.03.06.44:*:*:*:*:*:*:*", + "matchCriteriaId": "4D94B37C-491D-4E7C-8273-F46FEDA62C9F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac7:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "96503617-6B69-4862-ADFE-4EF379876F0F" + } + ] + } + ] } ], "references": [ { "url": "https://lavender-bicycle-a5a.notion.site/Tenda-AC7-formSetPPTPUserList-20a53a41781f806ca124cbdf99bff931?source=copy_link", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311621", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.311621", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.591980", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.tenda.com.cn/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://lavender-bicycle-a5a.notion.site/Tenda-AC7-formSetPPTPUserList-20a53a41781f806ca124cbdf99bff931", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5863.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5863.json index 6a19e0c8a69..570d834cad6 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5863.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5863.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5863", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-09T06:15:25.870", - "lastModified": "2025-06-09T12:15:47.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-09T19:02:45.383", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Tenda AC5 15.03.06.47. It has been classified as critical. Affected is the function formSetRebootTimer of the file /goform/SetRebootTimer. The manipulation of the argument rebootTime leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Tenda AC5 15.03.06.47. Se ha clasificado como cr\u00edtica. La funci\u00f3n formSetRebootTimer del archivo /goform/SetRebootTimer est\u00e1 afectada. La manipulaci\u00f3n del argumento rebootTime provoca un desbordamiento del b\u00fafer en la pila. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -76,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -118,28 +142,85 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac5_firmware:15.03.06.47:*:*:*:*:*:*:*", + "matchCriteriaId": "2D94CA12-3FED-4730-B1B4-4F6AAA3AB17E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac5:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D141716B-56F0-4061-9D87-943B7858F2F4" + } + ] + } + ] } ], "references": [ { "url": "https://lavender-bicycle-a5a.notion.site/Tenda-AC5-formSetRebootTimer-20a53a41781f80a6b9a8f6e5915cf256?source=copy_link", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311622", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.311622", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.591981", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.tenda.com.cn/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5888.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5888.json new file mode 100644 index 00000000000..40078da5295 --- /dev/null +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5888.json @@ -0,0 +1,149 @@ +{ + "id": "CVE-2025-5888", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-09T18:15:27.873", + "lastModified": "2025-06-09T18:15:27.873", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in jsnjfz WebStack-Guns 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + }, + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Aiyakami/CVE-1/issues/5", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/luokuang1/CVE/issues/1", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.311659", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.311659", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.582062", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.582920", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5889.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5889.json new file mode 100644 index 00000000000..d38e910de12 --- /dev/null +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5889.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-5889", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-09T19:15:25.460", + "lastModified": "2025-06-09T19:15:25.460", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in juliangruber brace-expansion up to 1.1.11. It has been rated as problematic. Affected by this issue is the function expand of the file index.js. The manipulation leads to inefficient regular expression complexity. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The name of the patch is a5b98a4f30d7813266b221435e1eaaf25a1b0ac5. It is recommended to apply a patch to fix this issue." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 2.3, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 3.1, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:H/Au:S/C:N/I:N/A:P", + "baseScore": 2.1, + "accessVector": "NETWORK", + "accessComplexity": "HIGH", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "LOW", + "exploitabilityScore": 3.9, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + }, + { + "lang": "en", + "value": "CWE-1333" + } + ] + } + ], + "references": [ + { + "url": "https://gist.github.com/mmmsssttt404/37a40ce7d6e5ca604858fe30814d9466", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/juliangruber/brace-expansion/pull/65/commits/a5b98a4f30d7813266b221435e1eaaf25a1b0ac5", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.311660", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.311660", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.585717", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5890.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5890.json new file mode 100644 index 00000000000..273662b766d --- /dev/null +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5890.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-5890", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-09T19:15:25.677", + "lastModified": "2025-06-09T19:15:25.677", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic has been found in actions toolkit 0.5.0. This affects the function globEscape of the file toolkit/packages/glob/src/internal-pattern.ts of the component glob. The manipulation leads to inefficient regular expression complexity. It is possible to initiate the attack remotely." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + }, + { + "lang": "en", + "value": "CWE-1333" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/actions/toolkit/pull/2057", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.311661", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.311661", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.585727", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5891.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5891.json new file mode 100644 index 00000000000..e15afbc1fc5 --- /dev/null +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5891.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-5891", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-09T19:15:25.870", + "lastModified": "2025-06-09T19:15:25.870", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic was found in Unitech pm2 up to 6.0.6. This vulnerability affects unknown code of the file /lib/tools/Config.js. The manipulation leads to inefficient regular expression complexity. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + }, + { + "lang": "en", + "value": "CWE-1333" + } + ] + } + ], + "references": [ + { + "url": "https://gist.github.com/mmmsssttt404/407e2ffe3e0eaa393ad923a86316a385", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Unitech/pm2/pull/5971", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.311662", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.311662", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.585750", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 92083cbbef5..e6d0cc92045 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-09T18:00:19.534302+00:00 +2025-06-09T20:00:19.599263+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-06-09T17:58:16.700000+00:00 +2025-06-09T19:57:23.357000+00:00 ``` ### Last Data Feed Release @@ -33,69 +33,52 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -297154 +297162 ``` ### CVEs added in the last Commit -Recently added CVEs: `87` +Recently added CVEs: `8` -- [CVE-2025-48130](CVE-2025/CVE-2025-481xx/CVE-2025-48130.json) (`2025-06-09T16:15:43.280`) -- [CVE-2025-48139](CVE-2025/CVE-2025-481xx/CVE-2025-48139.json) (`2025-06-09T16:15:43.423`) -- [CVE-2025-48140](CVE-2025/CVE-2025-481xx/CVE-2025-48140.json) (`2025-06-09T16:15:43.573`) -- [CVE-2025-48141](CVE-2025/CVE-2025-481xx/CVE-2025-48141.json) (`2025-06-09T16:15:43.730`) -- [CVE-2025-48143](CVE-2025/CVE-2025-481xx/CVE-2025-48143.json) (`2025-06-09T16:15:43.883`) -- [CVE-2025-48147](CVE-2025/CVE-2025-481xx/CVE-2025-48147.json) (`2025-06-09T16:15:44.030`) -- [CVE-2025-48261](CVE-2025/CVE-2025-482xx/CVE-2025-48261.json) (`2025-06-09T16:15:44.183`) -- [CVE-2025-48267](CVE-2025/CVE-2025-482xx/CVE-2025-48267.json) (`2025-06-09T16:15:44.340`) -- [CVE-2025-48279](CVE-2025/CVE-2025-482xx/CVE-2025-48279.json) (`2025-06-09T16:15:44.490`) -- [CVE-2025-48281](CVE-2025/CVE-2025-482xx/CVE-2025-48281.json) (`2025-06-09T16:15:44.637`) -- [CVE-2025-49136](CVE-2025/CVE-2025-491xx/CVE-2025-49136.json) (`2025-06-09T17:15:29.917`) -- [CVE-2025-49265](CVE-2025/CVE-2025-492xx/CVE-2025-49265.json) (`2025-06-09T16:15:45.063`) -- [CVE-2025-49275](CVE-2025/CVE-2025-492xx/CVE-2025-49275.json) (`2025-06-09T16:15:45.207`) -- [CVE-2025-49276](CVE-2025/CVE-2025-492xx/CVE-2025-49276.json) (`2025-06-09T16:15:45.353`) -- [CVE-2025-49277](CVE-2025/CVE-2025-492xx/CVE-2025-49277.json) (`2025-06-09T16:15:45.500`) -- [CVE-2025-49278](CVE-2025/CVE-2025-492xx/CVE-2025-49278.json) (`2025-06-09T16:15:45.667`) -- [CVE-2025-49279](CVE-2025/CVE-2025-492xx/CVE-2025-49279.json) (`2025-06-09T16:15:45.813`) -- [CVE-2025-49280](CVE-2025/CVE-2025-492xx/CVE-2025-49280.json) (`2025-06-09T16:15:45.957`) -- [CVE-2025-49281](CVE-2025/CVE-2025-492xx/CVE-2025-49281.json) (`2025-06-09T16:15:46.103`) -- [CVE-2025-49282](CVE-2025/CVE-2025-492xx/CVE-2025-49282.json) (`2025-06-09T16:15:46.250`) -- [CVE-2025-49295](CVE-2025/CVE-2025-492xx/CVE-2025-49295.json) (`2025-06-09T16:15:46.393`) -- [CVE-2025-49296](CVE-2025/CVE-2025-492xx/CVE-2025-49296.json) (`2025-06-09T16:15:46.540`) -- [CVE-2025-49297](CVE-2025/CVE-2025-492xx/CVE-2025-49297.json) (`2025-06-09T16:15:46.687`) -- [CVE-2025-5886](CVE-2025/CVE-2025-58xx/CVE-2025-5886.json) (`2025-06-09T16:15:47.440`) -- [CVE-2025-5887](CVE-2025/CVE-2025-58xx/CVE-2025-5887.json) (`2025-06-09T17:15:30.523`) +- [CVE-2024-47081](CVE-2024/CVE-2024-470xx/CVE-2024-47081.json) (`2025-06-09T18:15:24.983`) +- [CVE-2025-49651](CVE-2025/CVE-2025-496xx/CVE-2025-49651.json) (`2025-06-09T18:15:26.740`) +- [CVE-2025-49652](CVE-2025/CVE-2025-496xx/CVE-2025-49652.json) (`2025-06-09T18:15:26.897`) +- [CVE-2025-49653](CVE-2025/CVE-2025-496xx/CVE-2025-49653.json) (`2025-06-09T18:15:27.033`) +- [CVE-2025-5888](CVE-2025/CVE-2025-58xx/CVE-2025-5888.json) (`2025-06-09T18:15:27.873`) +- [CVE-2025-5889](CVE-2025/CVE-2025-58xx/CVE-2025-5889.json) (`2025-06-09T19:15:25.460`) +- [CVE-2025-5890](CVE-2025/CVE-2025-58xx/CVE-2025-5890.json) (`2025-06-09T19:15:25.677`) +- [CVE-2025-5891](CVE-2025/CVE-2025-58xx/CVE-2025-5891.json) (`2025-06-09T19:15:25.870`) ### CVEs modified in the last Commit -Recently modified CVEs: `71` +Recently modified CVEs: `136` -- [CVE-2024-24021](CVE-2024/CVE-2024-240xx/CVE-2024-24021.json) (`2025-06-09T17:15:27.310`) -- [CVE-2024-24188](CVE-2024/CVE-2024-241xx/CVE-2024-24188.json) (`2025-06-09T17:15:27.700`) -- [CVE-2024-24304](CVE-2024/CVE-2024-243xx/CVE-2024-24304.json) (`2025-06-09T17:15:28.043`) -- [CVE-2024-25251](CVE-2024/CVE-2024-252xx/CVE-2024-25251.json) (`2025-06-09T17:58:16.700`) -- [CVE-2024-27995](CVE-2024/CVE-2024-279xx/CVE-2024-27995.json) (`2025-06-09T17:10:47.097`) -- [CVE-2024-31585](CVE-2024/CVE-2024-315xx/CVE-2024-31585.json) (`2025-06-09T16:15:34.637`) -- [CVE-2024-3963](CVE-2024/CVE-2024-39xx/CVE-2024-3963.json) (`2025-06-09T17:07:01.677`) -- [CVE-2024-53901](CVE-2024/CVE-2024-539xx/CVE-2024-53901.json) (`2025-06-09T17:36:58.807`) -- [CVE-2024-9422](CVE-2024/CVE-2024-94xx/CVE-2024-9422.json) (`2025-06-09T16:50:24.997`) -- [CVE-2025-25946](CVE-2025/CVE-2025-259xx/CVE-2025-25946.json) (`2025-06-09T16:49:57.563`) -- [CVE-2025-2917](CVE-2025/CVE-2025-29xx/CVE-2025-2917.json) (`2025-06-09T17:30:31.340`) -- [CVE-2025-32254](CVE-2025/CVE-2025-322xx/CVE-2025-32254.json) (`2025-06-09T16:53:01.463`) -- [CVE-2025-32924](CVE-2025/CVE-2025-329xx/CVE-2025-32924.json) (`2025-06-09T17:06:44.660`) -- [CVE-2025-32925](CVE-2025/CVE-2025-329xx/CVE-2025-32925.json) (`2025-06-09T17:08:45.590`) -- [CVE-2025-32926](CVE-2025/CVE-2025-329xx/CVE-2025-32926.json) (`2025-06-09T17:09:57.147`) -- [CVE-2025-39528](CVE-2025/CVE-2025-395xx/CVE-2025-39528.json) (`2025-06-09T16:54:30.017`) -- [CVE-2025-47517](CVE-2025/CVE-2025-475xx/CVE-2025-47517.json) (`2025-06-09T16:56:44.253`) -- [CVE-2025-47538](CVE-2025/CVE-2025-475xx/CVE-2025-47538.json) (`2025-06-09T17:02:49.720`) -- [CVE-2025-47540](CVE-2025/CVE-2025-475xx/CVE-2025-47540.json) (`2025-06-09T17:04:28.477`) -- [CVE-2025-47542](CVE-2025/CVE-2025-475xx/CVE-2025-47542.json) (`2025-06-09T17:05:30.240`) -- [CVE-2025-47543](CVE-2025/CVE-2025-475xx/CVE-2025-47543.json) (`2025-06-09T17:06:12.123`) -- [CVE-2025-49127](CVE-2025/CVE-2025-491xx/CVE-2025-49127.json) (`2025-06-09T16:15:44.833`) -- [CVE-2025-49128](CVE-2025/CVE-2025-491xx/CVE-2025-49128.json) (`2025-06-09T16:15:44.947`) -- [CVE-2025-49599](CVE-2025/CVE-2025-495xx/CVE-2025-49599.json) (`2025-06-09T16:15:46.830`) -- [CVE-2025-49619](CVE-2025/CVE-2025-496xx/CVE-2025-49619.json) (`2025-06-09T16:15:46.937`) +- [CVE-2025-5787](CVE-2025/CVE-2025-57xx/CVE-2025-5787.json) (`2025-06-09T19:08:58.440`) +- [CVE-2025-5788](CVE-2025/CVE-2025-57xx/CVE-2025-5788.json) (`2025-06-09T19:08:51.570`) +- [CVE-2025-5789](CVE-2025/CVE-2025-57xx/CVE-2025-5789.json) (`2025-06-09T19:08:42.200`) +- [CVE-2025-5790](CVE-2025/CVE-2025-57xx/CVE-2025-5790.json) (`2025-06-09T19:08:31.530`) +- [CVE-2025-5794](CVE-2025/CVE-2025-57xx/CVE-2025-5794.json) (`2025-06-09T19:08:21.053`) +- [CVE-2025-5795](CVE-2025/CVE-2025-57xx/CVE-2025-5795.json) (`2025-06-09T19:08:11.737`) +- [CVE-2025-5798](CVE-2025/CVE-2025-57xx/CVE-2025-5798.json) (`2025-06-09T19:08:05.903`) +- [CVE-2025-5799](CVE-2025/CVE-2025-57xx/CVE-2025-5799.json) (`2025-06-09T19:07:59.197`) +- [CVE-2025-5836](CVE-2025/CVE-2025-58xx/CVE-2025-5836.json) (`2025-06-09T19:07:49.417`) +- [CVE-2025-5837](CVE-2025/CVE-2025-58xx/CVE-2025-5837.json) (`2025-06-09T19:07:41.590`) +- [CVE-2025-5839](CVE-2025/CVE-2025-58xx/CVE-2025-5839.json) (`2025-06-09T19:07:34.470`) +- [CVE-2025-5847](CVE-2025/CVE-2025-58xx/CVE-2025-5847.json) (`2025-06-09T19:04:55.580`) +- [CVE-2025-5848](CVE-2025/CVE-2025-58xx/CVE-2025-5848.json) (`2025-06-09T19:04:50.113`) +- [CVE-2025-5849](CVE-2025/CVE-2025-58xx/CVE-2025-5849.json) (`2025-06-09T19:04:44.777`) +- [CVE-2025-5850](CVE-2025/CVE-2025-58xx/CVE-2025-5850.json) (`2025-06-09T19:04:38.610`) +- [CVE-2025-5851](CVE-2025/CVE-2025-58xx/CVE-2025-5851.json) (`2025-06-09T19:04:27.920`) +- [CVE-2025-5852](CVE-2025/CVE-2025-58xx/CVE-2025-5852.json) (`2025-06-09T19:04:20.593`) +- [CVE-2025-5853](CVE-2025/CVE-2025-58xx/CVE-2025-5853.json) (`2025-06-09T19:04:03.967`) +- [CVE-2025-5854](CVE-2025/CVE-2025-58xx/CVE-2025-5854.json) (`2025-06-09T19:03:46.770`) +- [CVE-2025-5855](CVE-2025/CVE-2025-58xx/CVE-2025-5855.json) (`2025-06-09T19:03:39.630`) +- [CVE-2025-5859](CVE-2025/CVE-2025-58xx/CVE-2025-5859.json) (`2025-06-09T19:03:29.737`) +- [CVE-2025-5860](CVE-2025/CVE-2025-58xx/CVE-2025-5860.json) (`2025-06-09T19:03:16.047`) +- [CVE-2025-5861](CVE-2025/CVE-2025-58xx/CVE-2025-5861.json) (`2025-06-09T19:03:01.067`) +- [CVE-2025-5862](CVE-2025/CVE-2025-58xx/CVE-2025-5862.json) (`2025-06-09T19:02:54.097`) +- [CVE-2025-5863](CVE-2025/CVE-2025-58xx/CVE-2025-5863.json) (`2025-06-09T19:02:45.383`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 73e0783ca07..3a3b6c73bab 100644 --- a/_state.csv +++ b/_state.csv @@ -49720,7 +49720,7 @@ CVE-2011-3041,0,0,33fce0c78171de92c26582436540f012f5d9b6aae3255aeabf8e59b31b893e CVE-2011-3042,0,0,920f3b8b85e3bc7469575a89afb9cdd720972770bc1292686eb10147f65b2d8b,2025-04-11T00:51:21.963000 CVE-2011-3043,0,0,90658ea0dd9a6b6db0f70ccb0a96454f710146e9fad47b8465c9eccbf6434c79,2025-04-11T00:51:21.963000 CVE-2011-3044,0,0,db103ddb7c6443e2f588b33e878acf96c5ca8f8ec51f29bc0ea1ad68803536da,2025-04-11T00:51:21.963000 -CVE-2011-3045,0,1,05a90f3656c962654855fa46752a903bc011d9fcfa1c60ce543d00c25bca22be,2025-06-09T16:15:22.810000 +CVE-2011-3045,0,0,05a90f3656c962654855fa46752a903bc011d9fcfa1c60ce543d00c25bca22be,2025-06-09T16:15:22.810000 CVE-2011-3046,0,0,172a55cae3c3aca1bd2125d186f130de0065f48fc02bb8feafc224c27562beae,2025-04-11T00:51:21.963000 CVE-2011-3047,0,0,7810d6f408cb2e5964fe3c28f251fa03f596128369da7e902a0ed5243c9a9f79,2025-04-11T00:51:21.963000 CVE-2011-3048,0,0,1d82a749672cb202be2d1bbe200431ab91e612a347bed286033a0e6546f87434,2025-04-11T00:51:21.963000 @@ -61774,7 +61774,7 @@ CVE-2013-4388,0,0,35d2c431898f7b418876db75013fee8fbb5791c7bae7e4ad0f2161ff3a487d CVE-2013-4389,0,0,fbde3aeded7fe6962127df4ee3ee5c7dbc7b7bd1563ebdfa0a9f574a0e7270fe,2025-04-11T00:51:21.963000 CVE-2013-4390,0,0,160f6587ad5c71d923ba6823718453761ad84a5a6c72531a8ac23b9e7e16b16e,2025-04-11T00:51:21.963000 CVE-2013-4391,0,0,57a0701b53ea259718fa58c1eb7d6f5df3cf37934056f4f8b728b99642558e83,2025-04-11T00:51:21.963000 -CVE-2013-4392,0,1,ea3f450c38480ca9f229ab34ba44c8c29a95d451a9f1f8fe23292c6abb531d59,2025-06-09T16:15:23.763000 +CVE-2013-4392,0,0,ea3f450c38480ca9f229ab34ba44c8c29a95d451a9f1f8fe23292c6abb531d59,2025-06-09T16:15:23.763000 CVE-2013-4393,0,0,070ddc6c7d71604cb830fa2f85694d3096d1a5013918889621330002c58c737b,2025-04-11T00:51:21.963000 CVE-2013-4394,0,0,29ee5f8f4201d8cd61bb2d189d293c2e4cacd4604971b4fac8354ec141b0f930,2025-04-11T00:51:21.963000 CVE-2013-4395,0,0,cac89d5a2419965b3ac8ea05e33c1bdcfec22755e8176935209e2716f9f05e7e,2024-11-21T01:55:29.117000 @@ -64361,8 +64361,8 @@ CVE-2013-7349,0,0,16ff7c1030268bf02b992735ab60cd707c637fdb6a26229fe43861fa7d26eb CVE-2013-7350,0,0,1f77a74da45d902d3f214f30ef11debf3b0e54948a3d2db6e59bade681943cb9,2025-04-12T10:46:40.837000 CVE-2013-7351,0,0,cf01e40ddbcec33e1553d641d4f4844033068e5d86adaa04ce7b09415c6b5d66,2024-11-21T02:00:48.770000 CVE-2013-7352,0,0,c68fa7e12a81b3ba89571fa462c2c0f7baaaf619aae9a85348d440fde2ad8efb,2025-04-12T10:46:40.837000 -CVE-2013-7353,0,1,2502f4a3161445884a1e36d3cbaec9a0d6f2a04938c902052310ede19301f3ed,2025-06-09T16:15:23.980000 -CVE-2013-7354,0,1,998524b7b81b44007f4d06a39165112dfd85c7b201fcc7de3af701d14bc598b2,2025-06-09T16:15:24.220000 +CVE-2013-7353,0,0,2502f4a3161445884a1e36d3cbaec9a0d6f2a04938c902052310ede19301f3ed,2025-06-09T16:15:23.980000 +CVE-2013-7354,0,0,998524b7b81b44007f4d06a39165112dfd85c7b201fcc7de3af701d14bc598b2,2025-06-09T16:15:24.220000 CVE-2013-7355,0,0,3c190a7fa0813245a81eebd135f840db563722c159e28b64dfc57faf28f99b32,2025-04-12T10:46:40.837000 CVE-2013-7356,0,0,0fbb284299bbda650dd83fcf6c5f0a0d7846654cff06c6892fa5d9a0802a4e0e,2025-04-12T10:46:40.837000 CVE-2013-7357,0,0,a3a4d08e75198df6a6de99a4c142888f4bb31ef7386d2c7a6ddf470c03194a7b,2025-04-12T10:46:40.837000 @@ -73011,7 +73011,7 @@ CVE-2014-9491,0,0,2cd835e79d80a64757be4ea71ee27b700c7912e0d96e43b69cf72032d17939 CVE-2014-9492,0,0,93da0e3fef0aa8d76c174a1e4d68c5e57d840c9179dd9cbb0982d023507bb857,2023-11-07T02:23:06.150000 CVE-2014-9493,0,0,db51ee456f55e13dde02845aef77b45d12267e07837b1fb2aeab0e15dc307b1c,2025-04-12T10:46:40.837000 CVE-2014-9494,0,0,0c1a66fe33c1600305fe4c5cab0f06a9343b83f75905a1134852d15fad2f936a,2025-04-12T10:46:40.837000 -CVE-2014-9495,0,1,25e478d0fc3b2e0d564fcda924724a0f1c5d79728c25a8fc80c556275a24ef0e,2025-06-09T16:15:24.410000 +CVE-2014-9495,0,0,25e478d0fc3b2e0d564fcda924724a0f1c5d79728c25a8fc80c556275a24ef0e,2025-06-09T16:15:24.410000 CVE-2014-9496,0,0,79df204b9319505304ff7d924204f05d57255c77563c8b742319613224697158,2025-04-12T10:46:40.837000 CVE-2014-9497,0,0,4ea583340a01d0655bc7496209a6d9220b23192518597e9ca7114de6176b4569,2025-04-20T01:37:25.860000 CVE-2014-9498,0,0,a49ffbbdccba1d46d9bf350929a273c522903b488818dd5bd6361889ebfb1f55,2025-04-12T10:46:40.837000 @@ -74392,7 +74392,7 @@ CVE-2015-0969,0,0,176628c65ba529bf7f234ef3f6c6f14283b97f38fecc14f33cf509b0cf065f CVE-2015-0970,0,0,6645e584f16a360fcd045af6ca033930eb37db600ef05365b2704efe2ca84c49,2025-04-12T10:46:40.837000 CVE-2015-0971,0,0,d8737955282135e7ed8dea97c94c4440fe61c122b55b26e4ce6c8f544bffd11b,2025-04-12T10:46:40.837000 CVE-2015-0972,0,0,38269c9e15c7f6d4b7ff60c1ca55eaa53daa7746949c1732d3938b1f8cf9f023,2025-04-12T10:46:40.837000 -CVE-2015-0973,0,1,ed533762f954702f94b644e0bff06911d31488524289261ac20826e5c3f2ba69,2025-06-09T16:15:24.780000 +CVE-2015-0973,0,0,ed533762f954702f94b644e0bff06911d31488524289261ac20826e5c3f2ba69,2025-06-09T16:15:24.780000 CVE-2015-0974,0,0,1fbbb461fe064dab092eaf1d1a22cab16faaad6544e303b766fa116b49205441,2025-04-20T01:37:25.860000 CVE-2015-0976,0,0,b41127441c974d83325488349b570b101d9af914143fe63e70c9b059ea0044db,2025-04-12T10:46:40.837000 CVE-2015-0977,0,0,7161a8c915c8f5b17b009a44f378f389eb83b63d623819e82affbe41ab42394a,2025-04-12T10:46:40.837000 @@ -86128,7 +86128,7 @@ CVE-2016-2776,0,0,e6110d9afc57e0680ef028acf0a72570dc56a185ee9c3270de48b7f282d74e CVE-2016-2777,0,0,eedf30702fca53155e0fadf3a7646f789abfa0a4519b867694502f62a9a8f8fa,2023-11-07T02:32:03.300000 CVE-2016-2779,0,0,d3f5980080799a619010d48197637a07d76d9d84834ea7dc192637e911f03953,2025-04-20T01:37:25.860000 CVE-2016-2780,0,0,ae8d7298e2137cfab6b55cf63c73c294fe4b7aa23624350a58415eca3487a5df,2025-04-12T10:46:40.837000 -CVE-2016-2781,0,1,3dcfe9be13f5b5e5c4b4361e68217c9f52a2cadd039edf4d8588d64e774bef42,2025-06-09T16:15:25.013000 +CVE-2016-2781,0,0,3dcfe9be13f5b5e5c4b4361e68217c9f52a2cadd039edf4d8588d64e774bef42,2025-06-09T16:15:25.013000 CVE-2016-2782,0,0,71265af5ac1f813e33cd50b19c8fbbd0ab232149aa0ac0b5efe7fd8edfd4404b,2025-04-12T10:46:40.837000 CVE-2016-2783,0,0,785248a8d0d7b5394e80f4d5194f58145bd68f38b862cbf4d5b512fb3d4bbbef,2025-04-20T01:37:25.860000 CVE-2016-2784,0,0,f39c393728d01cd89409735670b35c330331065c201fbbfc0f97ac57fc7de08d,2025-04-12T10:46:40.837000 @@ -86484,7 +86484,7 @@ CVE-2016-3185,0,0,0d2f21d86166f82f6314e832757812070a5b6544b2c81b30da9ec45efce82b CVE-2016-3186,0,0,809a56ec02ef30a044cb288b404a3a24242cdd263496b1310185dfbb41105dda,2025-04-12T10:46:40.837000 CVE-2016-3187,0,0,4b1cc3d6e220858b64fc480ce708b0865a8eec73dd391b519fbb126faa980a82,2025-04-12T10:46:40.837000 CVE-2016-3188,0,0,aa914470fcf1710e57d2a3c16ba939d3b63bf2b3d1f235311491a8f189291ad9,2025-04-12T10:46:40.837000 -CVE-2016-3189,0,1,7150aa0997a44343767172683fab4702dceca278c17f92fe6b4410d565863c31,2025-06-09T16:15:25.307000 +CVE-2016-3189,0,0,7150aa0997a44343767172683fab4702dceca278c17f92fe6b4410d565863c31,2025-06-09T16:15:25.307000 CVE-2016-3190,0,0,a302e246bdbfd98d948c4ab3d2a0922ef7eaea0c15cae39ba7daab6ce9fbc472,2025-04-12T10:46:40.837000 CVE-2016-3191,0,0,66bacbd7c10ca3a62ab5cd53a6f2219a47c38b81558804ffd2f7745df2a1102c,2025-04-12T10:46:40.837000 CVE-2016-3192,0,0,bc0f37e12beb31726c769b65f69a59fb01fcfbe67e9efbdf139c0b2e0b1fb8ef,2024-11-21T02:49:34.520000 @@ -96430,7 +96430,7 @@ CVE-2017-12649,0,0,425ea77f98fa04886b2733d6dbaa4d03bfdc515cab07d2f666092a36d15e8 CVE-2017-1265,0,0,0eed8d10d3d4234510532c62faf7b88ecce830679be5d24c3a72a678a15e2b87,2024-11-21T03:21:36.210000 CVE-2017-12650,0,0,0a05fa0c02a2382ca13b30d7e030f540a4b7b23b04934415ac49e8ab2e3b2d88,2025-04-20T01:37:25.860000 CVE-2017-12651,0,0,9ffe982867008396b53cf66113dea941688f473241320af9f187384ae36782cd,2025-04-20T01:37:25.860000 -CVE-2017-12652,0,1,bef4d2cfac785c7e9f3736ff5e612998a8c5ad3663a0722582570939a134f530,2025-06-09T16:15:26.200000 +CVE-2017-12652,0,0,bef4d2cfac785c7e9f3736ff5e612998a8c5ad3663a0722582570939a134f530,2025-06-09T16:15:26.200000 CVE-2017-12653,0,0,b2a5e8e14457c1b571e8d73db811bd48ed785b8b152f4d44b311e20241cae041,2025-04-20T01:37:25.860000 CVE-2017-12654,0,0,ed04c6e5864d26cc1fa7de65e697ed0f327df743e2d8fe100910269b10f7181e,2025-04-20T01:37:25.860000 CVE-2017-12655,0,0,17aa095aca059917ecd1afd9949e368cef66fc3f7c9e7b58f1752ebee1cbb94c,2025-04-20T01:37:25.860000 @@ -99290,8 +99290,8 @@ CVE-2017-15869,0,0,d0c8a19a59c8e76070a7f7ddcd3307064e5c720af8be1cfa7c71e4eb6b9d6 CVE-2017-15870,0,0,68c20f5795e481f1b559938546e9e6d7465751eea1375dfdfb2cb3952e3fe6bb,2025-04-20T01:37:25.860000 CVE-2017-15871,0,0,d5ebc4a74036df6704f898f5daeba02a480af42d473c03ef1621566fe2ab54ad,2025-04-20T01:37:25.860000 CVE-2017-15872,0,0,b1cd54095ad530efc09c7bab2472eecc4a0e0e3d504417cfcfa4c82729fe8deb,2025-04-20T01:37:25.860000 -CVE-2017-15873,0,1,85103d90196057b1d5c1f36108d573366b2055f35a477785008e0c9ef3219498,2025-06-09T16:15:26.423000 -CVE-2017-15874,0,1,f531b615bce43b9571471f7f9bb1e5afd91ece704e01df6242f0180ac4d479f1,2025-06-09T16:15:26.680000 +CVE-2017-15873,0,0,85103d90196057b1d5c1f36108d573366b2055f35a477785008e0c9ef3219498,2025-06-09T16:15:26.423000 +CVE-2017-15874,0,0,f531b615bce43b9571471f7f9bb1e5afd91ece704e01df6242f0180ac4d479f1,2025-06-09T16:15:26.680000 CVE-2017-15875,0,0,a77c931d2c06bc6d03691d8ef6fb430179c296d1ae579010b5cbbef9224d429b,2025-04-20T01:37:25.860000 CVE-2017-15876,0,0,87de0d6d03ad6b7562c4c46f4912940559be86bc6dafc9beb81584ae9fca42bc,2025-04-20T01:37:25.860000 CVE-2017-15877,0,0,490a9e33626f00ef6198c9526dec4ffef1d2f193502b08f0f66790e261bea2d8,2025-04-20T01:37:25.860000 @@ -99954,7 +99954,7 @@ CVE-2017-16540,0,0,22cff966ef0bbefa4b7eddd68beda4b5cc6a89eee13974f8ec12e6a29579f CVE-2017-16541,0,0,e5fb0a7dcc585650d595a9545ca8ea210476b58f15a1f39bc8b2b102b23beab3,2025-04-20T01:37:25.860000 CVE-2017-16542,0,0,99c5c57f8eef972ccbdf2ab7224345ae0abf114ad44615d019d5a396a9c3bfd6,2025-04-20T01:37:25.860000 CVE-2017-16543,0,0,78b6bba73dade6c489379273614ca3e16d31f5704f7d5b41323bb1ee0488a495,2025-04-20T01:37:25.860000 -CVE-2017-16544,0,1,89e274622534c3424f01fe9b80cb30f5f422316b709edfcc4075a380e351be9f,2025-06-09T16:15:26.850000 +CVE-2017-16544,0,0,89e274622534c3424f01fe9b80cb30f5f422316b709edfcc4075a380e351be9f,2025-06-09T16:15:26.850000 CVE-2017-16545,0,0,df21cbdc9d3b6cd4cfed70887eedc3e099af3924c1f1aa38e360776ff3495e2a,2025-04-20T01:37:25.860000 CVE-2017-16546,0,0,fc0eac73b910ede964d78b2d594d2eef7d6e7a1b2119d87098d9af9f28e4cf4e,2025-04-20T01:37:25.860000 CVE-2017-16547,0,0,07922aa72e9a5a67458c21cfb663e797e721bd3277f14135b32371f5d1df2ad5,2025-04-20T01:37:25.860000 @@ -101306,7 +101306,7 @@ CVE-2017-18014,0,0,38417a894d9546b115d289bbae368add12189ac695219b9fdbc9ffbe33fec CVE-2017-18015,0,0,c49012725d48a76d65cb3df65f2ab6dc9e669bd483246334dd4adfda3c8f7e9b,2024-11-21T03:19:10.100000 CVE-2017-18016,0,0,b638c97f089c62a845521526555446d3988d4137cf272b2974b63f347457fe34,2024-11-21T03:19:10.273000 CVE-2017-18017,0,0,85bfe441052a2c1b78d90fb4f917cb0bac2249ce9955ebba4b31af00c4590f2c,2025-01-03T12:15:25.113000 -CVE-2017-18018,0,1,029085a47385d721b1f97b09dfa99b5ece130df75bfd11fb7ba7712a332b0c21,2025-06-09T16:15:27.250000 +CVE-2017-18018,0,0,029085a47385d721b1f97b09dfa99b5ece130df75bfd11fb7ba7712a332b0c21,2025-06-09T16:15:27.250000 CVE-2017-18019,0,0,db2ee79f5e87784bdeac649407c9f20bb2079e0c6a56b79a41afd9bc5b164b0d,2024-11-21T03:19:10.870000 CVE-2017-18020,0,0,f351090599b1f58dae56c40c05715034e9e69922c8a56884f5c881db61e42b13,2024-11-21T03:19:11.020000 CVE-2017-18021,0,0,f35997595946af8b41c27954759060ab943e95211f027ef080863231ffa7ecaa,2024-11-21T03:19:11.170000 @@ -110903,7 +110903,7 @@ CVE-2018-1000164,0,0,d5213ae24a71107b0097d07edae108569a1ca5a78a8342e396164718fc8 CVE-2018-1000165,0,0,18443702bbb7a77c63dcae93d4be78ed31b6ca58f54e03306ce4878f29952436,2024-11-21T03:39:50.013000 CVE-2018-1000166,0,0,163372ff37fa8ffebd37167aaf873297363adb35d47c8e2dafc9848d09631f24,2023-11-07T02:51:10.197000 CVE-2018-1000167,0,0,0032ec48288bc829239d846b67e138b3b022a4c4c8e684a5fcd845b139ac3fb3,2024-11-21T03:39:50.183000 -CVE-2018-1000168,0,1,1062c18abe8014db85158493fd209ed65de3377afaf6ff243544a312f584a8b5,2025-06-09T16:15:27.577000 +CVE-2018-1000168,0,0,1062c18abe8014db85158493fd209ed65de3377afaf6ff243544a312f584a8b5,2025-06-09T16:15:27.577000 CVE-2018-1000169,0,0,17a04c06ed5429bb153e51ccfa28edd477d07f2b0edb341ab7f5b8f097ca1bd3,2024-11-21T03:39:50.497000 CVE-2018-1000170,0,0,4858c6b723ef158e2ece3cf2f2c2aa93361c6793938e2e191fdd99311a4f6142,2024-11-21T03:39:50.630000 CVE-2018-1000171,0,0,b51497922c9d26c9366b8332de90588a771fdbc364ca4449fda572ca772b289a,2023-11-07T02:51:10.260000 @@ -110990,7 +110990,7 @@ CVE-2018-1000423,0,0,4b65574729bad369159651a75236473e1980b88c1902b8513c9ce68a49b CVE-2018-1000424,0,0,6064d9e31eaf18b96959ee3119df6f6f9a85a4b46eeaffd465e4176c97368ffc,2024-11-21T03:40:02.850000 CVE-2018-1000425,0,0,1ca3211c819a5258e2965c0af257c15bac5b66aaf9dadd3fcdb046ea8346c45d,2024-11-21T03:40:03.037000 CVE-2018-1000426,0,0,90f91b0dd008cab4b509c88461965e6000d83019cb2e3c78a064434b3644d904,2024-11-21T03:40:03.203000 -CVE-2018-1000500,0,1,a9649fce3321061ec298574449f34eb259e204ab28cfcc7873a390faa18433c1,2025-06-09T16:15:27.847000 +CVE-2018-1000500,0,0,a9649fce3321061ec298574449f34eb259e204ab28cfcc7873a390faa18433c1,2025-06-09T16:15:27.847000 CVE-2018-1000501,0,0,34c048653060dc8162c6ee38123bb12b048b2a2fe9fb8ac1ec04d780ae9d8bd3,2024-11-21T03:40:03.510000 CVE-2018-1000502,0,0,2a70ba3331bdad508e0a4ada3743623ec0094d36dae549d772b65be5037c2b6f,2024-11-21T03:40:03.663000 CVE-2018-1000503,0,0,69a36c8580f53b2147658e10e45e3d46a831c46d8a672584681b32fa8a802eb7,2024-11-21T03:40:03.803000 @@ -111007,7 +111007,7 @@ CVE-2018-1000513,0,0,44d07f684461fbd6cabb026358a55b88967b5ea68f84271ae8aef665f79 CVE-2018-1000514,0,0,4da479dbe814edebd8c8c579ef83b4877a5a41525c2410fcf4531e4ba85df09d,2024-11-21T03:40:05.563000 CVE-2018-1000515,0,0,9545910fb1a1716bcc5c41e28c8240ffd39c350a960136dfa4e43286d6cf2fb3,2024-11-21T03:40:05.743000 CVE-2018-1000516,0,0,579c753fb68ef9da87037134a3a8992593fbb355d3d9d2ed7bcbe3e287f8633c,2024-11-21T03:40:05.893000 -CVE-2018-1000517,0,1,cbb322f11d0017a0feac5f7852bd88e9c1a8e61d993c52fc450574981bed2ab1,2025-06-09T16:15:28.047000 +CVE-2018-1000517,0,0,cbb322f11d0017a0feac5f7852bd88e9c1a8e61d993c52fc450574981bed2ab1,2025-06-09T16:15:28.047000 CVE-2018-1000518,0,0,249d8ceec7baf341b6c3a3a78860af88797d4c5d529b25d0d7598a2d9f56de23,2024-11-21T03:40:06.297000 CVE-2018-1000519,0,0,58ca4a61017e298aa7c3cdcf87dd5ea499ef79f1d459a57c55482c0f01b5cd5a,2024-11-21T03:40:06.457000 CVE-2018-1000520,0,0,8c75f672c60fa48e6e61b9e98df8be870f0f8f6bcd46a6f696307540407dc200,2024-11-21T03:40:06.597000 @@ -116139,9 +116139,9 @@ CVE-2018-15682,0,0,3dfb8e09c07585d41a43fd13cde90bc8f0714e0a3611fdf5534a486221c15 CVE-2018-15683,0,0,66ce16d33e49cdabbcaab7ed3079f8fe05ec0e92dd3e011c47877b62c3577815,2024-11-21T03:51:16.210000 CVE-2018-15684,0,0,cf50ca5f40649053cb7a106034c02b866233af5b7764f7e7b7fe70ccce51a224,2024-11-21T03:51:16.350000 CVE-2018-15685,0,0,a0003e5fa098301dc56e0121f3a18e2f11714ab7cfc7f34a238dc383ed934135,2024-11-21T03:51:16.493000 -CVE-2018-15686,0,1,19aaa71eb880913ec75dbcd025db3d02e226bb0f3946ecb2a56f03e737b6cad8,2025-06-09T16:15:28.243000 -CVE-2018-15687,0,1,018807b83f8327d76d7891ca5a5e948bdd826e0630d201b4fc6781f7b4e2a656,2025-06-09T16:15:28.517000 -CVE-2018-15688,0,1,c8a476a26224198717df3baed09ebe5d75e18cb688d82cc9f7f3e56fa25931e8,2025-06-09T16:15:28.660000 +CVE-2018-15686,0,0,19aaa71eb880913ec75dbcd025db3d02e226bb0f3946ecb2a56f03e737b6cad8,2025-06-09T16:15:28.243000 +CVE-2018-15687,0,0,018807b83f8327d76d7891ca5a5e948bdd826e0630d201b4fc6781f7b4e2a656,2025-06-09T16:15:28.517000 +CVE-2018-15688,0,0,c8a476a26224198717df3baed09ebe5d75e18cb688d82cc9f7f3e56fa25931e8,2025-06-09T16:15:28.660000 CVE-2018-15689,0,0,8ab5a7ca6afafc67be504379ae2b998086e29281f87e711be604ff3cfa50ffd6,2023-11-07T02:53:18.603000 CVE-2018-15690,0,0,76c9442452b361721e3780be1b570ba610d0dae8197755d7cea9926f12b215ef,2023-11-07T02:53:18.827000 CVE-2018-15691,0,0,7e8a7ced9a53bddafd42ffc7147500ba00f80c52b6d662d8fd7a7de36437e2f5,2024-11-21T03:51:17.063000 @@ -120374,7 +120374,7 @@ CVE-2018-20675,0,0,628bd052e17e96d01d7478d93881637205fb8834400a66c6c33be0fba7b1c CVE-2018-20676,0,0,67836629b52f13df42fc4d548a8a1ba0acef9c214eb8be3a66ba4eba7b33997f,2024-11-21T04:01:58.430000 CVE-2018-20677,0,0,b37c1f895ee2ebc9c4ffd28d4fc598d73afeb341e165d56affb97dae35b4c48a,2024-11-21T04:01:58.590000 CVE-2018-20678,0,0,aa87e829a5326f4e0fd81ea7f5431fc34722b683233f49949d32cc2cc3d634ec,2024-11-21T04:01:58.747000 -CVE-2018-20679,0,1,ff2a0f8355189c73c8cf06707ff34c1951be5fd72653899d7e5ca8ca0d5c43a7,2025-06-09T16:15:29.090000 +CVE-2018-20679,0,0,ff2a0f8355189c73c8cf06707ff34c1951be5fd72653899d7e5ca8ca0d5c43a7,2025-06-09T16:15:29.090000 CVE-2018-2068,0,0,fb6c5552e851718ab457bab3d7075bdc16739f53b9432c30d9c0e871924d2f03,2023-11-07T02:56:44.023000 CVE-2018-20680,0,0,8db1964a64a2e94ce5f6cf62722df70492477d683fcbb1217beb797bf11199b4,2024-11-21T04:01:59.060000 CVE-2018-20681,0,0,429a4c2f7b06ad2bfba586016d8106b3c70f898331df1529f4a7d2330a57bf6a,2024-11-21T04:01:59.197000 @@ -125105,7 +125105,7 @@ CVE-2018-6948,0,0,c8ff21e759fa258aca6b01b0f5fb3319a0802788999eeb9bb1082c22f3700e CVE-2018-6951,0,0,6458a06f7758555990ffb0575a55182aa9c879beba951aa2e4339e3c56e7b108,2024-11-21T04:11:28.273000 CVE-2018-6952,0,0,678dbff0df525eb86884b78418ef9c2c299cc871ad66599b41f5145359820d24,2024-11-21T04:11:28.420000 CVE-2018-6953,0,0,c78150bd0ab8a3b22ecf41898cc1fe45b8ce18f80791eb39b2383a61e50ee508,2024-11-21T04:11:28.557000 -CVE-2018-6954,0,1,bf2242a2819b3fa83b1cb0dabcfc4587a64a24be0c87aa35c60201e3341b5023,2025-06-09T16:15:29.307000 +CVE-2018-6954,0,0,bf2242a2819b3fa83b1cb0dabcfc4587a64a24be0c87aa35c60201e3341b5023,2025-06-09T16:15:29.307000 CVE-2018-6957,0,0,f8ef43e0ab44cd9a14ef94c4bf28b549e2549864125d99232c5ed00240a81eed,2024-11-21T04:11:28.850000 CVE-2018-6958,0,0,5058115ce9c91397d4a976d0ea7a9bde5c7b101b9c6933e5339ccc74ad9781ec,2024-11-21T04:11:28.967000 CVE-2018-6959,0,0,2fababa30e235648e63ff7e79db99507b7a3d1f3b1656b7f39a1efebe678e214,2024-11-21T04:11:29.077000 @@ -131144,7 +131144,7 @@ CVE-2019-12897,0,0,9848f181d3e0342c64e564217c9f4205d77fa82b6b9a8185f7423cdf928c0 CVE-2019-12898,0,0,6a6b1cc5378a9b65e1319c37212134b8142ab78acf9e415703e5a6b992a9e31c,2024-11-21T04:23:47.057000 CVE-2019-12899,0,0,a9f9ecde9299230e8a3486db87effe7f126de6eaa3fc6a6679949a1b9c06ad28,2024-11-21T04:23:47.193000 CVE-2019-1290,0,0,8e6ebf82ebd4dfb08f7394956e1adab130609307cbec94eed91f5aa6be298a8f,2024-11-21T04:36:24.563000 -CVE-2019-12900,0,1,05538b0d52a1e72d35e1d74f3332ecece5dea3fc70287d8462f53898201033ef,2025-06-09T16:15:29.623000 +CVE-2019-12900,0,0,05538b0d52a1e72d35e1d74f3332ecece5dea3fc70287d8462f53898201033ef,2025-06-09T16:15:29.623000 CVE-2019-12901,0,0,944fe5c555a17fda074f7ab61b0e921e309d9004a7f8b07b9fe30fe41a6cbe30,2024-11-21T04:23:47.550000 CVE-2019-12902,0,0,db580bb9c15f97fb09559dbd2664af37fa3a2b3af970f74ccdbc2d7e8052612c,2024-11-21T04:23:47.703000 CVE-2019-12903,0,0,d08987381a7d2dd1596b054890056a42ee589d6be8743cfcdb317ccce3a58947,2024-11-21T04:23:47.863000 @@ -135600,7 +135600,7 @@ CVE-2019-1827,0,0,a7d79b03672c53df05d2f3492b73f6eb45485282942762fd93b901464a0d26 CVE-2019-18271,0,0,b6438aa80e2a71b14562b2fc378fbc298155ee023f2505a258c6770fabb5aaf4,2024-11-21T04:32:56.873000 CVE-2019-18273,0,0,c40a06b7ca7307bd946ac76569cec739781192288c239a8b24763f9c4e26bbbc,2024-11-21T04:32:56.993000 CVE-2019-18275,0,0,575569670beea2c4bb975b02ba447db2ec441c5d5ee1e6eefc5bae56ce2a9d3a,2024-11-21T04:32:57.107000 -CVE-2019-18276,0,1,f9fc71d211e6381c4c90970f29fd95d6ec2affb072ab82a8f477572e60e7ea94,2025-06-09T16:15:29.960000 +CVE-2019-18276,0,0,f9fc71d211e6381c4c90970f29fd95d6ec2affb072ab82a8f477572e60e7ea94,2025-06-09T16:15:29.960000 CVE-2019-18277,0,0,69127bb2afae7169b116a70f66d1aa2d764b92ae7e7de41a0af39a096d72fbbe,2024-11-21T04:32:57.377000 CVE-2019-18278,0,0,df35160d7fba6fc63019805b53f8ef763d5089cef2e378271398113af363a0eb,2024-11-21T04:32:57.520000 CVE-2019-18279,0,0,5446ee055c6e661ca1d014c5afb24551806a583f9d9ddf4a8ea2a3709d6bdc82,2024-11-21T04:32:57.650000 @@ -137479,7 +137479,7 @@ CVE-2019-20382,0,0,96096612f3303a089238b7888fe355e567fb98d6965e8af95a45370a581a6 CVE-2019-20383,0,0,f7e60a834065a68bd3f1d21f2ec5605a5da1e78e09f5acd49247777215b824de,2024-11-21T04:38:21.127000 CVE-2019-20384,0,0,d7b1e67b7f8fdbda8559de43c7534853fbe60163cea88f85f0a96c793983bb7e,2024-11-21T04:38:21.280000 CVE-2019-20385,0,0,f5d34a5f7c8200378aa181a487cb178bf3b8c99030d2d3fc531230e21a7fe3a5,2024-11-21T04:38:21.430000 -CVE-2019-20386,0,1,7cfdf30c6b56f776aa2195fd56e91557e71d3f168f8f5dbddb8e00a1ec1be590,2025-06-09T16:15:30.467000 +CVE-2019-20386,0,0,7cfdf30c6b56f776aa2195fd56e91557e71d3f168f8f5dbddb8e00a1ec1be590,2025-06-09T16:15:30.467000 CVE-2019-20387,0,0,e035c009287607eadee18319ad71b0e5d04af30ff7a84816b7e68e302026c485,2024-11-21T04:38:21.740000 CVE-2019-20388,0,0,28d1cc030f9257fe240ef8ab54c5a66331d82cf14a87b0d5f3f8bd1797ccb5cb,2024-11-21T04:38:21.893000 CVE-2019-20389,0,0,0cc9a82b420c00ba434c808a78314ba1a235792a3736d889c5733f045d10772f,2024-11-21T04:38:22.127000 @@ -138463,7 +138463,7 @@ CVE-2019-2501,0,0,ffa0347798ebcf44a47e44ead6d3b05ded1da361e2f07695728cebc5b96dc8 CVE-2019-25010,0,0,25bdc14db7d5a2b742bee160542373d0248012fc1c1eeb9c219d2d812dfeafa6,2024-11-21T04:39:43.853000 CVE-2019-25011,0,0,eeb41fbacbafa0fbfb576677a9c65758f37224b9aa5f5b8a77b5a90a47692a3d,2024-11-21T04:39:43.993000 CVE-2019-25012,0,0,0f6398068f25848e5df90c88010d4881654d12877f9f1d5f05cbe78d17c44487,2024-11-21T04:39:44.137000 -CVE-2019-25013,0,1,5793987eb686a14c94f8e755cc6ae3feb068bc050f861f73c775d9f54b321daf,2025-06-09T16:15:30.703000 +CVE-2019-25013,0,0,5793987eb686a14c94f8e755cc6ae3feb068bc050f861f73c775d9f54b321daf,2025-06-09T16:15:30.703000 CVE-2019-25014,0,0,e14f962ab72cf4f53994e6d3b754b224aec0b7f63ccc3759deea84f0c7e1bdaf,2024-11-21T04:39:44.480000 CVE-2019-25015,0,0,66037ccf131aa5dc78a66a574687ffdaf606ad5d8fddd1b803bc98efb19303e3,2024-11-21T04:39:44.637000 CVE-2019-25016,0,0,644f39dff20b0192c14685e1252bb13bcb2d679fcaed879eb7206c80445c6bc2,2024-11-21T04:39:44.790000 @@ -140959,7 +140959,7 @@ CVE-2019-5735,0,0,a5b21b8d87a537bc3f64e808011a225372146b361ea0ded3855071179e6e21 CVE-2019-5736,0,0,84f47c920e247488258bdb4a86d1294b8bec73ddee904e4324e462e6bf6e5d43,2024-11-21T04:45:24.603000 CVE-2019-5737,0,0,5e03a1bcc81c04fca99f576d1458fec00fb127a9110ff95ec51f88531276a4ba,2024-11-21T04:45:24.920000 CVE-2019-5739,0,0,275f53c8f8f5688bcf3123bfc6e7aed8cc3fe9cf573abc131e51bbf235aa0556,2024-11-21T04:45:25.073000 -CVE-2019-5747,0,1,7045a88c946e67623e61153323753b6500575f01610cba152f1419a1a2a0827b,2025-06-09T16:15:31.280000 +CVE-2019-5747,0,0,7045a88c946e67623e61153323753b6500575f01610cba152f1419a1a2a0827b,2025-06-09T16:15:31.280000 CVE-2019-5748,0,0,b5049984978dbb97bc1bcae82407bddbf2a0b27713da682a26089e1bf1788c36,2024-11-21T04:45:25.353000 CVE-2019-5754,0,0,2ebe3a58b5175793c8842da98e3fb3d1acf4e386f0ad053cba4399a20e11baa3,2024-11-21T04:45:25.490000 CVE-2019-5755,0,0,869f7555a9f0685534a95b4892f6e3bdb9cd9ac116b222dc642cfe6e3224ba23,2024-11-21T04:45:25.617000 @@ -148822,7 +148822,7 @@ CVE-2020-13772,0,0,b733b796eec11b21f3443b6de85e2c8aaf167241c16901da0e3a49da11947 CVE-2020-13773,0,0,f4f92496ecace1ca7944d38e04b24a218458a94774c2e8a036174632cc43360e,2024-11-21T05:01:49.673000 CVE-2020-13774,0,0,d6d91deb596ce50fb7e0d527708dd02941e3a236c25f8126e7c5ae4a0308de36,2024-11-21T05:01:49.847000 CVE-2020-13775,0,0,96adc081d52aecadce0ae0a280e594a6cd052904aa6bf5227ee366a1de3cfa6d,2024-11-21T05:01:50.013000 -CVE-2020-13776,0,1,e3ba581dc10d33a454e8656cec30d2d9da4c17566cab0f0cead45c14897995e4,2025-06-09T16:15:31.573000 +CVE-2020-13776,0,0,e3ba581dc10d33a454e8656cec30d2d9da4c17566cab0f0cead45c14897995e4,2025-06-09T16:15:31.573000 CVE-2020-13777,0,0,96337bf68bfb476b4400e150ba634923aedf95807e3e260b8357e5fb7d08f143,2024-11-21T05:01:50.330000 CVE-2020-13778,0,0,4cbb668d358cc0b3b741cbbdf0df291c863530345fa9533255384df68560bba6,2024-11-21T05:01:50.493000 CVE-2020-1378,0,0,2b181de3c9c43c7238ba296613a56c017fcc72801efa8f2350f11b708b7939a2,2024-11-21T05:10:22.200000 @@ -156489,7 +156489,7 @@ CVE-2020-27614,0,0,244c4ceb90c44fd8fb0940871104d93005fd368595ed1b8e502d1bb3223bf CVE-2020-27615,0,0,7b6dcd65011dfdc03256cb9adf89eeb933d8fd59c0fc6ed7f8b843e9453500e7,2024-11-21T05:21:28.607000 CVE-2020-27616,0,0,91596733ba22ac9beb79c21d6ec61bd1ffad953c7c42c8a47f896139f97a1efc,2024-11-21T05:21:28.830000 CVE-2020-27617,0,0,5150d13a23d2c4427691cbd07ad9edff32f1900d13847ce52c85ca7a307a2d05,2024-11-21T05:21:29.010000 -CVE-2020-27618,0,1,456bc97d96d0e23da0aa9313d8c39336d0231c6f1b87c0bc52555556062fd822,2025-06-09T16:15:31.853000 +CVE-2020-27618,0,0,456bc97d96d0e23da0aa9313d8c39336d0231c6f1b87c0bc52555556062fd822,2025-06-09T16:15:31.853000 CVE-2020-27619,0,0,ce92b0548179eebed33b6c571eae9a6a84ee73631d40ecc6f2325e40753257da,2024-11-21T05:21:29.527000 CVE-2020-2762,0,0,c150edc3cbb9c5ffd639fd122f3e1ab510f1ab1e965c2277ec19e2ef77e80aea,2024-11-21T05:26:12 CVE-2020-27620,0,0,3a9e99b9612c5f569037ec2340c9511a1511401a6ced30cf81d736c78bf13fc0,2024-11-21T05:21:29.850000 @@ -157767,7 +157767,7 @@ CVE-2020-29556,0,0,dd85c94a1123be97aa2ca7e0e2bafe70f80b983727f9fdd20dfd05da8c600 CVE-2020-29557,0,0,07ae7181654c8f4d1405d343c594cdbc26728b2b8d619b623bae434e5c25527b,2025-03-14T17:29:14.257000 CVE-2020-2956,0,0,502aab4ab6864429bfcd2bd8dccd9e75b69740958ae4e20c551f9377c1ed110d,2024-11-21T05:26:43.740000 CVE-2020-29561,0,0,d4823bf0edeffb6111a8b8c5df4321292590e25945d35eeb960ba5434976be14,2024-11-21T05:24:12.123000 -CVE-2020-29562,0,1,c1eda1b11722758efa3b4c3615278cbf6ea39ebca6aa1225f04f4218b2da3c1a,2025-06-09T16:15:32.127000 +CVE-2020-29562,0,0,c1eda1b11722758efa3b4c3615278cbf6ea39ebca6aa1225f04f4218b2da3c1a,2025-06-09T16:15:32.127000 CVE-2020-29563,0,0,e0161b13c939c52b35427e6073dd64ed316e5b32381a62adf278a9fd39d3a19c,2024-11-21T05:24:12.447000 CVE-2020-29564,0,0,eb17ef10230d1ec17abaf506cf3982609b2bbd531773e615b4fa394de8f42d28,2024-11-21T05:24:12.607000 CVE-2020-29565,0,0,980a939cca26d46f6c23e3cedf3d91ff68b7ebda33560321224529900f0ec439,2024-11-21T05:24:12.760000 @@ -177222,7 +177222,7 @@ CVE-2021-3325,0,0,c9f8ea77a3f6dab1871cfc5e32619106cf0416c7fc46f8fe9995aa9c65a602 CVE-2021-33254,0,0,cf6a5d93127752db4bb6774f4065e6cc388ec7d8879c3d4000975b20bde76e7f,2024-11-21T06:08:34.027000 CVE-2021-33256,0,0,16017d564a1fe07ccae618bf361cac7c6da1dccf7852e580b9444173aed5540c,2024-11-21T06:08:34.177000 CVE-2021-33259,0,0,35d0f5ccd0aa4ad7901fd58943fbdf48253a25033f411c6c9700c5d9694c1733,2024-11-21T06:08:34.327000 -CVE-2021-3326,0,1,83a32c840e5bbaefcc347617aead3d33f6287c698bd57ab7a11354cdf4c8bbbc,2025-06-09T16:15:32.670000 +CVE-2021-3326,0,0,83a32c840e5bbaefcc347617aead3d33f6287c698bd57ab7a11354cdf4c8bbbc,2025-06-09T16:15:32.670000 CVE-2021-33265,0,0,acd49374480eb8f22ac3a1bcfb6bb04bb3cfc86e4086f8df74c740735be424e1,2024-11-21T06:08:34.490000 CVE-2021-33266,0,0,4272fc535804745b4657d9b956288a30aa68ec25db92419d6e1b0fa599ba3b8d,2024-11-21T06:08:34.643000 CVE-2021-33267,0,0,6983df0173e39d5dce30d4fd7cd115753502ed7d515f45cb13472fbb9cda7293,2024-11-21T06:08:37.420000 @@ -177703,7 +177703,7 @@ CVE-2021-33904,0,0,1a062f73e0dc753edeafd5feb1fe0eec7139721a5cdad7da14386964daddc CVE-2021-33907,0,0,dd9d7ff64e59c8d4bdaf2f5f303552428f8b2322e3b28cb29ce050b0a293e21e,2024-11-21T06:09:45.217000 CVE-2021-33909,0,0,d1795303a4308eeb6907e168535a9da9cad3236edc3b16945d1de3055b4d5d9b,2024-11-21T06:09:45.353000 CVE-2021-3391,0,0,5f0daa015e52ab5a4e3e4a5b958d1085b7ba7c48af3d3e05cfb6f6350a75a1ea,2024-11-21T06:21:23.850000 -CVE-2021-33910,0,1,1668316fb398219998177fb65c2c41d473ad201f99aa03e0148029471951984b,2025-06-09T16:15:32.380000 +CVE-2021-33910,0,0,1668316fb398219998177fb65c2c41d473ad201f99aa03e0148029471951984b,2025-06-09T16:15:32.380000 CVE-2021-33911,0,0,961333ad412ad666de3bd197e7afed2402ac943efdfb6304aba663ca62f334f7,2024-11-21T06:09:45.813000 CVE-2021-33912,0,0,782091bdc9ade96966d9e52c38d53d841576e3d90a6d473150e91bc48ddd2271,2024-11-21T06:09:45.967000 CVE-2021-33913,0,0,a8db3fa1075732db6ad2a34ab37e425afc3e4b6fdcf539743ee3c062ccc8d82a,2024-11-21T06:09:46.133000 @@ -182728,7 +182728,7 @@ CVE-2021-40524,0,0,670f93286f4ec027e4465188a5bc9de80ba395b85d97131732cbb147eb88b CVE-2021-40525,0,0,6d5504d9d8688f8aa9fea5396e83de583f35d4af1231d5cce130f0b23bcba353,2024-11-21T06:24:19.323000 CVE-2021-40526,0,0,8b7b7eb16b490f7daf9267380347fa73b391a5097d61021ce21e52622491425b,2024-11-21T06:24:19.470000 CVE-2021-40527,0,0,3338325fb30e82a4ae89497cdbfffb076c8be95e09aec7290da2bde892c77703,2024-11-21T06:24:19.660000 -CVE-2021-40528,0,1,fa091b142a4d513c4b9faacf2272c153263c8a6f604bdbfe8c11a99350ea2f88,2025-06-09T16:15:33 +CVE-2021-40528,0,0,fa091b142a4d513c4b9faacf2272c153263c8a6f604bdbfe8c11a99350ea2f88,2025-06-09T16:15:33 CVE-2021-40529,0,0,890feefbcd7d2b969bceab420408e463d67f48021a61d19b3aaf68fd173c194f,2024-11-21T06:24:20.040000 CVE-2021-4053,0,0,7d0306b07eba250480e5ea50820a37145c7a083b023bf9d7ddcafccc382c3e74,2024-11-21T06:36:48.460000 CVE-2021-40530,0,0,e5e4748306ca8f270eb2bb49b056b8967a3fbdee63f3f31d3cad9a480684eb4f,2024-11-21T06:24:20.240000 @@ -188480,7 +188480,7 @@ CVE-2022-0559,0,0,1a5394861f035fe2bd88a1740c6aa7647dbb00327590033188b3c28cc2a6be CVE-2022-0560,0,0,30f5f27c2bac15eb25a6f191b9aa5a9b2cff62d36542fb346d2174cfb0f532ba,2024-11-21T06:38:55.097000 CVE-2022-0561,0,0,b4a6b6480fad0f0522489de783d48db48404776b8a46f328b7b5528890b6a14e,2024-11-21T06:38:55.217000 CVE-2022-0562,0,0,438bfb8a181e27d77525629f599371baedcafa32392b0fe1e8d57d992a1b1949,2024-11-21T06:38:55.367000 -CVE-2022-0563,0,1,2b5aa24e25131958398fdb57af83f04d8d815504a0bd8a6584cafb65dd222e2f,2025-06-09T16:15:33.237000 +CVE-2022-0563,0,0,2b5aa24e25131958398fdb57af83f04d8d815504a0bd8a6584cafb65dd222e2f,2025-06-09T16:15:33.237000 CVE-2022-0564,0,0,35b17ad3049bc93645757297cbd4d956e9c5550c7a8a083d06d84401abcda483,2025-04-25T16:15:21.977000 CVE-2022-0565,0,0,5481f52e56923f57c29c9b01ce5d95bb9cceb57090ae17c7c6a52718697cab36,2024-11-21T06:38:55.793000 CVE-2022-0566,0,0,81b59b68fec2129b7106950e0d18b36d03ec49ea9d4f27baeeaa2a4228e62218,2025-04-16T16:15:19.627000 @@ -197332,7 +197332,7 @@ CVE-2022-28388,0,0,cc7e52d83765ff9c3ba4b28806805b1143b9bd2fa20f4935ad8a0af9de3ec CVE-2022-28389,0,0,9a742432ea1a7380486c7a56174889f0d1fcedfbfe5886bdd54c249882445b64,2024-11-21T06:57:16.910000 CVE-2022-2839,0,0,7fd69894fac20abf0ba8b7d7458b4c5a9161b8193da61a2478addeaba334edf9,2024-11-21T07:01:47.040000 CVE-2022-28390,0,0,fa9f2ad40fdf86d609492f5ca2ff1e70a668d293e10d31369008fa44e3ef348f,2024-11-21T06:57:17.090000 -CVE-2022-28391,0,1,6dd53c9c5e56861e68160464caad34f1d79d98b4be1f3805a77073d0e400718e,2025-06-09T16:15:33.480000 +CVE-2022-28391,0,0,6dd53c9c5e56861e68160464caad34f1d79d98b4be1f3805a77073d0e400718e,2025-06-09T16:15:33.480000 CVE-2022-28394,0,0,e7a9805383fd0b990b4b36a0272f702b26eeba74919c99a35076e386f087840b,2024-11-21T06:57:17.407000 CVE-2022-28396,0,0,30f27ee37312f87644c0b8c627b8a982d1b4843e6ff9c89cb97c3241ed80ec73,2023-11-07T03:45:42.307000 CVE-2022-28397,0,0,a873371245a697ac354959ddaa1f99cca993bc892897c5583c51ad00c6edde6a,2024-11-21T06:57:17.540000 @@ -207750,7 +207750,7 @@ CVE-2022-4140,0,0,f5be22db8ab13ff448effd91bdc0355e283637561e49d3c684914815464d9d CVE-2022-41400,0,0,b470023b601676d4a30a303d35e0a2b5766f41b951dc4f2c3a182bc32261e6f1,2025-01-30T21:15:09.157000 CVE-2022-41401,0,0,f6dc1a80aa2c4c3b1e1657937140fae471690a1cc072966b25f9a2e8573d6694,2024-11-21T07:23:09.723000 CVE-2022-41403,0,0,1b861830159846e904087974144ba6e7c6fff447dbeb73f5e1c39dafe156a346,2025-05-15T19:15:54.980000 -CVE-2022-41404,0,1,2c49137970fb0b662328cc4d6a439c6ac3ff8c21f4306d14c2cf960d7a5c101b,2025-06-09T16:15:33.690000 +CVE-2022-41404,0,0,2c49137970fb0b662328cc4d6a439c6ac3ff8c21f4306d14c2cf960d7a5c101b,2025-06-09T16:15:33.690000 CVE-2022-41406,0,0,fc6b96ee0e30d912372612f36909a42ce51f35720d80a0c2f04951dc1b1a52dd,2025-05-20T18:15:44.100000 CVE-2022-41407,0,0,7d6e85b6e03d52dfe63decc169134cc1f44af882adcc53b940540190f3ebec23,2025-05-19T21:15:19.513000 CVE-2022-41408,0,0,7ce8241c39673724246301c52b2de9021310b505b87cb229a2e3a45c52d5b9fe,2025-05-19T21:15:19.730000 @@ -221400,13 +221400,13 @@ CVE-2023-25993,0,0,c0f03929351cdf07b1f1748eedcae3c4bc7ee37ee19c379a128ded87056d1 CVE-2023-25994,0,0,f5583d7411115f6984b74982d1af77ea15389dc97edba9d1ea7f1ef77a8060d2,2024-11-21T07:50:35.260000 CVE-2023-25995,0,0,210ed8c2eb39f65a36c5949239d57aedd517fd06cfbfeddfd2444f0f7a824b32,2025-06-06T14:06:58.193000 CVE-2023-25997,0,0,3b918bb29f684fe52591d4c6393c1de4d77ae4d720cc03ca4af189095fc4e9e9,2025-06-06T14:06:58.193000 -CVE-2023-25999,1,1,d218ac23a3f6b0f8e0fa37a6dc882d6e9edeec7a8cfe32b855355ddddca3726c,2025-06-09T16:15:33.890000 +CVE-2023-25999,0,0,d218ac23a3f6b0f8e0fa37a6dc882d6e9edeec7a8cfe32b855355ddddca3726c,2025-06-09T16:15:33.890000 CVE-2023-2600,0,0,a872c778f8801ce6d05663d064f57f1b014192778a320d594d11d3db783b363e,2025-04-23T17:16:30.140000 CVE-2023-26000,0,0,53d86d521b08424629dd4c096fa509c974a1ccc4b5a0d87c54f0cc9e568157c0,2025-06-06T14:06:58.193000 CVE-2023-26001,0,0,7a34ac8792365a6266b58ae8d7bf9ab6300cab0d3de6166a03e47ec8a714a6ec,2025-06-06T14:06:58.193000 CVE-2023-26002,0,0,ad6d86bed9a2e7dc0fdb1aedf2ab43526387fba2b5c7936c04877cb26b281079,2025-06-06T14:06:58.193000 CVE-2023-26003,0,0,3a7a3b7ce5738f414ebef388b80a14cf623122aaca1cea29916634e84d85741f,2025-06-06T14:06:58.193000 -CVE-2023-26005,1,1,1889c33c49e1da8b5f891bbe7d2447a2e0600eec6b44dcd8f3c3f4ac2db58bf3,2025-06-09T16:15:34.043000 +CVE-2023-26005,0,0,1889c33c49e1da8b5f891bbe7d2447a2e0600eec6b44dcd8f3c3f4ac2db58bf3,2025-06-09T16:15:34.043000 CVE-2023-26008,0,0,f198dd6cc4409921397a55a534152252e0445daee527cc4932c9bdf16f00dc4d,2024-11-21T07:50:35.390000 CVE-2023-26009,0,0,eedd4d7d708ea47da3f2275f119a9edf840e11d9a59dfb3c7046708f31f99cde,2024-11-21T07:50:35.507000 CVE-2023-2601,0,0,0da43dfc9dad87e500b2c2abaff9f89ef1faa670f081c8cef39a901c8aa3be38,2024-11-21T07:58:54.603000 @@ -234015,7 +234015,7 @@ CVE-2023-4195,0,0,23ed8b44049420b14f6c81de99bf209260858d6faf25b2ddf063c1b4fb771d CVE-2023-41950,0,0,a76e2f740ac9565befbf68a96b3d354a4accf50f5d4e63a0c02e6fa9783f5798,2024-11-21T08:21:59.067000 CVE-2023-41951,0,0,98e70f2472c272eab38b34ff997e9178d05c1c4057e095403658a377d31ee300,2024-12-13T15:15:26.090000 CVE-2023-41952,0,0,28dc140abbdafd809d8605f6c0e6d9c06ca12a6fabb3fdbb96324006875f8e5a,2024-12-13T15:15:26.233000 -CVE-2023-41953,0,0,ffb38694803225d3d99b9b3cc3165a426828a79d80f777cd6f2ae09885ca2de8,2024-12-09T14:15:08.710000 +CVE-2023-41953,0,1,d0b9b2d6c6b9004bc82d3c245125efc165edd3147c6ec97036c0e290ddb48695,2025-06-09T19:29:02.470000 CVE-2023-41954,0,0,3ca6b9e371c425002c51bcc30d416dc9f16516f0152413267a9ed6569ac634bd,2024-11-21T08:21:59.187000 CVE-2023-41955,0,0,f254b52ddeb3ebde5b2833db28eee7e978b7684b17acf57c86e179997b1e83da,2025-03-06T16:47:56.660000 CVE-2023-41956,0,0,61b3e3eb1569e34bc1646fec95a6a19c09de67d145cfd23729effe2ed8085ab3,2025-03-25T17:28:47.953000 @@ -234817,7 +234817,7 @@ CVE-2023-42977,0,0,94186963ab4e299d855b5f440cb569976ce4254a72b221dc2e972ecfcc199 CVE-2023-4298,0,0,d64bad22e139bfa9b3851b4edb333e1dab44be233375709ccbc193fbf1ea0c57,2025-04-23T17:16:43.337000 CVE-2023-42981,0,0,cf6481bd691928b44116c1d4a5ddacf145b3a3b5f77fed7d00dda4b2bf1e9d02,2025-04-21T22:04:05.630000 CVE-2023-42982,0,0,b4edafd10f604050ae4aadcee0780bee25cffcec2a01a7cb33ce2443ab9280f1,2025-04-21T22:03:57.180000 -CVE-2023-42983,0,1,685c4a20694a603f216206bfdd0de66ce39b02bc9533d405be55c3ff7f048961,2025-06-09T17:12:16.063000 +CVE-2023-42983,0,0,685c4a20694a603f216206bfdd0de66ce39b02bc9533d405be55c3ff7f048961,2025-06-09T17:12:16.063000 CVE-2023-4299,0,0,1c48228975fccf08566f979039e0b4c5caf7b3d7e926d0f3612f67918d5d52d6,2024-11-21T08:34:48.760000 CVE-2023-4300,0,0,4f0ca2301eb5a6958dcfe966550374caaf1dd667dd2fa4eaf9e07f508da938c4,2025-04-23T17:16:43.500000 CVE-2023-4301,0,0,e6bdd572ae1f727c410438f7fcb0058d8995e283d638e87bc3d5745e8f0dd079,2024-11-21T08:34:49.050000 @@ -238984,7 +238984,7 @@ CVE-2023-48770,0,0,f6fc76b16f1cf6acf16a5953433e899517b66eaaf6ec84cfbd7ace3d6366f CVE-2023-48771,0,0,a4a424861e0d7acc67ca6d05c1c28418c8585c100a79b9b63aab858158b6a5f1,2024-11-21T08:32:25.147000 CVE-2023-48772,0,0,0c43ac47883d8df1dd3af913749f86f550e73578fea685085738b693f50aa21c,2024-11-21T08:32:25.287000 CVE-2023-48773,0,0,69c2d10ce53d5bed5abbbabd5452f88c034b79ad27513b7475e9a369aba8c011,2024-11-21T08:32:25.420000 -CVE-2023-48774,0,0,2cfcf736dce0487b2994846309e06f9b0bb8da439fa9f69a3c8f006061ccbcfb,2024-12-09T13:15:33.937000 +CVE-2023-48774,0,1,ecf3a7d64958249a79699b7a00b744679e5ac040135b663fb248a332e2c017ce,2025-06-09T19:22:58.103000 CVE-2023-48775,0,0,fa9fe58a38a9119748279127f270d1ac54cb2b2cc1527bcfb3bd7dca7deb38b1,2024-12-31T13:15:05.650000 CVE-2023-48776,0,0,60422db6013f51551677e22d94d4d864bd4aac472b3cb692bc594e8b25dde16d,2024-12-09T13:15:34.077000 CVE-2023-48777,0,0,670db1ce54767343eb8aa9927abecc50f45e4c84536196e6ea9e27eb126cd132,2025-01-28T19:20:32.813000 @@ -239734,7 +239734,7 @@ CVE-2023-49831,0,0,b4972e3c4bbc63d8a302975757b66c05afe3feb127236b9ac82b926268b17 CVE-2023-49832,0,0,1bc945dbdd7535ac9f620e0d391b0dba06cbbdd375e5ca59ab024c035c1193d7,2024-12-09T13:15:36.597000 CVE-2023-49833,0,0,d18597be456f334cb6e7261800855280d9e590ede3c241c7df50b343ef49d5f7,2024-11-21T08:33:55.537000 CVE-2023-49834,0,0,9af32e71aec1c900f10a1919ce40c423d33500e1360db47f2c93be4cd95603ef,2024-11-21T08:33:55.660000 -CVE-2023-49835,0,0,84761a5988bd732910d1df50193d06dbb857b59e2aa13e1b788a31162d730773,2024-12-09T13:15:36.733000 +CVE-2023-49835,0,1,0212543a30c077ddf1cff930dec51394a58d8fd733950b259b31d9c61e602985,2025-06-09T19:23:43.620000 CVE-2023-49836,0,0,f17819488a7cb8ae4b2121f5a078b561f27426e62e0d69d877b353d18d01fd91,2024-11-21T08:33:55.787000 CVE-2023-49837,0,0,237225e1f64c16497d1ef67c34c36e1498192a9751c75794e06701aa3f0c506a,2025-03-13T19:15:40.187000 CVE-2023-49838,0,0,3e5fc80f29bf176873176454fcde64084e4bbacaebc8469c4e2fdcd7377bfa0b,2024-11-21T08:33:56.047000 @@ -239865,9 +239865,9 @@ CVE-2023-50001,0,0,734983cd528f2562aaca65cff059559350959419eb7e04ae50d0c3329ca87 CVE-2023-50002,0,0,5af4b860d9debcdf09ef053e01b1af62697929da76f8027f5201dda7b0dc5c1b,2024-11-21T08:36:26.340000 CVE-2023-50007,0,0,7b7c6e6490e868f760dd7f49384ff384a1867fd5fdc71d35f9843f75a62e82cf,2025-06-06T13:15:23.593000 CVE-2023-50008,0,0,5e93e14a8efce57c68815db2683b4a26b0995077c86b8edfdd6805aba0608389,2025-06-06T13:15:23.937000 -CVE-2023-50009,0,1,0d6e958f3c0504ebd1ce7cc92a249b7a387854674177d5c097a8985455313cb3,2025-06-09T16:15:34.193000 +CVE-2023-50009,0,0,0d6e958f3c0504ebd1ce7cc92a249b7a387854674177d5c097a8985455313cb3,2025-06-09T16:15:34.193000 CVE-2023-5001,0,0,46a46eb4a9d00426fc31810a58f9e35e63999d4ce41dddac44ee505be864f62d,2024-11-21T08:40:51.740000 -CVE-2023-50010,0,1,affa32d8e9aeddfc79db8124652e557fa434177effd222420d9b98e6dc702199,2025-06-09T16:15:34.457000 +CVE-2023-50010,0,0,affa32d8e9aeddfc79db8124652e557fa434177effd222420d9b98e6dc702199,2025-06-09T16:15:34.457000 CVE-2023-50011,0,0,c145ed175ced09124989fb0d5c0560e5d4be3fc7d3053a21b9fb20dd3ee3570a,2024-11-21T08:36:27.393000 CVE-2023-50015,0,0,81d964821e2816fe2561e9089dee93e252d3d542d5e7f85273c1ee10dfab97b6,2024-11-21T08:36:27.550000 CVE-2023-50017,0,0,96df0348a505f917ffed422b82173deffa45385055ad565f5fae0e0f776722e3,2024-11-21T08:36:27.780000 @@ -239896,7 +239896,7 @@ CVE-2023-50071,0,0,67164ec6c5e306ff0d77e21300e1e7a85d56fab29a7408e33997c8dca4250 CVE-2023-50072,0,0,9bb7fc835e7ba4506bb65f66a9dc0083dc42c81b32a0958b592a7939ea4984fa,2025-06-03T14:15:33.203000 CVE-2023-50073,0,0,190f93ffa639ac4f9c506da9e26929c9075fd5a31bfef6a257be42c3ae157596,2024-11-21T08:36:30.957000 CVE-2023-5008,0,0,9e4707c0b3fe5a219380547420894ae5baf0950f280d19c00d0e3b897e54240b,2024-11-21T08:40:52.673000 -CVE-2023-50082,0,0,4cc4156615a954b9ba8ed1073b5450500435b3bd1a876483cc54968a9d27b155,2024-11-21T08:36:31.107000 +CVE-2023-50082,0,1,67e3d86c7f3e19a7360e8d3ad1ab397e3bedd3d6f39437b0ce514ff9b9801dfb,2025-06-09T18:15:23.050000 CVE-2023-50089,0,0,d33613a887a220c499775a25dda05d09dfef7e795fa35eda4f482e6a763d7e2a,2024-11-21T08:36:31.280000 CVE-2023-5009,0,0,35408e77aa4900e01203d06c8f9e3f4f29457fd7f26fabd2fe43d34123496ea4,2024-11-21T08:40:52.813000 CVE-2023-50090,0,0,cad3d649dbd0d9b587c55c1c7dc6c0fa772ceaae43671f8c77eb1791d27298af,2025-06-03T15:15:45.127000 @@ -240380,7 +240380,7 @@ CVE-2023-50879,0,0,c3221c006de7b5745c77edc6244ce7017dcff6246f2039cde6a028fce0d19 CVE-2023-5088,0,0,b09273453ef250c17d595afe8c302eb567901ba85301eb295076874a219a898e,2024-11-21T08:41:02.500000 CVE-2023-50880,0,0,019e655fb8c4e2349b438ad3c282be6f4a268f53ffdd91d7cf51a203d40a0bc3,2024-11-21T08:37:28 CVE-2023-50881,0,0,51d1bb0e11b11e92bf9356e5782fd9c4ebbbcc563d864c14b1bc8b256758ddb0,2024-11-21T08:37:28.123000 -CVE-2023-50882,0,0,fa525120477c7067cf1265868e90ad00354b70f9f845f8185f8370fa210e7519,2024-12-09T13:15:38.720000 +CVE-2023-50882,0,1,f70708cb4926b71053e02f31f3b82eacb508c08b9d1638997527d5e930fb2f50,2025-06-09T19:28:15.550000 CVE-2023-50883,0,0,672a8f063fa55652697bbe3f1d6a011a8767cdb491bd712a91e4f7f54e570f92,2024-09-20T15:18:06.593000 CVE-2023-50884,0,0,fecdc474fc569dc94f0342c1eb0792ff3125446e9c5510abcc9fd701d51f0530,2024-12-09T13:15:38.850000 CVE-2023-50885,0,0,58f7e8a74f1a0d0ed773a3974d954683724942e74ec0db395bc222ed861f754e,2024-11-21T08:37:28.540000 @@ -240587,7 +240587,7 @@ CVE-2023-51202,0,0,e80d8a326edec273ee574019c348cdcb3d1eb5a767e4a04fdddf678ae841a CVE-2023-51204,0,0,4ab72253fa3e646995088e6b92194973fe2551fe1d8abba5f33132c62634f0da,2024-05-27T01:15:14.180000 CVE-2023-51208,0,0,2e1f21f8e5d857887c3f899fd4593f10b397e3a39401d099d98d6c5bd6ee511e,2024-05-27T01:15:14.283000 CVE-2023-5121,0,0,edd03e2178265561785d2da3936604e9c309797ec7c91e9006d607e096d1ff6a,2024-11-21T08:41:06.270000 -CVE-2023-51210,0,0,1e8c0b0ddad5e32de94abd7d188090379642b2bc9e219c15dd196ac33f6dc24b,2024-11-21T08:37:54.773000 +CVE-2023-51210,0,1,bd0338ef5d41acbd927e7d8f616a9b760829f953ea94f1ff0754c847adcd36fe,2025-06-09T19:15:22.553000 CVE-2023-51217,0,0,c572e9fc555b67fbd8bd65745c6358aa86fe459a87669ead1694c0f780150c3e,2025-06-02T15:15:24.520000 CVE-2023-51219,0,0,ed9264b5d5bba3ce65d2752c3b1850f14b4fb39ad5d6f529328c2a51d4c8e38c,2025-02-19T21:15:14.533000 CVE-2023-5122,0,0,05cac3257f237d04df2bc4fc8a8899b5106568e4dbd1ff40b3c5537d8f10e59a,2025-02-13T18:15:55.023000 @@ -242379,7 +242379,7 @@ CVE-2023-5384,0,0,27196c8aa40e34132517d8631b23cbaf5b96df9138e6afebc9a2987cb6f1d8 CVE-2023-5385,0,0,99d7397d65c7486b7c6eb0bed710e09d0bfc2870e56ae12580f847e2fe43ded3,2024-11-21T08:41:39.890000 CVE-2023-5386,0,0,8a70532d1b84b00eef86ac75cb3dae9823dedf8bc685f37b4be45d384320e27a,2024-11-21T08:41:40.007000 CVE-2023-5387,0,0,5ffae49d7ccd0bf93f0986d5e3cdaa38d73761c2c0be3e3024234f810ec2d14a,2024-11-21T08:41:40.130000 -CVE-2023-5388,0,1,83ff43bdfd4a588f8a7552d351e072da421c5b792cd300cca31c9ebbb0e8c76f,2025-06-09T17:42:06.640000 +CVE-2023-5388,0,0,83ff43bdfd4a588f8a7552d351e072da421c5b792cd300cca31c9ebbb0e8c76f,2025-06-09T17:42:06.640000 CVE-2023-5389,0,0,43d2c4e2e9c4b4b0a717c7279117057fe1e556abead631f3fee0d65226eac0b0,2024-11-21T08:41:40.437000 CVE-2023-5390,0,0,a6c15ee8a3a44b7a95d5fdc23d614ba2e581dbea1124e2d472632c4f9d7e5ad2,2024-11-21T08:41:40.570000 CVE-2023-5391,0,0,8a81d45122a69f1109950bc863a6452297b61abf47a6f57d2bcb318ed65d3d27,2024-11-21T08:41:40.707000 @@ -244010,7 +244010,7 @@ CVE-2023-7164,0,0,86ae01551ee471631921e7e17a97222573aa0ceadb73ad38d105a007afc9ab CVE-2023-7165,0,0,1fe342befafd30c0f8ef25378edb6753833ad75618642f79ff06ca8166e21319,2025-05-01T14:56:41.717000 CVE-2023-7166,0,0,057193a909b85694e45acd430a4a5075b36b9b3b5b9915241292bd84d3f880f2,2024-11-21T08:45:25.287000 CVE-2023-7167,0,0,d195faa9d00f44dff9059976300c6f8332f6b933b1f76f2f66ca1b1af4c59e97,2025-05-01T14:45:43.087000 -CVE-2023-7168,0,0,57d9ebaa2472d6e6eb5fe753ae1407d0fc4bd83044bc9e6cd86089f311d8e1f3,2025-05-20T15:16:00.430000 +CVE-2023-7168,0,1,121bf0729f794573b5affbeb4720891965b8ff2a7bea7a6cc50c6958d896e343,2025-06-09T18:54:07.350000 CVE-2023-7169,0,0,b9fd9197e9b0a0b9a266ae5e0568621343ce559d17d6d6d84ce06645fc9b0aee,2024-11-21T08:45:25.633000 CVE-2023-7170,0,0,953fcdbddc0d6e8b3f282ae48cc838271409b9c1e47276286cd30eadbca8f0f5,2025-05-30T15:15:28.533000 CVE-2023-7171,0,0,608ea53183d14fa23ced6fd655f6766d7e0e9f517e3a1d2b265fd10fafaf515b,2024-11-21T08:45:25.907000 @@ -244079,7 +244079,7 @@ CVE-2023-7235,0,0,f38db4513534e885caf775044c7870ecf36cfb7d604410f50f3b2807a80c81 CVE-2023-7236,0,0,2b048d7e32640d15e54b70f01b10eade64ba658c8671f173bf3ebc540171d907,2025-05-05T17:58:10.357000 CVE-2023-7237,0,0,0c3bd6955eb6bf6c958eb5f374149eb8332630855855e4a2dbab3e9a5d407760,2024-11-21T08:45:34.857000 CVE-2023-7238,0,0,f2c2a16153a14b165e4d3d77c2752db1c30df7b47db9f2ea28e60d6fd1873126,2024-11-21T08:45:35.027000 -CVE-2023-7239,0,0,9c816819159580a32dcfadd8f4c9c7d5c1078652e0a735714bb23ac45cd5c946,2025-05-16T17:15:49.190000 +CVE-2023-7239,0,1,9f1e07b811b4b04ece1e83c798ba13e4b738a0a5d36250cfa91ff345dc68b457,2025-06-09T18:31:08.873000 CVE-2023-7240,0,0,439042a94f83d9baa88145b524f98b35bfa94251573bfe12a1c6deedbb56ec68,2024-11-21T08:45:35.173000 CVE-2023-7241,0,0,9e46c326d2897bd02e28b12a8e30d4dbed45458de5095dc41a55823e393cfdb6,2024-11-21T08:45:35.333000 CVE-2023-7242,0,0,e0a2e483a4603c7268168685c86efa9160d5f58ee87fc9d24f5e79db33cbb6f9,2024-11-21T08:45:35.470000 @@ -244124,7 +244124,7 @@ CVE-2023-7293,0,0,608de922eed5cceda3179193d6b4cf1cedf54328566b4cf84c64170cb80569 CVE-2023-7294,0,0,c39a7545702eccf7324c7475c3431bc7727f3b8eaa89f44e69b9bb7e469e84fd,2024-10-17T17:34:31.020000 CVE-2023-7295,0,0,4a7608f2a2d795efb64c4111b61d35269ed425699008d705c364c26130b3fe7b,2024-10-16T16:38:14.557000 CVE-2023-7296,0,0,5ffec4c2a7c81b387e2e7306010865ffc272336786db444e086a2ff96bd6c35e,2024-10-16T16:38:14.557000 -CVE-2023-7297,0,0,5df9437a2ee1edb361871091a02ae7c4ed647901a88ca18dca00914a22be0190,2025-05-16T17:15:49.340000 +CVE-2023-7297,0,1,dc09e6e6ce9e9546cdd6c8eacf4dde7366f7875d29000e9e979d7b76eaf8424a,2025-06-09T18:29:35.413000 CVE-2023-7298,0,0,73a0b66774294ae09c3636840df40c908dd321e9199f80183f401a006139b793,2025-05-08T15:38:44.027000 CVE-2023-7299,0,0,732af176d8692ec72ba36c97c4d288506d72870359995f66f745ed66ad90ecc5,2024-11-26T19:12:43.750000 CVE-2023-7300,0,0,f261ff112afbec4c7273260312d5d6cf726f09691a49f2d2a59fdcc067284f54,2024-12-26T09:15:05.697000 @@ -244356,7 +244356,7 @@ CVE-2024-0245,0,0,8790136d5c748161ad4df931f0b3b23af12e96cb57e69307645933cb67c0fa CVE-2024-0246,0,0,9e6a618deb2dd1e0a207aae6df232803b609e8f9b0db209f3d32cd99fdb578ec,2024-11-21T08:46:08.490000 CVE-2024-0247,0,0,88f599881e2c9ff049c1845bc3d9ecf7be8ad61db98404c94b1a4bb744b6edbc,2024-11-21T08:46:08.640000 CVE-2024-0248,0,0,ce6bb140b16c70e405d1305ebb33ae7dcefe3c07765ebedc2589481a8eebf3e2,2025-05-07T21:16:00.750000 -CVE-2024-0249,0,0,0330e303dbc84e4c2c644aec907f67850f7f227674751d3c6d49ce5d2a417c27,2025-05-16T17:15:49.497000 +CVE-2024-0249,0,1,d4fed32d639af6d7be98026dfa2038c0844277d544d48ae55c157bc1c81ef633,2025-06-09T18:28:56.670000 CVE-2024-0250,0,0,efc40ff688f8b3db5635798766ea8928ca425fb37ac771643628cacbbb384fd8,2025-03-26T21:15:20.870000 CVE-2024-0251,0,0,351e204a87d1986e3ba82f24720fc57dfac68bb8cc531575b95ae8752f2d0a34,2024-11-21T08:46:09.027000 CVE-2024-0252,0,0,4df11d1ed2018eb98aa56422ef909f6dd5cf23034f0d5b20b34e1b16f543baa4,2024-11-21T08:46:09.167000 @@ -244680,7 +244680,7 @@ CVE-2024-0585,0,0,940b680c34ad121dfa69b25eb22e69053bc2430cad3c0f48e3188936c0ea54 CVE-2024-0586,0,0,483c6d27ef26d2b65fcaea8ba03f9ffda3e17eabeb80e6d97e4f5eea0e29ae61,2024-11-21T08:46:57.010000 CVE-2024-0587,0,0,77138ad54200d6675cf5918f9c4f964baf339e5709c9bb1413429e1cdc91821b,2024-11-21T08:46:57.137000 CVE-2024-0588,0,0,7363ace3d041ccd002b9e661fab0dd7d9434accbd53e8594f6313805a3b24224,2025-01-17T19:25:52.137000 -CVE-2024-0589,0,0,226846ac6698efb5192efce79755aeadfa69697e910a3ae32d7b46e4b008d86b,2024-11-21T08:46:57.360000 +CVE-2024-0589,0,1,4a543b5824e055e608d915c7257bb51f4996ffe28163554a896c8a799e5db986,2025-06-09T19:15:23.393000 CVE-2024-0590,0,0,5a91a4518e821bd213b61bd270a67ec03a2987e340d81ba2d03380a780690c4b,2025-03-04T14:53:30.107000 CVE-2024-0591,0,0,7fbea116192591335f8f1d5d2d14cd82c8c9b52d606ae6c5428a8e5fb76fea73,2025-02-07T17:53:51.437000 CVE-2024-0592,0,0,d0edc05bd1c4665eac5c0d8b9a0ca86cdd3c8cf54377132974e72b81d9d39b2a,2025-03-11T16:36:50.407000 @@ -245038,7 +245038,7 @@ CVE-2024-0966,0,0,a371317a01bf648e72e643f48a875b8ff1eb4eef1f9ec22d108dc75da05577 CVE-2024-0967,0,0,852e27a2fed8e6fa4c2c8ea65909c2851b1f7747b0831bc7b139406eeeb99602,2024-11-21T08:47:54.870000 CVE-2024-0968,0,0,2adf6f675fe8367153779cf53407f6187c199dacca5503cf3367ddd720d368df,2024-04-08T11:15:49.610000 CVE-2024-0969,0,0,f0f63e7c5134853236cb11c3663a549ce3f697536d3dd8f4f5859c7117e2326e,2024-11-21T08:47:55.083000 -CVE-2024-0970,0,0,30f19b4e6a8285d4cf8eb7004f4c82a5c2c327a7c6c02f9b28e7aba7d0205c2d,2025-05-16T17:15:49.807000 +CVE-2024-0970,0,1,1bf1419ef69a6494796789e524bf8a135fa92d97c1a5ca84888328c6bf2e0900,2025-06-09T18:24:48.597000 CVE-2024-0971,0,0,0fbf66131068316f18a459309bb5abd202482e32856952ee011afb233e507491,2024-11-21T08:47:55.270000 CVE-2024-0972,0,0,e58be32866f33c67069bcbf1a6ed4e3bd511aaced28f98cb0cc22c6a351ffb25,2024-11-21T08:47:55.493000 CVE-2024-0973,0,0,aed8eb330b3491d473a0c3659e7bd14152bc998dac9bc6833bcc7f238dfe0d40,2025-05-05T18:53:59.060000 @@ -245155,7 +245155,7 @@ CVE-2024-10094,0,0,699b667445fe791d93de90b3097acb73a2c1ab025cb463c440eebc573e171 CVE-2024-10095,0,0,7be965c3275839227029409c680ba1f671ec7b8fcaba42e7a973dc116b9093e1,2024-12-18T12:59:51.003000 CVE-2024-10096,0,0,f8a7bcaf28fc93ccd4582e8ac942754501d986d14ae51b987ed66272d76c037c,2025-03-26T17:15:23.943000 CVE-2024-10097,0,0,7121c39d2c238d666aa68f098cbf1d5544a9aab3221767519c48769f9658d5d8,2024-11-06T19:14:22.817000 -CVE-2024-10098,0,0,43f0e98dea0997b75414c8a11e466b071609988435cd73cebea762f6d9b317c0,2025-05-20T16:15:24.010000 +CVE-2024-10098,0,1,7a25a2efb7affa2c2578f498e3a432c90750353adc9efa538834a27e06ccb868,2025-06-09T18:23:28.110000 CVE-2024-10099,0,0,ff238a91e24fcb0a85fcb34f700c80404c8e345e8e0c333898778e0f4a6cf856,2024-10-21T21:03:53.647000 CVE-2024-1010,0,0,b760c6839f8ba4fc102d84ec8eb422be6a7986ee41491a18032e2ca8b34ccde5,2024-11-21T08:49:35.243000 CVE-2024-10100,0,0,e257ac7ecea7ed9deddddca60657be7d2649829f289e846b06e9d10c365d346b,2024-11-04T19:15:05.297000 @@ -245210,7 +245210,7 @@ CVE-2024-10145,0,0,ab90287acfe3f22a0aac67043e2d5282257df0cf5796dbc49cd99c6e2499f CVE-2024-10146,0,0,6e09dab8117419dbea9c155334f4fc0781dab4723b77ecdcf27f990383c80e63,2025-05-15T16:29:19.743000 CVE-2024-10147,0,0,a56a79fe5a06b98cc0b76112510f81c153284d047893303acf550d79857bb9ca,2024-11-18T17:11:17.393000 CVE-2024-10148,0,0,db0d5db25a1f49f9ba7e42a06491994c37a2b37e9a76e3ae4cc30f2bbf70efeb,2024-11-06T16:02:22.120000 -CVE-2024-10149,0,0,62370eaef49aa49c6d8e1ee2c9e1f983ec26af70464ad66ec4f4278b8d403373,2025-05-20T16:15:24.687000 +CVE-2024-10149,0,1,3bd631ba571c03f31d82d6142cd364eca0ab9e4ae09d2392087ce424a21005f2,2025-06-09T18:20:18.567000 CVE-2024-1015,0,0,be928180cb003f6a5eec5ab2bae4726bcad9bf29373863ff5830478d50997929,2025-01-03T19:15:53.587000 CVE-2024-10150,0,0,fac5f7de9492af33015847edbbaf4e66b672db3781dc50dc161c61d03c3e187d,2024-11-05T17:47:35.353000 CVE-2024-10151,0,0,fa6e76ef80ea9aa12c5b5af4e328679d268a6314b8cb2ccadad21212d1332107,2025-05-14T15:46:04.210000 @@ -245420,7 +245420,7 @@ CVE-2024-10359,0,0,3f327b3c1c406b1f8b8e8130fce0c42c09298001d3b414e6038ce8f6e6af2 CVE-2024-1036,0,0,d25b8d26af000f07669729b06ebb447206ede2960015e2fed660e23eae75a886,2024-11-21T08:49:39.210000 CVE-2024-10360,0,0,49b9d570c045e2259e89921d406064d5e455c0a7c41e77df302b1e3e299adf2f,2025-01-27T15:19:13.047000 CVE-2024-10361,0,0,4217266473334ed2601403cebe7a2d843c448f33d6f69753255ccdc69a9b0980,2025-03-20T10:15:16.507000 -CVE-2024-10362,0,0,8db406bb8ecfa53fd99596235b04fdf01acfeac9057f28f9b0bec80b8972105c,2025-05-20T20:15:27.700000 +CVE-2024-10362,0,1,2c305acdc9a6ba5b8a50395cfd43c99ed15b8060785a102ca24e396efb0a1754,2025-06-09T18:18:46.303000 CVE-2024-10363,0,0,e56f9d4ee94c33e430726501cb25a61e016e8ccdef1b63816a842171bf9fb2da,2025-03-20T10:15:16.630000 CVE-2024-10365,0,0,4fe48020ede3297b6900c2d074afa9cfc695d825a2faa2d82338ba40f9460ff8,2024-11-26T20:36:08.280000 CVE-2024-10366,0,0,2fb601e7bc7168487d4497aebbd697e85901de95124b916e42b8ec25871d0496,2025-03-20T10:15:16.757000 @@ -245537,7 +245537,7 @@ CVE-2024-10471,0,0,357b6c0bca07bb1b221f23d1ef55bb2accee5aef87db2dbfbf5d19504b44c CVE-2024-10472,0,0,459ec811587f0e88c6b3f693aefec4389bc2fadd96366be9e62703036cb140d8,2025-05-15T19:24:43.470000 CVE-2024-10473,0,0,e3339739f88f11a39d3988ea84894563ad15abf3691beaa3575a2f5c2a10d7b6,2025-05-15T17:39:41.120000 CVE-2024-10474,0,0,7ad065f81d3c8110aa13ec82a68760dbf0ebf9b00877e85327bd8db7bb54a207,2025-03-13T20:15:16.680000 -CVE-2024-10475,0,0,61f2f5bb796d206d29f374225535d1e538b6ddf57964a0518af5766d00612905,2025-05-20T20:15:27.857000 +CVE-2024-10475,0,1,d5756baeb0cbf1e20e9be51e9119b8bf6bae65d025aa523132f115e358470136,2025-06-09T18:17:46.647000 CVE-2024-10476,0,0,ccbc6b379994a21d78b8965635d687e54c0adefc0ef53dc4d8c64d7eb42ff1c7,2024-12-17T16:15:23.390000 CVE-2024-10477,0,0,5945f5a0c0dded94912e59ec354ac61a7229d56159d97e42e8a275ce9d57f850,2024-10-29T14:34:04.427000 CVE-2024-10478,0,0,3c092509343a93ec957cab0db4c925179338ee0d061b602b8ae241cb8d24c713,2024-10-29T14:34:04.427000 @@ -245703,10 +245703,10 @@ CVE-2024-10628,0,0,fe3648bb198d97e4edbe93780d5b1a58e72b60d604c379b076d62a96f2c50 CVE-2024-10629,0,0,1f9c9c5683a42ffc8dadeffeff3f612e74f207dcf5dcd96d8c7fa679d62c2730,2024-11-13T17:01:16.850000 CVE-2024-1063,0,0,33b4f1a2d0cd96333caf63788d2cf890d1ebab138b3c91da9285726ecbf447d1,2024-11-21T08:49:42.713000 CVE-2024-10630,0,0,2b78ea36784a2215af96a7d4fa9ced32a586fc0d350190c904bf49da64587ad2,2025-01-14T17:15:13.857000 -CVE-2024-10631,0,0,669ec121fbee5813a234f5a7d71b82ad8f1d7e95b250fbc544346c085f94afa4,2025-05-20T16:15:24.960000 -CVE-2024-10632,0,0,9159f9477204de07afe396bfa0deba0a119ae04eda8edb6c90041e02c6bd16be,2025-05-20T20:15:28.010000 +CVE-2024-10631,0,1,c973248ad54c1c65948d983aae6618a0f187f9f5ca5511a8b4c301ed805df68c,2025-06-09T18:11:29.627000 +CVE-2024-10632,0,1,acd0dc302c512e8c72c912ec9dc7a4b59c1ecf07391250623c72a505fb73c21e,2025-06-09T18:10:20.487000 CVE-2024-10633,0,0,b64cd913918c140fe334bc0b3014f8ec940be53af9967d66db1f33e12d719dce,2025-01-26T06:15:23.137000 -CVE-2024-10634,0,0,cce205b9f73713ba78acc8460f48c373fad4e3fa55b8b083c5991b188f32ed25,2025-05-20T20:15:28.323000 +CVE-2024-10634,0,1,7513ed18f590ca0d964611d7ec7d690b803d4646a90c082b7e7f0b23ef48ef1e,2025-06-09T18:09:43.180000 CVE-2024-10635,0,0,576f2b4aba4152eeafa19b52dea43a72446460ec93d7287b66158e3e7e541e5d,2025-05-10T00:56:29.500000 CVE-2024-10636,0,0,51d65a9a72ca10606ebab57795a091094c53b3e14bb9b9ea00131b43cbb9d73d,2025-01-26T06:15:23.293000 CVE-2024-10637,0,0,7e06c7f1ae3ed57f7c7e5d0402f64adf6b84400c16bf748102751d89e1cef638,2025-05-07T13:19:33.350000 @@ -246229,7 +246229,7 @@ CVE-2024-11137,0,0,851745d59c851ec0eef79c031d77598e3fe74f15b126feab42c4cb010ea9d CVE-2024-11138,0,0,2f34cc7cd067d0c6304b6c652f672298f3f38bc0e02398b29badaf312aaed525,2024-12-10T21:11:45.043000 CVE-2024-11139,0,0,2d6fd6ceae8e9f801cb28510138174f054ac674fa052625032eec6de670d70fb,2025-01-17T09:15:06.370000 CVE-2024-1114,0,0,26f8d922f7817a26291214f4551b12b577ca7b3e88078b0c0c71e617799dfdd6,2024-11-21T08:49:49.727000 -CVE-2024-11140,0,0,3932ebe6094d64743df0d22756b734f8137e8962dc2a48481070805d28060739,2025-05-20T16:15:25.250000 +CVE-2024-11140,0,1,1a7857c952e75f1561f034c0c8995ce005adf98b0d0fe9daf02a7c26c5fd7564,2025-06-09T18:08:23.107000 CVE-2024-11141,0,0,b5e55f0d7bfe53f8404bc782e8f145adc10c7ecd17c29534c2a26fee94e02abb,2025-05-20T20:15:28.903000 CVE-2024-11142,0,0,fe6f6141a0a0d86940fc8736263b2e479418fc0e68e3f4b0739701acb7f10e4d,2025-05-07T16:51:23.537000 CVE-2024-11143,0,0,686e238b18cb6e6b1a398192b44515340df593fe49d6838dfcc7892698b7fdab,2024-11-18T15:03:56.927000 @@ -246275,7 +246275,7 @@ CVE-2024-11185,0,0,1932fde8da4ceff0aad2c8c397b6223b173c5e24bf16e388d91260742a2a8 CVE-2024-11186,0,0,47033ebf7daa317b6456f1e8ce85d004bf0340e8f8ca88292af77e0280797b52,2025-05-12T17:32:52.810000 CVE-2024-11187,0,0,e4a5fa8a1c9ef1119fc9f2584e4a2ef956ae93ae1074bec0b84b51f9ed0675ab,2025-02-11T19:15:12.640000 CVE-2024-11188,0,0,8070c22ab1552d28f4790f36fbb035b9ddec6883502131d83e84861dfa7e75e7,2024-11-23T06:15:17.570000 -CVE-2024-11189,0,0,5c58e6b12658b05251ef5d01ab5b8dd2bbc73d002bd6064d114f79afdcff1a88,2025-05-20T20:15:29.040000 +CVE-2024-11189,0,1,baf71446de62636b866eaef11087831d7b0e50ae6011da134360a666d9528594,2025-06-09T18:53:11.783000 CVE-2024-1119,0,0,fd6fae855233e3069d5ad6668474ced6e974623a6a3e8b05b97956b4e3b84a10,2024-11-21T08:49:50.530000 CVE-2024-11190,0,0,9dbf446a7043e2bcb0d14f792a312507c38b76789c22a7a47a68fc11e072fb71,2025-05-20T20:15:29.190000 CVE-2024-11191,0,0,252782a1be7dc774513b993a88eb45c6a508e6bc4ce0e8083e165f00ea1f9a82,2025-02-11T02:15:33.323000 @@ -246470,8 +246470,8 @@ CVE-2024-11369,0,0,f67f71afde5d9d2bf5e3a429864e22574535537898015cd20376d252ff364 CVE-2024-1137,0,0,9367f9a1347684403f58a1a7490fd736dd1a246a1ba5d989931872114e882ed8,2024-11-21T08:49:52.723000 CVE-2024-11370,0,0,dd87b64b129f6809c8edd7b234994b231659964606722e4f84f6ae489936a5a5,2024-11-26T17:53:22.707000 CVE-2024-11371,0,0,940d4acb1660319dcaf9e79be7b51b02d713b6710d41c4a41d256d4b90485073,2024-12-16T15:53:39.657000 -CVE-2024-11372,0,0,2960ad8047fcfd9feed5a33d5cae59a01e02898974b42aa944a523f6f1702ecf,2025-05-20T20:15:29.857000 -CVE-2024-11373,0,0,56cd3a1110116fbc302be3596c7a64f377b08b6f3acf46dff85b540ff88819d3,2025-05-20T20:15:29.993000 +CVE-2024-11372,0,1,968fbd7e0abd4774928af8560cf15fa151c31766aa6958505963d9b966696c46,2025-06-09T18:51:54.680000 +CVE-2024-11373,0,1,f6ef8a00caf7115fd7bf5fa9b548715b5e0fe3f1a812b90d1d02465d7a7162e0,2025-06-09T18:51:30.493000 CVE-2024-11374,0,0,a5a1e58c0241313798d5870304d6ab4fd613b7c8d39f72ddd8edd6b514e2a94b,2024-12-07T10:15:05.643000 CVE-2024-11375,0,0,09113c9c4c16e936568b412fc506dc02ef629e8e628c654e3f6f629cd5e5088f,2025-01-07T05:15:11.907000 CVE-2024-11376,0,0,5609ceefbc58fb4309dc8f69fb79b730f8dace0410f91558d90169df386137aa,2025-02-21T15:38:34.793000 @@ -246598,7 +246598,7 @@ CVE-2024-11498,0,0,84851bb97905888d6f795318663af36c64e8d0d26ed337ad244473b916cdc CVE-2024-11499,0,0,a966028160491791da709ee5dab2133093b1d72d985c5f69229a93bd1e155ea3,2025-03-27T16:45:46.410000 CVE-2024-1150,0,0,1edff0fc21d5f22172836448fdcc7da772ab8a792f462f53ba0bc1c0fbae9271,2024-11-21T08:49:54.780000 CVE-2024-11501,0,0,6aa155b5e971a466b4f7473002330671c6add4e056433a95089c7dc638a9cf0a,2024-12-07T12:15:19.783000 -CVE-2024-11502,0,0,2782854340e0fb236a3ba7c1b5bbb7bd0fad1036850dd3097eeb53df9f88a517,2025-05-20T20:15:30.143000 +CVE-2024-11502,0,1,1cda81beb59954b2cc7effeb017aac48fd5276f9fdb49c427d8cc0b170524228,2025-06-09T18:49:53.787000 CVE-2024-11503,0,0,3ae0c04581f944ca2a17b090f958bad8a2a522e19afa651f6889426cb90966c2,2025-04-29T18:11:43.417000 CVE-2024-11504,0,0,08041e39ea114511fb2c8f0bd997f2ba562d5b23bd65b19966d39dcea8b037ea,2025-03-28T18:11:40.180000 CVE-2024-11506,0,0,84ff33f5409ba7fdd242f7a002e540f941fbaac1999270cf94d333eb3dd6c642,2024-11-29T16:56:17.683000 @@ -246716,7 +246716,7 @@ CVE-2024-11612,0,0,bb444eed2bab8dc9d7d3d2707a19c782bc9311cf8cab3a2875a904169993b CVE-2024-11613,0,0,a3e07cdc9334a5ecee59dd269cd691a9aafaba0a184c1f7adde95fd1410284d2,2025-04-17T02:41:14.680000 CVE-2024-11614,0,0,477321533ad9e2ccd73ec62dea3afe896674cd2e969a76f5f053d52a44b0aed8,2025-04-17T01:15:45.350000 CVE-2024-11615,0,0,ed2bb5fa641e5ee4ee7d2e7ae6a50993acb0243aab21f826fce2be532d900e5d,2025-05-05T20:54:19.760000 -CVE-2024-11616,0,1,dff5d7605f090439a7219baa37c337eb42c3b6f03d1cd335a6b69a2e33aa85f5,2025-06-09T17:15:26.263000 +CVE-2024-11616,0,0,dff5d7605f090439a7219baa37c337eb42c3b6f03d1cd335a6b69a2e33aa85f5,2025-06-09T17:15:26.263000 CVE-2024-11617,0,0,bcb75e7bd9fdbd37cd6a48bdbcc0ca4d1056233170d4c804c30c76f738918be4,2025-05-12T17:32:52.810000 CVE-2024-11618,0,0,0e3a6f9f43124700db03eb1b663dd8529795046f0f664ad17bec9e799f8ac8d2,2024-11-22T19:15:05.437000 CVE-2024-11619,0,0,199afb7118552bdb4d05394f3b278f423ca0e36121b2f9801d8d56e20db43382,2024-11-22T21:15:17.500000 @@ -246828,8 +246828,8 @@ CVE-2024-11714,0,0,48451ef6ba02066a684be121bb1a323837abfee218ee2a192bb71f8391bc5 CVE-2024-11715,0,0,9e2c7d6539d86e87f0f536990a843b4ed38eb3f505410f40a0a8f48f23904099,2025-02-06T13:38:51.857000 CVE-2024-11716,0,0,8f03993237cedfb4b3105bca2e9e7e0e4d72543d8a6e6816a973420a2d7c78c2,2025-01-02T18:15:15.367000 CVE-2024-11717,0,0,5cf1e8d1659d0c0acb342b4666ea0ce46f2794e2d3168fb945db1a1190a1997c,2025-01-02T18:15:15.740000 -CVE-2024-11718,0,0,0bed3b3038ae5a1fdd1ea46800c93191f624f222f828f42d9de60c5c5dd790aa,2025-05-20T20:15:30.280000 -CVE-2024-11719,0,0,e4cfdc6ea6b72d016d4a7c18750188bc8c7d1be79bc69faa46c316653109b34d,2025-05-20T20:15:30.420000 +CVE-2024-11718,0,1,38b34064e64b43286a0a5382832eb9cc305eee90e7cd5587c0b7c522ccc8ef05,2025-06-09T18:47:33.240000 +CVE-2024-11719,0,1,222c8c8cf03e9963dddce302b43aeb8880456a135ead737724ae3d6149b0c54d,2025-06-09T18:44:47.300000 CVE-2024-1172,0,0,8a47d65ba883be6f9330fb72413995c12492cc02775718de218760ba1f704a52,2025-01-08T19:08:16.787000 CVE-2024-11720,0,0,4cff87eaa9b0bc632fe14ca9e7875a08281d9bd63641e0bdf5f7effc5ab49311,2025-06-05T16:13:39.850000 CVE-2024-11721,0,0,a74d08a5a2d9f12fdf43567e71a5d2a87ca46e38fcbaf50f78778ec35e274d4d,2025-06-05T15:29:36.250000 @@ -246963,7 +246963,7 @@ CVE-2024-1184,0,0,7b0789c4e91a5162e06df6289a54d1b7f2607f1e0a44e814477ad9c07a3544 CVE-2024-11840,0,0,4f72dc8e1aec5c10e4842e27b0438d261a566769857022259f6d9b1c51e882be,2024-12-11T11:15:06.453000 CVE-2024-11841,0,0,344232de34d770a6aa5423be3e2aec2c71395928f1472511edc4860482d3acb0,2025-05-17T02:19:18.333000 CVE-2024-11842,0,0,5d3f7f03aec1de59476cc9102b4d1c2e310d2486baacf5c1e41b3d22ffbb3d53,2025-05-17T02:20:59.160000 -CVE-2024-11843,0,0,ea6c2d554218cde81d8fe1284f3770cc46726625314ed6134926fa6c0549682d,2025-05-20T20:15:30.560000 +CVE-2024-11843,0,1,9148793901924e01d68dcf452624105ccc14c37b642b23610baa1c9335aa6147,2025-06-09T18:43:44.440000 CVE-2024-11844,0,0,5e2bd026f1a9170eb13fcfd4374039a0f011f60fa687eb9fc0c5045b4e4a3838,2025-06-05T15:47:22.637000 CVE-2024-11846,0,0,6d979cf66f6dd3ee37d22418790e77ab7d59d601391d04e5f4d4d86dc19d9a82,2025-01-02T18:15:15.860000 CVE-2024-11847,0,0,1e8aac4adb19fdd57f3ff3c451f53441fe517a500b7a432b6dcef92981c629e9,2025-03-27T16:45:46.410000 @@ -247415,7 +247415,7 @@ CVE-2024-12279,0,0,28f926ab6f57c2b10bee59d6914cc0152fa6a23fa0d172ad6d11e3d9d407b CVE-2024-1228,0,0,d9ad08a0c1348634a61421c1ad7147deaf6d1d0acee23e78628f7298f108b1d0,2024-11-21T08:50:06.280000 CVE-2024-12280,0,0,7cf8f223a13f5ecd10858444d4591e2335d6f864aa59befcbc0792f570b61a3d,2025-05-08T18:42:33.333000 CVE-2024-12281,0,0,5960eba52f97670b6a2956033b7d75f162bfa47d1f83f9290d25a60bf8c85a98,2025-03-05T12:15:34.657000 -CVE-2024-12282,0,0,efd5d05334cc7389093ce98fd0a3f42e2dc0e0961f7369cbabf479925adb3257,2025-05-20T20:15:30.693000 +CVE-2024-12282,0,1,3184aee298ae8785686153234f75b75bb58cf4285e09017983b2d5906f4577dd,2025-06-09T18:41:15.260000 CVE-2024-12283,0,0,27e00fa0bc574ce5113c52cfd02ee2100414eb1f36a7d99001797949356bf37d,2024-12-11T09:15:05.697000 CVE-2024-12284,0,0,58f0822b9c3e54960af89f6bf167625557218b7bd5211a87b1cc3ca0764a5320,2025-02-20T00:15:19.360000 CVE-2024-12285,0,0,a4a2b41992c880fc476ecd11de1a7b15521385b3ddf2ced01c35545193640e43,2025-01-09T11:15:12.883000 @@ -247436,7 +247436,7 @@ CVE-2024-12298,0,0,cc5fe609045dfd20e01ee8b5a4a2dfa91435af5a3c75ddd1927f875f5047d CVE-2024-12299,0,0,6bf8e5e626459eb3d35ab60bd9555f090eb208e414339f648c4215470dc975d2,2025-01-31T18:22:07.800000 CVE-2024-1230,0,0,4e58704ea3cd6d96f1b95bf7630f56ca27fd7e9cf7f7c464007165035f04082e,2024-11-21T08:50:06.710000 CVE-2024-12300,0,0,0328248a8fb43f00ec541ab5455f8917a3d5219f0a666c2cc7f8e41b776c4b36,2024-12-13T04:15:05.073000 -CVE-2024-12301,0,0,40774010cef30bfa1e64cd08712095878307469952ec9c9cfc2aec93894fdc34,2025-05-20T20:15:30.827000 +CVE-2024-12301,0,1,cee43d1712f430ecc623477ec007fc42c8f5fc485cd95df5ba6795b7e35a7d79,2025-06-09T18:42:17.283000 CVE-2024-12302,0,0,93f9034b6529eb430da583e71c16d2e0ac0e563e4accf7a827b87b599c2cb1da,2025-05-14T14:14:28.280000 CVE-2024-12304,0,0,179180a345670b4c45826d485654bf0b8fe52b5299a8cf0f77a4706c0de4394d,2025-02-07T17:03:45.927000 CVE-2024-12305,0,0,273e297c2c3404dceb5aa9b15a9613cb372f4eca60a3a417a7d24dc0972d8e0a,2024-12-09T09:15:04.970000 @@ -247887,7 +247887,7 @@ CVE-2024-12746,0,0,3dc399827dbe6da7d4657aa1f300fc1452e75823ea53e19ad5a88d067d48a CVE-2024-12747,0,0,c40c04c12da3d602f8e166a8353291f3e503a91ddb4e0934ab4eb62a6af8f9f8,2025-06-02T15:15:27.937000 CVE-2024-12749,0,0,280ff2c791b5dcf89d574e3e5b909038185309adaa236341da6134d271fc7b79,2025-05-11T23:34:57.513000 CVE-2024-1275,0,0,8eab781ab1c4b6181e657741b9361b7d07c5c975bf66f07a41ffcd3de9380867,2024-11-21T08:50:12.913000 -CVE-2024-12750,0,0,6a526d5045eccc8fde3f6e58014c106b7e36505121e785d332806b0d5bbd64b9,2025-05-20T20:15:32.760000 +CVE-2024-12750,0,1,afdaf4b2598925e420b05c92caf86993884d80734c5cb64bf5a42bac06c4b465,2025-06-09T18:57:14.990000 CVE-2024-12751,0,0,c8d36ab052c0d3e9ec35af9571e74ed832930012381575b9dc1af30fc71ca134,2024-12-30T21:15:06.130000 CVE-2024-12752,0,0,23a1df67098cb18d5a208109678c48c3e7913067d5db32571522e50bc90bc4a8,2024-12-30T21:15:06.260000 CVE-2024-12753,0,0,4271c9d86ac6ffc21783ff22aa4d21dfabf207717e4c237171a1fe2075c45756,2024-12-30T21:15:06.400000 @@ -248011,7 +248011,7 @@ CVE-2024-1287,0,0,86cfcf8ed68830eef8991c1cc47e2012e7e4c97ca8a27598ab8fa2741ba6d8 CVE-2024-12870,0,0,a0f5cb38fbde77a7441fb3b28efd1bdff58897b947e83af560e27d7c67ee4e12,2025-03-20T10:15:31.210000 CVE-2024-12871,0,0,b825cdd5e9c19c166813a43deaafde1baf1f5e8a75e8f07a7fff39cafc87fdf3,2025-04-01T20:34:33.523000 CVE-2024-12872,0,0,29306093e7b19f5dd6c16c9efa94e10d9da9b0c6012b2abc584239cd33378025,2025-05-23T15:59:56.103000 -CVE-2024-12873,0,0,d5bfe65d1403e3a80909cbf9d7f70f1f02fe0938153304251b1d26121fd231bc,2025-05-20T19:15:48.787000 +CVE-2024-12873,0,1,346e99a67306c353b0c32e5ccede4ba28f3069139f28726b504ac01b47f81177,2025-06-09T19:57:23.357000 CVE-2024-12874,0,0,fdd8e8b0edbab6a9f68c7742c56386f808bc3f2b925614c3886e53a2c4c53938,2025-05-20T20:15:33.430000 CVE-2024-12875,0,0,87b0956586183e5c613030d4ef29fd959e1646cc803bd99da499c5b331518d7b,2025-02-07T17:09:37.010000 CVE-2024-12876,0,0,321b13efcabf74dc7c36f7d793dc2e63dd6020db9b51b3c4d9cfb4e699901ff4,2025-03-13T17:55:17.550000 @@ -248111,7 +248111,7 @@ CVE-2024-1297,0,0,be31694658346ee468905bb61ed45bf681e56bb20ac49e80e658637c7d9e5b CVE-2024-12970,0,0,268b1d4c941e5f6dcc50831164f6567c6c310551116a8aea4012d7694acc0deb,2025-01-06T12:15:06.573000 CVE-2024-12971,0,0,c2c5c3fe38e87deb07976a7e25dd1dc1fe90714181112bc7a4543d9c7913a870,2025-03-17T10:15:14.797000 CVE-2024-12975,0,0,d2fcfd8a6ee09a057f1e63cdb3bd18d308081cd2bf8b6a1de24fe3b24c862cd2,2025-03-07T17:15:18.263000 -CVE-2024-12976,0,1,6ac7088c1c6aacb118b4be920e0e8904cf52354f73802b4cc945e04ed243c3b4,2025-06-09T17:39:41.530000 +CVE-2024-12976,0,0,6ac7088c1c6aacb118b4be920e0e8904cf52354f73802b4cc945e04ed243c3b4,2025-06-09T17:39:41.530000 CVE-2024-12977,0,0,f2784cf886f1a9a98412bd301827cb607acf57019e9dd06bd3f9bdd5f99fac22,2025-04-03T13:19:13.477000 CVE-2024-12978,0,0,a57fc57c39e39b3e2e9f07ed3579b2b4266af54eccd20365f8ad7c22021fa3fc,2025-02-18T18:51:08.940000 CVE-2024-12979,0,0,ae24db0e4f2a66f4e1de36af93143ab82962ea0c4d3e66e74916a1e08a75a73b,2025-02-18T18:50:22.963000 @@ -250595,7 +250595,7 @@ CVE-2024-21022,0,0,2f78adf409a130aaedfee1e6621bd5e964d4399619a87627dfa8a21677f34 CVE-2024-21023,0,0,545d72357b2bca012c5f5f132e6716e1b7213d11f398493995a82296a20fe0ce,2025-04-10T17:41:56.140000 CVE-2024-21024,0,0,22798d4b68c52eb493cfe689aff459faaf8d179b78e934d2b2ef2680c2710f5b,2024-11-27T16:31:18.080000 CVE-2024-21025,0,0,cb940b17b62838bae7c7173612add05e07812946f7f9845c549dee6f7e994c8c,2024-11-27T16:31:12.720000 -CVE-2024-21026,0,1,b100b1a427d35a8320a6b677d55bdca8aab9ac536a35e3dd713495f75ebc3dfa,2025-06-09T17:52:51.883000 +CVE-2024-21026,0,0,b100b1a427d35a8320a6b677d55bdca8aab9ac536a35e3dd713495f75ebc3dfa,2025-06-09T17:52:51.883000 CVE-2024-21027,0,0,a61ffe37c9f1d4a384893fde109de27008fa272fa0f6ae950bf7e6f33ee668bc,2024-11-21T08:53:38.737000 CVE-2024-21028,0,0,18d80213e84bc8123b709b891b053abcb23fe0ea19d38e7ca9e31a07ae5731b2,2025-04-10T19:53:40.083000 CVE-2024-21029,0,0,a2164eec77648fdd187f7ca3636a9757ed8fcb3385453331e8f9516a022bda95,2024-11-21T08:53:38.967000 @@ -250692,7 +250692,7 @@ CVE-2024-21112,0,0,06c8cd0e5b992b79c415a59764396ffbc1719f981d8404c4d3fb13f64b613 CVE-2024-21113,0,0,a223fa6ecef0fcb4bc8137aeb715daea99e4112cd21bcbfbe763f3d9546a5a71,2025-03-18T14:15:38.140000 CVE-2024-21114,0,0,90c3fc8c5c18194ce719d704ed0efc4d962c4eae97d0da0830e01bc30635acab,2025-05-08T14:24:17.207000 CVE-2024-21115,0,0,d0850bd705c8708b0bc29c578d0fdcdddf9b4397de2a96392f588101e2ea6f21,2025-03-25T15:15:19.887000 -CVE-2024-21116,0,1,bdacd2f844923fca6283d25482232b7606179c60e7d1074506ca0d5d66cc8aaa,2025-06-09T17:56:51.660000 +CVE-2024-21116,0,0,bdacd2f844923fca6283d25482232b7606179c60e7d1074506ca0d5d66cc8aaa,2025-06-09T17:56:51.660000 CVE-2024-21117,0,0,b404b520bbd240fe8317c6c4e2ab11ce3a1351715182e422fcfbbd5d8e1c7cf3,2025-05-21T19:43:24.523000 CVE-2024-21118,0,0,dfb174443743455639d3d519ae3e7800f4183eda1b765acea21c3bd12058d487,2025-02-10T23:15:12.130000 CVE-2024-21119,0,0,8adc7d67731590ceb3d3f5e8f1f4a1bfe581882c771a4b0d6d46bb1dee9f759b,2024-12-06T20:26:42.563000 @@ -250713,7 +250713,7 @@ CVE-2024-21132,0,0,987a799b19a7e7bd596caec84e5104553b08a672468aa5d0c46b6c2bb08b9 CVE-2024-21133,0,0,10f69656085c42e9a849d4dcabe83318eea049049395271942ef70a2534662e1,2024-11-21T08:53:50.837000 CVE-2024-21134,0,0,dcbe5d92aa08c7bd192bd36994d01957334494a6a59b5ce1ce1359b992bacaff,2024-11-21T08:53:50.957000 CVE-2024-21135,0,0,c86e5c804add53084e4d35d6a12d09babfc79d7ef6ed692753959bd30b31e714,2024-11-21T08:53:51.100000 -CVE-2024-21136,0,1,11d437b1fbb0adc0c217dc80c92b1eae0e20ed11722e054ee44786c83d8b64f1,2025-06-09T17:54:53.190000 +CVE-2024-21136,0,0,11d437b1fbb0adc0c217dc80c92b1eae0e20ed11722e054ee44786c83d8b64f1,2025-06-09T17:54:53.190000 CVE-2024-21137,0,0,b5450e13f6bcb5f434c674060c624ecba80745b2cac31a677d762dda5f4def61,2025-03-14T19:15:43.810000 CVE-2024-21138,0,0,d85d79c45eb3ebd2d0b529196a85213bec464688c6af2c66a56e96e5f4af17d6,2024-12-05T22:05:55.937000 CVE-2024-21139,0,0,7f0885ed1752480a56d0d9343c5a8f780bac7c8a0ef57214cf469974f9ddd7c2,2024-12-05T21:41:47.347000 @@ -250755,7 +250755,7 @@ CVE-2024-21171,0,0,f7c7b2464793169be70ef08a9aa229f27d53c57d43a779f7aa962f7235c73 CVE-2024-21172,0,0,ff5d0eda037e06e7f32897640b26e512b78468cde367840023f94016b9cff32b,2024-10-21T12:59:49.070000 CVE-2024-21173,0,0,0e8a609d96525ffbea3631f0bfa4081c3954cff8d4927f3ecefeaa4c7494a3a7,2025-03-24T20:15:17.280000 CVE-2024-21174,0,0,3aedc4aa4a685a673eda6d373d2980d41a58f103654e9e3fbf1a83af6fe80b33,2024-12-03T20:15:14.673000 -CVE-2024-21175,0,1,c88236c1bb2930477f7c69ea0f3b2f2d73e2162e94ce3c69441679c96586d096,2025-06-09T17:50:49.923000 +CVE-2024-21175,0,0,c88236c1bb2930477f7c69ea0f3b2f2d73e2162e94ce3c69441679c96586d096,2025-06-09T17:50:49.923000 CVE-2024-21176,0,0,e67fa4210999e42aabb0f353f1923af498dc2157a69a86cdbcbbc16b079f6b49,2024-11-21T08:53:55.950000 CVE-2024-21177,0,0,dffabc8739c0fef0114dd555257cc1d4e736eb0114a8e95a1d9555698fb73a8c,2025-03-13T14:15:20.593000 CVE-2024-21178,0,0,7df76511b7b21807ec4e54152dd48908d9f58c48f07c587eec0e40167fee020a,2025-03-14T17:15:42.167000 @@ -252121,13 +252121,13 @@ CVE-2024-22856,0,0,9a3cf692fedd9d9c8905932bdbe01e2cd16484b2fd2cc1c9bb5fe3c312adf CVE-2024-22857,0,0,a12fdd07f0c62b1402c95279eb5c6f9cddfad6e24bc4df1eca6a355ef86efbca,2024-11-21T08:56:42.987000 CVE-2024-22859,0,0,937798cf05f4e12934751a207bb5a21ac34dbcb70dbda8887d5e612da6597a33,2025-05-29T15:15:29.827000 CVE-2024-2286,0,0,a7c65d62c7163c7051f4f892d6d5418624ff9e80493fa2ed44303e4ffffa80a7,2025-02-05T15:46:51.567000 -CVE-2024-22860,0,0,c47eaa0272bb88edcadb181090e61bcd32d27d98b0d5197e858d04f8aeab14ea,2024-11-21T08:56:43.380000 +CVE-2024-22860,0,1,619038035207a2ebfe0fc44b5419657cbcbd36ebacb59ba2c10d0ec514bd1866,2025-06-09T19:15:23.640000 CVE-2024-22861,0,0,221681245dad78205a3e85c23bb962cdd1d4c57d3c078ef938f93100dc246772,2025-05-29T16:15:35.213000 CVE-2024-22862,0,0,2591cd8c2cdc2b45e89b0dfb9be9b8c6bd501c140a65a300a4787cbf21b1c17c,2024-11-21T08:56:43.717000 CVE-2024-2287,0,0,6a39bd22bf778ab9ef88f37dcc3c969ac4abf6d6c0b210c60c8dae9cd488c871,2024-11-21T09:09:26.127000 CVE-2024-22871,0,0,5cb6a1794fa239aa149c09da9e9377ad68d4db05bcd9d7956a59416700d6ed64,2025-05-28T19:56:07.707000 -CVE-2024-22873,0,1,57c2c4e1c49837eec702ce207ca5c9a14ef43e87a02ab7886a687b69d05f3500,2025-06-09T17:11:50.077000 -CVE-2024-22876,0,0,7b64300d77b839c22e56dafc52a8b282c24d807d3e1138deb97774c53ad9e682,2024-11-21T08:56:44.390000 +CVE-2024-22873,0,0,57c2c4e1c49837eec702ce207ca5c9a14ef43e87a02ab7886a687b69d05f3500,2025-06-09T17:11:50.077000 +CVE-2024-22876,0,1,3e3c39806c57ad579bb63a47271f9179a8f91d73ffba23e2d6037e1a967da6a6,2025-06-09T18:15:24.587000 CVE-2024-22877,0,0,88c6f0f1c60fbea36632841f05e640ffd56de4073456e40d04cedfcce7737ce5,2025-06-02T15:15:31.593000 CVE-2024-2288,0,0,f6ed54bcc2b3e715f6f7f1bc8122a65aceb675402a6406a77355fa6ec0523110,2024-11-21T09:09:26.250000 CVE-2024-22880,0,0,57fbbe23fde2c87b7ed64a754ecaf00025c535fb2033f922d6720bcee3eadd21,2025-04-02T20:29:15.763000 @@ -253085,7 +253085,7 @@ CVE-2024-24017,0,0,c4d2b0da9bcf72d62c30eae5dd55c83d282703f49ff537c35eb3b58e1015d CVE-2024-24018,0,0,f05f236b35fe0cd2cdabacd1c39850bd4cc0c002e7998df93397855c741a34f3,2025-05-15T20:15:45.407000 CVE-2024-24019,0,0,c03741bce6b0161ad8704d2096d29737565e48e5af6de6090410ba0ac54a2b64,2025-06-05T19:15:26.293000 CVE-2024-2402,0,0,688734248091b27aff84b6615386cccb61e0e8c77d7e5d170ef01495d5f440b5,2025-05-08T19:11:11.243000 -CVE-2024-24021,0,1,162eea83c9c1650a1de8cf9c39895128e45716fefdf5bf9c9a02c4a73003c854,2025-06-09T17:15:27.310000 +CVE-2024-24021,0,0,162eea83c9c1650a1de8cf9c39895128e45716fefdf5bf9c9a02c4a73003c854,2025-06-09T17:15:27.310000 CVE-2024-24023,0,0,3ee9e259451a221bd1226a86ab24cca18a0427c8accf85594b7fe8589f86fd50,2024-11-21T08:58:50.370000 CVE-2024-24024,0,0,ff57aa61c54e7eae66c872d65974ea9488880180e192e5435db730a2dba0aa85,2024-11-21T08:58:50.610000 CVE-2024-24025,0,0,e44e794ee55c27a91a582ac31e742d86ccb1084fd02073cb34b445ae726a76bc,2024-11-21T08:58:50.837000 @@ -253158,7 +253158,7 @@ CVE-2024-24161,0,0,f9d18845134ef760f5c37bfd6a74b031ec414e86bfd2197e0d2d8955f1e84 CVE-2024-2417,0,0,6199531f9155a880d068e24eef822b1edbcb6c4893517372b5d25764e9bf03fa,2024-11-21T09:09:42.537000 CVE-2024-2418,0,0,775997fa2d19f485194af5e1795e8dc23e2f392e0fbce9b82815178eceed7669,2025-02-18T16:22:50.640000 CVE-2024-24186,0,0,ce7691daa8e1bc8aae2511ef258bb7a635a67571133255555d59ef71d8535a25,2025-05-08T19:15:58.763000 -CVE-2024-24188,0,1,3d8f21954854a2969d7ecd68a9f7b634b8256d2ce09eb7b55adeb37e453a0301,2025-06-09T17:15:27.700000 +CVE-2024-24188,0,0,3d8f21954854a2969d7ecd68a9f7b634b8256d2ce09eb7b55adeb37e453a0301,2025-06-09T17:15:27.700000 CVE-2024-24189,0,0,8654f184d124e38bd222b249f6ecbca50375bc780d645047f0c354a41c91f111,2024-11-21T08:59:00.740000 CVE-2024-2419,0,0,c1c5ac3630efe12dbc734dd2cfba91f06197ec7072daf0459434c0e2b5578715,2024-11-21T09:09:42.800000 CVE-2024-24192,0,0,b6d180118848d83f045602a0c2551ac0e0f07af145c13716bef08491207408f9,2024-11-21T08:59:00.923000 @@ -253209,7 +253209,7 @@ CVE-2024-24300,0,0,1b2c9cdf314217a71907d14e1e1967edbed91440cf15c4a571c408cbe5ef9 CVE-2024-24301,0,0,8b61ad23c0030866cba333d0bc3851bafca61c6c84a22c88caf90d55774dfdf8,2025-03-25T15:18:58.773000 CVE-2024-24302,0,0,1d71895eaa45b8ad706e12d6e150098712d870b54b8b9ef2621ddf9754c05885,2025-05-15T21:13:38.720000 CVE-2024-24303,0,0,e3d1423acf6002fd3b23e2bccc7afe9d4eba8ea189b172ce0333b4fd3798e879,2024-11-21T08:59:07.837000 -CVE-2024-24304,0,1,186a895cf731fbd7fbbaa1ce4bb20fe604611fcc9618250afc1ff4cbde0b1d6e,2025-06-09T17:15:28.043000 +CVE-2024-24304,0,0,186a895cf731fbd7fbbaa1ce4bb20fe604611fcc9618250afc1ff4cbde0b1d6e,2025-06-09T17:15:28.043000 CVE-2024-24307,0,0,d34855ed67b79d42f9e6fa9a0c44efec40edbbb256fb8ff96e7f7b52e7d4d385,2025-05-15T21:12:53.460000 CVE-2024-24308,0,0,606388f06c429a7fd55170d325cf78a59c162f34183a28be3e3e5908cb178769,2024-11-21T08:59:08.473000 CVE-2024-24309,0,0,e79427c6a9e2f3cd1729bc966988cc7423d248923027fd4457bcc817e82244a0,2025-05-08T13:48:36.583000 @@ -253229,7 +253229,7 @@ CVE-2024-24327,0,0,ae69d0c5681c5a66ad3050bdc389919757f2b4aff5f4ae0a09edca7340d7f CVE-2024-24328,0,0,291f676d6478a9c55786478e38141141cc9f1ea9b8fa0b14deb497e0e8130d5d,2024-11-21T08:59:10.997000 CVE-2024-24329,0,0,acacc27569f11f575f054adfad6eca382156e14a26ea24d08f0ce03276ea7f9b,2024-11-21T08:59:11.217000 CVE-2024-2433,0,0,028d63de4ae1d57a7cb4c6e5e2a34dbe4dbb4096f53fc6e3497744aeffccb1ec,2024-11-21T09:09:44.803000 -CVE-2024-24330,0,0,60dcf01f27486dfcb4b4bba4c53217f86dbff1401ab4dbe1e4637849caa6b7b5,2024-11-21T08:59:11.363000 +CVE-2024-24330,0,1,87bff9b2e44b9ca9de0e76f34abd7da7be6dba03f97bd2f63dfa5ca7576063bf,2025-06-09T19:15:23.907000 CVE-2024-24331,0,0,35c6beb0d07341e544b33d9ee100b071d9e4ac80cccdfc0284c12909e90c99ef,2025-05-29T15:15:32.283000 CVE-2024-24332,0,0,47e1092dcd66876e6a3da936cb86ea847b7d43afac5fbedcd84921843eafbf43,2025-05-30T19:15:29.330000 CVE-2024-24333,0,0,fb9e418a84f93e9ae5cc8a133f65775b8e5fa295402ba1cc7342bc314f9481f5,2024-11-21T08:59:11.823000 @@ -253888,7 +253888,7 @@ CVE-2024-25248,0,0,d65faff10eac258b331d9c2cb9cd5b148102f3b8b2f26c280c3571f12af4f CVE-2024-25249,0,0,280776b2f87571caab1ffbeab421fc1acf6e14a5a49622226509bdb85c6c8891,2025-03-27T20:15:24.083000 CVE-2024-2525,0,0,99775d6d72012c94577ecba939cdf3eab5f27167b4c491987d659d8d12c4d8a2,2025-03-03T16:58:56.110000 CVE-2024-25250,0,0,36292ad2f5db1792ce479d383f28521fb85ae5121d9d273257ac4dbcfd9047b9,2025-04-08T15:14:52.357000 -CVE-2024-25251,0,1,cad2b55cdf7c698679e408c9a05f3a9e4e4c51a97954664d6bcf85b20ad72e17,2025-06-09T17:58:16.700000 +CVE-2024-25251,0,0,cad2b55cdf7c698679e408c9a05f3a9e4e4c51a97954664d6bcf85b20ad72e17,2025-06-09T17:58:16.700000 CVE-2024-25253,0,0,48e99cce2b2802e3aeef59d20e7058849d1e4e7be86482650a3710ee00ff024a,2024-11-19T17:35:11.063000 CVE-2024-25254,0,0,0339a82eef9bc1a7a8bb28fefdcad83242ffe04648f59e10cecbad0da67cea19,2024-11-19T19:35:13.453000 CVE-2024-25255,0,0,879d4410a08cc23864a4824dcb477088b28d669368fe48b08008f9744ea817de,2024-12-24T06:15:33.590000 @@ -256118,7 +256118,7 @@ CVE-2024-27991,0,0,3de791a6a130aaf90b41233c2fb2d543204d317345cb810879b2311ad490b CVE-2024-27992,0,0,3f6e9ef7f5187737b12eef9339d561e440dad78cffd0f3ed3b922336cb6465c9,2024-11-21T09:05:34.983000 CVE-2024-27993,0,0,0942341272bad2f85d96632ec6aa9f840637e1d86c679f4e7ceba61851e272d2,2024-11-21T09:05:35.133000 CVE-2024-27994,0,0,19b6b32c2297e5f0bacb1e80fb79ff6381d73323f24f454dcba6e82c212ef75c,2024-11-21T09:05:35.267000 -CVE-2024-27995,0,1,5facfbf41a152b092574d38155eea0dead857abea26c29a8b94252404599d9a2,2025-06-09T17:10:47.097000 +CVE-2024-27995,0,0,5facfbf41a152b092574d38155eea0dead857abea26c29a8b94252404599d9a2,2025-06-09T17:10:47.097000 CVE-2024-27996,0,0,45cb54bc5289e1a045406c53e3d33f8a430c780120440fe7d374ad22b731b209,2025-04-16T14:51:28.253000 CVE-2024-27997,0,0,22f4fb6f3b39d82e394fe18f65ca042130372e9bada301d1cd93068c16ca8b0b,2024-11-21T09:05:35.740000 CVE-2024-27998,0,0,54f18276f1d5483160e1a1e41d61ad89be34f3ae2accfcf25da20100c04c5253,2024-11-21T09:05:35.870000 @@ -258816,7 +258816,7 @@ CVE-2024-31581,0,0,26f0b24afcce49599eab006e4dd0f04d587c422933e6a771f6252572dbc45 CVE-2024-31582,0,0,99d23ed94eadae550f3d5e4c7af4b99a2ab1c155adf84f6b0b2f2ac44026309e,2025-06-03T15:42:14.187000 CVE-2024-31583,0,0,f1ca2f57a4fb9ac891f614bcec1b1782e644a75286acabe19e0169b0f358659a,2024-11-21T09:13:43.540000 CVE-2024-31584,0,0,420fc644c705856ba8dd98ddb90300aaa523243bcaf8db7ce5ea0fd2d33809c9,2025-06-03T14:04:04.327000 -CVE-2024-31585,0,1,c3b782f97e2c9184cdf5a1bdf306b5395c037aafeff6c2ffaeb4ab22a9db35e6,2025-06-09T16:15:34.637000 +CVE-2024-31585,0,0,c3b782f97e2c9184cdf5a1bdf306b5395c037aafeff6c2ffaeb4ab22a9db35e6,2025-06-09T16:15:34.637000 CVE-2024-31586,0,0,5efc79e21fbd8ed4e63282b64efbd5820d7cef26890f5053c7ad3f1ac2b5e4c1,2025-04-11T15:15:56.880000 CVE-2024-31587,0,0,64a72d90b20c34ecaa52200bea056ae28aa202759df67583d32f57bc2f17b2c4,2024-11-21T09:13:44.450000 CVE-2024-3159,0,0,9ad64a7e8e8b198934b72a1295500c693ba9441f53eef8df46db67ac5cdd2018,2024-11-21T09:29:01.997000 @@ -264125,7 +264125,7 @@ CVE-2024-3833,0,0,70f71fc362a5e7d48ef4a06bca848d6c2e550860bbb53e401c6074b0eadf13 CVE-2024-38330,0,0,f29c2fed4aa255682376d1bf1fe6f029c9aeaf29cb91e5ed615ddc69bd26c654,2024-11-21T09:25:23.523000 CVE-2024-38337,0,0,419fb31ae4d2b0caed4b428a1b986d96cd628992c203de404d42c789b322191a,2025-01-19T15:15:19.770000 CVE-2024-3834,0,0,947eb53652569d79e3c1cf44919e7a8749c280dc3486461656b1c499598740e9,2024-11-21T09:30:29.777000 -CVE-2024-38341,0,0,d6b7ad42eb9b27f59505a9d63e5829475baa65be56435069ce2ebf38890e6f2b,2025-05-29T14:29:50.247000 +CVE-2024-38341,0,1,9809561927414940ab23e54de29ebd26e5baaf046c6727aee0ce79c27c67af35,2025-06-09T18:57:54.563000 CVE-2024-38344,0,0,c3f614f414d62cde3a55726244e500e4dd08719f2cd9a8082171daa986ea9b20,2024-12-06T18:15:24.490000 CVE-2024-38345,0,0,400450ff3ebad18f0e8e828d45ea71d10de9ed5d2c1fe1a079e13b55da9d6f74,2025-03-13T15:15:45.720000 CVE-2024-38346,0,0,529192cac0436274637fa1618166663c66d81af410ac645501c6761c48d76600,2025-02-13T18:18:07.873000 @@ -265187,7 +265187,7 @@ CVE-2024-39626,0,0,835849b2c37f1f26f813e34459395f2aefd3b469ce947b1acbdf13cc9885f CVE-2024-39627,0,0,8b5957633d1736147496176f0420699d6b624c4ab250a3b4b1ba22ae40e7e201,2024-09-11T17:35:37.523000 CVE-2024-39628,0,0,5445ef7c4ae01ac91f2af99c6cc6cd0a2fb6af3b4f9ad3263225d63c3539f921,2024-10-20T12:15:03.160000 CVE-2024-39629,0,0,92bed9a16b02390b5715bf0d1338233d3fc3dfd04aabeb478fa3e07353158487,2024-09-11T17:35:06.743000 -CVE-2024-3963,0,1,80e592966e45a1e22a04f7c5091445bf5e12629130c470c3bae2c87f7d13ea8d,2025-06-09T17:07:01.677000 +CVE-2024-3963,0,0,80e592966e45a1e22a04f7c5091445bf5e12629130c470c3bae2c87f7d13ea8d,2025-06-09T17:07:01.677000 CVE-2024-39630,0,0,ad1a8eb373ba0a86f7fc40a1c81b72483910141010dfbcae3e143327529d5b36,2024-08-02T12:59:43.990000 CVE-2024-39631,0,0,415f1f6e3ce319d9716e9753c9defd142d2598fa4c7e64ac2042445ce3a87fc4,2024-09-11T17:34:08.967000 CVE-2024-39633,0,0,52d546fb9c2b9561127d911b41711d8eae99dc0abf4df1e8665cef41d6c63c78,2024-08-02T12:59:43.990000 @@ -269253,7 +269253,7 @@ CVE-2024-45088,0,0,1beec48fbebe975f8bc73123f865d04a7ed8df665a2d4af27f0cdfaad4366 CVE-2024-45089,0,0,542dfbf973be63b03ff718a4f3a8fab91d5b396d4bcab48b662c4f8c45834b4d,2025-03-05T18:26:20.030000 CVE-2024-4509,0,0,3524d641cd000812a310ff38fb9e15060d273c22d6c74437283905e2f7ceb2a8,2024-11-21T09:42:59.127000 CVE-2024-45091,0,0,15b0a69c48e3ad122ef5c06eab93e452421cc3bec77edca18bcd67201ac2adaa,2025-01-29T21:12:41.107000 -CVE-2024-45094,0,0,2b09b7fc771c4daa8478af37711f75c45800e30b39dbbc8d965289f4da44ca90,2025-05-28T15:01:30.720000 +CVE-2024-45094,0,1,fd1367a32d2e73f151c00ba174da032a58d4acd01507a57ce7d3dc494d5b6202,2025-06-09T18:51:17.193000 CVE-2024-45096,0,0,6e04e4dc0b5cb194770300a49e24b05d1a72a2bb58de4b452fabe27ca897f070,2024-09-06T12:34:17.957000 CVE-2024-45097,0,0,86a5f6f58b36ff4d76801faef73b7a44c24bdd910aa639853fe61c2940eeaa37,2024-09-06T12:51:59.750000 CVE-2024-45098,0,0,beeee876795e27e2a560d9e6400141cf489497a78fea87df6979a5ea96e1eb85,2024-09-06T13:01:44.023000 @@ -270138,7 +270138,7 @@ CVE-2024-46446,0,0,32498f8ed9e97dfaea9d9d29b52aff01ff427c37b0ae17db53d50ecbc649b CVE-2024-4645,0,0,db80714b6762777149c40221f4dac49c3e533500858abb6785ce5b6ec01284fd,2025-02-10T16:08:46.383000 CVE-2024-46450,0,0,584d1302ac1dc2148fd9744364b99c8a1b26b6993af7f31c4407277e184a87a4,2025-02-03T21:15:13.043000 CVE-2024-46451,0,0,5691c8cee8fae2502da71b898418de27414898c09a161c995aa0a792f136951b,2024-09-17T14:35:31.353000 -CVE-2024-46452,1,1,f5071c7e9719201df93329fea741a1b1e60fd9e9ab132e04703c82492e1b27fc,2025-06-09T17:15:28.370000 +CVE-2024-46452,0,0,f5071c7e9719201df93329fea741a1b1e60fd9e9ab132e04703c82492e1b27fc,2025-06-09T17:15:28.370000 CVE-2024-46453,0,0,c009601dd03b8846bd538ee01074ed3fbad568c27834afc2e6d2594196ef6a63,2025-03-13T16:15:22.980000 CVE-2024-46455,0,0,0b91cb2d456ef57e37eaec00f828b8cebf8d0a48c98cc5abe6b851bbbf1c9130,2024-12-12T02:02:38.990000 CVE-2024-4646,0,0,dd85bea7e9be84eb72bc0f051be3e94b32b81993ff35b58f4537b9add60b758e,2025-02-19T18:04:41.253000 @@ -270685,6 +270685,7 @@ CVE-2024-47078,0,0,10afb9e6722a0aa2d390a08f8c9cc758e3470acdae52bc8d53ba79b68f1e0 CVE-2024-47079,0,0,46ec3c4b759e5ed56590ce427e02ae273d228ad193a44b293fd27f9627149781,2024-10-10T12:57:21.987000 CVE-2024-4708,0,0,6075524bc6706b66da916e47479718dd93cac9e3defaf1ea46084e3165e2223a,2024-11-21T09:43:25.340000 CVE-2024-47080,0,0,d0e10a233d20451f4e52ebf6ad23ac342cebc2f202ed1ee8db0c211bf5aec397,2024-10-16T16:38:43.170000 +CVE-2024-47081,1,1,1c5a9d971ce118ee7632b877bc21e509a1c508b834d4c145038b5c656c331a18,2025-06-09T18:15:24.983000 CVE-2024-47082,0,0,e1b8fc05a5b62eed6876fe54839d56014a094bea3c34cc28ed5fc65eb85f81f9,2024-10-01T20:01:13.367000 CVE-2024-47083,0,0,bd45b4744c61b9591629789a451bd4ea2608442e4f0742ea029fcfd62b42d8c4,2024-10-03T15:11:29.913000 CVE-2024-47084,0,0,76598db0264d96d483fe7c3e57b44c1784a6763913760c190e074b762e9bfb62,2024-10-17T16:30:59.790000 @@ -271518,7 +271519,7 @@ CVE-2024-48013,0,0,9133da671ec893e99c2e828463e6eaa00b3c3a1f07884f2f5cd121c15f8b8 CVE-2024-48015,0,0,112fad1c58e3fd6c17534bf2998668a0134bbd2a443bd0d0968fbc9e00100554,2025-03-17T18:15:19.383000 CVE-2024-48016,0,0,04cb598db2857d7944cce50bcf619a0dee145ba07ef43a0beebd957b9209e96f,2024-12-13T15:13:14.883000 CVE-2024-48017,0,0,45350bec87faa22f26571f591f0f77964f239ae6a785f5ffb61dcd32c5292f02,2025-03-17T18:15:19.543000 -CVE-2024-48019,0,0,90c1fd9ac55eec5cd1ddd1e35bfca46dcc3cdaa1fd0f2b1cad5b17d6f234f218,2025-02-07T22:15:12.300000 +CVE-2024-48019,0,1,379861174c0463018973a211be99d3d5b37a59281ca0990bc7e62a23eba5000e,2025-06-09T19:49:43.753000 CVE-2024-4802,0,0,6b4195f170cf4837de8b8ba0dbc948c460d1f4945cc47040b6b6279b14b196bc,2025-02-11T18:30:08.557000 CVE-2024-48020,0,0,66d35d0e43259dac4ce8f67fa430164a93786f466a2ab3da417eb0d47f384ac7,2024-10-15T12:57:46.880000 CVE-2024-48021,0,0,bd1b80eca231c15d52a9386c09058579df399b553f2fdb9b275ce81686277fd2,2024-10-18T12:52:33.507000 @@ -271820,7 +271821,7 @@ CVE-2024-4870,0,0,0ea27412573995f30563e69813626323b1c481b1ce23f80a057c978dadba80 CVE-2024-48700,0,0,01c4f559aaf90a38c82d132f177d7376c563e831acc8fed72ee735b60694278e,2024-10-29T19:35:24.643000 CVE-2024-48702,0,0,ba3f6c6bbe6ef3a4806734266bb65891fcc2897db0e2e54b24b1fcc51c133716,2025-05-29T16:15:38.883000 CVE-2024-48703,0,0,66b49a296cfb94ace483912b990b744b957f247ff107c8ad1fc8f2d7eabd4b79,2024-12-11T17:15:16.880000 -CVE-2024-48704,0,0,9a40ae6dd8f7a6420f8b0b77f7aaeb9558a492b75f3c18fc0179cf53074d3ac1,2025-06-02T18:15:23.020000 +CVE-2024-48704,0,1,2b84775ad07d2290bfbdc672a4a017f9455b894d83830eacd9ff125f3476cbc1,2025-06-09T19:00:51.830000 CVE-2024-48706,0,0,c943b13c3a3939cb5d8b86b065bc2ddde43d7d1c2b6d276f98ff2b2d6bbb9294,2025-03-25T17:16:11.580000 CVE-2024-48707,0,0,8c5783a4e9b64c0d59925994774447278a2e90a82fd2cd55ee2072a8b3d5b0c7,2024-10-25T19:11:54.310000 CVE-2024-48708,0,0,e061892415ada1b97948e5eaa0f479bd634d96d643152026ca3698c48e905eeb,2024-10-25T19:10:08.457000 @@ -272339,7 +272340,7 @@ CVE-2024-49340,0,0,121e4a69718b7eafa91c4d48c066b6562f54cd89bd7dd643eed0f1ac402e3 CVE-2024-49344,0,0,347784b34265f8b719b2af5b861570ef0177fd877a75f8c8b31285ef2dd3bfb4,2025-03-11T14:02:39.433000 CVE-2024-49348,0,0,3f0061500b4dd4e17045ad16baa9e311ee1ac03ef6339695bbc97d441fd8b3c3,2025-02-05T12:15:28.570000 CVE-2024-49349,0,0,ffc8da5d31c0a7888ad36cdc475b5ebfda5cfed0e4d2d3c1c13edb178b03d3f1,2025-01-31T17:15:15.410000 -CVE-2024-49350,0,0,f0bd29f3d088a1f3cef4aa16397298c6ef6425e68b0c93a3447bb767a5636482,2025-05-30T16:31:03.107000 +CVE-2024-49350,0,1,74158dbb9f6eedfc9ed724a1afc16e70f97bec0d372efe7147d0ebe85f923d9a,2025-06-09T18:59:11.143000 CVE-2024-49351,0,0,9d2fc2a435b61fd62d7b18f4f752bd55144b2c0d48ce521b6a020db1fccb6d13,2024-11-26T04:15:05.457000 CVE-2024-49352,0,0,f24ee2d0b214fc07a70235001ceb8e4d8491919596338c7e2ff1739a0221b03f,2025-02-05T11:15:14.540000 CVE-2024-49353,0,0,9a47fbcd7bb71cb815723fc7b290a5c5cc22a3729566f5b695bfbad427fe41cb,2024-11-26T04:15:05.690000 @@ -273933,7 +273934,7 @@ CVE-2024-51447,0,0,ca02c708235389eff2271ca9b5fe3cd732672cb521c9367184c5aa020d2fb CVE-2024-51448,0,0,f6ddbfd669769e805d7a6af10df6e6a89f4b4246041ab57849f0d0f903c18615,2025-03-25T14:06:48.877000 CVE-2024-5145,0,0,52db126efa8d68896c59b5edb3071e21d1f8ed443b2315a75a847fd83c525b2c,2025-02-10T13:57:18.723000 CVE-2024-51450,0,0,b24ea7b4369b0a65d966e21c7dc8a033d60cc44bff8cf30a91a024c498c7fa31,2025-02-06T01:15:09.420000 -CVE-2024-51453,0,0,1452147ae14972a78b8d250dd6ae1ece8c45ce9388db2be04829e2e421e1114d,2025-05-29T14:29:50.247000 +CVE-2024-51453,0,1,4395f70576eb7db137440ca95681a0d2ecae5c59236ec197ae6f8a0cf35e41a3,2025-06-09T18:58:08.980000 CVE-2024-51456,0,0,3719dc3b9538c2e6bef598db1a27814959e82ec148d71f3910afc75f2585f309,2025-03-28T19:19:43.600000 CVE-2024-51457,0,0,0ecbf506964ce26877e8439aa4a3160d1450f6ed502906387cfebb224c3433bb,2025-02-18T20:15:21.160000 CVE-2024-51459,0,0,f0a834f211baf1829800edc9ad0b05f685224da81796863597230eb3c918ece2,2025-03-19T19:15:42.180000 @@ -274206,7 +274207,7 @@ CVE-2024-51711,0,0,b5026417d96a88d7b586c42ce248704eddfbd5e8bebc8b219b8d4db3121d4 CVE-2024-51712,0,0,4776afd887df3d65067949479d4a5a33236c2cc62d78d8b38f6866df8f937180,2024-11-12T13:56:24.513000 CVE-2024-51713,0,0,f4c7f9e094a3a238ed3834f5e19a6901f0195d4ea9bb6a7a802da3f40b2d1a9e,2024-11-12T13:56:24.513000 CVE-2024-51714,0,0,9a45c79b06ce9520b2fbf85a624e3fb37b1d1fc6188ebdf5ee9af84a8c5ae139,2024-11-12T13:56:24.513000 -CVE-2024-51715,0,0,0c591eaebd09bebdd37bdf73af7b1f846f5b11e2f2921ce2d29aee686908cacc,2025-01-07T11:15:08.460000 +CVE-2024-51715,0,1,6069f2c0fd68b1461d5792db8beb0473f08f1b193bf808395898c54e9f758c2d,2025-06-09T19:30:31.537000 CVE-2024-51716,0,0,1a7f478b63075a02d5dd114a22c494695394051a70a7a5a06777a5fb5656fa5a,2024-11-12T13:56:24.513000 CVE-2024-51717,0,0,e5a369baf84f0d855eda597ff3ea4e6d1166f77ec3152cdc4565d34cc9b28394,2024-11-12T13:56:24.513000 CVE-2024-51718,0,0,38d72c82e95a529daac12ce377d940e9806a7a6c19b7ba10406352fc292dedb6,2024-11-12T13:56:24.513000 @@ -274439,7 +274440,7 @@ CVE-2024-51938,0,0,7f531483548183d746950131a91938a8eaa342b0a7690b882b3a3f83d4d6a CVE-2024-51939,0,0,20d7c044823f2dbd5a93ccbf1e62122469f38a0e0e61d27f0eead27fdd2e22c5,2024-11-19T21:57:32.967000 CVE-2024-5194,0,0,8d46b9bc1f0e922d7415f01b9e20c3241c30409b16aacd585324be8545f4e31e,2024-11-21T09:47:09.967000 CVE-2024-51940,0,0,eea7140ef8e6920e3e5dd47ba7cd4d003e663b87564e69e84f825f175f7f9241,2024-11-19T21:57:32.967000 -CVE-2024-51941,0,0,661c95377174d85887c7aeeab4a39401393b7299562f7bf09d56feffd8348eee,2025-01-22T15:15:14.247000 +CVE-2024-51941,0,1,51c0070b4a57b2195b375c3ac4971703b62f53d95ef916a16d1bf0e9429cc310,2025-06-09T19:35:29.127000 CVE-2024-51942,0,0,4c32e22882787a7e5f47b6626a776d4eb0ee8462badb9a5268969b94441ae7a6,2025-04-10T20:15:19.447000 CVE-2024-51944,0,0,947b8c8abdb18f9948c521a403fd28796a1963941ee7b30c036fa0d7f93b43b6,2025-04-10T20:15:19.567000 CVE-2024-51945,0,0,04998dc91ce544c57e23477b4db8a3159e3c9103b5fea5336cc77a9a6a6a492b,2025-04-10T20:15:19.690000 @@ -275754,7 +275755,7 @@ CVE-2024-53810,0,0,e98d78a114e65e3c19821776336507856eb72ce3497a2398568bdbd161c6e CVE-2024-53811,0,0,12c9c6549101a5435c2c8e142308c8782aeb63abd35d0427b26c77f66e5f1d45,2024-12-06T14:15:23.657000 CVE-2024-53812,0,0,3daf08a2a09bc066dcbaf09d8fe7037ca8d3aad09ed5b27510d438c07c36fb43,2024-12-06T14:15:23.810000 CVE-2024-53813,0,0,fff049c64a845625087f0ccccc8384a6cbd15c3beb52f62a43074587995956c9,2024-12-06T14:15:23.947000 -CVE-2024-53814,0,0,d8dd2867b76e315a9410fc6556be02e0bba4c9767d67b0fc3d9ac8006ef86214,2024-12-09T14:15:12.003000 +CVE-2024-53814,0,1,c6044bb4afd0521065807c528dc414f8e228a94e02cb90aa7818bde9493a412f,2025-06-09T19:29:39.997000 CVE-2024-53815,0,0,4d649361421c94a2195f0bfec7830320a88f0cec019558375308f4ec8e8bbdd2,2024-12-06T14:15:24.083000 CVE-2024-53816,0,0,56a2fb8e9f949caf28f6abf3b6a5ef45c79650165ee5951ebe96e003666ac947,2025-02-03T14:12:47.460000 CVE-2024-53817,0,0,90dadaca22557b01c649832be6992774e89f6486e9de4656a58ebe6910c5afc1,2024-12-06T14:15:24.217000 @@ -275826,9 +275827,9 @@ CVE-2024-5389,0,0,7b62c041501e93209780667aacd1d527276730dd1c9ab622b7a27b2efa3d14 CVE-2024-53899,0,0,6a1e5c5e75d5e15fff4f2ff3855d9c19b45498a7a802333e24ea4271ef180bd9,2025-02-10T18:12:06.107000 CVE-2024-5390,0,0,db269bad6e5272cbdff2f7115b9dbe6589e39fa84b9f4a1a836944dde2d2816a,2025-02-10T16:24:52.030000 CVE-2024-53900,0,0,95225d3c54f7fca3986f37c564d6889f43b0205533d3aaa1e6f91f0f170093c6,2024-12-04T04:15:04.573000 -CVE-2024-53901,0,1,f3d7fc7b67d2dc489a59eddef6f394b4c3e8ae13c2d833db55b510af20235727,2025-06-09T17:36:58.807000 +CVE-2024-53901,0,0,f3d7fc7b67d2dc489a59eddef6f394b4c3e8ae13c2d833db55b510af20235727,2025-06-09T17:36:58.807000 CVE-2024-53907,0,0,da3042698d8be91fb17c87766f70541cbc46d3f09abc0babab611085e40f6d6c,2024-12-31T18:15:38.657000 -CVE-2024-53908,0,0,8982ee088335b20aaa7e1d1123267b1c3a5662aa0dca429dbcf7ff1a5f1a823e,2024-12-06T17:15:12.350000 +CVE-2024-53908,0,1,f74a9d093086055394f045d226595f1aaf9733161681a7996da1630db2e04ea5,2025-06-09T19:51:17.797000 CVE-2024-53909,0,0,f496b480d61110aca5ba4afaa8506ac48e157eddeacabdc9f46723c429d54992,2024-11-29T20:54:47.700000 CVE-2024-5391,0,0,7117218d5daf21f80cd6321efaf36662a97edd58320dfcb7fce41cc4077dd87a,2025-02-10T16:24:29.467000 CVE-2024-53910,0,0,b42cc0f8352ffa3f12c2a867329f0f66efd78292ca02cc30bc8a41459e9297ac,2024-11-29T20:54:55.080000 @@ -277172,7 +277173,7 @@ CVE-2024-56273,0,0,84b55891ed60e4ff86ae43c44a2443de7db36087ebf82ccd07103435f58ca CVE-2024-56274,0,0,af135540398749d0d6f0491e63663bf2f2fd68d34d6f867ca8c20d0d9ba0c489,2025-03-10T18:15:22.570000 CVE-2024-56275,0,0,9300415b3d7dfdb21e4bcf98e6b049d2270278d0318cd78cd0580d5bb4fa3aff,2025-01-07T11:15:09.130000 CVE-2024-56276,0,0,00f6b9e0227c33f5e8b70946c15e191837645d3c728e7697707e4b3163250bbd,2025-01-07T11:15:09.293000 -CVE-2024-56277,0,0,1024d5c01565ab73c5f4312b82b3299bc536bc140ddac1cfa4e970f6a380702e,2025-01-21T14:15:09.593000 +CVE-2024-56277,0,1,c7e56b8e6d135571726721a0f767510001e121de9ed4fe33d9be65ef39ed2b27,2025-06-09T19:33:43.953000 CVE-2024-56278,0,0,7b39d950ef51de16ae31685f069f6c6d113d1e47d70ded5845406aa9152618e9,2025-01-07T11:15:09.460000 CVE-2024-56279,0,0,b9950fa6d62ea9e65991aa518c54819f9abe48771ec7badc646331c83db213d0,2025-01-07T11:15:09.633000 CVE-2024-5628,0,0,755412ba03c7f502c54c635c9705b96a4154da09bb9bfca64f93d1d41d08cf6a,2024-09-26T15:14:26.547000 @@ -281857,7 +281858,7 @@ CVE-2024-9418,0,0,43435b9836f4f0a05e21cd95871922643b61618d6b88dd45c549527a231e96 CVE-2024-9419,0,0,75c2ffcece6c8d9641e61b7d83db859a8f0c6a3be035496f4eedc8e263459f13,2024-11-01T12:57:03.417000 CVE-2024-9420,0,0,67b7ec10fd70b4c65462818c5d846d8ee80ab5d76c201e1e297fd920da682a3f,2025-03-13T16:15:25.893000 CVE-2024-9421,0,0,037ff18a423af7d430246a25c13267312b520381fc2b22b38075ef45225d8825,2024-10-10T20:59:01.600000 -CVE-2024-9422,0,1,0de803fb8d3119a9db5759aa983139214325e424dcc8a22347e3f43abff1fa22,2025-06-09T16:50:24.997000 +CVE-2024-9422,0,0,0de803fb8d3119a9db5759aa983139214325e424dcc8a22347e3f43abff1fa22,2025-06-09T16:50:24.997000 CVE-2024-9423,0,0,ea2ceee1b3bf62e5f678d6840797f5ce1005e985008fd3d6ffca2317e3c41048,2024-10-04T13:50:43.727000 CVE-2024-9425,0,0,c4a51c938acd490f609ca00d8a594cbbdbb46d48c8dc2d14a9f1cdc1520bf123,2024-10-22T13:55:04.537000 CVE-2024-9426,0,0,7b6d0dd14cd82427723e29a8054a247cfe756a4bd65dbe78f3544bf76c1742a2,2024-11-13T17:01:16.850000 @@ -283548,7 +283549,7 @@ CVE-2025-1493,0,0,eb1f9f084df1cb6f34514ca97e8d055f851e035cbf20d85a71bed174b09583 CVE-2025-1495,0,0,eb77f981cabe4efbe3dd172718fb9875f01d80ca92253d5063810e79b3d4459f,2025-05-05T20:54:19.760000 CVE-2025-1496,0,0,00b701fe7bc2e4f39ec7ac2812437dabb31dde7416d14a43308b75ca4d34e495,2025-03-20T14:15:22.920000 CVE-2025-1497,0,0,7d02ef7499053e50d8ad89d76099a7d293753bcfe1045929e1a08d34bb3acdae,2025-03-24T18:46:13.367000 -CVE-2025-1499,0,0,82f941baea52f58a7fde23fa716ed4e1f3d8b525c97ab67cac23f5e7c2798112,2025-06-02T17:32:17.397000 +CVE-2025-1499,0,1,820cdac28fea00c6c66bf92abe2a71a37dbc15ffa52790a34c8e360402089b44,2025-06-09T18:08:54.680000 CVE-2025-1500,0,0,9fba8c7345ac0b652c7325920a14000ed49f87273e0c5734dc50f1fa6cac69b4,2025-04-07T14:17:50.220000 CVE-2025-1502,0,0,87e6960c6bf75cc8b1380ef7c7e3303ad768ae7a5699ebb71505f60154582a17,2025-03-01T07:15:11.183000 CVE-2025-1503,0,0,2ca03eefe6e9ae5c9c7fbf3c0a67f53490f3fa4743fc5d41f8919dbe81c8e9d3,2025-03-13T05:15:24.917000 @@ -284006,7 +284007,7 @@ CVE-2025-2006,0,0,d5d74f41fa3ae9bbd4fe95b11d94c32b823c104859d3441c59ab51ca4eb67b CVE-2025-20060,0,0,ef26af373b8c1500801575569870314eee69d6fc265fd3cd0ef2de4362a965d5,2025-02-28T17:15:16.440000 CVE-2025-20061,0,0,6979d6e76b2847064c2a9b7a24215846556b4a731cf1290fe0f120404af6a611,2025-01-29T20:15:35.363000 CVE-2025-20062,0,0,3578081cc9bd1cb38fdf9704ce1103b0e0f63ee830e3be5ad1e5e7e85f40bab2,2025-05-16T14:43:56.797000 -CVE-2025-20063,0,0,a80ecb0bba49b8074767c66a614171403c45f913b9141712ef6e97075674db6b,2025-06-09T12:15:47.880000 +CVE-2025-20063,0,1,b4b1f4ada55bda82721780b844a74fc568a280f6b4945aede3dbfd98ce0f517a,2025-06-09T19:07:27.137000 CVE-2025-2007,0,0,da59d82323527ec1abfe9f480cc8fe1fd6651069aa66cdf2f4f8acbf4750a509,2025-04-01T20:26:11.547000 CVE-2025-20071,0,0,20298223494bb4a4d40c9c5bd0bf2218fcf397c3599f0ea9a641e3e4ec386ed0,2025-05-16T14:43:56.797000 CVE-2025-20072,0,0,b9e9cb3d894db8c29d56585c14d2cf06ce7800f36f472c346f2184b6fcf02e0f,2025-01-16T18:15:28.517000 @@ -284424,7 +284425,7 @@ CVE-2025-2106,0,0,12e6a433d251be1a7b8caba06a5be90b0fd1db509f397a8d7d7499b4e464ef CVE-2025-2107,0,0,135bf09ff50485dd2912025078b557b35b087079462172252b9881a30af6dc30,2025-03-13T02:15:13.250000 CVE-2025-2108,0,0,60b4ae79e344e4658824ff2975004a181bb22f5bb0373a3558afeca319c66e13,2025-03-20T07:15:38.187000 CVE-2025-21081,0,0,2001a89bc61e9590c36304579e4e9d48d5980697f9b552f01b260ec73e2e53cb,2025-05-16T14:43:56.797000 -CVE-2025-21082,0,0,ca7da96832fead64976909e5eb126767112a102c25be83da5bc79f7fb011e8f6,2025-06-09T12:15:47.880000 +CVE-2025-21082,0,1,46ac35d658d44baf54d1ac8a8f790de5d79d2ee8dc02f7947502a40cb1fc420e,2025-06-09T19:07:20.283000 CVE-2025-21083,0,0,b1f881e778d473a44d11cfcbd38b4988ccf3c0bae1e47d54950fb32a165015e0,2025-01-15T17:15:19.393000 CVE-2025-21084,0,0,af34ba3562290d89d6e1fadbcb1efbf04888823c3570480deec642a909378dd0,2025-03-04T17:42:20.943000 CVE-2025-21087,0,0,28561df062c57bddb73cb1503a50933afccce81ed6c2872e01fa7d13e8dbf5f5,2025-02-05T18:15:30.430000 @@ -285579,7 +285580,7 @@ CVE-2025-22292,0,0,0a179a28798372b1354b5887532a0aacfe8816e7abd0dc207ba7b50b06093 CVE-2025-22293,0,0,0fb85e30408666f4049ff5e391f5eb0edea1a607b8157160cd5e0e00489520e9,2025-01-07T11:15:13.473000 CVE-2025-22294,0,0,fd3c530f54ed4c49be0865300ce0d8ca3b1fb9d97860cd5c24499f717ff48c10,2025-01-07T16:15:41.137000 CVE-2025-22295,0,0,136be5b556aad26e99b99b0d958bde14845140b7f49ffd508d9c54e6615a1e64,2025-01-09T16:16:25.140000 -CVE-2025-22296,0,0,79a577a814c2b3ebd61955df5c1991d770563690783628e1c8f98334f2a94ded,2025-01-07T17:15:32.520000 +CVE-2025-22296,0,1,ec26ac3acc40336ad50ed7743f4d03c2958def5a0f1e9257cf2f20752a1ecc62,2025-06-09T19:30:55.407000 CVE-2025-22297,0,0,75706f4c2a12fed7b64a4984688e679b3109659c8754f6fd94d354f2106b0945,2025-01-07T11:15:13.630000 CVE-2025-22298,0,0,8fbdb6287edcd53604c499bcc2666cd8671bac202c2c8fddf3c1979bd6d97ac7,2025-01-07T11:15:13.783000 CVE-2025-22299,0,0,ed33d62b63b5a356f166f35523d0ebe277c23faa915ebb718f8b60502c89f669,2025-01-07T11:15:13.943000 @@ -286351,8 +286352,8 @@ CVE-2025-23190,0,0,87842373d301ca780cfdfed4b8137d271e812becd8d75ff110dd7b27091c3 CVE-2025-23191,0,0,93bf39b052d32c7fd79bf315d4657bdb3b25800f484d8ee22918be2670f1ecea,2025-02-11T01:15:10.557000 CVE-2025-23193,0,0,dd2b7306807ec40f9912fb49ee68934fd2efddf05fc31efb201a5ebd32befe04,2025-02-11T01:15:10.700000 CVE-2025-23194,0,0,2abdaa039bd60248a2d82f5999a9ed81ae8b9d9f0da1d221293e79525f619c35,2025-03-11T01:15:34.630000 -CVE-2025-23195,0,0,ee22c587682b0cda7a69f201e586a2b92d254e8abbe1337e77f0b479ce494ebd,2025-01-22T15:15:15.237000 -CVE-2025-23196,0,0,d3044e41b79218329d6fa5b9693b21ec030a66b6d8b023891e2ed1eab02cdfc9,2025-01-22T15:15:15.390000 +CVE-2025-23195,0,1,f18609b9fc2e63f3f6cc26e297ac4523abaa4c7810065fbb0fe1b0f95fc74e97,2025-06-09T19:36:09.710000 +CVE-2025-23196,0,1,62ea1456d7888677eddfc8f630cc5f3133d48b02ae8a3bcd30d2d0f4d0b52918,2025-06-09T19:42:00.100000 CVE-2025-23197,0,0,099217d7c50fa4e567446b5ed24de5a49493412d57096b7a33e5ff39354836a3,2025-01-27T18:15:41.037000 CVE-2025-23198,0,0,3cf38d53bcb86db60d0a510e98ef988ad397e5444ec65982c4e8cda6c4b1ff95,2025-04-28T16:44:31.910000 CVE-2025-23199,0,0,7153e244f8d44a69fd924672e7b401321c173985aa80bf61d90c87a5cf1f874a,2025-03-25T15:13:40.957000 @@ -286387,7 +286388,7 @@ CVE-2025-23227,0,0,f9f92843c2672f819b4e02923b915715941f2a484ada128843c5fed7ba6fe CVE-2025-2323,0,0,38dc6c42b7b635e3caddc5b01ae9aa4a1f84282e9ca11a611a0d7850c76ef099,2025-03-15T17:15:36.610000 CVE-2025-23233,0,0,9d0894e8f043e8d2e3d9f99b4c5bfc27819eaf2a631a882e6cbd474030b88962,2025-05-16T14:43:56.797000 CVE-2025-23234,0,0,0aa84930362b667d70a5001cc89de9e9c7d2ff576260338d532dbdb11280c011,2025-03-04T17:40:00.083000 -CVE-2025-23235,0,0,053e7f86f661558d383b3a03726a984e62dc4f39892bcf75a125546184da7893,2025-06-09T12:15:47.880000 +CVE-2025-23235,0,1,77b110d7979ef3cd8f123e03d04ff7c13a90791b696e80f47f0267a74c5d60a8,2025-06-09T19:07:15.063000 CVE-2025-23236,0,0,190a8ddc8688f8aa0a88d8a027b6b33a7ce91edfda9c184dc87404da93cc5156,2025-02-06T08:15:30.170000 CVE-2025-23237,0,0,c0ce202263a02631ffe1db2dee5ed008b2b4991928cf61026697f648aec08853,2025-01-22T06:15:14.480000 CVE-2025-23239,0,0,73761053f1cf486225f31cfbe2c5d7282e449e2379e63bc42bc6b88358fef062,2025-02-05T18:15:31.373000 @@ -287060,7 +287061,7 @@ CVE-2025-23966,0,0,7be907c83ff5fc724c156b1fa35d79f9d45ca14741abf1d0664a82e4e926b CVE-2025-23969,0,0,7b4a526c0a0f41bce6a566d54e32b90d3eee1529429f2b0b2fd2ed76bdb8e139,2025-06-06T14:06:58.193000 CVE-2025-2397,0,0,1d9d522b7da574d99450a0c926cba6b95d7f81a170fb089caa03fceac1350b83,2025-03-18T15:16:01.257000 CVE-2025-23971,0,0,6cad113739e966967b213a794a8a4e6b4bd40580b34b4a55543607f30258f605,2025-06-06T14:06:58.193000 -CVE-2025-23974,1,1,f138a01d2447b89b299e77f1d078e1e2755225d1790f741eb58637567b08f9d5,2025-06-09T16:15:34.893000 +CVE-2025-23974,0,0,f138a01d2447b89b299e77f1d078e1e2755225d1790f741eb58637567b08f9d5,2025-06-09T16:15:34.893000 CVE-2025-23975,0,0,e8001c46a9ccc486b1a86f3be17fa5f6b3ce26422e7bdcae0080fc4ebd4b6ef7,2025-02-16T23:15:10.477000 CVE-2025-23976,0,0,a29eb82e0663b02bfaa3596cfe2622c511331a5578d509b2b4b465f1a7a97d91,2025-01-31T09:15:08.530000 CVE-2025-23977,0,0,4d0f94ce84075ba723583d9d09a43737047f5d4a006604c1cf44bad3bcf53c59,2025-01-31T09:15:08.687000 @@ -287484,7 +287485,7 @@ CVE-2025-24483,0,0,8e8c3f541513089421e16456a3415c9fe977a1e0274a2d9a7826bef889eec CVE-2025-24487,0,0,6cfb50534b9f66df8c6ab5b7fd99a29e22eab1acb6c93c8413ece70cd6d8bafc,2025-04-16T13:25:59.640000 CVE-2025-2449,0,0,0dbd069203a80b660cdb63a2610dc85f23643235633ff15eeaf11d0c77ab186d,2025-03-18T14:15:45.670000 CVE-2025-24490,0,0,c90744a991c52fb51aa8e878b4b2657f71ca215607f5858e899dd6952ad19778,2025-02-24T08:15:10.260000 -CVE-2025-24493,0,0,fdb66e8ca53b9f884c9dd06c53af3ba981007bf583927e7d2c39b353d9ed623b,2025-06-09T12:15:47.880000 +CVE-2025-24493,0,1,298eb27dc0376e2d1b1693184c401bdf75815d40d2991bac7663d0fdf9955d90,2025-06-09T19:07:08.100000 CVE-2025-24494,0,0,43ac2d60a286060ae572ec37f3d35d579c4245be449efae1f59958937f264e22,2025-03-05T16:15:38.937000 CVE-2025-24495,0,0,e05ac5fb553cb7bdef2f83a624ac7e903dfc7b9db7dcae5dbf9b1cb088de8cfd,2025-05-16T14:43:56.797000 CVE-2025-24497,0,0,c353bcaacc4022d9f615cca17d8aba00bc9c27a2db4d05cf3443efd3facf0482,2025-02-05T18:15:35.613000 @@ -287519,10 +287520,10 @@ CVE-2025-24539,0,0,2841be2678cdb271849641acc1446603234474eb5ae24ac1c568c615d7e63 CVE-2025-24540,0,0,d0faf64ac8f36a77dbad07877c3103051b1abeb29480ff1259a6cba2a76cb4e6,2025-01-27T15:15:13.753000 CVE-2025-24541,0,0,1a002ead1aa4092b5cfd2f8330fae03d8f8276ed8bab9f28b7ecf0ed9e920dde,2025-02-03T15:15:23.810000 CVE-2025-24542,0,0,4b0f63e0d926fe5e09a7ed0a0d0f082f2f9b9971c5591e81feb5087d2f9e9514,2025-01-24T18:15:32.550000 -CVE-2025-24543,0,0,dc535688d750437ef6cd501ad14fac0f40866d5f9e5569b295fc210a0034b60e,2025-01-24T18:15:32.703000 +CVE-2025-24543,0,1,b07aaf60ec33166af473c6cf5e6234900e835f86351ddb20b8e0244b71b8f030,2025-06-09T19:34:04.443000 CVE-2025-24544,0,0,0c5953b4c0b30e15ec25a54cd5cfca6fc171cada103175983edde9e88869438d,2025-02-03T15:15:23.990000 CVE-2025-24545,0,0,d903b50b641c8b1ad5df3dbb119c76a4e4faf3489a6bd15d04b2eef5ceca9d22,2025-02-03T15:15:24.177000 -CVE-2025-24546,0,0,ce37b008cad19a696497b62818004627cd970c6e3a9bb63d4ca1fcdd85efcfa5,2025-01-24T18:15:32.893000 +CVE-2025-24546,0,1,0ce44cf808c0900461a10307fec3c8e131dca80c68de8e9ec533cc9744804074,2025-06-09T19:34:47.433000 CVE-2025-24547,0,0,9bbbbb0170cdf42c7de6ad37f0762f4ac79a39517bc2a7a976e9bfd241d0f5a9,2025-01-24T18:15:33.063000 CVE-2025-24548,0,0,fe719d34f355e559e7ea70e71c7737d47f363c77af58e953bea9769dfcb1eb5e,2025-04-17T20:21:48.243000 CVE-2025-24549,0,0,cc40b6e26688d19744c9ccf5aa4c960233861d1a46718a8675844d0dfee836e3,2025-01-31T09:15:10.027000 @@ -287626,7 +287627,7 @@ CVE-2025-24646,0,0,9388133f7bfc92c4d35737c7541c675078edf57c24edd4a38f49619fc52d6 CVE-2025-24647,0,0,200e1fd220d6ce976e575d1a5dcf67ce623f0f65910f4be6feef3f2960ad4866,2025-01-24T18:15:39.007000 CVE-2025-24648,0,0,f1268c518aeb67aef0edd3f5701e0a28913074bfde4371631d72573de1cdc88a,2025-02-04T15:15:23.460000 CVE-2025-24649,0,0,023d2bd5a44406bd68c3c4645a1c6ced5cfeeb799618a8ff0129cf3c8fd99b85,2025-01-24T18:15:39.167000 -CVE-2025-24650,0,0,fe59c4077ae8bea483518c75afffc22cd37834b6c9aee9026f11ccd500a93087,2025-01-24T18:15:39.347000 +CVE-2025-24650,0,1,4a228cc4e4b243c366bce334e941668143d5ea4ddcfaf6ba9ca18c0d6a01d0c8,2025-06-09T18:53:22.317000 CVE-2025-24651,0,0,91d641c93be07363820823b9af57caff4fe40369227aab04a755b32a6e85e9c8,2025-04-17T20:21:48.243000 CVE-2025-24652,0,0,125bd9607cb5ca27355c57c1e03dde9d03a473f27327fc2bf3ba8ab8fcc2bcac,2025-01-24T18:15:39.517000 CVE-2025-24653,0,0,98339226f3f5cbf33f9e3597a502d8cd262e3f8166ecb0e8b1f8d1c7b5a57572,2025-01-27T15:15:15.070000 @@ -287675,7 +287676,7 @@ CVE-2025-24694,0,0,74bcc6e20e6775cebdd45115f389e00a57b4204067a4e951e1df717a2ee2e CVE-2025-24695,0,0,f61c171f77cef62d0dd2aede8b4b5d725bd7ea8ff8a025771bdf23d5a72f8ca4,2025-01-24T18:15:42.740000 CVE-2025-24696,0,0,3f05e52259d3b900a80613c5b1e8b568819cf706464f6128c6614eb8c2149632,2025-01-24T18:15:42.900000 CVE-2025-24697,0,0,524ece83a68382cbbf9bfb8b326769c1433565110882c970ecb2d390f56fd66b,2025-02-03T15:15:30.090000 -CVE-2025-24698,0,0,5552634bbef33c591a70f567771fa3505a7ee285e1df37cd489d545be84dbc61,2025-01-24T18:15:43.050000 +CVE-2025-24698,0,1,676d60c409ca118cce1a1c15a7937047665e5de95a1861fe51e97030f1b8d6a3,2025-06-09T18:54:46.353000 CVE-2025-24699,0,0,393e254dc7ad1cd4683fc4d4519da575204d2336c4593392a7c99d9a332989ca,2025-02-14T13:15:50.193000 CVE-2025-2470,0,0,e7bbd3314d01afb495105e9f14fa634ae3a198d6a4f663a6e0e01846e9c2ceed,2025-04-29T13:52:28.490000 CVE-2025-24700,0,0,751d45a0c372daf25447afad51791e39d3a984cf49ee5476e94da07a79832cbd,2025-02-14T13:15:50.330000 @@ -287694,7 +287695,7 @@ CVE-2025-24711,0,0,c7b12fa7361c37b7f684d5d9bd8c981c0588669b77fc10a793f6d6447d383 CVE-2025-24712,0,0,30b2fed2f94ab0d3b48fe779456ff5ad65759e0041f40743f613020280f4ac5f,2025-01-24T18:15:44.480000 CVE-2025-24713,0,0,e2b2af2ead919263bace3d05fe5b1e1a77f02da217519aa2973f3d64900a1a95,2025-01-24T18:15:44.630000 CVE-2025-24714,0,0,93ac834ca231e942c8c8107009e2b390a2702a7449fe552776667d74dacb3d95,2025-01-24T18:15:44.773000 -CVE-2025-24715,0,0,ac3b5881fede7207619ff9b1127d7c43072a5840bc700ba02b9afddd24072975,2025-01-24T18:15:44.913000 +CVE-2025-24715,0,1,aeb89768d5c802b6a10036dd37f33f17bcc0373622158e7c079964544890fd45,2025-06-09T18:55:37.650000 CVE-2025-24716,0,0,3e5f272f213299471a09cb98fc33c11e4b69fc8f285ac9832b350ab3b52e806a,2025-01-24T18:15:45.057000 CVE-2025-24717,0,0,d37d47710fb1637325098d59985f41afd078b1786aa2a30a6fa708bcbf7faac5,2025-01-24T18:15:45.210000 CVE-2025-24718,0,0,0a23f25803acb7d179b5a840e848cbadba335aa2cc0f054e9e37ea00fc086ffc,2025-01-31T09:15:11.617000 @@ -287714,9 +287715,9 @@ CVE-2025-2473,0,0,c779cce677b71e9826cd46cef584d73942126249af104ae25e00cbd8e6ab8e CVE-2025-24730,0,0,fc837ddd0a9b843a50233d49b160d1ffcc2a42a504761ca2d6cbe244eb7ae5c1,2025-01-24T18:15:47.193000 CVE-2025-24731,0,0,49b9d87fe50843eb1bd58d4e2d6c6d09038a230901783130e84ac391da7f362f,2025-01-24T18:15:47.370000 CVE-2025-24732,0,0,c415d1fd5de8703d180e448901772f07d2bcadd6548313af1a4bf127cb6f5bdc,2025-01-24T18:15:47.530000 -CVE-2025-24733,0,0,4676f7918cf275f5fb54062b7ef4cf3a83f01426e3611b29a683c1cbab1dbe4e,2025-01-24T18:15:47.697000 +CVE-2025-24733,0,1,19623b8cddec9bd678ab21a0a6434a55dd6a2c946e1fd89b1c0ab50c79e730db,2025-06-09T18:56:58.550000 CVE-2025-24734,0,0,d7ca2e9810757851f82f80aff63b50dafd3642d61fd1c2dc810bbf398284d5d2,2025-01-27T15:15:16.390000 -CVE-2025-24736,0,0,45c5bf69af2d60b4986eb024a47a3051084d244bb544d66839b991dad3ce88a4,2025-01-24T18:15:47.850000 +CVE-2025-24736,0,1,1e8a96652fc2162e5783360265a8d95c57b803a595f82f3425468a4e8170b686,2025-06-09T19:00:07.100000 CVE-2025-24737,0,0,9483d129977b5a55aa4e0fc4b6924a76dadd8b2c82251145da31eab6c37c7862,2025-04-17T20:21:48.243000 CVE-2025-24738,0,0,ff824e93f081ca47b8768807ed6baf0479ca4ae475620ff9b3eabc39fddae9c1,2025-01-24T18:15:48.017000 CVE-2025-24739,0,0,2511d2bc15670f2f05a63c18d4ca8980ee5ac36501cd02fafaa675bb11e9da2e,2025-01-24T18:15:48.177000 @@ -287741,10 +287742,10 @@ CVE-2025-24758,0,0,32f18f9fde7b9c98057db303ccb0ef7fae2b4bd1295433bfb8994fab92023 CVE-2025-2476,0,0,cb20178503f5107240f603d37b12152fa4cba62b4b4f5e2e6646619a7113db65,2025-04-01T20:37:56.963000 CVE-2025-24762,0,0,e213928403ae3244a203a55382fd1c1d02c9040f1142473047052dc33d963e4e,2025-06-06T14:06:58.193000 CVE-2025-24763,0,0,037291adcced042ac3553d25f413096b84ba6ffa98329c06ace2f886a66d07fd,2025-06-06T14:06:58.193000 -CVE-2025-24767,1,1,fead721178f3b613cf0ff15bbf9e1f2f11ab40a0d506d70969889260cbeb2875,2025-06-09T16:15:35.047000 -CVE-2025-24768,1,1,f1ee9cb3d8593f7272e681afb9fdfce454eb31e7297af72e5c6eee2f5e3c7885,2025-06-09T16:15:35.203000 +CVE-2025-24767,0,0,fead721178f3b613cf0ff15bbf9e1f2f11ab40a0d506d70969889260cbeb2875,2025-06-09T16:15:35.047000 +CVE-2025-24768,0,0,f1ee9cb3d8593f7272e681afb9fdfce454eb31e7297af72e5c6eee2f5e3c7885,2025-06-09T16:15:35.203000 CVE-2025-2477,0,0,3686d026975337c8b88c9fe51616f10734ea4310f92df921905ea60f68804787,2025-03-22T07:15:24.780000 -CVE-2025-24770,1,1,3e2303601393f3820b1f108da089d38b8cbbfc032837595d5b911b389beedd86,2025-06-09T16:15:35.360000 +CVE-2025-24770,0,0,3e2303601393f3820b1f108da089d38b8cbbfc032837595d5b911b389beedd86,2025-06-09T16:15:35.360000 CVE-2025-24772,0,0,6a9e4d1818e588766fc1d7bf962518c97915afeaa79a1c753a52b3f9bd5cd663,2025-06-06T14:06:58.193000 CVE-2025-24776,0,0,706e7e36a99593f89ab94fbed31e452f0e352f126ca5357c894e45a8228d1ff5,2025-06-06T14:06:58.193000 CVE-2025-24778,0,0,f0428282ce1f3c9a908b9740e17f5746247c3b4afe442d54c72bf4fc8c0a6798,2025-06-06T14:06:58.193000 @@ -287808,7 +287809,7 @@ CVE-2025-24855,0,0,3b83ed2e42d12574419e7a5d93b58d3d4fa5393073d22ec518ba075ff8bdf CVE-2025-24856,0,0,de81d5fa3871c8fea36d9f92d65c776b1ac74e3aaeeb12190f8f5c33a73c1a6a,2025-03-16T04:15:14.517000 CVE-2025-24858,0,0,80a2e3e27ced5551413d1f52e03f6696ce40853726c2f8318cd2bd73891576ca,2025-01-26T07:15:09.237000 CVE-2025-24859,0,0,7ae63268ed8f6061889ef3699ff8e2b0990fb5a54f1b9202dc6890fa70d06768,2025-06-03T21:32:18.940000 -CVE-2025-24860,0,0,2716815cacba7c5cfe54858fc96771c8728f0c123ed6a5d7daffa45fe22369be,2025-02-15T01:15:11.327000 +CVE-2025-24860,0,1,51b4b011fbb6be85ac4dbaa67502dfd641408753a97dd7519ab71431204af0b8,2025-06-09T19:43:36.840000 CVE-2025-24861,0,0,cda35c31a52f18b1ea661e5db3735fa3ea7e6195ecdfe91c4593ecf77fb63f96,2025-03-04T19:27:30.983000 CVE-2025-24864,0,0,03d90ee76247121aec5193d6e140b18b95834894f967758504c08d3025e47e84,2025-03-06T04:15:25.713000 CVE-2025-24865,0,0,a84aad4d5bdb225f0618ad62f2ff1ffe2c161de1be6dfd9acc81d2401125c5dd,2025-03-04T21:16:29.903000 @@ -287940,7 +287941,7 @@ CVE-2025-25039,0,0,6155e71068b69a4630ff4049b1126cd719aacb06ed44ea56a73c6de4d42c8 CVE-2025-25040,0,0,eef52afdc1e0cd691e9f8e58be6a79eb181268f995aedb195ab63cb8f64cab8c,2025-03-18T20:15:26.030000 CVE-2025-25041,0,0,38e8fa4df2cdb6a93ddc945573bdc68d8f211c9cdac3d09670f4b0b980fef07e,2025-04-03T18:15:44.960000 CVE-2025-25042,0,0,5f31505452d68a678450274075e145f35ddefef408cd0b3ed1e383cb5d57fac4,2025-03-18T20:15:26.177000 -CVE-2025-25044,0,0,bd7bd8a39fb422638a8e50fe5d61319982a7231b9e1d394754abb91fa685d798,2025-06-02T17:32:17.397000 +CVE-2025-25044,0,1,32cbe5bfdb7c126fdaca206ae5bfc36cf733fd46ea11b87de08f104341ac05bf,2025-06-09T18:08:44.327000 CVE-2025-25045,0,0,4332e3a8b71ea922a29f4a25a34e5a1ad4ca877c6226bfc3954996951ce40a0c,2025-04-29T13:52:47.470000 CVE-2025-25046,0,0,ef01fe62076c448c0a74cc0b470d93bb2ae59c519d0a10b5228ec1da6b3dedc6,2025-04-29T13:52:47.470000 CVE-2025-2505,0,0,1c5dbc559f463be147cb12740d372dacf2302c45c3ca19193c3edfdb65cecd96,2025-03-20T08:15:11.873000 @@ -288072,7 +288073,7 @@ CVE-2025-25170,0,0,10b2b5d5b1d8e09a883b23033bc8ac75abe37fde2151575888a21edb35483 CVE-2025-25175,0,0,57f52436a99f7fed27112577d2b540c306e155b82b661017f91c9191eec841c4,2025-03-13T09:15:14.123000 CVE-2025-25178,0,0,4d3495fd89869cab43d2d5601ae744320ec1fbb133f1b7ab10bcd79797aa78af,2025-04-15T15:16:07.543000 CVE-2025-25179,0,0,85fb447806670ebd1c5d1bfbca1f8c6323a5c7423a40bb05e292c30fd33891ee,2025-06-02T17:32:17.397000 -CVE-2025-2518,0,0,b59bc17e40a8ef98ce4dc332bffc082676274d53349daf06dd140fe4bf7fd51a,2025-05-30T16:31:03.107000 +CVE-2025-2518,0,1,b7aea7127772fbba46618ed78636e981667805aec3f5c03abb88aad4c0369aeb,2025-06-09T18:59:23.160000 CVE-2025-25181,0,0,aebe0b9a6314ff7a9f4a4ab410e1c6b1bc48e96ec20a3daea50dbb87c370c597,2025-03-13T14:31:11.140000 CVE-2025-25182,0,0,6fd347398e5cc83c7bcf9c93dfa3366f2e8e0aced29c81495217dd5d01f504cd,2025-02-12T17:15:23.857000 CVE-2025-25183,0,0,9f610c42840d8f1123d400fa738e85280ed4290b29d92e2aa642daf493197632,2025-02-07T20:15:34.083000 @@ -288105,7 +288106,7 @@ CVE-2025-25208,0,0,1babdf0da15439521fe543d31f9f6d67b42bee417cefee202809ea696e077 CVE-2025-25209,0,0,0aa853401b6b75209cd7b56e58149d52405e55b58a8364fbad4464a2e6d7fef4,2025-06-09T12:15:47.880000 CVE-2025-25211,0,0,cc654165143e1a6a565806b2fc146b90cc33ea614905ce025bd44c72692f30c8,2025-04-01T20:26:30.593000 CVE-2025-25213,0,0,4b306f44f1e5df4d081a6c0fb4426c0cd2686db9ca8e9c6904e1b2bea864dca1,2025-04-09T20:02:41.860000 -CVE-2025-25217,0,0,40f7da79f01bb24e5536c3a7e2d58e020bad609d3c6837747ddf9e56abc855fb,2025-06-09T12:15:47.880000 +CVE-2025-25217,0,1,946983f09842b611ada073cdbc9b879a3d7108893b9945dad8c0019f150ae626,2025-06-09T19:07:00.530000 CVE-2025-25218,0,0,fba0872e99b54dc5764f05bf49635253da00a326eff6e2ff854aa21ca321508d,2025-05-09T19:06:17.877000 CVE-2025-25220,0,0,3e48240fbed17896ea7da609293ff3c7512ec69524229da5c9de3065be015d34,2025-03-18T09:15:13.750000 CVE-2025-25221,0,0,da7f39219236daa10c6a9a322f77562859face44f96d9c55ab9ddbe74ace6d9f,2025-02-18T01:15:09.070000 @@ -288439,7 +288440,7 @@ CVE-2025-25942,0,0,3b10aab0424ccbe825a8408322b23b126509fab5473b4dfdec38df6e27940 CVE-2025-25943,0,0,b492294eb75f034de1e726b36e7733b5b31f09e8b4760081cb6d19df3f9d0819,2025-05-13T14:02:15.427000 CVE-2025-25944,0,0,afdec4d1ae17e34b9f171e431f50b867ef093ec7af1193f1c9b05a93ee84066f,2025-05-13T14:02:17.343000 CVE-2025-25945,0,0,8fda1f0df4b6fd77ad90de6cc55be495d141e26f1aa411afe27226f0b17df951,2025-05-13T14:02:19.330000 -CVE-2025-25946,0,1,eb77f03c8b8521e15de7c0389e8f13ceb96c3eaf67e119656c4e16b44c51b07a,2025-06-09T16:49:57.563000 +CVE-2025-25946,0,0,eb77f03c8b8521e15de7c0389e8f13ceb96c3eaf67e119656c4e16b44c51b07a,2025-06-09T16:49:57.563000 CVE-2025-25947,0,0,4b3e49b1df763151bc3b61c2fd860ac99961ccbe5ecbe2bfb03cae7f03a6b770,2025-05-13T14:02:23.330000 CVE-2025-25948,0,0,ca5ca8099c123ac40ced025637b0c72774b2e5cd1ecdf3abb66470a227375ec8,2025-04-18T14:15:21.417000 CVE-2025-25949,0,0,37ed88dfaf3dea8d3aac537831aa5ed4f56df128e0b320c9512e04a3c222a74b,2025-04-18T14:15:21.573000 @@ -288740,7 +288741,7 @@ CVE-2025-26588,0,0,bd02ba233979579f3c8028618005b5c036f8e9bb2db4aabcd7a57c2127440 CVE-2025-26589,0,0,bed434e05d708700c2c5a6b977f599fcc267a2dd10919cb423bc182a13c41191,2025-03-03T14:15:56.067000 CVE-2025-2659,0,0,fbf6b7428f5a2f31e77711a0c7541da7a333822ab93a6dd7f8fe575092acea75,2025-03-23T19:15:14.570000 CVE-2025-26590,0,0,59b0449ffe0a585abceb2dbd31bbf1f4b8511313e0ccfcd55cda88f516ee3b5e,2025-06-06T14:06:58.193000 -CVE-2025-26592,1,1,302c3335443573c29b238d61e6134045df825d099aab9d6a0bc46fa35f1ae4d8,2025-06-09T16:15:35.517000 +CVE-2025-26592,0,0,302c3335443573c29b238d61e6134045df825d099aab9d6a0bc46fa35f1ae4d8,2025-06-09T16:15:35.517000 CVE-2025-26593,0,0,402017efe81cc93943f40747043a9ed8e28bd63e4d6ecf387342548bad603ae6,2025-06-06T14:06:58.193000 CVE-2025-26594,0,0,22b96a2f1606784ee6fa3dff98a3dcda4cc907d5203050d8c08fb783b91d57b4,2025-05-13T20:15:26.200000 CVE-2025-26595,0,0,7edc8f68064e58be0f29d0db82ad28f7d327b5548e68e11f7c8e4390b5d2c333,2025-05-13T20:15:26.337000 @@ -288838,9 +288839,9 @@ CVE-2025-26686,0,0,875d6e2e2335e247eb60c92fd966d311965d4dfa5b2e37254f2e9c381e740 CVE-2025-26687,0,0,3e22551589e4ec527d753d1d500a0d81debbda8185553b19774b1c6aad2170f5,2025-04-09T20:03:01.577000 CVE-2025-26688,0,0,21b07cd2440210e182a8d6b8137627939ef3f62b96f51db277c59d6502d24206,2025-04-09T20:03:01.577000 CVE-2025-26689,0,0,dec5b99891737ae6a49560338e391a9fd35d35000ff58423c3aa4180c66c711d,2025-04-01T20:26:30.593000 -CVE-2025-26691,0,0,6fe5f3561890fa718f566c2d1a51493e2cdd5b7cfa38eaec1813106a7f0aa782,2025-06-09T12:15:47.880000 +CVE-2025-26691,0,1,4011d199b9dd727e2e24e01c3836eeda9e3729cdca6d25d2a3ab75823101829d,2025-06-09T19:06:52.933000 CVE-2025-26692,0,0,254a0626b24ab412c5b839817131becc67f683a51ef18efa9c64e438fb6bbc9e,2025-04-29T13:52:10.697000 -CVE-2025-26693,0,0,5d818dcb2c8dd8d4fa69b38a71cba2e4052e2f6135d4c0ed7a03aaaff5cbcc66,2025-06-09T12:15:47.880000 +CVE-2025-26693,0,1,1f3e4b8c07fe200f515077f3d834b6b0cab24d0594d7faa790fc1a927c0510aa,2025-06-09T19:06:44.900000 CVE-2025-26695,0,0,f077e716806e3aa11572737cbb762272530f7e8504d9bb6d9406f576cc783416,2025-04-03T13:30:39.037000 CVE-2025-26696,0,0,b9658e1d3c0f3dd4003407283a716267ae4de824c8808025c4c0cd47206d44f0,2025-04-03T13:30:33.593000 CVE-2025-26698,0,0,02e1c85350f9590f950db8be3fe5f72c9485333903c0f224a4be86e1fd66bec5,2025-02-26T13:15:41.983000 @@ -289153,7 +289154,7 @@ CVE-2025-27113,0,0,3f927ac99bedded3f15625d404f90be5185a2dbbeb1f3658f62dd072e77cf CVE-2025-2712,0,0,f459821222a72c79cc7ff9a9b481a8bc6ba3bcc2247f05dabdfc4ed09d6e195d,2025-03-27T16:45:46.410000 CVE-2025-2713,0,0,96d615228bbe2400210a94715d82e0cb4affc98dd4349c31070f30252b2cc770,2025-03-28T18:11:40.180000 CVE-2025-27130,0,0,a1dc5070cb706965f29565e1845bf948cc8ae12d305309227937d0f3062f821a,2025-04-01T20:26:11.547000 -CVE-2025-27131,0,0,aea51e9b40422a78fff967501e7e056eb3da818efde9be0c84f083bd134ae62b,2025-06-09T12:15:47.880000 +CVE-2025-27131,0,1,071d8576367ac4bcd57ae780dc39fb5ba7d654b804cb1f5932df1fbd3dc6ce84,2025-06-09T19:06:16.757000 CVE-2025-27132,0,0,b1a8a12d0148537a02c0d96ce9420181e0484ee5a2e7e39fdd1e47ef3d526ac3,2025-05-09T19:14:30.360000 CVE-2025-27133,0,0,6a9a66aab6e9ca89b44a7c5cb67994f31f8bbf17a0a742bf21f793ab1c58a1a0,2025-02-28T16:49:04.283000 CVE-2025-27134,0,0,5fd775f971c7476e093d169270d7a42aa9ce8b27b84358718e7f8ecbff454f65,2025-05-16T16:32:35.957000 @@ -289240,9 +289241,9 @@ CVE-2025-27221,0,0,49e7be9560dc9cc77f297711484d4ecb5ba5b672bef56754e4d2d3990afad CVE-2025-2723,0,0,52e45c0ba96402a35fab3eb286730cbe627c9a2787e2f2127fb3c173463fb2d6,2025-04-22T13:15:43.140000 CVE-2025-2724,0,0,4610ac8ad922ea624cd2d35c755551566dc6e12e181c5f6d5e7e865b18b82086,2025-04-22T13:15:43.203000 CVE-2025-27241,0,0,5f3f6499b682ea2df4f525925370f561106f8235867d4ad8fc9ab0cd76693210,2025-05-09T19:14:21.627000 -CVE-2025-27242,0,0,4e62bf9c35b5aaff138bccb1f91bf9b1b88c17e0c48d8685810867712c369004,2025-06-09T12:15:47.880000 +CVE-2025-27242,0,1,500974443f03ab0aa22535061e839a183b64d05d374ecf7ec2cd08c2cd5ec1ee,2025-06-09T19:06:09.833000 CVE-2025-27244,0,0,86fab9c76c6855c3f65d6fe655fad17ea7f4d78587bc5a57db26b5cf4b92bc76,2025-04-02T14:58:07.527000 -CVE-2025-27247,0,0,369dd68158d8e08a0a4a7e6ac616370389a7740c9d92ca6ee053b9480699856d,2025-06-09T12:15:47.880000 +CVE-2025-27247,0,1,148270dc010fd46f24f2228b07b8ab3645189e4bba63f8757503d4c6d7652887,2025-06-09T19:05:57.987000 CVE-2025-27248,0,0,fecd2c1f71e975d5a7a66828a8b8c63d27847b5ba5cdc677ce3ae8da25e6ebf8,2025-05-09T19:14:06.030000 CVE-2025-2725,0,0,4c49041f815970a2f0962172abde8e9b997e751be7cfde55bbadd432ffae1641,2025-04-11T20:15:22.937000 CVE-2025-27253,0,0,e6fd345c99af7ee03f79cb7784a5ae2d7ed62bc20a94544c634faa9f6cea75f1,2025-03-12T11:15:41.127000 @@ -289357,7 +289358,7 @@ CVE-2025-27357,0,0,906169a569eb5a8ab170c576da5f537f983e8f3b76fbc6f0db581847c8ddd CVE-2025-27359,0,0,2c128bcd198eb16955407dfe7764904f6be94ede41a94dec13060a361b1d7181,2025-06-06T14:06:58.193000 CVE-2025-2736,0,0,33c3006167b33de591f1a27264763826544e0569703dfd7d13e6e1e623d6c471,2025-05-15T19:29:57.387000 CVE-2025-27360,0,0,33c5b5368d3ca00f309df15e8c0f05ee58619be0996d076d2a923c5552b16e42,2025-06-06T14:06:58.193000 -CVE-2025-27362,1,1,05ca5ca5f87f48dd355bdc9afd642a68106f9fe04f52ab3ff82ce500361c2207,2025-06-09T16:15:35.663000 +CVE-2025-27362,0,0,05ca5ca5f87f48dd355bdc9afd642a68106f9fe04f52ab3ff82ce500361c2207,2025-06-09T16:15:35.663000 CVE-2025-27363,0,0,5fc805dcd373aa41b8bfe41b0acc4a7eed4f5eae147e5b3770b01d8700da6b78,2025-05-07T16:00:55.577000 CVE-2025-27364,0,0,9286c5546baa0d62309d5b0261f0843f04abf72743b73d703ec5236da175e8e1,2025-02-24T20:15:34.180000 CVE-2025-27365,0,0,6d4df35d3031e716958ad58e701388566c342a3c6bf11871692b82631479238a,2025-05-02T13:52:51.693000 @@ -289505,7 +289506,7 @@ CVE-2025-27556,0,0,4ca86b14fb70d2b656f3535be9cca045a182add78643be3ce819c6025668a CVE-2025-27558,0,0,36f74819ef16427985854dfa04d27faf45c7f71f4482aa2cdead32788e417814,2025-05-22T19:15:43.790000 CVE-2025-2756,0,0,092a25b42b3189a59251afe4527fb8569dc69374ff038cad349569e68ebf3853,2025-03-27T16:45:46.410000 CVE-2025-27561,0,0,9a2ed6a48d4c37646f33372f3188d4d9d564856295e313ebd6cb5bf15b4af1ba,2025-04-16T13:25:37.340000 -CVE-2025-27563,0,0,8db8a18450ed8df51ce5577acdf9c44d267086174b312a93939d7ab8afa959cc,2025-06-09T12:15:47.880000 +CVE-2025-27563,0,1,e9f1c079c6cfd2bcf9c57a81e690cf56c7ccd414ea90a9b0a142ba4b424f5c3a,2025-06-09T19:05:03.483000 CVE-2025-27565,0,0,e150582bbd4ca1404978c02e2de39c9c934be7297b5291301044964574dfba69,2025-04-16T13:25:37.340000 CVE-2025-27566,0,0,20151802c77a54c11d86158716186dd611d922e0ea863da24950c80acc30e475,2025-05-19T13:35:20.460000 CVE-2025-27567,0,0,8ca9b74c3e219a4d15e6ee8281f7f16769702266f24ed34aea1ada953bbf2d6a,2025-03-28T18:11:40.180000 @@ -289989,7 +289990,7 @@ CVE-2025-28884,0,0,771cff37d2145b21e6b9ddfcac196ddf32439965fe8c1aeaed10bf05974a5 CVE-2025-28885,0,0,bcaf9c42e10ccff4d56f81fc7722ea247bf8a733f08f824c9662923ba239ad61,2025-03-27T16:45:27.850000 CVE-2025-28886,0,0,8829096276344aa5296745d321667067925dd057c12550ef0a399cb1c9566caa,2025-03-11T21:15:46.113000 CVE-2025-28887,0,0,57bd8f01d02ed8afd5599ea32c65ee4847f50f38cef546351412e6715f07165d,2025-03-11T21:15:46.270000 -CVE-2025-28888,1,1,218d79ed36564c7e921d35e09057b29a27baee5ae10d333487bb17be946d47b2,2025-06-09T16:15:35.857000 +CVE-2025-28888,0,0,218d79ed36564c7e921d35e09057b29a27baee5ae10d333487bb17be946d47b2,2025-06-09T16:15:35.857000 CVE-2025-28889,0,0,732c22dbcd124786284c91a1d934fea11c90f1310342dd8b73b00ffff26c19da,2025-03-27T16:45:27.850000 CVE-2025-2889,0,0,915e659db52d0162ce2cf712fef3489521c769b8f84db5fb32670fb6845d1af0,2025-04-07T14:17:50.220000 CVE-2025-28890,0,0,4a332fde3e2ea608ea5eb36fa4d3f0981ec81767d5f2cf4ce855cdc2b6daff5f,2025-03-27T16:45:27.850000 @@ -290051,14 +290052,14 @@ CVE-2025-28940,0,0,04135ac8d9c1245669acb25f77e12e09d3c1430ccba901da70a0adf514651 CVE-2025-28941,0,0,d1dc35fbe2a033c04e261359b97e6eb5a7f518fa1842a2a100fc7c3dd1630b83,2025-03-11T21:15:52.030000 CVE-2025-28942,0,0,13661206a69e4d0b8a31139510417b818a8d6f6daa40fe60ee4e3d972c089172,2025-03-27T16:45:27.850000 CVE-2025-28943,0,0,f13533c6ec40779f6c4eb31c17c71b8bf7e67bb9305109da8899c164336e7b7c,2025-03-11T21:15:52.187000 -CVE-2025-28944,1,1,95c564e0e28864c67e8c9776bdab8b6a30d2e9d72e87a35d4a7f777248dc0acd,2025-06-09T16:15:36 -CVE-2025-28945,1,1,24bfed1a3ddb5d58ac7172212844e0f44c7a7e1e3c090f4cd26c09013d27ca38,2025-06-09T16:15:36.150000 +CVE-2025-28944,0,0,95c564e0e28864c67e8c9776bdab8b6a30d2e9d72e87a35d4a7f777248dc0acd,2025-06-09T16:15:36 +CVE-2025-28945,0,0,24bfed1a3ddb5d58ac7172212844e0f44c7a7e1e3c090f4cd26c09013d27ca38,2025-06-09T16:15:36.150000 CVE-2025-28948,0,0,1b60b6a00776a94ad8b87c76d577cbaf8e3c7ab04c515312b101dd417980ed4a,2025-06-06T14:06:58.193000 CVE-2025-28950,0,0,6f71dd863d8ddc4065dcbba1cc370ff17aa5c89ed8392ffbfa9b51c3024047a4,2025-06-06T14:06:58.193000 CVE-2025-28952,0,0,321701defa7b536165d70afff6f53aace0a564a0503a31371810856fcabd66bb,2025-06-06T14:06:58.193000 CVE-2025-28954,0,0,0e33bb88ce5d60e77cdeddd397365985cb550cf77b70cf6964d92b189ca109ce,2025-06-06T14:06:58.193000 CVE-2025-28958,0,0,3d600a5017d17470cd8fe90749f2a43cdd193ef23a7d81d461bc4fc7e97b11b2,2025-06-06T14:06:58.193000 -CVE-2025-2896,0,0,79b6e283e3bc8548a93abdf3b54cf26275828328910251146409e6de805f9790,2025-06-02T17:32:17.397000 +CVE-2025-2896,0,1,4558970bb5260d917e5a373371764eb8c9ff16148bd2cda59741f4495076314c,2025-06-09T18:08:36.257000 CVE-2025-28964,0,0,485e667ca4ab74e616040a1196a78321a36f62126bd16f17a2500147cf0be448,2025-06-06T14:06:58.193000 CVE-2025-28966,0,0,f1d92b3997cf600b02481e05750c9165b060edf5b34aa6d285c9f38d6ecf563f,2025-06-06T14:06:58.193000 CVE-2025-28974,0,0,16efdc13ae17a88a917f453d4a5bacb2b9653de889fdba302867ab87b0bf29f3,2025-06-06T14:06:58.193000 @@ -290068,7 +290069,7 @@ CVE-2025-28984,0,0,57cee99f9ebe3f6cddb2f3fca46de8e9185191652f124800f269a25a0fc60 CVE-2025-28985,0,0,d18a1fe67c21c1ffbd784b7026a8e59c8a45621bf27c85a0461dd7fad6156512,2025-06-06T14:06:58.193000 CVE-2025-28986,0,0,03e6c885fb874db03a26c71043c11620eb396b761e55dd137b34d0cd647413b8,2025-06-06T14:06:58.193000 CVE-2025-28989,0,0,a931b5ddf814c3d585fc951ba8caa9d2fdb878fed256e2159f3284b95e80ffee,2025-06-06T14:06:58.193000 -CVE-2025-28992,1,1,40024ddc2ca954df4f40edba20d99abf47df17061a722749a277300afeb24340,2025-06-09T16:15:36.303000 +CVE-2025-28992,0,0,40024ddc2ca954df4f40edba20d99abf47df17061a722749a277300afeb24340,2025-06-09T16:15:36.303000 CVE-2025-28994,0,0,d03d96feae9a608da2fc3c35fb10e6d325370832f4d3be8d5f6bac14eea45f45,2025-06-06T14:06:58.193000 CVE-2025-28995,0,0,c37d37bc93c798ad3786d9a6f5e6833421ea98016ddfea91bda61f0631b8cbc1,2025-06-06T14:06:58.193000 CVE-2025-28996,0,0,b17b63cbfe04e941900c58c101d778298d44e2c968b610b352c2ad7362813052,2025-06-06T14:06:58.193000 @@ -290137,7 +290138,7 @@ CVE-2025-29152,0,0,e6499d7a2cdcd5c3065a74e5d2ad830f429efb808a4f2459282509b3df7a8 CVE-2025-29153,0,0,d8eeeb715e26f12c35487b55680a3c0a724084732ee5fd50de67d20533f234cb,2025-05-08T14:39:18.800000 CVE-2025-29154,0,0,7fdc59b1b8b3db49c174aefb6a6ba9c008546e8b1db8a06cac0366e7a5c5b909,2025-05-08T19:16:02.437000 CVE-2025-2916,0,0,a9d32a009c2c479d4d99380c6f5c7dc74ee32d7bcd65aba7c50dbefe66cc315d,2025-03-28T18:11:40.180000 -CVE-2025-2917,0,1,5e954b3dd80aa4a930dbaedde7b70b19fc8b0dc93229912d7b3d305f418d7302,2025-06-09T17:30:31.340000 +CVE-2025-2917,0,0,5e954b3dd80aa4a930dbaedde7b70b19fc8b0dc93229912d7b3d305f418d7302,2025-06-09T17:30:31.340000 CVE-2025-29180,0,0,ff32a6c0b8ae6bd7bd11047aabd317a8e135e12cfa97f8616621804c50d97fba,2025-04-23T18:44:06.733000 CVE-2025-29181,0,0,8ae82d2203a155eaf3356642ff55a59d1f6c904778c798cb5b17b83f75821ff9,2025-04-23T18:21:15.327000 CVE-2025-29189,0,0,acad0707e84ed6f6034c389318c16d4a284ae555c697c4e5480dcb98a0326eea,2025-04-22T17:11:10.127000 @@ -290167,7 +290168,7 @@ CVE-2025-29281,0,0,2a7988381be20926091f1694d6a54d7bfbb1804fbd7d2018b969009fcc536 CVE-2025-29287,0,0,42df811955ba1e4d114222caf2c52a1ffbd7161bdcf19b3119f6c2c189270252,2025-04-24T16:37:54.607000 CVE-2025-2929,0,0,33220c84f93d8fa3d3d540eeec10f665dde8bf23f8b1d901b7f48bb483a4c073,2025-05-21T20:25:16.407000 CVE-2025-29294,0,0,473bd475f5fb8d7702e2a93a3ba641b31019129d004d4409bf3c3b190bf15c6d,2025-03-24T17:15:20.880000 -CVE-2025-29306,0,0,567e03f8ff449bb7e634022c2ce74be869643687b17fcd889b697e34563a9d1f,2025-04-11T17:50:50.240000 +CVE-2025-29306,0,1,4d4cf959c107344258eef26e680a480e0d0375c32c3a0d15c493e329db3dd674,2025-06-09T18:02:02.093000 CVE-2025-29310,0,0,6e73f20315929ac6e51322cdc62ad6436937170ed8ab91331b8363a99e479dcc,2025-04-01T19:51:09.180000 CVE-2025-29311,0,0,bb54a623b9e2f986ea37664c3216347cf249188ea297bb6d4ea4bfcc1e19e489,2025-04-01T19:49:34.530000 CVE-2025-29312,0,0,a83ab0803d593b7408ef47819047a8eed47716c263e6e6784a866c9451353a3a,2025-04-01T18:52:53.243000 @@ -290276,7 +290277,7 @@ CVE-2025-29602,0,0,f676530a9b6afa6e84b7f30080a92ed7da0422c65dff9c63e8b2bdcf693d7 CVE-2025-2961,0,0,99a9282acf76e32af58efa1bac54403a0a08178dfa00cc28168e32b8a53d8a08,2025-04-01T20:26:30.593000 CVE-2025-29621,0,0,ec760c23d2fabb446e49014ccdde725978a4daf486cfc90bdb12f94c16193f54,2025-04-23T14:08:13.383000 CVE-2025-29625,0,0,73b26f97a6b8558decaf6eed0f9b13ba9f48d01d2b9e64d5af7431112d3efd8e,2025-04-21T14:23:45.950000 -CVE-2025-29627,1,1,e7570aea4371ffabeecebf07d74ed7b6e420bd543d7309b51ac4c067a7176d94,2025-06-09T17:15:28.617000 +CVE-2025-29627,0,0,e7570aea4371ffabeecebf07d74ed7b6e420bd543d7309b51ac4c067a7176d94,2025-06-09T17:15:28.617000 CVE-2025-2963,0,0,84d2c4a858a789275648d5c139e966fa3d1f94dab800d93bbe623441c26249a9,2025-04-03T23:15:38.103000 CVE-2025-29632,0,0,6437e7838aea9bb91e340252b5ef67ff3f07b278d68977fdce268b85a2359595,2025-05-30T16:31:03.107000 CVE-2025-29635,0,0,ec72c4a9bc58304e70384a4323071097e434b0be9c6a730e4fb246fc5922f36a,2025-04-03T17:35:51.163000 @@ -290535,7 +290536,7 @@ CVE-2025-30077,0,0,3552a491790a6839d39471705d681d0b56a0da48a2daaa633f419312864c1 CVE-2025-3008,0,0,4fa12c242f5a8201f6c22d962975bdb56f1fb8d6331510acdd26a20f396a03fb,2025-04-01T20:26:22.890000 CVE-2025-30080,0,0,6601767310f6b7ebc1eb1888b6410ba2af316c611e92066d1287334c8340e695,2025-04-07T14:18:34.453000 CVE-2025-30084,0,0,b9e689d27ca09c5a1f75c3365dcd68a752b64ffd47c4b0bf25efadba713f083d,2025-06-05T20:12:23.777000 -CVE-2025-30087,0,0,ca22edb24d2fd6491d96197fe665e0481cd595e8a008b9f74c9f3930100c34f5,2025-05-29T14:29:50.247000 +CVE-2025-30087,0,1,7af4dc36f7564ce62dc4f07fd70fdaea51a828a4c147cb216a9d8fbcec814d57,2025-06-09T18:58:37.370000 CVE-2025-30089,0,0,94fa5ca45d8355546d9ceb129470f63603acc7f5a96fbd0d387c59c0d7484c0e,2025-03-17T16:15:28.507000 CVE-2025-3009,0,0,2ece19ca671196966292028f4305ecb7262e6ccef463f1ac76d0f4bb8322457d,2025-04-01T20:26:22.890000 CVE-2025-30090,0,0,bfa905d9aa408c1f2585d10b532f402f67ab61becc7dc968d47593329efb248a,2025-04-02T14:58:07.527000 @@ -290831,7 +290832,7 @@ CVE-2025-30475,0,0,a2c9011dbe7567697878de65e8dfb3c5d584d7a7635471f469e7e4f9c6a3b CVE-2025-30476,0,0,1b83fd85bea0d8069f29b8d374be29abf968282bb62616dfb04a4e47265c3a85,2025-05-16T14:43:26.160000 CVE-2025-3048,0,0,5eb6156d35bbaa6ace17e28077befe8dbbf8441f38642f57d7841d345fe9515f,2025-04-01T20:26:22.890000 CVE-2025-30485,0,0,f2856ee96c6d55a594aa71df88615bdd59c4c1a0f52dcb79297759def1147103,2025-04-07T14:18:34.453000 -CVE-2025-3050,0,0,e357d869d192e9acb80b6d92b6bb05a8b5cbebe3f28fe0c952e3a5c9216dd59b,2025-05-30T16:31:03.107000 +CVE-2025-3050,0,1,fc15ad23bd9afa2f65532303fa5ace006644959019c36eff80cd9adece20e167,2025-06-09T18:59:36.360000 CVE-2025-3051,0,0,03f9e07d76193917b8de9d74f13ff070438d20cd42142f9b8ee6c497180d4b37,2025-04-01T20:26:11.547000 CVE-2025-30510,0,0,65385fbb77c3413b4dbd5af09bd8095b856fda193f49543e9bce544dff1a2627,2025-04-16T13:25:37.340000 CVE-2025-30511,0,0,8563c461353588100bf079ab1328ff6e11ab2f047bd1165d78f20b19233b493f,2025-04-16T13:25:59.640000 @@ -291171,14 +291172,14 @@ CVE-2025-30863,0,0,d7761391cef516711fbe660c882681788da39c5452dec8b6a9fc5cec32eff CVE-2025-30864,0,0,1ac0bb343ad58c58bff0a6e9c6cf416d5db431071954750e9cf24b259d007af2,2025-03-27T16:45:12.210000 CVE-2025-30865,0,0,bffd1248f8f15b2e751b6f6efb4facadc52958effc8373383203b545fa44441c,2025-03-27T16:45:12.210000 CVE-2025-30866,0,0,bfcfb31d390344d8a10b72e59af13af80a476cc8bbc19a5929b49ad9fad01a59,2025-03-27T16:45:12.210000 -CVE-2025-30867,0,0,9f14037b986e6a3a1b111374077121a22f91e6357b36be489d0ec0f5bde21a11,2025-03-27T16:45:12.210000 +CVE-2025-30867,0,1,80095f0e3be6c3d290fc10ae623a0a64ffa30167940238f8d5e1def14ecc6e46,2025-06-09T19:01:19.517000 CVE-2025-30868,0,0,0ce69a49d90edf537d7d9bde764d07d7255ce2ba3583c37eff7f468be21da2e8,2025-03-27T16:45:12.210000 CVE-2025-30869,0,0,a3a238cd1f258b954371714f246337351bc1dc02fa3eb28aca007ef9691f67e4,2025-04-01T20:26:11.547000 CVE-2025-3087,0,0,e8a26b9e1be3f7b979dc4c333865695b9e7ff44f95515aeecc477d99e3cbae5e,2025-04-07T14:18:15.560000 CVE-2025-30870,0,0,41f34e539870fc6ee923b4b2dfc5559366213a0f6b9f5358457a17f6f7afbbdb,2025-05-27T18:39:31.050000 -CVE-2025-30871,0,0,1439285b12f75720fc21140a50d808167d3417c2d59de58636cc7969bc6e7fea,2025-03-27T16:45:12.210000 +CVE-2025-30871,0,1,423183f9eaa6a0e3905543e7562c9e36c76f3ea59d3da12d6da7d08c79e8b1f3,2025-06-09T19:04:53.113000 CVE-2025-30872,0,0,b536365800566287c904971c159342f1608ad2caa5882ee55888508434c1c145,2025-03-27T16:45:12.210000 -CVE-2025-30873,0,0,e60aa51801ba5ce9ee54473485a7712c2ce75adb8fba4d64853b421a28505503,2025-03-27T16:45:12.210000 +CVE-2025-30873,0,1,fd7f2b236cf3ec30d8e0cc8d539456aa68d01a76dfd6c19239dfbfe96f5aaa14,2025-06-09T19:16:48.280000 CVE-2025-30874,0,0,b641de1654a56252487c524d81b4025d598af27fb61306d50763057c7e851511,2025-03-27T16:45:12.210000 CVE-2025-30876,0,0,9f32c7422fe9d6849a299f742cce415278165f1ff11c93020fddc7f553732a05,2025-04-01T20:26:11.547000 CVE-2025-30877,0,0,e277e8e625f9f1187239f321e2ba0ad73ce58a56ec0c0d3ec6ecfc4c9d9e81ea,2025-03-27T16:45:12.210000 @@ -291201,7 +291202,7 @@ CVE-2025-30893,0,0,b92d2129681d6436e2b4a75da3f8e945ff91b36f23014f05ba7a65609c7bf CVE-2025-30894,0,0,816e4bf55386784a10a15a52aabf102758e63fa46217875d5a52c26e937d0293,2025-03-27T16:45:12.210000 CVE-2025-30895,0,0,b8c73b3bd5b014232fb8a001f508dcee98f3baf30186305bf262b365c29bd903,2025-03-27T16:45:12.210000 CVE-2025-30896,0,0,8728a6521ef1a0c795e9da38f41a255c324d53449cb01c259dde3c916bf208b4,2025-03-27T16:45:12.210000 -CVE-2025-30897,0,0,97f247f53fe2547e6f3556984c8a37affbd894f3213d3d80508b935b731a6668,2025-03-27T16:45:12.210000 +CVE-2025-30897,0,1,a17fa70fd152eac513bca9016d952476b5a5b72feb533d74a657916c7ba00fd4,2025-06-09T19:18:55.140000 CVE-2025-30898,0,0,322d192cedb82806acd3a2f77289969ccd2c366bf8e398c0df801a2354305a4c,2025-03-27T16:45:12.210000 CVE-2025-30899,0,0,73016cbbda013097d3b01f02dcd2534e5ebb1bc3ba59e10ee481e1fcf5abed17,2025-03-27T16:45:12.210000 CVE-2025-30900,0,0,a614192b4026cc4688874a3842501877f3bd90326aa62e5e1a319d29a474d4c5,2025-03-27T16:45:12.210000 @@ -291307,11 +291308,11 @@ CVE-2025-31015,0,0,cc9d5bb58bd9acbdec8dd13e2813c11ba30f9d64e279f9a8cd7570dbb05b8 CVE-2025-31016,0,0,9f9353b55280d52026be79b202ae8bc2b442e0024607fdee2a6c539bec9857cb,2025-04-01T20:26:30.593000 CVE-2025-31017,0,0,4d15e426e44fc80241be23dec538166170b7e58fdf6f1e6ffe3f4a6bbdf70361,2025-04-09T20:02:41.860000 CVE-2025-31018,0,0,9405833e484baccbf4a372ae14b5b3c897f0fd637b0228286c0af34a95c332bd,2025-04-17T20:21:05.203000 -CVE-2025-31019,1,1,cf0eb8d0fc3a4e395ce8cfd725e30645b941cdcc96fa70d4706eaa033a98182d,2025-06-09T16:15:36.450000 +CVE-2025-31019,0,0,cf0eb8d0fc3a4e395ce8cfd725e30645b941cdcc96fa70d4706eaa033a98182d,2025-06-09T16:15:36.450000 CVE-2025-3102,0,0,9c4ff38556bcdb14ac2775e48a2e31e8e52dc53cbe7c5d18a0dcd91a18882777,2025-04-11T15:40:10.277000 CVE-2025-31020,0,0,7e2e00eca59f243d0beec980806f16099342ab07866da05064b3c4742d7e81ef,2025-04-09T20:02:41.860000 CVE-2025-31021,0,0,5e198c1f2cf0cbdc7790475dda4dcc0a1f65322a9e0fb3a2fc32c0ec4cdae5d7,2025-04-11T15:39:52.920000 -CVE-2025-31022,1,1,d1970db2f7c13f42adeec2ffcd292f524f1d857cf307424592d3efe2ba6fee10,2025-06-09T16:15:36.610000 +CVE-2025-31022,0,0,d1970db2f7c13f42adeec2ffcd292f524f1d857cf307424592d3efe2ba6fee10,2025-06-09T16:15:36.610000 CVE-2025-31023,0,0,b2b6dfb4fff9d3759d0e8242dd466693eb363f1c7ae0a1b9a5f68a061dc5a13e,2025-04-09T20:02:41.860000 CVE-2025-31024,0,0,f13bb7564e2d955fe9c74ce3d5d82196ceac98ae0a3fb4b1ae7d33aec0a3a8af,2025-04-01T20:26:11.547000 CVE-2025-31025,0,0,4ff8093e4415f051713e7e0898e27685da4455d6beeec8c38e089df33f289160,2025-06-06T14:06:58.193000 @@ -291327,25 +291328,25 @@ CVE-2025-31034,0,0,00045c692d736174347a15996f2644c271311b493b2650b7c9934fd5c24aa CVE-2025-31035,0,0,5c760e02fcbaee44a22a24ae8d34d9e90e3913b6f5837b6cb83b1fc705e4819e,2025-04-09T20:02:41.860000 CVE-2025-31036,0,0,62cc9af3a9e12c32332fdab0e5c5a83ab6b53958493b4efe680877f6a1c84c8b,2025-04-09T20:02:41.860000 CVE-2025-31038,0,0,7b5afc8e5d375ec9301ab6b724560141888b47309d5f5f2d9937b8782c078587,2025-04-09T20:02:41.860000 -CVE-2025-31039,1,1,791626d18a852c78b3facf95b689f696674c13ee8384c7170a48c8323d4e37b8,2025-06-09T16:15:36.757000 +CVE-2025-31039,0,0,791626d18a852c78b3facf95b689f696674c13ee8384c7170a48c8323d4e37b8,2025-06-09T16:15:36.757000 CVE-2025-3104,0,0,7baf3ae0deb4ba68c845a43b1ae9db1bf794c9bf7b07685fd4c21f525945dae6,2025-04-16T13:25:37.340000 CVE-2025-31040,0,0,0231cc866d51dc61c7f61781fad3ea23cc4ca7aeca5478924158d392d59bb7f9,2025-04-11T15:39:52.920000 CVE-2025-31041,0,0,0041321ae6c993907944cd87119ee6b5b37dfd775d87cba0f12518a7a41dc2cd,2025-04-11T15:39:52.920000 CVE-2025-31042,0,0,dd7508689f88e2fe1dddad52457abe85ec8bdf2cefb5a744ba057ee4d8c1ed58,2025-04-09T20:02:41.860000 CVE-2025-31043,0,0,2b40a96fc4b8eaf20a7a30e77b072b27918475850ebb17c34a51d56b785169bd,2025-04-01T20:26:30.593000 -CVE-2025-31045,1,1,ddfb32b5e5576ad7813a2c5f9f0f460a672084968577ba19e202f08ef82100da,2025-06-09T16:15:36.907000 +CVE-2025-31045,0,0,ddfb32b5e5576ad7813a2c5f9f0f460a672084968577ba19e202f08ef82100da,2025-06-09T16:15:36.907000 CVE-2025-31049,0,0,1d44b4e0ac14c10e18c913339e9d6ed69451ab460bef184a9ce19988693eb982,2025-05-23T15:54:42.643000 CVE-2025-3105,0,0,7655f789901fca3e90cb57cc3d3b5f5846f175abac5b5dbf4ae81b8a278e336a,2025-04-07T14:18:15.560000 -CVE-2025-31050,1,1,120039b2f2c53d6ff239a78740d0142c9758c8caa7b5593403ec2faf44180ad6,2025-06-09T16:15:37.050000 -CVE-2025-31052,1,1,59b6413319a236006f93240c29d1b8857b054734a4d0ceba28239321ed02f569,2025-06-09T16:15:37.197000 +CVE-2025-31050,0,0,120039b2f2c53d6ff239a78740d0142c9758c8caa7b5593403ec2faf44180ad6,2025-06-09T16:15:37.050000 +CVE-2025-31052,0,0,59b6413319a236006f93240c29d1b8857b054734a4d0ceba28239321ed02f569,2025-06-09T16:15:37.197000 CVE-2025-31053,0,0,4e6ebd78c59e20426c13860a9e52cc46f0f750ad9b38a320aa63084c6c301307,2025-05-23T15:54:42.643000 CVE-2025-31056,0,0,ef13eefdf329c5cd86b47bd65af40fc805c4ce2f0007fe95551ce06d7c883297,2025-05-23T15:54:42.643000 -CVE-2025-31057,1,1,b997ce4b3c2fbfd880af6fd47f4221eaf410bc70ab3775fab60e59b17ee0cee2,2025-06-09T16:15:37.367000 -CVE-2025-31058,1,1,3d884240c499bfd1a29bef39d27eb0397f1f91db99038a001a001e3b391bdb5f,2025-06-09T16:15:37.520000 -CVE-2025-31059,1,1,047dfb2560168f49c54208212027368d84e65d039b1fb77769b3e4721a4a9f8c,2025-06-09T16:15:37.670000 +CVE-2025-31057,0,0,b997ce4b3c2fbfd880af6fd47f4221eaf410bc70ab3775fab60e59b17ee0cee2,2025-06-09T16:15:37.367000 +CVE-2025-31058,0,0,3d884240c499bfd1a29bef39d27eb0397f1f91db99038a001a001e3b391bdb5f,2025-06-09T16:15:37.520000 +CVE-2025-31059,0,0,047dfb2560168f49c54208212027368d84e65d039b1fb77769b3e4721a4a9f8c,2025-06-09T16:15:37.670000 CVE-2025-3106,0,0,5ae270a07427b09926da38ac45ef4b636cf5c9da799ce95372026884de2a9ae9,2025-04-21T14:23:45.950000 CVE-2025-31060,0,0,bad7dbf435ff2281b407d2bd826434083dbcaefb6c754a2184b4027a4614c63b,2025-05-23T15:54:42.643000 -CVE-2025-31061,1,1,09cd7b76f32a96114e9a23d546ac376032d982269f8e31603c57fc1c43a77dca,2025-06-09T16:15:37.813000 +CVE-2025-31061,0,0,09cd7b76f32a96114e9a23d546ac376032d982269f8e31603c57fc1c43a77dca,2025-06-09T16:15:37.813000 CVE-2025-31062,0,0,5d7c059650657a6c3c5fa04f2ce0a9521d6a9f9acbed5ef01456bb424c15a563,2025-05-19T13:35:50.497000 CVE-2025-31063,0,0,be9751fa8856dcb655215b1c0c605485498375e33bf37c7975c1f55c8d0ac002,2025-05-19T13:35:50.497000 CVE-2025-31064,0,0,4d930332b9fb6c7b8a1e44ca5119b76fea2f8237189f8ce394559d7db087a22d,2025-05-23T15:54:42.643000 @@ -291591,9 +291592,9 @@ CVE-2025-31392,0,0,af5926a297ee06fad00816bdca5acd86e15a3bb4a408d814556ec95dc5559 CVE-2025-31393,0,0,d9d0a7d5bc95ef6373f570176c8394d94346217559e211e7f82d92c36ed19000,2025-04-09T20:02:41.860000 CVE-2025-31394,0,0,dcb2d58983e82a4803d87aef9833fc22dc7940b5638d0e63e8a54510592ceb81,2025-04-09T20:02:41.860000 CVE-2025-31395,0,0,d63b8f50a08b3f03912992e56dcb94ad0fb69cd8ebe1ea98498b9e95366ac63a,2025-04-09T20:02:41.860000 -CVE-2025-31396,1,1,310ff66980e36470c726ecddc1ff843877f8013e5c1b7c5835e4e3548b7d4f40,2025-06-09T16:15:37.957000 +CVE-2025-31396,0,0,310ff66980e36470c726ecddc1ff843877f8013e5c1b7c5835e4e3548b7d4f40,2025-06-09T16:15:37.957000 CVE-2025-31397,0,0,b3492cc9ba6c583b6deb94e0c10125e3479f5d22b6864a0a412cc922d2a4be65,2025-05-23T15:54:42.643000 -CVE-2025-31398,1,1,f3599dec0212ea2172cb8c52f8208a14400b011913e6088421a9b3599aa95870,2025-06-09T16:15:38.103000 +CVE-2025-31398,0,0,f3599dec0212ea2172cb8c52f8208a14400b011913e6088421a9b3599aa95870,2025-06-09T16:15:38.103000 CVE-2025-31399,0,0,7c8d11ba4d0f5bc6369fc9e14d3cc41eb0008d7506d25878a6aaceb8d676a8e8,2025-04-09T20:02:41.860000 CVE-2025-3140,0,0,5e4447ac4f353309a204c953780c9aab222b7aa274e4ff45d2062480543744c2,2025-04-09T20:15:21.987000 CVE-2025-31400,0,0,396ab2cf0dea963b562cfbc33737fee1c7e3fa84c2f11a35bc4583ab0b70558e,2025-04-09T20:02:41.860000 @@ -291620,9 +291621,9 @@ CVE-2025-3142,0,0,f964d205b35a839e272a1c6594128dd748ac53738cd2547105caa37d22d147 CVE-2025-31420,0,0,695f432344892337ae2ac59a6e952dde4581ca04d99a48205c358fb4efa25174,2025-04-07T14:18:15.560000 CVE-2025-31421,0,0,7e33fda4666889d6391294873e088571cbaa504e495b35bac6915192a2dd8df4,2025-04-07T14:18:15.560000 CVE-2025-31423,0,0,a55e32bc40db484fc9913b8823ac397a77ec9501d03bf76356489dfa77a92eb3,2025-05-23T15:54:42.643000 -CVE-2025-31424,1,1,a5fa02c9fe4258ab51ff629040a50145ce03928cf5f85de31b5e70659d5f6953,2025-06-09T16:15:38.260000 -CVE-2025-31426,1,1,588d258eac992b9e030cd600c6d424f83be68f6a2ffc49345b1324cedeb41d66,2025-06-09T16:15:38.417000 -CVE-2025-31429,1,1,8d62df5f224785f793012e0b9b5d69db8546d25917a9a860979a9a4815c59db4,2025-06-09T16:15:38.570000 +CVE-2025-31424,0,0,a5fa02c9fe4258ab51ff629040a50145ce03928cf5f85de31b5e70659d5f6953,2025-06-09T16:15:38.260000 +CVE-2025-31426,0,0,588d258eac992b9e030cd600c6d424f83be68f6a2ffc49345b1324cedeb41d66,2025-06-09T16:15:38.417000 +CVE-2025-31429,0,0,8d62df5f224785f793012e0b9b5d69db8546d25917a9a860979a9a4815c59db4,2025-06-09T16:15:38.570000 CVE-2025-3143,0,0,0d12bd465535fc01b21d2fafc9f08653aefeba4bc2621612339ffe2e350cc35c,2025-05-14T21:06:29.300000 CVE-2025-31430,0,0,d908a2efe04e8c81ec0f7951d988fd6ab32765bd61024b0c47d35989cc539a05,2025-05-23T15:54:42.643000 CVE-2025-31431,0,0,9b65447f095eb6450cd16ceaae607c3f49ad8abcc8b0a8029061fac7fc7f6b63,2025-04-02T14:58:07.527000 @@ -291700,8 +291701,8 @@ CVE-2025-31497,0,0,1b82a56d9177bb215369f5c660b01f4df1461ec4d11c3d6455af08d6d37b9 CVE-2025-31498,0,0,f84cf018b9a7f2d3baed2463f19bf6204e206ba0c9a21e4ea32e21746b404d29,2025-04-08T18:13:53.347000 CVE-2025-31499,0,0,100e06aff4f77dc4647d3005d0769091b549a8bd3abfda5543fb54d262913d30,2025-04-16T13:25:37.340000 CVE-2025-3150,0,0,a30a7688ae10248ab6f92b08d529b33559f00224524ffa44e9f5b1d925f39cc6,2025-04-07T14:18:34.453000 -CVE-2025-31500,0,0,f1b93fcba08807f7d86bf43444625c83c795c28b8400f7105730c19660bd5b7d,2025-05-29T14:29:50.247000 -CVE-2025-31501,0,0,f3bc44f213b8a69c1325f7a53c45ee0950e9479f5b2350b5e9907865471576ee,2025-05-29T14:29:50.247000 +CVE-2025-31500,0,1,972e08825d113a22f3e92318afc27d838fbb708bb2fb1225247253c1e4b6ce04,2025-06-09T18:58:52.700000 +CVE-2025-31501,0,1,2ad7a9fdfb8ac149e02908af1cea99d1323af2ce0825f4123224c76625d3896a,2025-06-09T18:59:03.730000 CVE-2025-3151,0,0,56b8a0f0ef4b0af3ff44306cbc0c9546f0d3ad7bbc930d44d34ad72e997301a2,2025-05-14T21:06:41.040000 CVE-2025-31515,0,0,65e0cceff3005eb000d81df9c13b2b61bcc11ce5d49244e52c4f8300da4f784d,2025-04-01T03:15:17.700000 CVE-2025-31516,0,0,523a9f1a981866b0e2c8b8f2bf03776b6eb23f7f0c09f8442b9e17379be69af4,2025-04-01T03:15:18.140000 @@ -291833,10 +291834,10 @@ CVE-2025-31630,0,0,88a0a623ea5a0b2042bb8e3f6acee38a0d07b7a906c52f601cee31c2a2928 CVE-2025-31631,0,0,a5b9042c958fc93cd2e505e5035b289a87c2c8751b816e209ee262befee35de4,2025-05-23T15:54:42.643000 CVE-2025-31632,0,0,681b150562daa062b510f4bb34a8c6b65fee5d484d4ac4f0fb81469c44ecf3ec,2025-05-23T15:54:42.643000 CVE-2025-31633,0,0,062186da49525f6fb8d18b557f38feaf8d2bcb267cc6064e1c70ec87bbb1caac,2025-05-23T15:54:42.643000 -CVE-2025-31635,1,1,cb448b883b0313fc9f82fc5df60befeaad5d40343fd0b540abd999bf0c41b832,2025-06-09T16:15:38.720000 +CVE-2025-31635,0,0,cb448b883b0313fc9f82fc5df60befeaad5d40343fd0b540abd999bf0c41b832,2025-06-09T16:15:38.720000 CVE-2025-31636,0,0,17b303fd661590f8fac9bca790c6567e8580a3d8f4f3962c792851a7e42031d8,2025-05-23T15:54:42.643000 CVE-2025-31637,0,0,53e73c8f6cb038aecf663b53032f054870910773ffd0f86a605179ee5e450bd6,2025-05-19T13:35:50.497000 -CVE-2025-31638,1,1,dfc506174845647dc443ef3ada75bd506025d94e3b5ccfe561c85052eb688b79,2025-06-09T16:15:38.877000 +CVE-2025-31638,0,0,dfc506174845647dc443ef3ada75bd506025d94e3b5ccfe561c85052eb688b79,2025-06-09T16:15:38.877000 CVE-2025-31639,0,0,ae7dab4858d9a967f5556c2ba2c5a6799452f59e30a3f545f8c99dced5a8da84,2025-05-19T13:35:50.497000 CVE-2025-3164,0,0,f430347d00566ecabc1456225b754db04a6b786f314d5bbdf398f229ee8b6709,2025-04-23T15:18:08.857000 CVE-2025-31640,0,0,b95c11046ffaaf42b7ced892b21882c8ce81e7ddd1b71a6685d7e097174184a4,2025-05-19T13:35:50.497000 @@ -292098,15 +292099,15 @@ CVE-2025-31913,0,0,b971d5ac724c7efcb0efb803a64c97e1b7d3ad0fd72cb5224199c44ab6a3c CVE-2025-31914,0,0,132af9bd7b39eba0b33c2af2e71f3124b8ed02a6f5e00c4bd33d49cc942b48c8,2025-05-23T15:54:42.643000 CVE-2025-31915,0,0,b01a878c422d271ef24a4733824978564b49331599f05f69f543cfd09dc29e1e,2025-05-19T13:35:50.497000 CVE-2025-31916,0,0,aa294dbd83ddf02d422d1958d2813b84f3b1794a0c8c3ce02d4fad24f40c5b31,2025-05-23T15:54:42.643000 -CVE-2025-31917,1,1,ab590ede30dfe8b4bea1a3249a308359ae8b08c8dcbe71d23eab6061f2aa097e,2025-06-09T16:15:39.030000 +CVE-2025-31917,0,0,ab590ede30dfe8b4bea1a3249a308359ae8b08c8dcbe71d23eab6061f2aa097e,2025-06-09T16:15:39.030000 CVE-2025-31918,0,0,6c5d50e6ddbf7ea515c203028d337691e1a6a78bdb1de4d23092fa5a5b4a3a8c,2025-05-23T15:54:42.643000 CVE-2025-3192,0,0,14f88a64f4f058599196fb894b7652f55d55387666faa45a3d02f24f7d0ecfe8,2025-04-07T14:18:15.560000 -CVE-2025-31920,1,1,c039853e937283072ae4c0ec98e6fd8b541460216f07dd986976280c9bb5c4f2,2025-06-09T16:15:39.187000 +CVE-2025-31920,0,0,c039853e937283072ae4c0ec98e6fd8b541460216f07dd986976280c9bb5c4f2,2025-06-09T16:15:39.187000 CVE-2025-31921,0,0,388d68bd80dd43a130bcfd421c1e4aea94db2871694b753a893d06aa5a1833e5,2025-05-19T13:35:50.497000 CVE-2025-31922,0,0,431f97068914f0c37dd3e85eb06b27af3ede9f242695fbeaf8cd56de445561c8,2025-05-19T13:35:50.497000 CVE-2025-31923,0,0,325aefaf10fcea456b97880db489a87d0bd18982174908d76e61a063496794c4,2025-05-19T13:35:50.497000 CVE-2025-31924,0,0,0499779e4865279e71e1da469e9a08bde6e24cca857db6e420ebe70ba402e5af,2025-05-23T15:54:42.643000 -CVE-2025-31925,1,1,3317f8090d827a8b2d8d128a98e4b5417864f533bfd61159238504f5de4f2547,2025-06-09T16:15:39.337000 +CVE-2025-31925,0,0,3317f8090d827a8b2d8d128a98e4b5417864f533bfd61159238504f5de4f2547,2025-06-09T16:15:39.337000 CVE-2025-31926,0,0,e1b8b7cdfdd1023f0123caded1f28a468c818441ed717c97e63f3fcd3a6e74b7,2025-05-19T13:35:50.497000 CVE-2025-31927,0,0,7b5369e238e77f5eea56e3c12a1f5f5060d7284761f08061669b4de3978af02b,2025-05-23T15:54:42.643000 CVE-2025-31928,0,0,08f979cbba3b265f9dddb8e656b44f77824c3181854c61f17f3d259333afd778,2025-05-19T13:35:50.497000 @@ -292325,7 +292326,7 @@ CVE-2025-32234,0,0,63285c09b482f6067076d73dbf46d01bf2153c542eb27e198254cf788406c CVE-2025-32235,0,0,2d0768d94799a6a9b17f516c588303916167d5d34c3e9b9d7927ea9a7cf4ee20,2025-04-07T14:18:15.560000 CVE-2025-32236,0,0,1d5fb76cdf1259101c3f27b23571ac45f49d6addd3142703509b7337982a94f0,2025-04-11T15:39:52.920000 CVE-2025-32237,0,0,27595b299869c58c61c341339e6f12f6b32c732a76dc0a84dde2b725f0160594,2025-04-07T14:18:15.560000 -CVE-2025-32238,0,0,925c0bb754ec0e7b9ee481980925c2558f104ab3efcc2339f05e0ade6eba921b,2025-04-07T14:18:15.560000 +CVE-2025-32238,0,1,cd47d8d1b4d39090f8b0d8e65c928a5e5232938dcad8043cd314848eacae14c1,2025-06-09T19:21:20.070000 CVE-2025-32239,0,0,5316fbf0e6e0061c2f8ad28a36c4209a17848ed30c74efa6acb5abd4d8fb756e,2025-04-07T14:18:15.560000 CVE-2025-3224,0,0,d4a93ef60b9dcbe15ce10c285da2731e3168ab103e4f0b5655a3bf900d6527f3,2025-05-10T00:57:52.993000 CVE-2025-32240,0,0,754ac76465621d12f83495e62f2b69f04fac354c384c59e6926c275cd04b821e,2025-04-11T15:39:52.920000 @@ -292342,7 +292343,7 @@ CVE-2025-32250,0,0,5b65026d5b7900354f67df291c93dfbcf40a31e291957b7b2b193e0f08a73 CVE-2025-32251,0,0,db9e83682192d1c9ea6c6eb3ac5a5992ef43dadbd98f75e240c797354c7129f6,2025-04-07T14:18:15.560000 CVE-2025-32252,0,0,00dd1f6e7f173ba4ff86679e2c6bc51fcd619cdfd9d0c4d1e5a69ec083c8b123,2025-04-07T14:18:15.560000 CVE-2025-32253,0,0,3311e9bc9294781f2008f8b116861a2f16d4abaf10099b41ed2f2dbbb6633afa,2025-04-07T14:18:15.560000 -CVE-2025-32254,0,1,ab70eb013abf2b5ee36e61cf45f9c32770cd106bbdb873c1a602dacf7c535a2d,2025-06-09T16:53:01.463000 +CVE-2025-32254,0,0,ab70eb013abf2b5ee36e61cf45f9c32770cd106bbdb873c1a602dacf7c535a2d,2025-06-09T16:53:01.463000 CVE-2025-32255,0,0,9d8f3638dee293cb3c08fabd20cdcf55a71cfeac9287460a23b40d3e29f8f979,2025-04-07T14:18:15.560000 CVE-2025-32256,0,0,0c12360eaf50a3f0897df626a3ae786b0223754319d73596c006152e378ec308,2025-04-07T14:18:15.560000 CVE-2025-32257,0,0,f9521ce3ab4477aceb6e76fe6cc87b2f944d0591e7dcafd4d04864969e57878c,2025-04-07T14:18:15.560000 @@ -292377,7 +292378,7 @@ CVE-2025-32287,0,0,a3bf48908d8f79d41a4469b9dc9cab42831951011a2355345d78eed4e69cf CVE-2025-32289,0,0,d1be2c0682a25ba84bc4667331349ab40255733fb905d6cf73fc59858d7d7ac0,2025-05-23T15:54:42.643000 CVE-2025-3229,0,0,33d71b87561c140832cf2ac52f5fcc19b1d515ef8ef701bba55e95501d83823d,2025-05-16T15:50:10.260000 CVE-2025-32290,0,0,36568496f7cfb91391c583bf0016b17241df302ed6da0886bc4813f155c3f5b9,2025-05-19T13:35:50.497000 -CVE-2025-32291,1,1,9acc8e875681a6bf63140ac91b293054280d3809ad2099300e07590ef7bd9d26,2025-06-09T16:15:39.480000 +CVE-2025-32291,0,0,9acc8e875681a6bf63140ac91b293054280d3809ad2099300e07590ef7bd9d26,2025-06-09T16:15:39.480000 CVE-2025-32292,0,0,b51a4feed7943f8176f4e475d0a4f214cfb34f401fd9418b03cbedf1bd1544e2,2025-05-23T15:54:42.643000 CVE-2025-32293,0,0,9a78105b18f8a0c6c5de1f8fe7dabe6d94082dabce45b1c06d974558f649460d,2025-05-23T15:54:42.643000 CVE-2025-32294,0,0,9398a189e417d8f1d02011e09df57d4ffe10a67d2827545633f1e29d8a0f8f0c,2025-05-23T15:54:42.643000 @@ -292387,10 +292388,10 @@ CVE-2025-32299,0,0,49c4147c6d2449192d55c98739bc9eec8c1be87420b29ae76c69f17ee126a CVE-2025-3230,0,0,d3629a3e2161163bd15af1432474f4fcf2513cb10a5452b9803677814dc453de,2025-05-30T16:31:03.107000 CVE-2025-32301,0,0,52135e6aca642aca8fa3971eadef3fc4c2f67fc19715effb0157897b8f5f6d1c,2025-05-19T13:35:50.497000 CVE-2025-32302,0,0,2efcb7e95fdb3fade31cae3ee8ddc064ac4fe27d73d1b8e48b58173c690ec4ef,2025-05-23T15:54:42.643000 -CVE-2025-32305,1,1,e904ce5c5bdb9fa0618b637d74337945d02b7ee2247173dce57290b64e9d994d,2025-06-09T16:15:39.640000 +CVE-2025-32305,0,0,e904ce5c5bdb9fa0618b637d74337945d02b7ee2247173dce57290b64e9d994d,2025-06-09T16:15:39.640000 CVE-2025-32306,0,0,0076f54feb6c98bae8c2148e126a770f8952e35f714caf29e3a0e5e2cbff7390,2025-05-19T13:35:50.497000 CVE-2025-32307,0,0,a0ca4b40d93bc485abc5353416cc449272433546ebe27b7ec60abfb5a278a669,2025-05-19T13:35:50.497000 -CVE-2025-32308,1,1,f7bd56bd3d1019d905c4f8b6ac458c6522a0ff82d2163dfb8a387c65c913ede6,2025-06-09T16:15:39.790000 +CVE-2025-32308,0,0,f7bd56bd3d1019d905c4f8b6ac458c6522a0ff82d2163dfb8a387c65c913ede6,2025-06-09T16:15:39.790000 CVE-2025-32309,0,0,72e524edceb2da5dc017c83bf8ab60e46c6fe45eb184ab0349a1ba415921a900,2025-05-23T15:54:42.643000 CVE-2025-3231,0,0,7fe259e10bdefff2f7d2cc360ec09abf1ea1f8d9711a4276861c2a354dc3b16e,2025-06-05T05:15:23.977000 CVE-2025-32310,0,0,c3b2568a49d7a011e3cbc9748557e58f0519995b3a6735845f843c0d6b6482d9,2025-05-19T13:35:50.497000 @@ -292473,11 +292474,11 @@ CVE-2025-32444,0,0,288296e03a307a0b00958513c50a8127cb3324308366d3af8facb6f4548c8 CVE-2025-32445,0,0,1b5ba881d2838c8e1a17201ae0d99d597a5e3f65b98d8fa06e156c1abb87955d,2025-04-16T13:25:59.640000 CVE-2025-3245,0,0,34513d96925346b7609d27ec32e42dfc8926b8b7247f00b351b24b6c6848fab4,2025-04-23T14:51:07.013000 CVE-2025-32454,0,0,d112044e8ac2aa2106f1b31f5429f300a7ae216ee8a2c99529918a4b88fc6446,2025-05-13T19:35:18.080000 -CVE-2025-32455,0,0,19d10764c3763c0c23dfab68d6a329fc4abcf09501701715c081556de3edc5a8,2025-06-09T12:15:47.880000 -CVE-2025-32456,0,0,1ce8f759ee6f741f008085bf0eeecb8b31344033a3a3e47546b4e2801a380438,2025-06-09T12:15:47.880000 -CVE-2025-32457,0,0,50946da35b02279da6d46eb4e9566733b7319e1a2239ae06478f8f4f35d1afa5,2025-06-09T12:15:47.880000 -CVE-2025-32458,0,0,9b1028dbddfb61c93e2e521058386e446cf04e51e86088ccf2111b7448811625,2025-06-09T12:15:47.880000 -CVE-2025-32459,0,0,09d01f36abfeeae97a9ba56f1636ee28dd22d44a44a33d36d52fce81a0497e9a,2025-06-09T12:15:47.880000 +CVE-2025-32455,0,1,398807ad48b0b9265702eecdf4b7c5761bdd481fd1271c3ed3d88cf251c3e4be,2025-06-09T19:15:24.180000 +CVE-2025-32456,0,1,dd16b0d6d8c5a61eeb1bbe06986290ad3a0e9314b9b9bb46891f735ce8cc6b43,2025-06-09T19:15:24.287000 +CVE-2025-32457,0,1,6745c5ca44c60c9b81e4cb733e06a79088ae5467c658031286f55bd97131d35a,2025-06-09T19:15:24.393000 +CVE-2025-32458,0,1,5f07c0943163342676d5c7b23e759d4db98c345fe6da70bed14ac9406f882561,2025-06-09T19:15:24.497000 +CVE-2025-32459,0,1,dae6c2ac44f0e8d47f2cd1bfa34e1b0071873a215a44a6369412520c6ea64601,2025-06-09T19:15:24.597000 CVE-2025-3246,0,0,d943818b43557c9519758b844725afa009508b574d2bbdf1c927d75056c761a3,2025-04-21T14:23:45.950000 CVE-2025-32460,0,0,16cc364f1c655bf6f21d50384a646311718edc25ee850ac035bf3b1975d34030,2025-04-09T20:02:41.860000 CVE-2025-32461,0,0,8bce56f6863b74eaac27069424b18b802ee4aeb8905aa3153fdbbd924c0604dc,2025-04-09T20:02:41.860000 @@ -292615,7 +292616,7 @@ CVE-2025-32591,0,0,1887d5992cae09a24596028d383d3f28ff6066f40b63e68f60c03fd2c0bcc CVE-2025-32592,0,0,7b2d56645237b6ad8564224f60ac262c31a03f8b6cefe65cc5cfd3097e63633b,2025-04-17T20:21:05.203000 CVE-2025-32593,0,0,139df50974f5ea4b80d658ad525adb72e81a799a3c99ffbea222c544ff434c02,2025-04-17T20:21:05.203000 CVE-2025-32594,0,0,258e3442e81c3a8f77299e8b708824756c6b5b5c2682135cc9905d526b78bdcb,2025-04-17T20:21:05.203000 -CVE-2025-32595,1,1,04054dd0a3fbf5cf8d533cd18ed208d8bce1f923900c287e474c745e31621307,2025-06-09T16:15:39.937000 +CVE-2025-32595,0,0,04054dd0a3fbf5cf8d533cd18ed208d8bce1f923900c287e474c745e31621307,2025-06-09T16:15:39.937000 CVE-2025-32596,0,0,f1872f78910abd93ca6bc44a668b64d9a217aba1c01ee357a12dfaef6efc96b1,2025-04-17T20:21:05.203000 CVE-2025-32597,0,0,55ab5ca6ed3d8b6cf0931426c8147ebabb322fbbc0aae4fae4f5b3289fb12ce9,2025-04-09T20:02:41.860000 CVE-2025-32598,0,0,9aa1e262fedefa32d68a358cc7965fb92135026e124c97ce6f09a09dd1cca3ed,2025-06-04T14:25:34.160000 @@ -292884,9 +292885,9 @@ CVE-2025-32920,0,0,eb38b25eee4967dc973c5acc3a33a641baba844f1ae8fbd47b1144d8344fc CVE-2025-32921,0,0,7c798e84a120c09e79aa61f0d66dd4a5e84ea134e24a6f6fea02a374ca1d5b0e,2025-04-29T13:52:47.470000 CVE-2025-32922,0,0,dd2fa7743096c0ae961ecc41cbe765ffa285523c06483f9df72c6611b9ab1dab,2025-05-16T14:43:26.160000 CVE-2025-32923,0,0,a52facaf2e37400983e8c03a1ceeca22c3067be9be025a531236fb3ed36caeda,2025-04-16T13:25:37.340000 -CVE-2025-32924,0,1,a13ed6f537f9137eb04b28c33bb5e008f29e4dfa4338d520c5e9a97f3c0ebcd3,2025-06-09T17:06:44.660000 -CVE-2025-32925,0,1,40dd5da11d49dc553589e8e5ea972e57f5fc32a3d79153131fbca2ce24316223,2025-06-09T17:08:45.590000 -CVE-2025-32926,0,1,ce713ad8af7e2f6b1d13c17cbec206448dc79069109e3eda0950a337282ed306,2025-06-09T17:09:57.147000 +CVE-2025-32924,0,0,a13ed6f537f9137eb04b28c33bb5e008f29e4dfa4338d520c5e9a97f3c0ebcd3,2025-06-09T17:06:44.660000 +CVE-2025-32925,0,0,40dd5da11d49dc553589e8e5ea972e57f5fc32a3d79153131fbca2ce24316223,2025-06-09T17:08:45.590000 +CVE-2025-32926,0,0,ce713ad8af7e2f6b1d13c17cbec206448dc79069109e3eda0950a337282ed306,2025-06-09T17:09:57.147000 CVE-2025-32927,0,0,081058d601367d6b3469587218740a7a59a21c1457f1c6cf19512546cf4c3350,2025-05-29T21:06:38.310000 CVE-2025-32928,0,0,16bd7af5c9eb3994724ba329ed467f2b05845d8c29328a17d91b689468513c97,2025-05-29T21:10:05.957000 CVE-2025-32929,0,0,402abde16b27e558c00554341d34b518aca3f00ccba38731c514259d3e43161f,2025-04-15T18:39:27.967000 @@ -292951,8 +292952,8 @@ CVE-2025-32996,0,0,66cdefdd4ac5ef2c3d78ef7b0a3a801233b441eea948b7804c8316fb0d163 CVE-2025-32997,0,0,585b29f934052489f32ea07f36835b226451d0492c02f05a8ece6f7bdf5daba5,2025-04-15T18:39:27.967000 CVE-2025-32999,0,0,021f92785fb481c58ddc71d38612ee5432057a074c3e9802f4824b4ea1fbbc84,2025-05-19T13:35:20.460000 CVE-2025-3300,0,0,71838a45e38cfd4f9033706465f5d20314584bcf58aabb1bb7ca5cab40d52129,2025-04-29T13:52:47.470000 -CVE-2025-33004,0,0,65e558a78cdc6bf42a3f584de6111ff8fdd672612ebb3b04018d38c50b818099,2025-06-02T17:32:17.397000 -CVE-2025-33005,0,0,e835ced6fa127725a4adca848762f1c6305df3d4abddf02f892d2f178848c042,2025-06-02T17:32:17.397000 +CVE-2025-33004,0,1,0dbcf8f4552332912f870f20d881c87d766919198baf5864e35f56c668cfa064,2025-06-09T18:08:21.600000 +CVE-2025-33005,0,1,cc36f120cbed36c030ac1a468cb0a7afdae6956296ad02b259f7e3a82ab309a5,2025-06-09T18:07:39.407000 CVE-2025-3301,0,0,b2cbbbf942710dc17dd30bf45e19011afe7becbc724cdeebd3bb45dd2691a5aa,2025-05-02T13:53:49.480000 CVE-2025-33024,0,0,a929691d5533595a80202115459e86f84fc81996ba9c41d2a68880f3e6fcf59f,2025-05-13T19:35:18.080000 CVE-2025-33025,0,0,4b295e88dd02f429bce7f4aed7e0b1b7ea585aae960bbc6de9d4364036c40d6c,2025-05-13T19:35:18.080000 @@ -292969,7 +292970,7 @@ CVE-2025-3306,0,0,116c94def1d4a2e814002f4948b93b65daa72c17537f71098e725bdf140a90 CVE-2025-3307,0,0,764533eb55c36b857743124d26869569dc2e30546eb2b26c9f7f85b2c9a577e7,2025-04-08T14:59:43.193000 CVE-2025-33072,0,0,da8dbb3f32bc92a4fea66cbf1913465f4b8680e98b695ceda185e1985ccda963,2025-05-21T14:52:32.977000 CVE-2025-33074,0,0,18fcd41dcb3c6273c73253eac7fa48f9c3a067330384af16f609b96399dd2bb1,2025-05-12T19:42:26.413000 -CVE-2025-33079,0,0,e03c1351d64ea3aa788b2740137daaac872cba9fc7e00cdfa47dcec834e8fc70,2025-05-28T15:01:30.720000 +CVE-2025-33079,0,1,1e4651240e39e7fec62de5fbc9b5c0572a8e849a3e4ceef1cd2352f3faf983e0,2025-06-09T18:49:31.260000 CVE-2025-3308,0,0,4b8d71911211f133728a91e073b25c990ecfbff65585df599965a7e80c999bcc,2025-04-08T17:38:09.607000 CVE-2025-3309,0,0,7325978445055221f9794565a82ef91ec3f38daa8638a7cf620dd6aa80f6a64b,2025-05-28T17:31:33.590000 CVE-2025-33093,0,0,ec1d02a559a830298071de2ada0cf3077c9399b6473555574f182d332f6616fd,2025-05-07T14:13:20.483000 @@ -293020,7 +293021,7 @@ CVE-2025-3350,0,0,ab8122662f4d35d345f437a9cb53fa8784081eec5b58ffdb41ee081fe8abc5 CVE-2025-3351,0,0,f78731ed9bc79ecf34406e602c631bd37d7ffbceafdfd8d1641d577a5e53ee79,2025-05-07T16:46:20.723000 CVE-2025-3352,0,0,92e71c762ef2a27a8a86dd7d6c085dc5966c19c03a67249c1282a518c8e95d63,2025-05-07T16:14:33.733000 CVE-2025-3353,0,0,2e2d0ee2cbbf29b1630195a5cd8ddbb4a183360dadd06f1e66416306ad21708f,2025-04-11T12:55:09.550000 -CVE-2025-3357,0,0,ed24a7fd0f08273c89f3582228e36fdac4a36ba734af254eb57a0a8ccb4373b0,2025-05-29T14:29:50.247000 +CVE-2025-3357,0,1,7dccfa2d70ba598ce0a1e389fbdf06a048dbebcb0ed481edac18b6414538420c,2025-06-09T18:56:33.710000 CVE-2025-3358,0,0,350939b89539bfd7e19350173d727fecac27b026cbc4d081349ebce4bbcdf83d,2025-04-29T23:16:04.703000 CVE-2025-3359,0,0,457c717d6225e93930247459d4c6b38449728b0baecdfd548152990c0256a0a8,2025-04-07T14:17:50.220000 CVE-2025-3360,0,0,ba2e275701dcb3901d34802acb858c60ad53b7a788bf246a267d6619963301a5,2025-04-14T12:15:16.087000 @@ -293115,9 +293116,9 @@ CVE-2025-3454,0,0,4237309546c7f67c43ed4306317e4be2d74b3a324e1d901b3aa918c9e80660 CVE-2025-3455,0,0,27fc2bff0afea6de93406ff695251ef67a3d625051a2b866cd1a3908c7fd4f8e,2025-05-12T17:32:32.760000 CVE-2025-3457,0,0,1ce8b706c7f27acea549531081740896317ac6a97554394545c243bd2df931ba,2025-04-30T14:07:52.490000 CVE-2025-3458,0,0,f4c08c655e5360e2158789a545b6b552e0aff82df287be3ab4de5c3123f29f32,2025-04-30T14:05:12.373000 -CVE-2025-3459,0,0,0b1c13e7e844621d8ac638818847c9b5e1778f8eadc809696b8a14f806153e56,2025-06-09T12:15:47.880000 -CVE-2025-3460,0,0,9c2283d02cbbdaa2926409047208b0f4b13fd4f3b9f2a31878872ef8374e48d0,2025-06-09T12:15:47.880000 -CVE-2025-3461,0,0,f413d51fd7b56fed9ef653351c458678bf01a895009852690e8e73e6e4f729e9,2025-06-09T12:15:47.880000 +CVE-2025-3459,0,1,0946674679738c8bd8ba6a381240e95c0ad41baa36a63371dfa510aca6cceecf,2025-06-09T19:15:24.707000 +CVE-2025-3460,0,1,a6918e85be5e4f2f6bd8b4089f3f654f6c5d78ba27d378dcd7c473c63506e94b,2025-06-09T19:15:24.810000 +CVE-2025-3461,0,1,b711842f3138044403b9c62c870e92a946a81dbd27b6e170abe8935ae6232ced,2025-06-09T19:15:24.923000 CVE-2025-3462,0,0,96a08229937a9712440a065f7abf8858b2712ba35f45d182986e12e301979bf4,2025-05-12T17:32:52.810000 CVE-2025-3463,0,0,b9c293fc915bcaaa130da553f49fb5680a86dfb762948cd4b867acf35ebae4a2,2025-05-12T17:32:52.810000 CVE-2025-3468,0,0,136950783d88ce0e5a3cbb5efc9cbb24284feffc83746ee503e38c1107465276,2025-06-04T22:54:54.960000 @@ -293296,7 +293297,7 @@ CVE-2025-36557,0,0,10d4b26bd4092d9203a2e113b056bea851721ed63eca24b2006dce264ace1 CVE-2025-36558,0,0,f7ba1efb73da33ba35418104474d3de926b1549af2f93d6130fc139c04b0fc60,2025-05-02T13:52:51.693000 CVE-2025-36560,0,0,69f4a5989b5124f7f2b1a6e9227991ebf4cb4743ed3c1503408fd719a2cf79d8,2025-05-19T13:35:20.460000 CVE-2025-36564,0,0,f446e566baff1cdb9604912d945d5cdc052f4905557c8c5952132ba86a364f20,2025-06-04T14:54:33.783000 -CVE-2025-36572,0,0,ffb00d81ec666342944e749ef07f48bce94089e948388a389f040a9b964f243e,2025-05-29T14:29:50.247000 +CVE-2025-36572,0,1,c97f006dfc4bcc3f67f9ecbcb1cefb56f7696607fd2d0cdd339f46804df42e2c,2025-06-09T18:58:23.397000 CVE-2025-3659,0,0,039e45884228ee6931146a26d674c81218c137b52a98fba4b25ba26a78f9ee4c,2025-05-13T19:35:25.503000 CVE-2025-3661,0,0,dd52ef0b5adcc429dab993fa8b0a07866db488604856f931ffdf953b111b0450,2025-04-21T14:23:45.950000 CVE-2025-3662,0,0,3e1dd0745f4aafb27713ee2b3d9daccf1be19770e4b95d3787e2f2ca8d2c3c07,2025-06-05T14:09:58.017000 @@ -293934,9 +293935,9 @@ CVE-2025-39469,0,0,e18849e95e863d0389b13542e78fc7e5370e06514982d8ca59d2eba138210 CVE-2025-39470,0,0,e010fc0801cd6bb4936cb1b65898bdce69bac41af3bf33793e9451cff50a9a80,2025-04-21T14:23:45.950000 CVE-2025-39471,0,0,21ed7a6e1899b30a1a56f084c0c39ef4da03cd3bced83cdf5407e02bb87fb289,2025-04-21T14:23:45.950000 CVE-2025-39472,0,0,bb2f2cb88d690511a4cd39d1b1efb90424abbd9f68741fae65c0ada4798552a8,2025-06-09T13:15:22.357000 -CVE-2025-39473,1,1,f97c69ea6557f364e4bbbbb2496aec23170a32e14bd62ef4cb8c5f884d6ccbcf,2025-06-09T16:15:40.080000 -CVE-2025-39475,1,1,669386ec43a4f0ad7f056847700405e5c7a12d093808a31febc35ef25cab0f73,2025-06-09T16:15:40.230000 -CVE-2025-39476,1,1,f493b39c4bd68d8a17d63113f177a754947a32cb324737b9ec8573b97c4726a6,2025-06-09T16:15:40.380000 +CVE-2025-39473,0,0,f97c69ea6557f364e4bbbbb2496aec23170a32e14bd62ef4cb8c5f884d6ccbcf,2025-06-09T16:15:40.080000 +CVE-2025-39475,0,0,669386ec43a4f0ad7f056847700405e5c7a12d093808a31febc35ef25cab0f73,2025-06-09T16:15:40.230000 +CVE-2025-39476,0,0,f493b39c4bd68d8a17d63113f177a754947a32cb324737b9ec8573b97c4726a6,2025-06-09T16:15:40.380000 CVE-2025-39480,0,0,339ca3a785b41e56bc901bd68b8ae900170b561cf9584e47581955799fe339b6,2025-05-23T15:54:42.643000 CVE-2025-39481,0,0,ffc38075b9c9e137d0a9f220b07f654268d9b6b192ff077aaa96738d747f33c5,2025-05-21T14:23:08.503000 CVE-2025-39482,0,0,f44ca390a511cc4fa9864ad222a12fd65c81c88e214777e055d5294de44cc742,2025-06-06T21:54:00.823000 @@ -293978,7 +293979,7 @@ CVE-2025-39524,0,0,5c046040c73da2a944bc05a6eeb2142d77b95d7fa6505ab8fb0d42caac59c CVE-2025-39525,0,0,c3c2e53a3d7ae79d7de0c1f1899537813f5d9258c67af1aaf2f78e49c59c8eba,2025-04-16T13:25:37.340000 CVE-2025-39526,0,0,e48eefb58efeec413382bf0a150c6063a3820bdf98f98c55351275c777655366,2025-04-17T20:21:05.203000 CVE-2025-39527,0,0,3284145183922bc0e58f1a51fb33927acbe4c2798946bac3fed9855491e320fa,2025-04-17T20:21:05.203000 -CVE-2025-39528,0,1,d2d1a8c274107ffd36608b0e96bedf50f12294af185cda39d3d51eedcd2bc5d8,2025-06-09T16:54:30.017000 +CVE-2025-39528,0,0,d2d1a8c274107ffd36608b0e96bedf50f12294af185cda39d3d51eedcd2bc5d8,2025-06-09T16:54:30.017000 CVE-2025-39529,0,0,bcf34c2d62331729e70811811e71dcf889d640ae1b171cefed763836fbc33e68,2025-04-16T13:25:37.340000 CVE-2025-3953,0,0,140fac6d4312486902ed212fd099df3fbcf6cbc340620288e58e0d66931d1c2a,2025-05-02T13:53:40.163000 CVE-2025-39530,0,0,04cd4efd0982bc2e3b3a3fdf151be77700254449378583fee75d72392e767a80,2025-04-16T13:25:37.340000 @@ -293989,7 +293990,7 @@ CVE-2025-39535,0,0,51a8ea640c30c3212f3acbc8c60211505a3d6be753d78e2a8fe398418000d CVE-2025-39536,0,0,897d26092656cd742f3a194933c2860c983e3b42f7470a49c75af9583369df26,2025-05-23T15:54:42.643000 CVE-2025-39537,0,0,5d6eeb980a2eda8763f1a71d31d0d13bfcca2743f2b8f876fc8a17eaa9314dd0,2025-05-19T13:35:50.497000 CVE-2025-39538,0,0,0321e90c8ae30051c1566250939763852d597c73645ce940aa3b0b48f0398335,2025-04-16T13:25:37.340000 -CVE-2025-39539,1,1,a1ba570ded97579408949f62229f6f370d17fcadbd4e95fa3a683cb15b870eab,2025-06-09T16:15:40.540000 +CVE-2025-39539,0,0,a1ba570ded97579408949f62229f6f370d17fcadbd4e95fa3a683cb15b870eab,2025-06-09T16:15:40.540000 CVE-2025-3954,0,0,55db41cc15b45635881edaca4a6e62ad613de7da2b3eeb9086a232c1c8f944a2,2025-05-29T15:48:06.403000 CVE-2025-39540,0,0,9f2b7c96a776d5337b7ede4771066d56c291c66d5234e974d6115bb216968598,2025-04-16T13:25:37.340000 CVE-2025-39542,0,0,29037c72c794514818baade4169583642447a541359265130df56621fba6f773,2025-04-17T20:21:05.203000 @@ -294657,8 +294658,8 @@ CVE-2025-4392,0,0,ad8765de95d96f5f3ecd2241de3d94570cd4dddcf644fe825479abad5b84f4 CVE-2025-43920,0,0,a93ea085d5c9b285842c20a6cabb6e3bd669bd42c39c42462b7c06195a41f1d6,2025-04-28T14:15:22.323000 CVE-2025-43921,0,0,4042bcd81d7e3864da5b8ba4d01fe494ca12b33f201fc6021c6725eb890091e8,2025-04-28T14:15:22.477000 CVE-2025-43922,0,0,78ba59a603bfb99812991a8e1a7955ce6faa943c6ec5cbadbdfa1e2ab9c91614,2025-04-23T14:08:13.383000 -CVE-2025-43923,0,0,566f147696157eaa8c17904e24f0edd7666ecc568948d68a18caff49f62e97fd,2025-06-04T21:15:39.053000 -CVE-2025-43924,0,0,8dd46f150f4ca082eff2d2aa1425c79ca1c4ab1917d889f0fe467b04b2433f5c,2025-06-04T21:15:39.213000 +CVE-2025-43923,0,1,652ba9e4c3a0e3b3d9c4685bf312dcb2bcae3019e18205b0f3ac543942bfa985,2025-06-09T18:05:07.393000 +CVE-2025-43924,0,1,792e29f57033aec22c9971e0d2d55b32cc588700451cf90594dcda9b5d94007a,2025-06-09T18:04:54.137000 CVE-2025-43925,0,0,cb6260eff16c989f0f3892d6f36d7e2887b1529655ecf02afa4a17366917c277,2025-06-04T14:54:33.783000 CVE-2025-43926,0,0,2f3d1ec98578fa56e3654b3927ae44c5545787a634e6f39282c1fc647bb3404c,2025-05-12T19:15:49.287000 CVE-2025-43928,0,0,ada37df9b018408af843f1b1cc9151f6f5a494aafca776d997eba7b7d4788264,2025-04-24T16:00:50.257000 @@ -294704,7 +294705,7 @@ CVE-2025-44115,0,0,d990fe7228f0dbe35841148aa572f913a3a82f4880f65057c40ef3edd4ebd CVE-2025-4412,0,0,8c8c59397117a84a167d36fb79f68c5cd99b79261327a1fb082cf24faee6cc19,2025-05-28T15:01:30.720000 CVE-2025-44134,0,0,45b85d904dd860695476948041d246707a0696d9dc7fe9b405a5e27a85d44980,2025-05-14T13:05:17.200000 CVE-2025-44135,0,0,e8d32c865e9ccdb8b63503c21fad4c48843876d5709a3df063410109f034ccc9,2025-05-14T13:04:58.830000 -CVE-2025-44148,0,0,306118ea38f3901cf74aeb0347a966df9a49b32cede3062c08c6588f9c021fa6,2025-06-04T14:54:33.783000 +CVE-2025-44148,0,1,440749a71814d76edeed70dd30fc58f3e0b75eaee931968ee8c88b7d1e24e11d,2025-06-09T18:04:33.580000 CVE-2025-4415,0,0,842147d08c13efcbee3eee94c9e6b73fdc7bd886265d0112fafca4c76640377e,2025-05-21T20:24:58.133000 CVE-2025-4416,0,0,947e34b55b1f3a049a504a042d77855f4bb594e5af127c8b711744c73ee871aa,2025-05-21T20:24:58.133000 CVE-2025-44172,0,0,c78f9d9932a5093f6fd2dd92edb0ece1c73f28734d84b3772f8246b249ade2e9,2025-06-03T15:55:33.757000 @@ -294847,8 +294848,8 @@ CVE-2025-4498,0,0,fe4e54354871751f165270510115e7eb077cabbe51e36c7351729c7c48e0bb CVE-2025-4499,0,0,1c02b1692a3925b37458edec07dd6f80534dbff3f2fbf04106606bb95639a5b2,2025-05-28T19:24:12.107000 CVE-2025-44998,0,0,f1cb20085e6ad15afab179cb443903adcddb0c447c4e2857ef8052b5a5ee7d7a,2025-05-28T14:58:52.920000 CVE-2025-4500,0,0,b252739c7e43e1ed91691824353b7e97e2316b3cdd7ea7ee228d50eda984af82,2025-05-16T14:16:47.373000 -CVE-2025-45001,1,1,404ae78c8e001cc7d6c0045907445d409a09f0676bad5ee6252f8bfbadb7a73d,2025-06-09T17:15:29.157000 -CVE-2025-45002,1,1,882b2ca6b1d39017ff63735b730c5dc5e95d6fe6c516f5d4202333fd19d59103,2025-06-09T17:15:29.450000 +CVE-2025-45001,0,0,404ae78c8e001cc7d6c0045907445d409a09f0676bad5ee6252f8bfbadb7a73d,2025-06-09T17:15:29.157000 +CVE-2025-45002,0,0,882b2ca6b1d39017ff63735b730c5dc5e95d6fe6c516f5d4202333fd19d59103,2025-06-09T17:15:29.450000 CVE-2025-45007,0,0,5a942b67af458dcbffcc204143a4774311c59d5ad4885c5c55fb7d9c1ebbeebe,2025-05-09T13:45:28.627000 CVE-2025-45009,0,0,36c5cbb0f37a55a2bcef11b942052fc47923af5c699055a488196b4ed54c3a22,2025-05-09T13:45:16.187000 CVE-2025-4501,0,0,2714d56986429b577c90c5115348855d531ee85270c1ad90311b312266b13026,2025-05-28T19:25:52.347000 @@ -294865,7 +294866,7 @@ CVE-2025-4503,0,0,85f8ea7af4d81365d4c769cefc49de185f192dc2edd583f57e3e7fc284a882 CVE-2025-4504,0,0,f39a2a3f679765bc9c2c6ee848dc7fb913ca841c89fbba4626c8dd3bc0803ed4,2025-05-16T13:46:04.210000 CVE-2025-45042,0,0,e22830cb7bf04c3c2d82e6baefcc0ab2bba0906b03ab3d09def3ca7404c47455,2025-05-07T16:39:20.990000 CVE-2025-4505,0,0,1d5d8bdff5bba4724931179b40e9fa7b3a85ddcafb19b02c09ec15b5af8bbb67,2025-05-16T13:36:25.113000 -CVE-2025-45055,1,1,2ce1a9ea9245fe907bd42ddeeaf5e9aa709bace253fa67a4276823a6771b5ef4,2025-06-09T16:15:40.693000 +CVE-2025-45055,0,0,2ce1a9ea9245fe907bd42ddeeaf5e9aa709bace253fa67a4276823a6771b5ef4,2025-06-09T16:15:40.693000 CVE-2025-4506,0,0,3568a707dd9c5fac6d63b0c6b8838d459b084b79c1362aa32745d2610deb51f5,2025-05-13T18:57:05.830000 CVE-2025-4507,0,0,33f4384ad7f5c6ae0814fbe9ad7d28d34a5df203f685c4d49210c635ef2aae7e,2025-05-13T18:56:22.283000 CVE-2025-4508,0,0,db75cb6eae1dbf24ca832411056b3b5c74810bdb70cc1a4953a84729f52cd4d0,2025-05-16T17:26:39.940000 @@ -295020,12 +295021,12 @@ CVE-2025-45953,0,0,4ae22ace1fa79622bebb714ee3a1b2bc44139600b15fc188f0269a639daf2 CVE-2025-45956,0,0,5c4c4370cebea5362e52ff80785ad75271a9ace1cfcc698a1fc7b6e2a3193f1f,2025-05-14T21:01:22.690000 CVE-2025-4597,0,0,dcada8bd747b5d8fe51a3029b8ca767324f59d50104363211751e3771511674b,2025-05-30T16:31:03.107000 CVE-2025-4598,0,0,0afb48f5d4beb8ba717edab0a2c1dbaaa02bcad15f4563ef46c0692744ec8051,2025-06-05T07:15:23.047000 -CVE-2025-45997,0,0,1bf67bd9bd35437547dd366f47ff27718e895950edc0e6c1f69586dcedf42b57,2025-05-28T15:15:24.900000 +CVE-2025-45997,0,1,6427fb401720f5a1ec9f9ddb9a7287b863d0733096e213df5c6d6f0eb039c3d2,2025-06-09T18:53:36.927000 CVE-2025-4600,0,0,026383a000ee9b132f9dd97af63a0401be9be3b21241dcdc822424d27f013326,2025-05-16T14:42:18.700000 CVE-2025-46011,0,0,f1711dd7ab66f4f734746526ee0ca6c2ae09b8382d5cbdd02ec8fdea852911f2,2025-06-05T20:12:23.777000 CVE-2025-4602,0,0,409776dd4d3f5aa956641458acdab541ced8aee4cc4b0cac3a447338c59994d1,2025-05-28T14:58:52.920000 CVE-2025-4603,0,0,353abd9188b7471dff5b9b62f88597abbd29f78728037be18e8dafefcd5f4d4e,2025-05-28T14:58:52.920000 -CVE-2025-46041,1,1,6bc64772b388d032dbc028609794c000cf7c08be417684867b8b870eeaff1c75,2025-06-09T17:15:29.690000 +CVE-2025-46041,0,0,6bc64772b388d032dbc028609794c000cf7c08be417684867b8b870eeaff1c75,2025-06-09T17:15:29.690000 CVE-2025-46052,0,0,ab7d3250787ede688cd6b355d8aec0cc3dda171eb18d9b03fdd032c02ce8c40d,2025-05-16T14:43:26.160000 CVE-2025-46053,0,0,a812a9fd2122f294cfbb7de5fd43b870987b1f7127ab686b037255809ebad4e4,2025-05-19T19:15:51.580000 CVE-2025-4607,0,0,7929f7497a2f3fdbdefa5c40c24e8dfb722bcbca57929b42733b89c15e0bc1dd,2025-06-02T17:32:17.397000 @@ -295033,10 +295034,10 @@ CVE-2025-46078,0,0,2fc8a269b5a28c0015e225ca3c3d8f64c503abc0c5a8ea5ce240137e0c4c6 CVE-2025-46080,0,0,e77557f865cb8f0c8a7b01f1f6fbdee1ca66bad8ebda2925b71b207a25112a43,2025-06-04T19:59:02.890000 CVE-2025-4610,0,0,d61d953fe0fd6f0d2b21233839836df5133468380db75b47c2a05d78020b6b82,2025-05-19T13:35:20.460000 CVE-2025-4611,0,0,551957ca30c77144066c2501102cbe8b5cc59e5d0e8959ef20d14b731299a950,2025-05-21T20:24:58.133000 -CVE-2025-46154,0,0,2149989f0e30a90b9e4bab390ea1601d30319c89b3c6960725a973f2b454fc27,2025-06-04T14:54:33.783000 +CVE-2025-46154,0,1,28136877062a9fbae66fc92d86286e5d62e1cd8a9e62fd05c5a06eb514bf383d,2025-06-09T18:06:28.423000 CVE-2025-46173,0,0,f1e36ec33a02fee01307659dfca8b67a706a6ca070153a7459464089a027cd3e,2025-05-28T15:01:30.720000 CVE-2025-46176,0,0,4ad29bbeee58de7eb7d271c0fb79c01a588d38da2dcbe15f5042a3054d2345a5,2025-06-03T15:47:26.543000 -CVE-2025-46178,1,1,03490af67e720d043aaded16e8fab183fbdcb1738f48f0dfd5e5618fade2183c,2025-06-09T16:15:40.800000 +CVE-2025-46178,0,0,03490af67e720d043aaded16e8fab183fbdcb1738f48f0dfd5e5618fade2183c,2025-06-09T16:15:40.800000 CVE-2025-46188,0,0,1f058d9f060b53aea2c6bd942ff17e7f4fc325ea6eb31f01c661d2a700e76c55,2025-05-22T19:03:17.713000 CVE-2025-46189,0,0,deb091a7b16f83dfae0adf87dba814de45a16152802aa3583ba953e5461c909b,2025-05-22T19:01:31.820000 CVE-2025-46190,0,0,49ae57538389712e46bb1f8218d4d6fdb9fc8500296b0c348e5059e767ffc2b0,2025-05-22T18:51:35.560000 @@ -295570,7 +295571,7 @@ CVE-2025-4746,0,0,bf02eed6b3260262be226df3330f98321e746d334dfe3c3676cc04f27c4ca6 CVE-2025-47460,0,0,b7519dac17710856824fe060b1c9bdeb3f7906d05f1b9bddac0fbc9972454a5b,2025-05-08T14:39:18.800000 CVE-2025-47461,0,0,8ddb18c03b7f2c4dda33b119c3abc1c1564a904f027eb292e4a5bfb29a1f4914,2025-05-23T15:54:42.643000 CVE-2025-47462,0,0,f885e8e128ef3f4b0f8a086643e3c654a8015bc64dba9334b08e5a6ad86732f1,2025-05-08T14:39:18.800000 -CVE-2025-47463,1,1,9db262f777cb399ab0e1646584daa921ba69d4d43bd942545ab9e80412b01c5e,2025-06-09T16:15:40.900000 +CVE-2025-47463,0,0,9db262f777cb399ab0e1646584daa921ba69d4d43bd942545ab9e80412b01c5e,2025-06-09T16:15:40.900000 CVE-2025-47464,0,0,bc99e18b2dcfa300b36d5735d07ad600476146381be931c156803ac5a2f3900b,2025-05-08T14:39:18.800000 CVE-2025-47465,0,0,40216eee132c747fda5eb13ebb9ebfb469ddf4a1b2574c77a2faaa8d2df4139c,2025-05-08T14:39:18.800000 CVE-2025-47466,0,0,b3f1b5edc3a406593a055702de91238340c1578a3d2ed6e60af24c2ff916e1d4,2025-05-08T14:39:18.800000 @@ -295584,7 +295585,7 @@ CVE-2025-47472,0,0,01c9cb68583b39f50b058741a8e506238b34dce5d3e78d3577344f133a793 CVE-2025-47473,0,0,594c00da29fd44f9ee91e99aec4f7cce5a3dcdee9e640532a74f6e63aff20ae2,2025-05-08T14:39:18.800000 CVE-2025-47475,0,0,419116b80f7fe9386a9aac3c0836858ef647ac252eac4b1ff08d67e0a3375006,2025-05-08T14:39:18.800000 CVE-2025-47476,0,0,f06946c9db65910277eefdd02a4e277fdae7c5884111c0fe22a4a0e5abb63365,2025-05-08T14:39:18.800000 -CVE-2025-47477,1,1,21c6c4e20e98a3e5c888217181cab0dfee0cec4c9d44662b3ce9a65c9cba37f9,2025-06-09T16:15:41.057000 +CVE-2025-47477,0,0,21c6c4e20e98a3e5c888217181cab0dfee0cec4c9d44662b3ce9a65c9cba37f9,2025-06-09T16:15:41.057000 CVE-2025-47478,0,0,e6d6adb3b1616923ef0638df6a5bba4a6a66b2f12e5e8ad860cddbc43d60dfda,2025-05-23T15:54:42.643000 CVE-2025-47480,0,0,ef5cc5737d0e088e76573f050c6e079a8e6e4769a34e7600bd175867d6608ec8,2025-05-08T14:39:18.800000 CVE-2025-47481,0,0,9dd0d7411f22176e27723210f288403628c90f1234e60ae0d0856344023dd406,2025-05-08T14:39:18.800000 @@ -295593,7 +295594,7 @@ CVE-2025-47483,0,0,1236e11ed545897bd544d3b570e106d5ca0c4366ed2c09c02f8b01619887d CVE-2025-47484,0,0,b644a0a33da33ea6068483b9b701b74214c35150d4aad4776cc97bd8f67fc880,2025-05-08T14:39:18.800000 CVE-2025-47485,0,0,6d13ac9b94cd4d028acaaeec342682658517eaa04d82957f21abc9e77c21f0f1,2025-05-08T14:39:18.800000 CVE-2025-47486,0,0,c9e146c45d6cc866b625b59b9fbbdc42abd43e31899b0596a5f0fd0f2495a7c3,2025-05-08T14:39:18.800000 -CVE-2025-47487,1,1,af0e61982ac76b29fdd3a2ce9083411b1671c38b0a9490f8f6e63c15e1c186ec,2025-06-09T16:15:41.207000 +CVE-2025-47487,0,0,af0e61982ac76b29fdd3a2ce9083411b1671c38b0a9490f8f6e63c15e1c186ec,2025-06-09T16:15:41.207000 CVE-2025-47488,0,0,a98cbe0ad2250a56d46a3630b47fec1848107877b1365f7ff9f869c1ad4ead6f,2025-05-08T14:39:18.800000 CVE-2025-47489,0,0,12b13751b7f1741a87725c19ad09a24bfe30a7cd9497783102cd5f2ca284033a,2025-05-08T14:39:18.800000 CVE-2025-4749,0,0,b8451e4b2a66fc656a3e06b6a82340ac94c8546a4a1043c5826895b1adbdd4dc,2025-06-03T15:57:57.250000 @@ -295619,13 +295620,13 @@ CVE-2025-47508,0,0,44bc5934567e61a9d226a8a00b95a3dbd7348d5f88f1a9426cbcefa0e9a14 CVE-2025-47509,0,0,a28b54f2726ac100d3a0b6d4c962a5fc82a66ed122eca0072f6ed6e33eba4277,2025-05-08T14:39:18.800000 CVE-2025-4751,0,0,03912851cd6e2f8454cc14a160a9b578739ddae3dca121ba867edc56013b6d4e,2025-05-27T19:50:02.937000 CVE-2025-47510,0,0,c9d1222173a4dc9440ec30daa9fbe0a2e3c41d5575ab2c944e78e87741a6699d,2025-05-08T14:39:18.800000 -CVE-2025-47511,1,1,1b15452c2f5058d2cfae7fb76c6b980b74838ff29e2a758b624fc9ccbfbca893,2025-06-09T16:15:41.393000 +CVE-2025-47511,0,0,1b15452c2f5058d2cfae7fb76c6b980b74838ff29e2a758b624fc9ccbfbca893,2025-06-09T16:15:41.393000 CVE-2025-47512,0,0,f1a3f254afce9caaf969e51a0109c6cff8f8b40c27dc6049b0cdeccc9db021f0,2025-05-23T15:54:42.643000 CVE-2025-47513,0,0,8703181f402fca103f6d022a9c33e006a387d557a196cc7858c57d95fd868ecd,2025-05-23T15:54:42.643000 CVE-2025-47514,0,0,9ebbd68f60dde682d5f6fb89d64f79535644e445245fd8730b094308ec83cfb0,2025-05-08T14:39:18.800000 CVE-2025-47515,0,0,0a2615eadd81407d5331b37798d780966199eb53e4569ae43310b88f5a753f77,2025-05-08T14:39:18.800000 CVE-2025-47516,0,0,b2eb33a5eb2f9375da399b2fedde3b15db5a6455a1e221c062c5c05d43902a6e,2025-05-08T14:39:18.800000 -CVE-2025-47517,0,1,eeb661b268db8a17299de3f96b63e539eff1c3e8eb88b03e1ec77230923c49b8,2025-06-09T16:56:44.253000 +CVE-2025-47517,0,0,eeb661b268db8a17299de3f96b63e539eff1c3e8eb88b03e1ec77230923c49b8,2025-06-09T16:56:44.253000 CVE-2025-47518,0,0,56be80b7ed16bc5859df2738940fa4ad1abe9cd81ed70721387b471047e1a8e4,2025-05-08T14:39:18.800000 CVE-2025-47519,0,0,82faa4938f6bcc117e58d0fe57c033c9b2d74bd280d23d892ff4cd5d9a218a03,2025-05-08T14:39:18.800000 CVE-2025-4752,0,0,71ecb3805838491b3f922e9909741b5d39114983f46c1fc3689a183b7bc137b8,2025-06-03T15:57:01.207000 @@ -295636,7 +295637,7 @@ CVE-2025-47523,0,0,f195392b5f808fe9c3856b2b15686e3aa8292dc4447bf19d8a3daf0e8d231 CVE-2025-47524,0,0,3ae95a6c5e8b77d371df026b87c96355ca04d04da5177f09e825a7d062c218cd,2025-05-08T14:39:18.800000 CVE-2025-47525,0,0,c9982bfde9e29cc589962b2ab6b0cc05071ee8c75d4a9adc1c76947e243b469e,2025-05-08T14:39:18.800000 CVE-2025-47526,0,0,2617da7eb4e53828410b6046c72bd451966e899374e3c43d789b40911de09b0a,2025-05-08T14:39:18.800000 -CVE-2025-47527,1,1,4ff074d89efe85268475d617dfb1f399e48b2f4170dd824f50c52778669a1d50,2025-06-09T16:15:41.550000 +CVE-2025-47527,0,0,4ff074d89efe85268475d617dfb1f399e48b2f4170dd824f50c52778669a1d50,2025-06-09T16:15:41.550000 CVE-2025-47528,0,0,d66dcd6b8cb0f20189f7b42b9cc8eaecf41c7f7aaf00bef51aa11af3d26b7264,2025-05-08T14:39:18.800000 CVE-2025-47529,0,0,4a75f2f5bd05f7907a3ee7f414497b38e29c095125f774724be8f9f672bef815,2025-05-23T15:54:42.643000 CVE-2025-4753,0,0,2948282b1598cd584288af9cdfce742cbef3102e97979315e3768adbf7400cdf,2025-06-03T15:56:54.033000 @@ -295647,12 +295648,12 @@ CVE-2025-47533,0,0,229ed0fea3f9aca7a41227e65300f99fda740027fd67ff2b27884956a1ea9 CVE-2025-47534,0,0,55d0ae51714aff1a3d428b372ecff110c2766107d1b97964e627b9b9870f9928,2025-05-19T13:35:50.497000 CVE-2025-47535,0,0,efb928a78fd100590d3f216ac98a70ac07ad42a00a82415ffb8ae51dc6f07a5c,2025-05-23T15:54:42.643000 CVE-2025-47537,0,0,ec99457b56cbb00305479743e07a55f5a22c2d4fb689ff948519b19e18d85b8b,2025-05-08T14:39:18.800000 -CVE-2025-47538,0,1,14ba1016f0e3a65098eafca0592f72eddcd029d8a2d7aad5d253065d3c462cdb,2025-06-09T17:02:49.720000 +CVE-2025-47538,0,0,14ba1016f0e3a65098eafca0592f72eddcd029d8a2d7aad5d253065d3c462cdb,2025-06-09T17:02:49.720000 CVE-2025-47539,0,0,c3761e209ddba0b551c2e657f393922bb50271a7d4f01fd27c8f4c7638d0081e,2025-05-23T15:54:42.643000 -CVE-2025-47540,0,1,55d8d4a206487308d2f526fcb2868faa0ebb095c5ddaf1495187adbed1e3dca2,2025-06-09T17:04:28.477000 +CVE-2025-47540,0,0,55d8d4a206487308d2f526fcb2868faa0ebb095c5ddaf1495187adbed1e3dca2,2025-06-09T17:04:28.477000 CVE-2025-47541,0,0,abfce1eefeffb0429ea17dd63476994eb46b97459479258fa484aeb781b43a2c,2025-05-23T15:54:42.643000 -CVE-2025-47542,0,1,1b8b0dfe2acc7592714b60ac74c401c771cb1a6a316e5848101e603d1cbc03e9,2025-06-09T17:05:30.240000 -CVE-2025-47543,0,1,c6e8756de9317e57193dc995c6390c9ac70fa01c77db5de3d54ac54186dfdf8c,2025-06-09T17:06:12.123000 +CVE-2025-47542,0,0,1b8b0dfe2acc7592714b60ac74c401c771cb1a6a316e5848101e603d1cbc03e9,2025-06-09T17:05:30.240000 +CVE-2025-47543,0,0,c6e8756de9317e57193dc995c6390c9ac70fa01c77db5de3d54ac54186dfdf8c,2025-06-09T17:06:12.123000 CVE-2025-47544,0,0,c8e092515dc1d0584f717a9bf293a6c01a04845832079d013736aead98de0853,2025-06-06T21:47:36.693000 CVE-2025-47545,0,0,3e01429d5c64d960af3d7e6f2d9678f2e63bc3b105a40823da80f426dfec2ee5,2025-05-12T20:19:53.130000 CVE-2025-47546,0,0,0c8e112d3c35e9c6509a51b3a5f38078b38ffd29d5792f4deca7389b817c86c0,2025-05-12T20:19:08.263000 @@ -295667,7 +295668,7 @@ CVE-2025-47557,0,0,30fe5baef7cb4352c2f9471d036fd77d02b114de359294a33b494a8769330 CVE-2025-47558,0,0,5a74e129f72833ac1e6a0fa080819cbdc1546e5fefdc4651557e3c28f898f0bb,2025-05-23T15:54:42.643000 CVE-2025-4756,0,0,b935e91bacb1926bc8cf1fe1b0f1de476b8b7bfbf44789827c7a23f8c6f1b349,2025-05-21T13:40:10.450000 CVE-2025-47560,0,0,c42216d7ef93cb02bf2cefc33ab7720ff1060436a899db11fa007bd5ae21264e,2025-05-19T13:35:50.497000 -CVE-2025-47561,1,1,847a582e7c0207659eeae6105069b974e72301e8bdb1cfa8a4fb54e426896aea,2025-06-09T16:15:41.700000 +CVE-2025-47561,0,0,847a582e7c0207659eeae6105069b974e72301e8bdb1cfa8a4fb54e426896aea,2025-06-09T16:15:41.700000 CVE-2025-47562,0,0,879496304ffa94481070c08ba70f4beeb80850bcaa0cd491262f65c2fe9f8f35,2025-05-19T13:35:50.497000 CVE-2025-47563,0,0,72acd05048e66bf43174d423048963fa4336cfd5d05a950e28ccf6a586953f28,2025-05-19T13:35:50.497000 CVE-2025-47564,0,0,758c7c233976a079425cfa725a742dd6e7231873de27eacf12a1e47dc13257f8,2025-05-19T13:35:50.497000 @@ -295697,7 +295698,7 @@ CVE-2025-47594,0,0,670736b2ade11ae53e2abb72d50676680bd1eb697f70e54de78fdccfe9061 CVE-2025-47595,0,0,9adf7d209ac9b8d3400c8588f008170c41edc2d63f5ac07b2215d46ce5b295b5,2025-05-08T14:39:09.683000 CVE-2025-47596,0,0,690e3b47de078ba08084cd61db672689fbe99a61629098464a3f13b510134cf9,2025-05-08T14:39:09.683000 CVE-2025-47597,0,0,fb76cae12f5b526063c4e4a4be253bc9c7c48e40696db77b034e646e42c05626,2025-05-08T14:39:09.683000 -CVE-2025-47598,1,1,e26f9479741bd1f8e772a3dc9af4dbecf2f23e6316c7341aa062d7a99d6157ab,2025-06-09T16:15:41.850000 +CVE-2025-47598,0,0,e26f9479741bd1f8e772a3dc9af4dbecf2f23e6316c7341aa062d7a99d6157ab,2025-06-09T16:15:41.850000 CVE-2025-47599,0,0,9ee039ad2cd9c104f74dafdaab19a680ccf8acfe2bdc3e4b9451c1c37f06b445,2025-05-23T15:54:42.643000 CVE-2025-47601,0,0,c335faea14ab10462c3e46670df66fe038dd1d14b79de2f1440abed04f84f72c,2025-06-09T12:15:47.880000 CVE-2025-47602,0,0,d3dbfb428c0954dce9fcab4e9e45f9d0df6844ceeac2e295f71482a5f5bda0bd,2025-05-08T14:39:09.683000 @@ -295706,7 +295707,7 @@ CVE-2025-47604,0,0,5fe8052a1ec8d805c9163a0e7fe2f0a39439d3c6190a6aeb618f3b6906c1c CVE-2025-47605,0,0,b6491092455eede5a1d7d1de6f7221c35c77aca3b2beb6aadc95e5dae53348cb,2025-05-08T14:39:09.683000 CVE-2025-47606,0,0,261198fb968f6507d6ed481eb6f4840bbec961ce05d46e084e160fda30d5d00a,2025-05-08T14:39:09.683000 CVE-2025-47607,0,0,d0b7c3b7ae1517408314d2ad3e3069997c75c6213321888cd8d1c66d4e31c11f,2025-05-08T14:39:09.683000 -CVE-2025-47608,1,1,8813fc11f93bd14d8cfa4bbc1ca3e5f3dc04fd6e0239ecb04ea0b41e9d69212f,2025-06-09T16:15:42 +CVE-2025-47608,0,0,8813fc11f93bd14d8cfa4bbc1ca3e5f3dc04fd6e0239ecb04ea0b41e9d69212f,2025-06-09T16:15:42 CVE-2025-47609,0,0,0f312cdc9540101a60207d01d82d63b5a476cecfd45f63337bd539fe4bf56a27,2025-05-08T14:39:09.683000 CVE-2025-4761,0,0,9b2bc90661a1265fb38e65b8ba4c0907f93f2ea29af882f49fbb1c9a53591e84,2025-05-27T19:48:48.237000 CVE-2025-47611,0,0,476c313a93f85aadfbc3278d8fcfc0ebe466f2d4507a11e782d9ba8fa0e9a383,2025-05-23T15:54:42.643000 @@ -295747,7 +295748,7 @@ CVE-2025-47647,0,0,bcc64494c4f45cbc11de66eb718f0e423105a061ef54de6b136715ca86a6b CVE-2025-47648,0,0,3c1dfc943823daf3366f4eed455a4c3f82064cebde832df50c0d3191570bcbef,2025-05-08T14:39:09.683000 CVE-2025-47649,0,0,a6998300a5795198f0b6b91104fdb10fcb7520b0214faea4aa3bc9ecd0a8e984,2025-05-08T14:39:09.683000 CVE-2025-4765,0,0,0837302015ce28868a75e726316131d572747335e54f82acac56a10423fbdc52,2025-05-27T19:48:26.970000 -CVE-2025-47651,1,1,fa20af9ed86a815a38f448eb07a0f39a7afd9ab67ad84c60a86814b15a74b42f,2025-06-09T16:15:42.200000 +CVE-2025-47651,0,0,fa20af9ed86a815a38f448eb07a0f39a7afd9ab67ad84c60a86814b15a74b42f,2025-06-09T16:15:42.200000 CVE-2025-47653,0,0,aea902577b09981d2973dd34a3653642f8f6a296f13c8d372934fa816515c5f5,2025-05-08T14:39:09.683000 CVE-2025-47655,0,0,99fda0bc4baa99ff4898982663410a7b72875bb40b9b47ae6767967697d041a7,2025-05-08T14:39:09.683000 CVE-2025-47656,0,0,64ca96af8ea55f69cb93b539d6deb78f0569be7b208cfa2a28c459de3d2e34ca,2025-05-08T14:39:09.683000 @@ -295991,16 +295992,16 @@ CVE-2025-48119,0,0,4feda773c81ee4897f2976ea61ec02d33e4025df17c7693669a0a4d6a4590 CVE-2025-4812,0,0,42218508a0309649b34bc39191117b5420dff6316bab0950768b4789d15f10de,2025-06-04T16:08:39.880000 CVE-2025-48120,0,0,2659007c9b26f8d290992dde9f498830d4c41050333088bc2e3cc8f9d34413b9,2025-05-19T13:35:20.460000 CVE-2025-48121,0,0,d41100197a0b9125ccfe6a24f1d418cd71403d0477e8fd6b7ad00bf5b7009d5e,2025-05-19T13:35:20.460000 -CVE-2025-48122,1,1,7edd73a263d10ee33a2dec84d2519756d2815bf84236c6e3d96940561527e5cb,2025-06-09T16:15:42.390000 -CVE-2025-48123,1,1,6734a01f1102a8de683d08cc9ad5bbdb362785a10ba06a8097906b6f60bc0f36,2025-06-09T16:15:42.547000 -CVE-2025-48124,1,1,73d27a0be742699869b3c110ea152e0de81697f7f5e0072cf84f893f51da8c7a,2025-06-09T16:15:42.693000 -CVE-2025-48125,1,1,5b39ba17f8982e0bb594ccc7a09886b4e37118968340e03d1631ddccd42ad04d,2025-06-09T16:15:42.840000 -CVE-2025-48126,1,1,be6cf08a917fcd9cab766c4a69b658ae8abfcd63efcde3fcd97d00710a7ebadb,2025-06-09T16:15:42.987000 +CVE-2025-48122,0,0,7edd73a263d10ee33a2dec84d2519756d2815bf84236c6e3d96940561527e5cb,2025-06-09T16:15:42.390000 +CVE-2025-48123,0,0,6734a01f1102a8de683d08cc9ad5bbdb362785a10ba06a8097906b6f60bc0f36,2025-06-09T16:15:42.547000 +CVE-2025-48124,0,0,73d27a0be742699869b3c110ea152e0de81697f7f5e0072cf84f893f51da8c7a,2025-06-09T16:15:42.693000 +CVE-2025-48125,0,0,5b39ba17f8982e0bb594ccc7a09886b4e37118968340e03d1631ddccd42ad04d,2025-06-09T16:15:42.840000 +CVE-2025-48126,0,0,be6cf08a917fcd9cab766c4a69b658ae8abfcd63efcde3fcd97d00710a7ebadb,2025-06-09T16:15:42.987000 CVE-2025-48127,0,0,11ee29dc31cd85b0b718162f384541d319a9748ffc96b9bab70d5b0619027f27,2025-05-19T13:35:20.460000 CVE-2025-48128,0,0,94de179bd7e9fd5a02611e704c16ad33a9258dcb246bf38f48064c8c6fc5c170,2025-05-19T13:35:20.460000 -CVE-2025-48129,1,1,e0bce5a4908b96b0da455e91edb43cb29a735f9d45296d1670b516268712b59f,2025-06-09T16:15:43.133000 +CVE-2025-48129,0,0,e0bce5a4908b96b0da455e91edb43cb29a735f9d45296d1670b516268712b59f,2025-06-09T16:15:43.133000 CVE-2025-4813,0,0,1a040e227781d5197074d3e70b2ff2c020f5f78c26861bf6092e1893d0ef9aea,2025-06-04T16:10:14.027000 -CVE-2025-48130,1,1,29f2ed5c533d7b5858d8b13985a97bbe1b41d0294c8549a016ad290ed61c3cb3,2025-06-09T16:15:43.280000 +CVE-2025-48130,0,0,29f2ed5c533d7b5858d8b13985a97bbe1b41d0294c8549a016ad290ed61c3cb3,2025-06-09T16:15:43.280000 CVE-2025-48131,0,0,6f6863370b60761b82c369fd6ae422f0117970da1760027fe64e23ad563befc7,2025-05-19T13:35:20.460000 CVE-2025-48132,0,0,a2bb6adacc89023d0994c232181272e70d3b6a7771b743532333977bbde51d07,2025-05-30T14:15:56.850000 CVE-2025-48133,0,0,5ccef876067eceac0c72d3712d053f037621956c868e9b3602cf854900865668,2025-06-06T14:07:28.330000 @@ -296009,14 +296010,14 @@ CVE-2025-48135,0,0,df1fc64701dff9d68744f295f505943353aa8358d009a9af1218dd9cf0feb CVE-2025-48136,0,0,c1db2265f8a48dc8fb9bde0e7c6116a298583762b2bb3911ef4c2aaf2b09854a,2025-05-30T14:36:58.320000 CVE-2025-48137,0,0,5548589b314d704917168eb47822a320c36df235e7215f581b27680822b5ed53,2025-05-30T14:35:13.523000 CVE-2025-48138,0,0,87ffc58f4226f2db1771ad791bf24339c9d7ee906fd0e94e6b23ced179f5abb5,2025-05-30T15:19:56.580000 -CVE-2025-48139,1,1,bc48e61620090264acda3ab7e08e9716b05b8c65411b47fb852c803b32e60860,2025-06-09T16:15:43.423000 +CVE-2025-48139,0,0,bc48e61620090264acda3ab7e08e9716b05b8c65411b47fb852c803b32e60860,2025-06-09T16:15:43.423000 CVE-2025-4814,0,0,d46786303e3a6598163a80d264d357d8fd8f4577086008f748c18c8fa1a8b9bd,2025-05-28T13:17:56.110000 -CVE-2025-48140,1,1,f3e59b8252f36ad1e1561d7ae1fedc4a01a705b86fc09e7ceea0b9ea33bf93be,2025-06-09T16:15:43.573000 -CVE-2025-48141,1,1,6b1904df2afc84c63fd1f6c9170335a13c8a74fff28818b8d9bb3b8e504046af,2025-06-09T16:15:43.730000 -CVE-2025-48143,1,1,1666ba767fcc32e235acdf0fedd18fc631d02cf4d6bf11d4a8ef5be61f2790ae,2025-06-09T16:15:43.883000 +CVE-2025-48140,0,0,f3e59b8252f36ad1e1561d7ae1fedc4a01a705b86fc09e7ceea0b9ea33bf93be,2025-06-09T16:15:43.573000 +CVE-2025-48141,0,0,6b1904df2afc84c63fd1f6c9170335a13c8a74fff28818b8d9bb3b8e504046af,2025-06-09T16:15:43.730000 +CVE-2025-48143,0,0,1666ba767fcc32e235acdf0fedd18fc631d02cf4d6bf11d4a8ef5be61f2790ae,2025-06-09T16:15:43.883000 CVE-2025-48144,0,0,915ef69f7620231f2c6e2a32616b16609cf357d74e4b81e5126994688d251650,2025-05-30T15:20:12.500000 CVE-2025-48146,0,0,44edda46a6e454799db1266c87b76373fb03553b5180641f5297dee2b0d7de37,2025-06-06T22:23:28.070000 -CVE-2025-48147,1,1,fa5f2590313248ab825bb15a2f5434bfdb95bff638137f90f7886bccaf9bdaee,2025-06-09T16:15:44.030000 +CVE-2025-48147,0,0,fa5f2590313248ab825bb15a2f5434bfdb95bff638137f90f7886bccaf9bdaee,2025-06-09T16:15:44.030000 CVE-2025-4815,0,0,31cc1cd9ba179e2e20111ed224a5d1f55b5f28081bf7ef82d4c48c2315ce9fb6,2025-05-28T17:08:54.983000 CVE-2025-4816,0,0,1d7865e0cbbb0c318cb8ea40d3a767abd03ec76e1a6022bd94025fd37d41588b,2025-05-28T00:59:43.940000 CVE-2025-4817,0,0,f265475ef28de63b3868387a0ba8131291fd27201dee770829df62b575e6a51c,2025-05-28T00:59:22.280000 @@ -296068,13 +296069,13 @@ CVE-2025-48258,0,0,05558dc9a056a4c45220e853dbcfba9265f36b69d0b6ff2d0c20a24925735 CVE-2025-48259,0,0,1f3946fa4bd270c9c3c52b83f5d392e74c67e5ceedfed5fc79e2daf54a324c93,2025-05-21T20:25:33.823000 CVE-2025-4826,0,0,5eb26ca2bf69b529dbc693897efb8fc6040465a4c812b7540761802d8b952625,2025-05-23T15:49:48.400000 CVE-2025-48260,0,0,a3f874679cdeac9df55dbfd1c86be6a056999148c9f31eda32540292f95592b6,2025-05-21T20:25:33.823000 -CVE-2025-48261,1,1,4bbcad26a174f79533067a8a01282605077ea1734855520b1d2a4c943797c371,2025-06-09T16:15:44.183000 +CVE-2025-48261,0,0,4bbcad26a174f79533067a8a01282605077ea1734855520b1d2a4c943797c371,2025-06-09T16:15:44.183000 CVE-2025-48262,0,0,e5106d3e36e1c55dca7b98309c44fab864699d88d7fb693a4b04c9c4036ab717,2025-05-21T20:25:33.823000 CVE-2025-48263,0,0,4b385dcf2f602e3ac6e9aa1fa8960317b4cd6beb44864083fa26204c658914e2,2025-05-21T20:25:33.823000 CVE-2025-48264,0,0,304bd89e1a992b208c192e2c5d98dc5704c1686813ea9b5846a7bf1a3d8fcdb6,2025-05-21T20:25:33.823000 CVE-2025-48265,0,0,83b069c1b5ae444779cf389b5d569f572ddc3ad7cb6a2c6fa7de2ff4b1a2a53d,2025-05-21T20:25:33.823000 CVE-2025-48266,0,0,3bb404acc932cb577668c73b4bff979e7be8fa994a5eeee109feedf83c932503,2025-05-21T20:25:33.823000 -CVE-2025-48267,1,1,ff9343960c8b6bd6c632904c5c81f2b7d867c928d64b753fa70a8e6dacbb6140,2025-06-09T16:15:44.340000 +CVE-2025-48267,0,0,ff9343960c8b6bd6c632904c5c81f2b7d867c928d64b753fa70a8e6dacbb6140,2025-06-09T16:15:44.340000 CVE-2025-48268,0,0,6fb94d6452c139be6761ee0334544120703ae1e01f5e54b75846cfcd101961c7,2025-05-21T20:25:33.823000 CVE-2025-48269,0,0,f92f6497a4c0d6ec5dda04beeadf5b9056b09a0f6fcbf3c45be0dfbd4fb991a1,2025-05-21T20:25:33.823000 CVE-2025-4827,0,0,d47a71d05b44889e1baa543d22084cfefaa52c46e4e9470b39e886fbf66c5cf8,2025-05-23T15:51:49.310000 @@ -296086,9 +296087,9 @@ CVE-2025-48275,0,0,06271179e2a87da02697af4b0abc688b6bd5dc4ddeaf28630e532e9232bd6 CVE-2025-48276,0,0,0e141f1bba6aa60f05739d7c11f150d7139abee4704e3e4b24e80ad758f6c866,2025-05-21T20:25:33.823000 CVE-2025-48277,0,0,22dca5b7c56418f77c0bce203490c523fc4aff3e411af80d1d258902607a715a,2025-05-21T20:25:33.823000 CVE-2025-48278,0,0,fc186ead0a408b0818eff61791f9966eb55ac4b781cef1f9c2ff2b13637be2a0,2025-05-21T20:25:33.823000 -CVE-2025-48279,1,1,9d4ca05a3e62899a320c8ce58c4e16f8e6a134a4d0679086044d3527fe532314,2025-06-09T16:15:44.490000 +CVE-2025-48279,0,0,9d4ca05a3e62899a320c8ce58c4e16f8e6a134a4d0679086044d3527fe532314,2025-06-09T16:15:44.490000 CVE-2025-48280,0,0,50547438efb25a41870b12bbd2b12530e271613abc780fbeacb3aedf39b9e831,2025-05-21T20:25:33.823000 -CVE-2025-48281,1,1,9fb89e50feccbbdfe127206729f698d00bb54db2ca0018ad0bf1dc24149581ca,2025-06-09T16:15:44.637000 +CVE-2025-48281,0,0,9fb89e50feccbbdfe127206729f698d00bb54db2ca0018ad0bf1dc24149581ca,2025-06-09T16:15:44.637000 CVE-2025-48282,0,0,a63c42bd2eb9f1f01c9f596804aff79306d7447dc39b229a0ba899a19f281349,2025-05-21T20:25:33.823000 CVE-2025-48283,0,0,b6e6649add14051517efb8ed21cb854f3f9215881bd5b92fa2c73a4b76f87ea0,2025-05-23T15:54:42.643000 CVE-2025-48284,0,0,d8725648db484c5756e0f6152326f03e07506a859f37510b86b2c8a5eef241dc,2025-05-21T20:25:33.823000 @@ -296214,7 +296215,7 @@ CVE-2025-4871,0,0,3f055501a74b827c2979fd506b6a31da5aa1cc38fbff75b8f146849a462b3e CVE-2025-48710,0,0,f0402bb1ed6d8f6e40d35a516c63ba6d11524553c0fc1bb2ee868d959afc0447,2025-06-04T14:54:33.783000 CVE-2025-4872,0,0,30863c3012076b0862c02f7223e45f39a482607108cedc8377812aeb4ff48652,2025-05-19T15:15:35.567000 CVE-2025-4873,0,0,63423bb9fd17f5cd0d086d7b5556b35e17f23a209119a6131192f7c612f8b1ea,2025-05-21T17:34:03.960000 -CVE-2025-48734,0,0,3a4d2ed7881f8105604f4564403b6f6d709d56b3f1a20fb0aec3159057e3213a,2025-05-28T18:15:27.410000 +CVE-2025-48734,0,1,acc874d81a60ace2d14c74bbe1e52a87c1296521471433185433836e25b59fbc,2025-06-09T18:56:26.370000 CVE-2025-48735,0,0,9d5a08d093cc66e61f5e34f16eb5a90406e438748127c461c01c0b9a9907d82b,2025-05-28T14:58:52.920000 CVE-2025-48738,0,0,65752e8b34a930365e2bd7e8d92c72cb3dcfec04e747f7f58b2581c790532cdc,2025-05-28T14:58:52.920000 CVE-2025-48739,0,0,bba3d5ac118f557180952cdfc3ccafa99d859ead1572a9917ac889a50d634b65,2025-05-28T14:58:52.920000 @@ -296222,8 +296223,8 @@ CVE-2025-4874,0,0,3801201aebed5dc0a8e923b5407a2610ac97c6bf23696c0909d5665f5d87f1 CVE-2025-48740,0,0,9cce611916a4dc21fb7406dff2e92d33482eb065ceb85ae23dff891eb09fb22b,2025-05-28T14:58:52.920000 CVE-2025-48741,0,0,75001d0705bc789d943f76109b8b14a126d281e251509064c5cca96008e10105,2025-05-28T14:58:52.920000 CVE-2025-48742,0,0,5f33c781ef30502ef2e246627292bc67d88c79205c0f59dcb70501ff4a68f09c,2025-05-29T17:15:21.900000 -CVE-2025-48743,0,0,c76f13c9957b05dc761602bf79dba24f2889ab5a933ef1979a2aebf1738634ab,2025-05-28T15:01:30.720000 -CVE-2025-48744,0,0,5b88b5f0f2118b69d165e6d14fd79bd6bdbf0e30ef11a5ceea27f79ef8baa6d6,2025-05-28T15:01:30.720000 +CVE-2025-48743,0,1,c91acb6150f07a43c974b698b48df19455694c9a8c5f37e0bbd5aa9b807fb2bc,2025-06-09T18:50:50.927000 +CVE-2025-48744,0,1,a039740c56d4e93180f7ac5a496864b9f89957753f0bd173790011a4f09f8955,2025-06-09T18:50:58.620000 CVE-2025-48745,0,0,f2d9c50f894d95aade77e788c5c232afd36dc9a98ad93323913ad989a9da4a6d,2025-06-02T13:15:21.897000 CVE-2025-48746,0,0,f72c5a8d16806b0ba968ccabf6f8a5266bce1d331d3179a6d466243179f0e088,2025-05-30T17:15:29.937000 CVE-2025-48747,0,0,8c3baf0ee9646e657c0ba351a53bca2d3d39df6e364e578cbb75404ea4e19368,2025-05-29T14:29:50.247000 @@ -296384,12 +296385,12 @@ CVE-2025-4911,0,0,8165f0d1dc1e78afded21e50626575112805e2ff63d8f266295fb56c02f369 CVE-2025-49112,0,0,53acc03eb5f34e287cf80e6f2606bfb4760fb16ea2fe509fc70b20f7de56218f,2025-06-02T17:32:17.397000 CVE-2025-49113,0,0,3740e35451abe1a78e20b6fcfcc30939518c1442be6c83079800621122ba29db,2025-06-09T04:15:35.803000 CVE-2025-4912,0,0,952cc1697455c59886c397e61a80308747f6eedd0f377c0531d621b366fc5d7d,2025-05-21T17:41:21.063000 -CVE-2025-49127,0,1,3f4889eef877e3cbd48aa702e8cb35c833e3234501017b5b4ce4fc613f23b00a,2025-06-09T16:15:44.833000 -CVE-2025-49128,0,1,be74e1e3636b4e3c68c2e5f707126adefa5b42c030884a0a961eb0fa96655c19,2025-06-09T16:15:44.947000 +CVE-2025-49127,0,0,3f4889eef877e3cbd48aa702e8cb35c833e3234501017b5b4ce4fc613f23b00a,2025-06-09T16:15:44.833000 +CVE-2025-49128,0,0,be74e1e3636b4e3c68c2e5f707126adefa5b42c030884a0a961eb0fa96655c19,2025-06-09T16:15:44.947000 CVE-2025-4913,0,0,53b3af32223266d4fefa6288fa7668d3e6278e5d2f6f83bce997bdbd90d149c2,2025-05-19T17:37:22.390000 CVE-2025-49130,0,0,101994697265c4124b21893e7018192e4caf4f2ec31625a5dfcbe146cdb28e2a,2025-06-09T13:15:23.977000 CVE-2025-49131,0,0,cb5b50180e5eaa5b85e2d41a2bea84c06691db09851c0931186c9857c00a2951,2025-06-09T13:15:24.120000 -CVE-2025-49136,1,1,a10f25f5128caef6daafaa11ff5ce0b9bbb7807cdd2e862d107de1f6e8a0f6e5,2025-06-09T17:15:29.917000 +CVE-2025-49136,0,0,a10f25f5128caef6daafaa11ff5ce0b9bbb7807cdd2e862d107de1f6e8a0f6e5,2025-06-09T17:15:29.917000 CVE-2025-4914,0,0,a988b116f09ba2a954362a47d883dbc77032cfbf0fc2d8366f3812d4ec746e85,2025-05-19T17:37:31.327000 CVE-2025-4915,0,0,46c7fa6aa65dcb339a70ae5c3381e0e409573ebed627552c1d75e88ea8911815,2025-05-19T17:37:39.277000 CVE-2025-4916,0,0,f4f666575ba307bca9e4be1cb48057a5262f7335ea23c5ca4141ce76f034cc3f,2025-05-19T17:37:50.063000 @@ -296430,22 +296431,22 @@ CVE-2025-49250,0,0,2351f6fcb24fe976d0fa710ffe15bf18ad5a5e4fc55c5bac8a1e4bec5f75f CVE-2025-4926,0,0,321f7efe7ac33228adea3a7bf6c22d3279632b362ddc9dd47d64aee357b84d4f,2025-05-21T12:46:59.150000 CVE-2025-49262,0,0,f72a67be12aa0e14efc97b0d0036e29af27cf86a3708d4ac2aa9e978d3973247,2025-06-06T14:06:58.193000 CVE-2025-49263,0,0,5383286325428d587adf74e754a88ba8a0cfd3212a156f798eee1e0f088bcef4,2025-06-06T14:06:58.193000 -CVE-2025-49265,1,1,d852669a1ce27bbe4378e46cf00c9d1277215ca03196427271f72d8f6f44f137,2025-06-09T16:15:45.063000 +CVE-2025-49265,0,0,d852669a1ce27bbe4378e46cf00c9d1277215ca03196427271f72d8f6f44f137,2025-06-09T16:15:45.063000 CVE-2025-49268,0,0,7fba4cd0960574244125174b18d1efbe9cb94c15b23fcdf76bd0963b477589a6,2025-06-06T14:06:58.193000 CVE-2025-49269,0,0,209da6bf545373fdc85c5b11db6ed8963703a2597091b1ff3758c8bc9f88bfc1,2025-06-06T14:06:58.193000 CVE-2025-4927,0,0,2750a792f3319584debfa65553b14ad85f4e2aa32076ab9798f492c480349e76,2025-05-21T12:42:13.543000 CVE-2025-49270,0,0,163d30be2cca11f5d760cc4f34f68253091ca7d2cedeaad2a8deba19e2664124,2025-06-06T14:06:58.193000 CVE-2025-49272,0,0,65af5264d035fcb85bb43c409415f059cde0552a64f45c2a9c5464a46930e4be,2025-06-06T14:06:58.193000 CVE-2025-49273,0,0,f7702becac2559d6bef45122c5e582048b5c159a9026c99cfca92cfe57a1415a,2025-06-06T14:06:58.193000 -CVE-2025-49275,1,1,3386267edcf8bc2a8bc6fe8c75eafaa04d288d4d1e5033ab79f60341b3180001,2025-06-09T16:15:45.207000 -CVE-2025-49276,1,1,3ed5fcccaa94e8d9b40f7f8470b63460cc07cff1ff955340cf227419fbda2dba,2025-06-09T16:15:45.353000 -CVE-2025-49277,1,1,0b5ab27c8e59928756876137be233d99d3be17cf2a99b1dfc40a27a06e893066,2025-06-09T16:15:45.500000 -CVE-2025-49278,1,1,34b8140909f6dc9f77f3a1a427c3ad72928fcad2f13c7d8b8bd73825d3b4e45a,2025-06-09T16:15:45.667000 -CVE-2025-49279,1,1,8b09bbadc00df8accb3db608516d04e2ab3ea1dd2796bcd65f27b697cb767a4e,2025-06-09T16:15:45.813000 +CVE-2025-49275,0,0,3386267edcf8bc2a8bc6fe8c75eafaa04d288d4d1e5033ab79f60341b3180001,2025-06-09T16:15:45.207000 +CVE-2025-49276,0,0,3ed5fcccaa94e8d9b40f7f8470b63460cc07cff1ff955340cf227419fbda2dba,2025-06-09T16:15:45.353000 +CVE-2025-49277,0,0,0b5ab27c8e59928756876137be233d99d3be17cf2a99b1dfc40a27a06e893066,2025-06-09T16:15:45.500000 +CVE-2025-49278,0,0,34b8140909f6dc9f77f3a1a427c3ad72928fcad2f13c7d8b8bd73825d3b4e45a,2025-06-09T16:15:45.667000 +CVE-2025-49279,0,0,8b09bbadc00df8accb3db608516d04e2ab3ea1dd2796bcd65f27b697cb767a4e,2025-06-09T16:15:45.813000 CVE-2025-4928,0,0,2ef2b03cf965fc1159da7fce8b90a5260b7dcf22698d986838e4a1721b452170,2025-05-21T17:42:12.960000 -CVE-2025-49280,1,1,d06e4e852b2e4f0c622c7bc425c7a14f371def21a9d5cda573f9cfbc85c19696,2025-06-09T16:15:45.957000 -CVE-2025-49281,1,1,25c0da8475d289caf154b88e7402c1afa24c603ebc4a1b94facfe1001c1b07f9,2025-06-09T16:15:46.103000 -CVE-2025-49282,1,1,e7378e18473de4e72af74f4b423e3099157ab59405f3b03f522467a99d0b66b7,2025-06-09T16:15:46.250000 +CVE-2025-49280,0,0,d06e4e852b2e4f0c622c7bc425c7a14f371def21a9d5cda573f9cfbc85c19696,2025-06-09T16:15:45.957000 +CVE-2025-49281,0,0,25c0da8475d289caf154b88e7402c1afa24c603ebc4a1b94facfe1001c1b07f9,2025-06-09T16:15:46.103000 +CVE-2025-49282,0,0,e7378e18473de4e72af74f4b423e3099157ab59405f3b03f522467a99d0b66b7,2025-06-09T16:15:46.250000 CVE-2025-49283,0,0,640ccd0e0976c434e9744645888c9020f0f8db0ddff4de99e0f7de1763d3c262,2025-06-06T14:06:58.193000 CVE-2025-49284,0,0,32735bd4b251b2328956111840fb54708614d4f5e9835cce1e61a6e4857d0679,2025-06-06T14:06:58.193000 CVE-2025-49285,0,0,2883ee9cce27db8dc625dc4afecd12c180393780137a48f6483ef22d9dfde92a,2025-06-06T14:06:58.193000 @@ -296458,9 +296459,9 @@ CVE-2025-49291,0,0,8134d1964dff1f1760992dbc201fbfd8d79201074def3a1c1fac78050d47f CVE-2025-49292,0,0,0ca180db220c352852a434aec97e01e62813479b97501ec49f80b986aca4a599,2025-06-06T14:06:58.193000 CVE-2025-49293,0,0,945e3d8bbfdfc4a328a4438a25692fd2557e65fe18072af826e236c0461cd9e5,2025-06-06T14:06:58.193000 CVE-2025-49294,0,0,da6503afc2e7446d2e270ab9d18e7b7fafedb1bd3d48c62c3f9a6b61a4accd0b,2025-06-06T14:06:58.193000 -CVE-2025-49295,1,1,4a185673a7a3308fa9302946852694194ef11b6510619b8ff7fc16b4a615113e,2025-06-09T16:15:46.393000 -CVE-2025-49296,1,1,84d0ac9d434c171a2f7738578b4c06db0fd5e69be1a686c7d303775b9f6e7229,2025-06-09T16:15:46.540000 -CVE-2025-49297,1,1,16ddaf36505cfa2cdf3b778f3441f52244819409964425f980d7ab1d6b19e0f8,2025-06-09T16:15:46.687000 +CVE-2025-49295,0,0,4a185673a7a3308fa9302946852694194ef11b6510619b8ff7fc16b4a615113e,2025-06-09T16:15:46.393000 +CVE-2025-49296,0,0,84d0ac9d434c171a2f7738578b4c06db0fd5e69be1a686c7d303775b9f6e7229,2025-06-09T16:15:46.540000 +CVE-2025-49297,0,0,16ddaf36505cfa2cdf3b778f3441f52244819409964425f980d7ab1d6b19e0f8,2025-06-09T16:15:46.687000 CVE-2025-49298,0,0,0afa64fb4a2879cd8177643578d0c66e0d48051a080156f501e026fa07f92256,2025-06-06T14:06:58.193000 CVE-2025-49299,0,0,be08a2233a8b345a2beba7bd75753d4c33be18fd581a123657ada4d299545553,2025-06-06T14:06:58.193000 CVE-2025-4930,0,0,1d8aea9f3773d4505d618710791bd7bfa563ad02d1fc1ea6085e41b2b87bbf2c,2025-05-21T17:43:31.997000 @@ -296524,10 +296525,13 @@ CVE-2025-4947,0,0,5a2596b46f41daf47fb71d339aa3ece981233d1a2e1afb5f6d90d81a432acb CVE-2025-4948,0,0,a5ca61c68a7139420f4ae3cf8d0c9e197c8ea856029d5208bdc5d22ad0659a67,2025-06-09T10:15:25.730000 CVE-2025-4949,0,0,c11b53f05ae94538ba622256f90c8d8b1286550f417cb15b7dccd733b074e027,2025-05-23T07:15:21.160000 CVE-2025-4951,0,0,8d2965f90ffa46a261e1b06cd533aeb358abbd5115dc1f57a5b34acf12ab582b,2025-05-21T20:25:16.407000 -CVE-2025-49599,0,1,cd0748db942732a0e968c564ce05d560bd51611e52e8cb06dc26ca9e65d8d9b0,2025-06-09T16:15:46.830000 -CVE-2025-49619,0,1,bf456b7c74aaa6eab01b4c779d57de166fafc9ff7198338c147fed153e2c86a7,2025-06-09T16:15:46.937000 +CVE-2025-49599,0,0,cd0748db942732a0e968c564ce05d560bd51611e52e8cb06dc26ca9e65d8d9b0,2025-06-09T16:15:46.830000 +CVE-2025-49619,0,0,bf456b7c74aaa6eab01b4c779d57de166fafc9ff7198338c147fed153e2c86a7,2025-06-09T16:15:46.937000 CVE-2025-4963,0,0,bcea30a5657c56e720740d0c1da3f6ecccc2ea27495c62c19f4e987237e46939,2025-05-28T15:01:30.720000 CVE-2025-4964,0,0,9a4175fc819c8903aae087508d79cb283240d351bb7e4f3f9bd0bc9b58a9f683,2025-06-06T14:07:28.330000 +CVE-2025-49651,1,1,31c3e4a58bb2be814284bc4c21746611c9ccdeb3404b0d06020b787c80f6fc0e,2025-06-09T18:15:26.740000 +CVE-2025-49652,1,1,418ace564269eb4c3fcc19ebfe4464eb6a68cb3aadaef8381d4ab4e03748b2c5,2025-06-09T18:15:26.897000 +CVE-2025-49653,1,1,813c373524f96e3f2dcd4fa87a5451235e7b4bc02385e0b84e327ef521f73436,2025-06-09T18:15:27.033000 CVE-2025-4966,0,0,8884eb97bbdf1a18517bed6dc84588ccbd4cf19bb3dff5ec3aa5d29bc4c7285b,2025-06-06T14:07:28.330000 CVE-2025-4967,0,0,108222a9fb8d269319085d1510581dfa0458c27c4448fa960791612bde83ca72,2025-05-30T16:31:03.107000 CVE-2025-4969,0,0,4f90cc424a2a0f4e9ed8afa3693879db2394c134460b9fa8753024f2852d3968,2025-05-21T20:24:58.133000 @@ -296704,8 +296708,8 @@ CVE-2025-5215,0,0,b474fef582698d1da247f3d19a45fd39f888869bffdeede119632bb605f572 CVE-2025-5216,0,0,055c6e0bf462827ac1da33850cd24c0034f80451f364dc70e380ec186ecf86e2,2025-06-05T15:59:14.990000 CVE-2025-5217,0,0,845e58cc2a7cf7d636f8550dca345401beab30372e211227ca46148f5ec7226e,2025-06-05T15:58:28.290000 CVE-2025-5218,0,0,1e3c0e444a44984ee7f56e05d3f73c2542844250923c93b4721e1f91900b8427,2025-06-05T15:58:31.370000 -CVE-2025-5219,0,0,a3cbd2aef4ce6a58be527a32b107e1b69333e524d15b7f7fb05a80a61572dd1b,2025-05-28T15:01:30.720000 -CVE-2025-5220,0,0,ad87e3d30efe66514c3b6c88a1ab013a78e6b90a599f10c270ffea96c6ecf33d,2025-05-28T15:01:30.720000 +CVE-2025-5219,0,1,2081601d8939f5d6337ed630438f1a3172ebd9c52c60ff332c68c99c6021cf87,2025-06-09T18:49:18.863000 +CVE-2025-5220,0,1,ca8719b73e05e3a64cdaf661849659bbba90900daa5a58289d407fc8b4c518ec,2025-06-09T18:49:40.400000 CVE-2025-5221,0,0,76b4b126f1bc556c52431d11cb00bdcb2a0f2b01d264f4d49c244dec0f4ae94a,2025-05-28T15:01:30.720000 CVE-2025-5222,0,0,f80b4651006f76581a0f11e89a1589708b41e90d125505313b9f47c711003228,2025-05-28T15:01:30.720000 CVE-2025-5223,0,0,eedcac5c929aac409f34f81cc2ec2de352a7f5b73ed89921b6a7fb323152d259,2025-06-07T23:15:22.067000 @@ -296730,7 +296734,7 @@ CVE-2025-5248,0,0,354fd11447bc9fe4034996bca17e9d4af33bf34fe37dc0c74b25b8724779b6 CVE-2025-5249,0,0,fc0947e1350e4210bd6e677b41423c19ba4df5864aa9264c3ec9f64636ca0b76,2025-05-28T15:01:30.720000 CVE-2025-5250,0,0,dcd6edbc7cb845dfb15b14bc09cddc26e98b0f3af5b9bd34a6caeb449702d2fd,2025-05-28T15:01:30.720000 CVE-2025-5251,0,0,c92bc64cbc5c80d1395afd727d86f0210c965e62a95faeaea45803d46499e451,2025-05-28T15:01:30.720000 -CVE-2025-5252,0,0,51e9c8868255c2621d06ea1959abe8548147a11d32f6eb9675032857ef2959d9,2025-05-28T15:01:30.720000 +CVE-2025-5252,0,1,befcffbe58a6c748b51a32dbfdb428108ffe2b16ca817a921564fafd634c86b0,2025-06-09T18:51:06.110000 CVE-2025-5256,0,0,8e276989283383806f3abf5c20dbe67142f0dc8ca07046605c539922633ebc4a,2025-05-29T14:29:50.247000 CVE-2025-5257,0,0,75d358e3d2bbe3761b44e1bc4ce97e0b1726e1521e4fab98ee61ac2e91cdcfa1,2025-05-29T14:29:50.247000 CVE-2025-5259,0,0,762eb0e82b940f038c9de9747260da22e83abc89d044ade4d08f1060ed5d681a,2025-05-30T16:31:03.107000 @@ -296775,7 +296779,7 @@ CVE-2025-5328,0,0,417fcf6f51b727567848f3720a3768648afbb392d247fa240c0094835655e3 CVE-2025-5330,0,0,d834ad4ad61a847f16cff13c2e41a3edc0634ba2b8cfe9a60897f96120871dc7,2025-05-30T16:31:03.107000 CVE-2025-5331,0,0,6d6e63e0f8a1a491f6a38b24f4a10f691f644991827baf7d50b9fb0e398065a6,2025-05-30T16:31:03.107000 CVE-2025-5332,0,0,e1def175621c4e1d1942302bd613c0906cf0d988637a95edef4cbf91efd49e74,2025-06-04T15:37:02.583000 -CVE-2025-5334,0,0,aae33d23bbf6c41c89830eb61bfdac6ed00173515e45aa173ca7510ab84466a1,2025-05-30T16:31:03.107000 +CVE-2025-5334,0,1,6cefdf4a8a5fef2de01d101edb206c6f9ee44bc60680712426fe5d51666584f6,2025-06-09T18:15:27.170000 CVE-2025-5340,0,0,9b48da383be5dfbe2bc488480a2be183877451ec75241964210e2e3aad9a2ceb,2025-06-04T14:54:33.783000 CVE-2025-5341,0,0,2f7555dddd47395f556aef803e272926d99b2be1a7b798f5f5a29577ec1f1191,2025-06-05T20:12:23.777000 CVE-2025-5356,0,0,d2223801ca567247b6cb0c5b7ef4a510c84f7151648945f3dcaaa1c30308362b,2025-06-02T17:32:17.397000 @@ -296790,20 +296794,20 @@ CVE-2025-5364,0,0,95a5e56210a5d35c1ea6e33ff22c35248d45f8b8e37cb258e052523a9909bc CVE-2025-5365,0,0,0d1ce8893a30ec21d7e83dd6a06faaa956ad93af9fce8162c82d46544a42f85c,2025-06-03T15:34:08.383000 CVE-2025-5367,0,0,d74e7f7b5df4373a6cb4c4912d3e92ada0700cf6b4dd42f020dd71a2e6663e2f,2025-06-03T15:33:39.070000 CVE-2025-5368,0,0,9330ec771717069f27ceda5473a12198f97847c6ad28dab99e3c2364851c8dad,2025-06-03T15:32:13.583000 -CVE-2025-5369,0,0,168c7bd4df19fbaf65329971bcfde2203a6db7b083d7a3d5d21d92d46e3163d3,2025-06-02T17:32:17.397000 -CVE-2025-5370,0,0,b8108fb76b6baed62fff6920571b278834427c11ce000292827743154d3b4777,2025-06-02T17:32:17.397000 +CVE-2025-5369,0,1,8c4e55fbb8d45d713061ee556ffa7273cbb4542497249daf924357fd6840ed9e,2025-06-09T18:59:49.330000 +CVE-2025-5370,0,1,d7c535f6840fb8738b07147f1830fce26e5802820d60a561b6d2888f8dde3788,2025-06-09T18:59:58.197000 CVE-2025-5371,0,0,16f45a240979d3e28a1f7ae1c207a37bd22e9e5d64cb4ee381668bed7ebf71f7,2025-06-04T14:31:41.573000 CVE-2025-5373,0,0,c749a6b1c61526825a3ec95e76f4d6286fc94a99723ecde6b20b472fbeaf94ea,2025-06-03T15:31:55.267000 CVE-2025-5374,0,0,08ec0fbe437c75568e797a6883653990f3916903b217127f6e162f78c26a7157,2025-06-03T15:31:45.257000 CVE-2025-5375,0,0,79ab6f61d55d13152e6cea237408e960f1fbc5f1ab43084ee7b9d3d96e5ce6a0,2025-06-03T15:31:34.527000 -CVE-2025-5376,0,0,39a14fa96d50f1baf719b3ad8d88b8f3a9b2d8e90c5b3fb82fa9a6817a5073aa,2025-06-02T17:32:17.397000 +CVE-2025-5376,0,1,8b16225d053db90a752597c127625386df6b54027a75b6d71822d392727c5436,2025-06-09T19:00:07 CVE-2025-5377,0,0,2a0798779e7d52f49745b9feb07e61348c997b311ca9bddc8c055e3107eb6d7f,2025-06-02T17:32:17.397000 CVE-2025-5378,0,0,cc5520629a7069706f7c6084705618298e02d67847501b12d08f886dd744c255,2025-06-02T17:32:17.397000 CVE-2025-5379,0,0,babae66c34b79d220aa89dea42bf99c98467244dd3a186230eda29d38866e8d0,2025-06-02T17:32:17.397000 CVE-2025-5380,0,0,176b1ee72b374b7a2508eced98587e37dc97b48f72df46ac15bbf19e005dd5e5,2025-06-02T17:32:17.397000 -CVE-2025-5381,0,0,4d14c7ebda54837df107f43a6a90f3a735aa13263eaac4c039951484a6236a16,2025-06-02T17:32:17.397000 +CVE-2025-5381,0,1,876f1dbade3202a3c0bc9154b37e88ac18b5e73e93392f2271e07f24efc746f8,2025-06-09T19:00:14.530000 CVE-2025-5382,0,0,9079c2a9e6c4f8d6485de3e4de03758083c94f7f70711ced95ebca1375632a3c,2025-06-05T20:12:23.777000 -CVE-2025-5383,0,0,791613a1dc0e4e50e5577662482853d5ee06d080bccb63905c0f9aaea6635081,2025-06-02T17:32:17.397000 +CVE-2025-5383,0,1,8d910c0db0130346f379840d2bf9503c3f708eab6ff85bcc60373aa1b27486a5,2025-06-09T19:00:27.167000 CVE-2025-5384,0,0,f375db7813781db4bdacf08584da1154bf33f5ee0b6baa312008505a3e0ca931,2025-06-02T17:32:17.397000 CVE-2025-5385,0,0,81d3a8bdc57f666b0adbd9c85ad08e2f03feda44c3cd53e81cdd7d6a3bcdb7d7,2025-06-02T17:32:17.397000 CVE-2025-5386,0,0,bee43d085d0da8f3d71008308b9f2d43d838c3810cace4a325df0fad7a9295ae,2025-06-02T17:32:17.397000 @@ -297093,43 +297097,43 @@ CVE-2025-5783,0,0,891987bd26e30e447e51a21dc9523e6bd9b1ba7b621812594699957a487c75 CVE-2025-5784,0,0,9efa1c60b0afd29315382569b5130a6c14d594665647993cf840eb9168f3b013,2025-06-09T12:15:47.880000 CVE-2025-5785,0,0,918791d7ee6ee54aa1d876c269bed5950ababc500ec42f2166dc4957a25cebde,2025-06-09T12:15:47.880000 CVE-2025-5786,0,0,48789b9dd4e05beac94849b5d632581870b565cd2916f96bb4d09da7188e0843,2025-06-09T12:15:47.880000 -CVE-2025-5787,0,0,6d8ec797474721fd522c6813642aebda99ed26f625cc02b097e86caed0384b17,2025-06-09T12:15:47.880000 -CVE-2025-5788,0,0,2847241c83e1c8d9a5f733c813427e8d4543ca823c572216b502ffe13186a65e,2025-06-09T12:15:47.880000 -CVE-2025-5789,0,0,4f6235b94f16e5c206ed5136069906e559153aa0c61ee3e62290879068355024,2025-06-09T12:15:47.880000 -CVE-2025-5790,0,0,e0e138a7360b78c4ef1fd05a7857db579277faafb52651c4fc39364ee7b2036e,2025-06-09T12:15:47.880000 +CVE-2025-5787,0,1,33fdb7d532b54bc886ec0cf9d76d17f2a503e91b7267fc08e8c1631a963666fb,2025-06-09T19:08:58.440000 +CVE-2025-5788,0,1,5c9d545164898c3673eb6f06204dd5f33e9abe63ac09e547a32bdcf2699ef525,2025-06-09T19:08:51.570000 +CVE-2025-5789,0,1,8b809b671f8113715e0d2812467dae263d8678ce3a42e39c50772fb525e79544,2025-06-09T19:08:42.200000 +CVE-2025-5790,0,1,314063475edcacb7cf894faae91613df1915fe942c39fe421384565f3fe90a0c,2025-06-09T19:08:31.530000 CVE-2025-5791,0,0,80753438a8abbcadfdd330cb52dac03749d8d4ab9cd84472ce48cc8f178a0a91,2025-06-09T12:15:47.880000 CVE-2025-5792,0,0,6d1e3770fb7342de79254680aa60a6dcddc7ebefaef96306447034e132d53721,2025-06-09T12:15:47.880000 CVE-2025-5793,0,0,890e78ef26ed2d3ed35dd4452fa6ddc5d8e1422fd24299930365cf64c0ca49f4,2025-06-09T12:15:47.880000 -CVE-2025-5794,0,0,e42f5d6e1eae573d0077f4a30ca72c105aa3d4dee585b708471cde2a5edec37a,2025-06-09T15:15:32.017000 -CVE-2025-5795,0,0,d4192d0a331b6c7e31a85b40fe192b81402c6508bbd0fc81c0a5b9c55ce68ef9,2025-06-09T15:15:32.137000 +CVE-2025-5794,0,1,d70514b216e9407637a0bd6127e26467625db4e20ad6ed20a93c1814e624cede,2025-06-09T19:08:21.053000 +CVE-2025-5795,0,1,d54c05da799c6f5b8d66966748c8904ab8bb547521866891f03770ed9e341c64,2025-06-09T19:08:11.737000 CVE-2025-5796,0,0,d2b5329ec47dab762ef4599841256282f5cb1aeae7b59824d8fb69fccc291754,2025-06-09T12:15:47.880000 CVE-2025-5797,0,0,5b0c74e944d13a2ebac8d1a73e265586e394a72f3bb5beafa57c431cf65de712,2025-06-09T12:15:47.880000 -CVE-2025-5798,0,0,5438dff2464a3fd4ece6779d1d11b73fcc4a759e1c749d7551092713f4a0b504,2025-06-09T15:15:32.387000 -CVE-2025-5799,0,0,35d32b37bd6f0846e98784ba5694aba20950ab9133d98a1babc0b595362fa936,2025-06-09T15:15:32.530000 +CVE-2025-5798,0,1,8b03aec99638c4fd5212301f04bb1a503506bf58d26bd5e5a5acb0c1110a52f9,2025-06-09T19:08:05.903000 +CVE-2025-5799,0,1,50ad513413ffdd2c3157967aae0c57c4edcf2bbf0ff1ea794ba25c05cfcc425b,2025-06-09T19:07:59.197000 CVE-2025-5806,0,0,eced74af9a3bd847a96fe591b592713a189dcd85d66bd43936ab31bd4aa88aea,2025-06-09T12:15:47.880000 CVE-2025-5814,0,0,a167867f53c6fadb9d3db3d4ef4e109f1fea46d1abeb35216542db72110fa696,2025-06-09T12:15:47.880000 -CVE-2025-5836,0,0,d69cbbf37c7fc6b63ff9bef4da62aa6dff6f19e5fb7f7fe55d966b7b0315adab,2025-06-09T15:15:32.713000 -CVE-2025-5837,0,0,10ff43a3aa2adf2cc14a37027e98fd8a1036bb3878f8ad0864b8309f5b144d95,2025-06-09T15:15:32.863000 +CVE-2025-5836,0,1,d80bb6457241c6112de58f50d5f8d524854cb0ce4d9b0e26a6df5eac567f78ac,2025-06-09T19:07:49.417000 +CVE-2025-5837,0,1,85c1936a3a1142d6d72d779afcb63f2a00a18b124b5cff42b89badcdc2313d9c,2025-06-09T19:07:41.590000 CVE-2025-5838,0,0,6cffed3ad5bb6ebc7a3a7d5185b54706bc29b5aa3d9892b7eda5ddeac376080c,2025-06-09T12:15:47.880000 -CVE-2025-5839,0,0,38a96a610fab5855ff74850c8f4cb3ec14c8d569bdb6a500f8e54769a489e19c,2025-06-09T12:15:47.880000 +CVE-2025-5839,0,1,af2c1c6da3fb5a22931f1ffebd67420dd5150792d38533d6eb8686e18f591276,2025-06-09T19:07:34.470000 CVE-2025-5840,0,0,10bb467b9354ff51b445f469eb5368da8f75354a271fa217ae4179a9fdffa942,2025-06-09T12:15:47.880000 -CVE-2025-5847,0,0,5718dcf9ee52ed7b4e5faaef48ac36a17e0f044403feff9d89a9d9e1c9fceddc,2025-06-09T12:15:47.880000 -CVE-2025-5848,0,0,436378ed1b78772d75e48ffdbeb268a7dcbfe2e844915bf1c0525052e2ffa256,2025-06-09T12:15:47.880000 -CVE-2025-5849,0,0,53ac7022b613ca34101846bc29acee730f625258c40800233fb07d9b7d288d68,2025-06-09T12:15:47.880000 -CVE-2025-5850,0,0,dd79b325f7804643655487da07798efe718cb663452a2f0c7c7c4b92aa2d7f58,2025-06-09T12:15:47.880000 -CVE-2025-5851,0,0,5984f253b911be9af326b87fac8f09b6a11a4a6a4077b923c94330b8c7120444,2025-06-09T12:15:47.880000 -CVE-2025-5852,0,0,4b6622c77de9c1b7d591a9655ccc835df17e64f35e819c2941f6299894326896,2025-06-09T12:15:47.880000 -CVE-2025-5853,0,0,abe10055947e8fa4c22ee7457a4bfd106f7f72025df13c9dbc4c1fb82ccc099a,2025-06-09T12:15:47.880000 -CVE-2025-5854,0,0,5778e0a8231ae598afadb80b3985026ef050ad2b8d6eaacfdaebf422c74634e6,2025-06-09T12:15:47.880000 -CVE-2025-5855,0,0,fa1a7a639d25f7fe6be136dea629c6a685549e1ea804df4acacd50556a08a824,2025-06-09T12:15:47.880000 +CVE-2025-5847,0,1,72a670a977f930c072e82981d9be0647255328c3124df63dafd15061a72168a9,2025-06-09T19:04:55.580000 +CVE-2025-5848,0,1,97a77699d44911bbc0f7dbb24d5b37ad7d0974431c5e2858413f0642987e5a7c,2025-06-09T19:04:50.113000 +CVE-2025-5849,0,1,0056fe9cb36cc640911c965de99076fd3871906072eb39fce82181a9d0f80791,2025-06-09T19:04:44.777000 +CVE-2025-5850,0,1,77faa88a939479eb1ff7a17f86e30907cb5cb519c6e8f93d0def24e3c3a47d67,2025-06-09T19:04:38.610000 +CVE-2025-5851,0,1,fb8b00dd00eeeabeaaed5a797cc6fb911d4a616e41b8a2298f781e5933ad9fc7,2025-06-09T19:04:27.920000 +CVE-2025-5852,0,1,0a2fdf4da0a01421d9fa71dc34f0132d5d6b40cb14bb02ddc73b60a3b1b65d39,2025-06-09T19:04:20.593000 +CVE-2025-5853,0,1,3b7a3b76340110cb86de73e9a462cb084a25b4297584faeeda4076711dabaebd,2025-06-09T19:04:03.967000 +CVE-2025-5854,0,1,273befbf12797584cc9facbf57feeb0f4f9cdcb1cb1ee1a8d5b09d5c3ad6a192,2025-06-09T19:03:46.770000 +CVE-2025-5855,0,1,d5282fd79c1cadea7a65690d1ae6cb55cd80e999a15b0f7f5d35aa82bc524845,2025-06-09T19:03:39.630000 CVE-2025-5856,0,0,5468a00e537c72311b8dc7c4dc2d6c78d33e8cd35ae1f0716866263232ae9bd5,2025-06-09T12:15:47.880000 CVE-2025-5857,0,0,cfeb535dbe9bc7d8d6ebf4be16cdf2e4637ec03ad9f0cb2fa366af4a9836b331,2025-06-09T12:15:47.880000 CVE-2025-5858,0,0,2228b11234fa5607ed2fb9c7b56c8ee7aec9f91091c296fd5d48b0f990f9dfc4,2025-06-09T12:15:47.880000 -CVE-2025-5859,0,0,181f842b2dc3107bb8bd49140ec35578daa9766c7972ef20edad6ae69fee72e1,2025-06-09T13:15:25.350000 -CVE-2025-5860,0,0,79680cbb9eac8c459fcef722cb38aab996a31da8dd28074fce3cd82f947934bb,2025-06-09T14:15:25.730000 -CVE-2025-5861,0,0,fd8ed239a890e7159c1657e6785a343e73e0e77c02fe73134d93cdafb27ffe14,2025-06-09T14:15:25.853000 -CVE-2025-5862,0,0,56c15f5091224c14db71a3db77adfc5f7d60bcaef410f9831d1e54400c2e0b34,2025-06-09T14:15:25.980000 -CVE-2025-5863,0,0,8031c5dfd245a5213ca0af0b64ca6a19cc5100e8927db1f085a9a9cc441f64b8,2025-06-09T12:15:47.880000 +CVE-2025-5859,0,1,3424c8609b984051738702bad682f63bb4a253c66b33631b1110b9ea5c523815,2025-06-09T19:03:29.737000 +CVE-2025-5860,0,1,98b6d02b7a56e80747f95a140e65963ddf24738288c1bbe6bf1fa28b310dece5,2025-06-09T19:03:16.047000 +CVE-2025-5861,0,1,1431f1040bf1b34a1b2d7e2cdf36e30a25b9488675016843791967883e0eef12,2025-06-09T19:03:01.067000 +CVE-2025-5862,0,1,c79be4a04f6df76931af24b87ceca8794f79e287289cebaeb2525446cfd425b0,2025-06-09T19:02:54.097000 +CVE-2025-5863,0,1,7e284443dd6aea7eff6c2633e520d2ed0531b47c6882facd71213b96cfaa5c7b,2025-06-09T19:02:45.383000 CVE-2025-5864,0,0,8c335b1fefc2e06e7439bb4b721e855028980e0e79820199cfb69ee6066efed7,2025-06-09T12:15:47.880000 CVE-2025-5865,0,0,8b22fbd1fd975e1962f489225e80e0fd5d6a73f87f6e9a33a901ed02978e4205,2025-06-09T14:15:26.103000 CVE-2025-5866,0,0,92ebdd4f027f2586ea57887774a4837577a4ba0044f0b326447c92ab8f4aa593,2025-06-09T12:15:47.880000 @@ -297149,7 +297153,11 @@ CVE-2025-5880,0,0,391ef7c96b0d70d3c1236374a2bb4d81a37bc1b637881945e5debe7ba99a2f CVE-2025-5881,0,0,5eb4bf7442e35d74dc490267704b35dfdada119b0d68aea9f4cd8d5d2f28ed28,2025-06-09T14:15:27.503000 CVE-2025-5884,0,0,59f697ab8d23b519d31c72c30457b66f068a4c6df1e63f817cac6e20faedb5ca,2025-06-09T15:15:33.173000 CVE-2025-5885,0,0,bca2d2871b63dd6eccf4504f84b7c81750e56a52a9d6586fb746c58736eec613,2025-06-09T15:15:33.397000 -CVE-2025-5886,1,1,3dd8cdcb94f1f6e80498f862a3c97a457e1233fa195875fc3a15ee9021f274b4,2025-06-09T16:15:47.440000 -CVE-2025-5887,1,1,c3e107008717c56b4b077386066813cb76fa7ffa21169b2f5ed4d4ccd356ec54,2025-06-09T17:15:30.523000 +CVE-2025-5886,0,0,3dd8cdcb94f1f6e80498f862a3c97a457e1233fa195875fc3a15ee9021f274b4,2025-06-09T16:15:47.440000 +CVE-2025-5887,0,0,c3e107008717c56b4b077386066813cb76fa7ffa21169b2f5ed4d4ccd356ec54,2025-06-09T17:15:30.523000 +CVE-2025-5888,1,1,8ae86dc91bfbb19db8069a50148c81b6ef6ab94e58e8b25cf50a4393802ed91e,2025-06-09T18:15:27.873000 +CVE-2025-5889,1,1,12866cc0cd082a7151f1e5bf29dd88d934d59269df384abc8b0144c010419bd3,2025-06-09T19:15:25.460000 +CVE-2025-5890,1,1,9b58b02992b94753d85c9e33614b8f5e4a7c9dafd386882d79ee3548ab14456d,2025-06-09T19:15:25.677000 +CVE-2025-5891,1,1,b0b662c4b0ac9856f132d081f6545082f6b43f7ab77b9fc27c329d8b32d1459c,2025-06-09T19:15:25.870000 CVE-2025-5893,0,0,9044103ccb721af522b7b387bafda018ab5a7cc573ffd5677a8174274eea2d77,2025-06-09T12:15:47.880000 CVE-2025-5894,0,0,654242cace97981f86dd5829ceaa9ac008f0c3374b73eef1c99cc2c32cf2e65d,2025-06-09T12:15:47.880000