diff --git a/CVE-2016/CVE-2016-200xx/CVE-2016-20021.json b/CVE-2016/CVE-2016-200xx/CVE-2016-20021.json index d31b3419d44..0916ae5d8da 100644 --- a/CVE-2016/CVE-2016-200xx/CVE-2016-20021.json +++ b/CVE-2016/CVE-2016-200xx/CVE-2016-20021.json @@ -2,7 +2,7 @@ "id": "CVE-2016-20021", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-12T03:15:08.410", - "lastModified": "2024-11-21T02:47:34.367", + "lastModified": "2025-06-03T14:15:26.830", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-347" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-347" + } + ] } ], "configurations": [ diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25095.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25095.json index c918b671c5b..6b73acebe4c 100644 --- a/CVE-2018/CVE-2018-250xx/CVE-2018-25095.json +++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25095.json @@ -2,7 +2,7 @@ "id": "CVE-2018-25095", "sourceIdentifier": "contact@wpscan.com", "published": "2024-01-08T19:15:08.377", - "lastModified": "2024-11-21T04:03:32.950", + "lastModified": "2025-06-03T15:15:22.710", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2019/CVE-2019-99xx/CVE-2019-9978.json b/CVE-2019/CVE-2019-99xx/CVE-2019-9978.json index ac93945379d..b2cfb26d2e1 100644 --- a/CVE-2019/CVE-2019-99xx/CVE-2019-9978.json +++ b/CVE-2019/CVE-2019-99xx/CVE-2019-9978.json @@ -2,8 +2,8 @@ "id": "CVE-2019-9978", "sourceIdentifier": "cve@mitre.org", "published": "2019-03-24T15:29:00.243", - "lastModified": "2025-02-28T18:06:20.323", - "vulnStatus": "Analyzed", + "lastModified": "2025-06-03T15:15:22.957", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -232,6 +232,10 @@ "VDB Entry" ] }, + { + "url": "http://seclists.org/fulldisclosure/2025/Jun/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, { "url": "https://blog.sucuri.net/2019/03/zero-day-stored-xss-in-social-warfare.html", "source": "af854a3a-2127-422b-91ae-364da2661108", diff --git a/CVE-2020/CVE-2020-161xx/CVE-2020-16165.json b/CVE-2020/CVE-2020-161xx/CVE-2020-16165.json index cb20147ae5f..41664e39a83 100644 --- a/CVE-2020/CVE-2020-161xx/CVE-2020-16165.json +++ b/CVE-2020/CVE-2020-161xx/CVE-2020-16165.json @@ -2,7 +2,7 @@ "id": "CVE-2020-16165", "sourceIdentifier": "cve@mitre.org", "published": "2020-07-30T20:15:12.737", - "lastModified": "2024-11-21T05:06:53.433", + "lastModified": "2025-06-03T14:38:14.490", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -85,9 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:springblade_project:springblade:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:bladex:springblade:*:*:*:*:*:*:*:*", "versionEndIncluding": "2.7.1", - "matchCriteriaId": "376B2181-19A7-4CDA-8254-6741D0DFB32D" + "matchCriteriaId": "22E5343D-BCA8-4462-846D-92A564DAE826" } ] } diff --git a/CVE-2020/CVE-2020-266xx/CVE-2020-26623.json b/CVE-2020/CVE-2020-266xx/CVE-2020-26623.json index 6f36746691c..ed59ed6e9d9 100644 --- a/CVE-2020/CVE-2020-266xx/CVE-2020-26623.json +++ b/CVE-2020/CVE-2020-266xx/CVE-2020-26623.json @@ -2,7 +2,7 @@ "id": "CVE-2020-26623", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-02T22:15:07.777", - "lastModified": "2024-11-21T05:20:09.427", + "lastModified": "2025-06-03T15:15:23.283", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 2.5 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 3.8, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 2.5 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-266xx/CVE-2020-26627.json b/CVE-2020/CVE-2020-266xx/CVE-2020-26627.json index e1c6965cfb1..ceed56c2cc0 100644 --- a/CVE-2020/CVE-2020-266xx/CVE-2020-26627.json +++ b/CVE-2020/CVE-2020-266xx/CVE-2020-26627.json @@ -2,7 +2,7 @@ "id": "CVE-2020-26627", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-10T09:15:43.790", - "lastModified": "2024-11-21T05:20:09.853", + "lastModified": "2025-06-03T15:15:23.537", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-33xx/CVE-2022-3328.json b/CVE-2022/CVE-2022-33xx/CVE-2022-3328.json index 8ffbf65781b..2386583432c 100644 --- a/CVE-2022/CVE-2022-33xx/CVE-2022-3328.json +++ b/CVE-2022/CVE-2022-33xx/CVE-2022-3328.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3328", "sourceIdentifier": "security@ubuntu.com", "published": "2024-01-08T18:15:45.233", - "lastModified": "2024-11-21T07:19:18.427", + "lastModified": "2025-06-03T15:15:24.243", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-362" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-390xx/CVE-2022-39009.json b/CVE-2022/CVE-2022-390xx/CVE-2022-39009.json index a26e8d9fc72..9a65761279f 100644 --- a/CVE-2022/CVE-2022-390xx/CVE-2022-39009.json +++ b/CVE-2022/CVE-2022-390xx/CVE-2022-39009.json @@ -2,7 +2,7 @@ "id": "CVE-2022-39009", "sourceIdentifier": "psirt@huawei.com", "published": "2022-09-16T18:15:18.250", - "lastModified": "2024-11-21T07:17:22.037", + "lastModified": "2025-06-03T15:15:23.920", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-287" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-485xx/CVE-2022-48504.json b/CVE-2022/CVE-2022-485xx/CVE-2022-48504.json index bcad5cd02a5..b220c8231c7 100644 --- a/CVE-2022/CVE-2022-485xx/CVE-2022-48504.json +++ b/CVE-2022/CVE-2022-485xx/CVE-2022-48504.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48504", "sourceIdentifier": "product-security@apple.com", "published": "2024-01-10T22:15:47.563", - "lastModified": "2024-11-21T07:33:27.350", + "lastModified": "2025-06-03T15:15:24.477", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48620.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48620.json index c26edf834e1..49d4b1f7d39 100644 --- a/CVE-2022/CVE-2022-486xx/CVE-2022-48620.json +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48620.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48620", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-12T04:15:08.123", - "lastModified": "2024-11-21T07:33:37.200", + "lastModified": "2025-06-03T14:15:27.857", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-269xx/CVE-2023-26998.json b/CVE-2023/CVE-2023-269xx/CVE-2023-26998.json index 833c452e0e5..193916c835b 100644 --- a/CVE-2023/CVE-2023-269xx/CVE-2023-26998.json +++ b/CVE-2023/CVE-2023-269xx/CVE-2023-26998.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26998", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-09T02:15:43.960", - "lastModified": "2024-11-21T07:52:09.940", + "lastModified": "2025-06-03T15:15:24.743", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-281xx/CVE-2023-28185.json b/CVE-2023/CVE-2023-281xx/CVE-2023-28185.json index 668c1574de0..b56eceb21ce 100644 --- a/CVE-2023/CVE-2023-281xx/CVE-2023-28185.json +++ b/CVE-2023/CVE-2023-281xx/CVE-2023-28185.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28185", "sourceIdentifier": "product-security@apple.com", "published": "2024-01-10T22:15:47.803", - "lastModified": "2024-11-21T07:54:33.430", + "lastModified": "2025-06-03T15:15:25.450", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-190" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-299xx/CVE-2023-29962.json b/CVE-2023/CVE-2023-299xx/CVE-2023-29962.json index 0eb69322f68..792603c39a1 100644 --- a/CVE-2023/CVE-2023-299xx/CVE-2023-29962.json +++ b/CVE-2023/CVE-2023-299xx/CVE-2023-29962.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29962", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-04T06:15:45.323", - "lastModified": "2024-11-21T07:57:42.377", + "lastModified": "2025-06-03T15:15:25.857", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-300xx/CVE-2023-30014.json b/CVE-2023/CVE-2023-300xx/CVE-2023-30014.json index 5bff554b390..fba531c80d0 100644 --- a/CVE-2023/CVE-2023-300xx/CVE-2023-30014.json +++ b/CVE-2023/CVE-2023-300xx/CVE-2023-30014.json @@ -2,7 +2,7 @@ "id": "CVE-2023-30014", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-12T09:15:43.927", - "lastModified": "2024-11-21T07:59:43.863", + "lastModified": "2025-06-03T14:15:28.273", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-300xx/CVE-2023-30015.json b/CVE-2023/CVE-2023-300xx/CVE-2023-30015.json index 6fa41d8a4fa..5d8407b2142 100644 --- a/CVE-2023/CVE-2023-300xx/CVE-2023-30015.json +++ b/CVE-2023/CVE-2023-300xx/CVE-2023-30015.json @@ -2,7 +2,7 @@ "id": "CVE-2023-30015", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-12T09:15:44.040", - "lastModified": "2024-11-21T07:59:44.037", + "lastModified": "2025-06-03T14:15:28.520", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-324xx/CVE-2023-32424.json b/CVE-2023/CVE-2023-324xx/CVE-2023-32424.json index a8e008d61f1..2cdb22d0506 100644 --- a/CVE-2023/CVE-2023-324xx/CVE-2023-32424.json +++ b/CVE-2023/CVE-2023-324xx/CVE-2023-32424.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32424", "sourceIdentifier": "product-security@apple.com", "published": "2024-01-10T22:15:48.087", - "lastModified": "2024-11-21T08:03:19.700", + "lastModified": "2025-06-03T15:15:26.780", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-328xx/CVE-2023-32872.json b/CVE-2023/CVE-2023-328xx/CVE-2023-32872.json index 90ba7ebac6f..2005ed6897b 100644 --- a/CVE-2023/CVE-2023-328xx/CVE-2023-32872.json +++ b/CVE-2023/CVE-2023-328xx/CVE-2023-32872.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32872", "sourceIdentifier": "security@mediatek.com", "published": "2024-01-02T03:15:07.790", - "lastModified": "2024-11-21T08:04:14.590", + "lastModified": "2025-06-03T15:15:27.703", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-328xx/CVE-2023-32876.json b/CVE-2023/CVE-2023-328xx/CVE-2023-32876.json index 33417b265f5..923088cbba1 100644 --- a/CVE-2023/CVE-2023-328xx/CVE-2023-32876.json +++ b/CVE-2023/CVE-2023-328xx/CVE-2023-32876.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32876", "sourceIdentifier": "security@mediatek.com", "published": "2024-01-02T03:15:07.937", - "lastModified": "2024-11-21T08:04:15.130", + "lastModified": "2025-06-03T15:15:28.200", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-328xx/CVE-2023-32883.json b/CVE-2023/CVE-2023-328xx/CVE-2023-32883.json index 1970d6f77e5..0ce029be4db 100644 --- a/CVE-2023/CVE-2023-328xx/CVE-2023-32883.json +++ b/CVE-2023/CVE-2023-328xx/CVE-2023-32883.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32883", "sourceIdentifier": "security@mediatek.com", "published": "2024-01-02T03:15:08.260", - "lastModified": "2024-11-21T08:04:15.983", + "lastModified": "2025-06-03T15:15:30.633", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-328xx/CVE-2023-32884.json b/CVE-2023/CVE-2023-328xx/CVE-2023-32884.json index f41c3f321b7..d252a0451d6 100644 --- a/CVE-2023/CVE-2023-328xx/CVE-2023-32884.json +++ b/CVE-2023/CVE-2023-328xx/CVE-2023-32884.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32884", "sourceIdentifier": "security@mediatek.com", "published": "2024-01-02T03:15:08.303", - "lastModified": "2024-11-21T08:04:16.120", + "lastModified": "2025-06-03T15:15:31.293", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-119" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-328xx/CVE-2023-32886.json b/CVE-2023/CVE-2023-328xx/CVE-2023-32886.json index 3fe58384920..ae15eadeb23 100644 --- a/CVE-2023/CVE-2023-328xx/CVE-2023-32886.json +++ b/CVE-2023/CVE-2023-328xx/CVE-2023-32886.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32886", "sourceIdentifier": "security@mediatek.com", "published": "2024-01-02T03:15:08.400", - "lastModified": "2024-11-21T08:04:16.400", + "lastModified": "2025-06-03T15:15:31.613", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-340xx/CVE-2023-34061.json b/CVE-2023/CVE-2023-340xx/CVE-2023-34061.json index 94e730200e3..4317b029c49 100644 --- a/CVE-2023/CVE-2023-340xx/CVE-2023-34061.json +++ b/CVE-2023/CVE-2023-340xx/CVE-2023-34061.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34061", "sourceIdentifier": "security@vmware.com", "published": "2024-01-12T07:15:11.747", - "lastModified": "2024-11-21T08:06:30.063", + "lastModified": "2025-06-03T14:15:29.037", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-400" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-343xx/CVE-2023-34327.json b/CVE-2023/CVE-2023-343xx/CVE-2023-34327.json index 773fafdc512..5aa6643a7f4 100644 --- a/CVE-2023/CVE-2023-343xx/CVE-2023-34327.json +++ b/CVE-2023/CVE-2023-343xx/CVE-2023-34327.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34327", "sourceIdentifier": "security@xen.org", "published": "2024-01-05T17:15:08.683", - "lastModified": "2024-11-21T08:07:01.247", + "lastModified": "2025-06-03T15:15:33.647", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-343xx/CVE-2023-34328.json b/CVE-2023/CVE-2023-343xx/CVE-2023-34328.json index bba859df3e4..5eda08e3b97 100644 --- a/CVE-2023/CVE-2023-343xx/CVE-2023-34328.json +++ b/CVE-2023/CVE-2023-343xx/CVE-2023-34328.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34328", "sourceIdentifier": "security@xen.org", "published": "2024-01-05T17:15:08.730", - "lastModified": "2024-11-21T08:07:01.367", + "lastModified": "2025-06-03T15:15:34.270", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-376xx/CVE-2023-37607.json b/CVE-2023/CVE-2023-376xx/CVE-2023-37607.json index 5fb878c3336..f073d31bf1c 100644 --- a/CVE-2023/CVE-2023-376xx/CVE-2023-37607.json +++ b/CVE-2023/CVE-2023-376xx/CVE-2023-37607.json @@ -2,7 +2,7 @@ "id": "CVE-2023-37607", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-03T14:15:08.747", - "lastModified": "2024-11-21T08:12:01.500", + "lastModified": "2025-06-03T15:15:36.683", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-376xx/CVE-2023-37608.json b/CVE-2023/CVE-2023-376xx/CVE-2023-37608.json index 5b92ff464f9..f5a9e0d4f8f 100644 --- a/CVE-2023/CVE-2023-376xx/CVE-2023-37608.json +++ b/CVE-2023/CVE-2023-376xx/CVE-2023-37608.json @@ -2,7 +2,7 @@ "id": "CVE-2023-37608", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-03T13:15:08.393", - "lastModified": "2024-11-21T08:12:01.683", + "lastModified": "2025-06-03T15:15:37.517", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-798" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-376xx/CVE-2023-37644.json b/CVE-2023/CVE-2023-376xx/CVE-2023-37644.json index 22a30f82c39..131c6105f64 100644 --- a/CVE-2023/CVE-2023-376xx/CVE-2023-37644.json +++ b/CVE-2023/CVE-2023-376xx/CVE-2023-37644.json @@ -2,7 +2,7 @@ "id": "CVE-2023-37644", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-11T08:15:35.737", - "lastModified": "2024-11-21T08:12:03.850", + "lastModified": "2025-06-03T15:15:38.063", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38607.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38607.json index c07e7332dac..ddd4ea0465c 100644 --- a/CVE-2023/CVE-2023-386xx/CVE-2023-38607.json +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38607.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38607", "sourceIdentifier": "product-security@apple.com", "published": "2024-01-10T22:15:48.310", - "lastModified": "2024-11-21T08:13:55.797", + "lastModified": "2025-06-03T15:15:38.327", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38612.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38612.json index 9ad832e7434..0c243f38d7a 100644 --- a/CVE-2023/CVE-2023-386xx/CVE-2023-38612.json +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38612.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38612", "sourceIdentifier": "product-security@apple.com", "published": "2024-01-10T22:15:48.403", - "lastModified": "2024-11-21T08:13:56.393", + "lastModified": "2025-06-03T15:15:38.607", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 } ] }, diff --git a/CVE-2023/CVE-2023-388xx/CVE-2023-38827.json b/CVE-2023/CVE-2023-388xx/CVE-2023-38827.json index 5b754bb0602..7dfcb8852b9 100644 --- a/CVE-2023/CVE-2023-388xx/CVE-2023-38827.json +++ b/CVE-2023/CVE-2023-388xx/CVE-2023-38827.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38827", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-09T22:15:43.263", - "lastModified": "2024-11-21T08:14:14.737", + "lastModified": "2025-06-03T15:15:39.060", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-393xx/CVE-2023-39336.json b/CVE-2023/CVE-2023-393xx/CVE-2023-39336.json index 3edd09273f4..76a6205e248 100644 --- a/CVE-2023/CVE-2023-393xx/CVE-2023-39336.json +++ b/CVE-2023/CVE-2023-393xx/CVE-2023-39336.json @@ -2,7 +2,7 @@ "id": "CVE-2023-39336", "sourceIdentifier": "support@hackerone.com", "published": "2024-01-09T02:15:44.207", - "lastModified": "2024-11-21T08:15:11.080", + "lastModified": "2025-06-03T15:15:39.337", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -71,6 +71,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40433.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40433.json index 1892f6c629e..0bce8d98b54 100644 --- a/CVE-2023/CVE-2023-404xx/CVE-2023-40433.json +++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40433.json @@ -2,7 +2,7 @@ "id": "CVE-2023-40433", "sourceIdentifier": "product-security@apple.com", "published": "2024-01-10T22:15:48.787", - "lastModified": "2024-11-21T08:19:27.070", + "lastModified": "2025-06-03T15:15:39.577", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40437.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40437.json index 5ba3b822b3b..1ddcc313928 100644 --- a/CVE-2023/CVE-2023-404xx/CVE-2023-40437.json +++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40437.json @@ -2,7 +2,7 @@ "id": "CVE-2023-40437", "sourceIdentifier": "product-security@apple.com", "published": "2024-01-10T22:15:48.827", - "lastModified": "2024-11-21T08:19:27.590", + "lastModified": "2025-06-03T15:15:39.763", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-405xx/CVE-2023-40529.json b/CVE-2023/CVE-2023-405xx/CVE-2023-40529.json index ec6647f7897..800cc24676e 100644 --- a/CVE-2023/CVE-2023-405xx/CVE-2023-40529.json +++ b/CVE-2023/CVE-2023-405xx/CVE-2023-40529.json @@ -2,7 +2,7 @@ "id": "CVE-2023-40529", "sourceIdentifier": "product-security@apple.com", "published": "2024-01-10T22:15:48.970", - "lastModified": "2024-11-21T08:19:39.517", + "lastModified": "2025-06-03T15:15:40.000", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 2.4, + "baseSeverity": "LOW", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 } ] }, diff --git a/CVE-2023/CVE-2023-415xx/CVE-2023-41591.json b/CVE-2023/CVE-2023-415xx/CVE-2023-41591.json index f8b26da20e1..d7293bcb6f5 100644 --- a/CVE-2023/CVE-2023-415xx/CVE-2023-41591.json +++ b/CVE-2023/CVE-2023-415xx/CVE-2023-41591.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41591", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-29T18:15:23.040", - "lastModified": "2025-05-30T16:31:03.107", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-03T15:36:09.540", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:opennetworking:onos:2.7.0:-:*:*:*:*:*:*", + "matchCriteriaId": "C53EDA78-BE22-49C3-9610-EEBAC76C1632" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/kjw6855/9764e3f51b89119473e4d2c4f64dca27", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://wiki.onosproject.org/pages/viewpage.action?pageId=16122675", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42828.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42828.json index e3024267562..62cb56e389f 100644 --- a/CVE-2023/CVE-2023-428xx/CVE-2023-42828.json +++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42828.json @@ -2,7 +2,7 @@ "id": "CVE-2023-42828", "sourceIdentifier": "product-security@apple.com", "published": "2024-01-10T22:15:49.757", - "lastModified": "2024-11-21T08:23:17.990", + "lastModified": "2025-06-03T15:15:40.397", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42831.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42831.json index ccf3e41258d..2208da5b4bf 100644 --- a/CVE-2023/CVE-2023-428xx/CVE-2023-42831.json +++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42831.json @@ -2,7 +2,7 @@ "id": "CVE-2023-42831", "sourceIdentifier": "product-security@apple.com", "published": "2024-01-10T22:15:49.903", - "lastModified": "2024-11-21T08:23:18.350", + "lastModified": "2025-06-03T15:15:40.560", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42866.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42866.json index 3764cefcafd..851d737206d 100644 --- a/CVE-2023/CVE-2023-428xx/CVE-2023-42866.json +++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42866.json @@ -2,7 +2,7 @@ "id": "CVE-2023-42866", "sourceIdentifier": "product-security@apple.com", "published": "2024-01-10T22:15:50.143", - "lastModified": "2024-11-21T08:23:23.730", + "lastModified": "2025-06-03T15:15:40.753", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42872.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42872.json index 29b1394ed42..bb9c95fb43d 100644 --- a/CVE-2023/CVE-2023-428xx/CVE-2023-42872.json +++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42872.json @@ -2,7 +2,7 @@ "id": "CVE-2023-42872", "sourceIdentifier": "product-security@apple.com", "published": "2024-01-10T22:15:50.327", - "lastModified": "2024-11-21T08:23:24.257", + "lastModified": "2025-06-03T15:15:41.320", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-429xx/CVE-2023-42933.json b/CVE-2023/CVE-2023-429xx/CVE-2023-42933.json index c763f224144..0003d4b1a8b 100644 --- a/CVE-2023/CVE-2023-429xx/CVE-2023-42933.json +++ b/CVE-2023/CVE-2023-429xx/CVE-2023-42933.json @@ -2,7 +2,7 @@ "id": "CVE-2023-42933", "sourceIdentifier": "product-security@apple.com", "published": "2024-01-10T22:15:50.460", - "lastModified": "2024-11-21T08:23:32.693", + "lastModified": "2025-06-03T15:15:41.490", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-42xx/CVE-2023-4248.json b/CVE-2023/CVE-2023-42xx/CVE-2023-4248.json index 5318e4c0eae..192d945603f 100644 --- a/CVE-2023/CVE-2023-42xx/CVE-2023-4248.json +++ b/CVE-2023/CVE-2023-42xx/CVE-2023-4248.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4248", "sourceIdentifier": "security@wordfence.com", "published": "2024-01-11T09:15:46.613", - "lastModified": "2024-11-21T08:34:42.623", + "lastModified": "2025-06-03T14:15:32.177", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-434xx/CVE-2023-43449.json b/CVE-2023/CVE-2023-434xx/CVE-2023-43449.json index 3bad7766f6a..c4dc5786f2b 100644 --- a/CVE-2023/CVE-2023-434xx/CVE-2023-43449.json +++ b/CVE-2023/CVE-2023-434xx/CVE-2023-43449.json @@ -2,7 +2,7 @@ "id": "CVE-2023-43449", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-16T02:15:28.420", - "lastModified": "2024-11-21T08:24:05.680", + "lastModified": "2025-06-03T14:15:29.620", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-94" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-438xx/CVE-2023-43842.json b/CVE-2023/CVE-2023-438xx/CVE-2023-43842.json index 534314c0ada..6f989d7bb86 100644 --- a/CVE-2023/CVE-2023-438xx/CVE-2023-43842.json +++ b/CVE-2023/CVE-2023-438xx/CVE-2023-43842.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43842", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-28T19:15:09.210", - "lastModified": "2024-11-21T08:24:52.290", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-03T15:23:29.073", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,53 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:aten:pe6208_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.3.228", + "versionEndExcluding": "2.4.239", + "matchCriteriaId": "CDCBDF8A-295F-4E24-B7ED-C2D8C229B2D7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:aten:pe6208:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5D32AAB9-F426-4F0C-8705-04D0B89D52D1" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/setersora/pe6208", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/setersora/pe6208", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-438xx/CVE-2023-43843.json b/CVE-2023/CVE-2023-438xx/CVE-2023-43843.json index f2616cc0ae1..b4c46b034f7 100644 --- a/CVE-2023/CVE-2023-438xx/CVE-2023-43843.json +++ b/CVE-2023/CVE-2023-438xx/CVE-2023-43843.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43843", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-28T19:15:09.273", - "lastModified": "2024-11-21T08:24:52.487", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-03T15:23:39.380", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,53 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:aten:pe6208_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.3.228", + "versionEndExcluding": "2.4.239", + "matchCriteriaId": "CDCBDF8A-295F-4E24-B7ED-C2D8C229B2D7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:aten:pe6208:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5D32AAB9-F426-4F0C-8705-04D0B89D52D1" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/setersora/pe6208", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/setersora/pe6208", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-455xx/CVE-2023-45559.json b/CVE-2023/CVE-2023-455xx/CVE-2023-45559.json index 643ebb5770d..a5d902fda52 100644 --- a/CVE-2023/CVE-2023-455xx/CVE-2023-45559.json +++ b/CVE-2023/CVE-2023-455xx/CVE-2023-45559.json @@ -2,7 +2,7 @@ "id": "CVE-2023-45559", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-03T15:15:09.670", - "lastModified": "2024-11-21T08:26:58.190", + "lastModified": "2025-06-03T15:15:41.780", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 4.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 } ] }, diff --git a/CVE-2023/CVE-2023-457xx/CVE-2023-45722.json b/CVE-2023/CVE-2023-457xx/CVE-2023-45722.json index a1d42528813..01656a68fd3 100644 --- a/CVE-2023/CVE-2023-457xx/CVE-2023-45722.json +++ b/CVE-2023/CVE-2023-457xx/CVE-2023-45722.json @@ -2,7 +2,7 @@ "id": "CVE-2023-45722", "sourceIdentifier": "psirt@hcl.com", "published": "2024-01-03T03:15:09.200", - "lastModified": "2024-11-21T08:27:15.667", + "lastModified": "2025-06-03T15:15:41.983", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46308.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46308.json index ef8dcb417fd..ed21240ea7d 100644 --- a/CVE-2023/CVE-2023-463xx/CVE-2023-46308.json +++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46308.json @@ -2,7 +2,7 @@ "id": "CVE-2023-46308", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-03T05:15:11.360", - "lastModified": "2024-11-21T08:28:16.600", + "lastModified": "2025-06-03T15:15:42.150", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-1321" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46474.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46474.json index a328e0f4229..b435fcd9281 100644 --- a/CVE-2023/CVE-2023-464xx/CVE-2023-46474.json +++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46474.json @@ -2,7 +2,7 @@ "id": "CVE-2023-46474", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-11T22:15:45.713", - "lastModified": "2024-11-21T08:28:33.820", + "lastModified": "2025-06-03T15:15:42.350", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-467xx/CVE-2023-46749.json b/CVE-2023/CVE-2023-467xx/CVE-2023-46749.json index c060a221499..b85d4d43be9 100644 --- a/CVE-2023/CVE-2023-467xx/CVE-2023-46749.json +++ b/CVE-2023/CVE-2023-467xx/CVE-2023-46749.json @@ -2,7 +2,7 @@ "id": "CVE-2023-46749", "sourceIdentifier": "security@apache.org", "published": "2024-01-15T10:15:26.380", - "lastModified": "2024-11-21T08:29:13.427", + "lastModified": "2025-06-03T14:15:29.913", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-468xx/CVE-2023-46836.json b/CVE-2023/CVE-2023-468xx/CVE-2023-46836.json index 3bebf19d383..287087c6c69 100644 --- a/CVE-2023/CVE-2023-468xx/CVE-2023-46836.json +++ b/CVE-2023/CVE-2023-468xx/CVE-2023-46836.json @@ -2,7 +2,7 @@ "id": "CVE-2023-46836", "sourceIdentifier": "security@xen.org", "published": "2024-01-05T17:15:11.197", - "lastModified": "2024-11-21T08:29:23.713", + "lastModified": "2025-06-03T15:15:42.700", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.0, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-469xx/CVE-2023-46942.json b/CVE-2023/CVE-2023-469xx/CVE-2023-46942.json index ec74b2d2793..952d1e8c37c 100644 --- a/CVE-2023/CVE-2023-469xx/CVE-2023-46942.json +++ b/CVE-2023/CVE-2023-469xx/CVE-2023-46942.json @@ -2,7 +2,7 @@ "id": "CVE-2023-46942", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-13T02:15:07.153", - "lastModified": "2024-11-21T08:29:31.170", + "lastModified": "2025-06-03T14:15:30.177", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-287" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-474xx/CVE-2023-47460.json b/CVE-2023/CVE-2023-474xx/CVE-2023-47460.json index 34116d35ac5..c3f27b73bae 100644 --- a/CVE-2023/CVE-2023-474xx/CVE-2023-47460.json +++ b/CVE-2023/CVE-2023-474xx/CVE-2023-47460.json @@ -2,7 +2,7 @@ "id": "CVE-2023-47460", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-16T01:15:34.327", - "lastModified": "2024-11-21T08:30:18.923", + "lastModified": "2025-06-03T14:15:30.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-478xx/CVE-2023-47890.json b/CVE-2023/CVE-2023-478xx/CVE-2023-47890.json index ca2c494030b..70716d06495 100644 --- a/CVE-2023/CVE-2023-478xx/CVE-2023-47890.json +++ b/CVE-2023/CVE-2023-478xx/CVE-2023-47890.json @@ -2,7 +2,7 @@ "id": "CVE-2023-47890", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-08T20:15:44.453", - "lastModified": "2024-11-21T08:30:57.770", + "lastModified": "2025-06-03T15:15:43.023", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-479xx/CVE-2023-47994.json b/CVE-2023/CVE-2023-479xx/CVE-2023-47994.json index deb9181b531..91892c12d93 100644 --- a/CVE-2023/CVE-2023-479xx/CVE-2023-47994.json +++ b/CVE-2023/CVE-2023-479xx/CVE-2023-47994.json @@ -2,7 +2,7 @@ "id": "CVE-2023-47994", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-09T23:15:09.583", - "lastModified": "2024-11-21T08:30:58.440", + "lastModified": "2025-06-03T15:15:43.230", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-190" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-479xx/CVE-2023-47997.json b/CVE-2023/CVE-2023-479xx/CVE-2023-47997.json index d6f9b3d3205..3c562f00c6a 100644 --- a/CVE-2023/CVE-2023-479xx/CVE-2023-47997.json +++ b/CVE-2023/CVE-2023-479xx/CVE-2023-47997.json @@ -2,7 +2,7 @@ "id": "CVE-2023-47997", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-10T00:15:45.463", - "lastModified": "2024-11-21T08:30:58.883", + "lastModified": "2025-06-03T15:15:43.447", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-835" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-835" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-482xx/CVE-2023-48261.json b/CVE-2023/CVE-2023-482xx/CVE-2023-48261.json index f992eace1f4..49b02f5ebe1 100644 --- a/CVE-2023/CVE-2023-482xx/CVE-2023-48261.json +++ b/CVE-2023/CVE-2023-482xx/CVE-2023-48261.json @@ -2,7 +2,7 @@ "id": "CVE-2023-48261", "sourceIdentifier": "psirt@bosch.com", "published": "2024-01-10T13:15:47.383", - "lastModified": "2024-11-21T08:31:21.357", + "lastModified": "2025-06-03T15:15:43.660", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -79,6 +79,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-492xx/CVE-2023-49255.json b/CVE-2023/CVE-2023-492xx/CVE-2023-49255.json index 26f8bde79b2..b99e47f61e1 100644 --- a/CVE-2023/CVE-2023-492xx/CVE-2023-49255.json +++ b/CVE-2023/CVE-2023-492xx/CVE-2023-49255.json @@ -2,7 +2,7 @@ "id": "CVE-2023-49255", "sourceIdentifier": "cvd@cert.pl", "published": "2024-01-12T15:15:09.083", - "lastModified": "2024-11-21T08:33:07.887", + "lastModified": "2025-06-03T14:15:31.060", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-492xx/CVE-2023-49258.json b/CVE-2023/CVE-2023-492xx/CVE-2023-49258.json index 0ddc956de72..1a84afd227a 100644 --- a/CVE-2023/CVE-2023-492xx/CVE-2023-49258.json +++ b/CVE-2023/CVE-2023-492xx/CVE-2023-49258.json @@ -2,7 +2,7 @@ "id": "CVE-2023-49258", "sourceIdentifier": "cvd@cert.pl", "published": "2024-01-12T15:15:09.307", - "lastModified": "2024-11-21T08:33:08.297", + "lastModified": "2025-06-03T14:15:31.327", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, diff --git a/CVE-2023/CVE-2023-492xx/CVE-2023-49260.json b/CVE-2023/CVE-2023-492xx/CVE-2023-49260.json index 05f9d474210..fb0dc33241e 100644 --- a/CVE-2023/CVE-2023-492xx/CVE-2023-49260.json +++ b/CVE-2023/CVE-2023-492xx/CVE-2023-49260.json @@ -2,7 +2,7 @@ "id": "CVE-2023-49260", "sourceIdentifier": "cvd@cert.pl", "published": "2024-01-12T15:15:09.463", - "lastModified": "2024-11-21T08:33:08.603", + "lastModified": "2025-06-03T14:15:31.547", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, diff --git a/CVE-2023/CVE-2023-492xx/CVE-2023-49262.json b/CVE-2023/CVE-2023-492xx/CVE-2023-49262.json index 3406634c4bf..bdca355325a 100644 --- a/CVE-2023/CVE-2023-492xx/CVE-2023-49262.json +++ b/CVE-2023/CVE-2023-492xx/CVE-2023-49262.json @@ -2,7 +2,7 @@ "id": "CVE-2023-49262", "sourceIdentifier": "cvd@cert.pl", "published": "2024-01-12T15:15:09.593", - "lastModified": "2024-11-21T08:33:08.980", + "lastModified": "2025-06-03T14:15:31.757", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-493xx/CVE-2023-49394.json b/CVE-2023/CVE-2023-493xx/CVE-2023-49394.json index cb1d304a6cc..114ee7af6ea 100644 --- a/CVE-2023/CVE-2023-493xx/CVE-2023-49394.json +++ b/CVE-2023/CVE-2023-493xx/CVE-2023-49394.json @@ -2,7 +2,7 @@ "id": "CVE-2023-49394", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-10T09:15:44.037", - "lastModified": "2024-11-21T08:33:20.060", + "lastModified": "2025-06-03T15:15:43.960", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-601" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-494xx/CVE-2023-49471.json b/CVE-2023/CVE-2023-494xx/CVE-2023-49471.json index 43f50a69a64..68a5dc59332 100644 --- a/CVE-2023/CVE-2023-494xx/CVE-2023-49471.json +++ b/CVE-2023/CVE-2023-494xx/CVE-2023-49471.json @@ -2,7 +2,7 @@ "id": "CVE-2023-49471", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-10T09:15:44.140", - "lastModified": "2024-11-21T08:33:27.343", + "lastModified": "2025-06-03T15:15:44.147", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-918" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-495xx/CVE-2023-49501.json b/CVE-2023/CVE-2023-495xx/CVE-2023-49501.json index 2014861c6cb..dea6b56217c 100644 --- a/CVE-2023/CVE-2023-495xx/CVE-2023-49501.json +++ b/CVE-2023/CVE-2023-495xx/CVE-2023-49501.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49501", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-19T17:15:51.787", - "lastModified": "2024-11-21T08:33:29.360", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T14:03:02.550", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,54 +51,136 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9F9E88B2-A11F-475E-A456-538734144487" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", + "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/FFmpeg/FFmpeg", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://trac.ffmpeg.org/ticket/10686", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://trac.ffmpeg.org/ticket/10686#no1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://github.com/FFmpeg/FFmpeg", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://trac.ffmpeg.org/ticket/10686", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://trac.ffmpeg.org/ticket/10686#no1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-495xx/CVE-2023-49502.json b/CVE-2023/CVE-2023-495xx/CVE-2023-49502.json index b4698b8bfd4..ab169fbf93b 100644 --- a/CVE-2023/CVE-2023-495xx/CVE-2023-49502.json +++ b/CVE-2023/CVE-2023-495xx/CVE-2023-49502.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49502", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-19T17:15:51.850", - "lastModified": "2024-11-21T08:33:29.580", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T14:03:10.227", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,46 +51,122 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1", + "versionEndExcluding": "7.0", + "matchCriteriaId": "C3CED193-DA60-4F42-BC08-EF14E700C207" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", + "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/FFmpeg/FFmpeg", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://trac.ffmpeg.org/ticket/10688", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://github.com/FFmpeg/FFmpeg", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://trac.ffmpeg.org/ticket/10688", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-495xx/CVE-2023-49553.json b/CVE-2023/CVE-2023-495xx/CVE-2023-49553.json index c54bbe67299..ddcd7227024 100644 --- a/CVE-2023/CVE-2023-495xx/CVE-2023-49553.json +++ b/CVE-2023/CVE-2023-495xx/CVE-2023-49553.json @@ -2,7 +2,7 @@ "id": "CVE-2023-49553", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-02T23:15:12.333", - "lastModified": "2024-11-21T08:33:32.833", + "lastModified": "2025-06-03T15:15:44.347", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-495xx/CVE-2023-49556.json b/CVE-2023/CVE-2023-495xx/CVE-2023-49556.json index c77050f6706..c0de2d8e339 100644 --- a/CVE-2023/CVE-2023-495xx/CVE-2023-49556.json +++ b/CVE-2023/CVE-2023-495xx/CVE-2023-49556.json @@ -2,7 +2,7 @@ "id": "CVE-2023-49556", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-03T00:15:09.090", - "lastModified": "2024-11-21T08:33:33.360", + "lastModified": "2025-06-03T15:15:44.527", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-495xx/CVE-2023-49558.json b/CVE-2023/CVE-2023-495xx/CVE-2023-49558.json index ef9f10ca036..0c906424df7 100644 --- a/CVE-2023/CVE-2023-495xx/CVE-2023-49558.json +++ b/CVE-2023/CVE-2023-495xx/CVE-2023-49558.json @@ -2,7 +2,7 @@ "id": "CVE-2023-49558", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-03T00:15:09.203", - "lastModified": "2024-11-21T08:33:33.667", + "lastModified": "2025-06-03T15:15:44.710", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4960.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4960.json index 2ca67d24384..5da9a35f344 100644 --- a/CVE-2023/CVE-2023-49xx/CVE-2023-4960.json +++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4960.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4960", "sourceIdentifier": "security@wordfence.com", "published": "2024-01-11T09:15:46.930", - "lastModified": "2024-11-21T08:36:20.780", + "lastModified": "2025-06-03T14:15:32.713", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-500xx/CVE-2023-50007.json b/CVE-2023/CVE-2023-500xx/CVE-2023-50007.json index 32444c9b03e..d012e2a6d6e 100644 --- a/CVE-2023/CVE-2023-500xx/CVE-2023-50007.json +++ b/CVE-2023/CVE-2023-500xx/CVE-2023-50007.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50007", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-19T17:15:51.957", - "lastModified": "2024-11-21T08:36:26.483", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T14:03:20.290", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,46 +51,122 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1", + "versionEndExcluding": "7.0", + "matchCriteriaId": "C3CED193-DA60-4F42-BC08-EF14E700C207" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", + "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/FFmpeg/FFmpeg/commit/b1942734c7cbcdc9034034373abcc9ecb9644c47", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://trac.ffmpeg.org/ticket/10700", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://github.com/FFmpeg/FFmpeg/commit/b1942734c7cbcdc9034034373abcc9ecb9644c47", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://trac.ffmpeg.org/ticket/10700", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-500xx/CVE-2023-50008.json b/CVE-2023/CVE-2023-500xx/CVE-2023-50008.json index 77b05fe9e8c..2273e96e359 100644 --- a/CVE-2023/CVE-2023-500xx/CVE-2023-50008.json +++ b/CVE-2023/CVE-2023-500xx/CVE-2023-50008.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50008", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-19T17:15:52.013", - "lastModified": "2024-11-21T08:36:26.723", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T14:03:27.343", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,46 +51,122 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1", + "versionEndExcluding": "7.0", + "matchCriteriaId": "C3CED193-DA60-4F42-BC08-EF14E700C207" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", + "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/FFmpeg/FFmpeg/commit/5f87a68cf70dafeab2fb89b42e41a4c29053b89b", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://trac.ffmpeg.org/ticket/10701", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://github.com/FFmpeg/FFmpeg/commit/5f87a68cf70dafeab2fb89b42e41a4c29053b89b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://trac.ffmpeg.org/ticket/10701", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-500xx/CVE-2023-50009.json b/CVE-2023/CVE-2023-500xx/CVE-2023-50009.json index a2ad074af2c..f22f5cc9e03 100644 --- a/CVE-2023/CVE-2023-500xx/CVE-2023-50009.json +++ b/CVE-2023/CVE-2023-500xx/CVE-2023-50009.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50009", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-19T17:15:52.070", - "lastModified": "2024-11-21T08:36:26.953", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T14:03:43.703", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,54 +51,136 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1", + "versionEndExcluding": "7.0", + "matchCriteriaId": "C3CED193-DA60-4F42-BC08-EF14E700C207" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", + "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59" + } + ] + } + ] + } + ], "references": [ { "url": "https://ffmpeg.org/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/FFmpeg/FFmpeg", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://trac.ffmpeg.org/ticket/10699", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://ffmpeg.org/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://github.com/FFmpeg/FFmpeg", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://trac.ffmpeg.org/ticket/10699", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-500xx/CVE-2023-50010.json b/CVE-2023/CVE-2023-500xx/CVE-2023-50010.json index 527820e9df5..3afa7209386 100644 --- a/CVE-2023/CVE-2023-500xx/CVE-2023-50010.json +++ b/CVE-2023/CVE-2023-500xx/CVE-2023-50010.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50010", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-19T17:15:52.127", - "lastModified": "2024-11-21T08:36:27.173", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T14:03:49.420", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,46 +51,122 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1", + "versionEndExcluding": "7.0", + "matchCriteriaId": "C3CED193-DA60-4F42-BC08-EF14E700C207" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", + "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59" + } + ] + } + ] + } + ], "references": [ { "url": "https://ffmpeg.org/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://trac.ffmpeg.org/ticket/10702", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://ffmpeg.org/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://trac.ffmpeg.org/ticket/10702", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-500xx/CVE-2023-50027.json b/CVE-2023/CVE-2023-500xx/CVE-2023-50027.json index 9278fce0e5d..b9f83790363 100644 --- a/CVE-2023/CVE-2023-500xx/CVE-2023-50027.json +++ b/CVE-2023/CVE-2023-500xx/CVE-2023-50027.json @@ -2,7 +2,7 @@ "id": "CVE-2023-50027", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-05T09:15:08.743", - "lastModified": "2024-11-21T08:36:28.440", + "lastModified": "2025-06-03T15:15:44.937", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-500xx/CVE-2023-50072.json b/CVE-2023/CVE-2023-500xx/CVE-2023-50072.json index 86c49d86a83..4e862c6d281 100644 --- a/CVE-2023/CVE-2023-500xx/CVE-2023-50072.json +++ b/CVE-2023/CVE-2023-500xx/CVE-2023-50072.json @@ -2,7 +2,7 @@ "id": "CVE-2023-50072", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-13T01:15:38.663", - "lastModified": "2024-11-21T08:36:30.810", + "lastModified": "2025-06-03T14:15:33.203", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-500xx/CVE-2023-50090.json b/CVE-2023/CVE-2023-500xx/CVE-2023-50090.json index 8b0991648e1..76d9a2180cd 100644 --- a/CVE-2023/CVE-2023-500xx/CVE-2023-50090.json +++ b/CVE-2023/CVE-2023-500xx/CVE-2023-50090.json @@ -2,7 +2,7 @@ "id": "CVE-2023-50090", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-03T20:15:21.660", - "lastModified": "2024-11-21T08:36:31.450", + "lastModified": "2025-06-03T15:15:45.127", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-501xx/CVE-2023-50126.json b/CVE-2023/CVE-2023-501xx/CVE-2023-50126.json index bc27dd8168c..79ca70a9630 100644 --- a/CVE-2023/CVE-2023-501xx/CVE-2023-50126.json +++ b/CVE-2023/CVE-2023-501xx/CVE-2023-50126.json @@ -2,7 +2,7 @@ "id": "CVE-2023-50126", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-11T21:15:10.723", - "lastModified": "2024-11-21T08:36:34.097", + "lastModified": "2025-06-03T15:15:45.317", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-311" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-311" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-501xx/CVE-2023-50136.json b/CVE-2023/CVE-2023-501xx/CVE-2023-50136.json index 6aa0afa17dd..3103799a4bc 100644 --- a/CVE-2023/CVE-2023-501xx/CVE-2023-50136.json +++ b/CVE-2023/CVE-2023-501xx/CVE-2023-50136.json @@ -2,7 +2,7 @@ "id": "CVE-2023-50136", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-09T22:15:43.350", - "lastModified": "2024-11-21T08:36:34.737", + "lastModified": "2025-06-03T15:15:45.523", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-501xx/CVE-2023-50162.json b/CVE-2023/CVE-2023-501xx/CVE-2023-50162.json index e9ad22d41fa..ef545caf923 100644 --- a/CVE-2023/CVE-2023-501xx/CVE-2023-50162.json +++ b/CVE-2023/CVE-2023-501xx/CVE-2023-50162.json @@ -2,7 +2,7 @@ "id": "CVE-2023-50162", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-09T00:15:44.320", - "lastModified": "2024-11-21T08:36:35.373", + "lastModified": "2025-06-03T15:15:45.710", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-503xx/CVE-2023-50345.json b/CVE-2023/CVE-2023-503xx/CVE-2023-50345.json index 6528745c312..5fca5f724d0 100644 --- a/CVE-2023/CVE-2023-503xx/CVE-2023-50345.json +++ b/CVE-2023/CVE-2023-503xx/CVE-2023-50345.json @@ -2,7 +2,7 @@ "id": "CVE-2023-50345", "sourceIdentifier": "psirt@hcl.com", "published": "2024-01-03T02:15:43.757", - "lastModified": "2024-11-21T08:36:52.490", + "lastModified": "2025-06-03T15:15:45.897", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-601" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-504xx/CVE-2023-50440.json b/CVE-2023/CVE-2023-504xx/CVE-2023-50440.json index 0fc91002b39..2c1e434f0ab 100644 --- a/CVE-2023/CVE-2023-504xx/CVE-2023-50440.json +++ b/CVE-2023/CVE-2023-504xx/CVE-2023-50440.json @@ -2,7 +2,7 @@ "id": "CVE-2023-50440", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-13T21:15:09.610", - "lastModified": "2024-11-21T08:36:59.820", + "lastModified": "2025-06-03T14:15:33.780", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-505xx/CVE-2023-50585.json b/CVE-2023/CVE-2023-505xx/CVE-2023-50585.json index 984f43fe24c..5f523cbb0bd 100644 --- a/CVE-2023/CVE-2023-505xx/CVE-2023-50585.json +++ b/CVE-2023/CVE-2023-505xx/CVE-2023-50585.json @@ -2,7 +2,7 @@ "id": "CVE-2023-50585", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-09T09:15:42.430", - "lastModified": "2024-11-21T08:37:06.090", + "lastModified": "2025-06-03T15:15:46.043", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-506xx/CVE-2023-50609.json b/CVE-2023/CVE-2023-506xx/CVE-2023-50609.json index a706f3f5c7a..9390d0f8616 100644 --- a/CVE-2023/CVE-2023-506xx/CVE-2023-50609.json +++ b/CVE-2023/CVE-2023-506xx/CVE-2023-50609.json @@ -2,7 +2,7 @@ "id": "CVE-2023-50609", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-06T04:15:08.930", - "lastModified": "2024-11-21T08:37:06.417", + "lastModified": "2025-06-03T15:15:46.233", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-506xx/CVE-2023-50612.json b/CVE-2023/CVE-2023-506xx/CVE-2023-50612.json index 80d92dd9751..06785aa09da 100644 --- a/CVE-2023/CVE-2023-506xx/CVE-2023-50612.json +++ b/CVE-2023/CVE-2023-506xx/CVE-2023-50612.json @@ -2,7 +2,7 @@ "id": "CVE-2023-50612", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-06T03:15:43.990", - "lastModified": "2024-11-21T08:37:06.553", + "lastModified": "2025-06-03T15:15:46.423", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-276" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-506xx/CVE-2023-50643.json b/CVE-2023/CVE-2023-506xx/CVE-2023-50643.json index a4e611b1214..1aaa6afb873 100644 --- a/CVE-2023/CVE-2023-506xx/CVE-2023-50643.json +++ b/CVE-2023/CVE-2023-506xx/CVE-2023-50643.json @@ -2,7 +2,7 @@ "id": "CVE-2023-50643", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-09T01:15:38.890", - "lastModified": "2024-11-21T08:37:07.320", + "lastModified": "2025-06-03T15:15:46.607", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-509xx/CVE-2023-50916.json b/CVE-2023/CVE-2023-509xx/CVE-2023-50916.json index 6c851dca9c0..3c536094c93 100644 --- a/CVE-2023/CVE-2023-509xx/CVE-2023-50916.json +++ b/CVE-2023/CVE-2023-509xx/CVE-2023-50916.json @@ -2,7 +2,7 @@ "id": "CVE-2023-50916", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-10T19:15:08.227", - "lastModified": "2024-11-21T08:37:31.173", + "lastModified": "2025-06-03T15:15:46.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-509xx/CVE-2023-50919.json b/CVE-2023/CVE-2023-509xx/CVE-2023-50919.json index 6dab6a338c5..c2f07c64fed 100644 --- a/CVE-2023/CVE-2023-509xx/CVE-2023-50919.json +++ b/CVE-2023/CVE-2023-509xx/CVE-2023-50919.json @@ -2,7 +2,7 @@ "id": "CVE-2023-50919", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-12T08:15:43.533", - "lastModified": "2024-11-21T08:37:31.660", + "lastModified": "2025-06-03T14:15:34.507", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-287" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-509xx/CVE-2023-50922.json b/CVE-2023/CVE-2023-509xx/CVE-2023-50922.json index f62fb70c2ec..61f8135a2be 100644 --- a/CVE-2023/CVE-2023-509xx/CVE-2023-50922.json +++ b/CVE-2023/CVE-2023-509xx/CVE-2023-50922.json @@ -2,7 +2,7 @@ "id": "CVE-2023-50922", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-03T08:15:09.607", - "lastModified": "2024-11-21T08:37:32.207", + "lastModified": "2025-06-03T15:15:47.190", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-509xx/CVE-2023-50982.json b/CVE-2023/CVE-2023-509xx/CVE-2023-50982.json index db1048efd51..754b4a81e09 100644 --- a/CVE-2023/CVE-2023-509xx/CVE-2023-50982.json +++ b/CVE-2023/CVE-2023-509xx/CVE-2023-50982.json @@ -2,7 +2,7 @@ "id": "CVE-2023-50982", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-08T20:15:44.513", - "lastModified": "2024-11-21T08:37:39.403", + "lastModified": "2025-06-03T15:15:47.430", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -73,6 +73,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-510xx/CVE-2023-51059.json b/CVE-2023/CVE-2023-510xx/CVE-2023-51059.json index bbde6d72962..aa299426bdd 100644 --- a/CVE-2023/CVE-2023-510xx/CVE-2023-51059.json +++ b/CVE-2023/CVE-2023-510xx/CVE-2023-51059.json @@ -2,7 +2,7 @@ "id": "CVE-2023-51059", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-16T02:15:28.480", - "lastModified": "2024-11-21T08:37:46.320", + "lastModified": "2025-06-03T14:15:34.823", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-510xx/CVE-2023-51063.json b/CVE-2023/CVE-2023-510xx/CVE-2023-51063.json index 954e685f602..95678d94209 100644 --- a/CVE-2023/CVE-2023-510xx/CVE-2023-51063.json +++ b/CVE-2023/CVE-2023-510xx/CVE-2023-51063.json @@ -2,7 +2,7 @@ "id": "CVE-2023-51063", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-13T04:15:07.820", - "lastModified": "2024-11-21T08:37:46.653", + "lastModified": "2025-06-03T14:15:35.093", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -53,6 +73,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-510xx/CVE-2023-51068.json b/CVE-2023/CVE-2023-510xx/CVE-2023-51068.json index 4d84d82d06a..a46386c0a1f 100644 --- a/CVE-2023/CVE-2023-510xx/CVE-2023-51068.json +++ b/CVE-2023/CVE-2023-510xx/CVE-2023-51068.json @@ -2,7 +2,7 @@ "id": "CVE-2023-51068", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-13T04:15:08.053", - "lastModified": "2024-11-21T08:37:47.433", + "lastModified": "2025-06-03T14:15:35.343", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-510xx/CVE-2023-51071.json b/CVE-2023/CVE-2023-510xx/CVE-2023-51071.json index 13ea4b54f66..9db222407d9 100644 --- a/CVE-2023/CVE-2023-510xx/CVE-2023-51071.json +++ b/CVE-2023/CVE-2023-510xx/CVE-2023-51071.json @@ -2,7 +2,7 @@ "id": "CVE-2023-51071", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-13T04:15:08.143", - "lastModified": "2024-11-21T08:37:47.807", + "lastModified": "2025-06-03T14:15:35.590", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 2.5 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 } ] }, diff --git a/CVE-2023/CVE-2023-511xx/CVE-2023-51127.json b/CVE-2023/CVE-2023-511xx/CVE-2023-51127.json index ec576b7032c..2772c8c726f 100644 --- a/CVE-2023/CVE-2023-511xx/CVE-2023-51127.json +++ b/CVE-2023/CVE-2023-511xx/CVE-2023-51127.json @@ -2,7 +2,7 @@ "id": "CVE-2023-51127", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-10T21:15:09.133", - "lastModified": "2024-11-21T08:37:52.300", + "lastModified": "2025-06-03T15:15:47.610", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-512xx/CVE-2023-51277.json b/CVE-2023/CVE-2023-512xx/CVE-2023-51277.json index c11348d5a5b..d1a1879f129 100644 --- a/CVE-2023/CVE-2023-512xx/CVE-2023-51277.json +++ b/CVE-2023/CVE-2023-512xx/CVE-2023-51277.json @@ -2,7 +2,7 @@ "id": "CVE-2023-51277", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-05T05:15:08.793", - "lastModified": "2024-11-21T08:37:56.290", + "lastModified": "2025-06-03T15:15:47.833", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-518xx/CVE-2023-51804.json b/CVE-2023/CVE-2023-518xx/CVE-2023-51804.json index 89a6b4bf381..b4bf8f03bcb 100644 --- a/CVE-2023/CVE-2023-518xx/CVE-2023-51804.json +++ b/CVE-2023/CVE-2023-518xx/CVE-2023-51804.json @@ -2,7 +2,7 @@ "id": "CVE-2023-51804", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-13T02:15:07.257", - "lastModified": "2024-11-21T08:38:51.647", + "lastModified": "2025-06-03T14:15:35.820", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-918" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-519xx/CVE-2023-51954.json b/CVE-2023/CVE-2023-519xx/CVE-2023-51954.json index c8fb0f10be4..59c3724bac0 100644 --- a/CVE-2023/CVE-2023-519xx/CVE-2023-51954.json +++ b/CVE-2023/CVE-2023-519xx/CVE-2023-51954.json @@ -2,7 +2,7 @@ "id": "CVE-2023-51954", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-10T15:15:09.093", - "lastModified": "2024-11-21T08:38:58.167", + "lastModified": "2025-06-03T15:15:48.140", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-519xx/CVE-2023-51956.json b/CVE-2023/CVE-2023-519xx/CVE-2023-51956.json index 254d349331b..8816b9e4d9c 100644 --- a/CVE-2023/CVE-2023-519xx/CVE-2023-51956.json +++ b/CVE-2023/CVE-2023-519xx/CVE-2023-51956.json @@ -2,7 +2,7 @@ "id": "CVE-2023-51956", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-10T15:15:09.200", - "lastModified": "2024-11-21T08:38:58.467", + "lastModified": "2025-06-03T15:15:48.350", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-519xx/CVE-2023-51964.json b/CVE-2023/CVE-2023-519xx/CVE-2023-51964.json index 74c3289d542..9f56373d930 100644 --- a/CVE-2023/CVE-2023-519xx/CVE-2023-51964.json +++ b/CVE-2023/CVE-2023-519xx/CVE-2023-51964.json @@ -2,7 +2,7 @@ "id": "CVE-2023-51964", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-10T15:15:09.610", - "lastModified": "2024-11-21T08:38:59.907", + "lastModified": "2025-06-03T15:15:48.530", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-519xx/CVE-2023-51971.json b/CVE-2023/CVE-2023-519xx/CVE-2023-51971.json index 133b344ba4e..283a9bac498 100644 --- a/CVE-2023/CVE-2023-519xx/CVE-2023-51971.json +++ b/CVE-2023/CVE-2023-519xx/CVE-2023-51971.json @@ -2,7 +2,7 @@ "id": "CVE-2023-51971", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-10T13:15:48.547", - "lastModified": "2024-11-21T08:39:00.970", + "lastModified": "2025-06-03T15:15:48.710", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-520xx/CVE-2023-52031.json b/CVE-2023/CVE-2023-520xx/CVE-2023-52031.json index c8e46bc0603..424ca54091c 100644 --- a/CVE-2023/CVE-2023-520xx/CVE-2023-52031.json +++ b/CVE-2023/CVE-2023-520xx/CVE-2023-52031.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52031", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-11T09:15:47.437", - "lastModified": "2024-11-21T08:39:02.880", + "lastModified": "2025-06-03T15:15:48.887", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-520xx/CVE-2023-52064.json b/CVE-2023/CVE-2023-520xx/CVE-2023-52064.json index 1a9b56f6e85..8e0eda32317 100644 --- a/CVE-2023/CVE-2023-520xx/CVE-2023-52064.json +++ b/CVE-2023/CVE-2023-520xx/CVE-2023-52064.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52064", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-10T21:15:09.180", - "lastModified": "2025-05-05T18:10:51.717", + "lastModified": "2025-06-03T15:15:49.073", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-520xx/CVE-2023-52073.json b/CVE-2023/CVE-2023-520xx/CVE-2023-52073.json index ead37ba4387..bd9f04599f5 100644 --- a/CVE-2023/CVE-2023-520xx/CVE-2023-52073.json +++ b/CVE-2023/CVE-2023-520xx/CVE-2023-52073.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52073", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-08T22:15:45.220", - "lastModified": "2024-11-21T08:39:06.797", + "lastModified": "2025-06-03T15:15:49.393", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-522xx/CVE-2023-52271.json b/CVE-2023/CVE-2023-522xx/CVE-2023-52271.json index 36bd449144d..de6946ac6db 100644 --- a/CVE-2023/CVE-2023-522xx/CVE-2023-52271.json +++ b/CVE-2023/CVE-2023-522xx/CVE-2023-52271.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52271", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-08T20:15:46.387", - "lastModified": "2024-11-21T08:39:30.110", + "lastModified": "2025-06-03T15:15:49.577", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.0, "impactScore": 4.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 4.0 } ] }, diff --git a/CVE-2023/CVE-2023-523xx/CVE-2023-52322.json b/CVE-2023/CVE-2023-523xx/CVE-2023-52322.json index a6053d96fa3..4f27be09153 100644 --- a/CVE-2023/CVE-2023-523xx/CVE-2023-52322.json +++ b/CVE-2023/CVE-2023-523xx/CVE-2023-52322.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52322", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-04T07:15:09.170", - "lastModified": "2024-11-21T08:39:33.753", + "lastModified": "2025-06-03T15:15:49.910", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-523xx/CVE-2023-52323.json b/CVE-2023/CVE-2023-523xx/CVE-2023-52323.json index 44ed08c9ce8..ac672e8a99a 100644 --- a/CVE-2023/CVE-2023-523xx/CVE-2023-52323.json +++ b/CVE-2023/CVE-2023-523xx/CVE-2023-52323.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52323", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-05T04:15:07.763", - "lastModified": "2024-11-21T08:39:33.907", + "lastModified": "2025-06-03T15:15:50.097", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-203" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5691.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5691.json index a98ba563b2f..b4a647c805d 100644 --- a/CVE-2023/CVE-2023-56xx/CVE-2023-5691.json +++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5691.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5691", "sourceIdentifier": "security@wordfence.com", "published": "2024-01-11T09:15:47.727", - "lastModified": "2024-11-21T08:42:17.377", + "lastModified": "2025-06-03T14:15:36.070", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-58xx/CVE-2023-5877.json b/CVE-2023/CVE-2023-58xx/CVE-2023-5877.json index f95c6ce3d9a..5fc12eb0aa8 100644 --- a/CVE-2023/CVE-2023-58xx/CVE-2023-5877.json +++ b/CVE-2023/CVE-2023-58xx/CVE-2023-5877.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5877", "sourceIdentifier": "contact@wpscan.com", "published": "2024-01-01T15:15:42.727", - "lastModified": "2024-11-21T08:42:41.620", + "lastModified": "2025-06-03T15:15:50.457", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-60xx/CVE-2023-6042.json b/CVE-2023/CVE-2023-60xx/CVE-2023-6042.json index 35f8a95c659..50998aabe8b 100644 --- a/CVE-2023/CVE-2023-60xx/CVE-2023-6042.json +++ b/CVE-2023/CVE-2023-60xx/CVE-2023-6042.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6042", "sourceIdentifier": "contact@wpscan.com", "published": "2024-01-08T19:15:09.937", - "lastModified": "2024-11-25T16:47:33.943", + "lastModified": "2025-06-03T15:15:50.620", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-60xx/CVE-2023-6048.json b/CVE-2023/CVE-2023-60xx/CVE-2023-6048.json index 36c984abff9..874b64fea77 100644 --- a/CVE-2023/CVE-2023-60xx/CVE-2023-6048.json +++ b/CVE-2023/CVE-2023-60xx/CVE-2023-6048.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6048", "sourceIdentifier": "contact@wpscan.com", "published": "2024-01-15T16:15:12.280", - "lastModified": "2024-11-21T08:43:02.490", + "lastModified": "2025-06-03T14:15:36.313", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-60xx/CVE-2023-6049.json b/CVE-2023/CVE-2023-60xx/CVE-2023-6049.json index 5d8d3424679..756e913ef30 100644 --- a/CVE-2023/CVE-2023-60xx/CVE-2023-6049.json +++ b/CVE-2023/CVE-2023-60xx/CVE-2023-6049.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6049", "sourceIdentifier": "contact@wpscan.com", "published": "2024-01-15T16:15:12.323", - "lastModified": "2024-11-21T08:43:02.593", + "lastModified": "2025-06-03T14:15:36.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-60xx/CVE-2023-6050.json b/CVE-2023/CVE-2023-60xx/CVE-2023-6050.json index cd314c4ea00..52a2352c278 100644 --- a/CVE-2023/CVE-2023-60xx/CVE-2023-6050.json +++ b/CVE-2023/CVE-2023-60xx/CVE-2023-6050.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6050", "sourceIdentifier": "contact@wpscan.com", "published": "2024-01-15T16:15:12.370", - "lastModified": "2024-11-21T08:43:02.693", + "lastModified": "2025-06-03T14:15:36.733", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, diff --git a/CVE-2023/CVE-2023-61xx/CVE-2023-6139.json b/CVE-2023/CVE-2023-61xx/CVE-2023-6139.json index 21135332ec8..036d65503f3 100644 --- a/CVE-2023/CVE-2023-61xx/CVE-2023-6139.json +++ b/CVE-2023/CVE-2023-61xx/CVE-2023-6139.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6139", "sourceIdentifier": "contact@wpscan.com", "published": "2024-01-08T19:15:09.980", - "lastModified": "2024-11-21T08:43:12.943", + "lastModified": "2025-06-03T15:15:50.827", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-61xx/CVE-2023-6158.json b/CVE-2023/CVE-2023-61xx/CVE-2023-6158.json index 1146a5a1868..8db6abe79eb 100644 --- a/CVE-2023/CVE-2023-61xx/CVE-2023-6158.json +++ b/CVE-2023/CVE-2023-61xx/CVE-2023-6158.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6158", "sourceIdentifier": "security@wordfence.com", "published": "2024-01-10T15:15:10.167", - "lastModified": "2024-11-21T08:43:16.450", + "lastModified": "2025-06-03T15:15:50.993", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6220.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6220.json index ce299993905..19e2f8713ea 100644 --- a/CVE-2023/CVE-2023-62xx/CVE-2023-6220.json +++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6220.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6220", "sourceIdentifier": "security@wordfence.com", "published": "2024-01-11T09:15:47.883", - "lastModified": "2024-11-21T08:43:23.640", + "lastModified": "2025-06-03T14:15:36.930", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6223.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6223.json index 4992bf2f5b1..b0c23b27b79 100644 --- a/CVE-2023/CVE-2023-62xx/CVE-2023-6223.json +++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6223.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6223", "sourceIdentifier": "security@wordfence.com", "published": "2024-01-11T07:15:08.220", - "lastModified": "2024-11-21T08:43:24.110", + "lastModified": "2025-06-03T15:15:51.153", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-639" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6242.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6242.json index 8aa3b1034d2..479ada67a12 100644 --- a/CVE-2023/CVE-2023-62xx/CVE-2023-6242.json +++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6242.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6242", "sourceIdentifier": "security@wordfence.com", "published": "2024-01-11T15:15:08.040", - "lastModified": "2024-11-21T08:43:26.727", + "lastModified": "2025-06-03T14:15:37.100", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6244.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6244.json index 838c3d87cc4..671bc4e7d74 100644 --- a/CVE-2023/CVE-2023-62xx/CVE-2023-6244.json +++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6244.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6244", "sourceIdentifier": "security@wordfence.com", "published": "2024-01-11T15:15:08.233", - "lastModified": "2024-11-21T08:43:26.927", + "lastModified": "2025-06-03T14:15:37.283", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6369.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6369.json index 6a765885eab..d6cf939d972 100644 --- a/CVE-2023/CVE-2023-63xx/CVE-2023-6369.json +++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6369.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6369", "sourceIdentifier": "security@wordfence.com", "published": "2024-01-11T09:15:48.380", - "lastModified": "2024-11-21T08:43:43.477", + "lastModified": "2025-06-03T14:15:37.713", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6504.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6504.json index 49886253ae7..099bade829c 100644 --- a/CVE-2023/CVE-2023-65xx/CVE-2023-6504.json +++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6504.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6504", "sourceIdentifier": "security@wordfence.com", "published": "2024-01-11T09:15:48.710", - "lastModified": "2024-11-21T08:43:59.267", + "lastModified": "2025-06-03T14:15:38.090", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6506.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6506.json index 847528f9567..cae2ce6e2c7 100644 --- a/CVE-2023/CVE-2023-65xx/CVE-2023-6506.json +++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6506.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6506", "sourceIdentifier": "security@wordfence.com", "published": "2024-01-11T07:15:08.810", - "lastModified": "2024-11-21T08:43:59.500", + "lastModified": "2025-06-03T15:15:51.403", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-732" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6528.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6528.json index 3f91daecde3..993d7b8cfcd 100644 --- a/CVE-2023/CVE-2023-65xx/CVE-2023-6528.json +++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6528.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6528", "sourceIdentifier": "contact@wpscan.com", "published": "2024-01-08T19:15:10.273", - "lastModified": "2024-11-21T08:44:02.193", + "lastModified": "2025-06-03T15:15:51.557", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6551.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6551.json index 5eb58dd36d1..e5c1fd1be4e 100644 --- a/CVE-2023/CVE-2023-65xx/CVE-2023-6551.json +++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6551.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6551", "sourceIdentifier": "cvd@cert.pl", "published": "2024-01-04T16:15:09.380", - "lastModified": "2024-11-21T08:44:04.863", + "lastModified": "2025-06-03T15:15:51.720", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,13 +36,33 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, "weaknesses": [ { "source": "cvd@cert.pl", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", @@ -52,7 +72,17 @@ }, { "source": "nvd@nist.gov", - "type": "Primary", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6558.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6558.json index b05db963eb1..a716c3035ea 100644 --- a/CVE-2023/CVE-2023-65xx/CVE-2023-6558.json +++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6558.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6558", "sourceIdentifier": "security@wordfence.com", "published": "2024-01-11T09:15:49.037", - "lastModified": "2024-11-21T08:44:05.787", + "lastModified": "2025-06-03T14:15:38.260", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6600.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6600.json index 43495b9c1c7..ff01bcb6bfe 100644 --- a/CVE-2023/CVE-2023-66xx/CVE-2023-6600.json +++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6600.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6600", "sourceIdentifier": "security@wordfence.com", "published": "2024-01-03T06:15:47.337", - "lastModified": "2024-11-21T08:44:10.873", + "lastModified": "2025-06-03T15:15:51.917", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6634.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6634.json index 1669692f4d1..ba69ad52c82 100644 --- a/CVE-2023/CVE-2023-66xx/CVE-2023-6634.json +++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6634.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6634", "sourceIdentifier": "security@wordfence.com", "published": "2024-01-11T09:15:50.437", - "lastModified": "2024-11-21T08:44:15.633", + "lastModified": "2025-06-03T14:15:38.520", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,20 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + }, + { + "lang": "en", + "value": "CWE-88" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6637.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6637.json index c0b7e15f5bb..2bbbbd5a56e 100644 --- a/CVE-2023/CVE-2023-66xx/CVE-2023-6637.json +++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6637.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6637", "sourceIdentifier": "security@wordfence.com", "published": "2024-01-11T09:15:50.753", - "lastModified": "2024-11-21T08:44:16.027", + "lastModified": "2025-06-03T14:15:38.693", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6638.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6638.json index 63ebf38ea63..89fa27e71b5 100644 --- a/CVE-2023/CVE-2023-66xx/CVE-2023-6638.json +++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6638.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6638", "sourceIdentifier": "security@wordfence.com", "published": "2024-01-11T09:15:50.920", - "lastModified": "2024-11-21T08:44:16.170", + "lastModified": "2025-06-03T14:15:39.293", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6684.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6684.json index 38cc9598e79..88e2d80f522 100644 --- a/CVE-2023/CVE-2023-66xx/CVE-2023-6684.json +++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6684.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6684", "sourceIdentifier": "security@wordfence.com", "published": "2024-01-11T09:15:51.263", - "lastModified": "2024-11-21T08:44:20.570", + "lastModified": "2025-06-03T14:15:40.577", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6830.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6830.json index 440794a87c7..999d39c5d61 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6830.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6830.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6830", "sourceIdentifier": "security@wordfence.com", "published": "2024-01-09T07:15:13.223", - "lastModified": "2024-11-21T08:44:38.137", + "lastModified": "2025-06-03T15:15:52.143", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6843.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6843.json index 506959b4609..3034c4a6f3b 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6843.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6843.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6843", "sourceIdentifier": "contact@wpscan.com", "published": "2024-01-15T16:15:12.620", - "lastModified": "2024-11-21T08:44:39.820", + "lastModified": "2025-06-03T14:15:40.893", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6855.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6855.json index ed1beb41685..94dad65068c 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6855.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6855.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6855", "sourceIdentifier": "security@wordfence.com", "published": "2024-01-11T09:15:52.613", - "lastModified": "2024-11-21T08:44:41.540", + "lastModified": "2025-06-03T14:15:41.083", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6875.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6875.json index 2b5c9375756..3ef7d3a3cf1 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6875.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6875.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6875", "sourceIdentifier": "security@wordfence.com", "published": "2024-01-11T09:15:52.773", - "lastModified": "2024-11-21T08:44:44.337", + "lastModified": "2025-06-03T14:15:41.283", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6882.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6882.json index 27ca15c32dc..7a6dfd21657 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6882.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6882.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6882", "sourceIdentifier": "security@wordfence.com", "published": "2024-01-11T09:15:53.103", - "lastModified": "2024-11-21T08:44:45.207", + "lastModified": "2025-06-03T14:15:41.567", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6924.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6924.json index c1cdea686d3..1b6f6718171 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6924.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6924.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6924", "sourceIdentifier": "security@wordfence.com", "published": "2024-01-11T09:15:53.253", - "lastModified": "2024-11-21T08:44:50.747", + "lastModified": "2025-06-03T14:15:41.760", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6984.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6984.json index 33c04e30ca4..dc77db84c6c 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6984.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6984.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6984", "sourceIdentifier": "security@wordfence.com", "published": "2024-01-03T09:15:11.647", - "lastModified": "2024-11-21T08:44:58.520", + "lastModified": "2025-06-03T15:15:52.303", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6988.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6988.json index 7d59d1be915..c88d5d0f114 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6988.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6988.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6988", "sourceIdentifier": "security@wordfence.com", "published": "2024-01-11T09:15:53.910", - "lastModified": "2024-11-21T08:44:58.967", + "lastModified": "2025-06-03T14:15:41.997", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7019.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7019.json index 6a6a7876482..6470afcc579 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7019.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7019.json @@ -2,7 +2,7 @@ "id": "CVE-2023-7019", "sourceIdentifier": "security@wordfence.com", "published": "2024-01-11T09:15:54.780", - "lastModified": "2024-11-21T08:45:03.143", + "lastModified": "2025-06-03T14:15:42.220", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7048.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7048.json index d88222882fe..50bd274b5e1 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7048.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7048.json @@ -2,7 +2,7 @@ "id": "CVE-2023-7048", "sourceIdentifier": "security@wordfence.com", "published": "2024-01-11T09:15:55.030", - "lastModified": "2024-11-21T08:45:07.573", + "lastModified": "2025-06-03T14:15:42.403", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7071.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7071.json index 037cc4ea878..2c1916e1039 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7071.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7071.json @@ -2,7 +2,7 @@ "id": "CVE-2023-7071", "sourceIdentifier": "security@wordfence.com", "published": "2024-01-11T09:15:55.540", - "lastModified": "2024-11-21T08:45:11.260", + "lastModified": "2025-06-03T14:15:42.597", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-02xx/CVE-2024-0230.json b/CVE-2024/CVE-2024-02xx/CVE-2024-0230.json index a434223cca7..b7db62d1343 100644 --- a/CVE-2024/CVE-2024-02xx/CVE-2024-0230.json +++ b/CVE-2024/CVE-2024-02xx/CVE-2024-0230.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0230", "sourceIdentifier": "product-security@apple.com", "published": "2024-01-12T23:15:08.847", - "lastModified": "2024-11-21T08:46:06.627", + "lastModified": "2025-06-03T14:15:42.793", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 2.4, + "baseSeverity": "LOW", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 } ] }, diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0333.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0333.json index fcd0116d3a3..4f2a90b1135 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0333.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0333.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0333", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-01-10T22:15:50.907", - "lastModified": "2024-11-21T08:46:19.987", + "lastModified": "2025-06-03T15:15:54.087", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 } ] }, diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12718.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12718.json index 6a1ab643c16..b2fdb2e580e 100644 --- a/CVE-2024/CVE-2024-127xx/CVE-2024-12718.json +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12718.json @@ -2,7 +2,7 @@ "id": "CVE-2024-12718", "sourceIdentifier": "cna@python.org", "published": "2025-06-03T13:15:20.183", - "lastModified": "2025-06-03T13:15:20.183", + "lastModified": "2025-06-03T14:15:45.190", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -12,26 +12,48 @@ } ], "metrics": { - "cvssMetricV31": [ + "cvssMetricV40": [ { "source": "cna@python.org", "type": "Secondary", "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", - "baseScore": 5.3, - "baseSeverity": "MEDIUM", + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 10.0, + "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", + "attackRequirements": "NONE", "privilegesRequired": "NONE", "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "LOW", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 3.9, - "impactScore": 1.4 + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } } ] }, @@ -48,6 +70,18 @@ } ], "references": [ + { + "url": "https://gist.github.com/sethmlarson/52398e33eff261329a0180ac1d54f42f", + "source": "cna@python.org" + }, + { + "url": "https://github.com/python/cpython/commit/3612d8f51741b11f36f8fb0494d79086bac9390a", + "source": "cna@python.org" + }, + { + "url": "https://github.com/python/cpython/commit/9e0ac76d96cf80b49055f6d6b9a6763fb9215c2a", + "source": "cna@python.org" + }, { "url": "https://github.com/python/cpython/issues/127987", "source": "cna@python.org" @@ -59,6 +93,10 @@ { "url": "https://github.com/python/cpython/pull/135037", "source": "cna@python.org" + }, + { + "url": "https://mail.python.org/archives/list/security-announce@python.org/thread/MAXIJJCUUMCL7ATZNDVEGGHUMQMUUKLG/", + "source": "cna@python.org" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-208xx/CVE-2024-20805.json b/CVE-2024/CVE-2024-208xx/CVE-2024-20805.json index 72dfe340d6d..32ada43d231 100644 --- a/CVE-2024/CVE-2024-208xx/CVE-2024-20805.json +++ b/CVE-2024/CVE-2024-208xx/CVE-2024-20805.json @@ -2,7 +2,7 @@ "id": "CVE-2024-20805", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-01-04T01:15:09.550", - "lastModified": "2024-11-21T08:53:10.667", + "lastModified": "2025-06-03T15:15:55.220", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-217xx/CVE-2024-21732.json b/CVE-2024/CVE-2024-217xx/CVE-2024-21732.json index d72fced7816..d62ab9d1219 100644 --- a/CVE-2024/CVE-2024-217xx/CVE-2024-21732.json +++ b/CVE-2024/CVE-2024-217xx/CVE-2024-21732.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21732", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-01T08:15:36.087", - "lastModified": "2024-11-21T08:54:53.800", + "lastModified": "2025-06-03T15:15:56.083", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-217xx/CVE-2024-21773.json b/CVE-2024/CVE-2024-217xx/CVE-2024-21773.json index 709513d4896..c53d06cae3f 100644 --- a/CVE-2024/CVE-2024-217xx/CVE-2024-21773.json +++ b/CVE-2024/CVE-2024-217xx/CVE-2024-21773.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21773", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-01-11T00:15:44.560", - "lastModified": "2024-11-21T08:54:58.750", + "lastModified": "2025-06-03T15:15:56.360", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-219xx/CVE-2024-21909.json b/CVE-2024/CVE-2024-219xx/CVE-2024-21909.json index 8e2c86da5f3..b1b17595f21 100644 --- a/CVE-2024/CVE-2024-219xx/CVE-2024-21909.json +++ b/CVE-2024/CVE-2024-219xx/CVE-2024-21909.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21909", "sourceIdentifier": "disclosure@vulncheck.com", "published": "2024-01-03T16:15:09.003", - "lastModified": "2024-11-21T08:55:15.167", + "lastModified": "2025-06-03T15:15:56.530", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22028.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22028.json index f9fc448f511..cb66d1149c5 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22028.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22028.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22028", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-01-15T07:15:09.507", - "lastModified": "2024-11-21T08:55:25.737", + "lastModified": "2025-06-03T14:15:45.720", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.6, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22049.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22049.json index edc45062953..13b3a217b24 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22049.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22049.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22049", "sourceIdentifier": "disclosure@vulncheck.com", "published": "2024-01-04T21:15:10.013", - "lastModified": "2025-02-13T18:16:45.870", + "lastModified": "2025-06-03T15:15:56.780", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22087.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22087.json index 22aaee730ab..fa175f2ea52 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22087.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22087.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22087", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-05T04:15:07.880", - "lastModified": "2024-11-21T08:55:33.113", + "lastModified": "2025-06-03T15:15:56.987", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-221xx/CVE-2024-22164.json b/CVE-2024/CVE-2024-221xx/CVE-2024-22164.json index 576571c9db5..1c8a4a0c901 100644 --- a/CVE-2024/CVE-2024-221xx/CVE-2024-22164.json +++ b/CVE-2024/CVE-2024-221xx/CVE-2024-22164.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22164", "sourceIdentifier": "prodsec@splunk.com", "published": "2024-01-09T17:15:12.323", - "lastModified": "2024-11-21T08:55:43.037", + "lastModified": "2025-06-03T15:15:57.183", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -79,6 +79,16 @@ "value": "CWE-770" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-223xx/CVE-2024-22368.json b/CVE-2024/CVE-2024-223xx/CVE-2024-22368.json index 97b764a77d0..dfbcef8a0fb 100644 --- a/CVE-2024/CVE-2024-223xx/CVE-2024-22368.json +++ b/CVE-2024/CVE-2024-223xx/CVE-2024-22368.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22368", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-09T09:15:42.910", - "lastModified": "2024-11-21T08:56:08.047", + "lastModified": "2025-06-03T15:15:57.437", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2024/CVE-2024-224xx/CVE-2024-22492.json b/CVE-2024/CVE-2024-224xx/CVE-2024-22492.json index f91e2449977..f7e127122db 100644 --- a/CVE-2024/CVE-2024-224xx/CVE-2024-22492.json +++ b/CVE-2024/CVE-2024-224xx/CVE-2024-22492.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22492", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-12T16:15:52.793", - "lastModified": "2024-11-21T08:56:21.667", + "lastModified": "2025-06-03T14:15:45.907", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-224xx/CVE-2024-22494.json b/CVE-2024/CVE-2024-224xx/CVE-2024-22494.json index e94a5a4f752..c00fabffb80 100644 --- a/CVE-2024/CVE-2024-224xx/CVE-2024-22494.json +++ b/CVE-2024/CVE-2024-224xx/CVE-2024-22494.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22494", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-12T16:15:52.890", - "lastModified": "2024-11-21T08:56:22.063", + "lastModified": "2025-06-03T14:15:46.107", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-227xx/CVE-2024-22776.json b/CVE-2024/CVE-2024-227xx/CVE-2024-22776.json index 70ca106a652..dbfb25f519a 100644 --- a/CVE-2024/CVE-2024-227xx/CVE-2024-22776.json +++ b/CVE-2024/CVE-2024-227xx/CVE-2024-22776.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22776", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-23T15:15:09.180", - "lastModified": "2024-11-21T08:56:38.483", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-03T15:02:52.760", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wallosapp:wallos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "0.9", + "versionEndExcluding": "1.2.3", + "matchCriteriaId": "DA753219-6CFD-401D-9B4F-03B54437F571" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ellite/Wallos", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://webity-luescher.notion.site/webity-luescher/Wallos-v0-9-to-v1-2-2-CVE-2024-22776-Stored-XSS-Vulnerability-in-all-text-based-input-fields-6622fb4cfbe0430aa0b1d4b3edcb67b0", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/ellite/Wallos", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://webity-luescher.notion.site/webity-luescher/Wallos-v0-9-to-v1-2-2-CVE-2024-22776-Stored-XSS-Vulnerability-in-all-text-based-input-fields-6622fb4cfbe0430aa0b1d4b3edcb67b0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-229xx/CVE-2024-22942.json b/CVE-2024/CVE-2024-229xx/CVE-2024-22942.json index 44be0b7edd2..4eb3dfb4b04 100644 --- a/CVE-2024/CVE-2024-229xx/CVE-2024-22942.json +++ b/CVE-2024/CVE-2024-229xx/CVE-2024-22942.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22942", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-11T16:15:55.857", - "lastModified": "2024-11-21T08:56:50.037", + "lastModified": "2025-06-03T15:15:57.660", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-230xx/CVE-2024-23059.json b/CVE-2024/CVE-2024-230xx/CVE-2024-23059.json index 99bb44473ae..f685695b7a2 100644 --- a/CVE-2024/CVE-2024-230xx/CVE-2024-23059.json +++ b/CVE-2024/CVE-2024-230xx/CVE-2024-23059.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23059", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-11T16:15:56.057", - "lastModified": "2024-11-21T08:56:53.240", + "lastModified": "2025-06-03T15:15:57.867", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23173.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23173.json index aa8ffaa13a2..8d037669a8b 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23173.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23173.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23173", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-12T05:15:10.237", - "lastModified": "2024-11-21T08:57:07.347", + "lastModified": "2025-06-03T14:15:46.297", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23177.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23177.json index bd583561dc3..df04b9d649b 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23177.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23177.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23177", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-12T06:15:47.297", - "lastModified": "2024-11-21T08:57:07.670", + "lastModified": "2025-06-03T14:15:46.497", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23178.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23178.json index d710e145add..3071a7073c6 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23178.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23178.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23178", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-12T06:15:47.337", - "lastModified": "2024-11-21T08:57:07.827", + "lastModified": "2025-06-03T14:15:46.693", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27335.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27335.json index 7151123456d..a7b1d3f6a09 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27335.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27335.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27335", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-04-03T17:15:53.560", - "lastModified": "2025-02-27T21:15:35.387", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T14:01:59.353", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -83,14 +83,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tungstenautomation:power_pdf:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.0.0.17", + "matchCriteriaId": "CDBEC5E0-C3A4-48E5-9671-89A55608200C" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-217/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-217/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27336.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27336.json index 40f6b85bcf4..23d8b400697 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27336.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27336.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27336", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-04-03T17:15:53.733", - "lastModified": "2024-11-21T09:04:21.690", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T14:01:49.420", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,16 +71,50 @@ "value": "CWE-125" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tungstenautomation:power_pdf:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.0.0.17", + "matchCriteriaId": "CDBEC5E0-C3A4-48E5-9671-89A55608200C" + } + ] + } + ] } ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-218/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-218/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27337.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27337.json index 66e4a37073b..bebfd384c0c 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27337.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27337.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27337", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-04-03T17:15:53.900", - "lastModified": "2024-11-21T09:04:21.820", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T14:01:31.090", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,16 +71,50 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tungstenautomation:power_pdf:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.0.0.17", + "matchCriteriaId": "CDBEC5E0-C3A4-48E5-9671-89A55608200C" + } + ] + } + ] } ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-230/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-230/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27338.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27338.json index 4871a72b7dc..087ee8e7454 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27338.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27338.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27338", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-04-03T17:15:54.073", - "lastModified": "2024-11-21T09:04:21.953", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T14:01:23.003", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,16 +71,50 @@ "value": "CWE-125" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tungstenautomation:power_pdf:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.0.0.17", + "matchCriteriaId": "CDBEC5E0-C3A4-48E5-9671-89A55608200C" + } + ] + } + ] } ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-219/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-219/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27339.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27339.json index 8abd40a9f93..a9792a2beb2 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27339.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27339.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27339", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-04-03T17:15:54.250", - "lastModified": "2024-11-21T09:04:22.120", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T14:01:12.847", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,16 +71,50 @@ "value": "CWE-787" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tungstenautomation:power_pdf:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.0.0.17", + "matchCriteriaId": "CDBEC5E0-C3A4-48E5-9671-89A55608200C" + } + ] + } + ] } ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-231/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-231/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27340.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27340.json index 72a67f44cf5..0976e99ca61 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27340.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27340.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27340", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-04-03T17:15:54.453", - "lastModified": "2024-11-21T09:04:22.263", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T14:01:02.503", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,16 +71,50 @@ "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tungstenautomation:power_pdf:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.0.0.17", + "matchCriteriaId": "CDBEC5E0-C3A4-48E5-9671-89A55608200C" + } + ] + } + ] } ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-220/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-220/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27341.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27341.json index 346ecef2060..4196a478766 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27341.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27341.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27341", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-04-03T17:15:54.637", - "lastModified": "2024-11-21T09:04:22.403", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T14:00:54.577", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,16 +71,50 @@ "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tungstenautomation:power_pdf:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.0.0.17", + "matchCriteriaId": "CDBEC5E0-C3A4-48E5-9671-89A55608200C" + } + ] + } + ] } ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-221/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-221/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27342.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27342.json index 9f8c67fdfca..abf70330d3f 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27342.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27342.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27342", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-04-03T17:15:54.820", - "lastModified": "2024-11-21T09:04:22.547", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T14:00:44.240", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,16 +71,50 @@ "value": "CWE-787" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tungstenautomation:power_pdf:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.0.0.17", + "matchCriteriaId": "CDBEC5E0-C3A4-48E5-9671-89A55608200C" + } + ] + } + ] } ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-222/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-222/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27343.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27343.json index 99f760f4aba..e0b3b159932 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27343.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27343.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27343", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-04-03T17:15:54.993", - "lastModified": "2024-11-21T09:04:22.677", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T14:04:41.540", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,16 +71,50 @@ "value": "CWE-125" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tungstenautomation:power_pdf:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.0.0.17", + "matchCriteriaId": "CDBEC5E0-C3A4-48E5-9671-89A55608200C" + } + ] + } + ] } ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-223/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-223/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27344.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27344.json index c7b0c2f5b28..594ca3a409d 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27344.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27344.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27344", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-04-03T17:15:55.167", - "lastModified": "2024-11-21T09:04:22.803", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T14:04:36.303", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,16 +71,50 @@ "value": "CWE-119" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tungstenautomation:power_pdf:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.0.0.17", + "matchCriteriaId": "CDBEC5E0-C3A4-48E5-9671-89A55608200C" + } + ] + } + ] } ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-224/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-224/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27345.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27345.json index b76a086e514..e1cde9b229b 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27345.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27345.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27345", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-04-03T17:15:55.353", - "lastModified": "2025-02-27T20:15:38.220", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T14:04:30.040", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -83,14 +83,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tungstenautomation:power_pdf:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.0.0.17", + "matchCriteriaId": "CDBEC5E0-C3A4-48E5-9671-89A55608200C" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-225/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-225/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27346.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27346.json index 40749c69692..936a0619739 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27346.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27346.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27346", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-04-03T17:15:55.527", - "lastModified": "2024-11-21T09:04:23.063", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T14:04:23.937", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,16 +71,50 @@ "value": "CWE-125" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tungstenautomation:power_pdf:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.0.0.17", + "matchCriteriaId": "CDBEC5E0-C3A4-48E5-9671-89A55608200C" + } + ] + } + ] } ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-226/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-226/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-293xx/CVE-2024-29320.json b/CVE-2024/CVE-2024-293xx/CVE-2024-29320.json index f63d45364bb..aaef83a3fd5 100644 --- a/CVE-2024/CVE-2024-293xx/CVE-2024-29320.json +++ b/CVE-2024/CVE-2024-293xx/CVE-2024-29320.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29320", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-30T16:15:07.290", - "lastModified": "2024-11-21T09:07:57.167", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-03T15:00:55.543", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,30 +51,68 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wallosapp:wallos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.15.3", + "matchCriteriaId": "E1DD521C-E9B7-4489-A28E-92B50B57A658" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ellite/Wallos", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/ellite/Wallos/releases/tag/v1.15.3", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://injasec.com/open-source-software-oss/cve-2024-29320-sql-injection-in-wallos/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/ellite/Wallos", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://github.com/ellite/Wallos/releases/tag/v1.15.3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://injasec.com/open-source-software-oss/cve-2024-29320-sql-injection-in-wallos/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-315xx/CVE-2024-31578.json b/CVE-2024/CVE-2024-315xx/CVE-2024-31578.json index 42d7a40b938..c112a6c88e0 100644 --- a/CVE-2024/CVE-2024-315xx/CVE-2024-31578.json +++ b/CVE-2024/CVE-2024-315xx/CVE-2024-31578.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31578", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T14:15:08.563", - "lastModified": "2024-11-21T09:13:42.703", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-03T15:29:02.313", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,46 +51,118 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:6.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "53C87DB5-4F23-45F8-A2F1-BD69CEAC54E2" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", + "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/1047524396/45400cce5859d78dcd3a62010df8d179", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/ffmpeg/ffmpeg/commit/3bb00c0a420c3ce83c6fafee30270d69622ccad7", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://gist.github.com/1047524396/45400cce5859d78dcd3a62010df8d179", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/ffmpeg/ffmpeg/commit/3bb00c0a420c3ce83c6fafee30270d69622ccad7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-315xx/CVE-2024-31581.json b/CVE-2024/CVE-2024-315xx/CVE-2024-31581.json index 80335777c21..0c0ed05d0c4 100644 --- a/CVE-2024/CVE-2024-315xx/CVE-2024-31581.json +++ b/CVE-2024/CVE-2024-315xx/CVE-2024-31581.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31581", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T19:15:07.840", - "lastModified": "2024-11-21T09:13:43.080", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-03T15:30:44.147", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,54 +51,132 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9F9E88B2-A11F-475E-A456-538734144487" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", + "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/1047524396/a7e9273e12553775826784035333cdd8", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/FFmpeg/FFmpeg/blob/n6.1.1/libavcodec/cbs_h266_syntax_template.c#L2048", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/ffmpeg/ffmpeg/commit/ce0c178a408d43e71085c28a47d50dc939b60196", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://gist.github.com/1047524396/a7e9273e12553775826784035333cdd8", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/FFmpeg/FFmpeg/blob/n6.1.1/libavcodec/cbs_h266_syntax_template.c#L2048", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://github.com/ffmpeg/ffmpeg/commit/ce0c178a408d43e71085c28a47d50dc939b60196", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-315xx/CVE-2024-31582.json b/CVE-2024/CVE-2024-315xx/CVE-2024-31582.json index 00d8421d5bd..6384b7aa992 100644 --- a/CVE-2024/CVE-2024-315xx/CVE-2024-31582.json +++ b/CVE-2024/CVE-2024-315xx/CVE-2024-31582.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31582", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T19:15:07.893", - "lastModified": "2024-11-21T09:13:43.320", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-03T15:42:14.187", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,54 +51,134 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1", + "versionEndExcluding": "7.0", + "matchCriteriaId": "C3CED193-DA60-4F42-BC08-EF14E700C207" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", + "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/1047524396/b47d5efe3bc420fb91dbb77c73c0fff3", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/FFmpeg/FFmpeg/blob/n6.1.1/libavfilter/vf_codecview.c#L220", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/ffmpeg/ffmpeg/commit/99debe5f823f45a482e1dc08de35879aa9c74bd2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://gist.github.com/1047524396/b47d5efe3bc420fb91dbb77c73c0fff3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/FFmpeg/FFmpeg/blob/n6.1.1/libavfilter/vf_codecview.c#L220", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://github.com/ffmpeg/ffmpeg/commit/99debe5f823f45a482e1dc08de35879aa9c74bd2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-315xx/CVE-2024-31584.json b/CVE-2024/CVE-2024-315xx/CVE-2024-31584.json index 0124f7949d4..e0d99baa757 100644 --- a/CVE-2024/CVE-2024-315xx/CVE-2024-31584.json +++ b/CVE-2024/CVE-2024-315xx/CVE-2024-31584.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31584", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-19T21:15:08.080", - "lastModified": "2024-11-21T09:13:43.753", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T14:04:04.327", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:linuxfoundation:pytorch:*:*:*:*:*:python:*:*", + "versionEndExcluding": "2.2.0", + "matchCriteriaId": "CA1ACB1F-9056-4D41-A8C8-33921420D4C2" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/pytorch/pytorch/blob/v2.1.2/torch/csrc/jit/mobile/flatbuffer_loader.cpp#L305", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/pytorch/pytorch/commit/7c35874ad664e74c8e4252d67521f3986eadb0e6", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/pytorch/pytorch/blob/v2.1.2/torch/csrc/jit/mobile/flatbuffer_loader.cpp#L305", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://github.com/pytorch/pytorch/commit/7c35874ad664e74c8e4252d67521f3986eadb0e6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-315xx/CVE-2024-31585.json b/CVE-2024/CVE-2024-315xx/CVE-2024-31585.json index 45221e2f58c..11458e3aadf 100644 --- a/CVE-2024/CVE-2024-315xx/CVE-2024-31585.json +++ b/CVE-2024/CVE-2024-315xx/CVE-2024-31585.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31585", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T19:15:08.007", - "lastModified": "2024-11-21T09:13:43.997", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-03T15:35:31.007", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,54 +51,134 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.1", + "versionEndExcluding": "7.0", + "matchCriteriaId": "25FBE94E-11AB-4DBD-A040-2AC7BABA90F2" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", + "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/1047524396/dc2c64ffe0c3934a6176bcd2c5cf5656", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/FFmpeg/FFmpeg/commit/81df787b53eb5c6433731f6eaaf7f2a94d8a8c80", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/ffmpeg/ffmpeg/commit/ab0fdaedd1e7224f7e84ea22fcbfaa4ca75a6c06", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://gist.github.com/1047524396/dc2c64ffe0c3934a6176bcd2c5cf5656", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/FFmpeg/FFmpeg/commit/81df787b53eb5c6433731f6eaaf7f2a94d8a8c80", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://github.com/ffmpeg/ffmpeg/commit/ab0fdaedd1e7224f7e84ea22fcbfaa4ca75a6c06", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-321xx/CVE-2024-32166.json b/CVE-2024/CVE-2024-321xx/CVE-2024-32166.json index de77f5d5170..bf34267d615 100644 --- a/CVE-2024/CVE-2024-321xx/CVE-2024-32166.json +++ b/CVE-2024/CVE-2024-321xx/CVE-2024-32166.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32166", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-19T14:15:11.190", - "lastModified": "2024-11-21T09:14:34.507", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T14:02:49.403", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:webidsupport:webid:1.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "CF64DAA3-8875-4923-AA04-196244F9E51E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Fewword/Poc/blob/main/webid/webid-poc14.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/Fewword/Poc/blob/main/webid/webid-poc14.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-322xx/CVE-2024-32228.json b/CVE-2024/CVE-2024-322xx/CVE-2024-32228.json index 8935b9289bd..19892a7f52f 100644 --- a/CVE-2024/CVE-2024-322xx/CVE-2024-32228.json +++ b/CVE-2024/CVE-2024-322xx/CVE-2024-32228.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32228", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T21:15:03.480", - "lastModified": "2024-11-21T09:14:36.510", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-03T15:33:22.030", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -55,14 +55,43 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "53081022-F93B-4ED8-8D24-CD47DC87A17D" + } + ] + } + ] + } + ], "references": [ { "url": "https://trac.ffmpeg.org/ticket/10951", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory", + "Patch" + ] }, { "url": "https://trac.ffmpeg.org/ticket/10951", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-322xx/CVE-2024-32229.json b/CVE-2024/CVE-2024-322xx/CVE-2024-32229.json index 4ddad63530b..33da3b3be02 100644 --- a/CVE-2024/CVE-2024-322xx/CVE-2024-32229.json +++ b/CVE-2024/CVE-2024-322xx/CVE-2024-32229.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32229", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T21:15:03.553", - "lastModified": "2024-11-21T09:14:36.740", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-03T15:31:43.907", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,41 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "53081022-F93B-4ED8-8D24-CD47DC87A17D" + } + ] + } + ] + } + ], "references": [ { "url": "https://trac.ffmpeg.org/ticket/10950", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://trac.ffmpeg.org/ticket/10950", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32358.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32358.json index 36442edaed9..2a59e261c8f 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32358.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32358.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32358", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-25T17:15:50.020", - "lastModified": "2024-11-21T09:14:50.107", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T14:24:31.497", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,34 +39,84 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jpress:jpress:5.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "71570285-90F9-4DE8-97D4-2A83A7213C5B" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/rootlili/a6b6c89591f4773857ae81b7ca5898bc", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://gitee.com/JPressProjects/jpress/releases/tag/v5.1.0", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/JPressProjects/jpress/releases/tag/v5.1.0", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.jpress.cn/download", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://www.wolai.com/catr00t/2LujDzjjcrAjUYpWtcusXD", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Permissions Required" + ] }, { "url": "https://gist.github.com/rootlili/a6b6c89591f4773857ae81b7ca5898bc", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.wolai.com/catr00t/2LujDzjjcrAjUYpWtcusXD", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-333xx/CVE-2024-33332.json b/CVE-2024/CVE-2024-333xx/CVE-2024-33332.json index 7a431f4c30f..4c12fe7252f 100644 --- a/CVE-2024/CVE-2024-333xx/CVE-2024-33332.json +++ b/CVE-2024/CVE-2024-333xx/CVE-2024-33332.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33332", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-30T20:15:08.467", - "lastModified": "2025-03-27T17:15:55.883", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T14:29:05.990", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bladex:springblade:3.7.1:*:*:*:*:*:*:*", + "matchCriteriaId": "56CC5A42-C482-4A0B-9389-904193245B9A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/wy876/cve/issues/3", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/wy876/cve/issues/3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-350xx/CVE-2024-35056.json b/CVE-2024/CVE-2024-350xx/CVE-2024-35056.json index ed530a9bd6d..48d03f76ddf 100644 --- a/CVE-2024/CVE-2024-350xx/CVE-2024-35056.json +++ b/CVE-2024/CVE-2024-350xx/CVE-2024-35056.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35056", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-21T18:15:09.737", - "lastModified": "2024-11-21T09:19:43.337", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T14:14:43.347", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nasa:ait_core:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.5.2", + "matchCriteriaId": "63A0CA8C-1E29-4DEA-B94A-FF743059D31E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/advisories/GHSA-gpgj-xrgw-8mx2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.linkedin.com/pulse/remote-code-execution-via-man-in-the-middle-more-ujkze", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/advisories/GHSA-gpgj-xrgw-8mx2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.linkedin.com/pulse/remote-code-execution-via-man-in-the-middle-more-ujkze", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-350xx/CVE-2024-35057.json b/CVE-2024/CVE-2024-350xx/CVE-2024-35057.json index 71fc17ccc72..46cae4e90a4 100644 --- a/CVE-2024/CVE-2024-350xx/CVE-2024-35057.json +++ b/CVE-2024/CVE-2024-350xx/CVE-2024-35057.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35057", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-21T18:15:09.820", - "lastModified": "2024-11-21T09:19:43.570", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T14:15:27.450", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nasa:ait_core:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.5.2", + "matchCriteriaId": "63A0CA8C-1E29-4DEA-B94A-FF743059D31E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/advisories/GHSA-jf28-v5f6-cvpr", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.linkedin.com/pulse/remote-code-execution-via-man-in-the-middle-more-ujkze", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/advisories/GHSA-jf28-v5f6-cvpr", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.linkedin.com/pulse/remote-code-execution-via-man-in-the-middle-more-ujkze", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-350xx/CVE-2024-35058.json b/CVE-2024/CVE-2024-350xx/CVE-2024-35058.json index 142705168c6..d6a7132f58e 100644 --- a/CVE-2024/CVE-2024-350xx/CVE-2024-35058.json +++ b/CVE-2024/CVE-2024-350xx/CVE-2024-35058.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35058", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-21T18:15:09.903", - "lastModified": "2024-11-21T09:19:43.810", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T14:15:39.230", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nasa:ait_core:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.5.2", + "matchCriteriaId": "63A0CA8C-1E29-4DEA-B94A-FF743059D31E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/advisories/GHSA-4gxj-5mmr-7pxq", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.linkedin.com/pulse/remote-code-execution-via-man-in-the-middle-more-ujkze", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/advisories/GHSA-4gxj-5mmr-7pxq", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.linkedin.com/pulse/remote-code-execution-via-man-in-the-middle-more-ujkze", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-350xx/CVE-2024-35059.json b/CVE-2024/CVE-2024-350xx/CVE-2024-35059.json index da089b3d025..336e0d9292c 100644 --- a/CVE-2024/CVE-2024-350xx/CVE-2024-35059.json +++ b/CVE-2024/CVE-2024-350xx/CVE-2024-35059.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35059", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-21T19:15:10.240", - "lastModified": "2024-11-21T09:19:44.017", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T14:15:55.690", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nasa:ait_core:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.5.2", + "matchCriteriaId": "63A0CA8C-1E29-4DEA-B94A-FF743059D31E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/advisories/GHSA-jqff-8g2v-642h", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.linkedin.com/pulse/remote-code-execution-via-man-in-the-middle-more-ujkze", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/advisories/GHSA-jqff-8g2v-642h", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.linkedin.com/pulse/remote-code-execution-via-man-in-the-middle-more-ujkze", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-350xx/CVE-2024-35060.json b/CVE-2024/CVE-2024-350xx/CVE-2024-35060.json index f717d8f8d4c..1fa1d8be912 100644 --- a/CVE-2024/CVE-2024-350xx/CVE-2024-35060.json +++ b/CVE-2024/CVE-2024-350xx/CVE-2024-35060.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35060", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-21T19:15:10.313", - "lastModified": "2024-11-21T09:19:44.223", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T14:16:05.870", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nasa:ait_core:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.5.2", + "matchCriteriaId": "63A0CA8C-1E29-4DEA-B94A-FF743059D31E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/advisories/GHSA-45q4-h8rr-hgx2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.linkedin.com/pulse/remote-code-execution-via-man-in-the-middle-more-ujkze", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/advisories/GHSA-45q4-h8rr-hgx2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.linkedin.com/pulse/remote-code-execution-via-man-in-the-middle-more-ujkze", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-350xx/CVE-2024-35061.json b/CVE-2024/CVE-2024-350xx/CVE-2024-35061.json index c86c815445a..3f45071d189 100644 --- a/CVE-2024/CVE-2024-350xx/CVE-2024-35061.json +++ b/CVE-2024/CVE-2024-350xx/CVE-2024-35061.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35061", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-21T19:15:10.390", - "lastModified": "2024-11-21T09:19:44.430", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T14:16:41.090", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,30 +51,66 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nasa:ait_core:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.5.2", + "matchCriteriaId": "63A0CA8C-1E29-4DEA-B94A-FF743059D31E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/advisories/GHSA-jqff-8g2v-642h", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Not Applicable" + ] }, { "url": "https://github.com/advisories/GHSA-qv6x-53jj-vw59", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.linkedin.com/pulse/remote-code-execution-via-man-in-the-middle-more-ujkze", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/advisories/GHSA-jqff-8g2v-642h", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] }, { "url": "https://github.com/advisories/GHSA-qv6x-53jj-vw59", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.linkedin.com/pulse/remote-code-execution-via-man-in-the-middle-more-ujkze", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36486.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36486.json index 81ba73e51c0..e7ff734e908 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36486.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36486.json @@ -2,13 +2,17 @@ "id": "CVE-2024-36486", "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-06-03T10:15:20.657", - "lastModified": "2025-06-03T11:15:20.383", + "lastModified": "2025-06-03T14:15:47.160", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A privilege escalation vulnerability exists in the virtual machine archive restoration functionality of Parallels Desktop for Mac version 20.1.1 (55740). When an archived virtual machine is restored, the prl_vmarchiver tool decompresses the file and writes the content back to its original location using root privileges. An attacker can exploit this process by using a hard link to write to an arbitrary file, potentially resulting in privilege escalation." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de escalada de privilegios en la funci\u00f3n de restauraci\u00f3n del archivo de una m\u00e1quina virtual de Parallels Desktop para Mac versi\u00f3n 20.1.1 (55740). Al restaurar una m\u00e1quina virtual archivada, la herramienta prl_vmarchiver descomprime el archivo y escribe el contenido de vuelta en su ubicaci\u00f3n original con privilegios de root. Un atacante puede explotar este proceso utilizando un enlace f\u00edsico para escribir en un archivo arbitrario, lo que podr\u00eda provocar una escalada de privilegios." } ], "metrics": { @@ -55,6 +59,10 @@ { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2126", "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-2126", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-413xx/CVE-2024-41334.json b/CVE-2024/CVE-2024-413xx/CVE-2024-41334.json index c7201cc3c09..e4114462f42 100644 --- a/CVE-2024/CVE-2024-413xx/CVE-2024-41334.json +++ b/CVE-2024/CVE-2024-413xx/CVE-2024-41334.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41334", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T21:15:36.483", - "lastModified": "2025-05-06T18:15:36.477", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T14:06:43.900", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,582 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:draytek:vigor166_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.2.6", + "matchCriteriaId": "013EEA0E-3D6A-43AE-A504-8439462C4F20" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:draytek:vigor166:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E33E647-5883-44FA-9915-34B89090D4E4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:draytek:vigor2620_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.9.8.8", + "matchCriteriaId": "41CEC37D-608B-4A8C-B8F4-803FF9A8179D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:draytek:vigor2620:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5D98663B-F2F5-4ADC-9FD5-75846890EEBA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:draytek:vigorlte200_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.9.8.8", + "matchCriteriaId": "BDF86F14-D8AA-4F7A-978E-C390BECD2A56" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:draytek:vigorlte200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4DBF2015-9315-44C8-A9FE-E86146F1958E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:draytek:vigor2860_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.9.7", + "matchCriteriaId": "3B13C853-B725-4F3F-B919-1EDCF1F1FA6B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:draytek:vigor2860:-:*:*:*:*:*:*:*", + "matchCriteriaId": "266C73DE-BFC6-4F3E-B022-559B3971CA44" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:draytek:vigor2925_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.9.7", + "matchCriteriaId": "D9512D67-5D05-4707-9C01-FEF27BC7D8CD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:draytek:vigor2925:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7536B29C-2030-4331-B8BF-D269D86D199B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:draytek:vigor2862_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.9.9.4", + "matchCriteriaId": "825055C3-9212-4406-865A-5CCB27C4E3FE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:draytek:vigor2862:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8B01EDAE-BB9E-4431-BE8C-6505BA7CA42D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:draytek:vigor2926_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.9.9.4", + "matchCriteriaId": "3E5E7BCA-A181-4689-80AD-5B0BF4A62D45" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:draytek:vigor2926:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AF1B117B-603D-493C-A804-C18ED332A221" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:draytek:vigor2133_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.9.8", + "matchCriteriaId": "CEF9194C-9EC2-4B08-8264-F58E1C649473" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:draytek:vigor2133:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1878E59C-FB40-435D-940A-8952C56FA88B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:draytek:vigor2762_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.9.8", + "matchCriteriaId": "68C3D0EB-6019-43A2-BE4E-17E30985BCF0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:draytek:vigor2762:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3873B2B9-95C1-4F00-9165-7C4D2A90CDE5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:draytek:vigor2832_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.9.8", + "matchCriteriaId": "07D71EA7-2F97-4F7D-BDB8-246710EEEE34" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:draytek:vigor2832:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B0978465-D59F-4C0A-A29F-5D7BE58BA557" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:draytek:vigor2135_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.4.5.1", + "matchCriteriaId": "6FD4B17C-2E8A-45C9-8475-C5FD40C86052" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:draytek:vigor2135:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AEDC8A7F-08CF-44D2-A9A5-A1353AF35B45" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:draytek:vigor2765_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.4.5.1", + "matchCriteriaId": "815465FB-9BDB-4A16-9E8A-A73B928A7999" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:draytek:vigor2765:-:*:*:*:*:*:*:*", + "matchCriteriaId": "60657812-D3A8-4B1B-B7BE-F629991CB053" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:draytek:vigor2766_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.4.5.1", + "matchCriteriaId": "73E966A8-E862-4118-B178-93C297765B0B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:draytek:vigor2766:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C0AB3C84-67CA-4531-85FB-1A56F3C93ABF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:draytek:vigor2865_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.4.5.3", + "matchCriteriaId": "31F174D4-CDE6-401D-9040-34B862BDE1F9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:draytek:vigor2865:-:*:*:*:*:*:*:*", + "matchCriteriaId": "871448C6-9183-4828-A287-05F5EC6A44F6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:draytek:vigor2866_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.4.5.3", + "matchCriteriaId": "D9B2CD77-C72F-4C26-B082-EA2671A59116" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:draytek:vigor2866:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D0D2760-739F-4C79-AEDC-8B2CCCA2FF53" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:draytek:vigor2927_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.4.5.3", + "matchCriteriaId": "570A3205-4E89-47E5-9FAE-2D4FFBD5A667" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:draytek:vigor2927:-:*:*:*:*:*:*:*", + "matchCriteriaId": "12460F51-25AB-4EA9-BC43-9CE8DA992D75" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.3.2.7", + "matchCriteriaId": "2D8A49BF-8174-42D6-B7C2-A461F0B3DC57" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:draytek:vigor2962:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BD0C9A21-7CFE-452F-8505-834AB8579D9B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.3.2.7", + "matchCriteriaId": "20C6D6BC-9B8D-4108-80F8-4647013B7843" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*", + "matchCriteriaId": "894E4DDA-D9BE-441D-B447-B1CE52959347" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:draytek:vigor3912_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.3.5.2", + "matchCriteriaId": "B7ECBEFC-3444-4732-80C5-24E4B40B7413" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:draytek:vigor3912:-:*:*:*:*:*:*:*", + "matchCriteriaId": "282E5318-DAA8-4AA2-8E7D-4B8BD9162153" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:draytek:vigor165_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.2.6", + "matchCriteriaId": "120469A7-CC8F-46B9-8EAD-D272485DBBAC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:draytek:vigor165:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8E644893-0457-43A9-98AB-9DB37A5C415C" + } + ] + } + ] + } + ], "references": [ { "url": "http://draytek.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://medium.com/faraday/advisory-multiple-vulnerabilities-affecting-draytek-routers-78a6cb8b3946", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-413xx/CVE-2024-41338.json b/CVE-2024/CVE-2024-413xx/CVE-2024-41338.json index f84e73d33be..d6fa8cf0c30 100644 --- a/CVE-2024/CVE-2024-413xx/CVE-2024-41338.json +++ b/CVE-2024/CVE-2024-413xx/CVE-2024-41338.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41338", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T21:15:36.753", - "lastModified": "2025-02-28T15:15:11.727", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T14:06:40.670", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,582 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:draytek:vigor165_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.2.6", + "matchCriteriaId": "120469A7-CC8F-46B9-8EAD-D272485DBBAC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:draytek:vigor165:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8E644893-0457-43A9-98AB-9DB37A5C415C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:draytek:vigor166_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.2.6", + "matchCriteriaId": "013EEA0E-3D6A-43AE-A504-8439462C4F20" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:draytek:vigor166:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E33E647-5883-44FA-9915-34B89090D4E4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:draytek:vigor2620_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.9.8.8", + "matchCriteriaId": "41CEC37D-608B-4A8C-B8F4-803FF9A8179D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:draytek:vigor2620:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5D98663B-F2F5-4ADC-9FD5-75846890EEBA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:draytek:vigorlte200_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.9.8.8", + "matchCriteriaId": "BDF86F14-D8AA-4F7A-978E-C390BECD2A56" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:draytek:vigorlte200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4DBF2015-9315-44C8-A9FE-E86146F1958E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:draytek:vigor2860_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.9.7", + "matchCriteriaId": "3B13C853-B725-4F3F-B919-1EDCF1F1FA6B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:draytek:vigor2860:-:*:*:*:*:*:*:*", + "matchCriteriaId": "266C73DE-BFC6-4F3E-B022-559B3971CA44" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:draytek:vigor2925_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.9.7", + "matchCriteriaId": "D9512D67-5D05-4707-9C01-FEF27BC7D8CD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:draytek:vigor2925:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7536B29C-2030-4331-B8BF-D269D86D199B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:draytek:vigor2862_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.9.9.4", + "matchCriteriaId": "825055C3-9212-4406-865A-5CCB27C4E3FE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:draytek:vigor2862:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8B01EDAE-BB9E-4431-BE8C-6505BA7CA42D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:draytek:vigor2926_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.9.9.4", + "matchCriteriaId": "3E5E7BCA-A181-4689-80AD-5B0BF4A62D45" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:draytek:vigor2926:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AF1B117B-603D-493C-A804-C18ED332A221" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:draytek:vigor2133_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.9.8", + "matchCriteriaId": "CEF9194C-9EC2-4B08-8264-F58E1C649473" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:draytek:vigor2133:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1878E59C-FB40-435D-940A-8952C56FA88B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:draytek:vigor2762_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.9.8", + "matchCriteriaId": "68C3D0EB-6019-43A2-BE4E-17E30985BCF0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:draytek:vigor2762:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3873B2B9-95C1-4F00-9165-7C4D2A90CDE5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:draytek:vigor2832_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.9.8", + "matchCriteriaId": "07D71EA7-2F97-4F7D-BDB8-246710EEEE34" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:draytek:vigor2832:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B0978465-D59F-4C0A-A29F-5D7BE58BA557" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:draytek:vigor2135_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.4.5.1", + "matchCriteriaId": "6FD4B17C-2E8A-45C9-8475-C5FD40C86052" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:draytek:vigor2135:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AEDC8A7F-08CF-44D2-A9A5-A1353AF35B45" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:draytek:vigor2765_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.4.5.1", + "matchCriteriaId": "815465FB-9BDB-4A16-9E8A-A73B928A7999" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:draytek:vigor2765:-:*:*:*:*:*:*:*", + "matchCriteriaId": "60657812-D3A8-4B1B-B7BE-F629991CB053" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:draytek:vigor2766_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.4.5.1", + "matchCriteriaId": "73E966A8-E862-4118-B178-93C297765B0B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:draytek:vigor2766:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C0AB3C84-67CA-4531-85FB-1A56F3C93ABF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:draytek:vigor2865_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.4.5.3", + "matchCriteriaId": "31F174D4-CDE6-401D-9040-34B862BDE1F9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:draytek:vigor2865:-:*:*:*:*:*:*:*", + "matchCriteriaId": "871448C6-9183-4828-A287-05F5EC6A44F6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:draytek:vigor2866_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.4.5.3", + "matchCriteriaId": "D9B2CD77-C72F-4C26-B082-EA2671A59116" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:draytek:vigor2866:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D0D2760-739F-4C79-AEDC-8B2CCCA2FF53" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:draytek:vigor2927_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.4.5.3", + "matchCriteriaId": "570A3205-4E89-47E5-9FAE-2D4FFBD5A667" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:draytek:vigor2927:-:*:*:*:*:*:*:*", + "matchCriteriaId": "12460F51-25AB-4EA9-BC43-9CE8DA992D75" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.3.2.7", + "matchCriteriaId": "2D8A49BF-8174-42D6-B7C2-A461F0B3DC57" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:draytek:vigor2962:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BD0C9A21-7CFE-452F-8505-834AB8579D9B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.3.2.7", + "matchCriteriaId": "20C6D6BC-9B8D-4108-80F8-4647013B7843" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*", + "matchCriteriaId": "894E4DDA-D9BE-441D-B447-B1CE52959347" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:draytek:vigor3912_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.3.5.2", + "matchCriteriaId": "B7ECBEFC-3444-4732-80C5-24E4B40B7413" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:draytek:vigor3912:-:*:*:*:*:*:*:*", + "matchCriteriaId": "282E5318-DAA8-4AA2-8E7D-4B8BD9162153" + } + ] + } + ] + } + ], "references": [ { "url": "http://draytek.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://medium.com/faraday/advisory-multiple-vulnerabilities-affecting-draytek-routers-78a6cb8b3946", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43027.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43027.json index 881d73f131e..c024e12ec36 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43027.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43027.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43027", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-21T16:15:08.297", - "lastModified": "2024-08-23T18:35:06.387", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-03T14:09:46.200", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,100 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:draytek:vigor300b_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.5.1.5", + "matchCriteriaId": "633B159D-48BA-4337-86D2-B7A19058063F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:draytek:vigor300b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DA5B988D-ED1A-4CBF-8B34-C5B03A55ED52" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:draytek:vigor2960_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.5.1.5", + "matchCriteriaId": "1FB6AA05-30EA-4A0C-B836-1D5D80C80F48" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:draytek:vigor2960:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FDA3905-67DD-4F31-AFCF-014F1D7CCC1F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:draytek:vigor3900_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.5.1.5", + "matchCriteriaId": "12389B47-2F93-497E-AD71-132A323BE4BE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:draytek:vigor3900:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FEECFBBC-5551-4135-9194-4216A39B04B9" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/N1nEmAn/wp/blob/main/V3900.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43033.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43033.json index 5ce49880f54..323695b5693 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43033.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43033.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43033", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-22T01:15:03.540", - "lastModified": "2024-08-22T16:35:08.663", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T14:25:22.093", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,60 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jpress:jpress:*:*:*:*:*:*:*:*", + "versionEndIncluding": "5.1.1", + "matchCriteriaId": "F631C7C4-C4DB-4188-A24F-5E127F52571A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://cwe.mitre.org/data/definitions/69.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Not Applicable" + ] }, { "url": "https://github.com/JPressProjects/jpress/issues/188", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://github.com/lazy-forever/CVE-Reference/tree/main/2024/43033", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-456xx/CVE-2024-45655.json b/CVE-2024/CVE-2024-456xx/CVE-2024-45655.json new file mode 100644 index 00000000000..5a2e58d3c0d --- /dev/null +++ b/CVE-2024/CVE-2024-456xx/CVE-2024-45655.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-45655", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-06-03T15:15:58.093", + "lastModified": "2025-06-03T15:15:58.093", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Application Gateway 19.12 through 24.09 could allow a local privileged user to perform unauthorized actions due to incorrect permissions assignment." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7235378", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51058.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51058.json index 07d275d8715..707d824b537 100644 --- a/CVE-2024/CVE-2024-510xx/CVE-2024-51058.json +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51058.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51058", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-26T18:15:19.440", - "lastModified": "2024-11-26T20:15:33.253", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T14:21:08.673", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tcpdf_project:tcpdf:6.7.5:*:*:*:*:*:*:*", + "matchCriteriaId": "B68917D5-5E80-4583-91F1-2C6218B2C6AE" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/saravana-hackz/vulnerability-research/tree/main/CVE-2024-51058", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "Patch" + ] }, { "url": "https://github.com/tecnickcom/TCPDF", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/tecnickcom/TCPDF/commit/bfa7d2b6d455ebf72ebe3d48fbd487ee5a1f6f3b", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51099.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51099.json index 46eeae0fb6a..6a536a47b23 100644 --- a/CVE-2024/CVE-2024-510xx/CVE-2024-51099.json +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51099.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51099", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-23T16:15:24.527", - "lastModified": "2025-05-29T16:15:39.070", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-03T15:47:00.773", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:medical_card_generation_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "024186C5-26DF-43AC-BDEA-732C94D55DF8" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/0xBhushan/Writeups/blob/main/CVE/phpGurukul/Medical%20Card%20Generation%20System/Reflected%20Cross-Site%20Scripting%20%28XSS%29-medical%20card%20details%20search.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/0xBhushan/Writeups/blob/main/CVE/phpGurukul/Medical%20Card%20Generation%20System/Reflected%20Cross-Site%20Scripting%20%28XSS%29-medical%20card%20details%20search.pdf", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-511xx/CVE-2024-51102.json b/CVE-2024/CVE-2024-511xx/CVE-2024-51102.json index 240fa954bf0..dabbff050b3 100644 --- a/CVE-2024/CVE-2024-511xx/CVE-2024-51102.json +++ b/CVE-2024/CVE-2024-511xx/CVE-2024-51102.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51102", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-23T18:15:36.537", - "lastModified": "2025-05-28T14:58:52.920", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-03T15:47:17.760", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:student_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "54637617-AF72-4864-9AE7-148692C45F09" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/0xBhushan/Writeups/blob/main/CVE/phpGurukul/Student%20Management%20System/SQL%20Injection%20-%20admin%20login.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-511xx/CVE-2024-51103.json b/CVE-2024/CVE-2024-511xx/CVE-2024-51103.json index b4f418b6d55..c6260f2e318 100644 --- a/CVE-2024/CVE-2024-511xx/CVE-2024-51103.json +++ b/CVE-2024/CVE-2024-511xx/CVE-2024-51103.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51103", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-23T16:15:24.643", - "lastModified": "2025-05-28T14:58:52.920", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-03T15:47:09.077", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:student_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "54637617-AF72-4864-9AE7-148692C45F09" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/0xBhushan/Writeups/blob/main/CVE/phpGurukul/Student%20Management%20System/SQL%20Injection-Password-Recovery.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-515xx/CVE-2024-51506.json b/CVE-2024/CVE-2024-515xx/CVE-2024-51506.json index ccf0ac58ad1..c187492b60e 100644 --- a/CVE-2024/CVE-2024-515xx/CVE-2024-51506.json +++ b/CVE-2024/CVE-2024-515xx/CVE-2024-51506.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51506", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-28T23:15:02.667", - "lastModified": "2024-10-29T19:35:28.723", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T14:53:08.277", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tiki:tiki:*:*:*:*:*:*:*:*", + "versionEndIncluding": "27.0", + "matchCriteriaId": "0F1504CD-859C-4584-9ADF-17B7C2012988" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/r0ck3t1973/xss_payload/issues/8", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://security.tiki.org/Disclose-a-Vulnerability", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-515xx/CVE-2024-51507.json b/CVE-2024/CVE-2024-515xx/CVE-2024-51507.json index 8ed5762c41c..d6943b4697f 100644 --- a/CVE-2024/CVE-2024-515xx/CVE-2024-51507.json +++ b/CVE-2024/CVE-2024-515xx/CVE-2024-51507.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51507", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-28T23:15:02.753", - "lastModified": "2024-10-29T19:35:29.513", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T14:55:25.300", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tiki:tiki:*:*:*:*:*:*:*:*", + "versionEndIncluding": "27.0", + "matchCriteriaId": "0F1504CD-859C-4584-9ADF-17B7C2012988" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/r0ck3t1973/xss_payload/issues/9", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://security.tiki.org/Disclose-a-Vulnerability", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-515xx/CVE-2024-51508.json b/CVE-2024/CVE-2024-515xx/CVE-2024-51508.json index 41c5b89c31d..20c78744a9d 100644 --- a/CVE-2024/CVE-2024-515xx/CVE-2024-51508.json +++ b/CVE-2024/CVE-2024-515xx/CVE-2024-51508.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51508", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-28T23:15:02.837", - "lastModified": "2024-10-29T19:35:30.513", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T14:57:49.447", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tiki:tiki:*:*:*:*:*:*:*:*", + "versionEndIncluding": "27.0", + "matchCriteriaId": "0F1504CD-859C-4584-9ADF-17B7C2012988" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/r0ck3t1973/xss_payload/issues/9", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://security.tiki.org/Disclose-a-Vulnerability", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-515xx/CVE-2024-51509.json b/CVE-2024/CVE-2024-515xx/CVE-2024-51509.json index 414cb184bc1..659ecc9832f 100644 --- a/CVE-2024/CVE-2024-515xx/CVE-2024-51509.json +++ b/CVE-2024/CVE-2024-515xx/CVE-2024-51509.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51509", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-28T23:15:02.907", - "lastModified": "2024-10-29T19:35:31.290", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T14:57:28.683", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tiki:tiki:*:*:*:*:*:*:*:*", + "versionEndIncluding": "27.0", + "matchCriteriaId": "0F1504CD-859C-4584-9ADF-17B7C2012988" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/r0ck3t1973/xss_payload/issues/10", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://security.tiki.org/Disclose-a-Vulnerability", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-525xx/CVE-2024-52561.json b/CVE-2024/CVE-2024-525xx/CVE-2024-52561.json index 3a33f3b682a..5c834536c63 100644 --- a/CVE-2024/CVE-2024-525xx/CVE-2024-52561.json +++ b/CVE-2024/CVE-2024-525xx/CVE-2024-52561.json @@ -2,13 +2,17 @@ "id": "CVE-2024-52561", "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-06-03T10:15:21.857", - "lastModified": "2025-06-03T11:15:20.513", + "lastModified": "2025-06-03T14:15:47.283", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A privilege escalation vulnerability exists in the Snapshot functionality of Parallels Desktop for Mac version 20.1.1 (build 55740). When a snapshot of a virtual machine is deleted, a root service verifies and modifies the ownership of the snapshot files. By using a symlink, an attacker can change the ownership of files owned by root to a lower-privilege user, potentially leading to privilege escalation." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de escalada de privilegios en la funci\u00f3n de instant\u00e1neas de Parallels Desktop para Mac versi\u00f3n 20.1.1 (compilaci\u00f3n 55740). Al eliminar una instant\u00e1nea de una m\u00e1quina virtual, un servicio root verifica y modifica la propiedad de los archivos de la instant\u00e1nea. Mediante un enlace simb\u00f3lico, un atacante puede cambiar la propiedad de los archivos pertenecientes al usuario root a un usuario con menos privilegios, lo que podr\u00eda provocar una escalada de privilegios." } ], "metrics": { @@ -55,6 +59,10 @@ { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2123", "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-2123", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-534xx/CVE-2024-53423.json b/CVE-2024/CVE-2024-534xx/CVE-2024-53423.json index 7b99c9a29c9..c1cbed76a15 100644 --- a/CVE-2024/CVE-2024-534xx/CVE-2024-53423.json +++ b/CVE-2024/CVE-2024-534xx/CVE-2024-53423.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53423", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-29T18:15:23.530", - "lastModified": "2025-05-30T16:31:03.107", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-03T15:36:02.130", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:opennetworking:onos:2.7.0:-:*:*:*:*:*:*", + "matchCriteriaId": "C53EDA78-BE22-49C3-9610-EEBAC76C1632" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/kjw6855/abeecc798d138b49537393e1fd3a5e96", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://wiki.onosproject.org/pages/viewpage.action?pageId=16122675", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-541xx/CVE-2024-54189.json b/CVE-2024/CVE-2024-541xx/CVE-2024-54189.json index 3d5dcf71032..7f399781ae3 100644 --- a/CVE-2024/CVE-2024-541xx/CVE-2024-54189.json +++ b/CVE-2024/CVE-2024-541xx/CVE-2024-54189.json @@ -2,13 +2,17 @@ "id": "CVE-2024-54189", "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-06-03T10:15:22.040", - "lastModified": "2025-06-03T11:15:20.613", + "lastModified": "2025-06-03T14:15:47.803", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A privilege escalation vulnerability exists in the Snapshot functionality of Parallels Desktop for Mac version 20.1.1 (build 55740). When a snapshot of a virtual machine is taken, a root service writes to a file owned by a normal user. By using a hard link, an attacker can write to an arbitrary file, potentially leading to privilege escalation." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de escalada de privilegios en la funci\u00f3n de instant\u00e1neas de Parallels Desktop para Mac versi\u00f3n 20.1.1 (compilaci\u00f3n 55740). Al tomar una instant\u00e1nea de una m\u00e1quina virtual, un servicio root escribe en un archivo propiedad de un usuario normal. Mediante un enlace f\u00edsico, un atacante puede escribir en un archivo arbitrario, lo que podr\u00eda provocar una escalada de privilegios." } ], "metrics": { @@ -55,6 +59,10 @@ { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2124", "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-2124", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-553xx/CVE-2024-55371.json b/CVE-2024/CVE-2024-553xx/CVE-2024-55371.json index 2b83fcf2365..5a611674c82 100644 --- a/CVE-2024/CVE-2024-553xx/CVE-2024-55371.json +++ b/CVE-2024/CVE-2024-553xx/CVE-2024-55371.json @@ -2,8 +2,8 @@ "id": "CVE-2024-55371", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-16T21:15:45.790", - "lastModified": "2025-04-17T20:21:48.243", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-03T15:00:13.860", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wallosapp:wallos:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.38.2", + "matchCriteriaId": "9EACD600-8B84-434C-96AF-BB36B3E56BB8" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.datafarm.co.th/blog/CVE-2024-55371-and-CVE-2024-55372-Malicious-File-Upload-to-RCE-in-Wallos-Application", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-553xx/CVE-2024-55372.json b/CVE-2024/CVE-2024-553xx/CVE-2024-55372.json index 3d734ca4253..7af3b0fe571 100644 --- a/CVE-2024/CVE-2024-553xx/CVE-2024-55372.json +++ b/CVE-2024/CVE-2024-553xx/CVE-2024-55372.json @@ -2,8 +2,8 @@ "id": "CVE-2024-55372", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-16T21:15:45.897", - "lastModified": "2025-04-17T20:21:48.243", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-03T14:59:54.913", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wallosapp:wallos:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.38.2", + "matchCriteriaId": "9EACD600-8B84-434C-96AF-BB36B3E56BB8" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.datafarm.co.th/blog/CVE-2024-55371-and-CVE-2024-55372-Malicious-File-Upload-to-RCE-in-Wallos-Application", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-21xx/CVE-2025-2146.json b/CVE-2025/CVE-2025-21xx/CVE-2025-2146.json index 74161bfac78..713959c2b30 100644 --- a/CVE-2025/CVE-2025-21xx/CVE-2025-2146.json +++ b/CVE-2025/CVE-2025-21xx/CVE-2025-2146.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2146", "sourceIdentifier": "f98c90f0-e9bd-4fa7-911b-51993f3571fd", "published": "2025-05-26T00:15:19.900", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T15:49:50.793", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,24 +69,1084 @@ "value": "CWE-787" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canon:satera_mf656cdw_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "05.07", + "matchCriteriaId": "50CBC0DB-EDF0-480A-A70D-E2EC861E7856" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:canon:satera_mf656cdw:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C16886A1-AD0C-4160-A007-73FE2AE8352E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canon:satera_mf654cdw_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "05.07", + "matchCriteriaId": "78F4003A-CA5B-42FC-8C0B-4314FA55269B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:canon:satera_mf654cdw:-:*:*:*:*:*:*:*", + "matchCriteriaId": "538DAB91-C429-4229-95CC-DFC3621A2272" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canon:satera_mf551dw_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "05.07", + "matchCriteriaId": "FA5A8C0F-8A4F-4C72-8B63-EC3C1B6571A7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:canon:satera_mf551dw:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F9754E22-C75A-4612-B6D8-0C457F6C87C1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canon:satera_mf457dw_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "05.07", + "matchCriteriaId": "CED524B5-FB70-4120-862B-F0E507A9E7CF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:canon:satera_mf457dw:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B95FB46A-76F0-4E49-B7A9-F9168A762CE9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canon:imageclass_mf656cdw_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "05.07", + "matchCriteriaId": "EFC8CB9F-A2CA-4DF0-B1EE-51ED07BF39DB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:canon:imageclass_mf656cdw:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8B926D58-EB28-42F5-AAA2-CE05355E9A15" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canon:imageclass_mf654cdw_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "05.07", + "matchCriteriaId": "FEE953E4-A36B-447A-B3DA-D5C4091F1538" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:canon:imageclass_mf654cdw:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FD684D2-C55B-4AA2-A5A3-4E4C8BA97771" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canon:imageclass_mf653cdw_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "05.07", + "matchCriteriaId": "1257A7A5-C908-40D3-AA70-18DE80A41077" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:canon:imageclass_mf653cdw:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59E83B92-CC50-4DDB-9968-ADB50DE1977E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canon:imageclass_mf652cdw_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "05.07", + "matchCriteriaId": "E3C29460-29C0-418C-8185-A7FDB6764BDD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:canon:imageclass_mf652cdw:-:*:*:*:*:*:*:*", + "matchCriteriaId": "511F8F45-2DAF-4DD2-94DD-46D3E37C44E7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canon:imageclass_lbp633cdw_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "05.07", + "matchCriteriaId": "BF95B4E9-371F-4EA5-95C3-A42D2DEDAFB8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:canon:imageclass_lbp633cdw:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F91A97EF-C816-453C-A52E-F328937EFACD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canon:imageclass_lbp632cdw_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "05.07", + "matchCriteriaId": "1BB07442-D2ED-4021-9445-262A3D1ADE61" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:canon:imageclass_lbp632cdw:-:*:*:*:*:*:*:*", + "matchCriteriaId": "559C49BC-3315-48E7-AE60-54430A9501CD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canon:imageclass_mf455dw_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "05.07", + "matchCriteriaId": "7C04BB8A-EE61-469F-9762-81DFBACCCAEC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:canon:imageclass_mf455dw:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B5CB81B-D464-4AF1-8C92-17BD158777A3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canon:imageclass_mf453dw_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "05.07", + "matchCriteriaId": "351F8DDD-54B1-42F1-AE81-F71526C81171" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:canon:imageclass_mf453dw:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE137D7A-236F-4843-9894-C20DFBF8406E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canon:imageclass_mf452dw_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "05.07", + "matchCriteriaId": "4FC30ECE-E3CB-4D72-B868-63BA5CD0A4B5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:canon:imageclass_mf452dw:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6CBDE30A-E342-4B8D-9DBD-BFB01BE09B36" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canon:imageclass_mf451dw_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "05.07", + "matchCriteriaId": "DE56DEEF-79E5-4AEA-91CE-64FEC6087712" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:canon:imageclass_mf451dw:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61929786-715D-4F3F-BA66-67EC96A301A8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canon:imageclass_lbp237dw_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "05.07", + "matchCriteriaId": "FBAE551C-1BE3-447A-A81B-2C2907F7548F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:canon:imageclass_lbp237dw:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9A12FE49-1740-4C68-9B2F-355EB34CA6C0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canon:imageclass_lbp236dw_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "05.07", + "matchCriteriaId": "951C7923-9FFE-430D-A07D-9FBE44C7B7E3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:canon:imageclass_lbp236dw:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4172017-926C-4EBC-AD43-A4EB84B5E2CD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canon:imageclass_x_mf1238_ii_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "05.07", + "matchCriteriaId": "A107F4E3-03E3-417E-8B18-6A040E94CE3C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:canon:imageclass_x_mf1238_ii:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0B7EB63E-273B-4F9F-B9FD-8517577316E3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canon:imageclass_x_mf1643i_ii_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "05.07", + "matchCriteriaId": "9F2F66BB-C3A8-4998-BC38-3388C22C1A13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:canon:imageclass_x_mf1643i_ii:-:*:*:*:*:*:*:*", + "matchCriteriaId": "820632C1-6B03-4039-8CBF-9CC5C633E504" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canon:imageclass_x_mf1643if_ii_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "05.07", + "matchCriteriaId": "CC7D305F-86BD-4BFD-AEB8-9D8346E0605B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:canon:imageclass_x_mf1643if_ii:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4140FE4F-B83D-49FA-A01A-2F93EE91AE46" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canon:imageclass_x_lbp1238_ii_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "05.07", + "matchCriteriaId": "7438119B-9012-4433-8187-B53BC10E1527" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:canon:imageclass_x_lbp1238_ii:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2C0D19C2-8E61-4405-82EA-236FC3005E24" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canon:i-sensys_mf657cdw_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "05.07", + "matchCriteriaId": "19705D3A-3022-40A3-90AD-CEE2212C9013" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:canon:i-sensys_mf657cdw:-:*:*:*:*:*:*:*", + "matchCriteriaId": "21677788-0623-45BB-891D-8655F8803FB2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canon:i-sensys_mf655cdw_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "05.07", + "matchCriteriaId": "5B7F22F5-B6F8-4ABC-873E-BCAFDE969B76" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:canon:i-sensys_mf655cdw:-:*:*:*:*:*:*:*", + "matchCriteriaId": "816736EB-7785-4860-B987-E9AEBBEA3624" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canon:i-sensys_mf651cdw_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "05.07", + "matchCriteriaId": "D573EE0D-B95B-4F5D-A970-2A7899A3A108" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:canon:i-sensys_mf651cdw:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AE87E73C-3EFC-420D-A4AD-A0FA9EA3FDC2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canon:i-sensys_lbp633cdw_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "05.07", + "matchCriteriaId": "630E2B67-DCB0-4807-8BB7-B5C6EB8D3E13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:canon:i-sensys_lbp633cdw:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25D53BC9-0A59-4B9A-8840-B91853D49AD2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canon:i-sensys_lbp631cdw_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "05.07", + "matchCriteriaId": "43782DE3-0122-44C8-9DAD-00B8886326F0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:canon:i-sensys_lbp631cdw:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A1079313-7CD5-410F-81CA-0212866CE98F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canon:i-sensys_mf553dw_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "05.07", + "matchCriteriaId": "66A46C0F-502C-47F3-A48F-89FCEF2867FE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:canon:i-sensys_mf553dw:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0A17960A-72E3-4BA9-B0D1-C08DC3C97AB1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canon:i-sensys_mf552dw_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "05.07", + "matchCriteriaId": "637ABAF6-12AD-4C5E-B741-A4D3F254746D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:canon:i-sensys_mf552dw:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5698791F-4DF4-490F-A890-4DC3E31AE8FA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canon:i-sensys_mf455dw_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "05.07", + "matchCriteriaId": "6552F733-6864-4C98-A7FA-D512BD7158FB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:canon:i-sensys_mf455dw:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C623755F-B143-49C9-B626-ABC342482895" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canon:i-sensys_mf453dw_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "05.07", + "matchCriteriaId": "D7301968-E759-4D44-B6EA-A3693F7A86B0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:canon:i-sensys_mf453dw:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8AFD715-3125-47C2-9526-55B1505B8B39" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canon:i-sensys_lbp236dw_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "05.07", + "matchCriteriaId": "8FE36831-47B6-4EFE-A256-B3544484D5F6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:canon:i-sensys_lbp236dw:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98C72D95-2359-444D-9CBC-6737AFC59E07" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canon:i-sensys_lbp233dw_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "05.07", + "matchCriteriaId": "C55E060C-0D59-4140-A2B5-7DA75C44C609" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:canon:i-sensys_lbp233dw:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DAB2402D-8398-4334-8A9E-FD5FF5894F0D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canon:imagerunner_1643if_ii_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "05.07", + "matchCriteriaId": "8A5D6360-A5C0-4E37-B31A-D19719D70E1C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:canon:imagerunner_1643if_ii:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A793E975-F8CF-433C-B76B-3C63247FF5AB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canon:imagerunner_1643i_ii_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "05.07", + "matchCriteriaId": "8D2A2F98-4F0D-4442-8967-2D2C8954C199" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:canon:imagerunner_1643i_ii:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC9C622B-F5CD-4544-9197-80218337EC0C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canon:i-sensys_x_1238if_ii_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "05.07", + "matchCriteriaId": "6D323218-9367-4225-933E-E839C1118F67" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:canon:i-sensys_x_1238if_ii:-:*:*:*:*:*:*:*", + "matchCriteriaId": "815C93D0-7BEA-4B61-A09F-22C0158CCA62" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canon:i-sensys_x_1238i_ii_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "05.07", + "matchCriteriaId": "D2EC8A9B-7537-44B1-A963-258728755783" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:canon:i-sensys_x_1238i_ii:-:*:*:*:*:*:*:*", + "matchCriteriaId": "41F99247-FC70-4178-BBFF-6F17D1F84B20" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canon:i-sensys_x_1238p_ii_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "05.07", + "matchCriteriaId": "9AF45630-86D2-4B60-91EB-B00A6D0223F2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:canon:i-sensys_x_1238p_ii:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B53CA9E1-8748-487F-9370-55F383401D5C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canon:i-sensys_x_1238pr_ii_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "05.07", + "matchCriteriaId": "3343CD8F-E4A5-4F45-94EE-365C22B2CDFA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:canon:i-sensys_x_1238pr_ii:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BC94709C-63B2-4CB6-BCC8-9AB9EC740CF6" + } + ] + } + ] } ], "references": [ { "url": "https://canon.jp/support/support-info/250127vulnerability-response", - "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd" + "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://psirt.canon/advisory-information/cp2025-001/", - "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd" + "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.canon-europe.com/support/product-security/#news", - "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd" + "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.usa.canon.com/support/canon-product-advisories/service-notice-regarding-vulnerability-measure-against-buffer-overflow-for-laser-printers-and-small-office-multifunctional-printers", - "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd" + "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27522.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27522.json index bf759864afd..20158a47a42 100644 --- a/CVE-2025/CVE-2025-275xx/CVE-2025-27522.json +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27522.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27522", "sourceIdentifier": "security@apache.org", "published": "2025-05-28T08:15:21.540", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-03T14:09:41.360", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:inlong:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.13.0", + "versionEndExcluding": "2.2.0", + "matchCriteriaId": "BBE3933A-B8FF-4352-817C-AA8F96DB4434" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/apache/inlong/pull/11732", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://lists.apache.org/thread/s4dnmq3gwcjocxf85qk190knlzd26jby", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27526.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27526.json index 321dd7b5845..9d760da233d 100644 --- a/CVE-2025/CVE-2025-275xx/CVE-2025-27526.json +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27526.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27526", "sourceIdentifier": "security@apache.org", "published": "2025-05-28T08:15:21.690", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-03T15:36:56.813", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:inlong:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.13.0", + "versionEndExcluding": "2.2.0", + "matchCriteriaId": "BBE3933A-B8FF-4352-817C-AA8F96DB4434" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/apache/inlong/pull/11747", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://lists.apache.org/thread/4t4sqscm7xdqn883dyjy40qk6ncf26xf", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2025/05/28/1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27528.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27528.json index 771180f9f26..a0fc172d0dd 100644 --- a/CVE-2025/CVE-2025-275xx/CVE-2025-27528.json +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27528.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27528", "sourceIdentifier": "security@apache.org", "published": "2025-05-28T08:15:21.830", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-03T15:36:47.120", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:inlong:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.13.0", + "versionEndExcluding": "2.2.0", + "matchCriteriaId": "BBE3933A-B8FF-4352-817C-AA8F96DB4434" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/apache/inlong/pull/11747", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://lists.apache.org/thread/b807rqzgyv4qgvxw3nhkq8tl6g90gqgj", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2025/05/28/3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-279xx/CVE-2025-27953.json b/CVE-2025/CVE-2025-279xx/CVE-2025-27953.json index 221dc232150..757500ccb67 100644 --- a/CVE-2025/CVE-2025-279xx/CVE-2025-27953.json +++ b/CVE-2025/CVE-2025-279xx/CVE-2025-27953.json @@ -2,16 +2,55 @@ "id": "CVE-2025-27953", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-02T18:15:23.903", - "lastModified": "2025-06-02T18:15:23.903", + "lastModified": "2025-06-03T14:15:48.417", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Clinical Collaboration Platform 12.2.1.5 allows a remote attacker to obtain sensitive information and execute arbitrary code via the session management component." + }, + { + "lang": "es", + "value": "Un problema en Clinical Collaboration Platform 12.2.1.5 permite que un atacante remoto obtenga informaci\u00f3n confidencial y ejecute c\u00f3digo arbitrario a trav\u00e9s del componente de administraci\u00f3n de sesiones." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/intruderlabs/cvex/tree/main/Carestream/session-token-in-url", diff --git a/CVE-2025/CVE-2025-313xx/CVE-2025-31359.json b/CVE-2025/CVE-2025-313xx/CVE-2025-31359.json index bbec0e6c377..0cd0ba489c2 100644 --- a/CVE-2025/CVE-2025-313xx/CVE-2025-31359.json +++ b/CVE-2025/CVE-2025-313xx/CVE-2025-31359.json @@ -2,13 +2,17 @@ "id": "CVE-2025-31359", "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-06-03T10:15:22.240", - "lastModified": "2025-06-03T11:15:20.913", + "lastModified": "2025-06-03T14:15:48.583", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A directory traversal vulnerability exists in the PVMP package unpacking functionality of Parallels Desktop for Mac version 20.2.2 (55879). This vulnerability can be exploited by an attacker to write to arbitrary files, potentially leading to privilege escalation." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de directory traversal en la funci\u00f3n de desempaquetado de paquetes PVMP de Parallels Desktop para Mac versi\u00f3n 20.2.2 (55879). Un atacante puede explotar esta vulnerabilidad para escribir en archivos arbitrarios, lo que podr\u00eda provocar una escalada de privilegios." } ], "metrics": { @@ -55,6 +59,10 @@ { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2160", "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2025-2160", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-365xx/CVE-2025-36564.json b/CVE-2025/CVE-2025-365xx/CVE-2025-36564.json new file mode 100644 index 00000000000..f8b889fee7a --- /dev/null +++ b/CVE-2025/CVE-2025-365xx/CVE-2025-36564.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-36564", + "sourceIdentifier": "security_alert@emc.com", + "published": "2025-06-03T15:15:58.600", + "lastModified": "2025-06-03T15:15:58.600", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dell Encryption Admin Utilities versions prior to 11.10.2 contain an Improper Link Resolution vulnerability. A local malicious user could potentially exploit this vulnerability, leading to privilege escalation." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-61" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000325203/dsa-2025-224", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-414xx/CVE-2025-41441.json b/CVE-2025/CVE-2025-414xx/CVE-2025-41441.json index eb91deb6715..f510ba24af6 100644 --- a/CVE-2025/CVE-2025-414xx/CVE-2025-41441.json +++ b/CVE-2025/CVE-2025-414xx/CVE-2025-41441.json @@ -2,8 +2,8 @@ "id": "CVE-2025-41441", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2025-05-26T07:15:25.753", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T15:42:40.710", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -60,6 +60,28 @@ } } ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ], "cvssMetricV30": [ { "source": "vultures@jpcert.or.jp", @@ -95,14 +117,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synck:mailform_pro_cgi:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.3.4", + "matchCriteriaId": "0F722C37-EE40-436B-ABCA-E61EB95DFFDB" + } + ] + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/jp/JVN39546799/", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.synck.com/blogs/news/newsroom/detail_1745302910.html", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-41xx/CVE-2025-4138.json b/CVE-2025/CVE-2025-41xx/CVE-2025-4138.json index 3dddb26c235..480d2c39853 100644 --- a/CVE-2025/CVE-2025-41xx/CVE-2025-4138.json +++ b/CVE-2025/CVE-2025-41xx/CVE-2025-4138.json @@ -2,7 +2,7 @@ "id": "CVE-2025-4138", "sourceIdentifier": "cna@python.org", "published": "2025-06-03T13:15:20.377", - "lastModified": "2025-06-03T13:15:20.377", + "lastModified": "2025-06-03T15:15:59.337", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -48,6 +48,26 @@ } ], "references": [ + { + "url": "https://gist.github.com/sethmlarson/52398e33eff261329a0180ac1d54f42f", + "source": "cna@python.org" + }, + { + "url": "https://github.com/python/cpython/commit/19de092debb3d7e832e5672cc2f7b788d35951da", + "source": "cna@python.org" + }, + { + "url": "https://github.com/python/cpython/commit/3612d8f51741b11f36f8fb0494d79086bac9390a", + "source": "cna@python.org" + }, + { + "url": "https://github.com/python/cpython/commit/9e0ac76d96cf80b49055f6d6b9a6763fb9215c2a", + "source": "cna@python.org" + }, + { + "url": "https://github.com/python/cpython/commit/aa9eb5f757ceff461e6e996f12c89e5d9b583b01", + "source": "cna@python.org" + }, { "url": "https://github.com/python/cpython/issues/135034", "source": "cna@python.org" @@ -55,6 +75,10 @@ { "url": "https://github.com/python/cpython/pull/135037", "source": "cna@python.org" + }, + { + "url": "https://mail.python.org/archives/list/security-announce@python.org/thread/MAXIJJCUUMCL7ATZNDVEGGHUMQMUUKLG/", + "source": "cna@python.org" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-439xx/CVE-2025-43923.json b/CVE-2025/CVE-2025-439xx/CVE-2025-43923.json new file mode 100644 index 00000000000..93fd3ffccaf --- /dev/null +++ b/CVE-2025/CVE-2025-439xx/CVE-2025-43923.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-43923", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-06-03T15:15:58.767", + "lastModified": "2025-06-03T15:15:58.767", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in ReportController in Unicom Focal Point 7.6.1. A user who has administrative privilege in Focal Point can perform SQL injection via the image parameter during a delete report image operation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unicomsi.com/products/focal-point/", + "source": "cve@mitre.org" + }, + { + "url": "https://www.unicomsi.com/security-advisory/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-439xx/CVE-2025-43924.json b/CVE-2025/CVE-2025-439xx/CVE-2025-43924.json new file mode 100644 index 00000000000..5a99685a92d --- /dev/null +++ b/CVE-2025/CVE-2025-439xx/CVE-2025-43924.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-43924", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-06-03T15:15:58.883", + "lastModified": "2025-06-03T15:15:58.883", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross Site Scripting vulnerability was discovered in Unicom Focal Point 7.6.1. The val parameter in SettingController (for /fp/admin/settings/loginpage) and the rootserviceurl parameter in FriendsController (for /fp/admin/settings/friends), entered by an admin, allow stored XSS." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unicomsi.com/products/focal-point/", + "source": "cve@mitre.org" + }, + { + "url": "https://www.unicomsi.com/security-advisory/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-439xx/CVE-2025-43925.json b/CVE-2025/CVE-2025-439xx/CVE-2025-43925.json new file mode 100644 index 00000000000..f17195aa795 --- /dev/null +++ b/CVE-2025/CVE-2025-439xx/CVE-2025-43925.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-43925", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-06-03T15:15:58.997", + "lastModified": "2025-06-03T15:15:58.997", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Unicom Focal Point 7.6.1. The database is encrypted with a hardcoded key, making it easier to recover the cleartext data." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unicomsi.com/products/focal-point/", + "source": "cve@mitre.org" + }, + { + "url": "https://www.unicomsi.com/security-advisory/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-43xx/CVE-2025-4330.json b/CVE-2025/CVE-2025-43xx/CVE-2025-4330.json index b9fabee52b3..0c3454de357 100644 --- a/CVE-2025/CVE-2025-43xx/CVE-2025-4330.json +++ b/CVE-2025/CVE-2025-43xx/CVE-2025-4330.json @@ -2,7 +2,7 @@ "id": "CVE-2025-4330", "sourceIdentifier": "cna@python.org", "published": "2025-06-03T13:15:20.503", - "lastModified": "2025-06-03T13:15:20.503", + "lastModified": "2025-06-03T15:15:59.493", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -48,6 +48,26 @@ } ], "references": [ + { + "url": "https://gist.github.com/sethmlarson/52398e33eff261329a0180ac1d54f42f", + "source": "cna@python.org" + }, + { + "url": "https://github.com/python/cpython/commit/19de092debb3d7e832e5672cc2f7b788d35951da", + "source": "cna@python.org" + }, + { + "url": "https://github.com/python/cpython/commit/3612d8f51741b11f36f8fb0494d79086bac9390a", + "source": "cna@python.org" + }, + { + "url": "https://github.com/python/cpython/commit/9e0ac76d96cf80b49055f6d6b9a6763fb9215c2a", + "source": "cna@python.org" + }, + { + "url": "https://github.com/python/cpython/commit/aa9eb5f757ceff461e6e996f12c89e5d9b583b01", + "source": "cna@python.org" + }, { "url": "https://github.com/python/cpython/issues/135034", "source": "cna@python.org" @@ -55,6 +75,10 @@ { "url": "https://github.com/python/cpython/pull/135037", "source": "cna@python.org" + }, + { + "url": "https://mail.python.org/archives/list/security-announce@python.org/thread/MAXIJJCUUMCL7ATZNDVEGGHUMQMUUKLG/", + "source": "cna@python.org" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-441xx/CVE-2025-44172.json b/CVE-2025/CVE-2025-441xx/CVE-2025-44172.json index 5cbb8302020..2e0691101d2 100644 --- a/CVE-2025/CVE-2025-441xx/CVE-2025-44172.json +++ b/CVE-2025/CVE-2025-441xx/CVE-2025-44172.json @@ -2,13 +2,17 @@ "id": "CVE-2025-44172", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-02T15:15:34.317", - "lastModified": "2025-06-02T19:15:27.917", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-03T15:55:33.757", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tenda AC6 V15.03.05.16 was discovered to contain a stack overflow via the time parameter in the setSmartPowerManagement function." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Tenda AC6 V15.03.05.16 contiene un desbordamiento de pila a trav\u00e9s del par\u00e1metro de tiempo en la funci\u00f3n setSmartPowerManagement." } ], "metrics": { @@ -47,10 +51,43 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac6_firmware:15.03.05.16:*:*:*:*:*:*:*", + "matchCriteriaId": "6F60AFD7-74AF-4CA2-8232-2858D5AD023A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac6:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B622BF6D-85E6-475A-B7FB-11BA1A641191" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/hcxj/Tenda-Vul/blob/main/setSmartPowerManagement.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-449xx/CVE-2025-44904.json b/CVE-2025/CVE-2025-449xx/CVE-2025-44904.json index 1d82ce34171..4dfebb96012 100644 --- a/CVE-2025/CVE-2025-449xx/CVE-2025-44904.json +++ b/CVE-2025/CVE-2025-449xx/CVE-2025-44904.json @@ -2,8 +2,8 @@ "id": "CVE-2025-44904", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-30T04:15:32.307", - "lastModified": "2025-05-30T22:15:23.140", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-03T15:35:50.377", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hdfgroup:hdf5:1.14.6:*:*:*:*:*:*:*", + "matchCriteriaId": "914439E4-D5A7-444C-A1C4-051519EFF7FA" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/madao123123/crash_report/blob/main/hdf5_poc/hdf5_poc1.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/madao123123/crash_report/blob/main/hdf5_poc/hdf5_poc1.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-449xx/CVE-2025-44905.json b/CVE-2025/CVE-2025-449xx/CVE-2025-44905.json index 57e98df631c..63e0267c03a 100644 --- a/CVE-2025/CVE-2025-449xx/CVE-2025-44905.json +++ b/CVE-2025/CVE-2025-449xx/CVE-2025-44905.json @@ -2,8 +2,8 @@ "id": "CVE-2025-44905", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-30T04:15:46.287", - "lastModified": "2025-05-30T22:15:23.313", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-03T15:35:40.283", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hdfgroup:hdf5:1.14.6:*:*:*:*:*:*:*", + "matchCriteriaId": "914439E4-D5A7-444C-A1C4-051519EFF7FA" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/madao123123/crash_report/blob/main/hdf5_poc/hdf5_poc5.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/madao123123/crash_report/blob/main/hdf5_poc/hdf5_poc5.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-44xx/CVE-2025-4435.json b/CVE-2025/CVE-2025-44xx/CVE-2025-4435.json index 407b0c92ac2..0d8e0762bb5 100644 --- a/CVE-2025/CVE-2025-44xx/CVE-2025-4435.json +++ b/CVE-2025/CVE-2025-44xx/CVE-2025-4435.json @@ -2,7 +2,7 @@ "id": "CVE-2025-4435", "sourceIdentifier": "cna@python.org", "published": "2025-06-03T13:15:20.630", - "lastModified": "2025-06-03T13:15:20.630", + "lastModified": "2025-06-03T15:15:59.597", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -35,7 +35,35 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-682" + } + ] + } + ], "references": [ + { + "url": "https://github.com/python/cpython/commit/19de092debb3d7e832e5672cc2f7b788d35951da", + "source": "cna@python.org" + }, + { + "url": "https://github.com/python/cpython/commit/3612d8f51741b11f36f8fb0494d79086bac9390a", + "source": "cna@python.org" + }, + { + "url": "https://github.com/python/cpython/commit/9e0ac76d96cf80b49055f6d6b9a6763fb9215c2a", + "source": "cna@python.org" + }, + { + "url": "https://github.com/python/cpython/commit/aa9eb5f757ceff461e6e996f12c89e5d9b583b01", + "source": "cna@python.org" + }, { "url": "https://github.com/python/cpython/issues/135034", "source": "cna@python.org" @@ -43,6 +71,10 @@ { "url": "https://github.com/python/cpython/pull/135037", "source": "cna@python.org" + }, + { + "url": "https://mail.python.org/archives/list/security-announce@python.org/thread/MAXIJJCUUMCL7ATZNDVEGGHUMQMUUKLG/", + "source": "cna@python.org" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-453xx/CVE-2025-45343.json b/CVE-2025/CVE-2025-453xx/CVE-2025-45343.json index 7a78bff291c..fc5dc50b963 100644 --- a/CVE-2025/CVE-2025-453xx/CVE-2025-45343.json +++ b/CVE-2025/CVE-2025-453xx/CVE-2025-45343.json @@ -2,8 +2,8 @@ "id": "CVE-2025-45343", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-28T16:15:33.240", - "lastModified": "2025-05-29T14:29:50.247", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T15:36:32.347", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,65 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:w18e_firmware:16.01.0.11\\(2044\\):*:*:*:*:*:*:*", + "matchCriteriaId": "F030FC70-22D9-4997-9412-33B1C1C32077" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:w18e:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "6C9DAD12-6B22-41A8-9C1B-69498C5BBDE1" + } + ] + } + ] + } + ], "references": [ { "url": "http://w18e.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Not Applicable" + ] }, { "url": "https://gist.github.com/isstabber/b363d47966965e5c0a8ec26d445e090b", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.tenda.com.cn/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://gist.github.com/isstabber/b363d47966965e5c0a8ec26d445e090b", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-458xx/CVE-2025-45855.json b/CVE-2025/CVE-2025-458xx/CVE-2025-45855.json new file mode 100644 index 00000000000..ca6de95a018 --- /dev/null +++ b/CVE-2025/CVE-2025-458xx/CVE-2025-45855.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-45855", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-06-03T14:15:48.750", + "lastModified": "2025-06-03T14:15:48.750", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An arbitrary file upload vulnerability in the component /upload/GoodsCategory/image of erupt v1.12.19 allows attackers to execute arbitrary code via uploading a crafted file." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/Cafe-Tea/b72d442be434e1dafe7810c938892b06", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/erupts/erupt", + "source": "cve@mitre.org" + }, + { + "url": "https://www.erupt.xyz/#%21/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-45xx/CVE-2025-4516.json b/CVE-2025/CVE-2025-45xx/CVE-2025-4516.json index 1ffd13c3d3d..439851a6df2 100644 --- a/CVE-2025/CVE-2025-45xx/CVE-2025-4516.json +++ b/CVE-2025/CVE-2025-45xx/CVE-2025-4516.json @@ -2,7 +2,7 @@ "id": "CVE-2025-4516", "sourceIdentifier": "cna@python.org", "published": "2025-05-15T14:15:31.753", - "lastModified": "2025-05-19T10:15:21.153", + "lastModified": "2025-06-03T14:15:49.697", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -74,14 +74,34 @@ } ], "references": [ + { + "url": "https://github.com/python/cpython/commit/4398b788ffc1f954a2c552da285477d42a571292", + "source": "cna@python.org" + }, + { + "url": "https://github.com/python/cpython/commit/6279eb8c076d89d3739a6edb393e43c7929b429d", + "source": "cna@python.org" + }, { "url": "https://github.com/python/cpython/commit/69b4387f78f413e8c47572a85b3478c47eba8142", "source": "cna@python.org" }, + { + "url": "https://github.com/python/cpython/commit/73b3040f592436385007918887b7e2132aa8431f", + "source": "cna@python.org" + }, + { + "url": "https://github.com/python/cpython/commit/8d35fd1b34935221aff23a1ab69a429dd156be77", + "source": "cna@python.org" + }, { "url": "https://github.com/python/cpython/commit/9f69a58623bd01349a18ba0c7a9cb1dad6a51e8e", "source": "cna@python.org" }, + { + "url": "https://github.com/python/cpython/commit/ab9893c40609935e0d40a6d2a7307ea51aec598b", + "source": "cna@python.org" + }, { "url": "https://github.com/python/cpython/issues/133767", "source": "cna@python.org" diff --git a/CVE-2025/CVE-2025-45xx/CVE-2025-4517.json b/CVE-2025/CVE-2025-45xx/CVE-2025-4517.json index 9199e3b640a..8afe77b67e5 100644 --- a/CVE-2025/CVE-2025-45xx/CVE-2025-4517.json +++ b/CVE-2025/CVE-2025-45xx/CVE-2025-4517.json @@ -2,7 +2,7 @@ "id": "CVE-2025-4517", "sourceIdentifier": "cna@python.org", "published": "2025-06-03T13:15:20.837", - "lastModified": "2025-06-03T13:15:20.837", + "lastModified": "2025-06-03T15:15:59.713", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -48,6 +48,26 @@ } ], "references": [ + { + "url": "https://gist.github.com/sethmlarson/52398e33eff261329a0180ac1d54f42f", + "source": "cna@python.org" + }, + { + "url": "https://github.com/python/cpython/commit/19de092debb3d7e832e5672cc2f7b788d35951da", + "source": "cna@python.org" + }, + { + "url": "https://github.com/python/cpython/commit/3612d8f51741b11f36f8fb0494d79086bac9390a", + "source": "cna@python.org" + }, + { + "url": "https://github.com/python/cpython/commit/9e0ac76d96cf80b49055f6d6b9a6763fb9215c2a", + "source": "cna@python.org" + }, + { + "url": "https://github.com/python/cpython/commit/aa9eb5f757ceff461e6e996f12c89e5d9b583b01", + "source": "cna@python.org" + }, { "url": "https://github.com/python/cpython/issues/135034", "source": "cna@python.org" @@ -55,6 +75,10 @@ { "url": "https://github.com/python/cpython/pull/135037", "source": "cna@python.org" + }, + { + "url": "https://mail.python.org/archives/list/security-announce@python.org/thread/MAXIJJCUUMCL7ATZNDVEGGHUMQMUUKLG/", + "source": "cna@python.org" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-461xx/CVE-2025-46154.json b/CVE-2025/CVE-2025-461xx/CVE-2025-46154.json new file mode 100644 index 00000000000..f8393b210ee --- /dev/null +++ b/CVE-2025/CVE-2025-461xx/CVE-2025-46154.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-46154", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-06-03T14:15:48.880", + "lastModified": "2025-06-03T14:15:48.880", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Foxcms v1.25 has a SQL time injection in the $_POST['dbname'] parameter of installdb.php." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Yf3te/CVE/blob/main/CVE-2025-46154", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-461xx/CVE-2025-46176.json b/CVE-2025/CVE-2025-461xx/CVE-2025-46176.json index 47804ae64f3..580d7d27a34 100644 --- a/CVE-2025/CVE-2025-461xx/CVE-2025-46176.json +++ b/CVE-2025/CVE-2025-461xx/CVE-2025-46176.json @@ -2,8 +2,8 @@ "id": "CVE-2025-46176", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-23T19:15:22.423", - "lastModified": "2025-05-28T14:58:52.920", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-03T15:47:26.543", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,76 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dir-605l_firmware:2.13b01:*:*:*:*:*:*:*", + "matchCriteriaId": "47A17995-9117-42E4-938E-D18F605DD0FE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dir-605l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD4E3AA2-EC1C-4219-8E13-B52D30A7FA06" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dir-816l_firmware:2.06b01:*:*:*:*:*:*:*", + "matchCriteriaId": "09BC0D3D-3C20-45EF-A753-04F2AC5010AA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dir-816l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A17C1E74-E315-4292-AF6B-EEF86B64A63C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/namberino/cve/tree/main/CVE-2025-46176", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.dlink.com/en/security-bulletin/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-465xx/CVE-2025-46548.json b/CVE-2025/CVE-2025-465xx/CVE-2025-46548.json new file mode 100644 index 00000000000..a2c9db980fb --- /dev/null +++ b/CVE-2025/CVE-2025-465xx/CVE-2025-46548.json @@ -0,0 +1,41 @@ +{ + "id": "CVE-2025-46548", + "sourceIdentifier": "security@apache.org", + "published": "2025-06-03T15:15:59.110", + "lastModified": "2025-06-03T15:15:59.110", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "If you enable Basic Authentication in Pekko Management using the Java DSL, the authenticator may not be properly applied.\n\n\nUsers that rely on authentication instead of making sure the Management API ports are only available to trusted users are recommended to upgrade to version 1.1.1, which fixes this issue." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/akka/akka-management/pull/1385", + "source": "security@apache.org" + }, + { + "url": "https://github.com/apache/pekko-management/pull/418", + "source": "security@apache.org" + }, + { + "url": "https://lists.apache.org/thread/tnd84hj9w0ggjcft6cp12q67d5jzhp66", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-472xx/CVE-2025-47226.json b/CVE-2025/CVE-2025-472xx/CVE-2025-47226.json index b7f628c586b..c0018ebde3c 100644 --- a/CVE-2025/CVE-2025-472xx/CVE-2025-47226.json +++ b/CVE-2025/CVE-2025-472xx/CVE-2025-47226.json @@ -2,8 +2,8 @@ "id": "CVE-2025-47226", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-02T21:15:23.693", - "lastModified": "2025-05-05T20:54:19.760", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T14:44:17.277", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 } ] }, @@ -49,24 +69,67 @@ "value": "CWE-425" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:snipeitapp:snipe-it:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.1.0", + "matchCriteriaId": "8CC33D7F-41ED-47F2-8C48-97483EFF462C" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/grokability/snipe-it/compare/v8.0.4...v8.1.0", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/grokability/snipe-it/pull/16672", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/grokability/snipe-it/releases/tag/v8.1.0", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes", + "Patch" + ] }, { "url": "https://github.com/koyomihack00/CVE-2025-47226/blob/main/PoC/idor-exploit.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-47xx/CVE-2025-4746.json b/CVE-2025/CVE-2025-47xx/CVE-2025-4746.json index 3bc8e37cea4..ee7482fb595 100644 --- a/CVE-2025/CVE-2025-47xx/CVE-2025-4746.json +++ b/CVE-2025/CVE-2025-47xx/CVE-2025-4746.json @@ -2,8 +2,8 @@ "id": "CVE-2025-4746", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-16T05:15:37.667", - "lastModified": "2025-05-16T14:42:18.700", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T15:57:51.383", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,74 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:campcodes:sales_and_inventory_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B0012671-CC91-49D0-A3C8-152ADAB98F4B" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/snkercyber/CVE/issues/2", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.309046", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.309046", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.571020", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.campcodes.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-47xx/CVE-2025-4749.json b/CVE-2025/CVE-2025-47xx/CVE-2025-4749.json index 2fea48db159..8cd15763959 100644 --- a/CVE-2025/CVE-2025-47xx/CVE-2025-4749.json +++ b/CVE-2025/CVE-2025-47xx/CVE-2025-4749.json @@ -2,8 +2,8 @@ "id": "CVE-2025-4749", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-16T05:15:38.103", - "lastModified": "2025-05-16T14:42:18.700", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-03T15:57:57.250", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -120,26 +120,73 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:di-7003g_firmware:24.04.18d1_r\\(68125\\):*:*:*:*:*:*:*", + "matchCriteriaId": "84A82F4D-9A82-46F3-B5FF-80F9753B5D9E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:di-7003g:v2:*:*:*:*:*:*:*", + "matchCriteriaId": "29D60D82-DBF9-4823-B266-E64217A17234" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/at0de/my_vulns/blob/main/Dlink/Di-7003GV2/backup.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.309052", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.309052", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.571068", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.dlink.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-47xx/CVE-2025-4750.json b/CVE-2025/CVE-2025-47xx/CVE-2025-4750.json index ce0a5f0b2e5..cd1764fbb5f 100644 --- a/CVE-2025/CVE-2025-47xx/CVE-2025-4750.json +++ b/CVE-2025/CVE-2025-47xx/CVE-2025-4750.json @@ -2,8 +2,8 @@ "id": "CVE-2025-4750", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-16T06:15:46.433", - "lastModified": "2025-05-16T14:42:18.700", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-03T15:57:18.617", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -122,28 +122,85 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:di-7003g_firmware:24.04.18d1_r\\(68125\\):*:*:*:*:*:*:*", + "matchCriteriaId": "84A82F4D-9A82-46F3-B5FF-80F9753B5D9E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:di-7003g:v2:*:*:*:*:*:*:*", + "matchCriteriaId": "29D60D82-DBF9-4823-B266-E64217A17234" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/at0de/my_vulns/blob/main/Dlink/Di-7003GV2/get_version.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.309053", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.309053", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.571069", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://www.dlink.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-47xx/CVE-2025-4752.json b/CVE-2025/CVE-2025-47xx/CVE-2025-4752.json index 1dd215fb908..6b3495aedf9 100644 --- a/CVE-2025/CVE-2025-47xx/CVE-2025-4752.json +++ b/CVE-2025/CVE-2025-47xx/CVE-2025-4752.json @@ -2,8 +2,8 @@ "id": "CVE-2025-4752", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-16T06:15:46.790", - "lastModified": "2025-05-16T14:42:18.700", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-03T15:57:01.207", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -122,28 +122,85 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:di-7003g_firmware:24.04.18d1_r\\(68125\\):*:*:*:*:*:*:*", + "matchCriteriaId": "84A82F4D-9A82-46F3-B5FF-80F9753B5D9E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:di-7003g:v2:*:*:*:*:*:*:*", + "matchCriteriaId": "29D60D82-DBF9-4823-B266-E64217A17234" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/at0de/my_vulns/blob/main/Dlink/Di-7003GV2/install_base.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.309055", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.309055", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.571071", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.dlink.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-47xx/CVE-2025-4753.json b/CVE-2025/CVE-2025-47xx/CVE-2025-4753.json index 56976653b26..e4cf987dc4d 100644 --- a/CVE-2025/CVE-2025-47xx/CVE-2025-4753.json +++ b/CVE-2025/CVE-2025-47xx/CVE-2025-4753.json @@ -2,8 +2,8 @@ "id": "CVE-2025-4753", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-16T07:15:48.120", - "lastModified": "2025-05-16T14:42:18.700", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-03T15:56:54.033", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -122,28 +122,85 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:di-7003g_firmware:24.04.18d1_r\\(68125\\):*:*:*:*:*:*:*", + "matchCriteriaId": "84A82F4D-9A82-46F3-B5FF-80F9753B5D9E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:di-7003g:v2:*:*:*:*:*:*:*", + "matchCriteriaId": "29D60D82-DBF9-4823-B266-E64217A17234" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/at0de/my_vulns/blob/main/Dlink/Di-7003GV2/login.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.309056", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.309056", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.571072", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.dlink.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-47xx/CVE-2025-4755.json b/CVE-2025/CVE-2025-47xx/CVE-2025-4755.json index 0bad1f437a6..de88784405b 100644 --- a/CVE-2025/CVE-2025-47xx/CVE-2025-4755.json +++ b/CVE-2025/CVE-2025-47xx/CVE-2025-4755.json @@ -2,8 +2,8 @@ "id": "CVE-2025-4755", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-16T07:15:48.323", - "lastModified": "2025-05-16T14:42:18.700", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-03T15:56:44.563", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ], "cvssMetricV2": [ @@ -120,26 +140,73 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:di-7003g_firmware:24.04.18d1_r\\(68125\\):*:*:*:*:*:*:*", + "matchCriteriaId": "84A82F4D-9A82-46F3-B5FF-80F9753B5D9E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:di-7003g:v2:*:*:*:*:*:*:*", + "matchCriteriaId": "29D60D82-DBF9-4823-B266-E64217A17234" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/at0de/my_vulns/blob/main/Dlink/Di-7003GV2/netconfig.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.309057", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.309057", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.571073", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.dlink.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-47xx/CVE-2025-4759.json b/CVE-2025/CVE-2025-47xx/CVE-2025-4759.json index cc08fcbbb75..f4bd6107574 100644 --- a/CVE-2025/CVE-2025-47xx/CVE-2025-4759.json +++ b/CVE-2025/CVE-2025-47xx/CVE-2025-4759.json @@ -2,8 +2,8 @@ "id": "CVE-2025-4759", "sourceIdentifier": "report@snyk.io", "published": "2025-05-16T05:15:38.297", - "lastModified": "2025-05-16T14:42:18.700", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-03T15:57:29.763", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -93,28 +113,71 @@ "value": "CWE-179" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lirantal:lockfile-lint-api:*:*:*:*:*:node.js:*:*", + "versionEndExcluding": "5.9.2", + "matchCriteriaId": "430CF412-E04B-45AD-AA7F-36344793D04E" + } + ] + } + ] } ], "references": [ { "url": "https://gist.github.com/Xavier59/881aef04940970dc3e738dcbff64151f", - "source": "report@snyk.io" + "source": "report@snyk.io", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/lirantal/lockfile-lint/blob/89b5cad028df4d77bab2b73ac93bc61e392668ab/packages/lockfile-lint-api/src/validators/ValidatePackageNames.js%23L51-L63", - "source": "report@snyk.io" + "source": "report@snyk.io", + "tags": [ + "Broken Link" + ] }, { "url": "https://github.com/lirantal/lockfile-lint/commit/9e5305bd3e4f0c6acc0d23ec43eac2bd5303b4ca", - "source": "report@snyk.io" + "source": "report@snyk.io", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/lirantal/lockfile-lint/pull/204", - "source": "report@snyk.io" + "source": "report@snyk.io", + "tags": [ + "Patch" + ] }, { "url": "https://security.snyk.io/vuln/SNYK-JS-LOCKFILELINTAPI-10169587", - "source": "report@snyk.io" + "source": "report@snyk.io", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-48xx/CVE-2025-4841.json b/CVE-2025/CVE-2025-48xx/CVE-2025-4841.json index 90f7ac92f2a..f8dc7300db9 100644 --- a/CVE-2025/CVE-2025-48xx/CVE-2025-4841.json +++ b/CVE-2025/CVE-2025-48xx/CVE-2025-4841.json @@ -2,8 +2,8 @@ "id": "CVE-2025-4841", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-17T23:15:36.407", - "lastModified": "2025-05-19T13:35:20.460", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-03T15:57:42.837", + "vulnStatus": "Analyzed", "cveTags": [ { "sourceIdentifier": "cna@vuldb.com", @@ -70,7 +70,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -87,6 +87,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -129,28 +149,85 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dcs-932l_firmware:2.18.01:*:*:*:*:*:*:*", + "matchCriteriaId": "2AD4BC0A-6ADE-47C3-83D9-288D46A60EA4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dcs-932l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34775D9A-F16B-43C5-A8F4-88C0F9760364" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/BeaCox/IoT_vuln/tree/main/D-Link/DCS-932L/gpio_bof", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.309308", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.309308", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.574924", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.dlink.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5131.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5131.json index b520f4cc416..8c827890a61 100644 --- a/CVE-2025/CVE-2025-51xx/CVE-2025-5131.json +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5131.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5131", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-24T21:15:28.770", - "lastModified": "2025-05-28T18:15:28.903", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-03T15:47:41.350", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,75 @@ "value": "CWE-434" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:project_team:tmall_demo:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2025-05-05", + "matchCriteriaId": "7E13454D-93F2-4322-91A6-F4F365B6AA50" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/bdkuzma/vuln/issues/10", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.310210", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.310210", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.571901", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/bdkuzma/vuln/issues/10", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5133.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5133.json index 1a887b05806..01fe0bbefa7 100644 --- a/CVE-2025/CVE-2025-51xx/CVE-2025-5133.json +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5133.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5133", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-24T22:15:23.960", - "lastModified": "2025-05-28T18:15:29.160", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-03T15:48:15.610", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -122,28 +142,77 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:project_team:tmall_demo:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2025-05-05", + "matchCriteriaId": "7E13454D-93F2-4322-91A6-F4F365B6AA50" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/bdkuzma/vuln/issues/12", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.310212", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.310212", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.571932", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/bdkuzma/vuln/issues/12", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5134.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5134.json index cc2e441c0f5..7ecd214d682 100644 --- a/CVE-2025/CVE-2025-51xx/CVE-2025-5134.json +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5134.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5134", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-24T22:15:25.180", - "lastModified": "2025-05-28T18:15:29.287", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-03T15:48:28.580", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -122,28 +142,77 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:project_team:tmall_demo:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2025-05-05", + "matchCriteriaId": "7E13454D-93F2-4322-91A6-F4F365B6AA50" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/bdkuzma/vuln/issues/13", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.310213", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.310213", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.571939", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/bdkuzma/vuln/issues/13", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5135.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5135.json index 4d972623ce0..492bc38feee 100644 --- a/CVE-2025/CVE-2025-51xx/CVE-2025-5135.json +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5135.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5135", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-24T23:15:23.380", - "lastModified": "2025-05-28T18:15:29.410", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-03T15:48:40.953", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -122,28 +142,77 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:project_team:tmall_demo:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2025-05-05", + "matchCriteriaId": "7E13454D-93F2-4322-91A6-F4F365B6AA50" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/bdkuzma/vuln/issues/14", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.310214", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://vuldb.com/?id.310214", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.571941", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/bdkuzma/vuln/issues/14", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5155.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5155.json index 5861df87115..ab89529c532 100644 --- a/CVE-2025/CVE-2025-51xx/CVE-2025-5155.json +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5155.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5155", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-25T20:15:19.750", - "lastModified": "2025-05-28T14:58:52.920", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T15:49:04.067", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,73 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:foxcms:foxcms:1.2.5:*:*:*:*:*:*:*", + "matchCriteriaId": "93AC8262-9B54-4334-8178-B37A0ADA6C49" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/xiaoyangsec/foxcms_sql_injection/blob/main/foxcms_sql_injection.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.310243", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310243", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.576286", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/xiaoyangsec/foxcms_sql_injection/blob/main/foxcms_sql_injection.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5156.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5156.json index 01d716e991a..f94aed346a6 100644 --- a/CVE-2025/CVE-2025-51xx/CVE-2025-5156.json +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5156.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5156", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-25T22:15:19.673", - "lastModified": "2025-05-28T18:15:30.970", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T15:49:18.683", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,86 @@ "value": "CWE-120" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:h3c:gr-5400ax_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "100R008", + "matchCriteriaId": "8A7E70B9-01CD-4513-9E8C-7B3F388E0EFB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:h3c:gr-5400ax:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F0640FB9-8F9F-4486-BFD0-7C84D0B8A2A4" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/CH13hh/tmp_store_cc/blob/main/H3C%20GB5400AX/6.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.310244", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310244", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.574080", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/CH13hh/tmp_store_cc/blob/main/H3C%20GB5400AX/6.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5157.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5157.json index 54e611792ff..7c0a50e9f8f 100644 --- a/CVE-2025/CVE-2025-51xx/CVE-2025-5157.json +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5157.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5157", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-25T23:15:19.737", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T15:49:29.117", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -120,22 +140,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:h3c:seccenter_smp-1114p02:*:*:*:*:*:*:*:*", + "versionEndIncluding": "20250513", + "matchCriteriaId": "A2D571BA-858B-4A6D-AD8A-9DBAF865BDAA" + } + ] + } + ] + } + ], "references": [ { "url": "https://flowus.cn/share/f78256ea-f210-4b35-ba71-85aba82d3e0a?code=G8A6P3", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?ctiid.310245", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310245", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.576229", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5158.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5158.json index 6de225eb90c..b86e51915d7 100644 --- a/CVE-2025/CVE-2025-51xx/CVE-2025-5158.json +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5158.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5158", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-25T23:15:20.610", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T15:49:42.017", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -120,22 +140,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:h3c:seccenter_smp-1114p02:*:*:*:*:*:*:*:*", + "versionEndIncluding": "20250513", + "matchCriteriaId": "A2D571BA-858B-4A6D-AD8A-9DBAF865BDAA" + } + ] + } + ] + } + ], "references": [ { "url": "https://flowus.cn/share/a17e9654-f054-49d9-a3c1-3e37dc6c91cc?code=G8A6P3", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?ctiid.310246", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310246", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.576230", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5159.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5159.json index 65702c872a5..e0c411750db 100644 --- a/CVE-2025/CVE-2025-51xx/CVE-2025-5159.json +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5159.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5159", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-26T00:15:20.103", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T15:49:57.750", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -120,22 +140,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:h3c:seccenter_smp-1114p02:*:*:*:*:*:*:*:*", + "versionEndIncluding": "20250513", + "matchCriteriaId": "A2D571BA-858B-4A6D-AD8A-9DBAF865BDAA" + } + ] + } + ] + } + ], "references": [ { "url": "https://flowus.cn/share/ce95a04b-24e3-477a-bc3d-8344ede95ea8?code=G8A6P3", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?ctiid.310247", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310247", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.576231", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5160.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5160.json index 5b5058e8126..3b13692db6e 100644 --- a/CVE-2025/CVE-2025-51xx/CVE-2025-5160.json +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5160.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5160", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-26T00:15:20.303", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T15:50:06.560", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -120,22 +140,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:h3c:seccenter_smp-1114p02:*:*:*:*:*:*:*:*", + "versionEndIncluding": "20250513", + "matchCriteriaId": "A2D571BA-858B-4A6D-AD8A-9DBAF865BDAA" + } + ] + } + ] + } + ], "references": [ { "url": "https://flowus.cn/share/3cec9266-793a-498e-acdb-4296b09a8c89?code=G8A6P3", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?ctiid.310248", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310248", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.576232", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5161.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5161.json index 298ac14335d..13ff621e76d 100644 --- a/CVE-2025/CVE-2025-51xx/CVE-2025-5161.json +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5161.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5161", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-26T01:15:20.627", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T15:38:55.197", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -120,22 +140,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:h3c:seccenter_smp-1114p02:*:*:*:*:*:*:*:*", + "versionEndIncluding": "20250513", + "matchCriteriaId": "A2D571BA-858B-4A6D-AD8A-9DBAF865BDAA" + } + ] + } + ] + } + ], "references": [ { "url": "https://flowus.cn/share/d78abd42-5de8-45f1-a941-a11a2581be0c?code=G8A6P3", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?ctiid.310249", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310249", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.578678", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5162.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5162.json index de7497cbcb1..d35c976fe83 100644 --- a/CVE-2025/CVE-2025-51xx/CVE-2025-5162.json +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5162.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5162", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-26T01:15:21.470", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T15:39:22.517", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,74 @@ "value": "CWE-434" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:h3c:seccenter_smp-1114p02:*:*:*:*:*:*:*:*", + "versionEndIncluding": "20250513", + "matchCriteriaId": "A2D571BA-858B-4A6D-AD8A-9DBAF865BDAA" + } + ] + } + ] } ], "references": [ { "url": "https://flowus.cn/share/ce6c4094-8d97-466c-8fcc-df3f3d6f314e?code=G8A6P3", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://flowus.cn/share/d6c310ac-a179-499f-9e9a-5c0de80b19be?code=G8A6P3", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?ctiid.310250", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310250", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.578679", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5163.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5163.json index 172d81ce8bd..5b696e88f8a 100644 --- a/CVE-2025/CVE-2025-51xx/CVE-2025-5163.json +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5163.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5163", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-26T02:15:18.723", - "lastModified": "2025-05-28T18:15:31.477", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T15:39:35.613", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -122,28 +122,75 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:yangshare:warehouse_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "063DA73D-1D08-4AE8-841F-F79AB5461F1F" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/sumingwjl/cve/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.310251", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310251", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.576315", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/sumingwjl/cve/issues/1", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5164.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5164.json index 2e3a24ea87b..fac4e7357ff 100644 --- a/CVE-2025/CVE-2025-51xx/CVE-2025-5164.json +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5164.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5164", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-26T03:15:35.327", - "lastModified": "2025-05-28T18:15:31.600", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T15:39:48.230", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,73 @@ "value": "CWE-321" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:perfree:perfreeblog:4.0.11:*:*:*:*:*:*:*", + "matchCriteriaId": "56788914-09FF-444D-B30C-0613B758089B" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/147536951/Qiany1/blob/main/Perfreeblog_3.pdf", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.310252", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310252", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.576433", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/147536951/Qiany1/blob/main/Perfreeblog_3.pdf", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5165.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5165.json index f2ff8ba5c14..0b581ed8b4e 100644 --- a/CVE-2025/CVE-2025-51xx/CVE-2025-5165.json +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5165.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5165", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-26T03:15:36.373", - "lastModified": "2025-05-28T18:15:31.733", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T15:40:01.863", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -122,36 +142,89 @@ "value": "CWE-125" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:assimp:assimp:5.4.3:*:*:*:*:*:*:*", + "matchCriteriaId": "DD8EC697-A5C6-4066-9E02-9181B33F7428" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/assimp/assimp/issues/6128", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/assimp/assimp/issues/6167", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://github.com/user-attachments/files/20204942/reproducer.zip", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.310253", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310253", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.578000", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/assimp/assimp/issues/6167", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5166.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5166.json index 7c5350d0ae9..0327a63a577 100644 --- a/CVE-2025/CVE-2025-51xx/CVE-2025-5166.json +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5166.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5166", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-26T04:15:28.370", - "lastModified": "2025-05-28T18:15:31.857", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T15:40:15.497", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -122,36 +142,87 @@ "value": "CWE-125" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:assimp:assimp:5.4.3:*:*:*:*:*:*:*", + "matchCriteriaId": "DD8EC697-A5C6-4066-9E02-9181B33F7428" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/assimp/assimp/issues/6128", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/assimp/assimp/issues/6168", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/user-attachments/files/20208318/reproducer.zip", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.310254", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310254", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.578001", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/assimp/assimp/issues/6168", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5167.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5167.json index 2c26e9f8bed..7b886553368 100644 --- a/CVE-2025/CVE-2025-51xx/CVE-2025-5167.json +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5167.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5167", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-26T04:15:43.433", - "lastModified": "2025-05-28T18:15:31.987", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T15:40:34.607", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -122,36 +142,87 @@ "value": "CWE-125" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:assimp:assimp:5.4.3:*:*:*:*:*:*:*", + "matchCriteriaId": "DD8EC697-A5C6-4066-9E02-9181B33F7428" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/assimp/assimp/issues/6128", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/assimp/assimp/issues/6169", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/user-attachments/files/20208666/reproducer.zip", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.310255", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310255", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.578002", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/assimp/assimp/issues/6169", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5168.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5168.json index b4ac653aebe..8af913fd34e 100644 --- a/CVE-2025/CVE-2025-51xx/CVE-2025-5168.json +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5168.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5168", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-26T04:15:44.953", - "lastModified": "2025-05-28T18:15:32.120", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T15:40:48.337", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -122,36 +142,87 @@ "value": "CWE-125" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:assimp:assimp:5.4.3:*:*:*:*:*:*:*", + "matchCriteriaId": "DD8EC697-A5C6-4066-9E02-9181B33F7428" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/assimp/assimp/issues/6128", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/assimp/assimp/issues/6170", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/user-attachments/files/20208878/reproducer.zip", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.310256", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310256", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.578003", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/assimp/assimp/issues/6170", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5169.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5169.json index 74f6f0d6219..e0892bffb6c 100644 --- a/CVE-2025/CVE-2025-51xx/CVE-2025-5169.json +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5169.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5169", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-26T05:15:19.387", - "lastModified": "2025-05-28T18:15:32.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T15:41:01.973", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -122,36 +142,87 @@ "value": "CWE-125" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:assimp:assimp:5.4.3:*:*:*:*:*:*:*", + "matchCriteriaId": "DD8EC697-A5C6-4066-9E02-9181B33F7428" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/assimp/assimp/issues/6128", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/assimp/assimp/issues/6171", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/user-attachments/files/20208891/reproducer.zip", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.310257", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310257", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.578004", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/assimp/assimp/issues/6171", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5170.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5170.json index 5f6cc767df1..5b82f10c7c0 100644 --- a/CVE-2025/CVE-2025-51xx/CVE-2025-5170.json +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5170.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5170", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-26T05:15:20.637", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T15:41:52.177", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,24 +142,66 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:llisoft:mta_maita_training_system:4.5:*:*:*:*:*:*:*", + "matchCriteriaId": "846188E7-93D5-4166-BFFE-04D23697806A" + } + ] + } + ] } ], "references": [ { "url": "https://vuldb.com/?ctiid.310258", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310258", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.579069", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://wx.mail.qq.com/s?k=oVXdxVkeZQAlUQwVe2", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5171.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5171.json index 05d4e561d43..7d00ebcd9e7 100644 --- a/CVE-2025/CVE-2025-51xx/CVE-2025-5171.json +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5171.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5171", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-26T06:17:03.370", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T15:42:12.330", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,24 +142,66 @@ "value": "CWE-434" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:llisoft:mta_maita_training_system:4.5:*:*:*:*:*:*:*", + "matchCriteriaId": "846188E7-93D5-4166-BFFE-04D23697806A" + } + ] + } + ] } ], "references": [ { "url": "https://vuldb.com/?ctiid.310259", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310259", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.579088", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://wx.mail.qq.com/s?k=o3X5wV0ZZH0nuusQdO", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5172.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5172.json index 5c74e99b39e..c7ec24f2775 100644 --- a/CVE-2025/CVE-2025-51xx/CVE-2025-5172.json +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5172.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5172", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-26T06:17:03.653", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T15:42:27.910", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,24 +142,67 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:econtrata:econtrata:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2025-05-16", + "matchCriteriaId": "61FC49CA-5C3E-45DB-8A10-4E61CA1075C3" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/yago3008/cves", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Not Applicable" + ] }, { "url": "https://vuldb.com/?ctiid.310260", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310260", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.579248", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5173.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5173.json index 8d0092d7249..bdbe9bd3288 100644 --- a/CVE-2025/CVE-2025-51xx/CVE-2025-5173.json +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5173.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5173", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-26T07:15:26.137", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T15:43:08.747", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,24 +142,68 @@ "value": "CWE-502" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:humansignal:label_studio_ml_backend:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2024-09-30", + "matchCriteriaId": "CB69F1C9-D441-4CF1-ADE2-C0630C3E8C84" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/HumanSignal/label-studio-ml-backend/issues/765", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Vendor Advisory", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.310261", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310261", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.578126", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5174.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5174.json index 3d2780befe1..fd58529a363 100644 --- a/CVE-2025/CVE-2025-51xx/CVE-2025-5174.json +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5174.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5174", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-26T07:15:26.400", - "lastModified": "2025-05-28T18:15:32.620", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T15:43:36.410", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,40 +142,101 @@ "value": "CWE-502" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:erdogant:pypickle:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.0.0", + "matchCriteriaId": "9D4EA2C7-F2B3-45F0-8362-03BE09D0E5C4" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/erdogant/pypickle/commit/14b4cae704a0bb4eb6723e238f25382d847a1917", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/erdogant/pypickle/issues/2", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://github.com/erdogant/pypickle/issues/2#issuecomment-2889146579", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://github.com/erdogant/pypickle/releases/tag/2.0.0", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://vuldb.com/?ctiid.310262", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310262", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.579157", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/erdogant/pypickle/issues/2", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5175.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5175.json index 4ad7e27b258..c2692a40fc2 100644 --- a/CVE-2025/CVE-2025-51xx/CVE-2025-5175.json +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5175.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5175", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-26T08:15:19.463", - "lastModified": "2025-05-28T18:15:32.750", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T15:43:45.590", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -122,44 +142,110 @@ "value": "CWE-285" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:erdogant:pypickle:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.0.0", + "matchCriteriaId": "9D4EA2C7-F2B3-45F0-8362-03BE09D0E5C4" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/erdogant/pypickle/commit/14b4cae704a0bb4eb6723e238f25382d847a1917", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/erdogant/pypickle/issues/3", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://github.com/erdogant/pypickle/issues/3#issue-3070689116", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://github.com/erdogant/pypickle/issues/3#issuecomment-2888589652", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://github.com/erdogant/pypickle/releases/tag/2.0.0", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://vuldb.com/?ctiid.310263", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310263", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.579824", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/erdogant/pypickle/issues/3", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5176.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5176.json index ff9e9c215bd..8350911d9ea 100644 --- a/CVE-2025/CVE-2025-51xx/CVE-2025-5176.json +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5176.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5176", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-26T08:15:19.700", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T15:44:04.310", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ], "cvssMetricV2": [ @@ -122,20 +142,60 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:realcetecnologia:queue_ticket_kiosk:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2025-05-17", + "matchCriteriaId": "DE860EEE-3232-4B20-BC66-A7D409D163C8" + } + ] + } + ] } ], "references": [ { "url": "https://vuldb.com/?ctiid.310264", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310264", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.579849", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5177.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5177.json index 98d7d8c2142..975a29c3334 100644 --- a/CVE-2025/CVE-2025-51xx/CVE-2025-5177.json +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5177.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5177", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-26T10:15:21.627", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T15:44:51.087", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ], "cvssMetricV2": [ @@ -122,20 +142,60 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:realcetecnologia:queue_ticket_kiosk:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2025-05-17", + "matchCriteriaId": "DE860EEE-3232-4B20-BC66-A7D409D163C8" + } + ] + } + ] } ], "references": [ { "url": "https://vuldb.com/?ctiid.310265", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310265", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.579850", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5178.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5178.json index 0972b18570e..cc5d79517cd 100644 --- a/CVE-2025/CVE-2025-51xx/CVE-2025-5178.json +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5178.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5178", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-26T10:15:21.867", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T15:45:01.163", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,20 +142,60 @@ "value": "CWE-434" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:realcetecnologia:queue_ticket_kiosk:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2025-05-17", + "matchCriteriaId": "DE860EEE-3232-4B20-BC66-A7D409D163C8" + } + ] + } + ] } ], "references": [ { "url": "https://vuldb.com/?ctiid.310266", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310266", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.579851", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5179.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5179.json index 01dd8bba626..67fdbb489b2 100644 --- a/CVE-2025/CVE-2025-51xx/CVE-2025-5179.json +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5179.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5179", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-26T10:15:22.057", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T15:45:10.347", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:N/I:L/A:N", + "baseScore": 3.4, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 1.4 } ], "cvssMetricV2": [ @@ -122,20 +142,60 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:realcetecnologia:queue_ticket_kiosk:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2025-05-17", + "matchCriteriaId": "DE860EEE-3232-4B20-BC66-A7D409D163C8" + } + ] + } + ] } ], "references": [ { "url": "https://vuldb.com/?ctiid.310267", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310267", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.579852", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5180.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5180.json index ce6f8292be2..d74f04e6f69 100644 --- a/CVE-2025/CVE-2025-51xx/CVE-2025-5180.json +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5180.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5180", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-26T10:15:22.250", - "lastModified": "2025-05-28T18:15:33.063", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T15:45:24.887", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 1.0, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,85 @@ "value": "CWE-427" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wondershare:filmora:14.5.16:*:*:*:*:*:*:*", + "matchCriteriaId": "BA2B050A-4671-4169-AA6F-5854FE2AA16D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "82132539-3C34-4B63-BE2A-F51077D8BC5A" + } + ] + } + ] } ], "references": [ { "url": "https://gist.github.com/shellkraft/aa66561e984e83052bd080f195a3ec80", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.310268", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310268", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.580226", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://gist.github.com/shellkraft/aa66561e984e83052bd080f195a3ec80", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5181.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5181.json index e79964b0223..f13302dcfd0 100644 --- a/CVE-2025/CVE-2025-51xx/CVE-2025-5181.json +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5181.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5181", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-26T11:15:24.783", - "lastModified": "2025-05-28T18:15:33.180", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T15:45:42.630", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N", + "baseScore": 4.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 1.4 } ], "cvssMetricV2": [ @@ -122,40 +142,99 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:summerpearlgroup:vacation_rental_management_platform:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.2", + "matchCriteriaId": "E70289E7-BECA-463B-ABB1-0C46DBDF2057" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/Stolichnayer/Summer-Pearl-Group-IDOR-XSS", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/Stolichnayer/Summer-Pearl-Group-IDOR-XSS?tab=readme-ov-file#4%EF%B8%8F%E2%83%A3-inject-xss", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://summerpearlgroup.gr/spgpm/releases", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://vuldb.com/?ctiid.310269", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310269", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.581383", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.youtube.com/watch?v=0wwuatTa6sU", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/Stolichnayer/Summer-Pearl-Group-IDOR-XSS?tab=readme-ov-file#4%EF%B8%8F%E2%83%A3-inject-xss", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5182.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5182.json index 0c5397a08be..ad017a81761 100644 --- a/CVE-2025/CVE-2025-51xx/CVE-2025-5182.json +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5182.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5182", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-26T11:15:24.980", - "lastModified": "2025-05-28T18:15:33.307", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T15:45:55.413", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -122,32 +142,80 @@ "value": "CWE-639" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:summerpearlgroup:vacation_rental_management_platform:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.2", + "matchCriteriaId": "E70289E7-BECA-463B-ABB1-0C46DBDF2057" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/Stolichnayer/Summer-Pearl-Group-IDOR-XSS", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Not Applicable" + ] }, { "url": "https://summerpearlgroup.gr/spgpm/releases", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://vuldb.com/?ctiid.310270", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310270", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.youtube.com/watch?v=0wwuatTa6sU", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/Stolichnayer/Summer-Pearl-Group-IDOR-XSS", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Not Applicable" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5183.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5183.json index 129bff68304..7695d876bbd 100644 --- a/CVE-2025/CVE-2025-51xx/CVE-2025-5183.json +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5183.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5183", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-26T12:15:24.080", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T15:46:11.980", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ], "cvssMetricV2": [ @@ -120,18 +140,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:summerpearlgroup:vacation_rental_management_platform:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.2", + "matchCriteriaId": "E70289E7-BECA-463B-ABB1-0C46DBDF2057" + } + ] + } + ] + } + ], "references": [ { "url": "https://summerpearlgroup.gr/spgpm/releases", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://vuldb.com/?ctiid.310271", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310271", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5184.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5184.json index a42f73aaddd..0e9d704e00d 100644 --- a/CVE-2025/CVE-2025-51xx/CVE-2025-5184.json +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5184.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5184", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-26T12:15:24.263", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T15:46:21.597", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -122,20 +142,59 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:summerpearlgroup:vacation_rental_management_platform:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.2", + "matchCriteriaId": "E70289E7-BECA-463B-ABB1-0C46DBDF2057" + } + ] + } + ] } ], "references": [ { "url": "https://summerpearlgroup.gr/spgpm/releases", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://vuldb.com/?ctiid.310272", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310272", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5360.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5360.json index 29742d6a22e..697c62e34eb 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5360.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5360.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5360", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-30T20:15:44.267", - "lastModified": "2025-06-02T17:32:17.397", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T15:35:19.237", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in Campcodes Online Hospital Management System 1.0. This vulnerability affects unknown code of the file /book-appointment.php. The manipulation of the argument doctor leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en Campcodes Online Hospital Management System 1.0. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /book-appointment.php. La manipulaci\u00f3n del argumento \"doctor\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -76,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -118,28 +142,74 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:campcodes:online_hospital_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D0D06E5E-61CD-4D73-AAC1-7B770EE1F25D" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/ASantsSec/CVE/issues/8", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.310654", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.310654", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.586591", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.campcodes.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5361.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5361.json index ed699945e29..85f48ee2686 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5361.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5361.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5361", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-30T20:15:44.483", - "lastModified": "2025-06-02T17:32:17.397", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T15:35:09.950", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in Campcodes Online Hospital Management System 1.0. This issue affects some unknown processing of the file /contact.php. The manipulation of the argument fullname leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en Campcodes Online Hospital Management System 1.0. Este problema afecta a un procesamiento desconocido del archivo /contact.php. La manipulaci\u00f3n del argumento fullname provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -76,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -118,28 +142,74 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:campcodes:online_hospital_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D0D06E5E-61CD-4D73-AAC1-7B770EE1F25D" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/ASantsSec/CVE/issues/9", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.310655", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.310655", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.586592", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.campcodes.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5362.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5362.json index c5dddb10f9b..124a5309f0a 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5362.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5362.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5362", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-30T21:15:21.240", - "lastModified": "2025-06-02T17:32:17.397", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T15:34:57.473", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in Campcodes Online Hospital Management System 1.0. Affected is an unknown function of the file /admin/doctor-specilization.php. The manipulation of the argument doctorspecilization leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en Campcodes Online Hospital Management System 1.0. La funci\u00f3n afectada es desconocida en el archivo /admin/doctor-specilization.php. La manipulaci\u00f3n del argumento \"doctorsspecilization\" provoca una inyecci\u00f3n SQL. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -76,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -118,28 +142,74 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:campcodes:online_hospital_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D0D06E5E-61CD-4D73-AAC1-7B770EE1F25D" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/ASantsSec/CVE/issues/10", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.310656", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.310656", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.586596", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.campcodes.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5363.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5363.json index 61ec0b0034f..f04d1bff407 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5363.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5363.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5363", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-30T21:15:21.433", - "lastModified": "2025-06-02T17:32:17.397", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T15:34:39.567", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in Campcodes Online Hospital Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /doctor/index.php. The manipulation of the argument Username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en Campcodes Online Hospital Management System 1.0, clasificada como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /doctor/index.php. La manipulaci\u00f3n del argumento \"Username\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -76,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -118,32 +142,82 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:campcodes:online_hospital_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D0D06E5E-61CD-4D73-AAC1-7B770EE1F25D" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/yuanchaoxxxxx/CVE/issues/3", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.310657", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.310657", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.586698", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.campcodes.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/yuanchaoxxxxx/CVE/issues/3", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5364.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5364.json index ae42bb97055..39269d4a5cd 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5364.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5364.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5364", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-30T22:15:24.777", - "lastModified": "2025-06-02T17:32:17.397", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T15:34:20.917", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Campcodes Online Hospital Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /doctor/add-patient.php. The manipulation of the argument patname leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Campcodes Online Hospital Management System 1.0, clasificada como cr\u00edtica. Este problema afecta a una funcionalidad desconocida del archivo /doctor/add-patient.php. La manipulaci\u00f3n del argumento patname provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -76,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -118,32 +142,83 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:campcodes:online_hospital_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D0D06E5E-61CD-4D73-AAC1-7B770EE1F25D" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/yuanchaoxxxxx/CVE/issues/2", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.310658", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.310658", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.586699", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.campcodes.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/yuanchaoxxxxx/CVE/issues/2", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5365.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5365.json index 9a2468e8e52..bd82858ff7c 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5365.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5365.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5365", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-31T01:15:20.507", - "lastModified": "2025-06-02T17:32:17.397", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T15:34:08.383", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Campcodes Online Hospital Management System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/patient-search.php. The manipulation of the argument searchdata leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Campcodes Online Hospital Management System 1.0. Se ha clasificado como cr\u00edtica. Afecta una parte desconocida del archivo /admin/patient-search.php. La manipulaci\u00f3n del argumento \"searchdata\" provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -76,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -118,32 +142,83 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:campcodes:online_hospital_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D0D06E5E-61CD-4D73-AAC1-7B770EE1F25D" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/yuanchaoxxxxx/CVE/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.310659", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.310659", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.586700", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.campcodes.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/yuanchaoxxxxx/CVE/issues/1", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5367.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5367.json index 10b1a1bfd3b..bea5559b332 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5367.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5367.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5367", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-31T02:15:19.383", - "lastModified": "2025-06-02T17:32:17.397", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T15:33:39.070", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in PHPGurukul Online Shopping Portal Project 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /category.php. The manipulation of the argument Product leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en PHPGurukul Online Shopping Portal Project 1.0. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /category.php. La manipulaci\u00f3n del argumento \"Product\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -76,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -118,32 +142,83 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:online_shopping_portal:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F791729D-028D-4D1B-8816-A64C299CEB2A" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/shanranne/myCVE/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.310660", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.310660", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.586814", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/shanranne/myCVE/issues/1", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5368.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5368.json index d5394c2c5cb..3eac61f323d 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5368.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5368.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5368", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-31T04:15:28.847", - "lastModified": "2025-06-02T17:32:17.397", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T15:32:13.583", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in PHPGurukul Daily Expense Tracker System 1.1. It has been rated as critical. This issue affects some unknown processing of the file /expense-yearwise-reports-detailed.php. The manipulation of the argument todate leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en PHPGurukul Daily Expense Tracker System 1.1. Se ha clasificado como cr\u00edtica. Este problema afecta a un procesamiento desconocido del archivo /expense-yearwise-reports-detailed.php. La manipulaci\u00f3n del argumento \"todate\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -76,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -118,32 +142,83 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:daily_expense_tracker_system:1.1:*:*:*:-:*:*:*", + "matchCriteriaId": "0EA23473-6F20-499A-9088-4567AACC8157" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/f1rstb100d/myCVE/issues/25", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.310661", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.310661", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.586911", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/f1rstb100d/myCVE/issues/25", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5373.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5373.json index 9dcfd5856a3..a0b0d12b4c1 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5373.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5373.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5373", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-31T09:15:20.753", - "lastModified": "2025-06-02T17:32:17.397", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-03T15:31:55.267", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in PHPGurukul Online Birth Certificate System 2.0 and classified as critical. This vulnerability affects unknown code of the file /admin/users-applications.php. The manipulation of the argument userid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en PHPGurukul Online Birth Certificate System 2.0, clasificada como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /admin/users-applications.php. La manipulaci\u00f3n del argumento `userid` provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -76,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -118,32 +142,83 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:online_birth_certificate_system:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9234EE6C-1A31-4B9F-AE6C-9104EE29D374" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/f1rstb100d/myCVE/issues/27", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.310666", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.310666", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.587392", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/f1rstb100d/myCVE/issues/27", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5374.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5374.json index 691937dd231..48eabb60537 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5374.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5374.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5374", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-31T10:15:19.940", - "lastModified": "2025-06-02T17:32:17.397", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-03T15:31:45.257", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in PHPGurukul Online Birth Certificate System 2.0 and classified as critical. This issue affects some unknown processing of the file /admin/all-applications.php. The manipulation of the argument del leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en PHPGurukul Online Birth Certificate System 2.0, clasificada como cr\u00edtica. Este problema afecta a un procesamiento desconocido del archivo /admin/all-applications.php. La manipulaci\u00f3n del argumento \"del\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -76,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -118,32 +142,83 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:online_birth_certificate_system:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9234EE6C-1A31-4B9F-AE6C-9104EE29D374" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/f1rstb100d/myCVE/issues/28", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.310667", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.310667", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.587393", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/f1rstb100d/myCVE/issues/28", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5375.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5375.json index 62911c8b516..04529ab2dda 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5375.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5375.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5375", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-31T11:15:31.873", - "lastModified": "2025-06-02T17:32:17.397", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-03T15:31:34.527", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in PHPGurukul HPGurukul Online Birth Certificate System 2.0. It has been classified as critical. Affected is an unknown function of the file /admin/registered-users.php. The manipulation of the argument del leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en PHPGurukul HPGurukul Online Birth Certificate System 2.0. Se ha clasificado como cr\u00edtica. Se ve afectada una funci\u00f3n desconocida del archivo /admin/registered-users.php. La manipulaci\u00f3n del argumento \"del\" provoca una inyecci\u00f3n SQL. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -76,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -118,32 +142,83 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:online_birth_certificate_system:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9234EE6C-1A31-4B9F-AE6C-9104EE29D374" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/f1rstb100d/myCVE/issues/29", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.310668", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.310668", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.587394", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/f1rstb100d/myCVE/issues/29", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5419.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5419.json index d568d1dd7e1..5fc31543679 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5419.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5419.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5419", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-06-03T00:15:21.043", - "lastModified": "2025-06-03T03:15:28.460", + "lastModified": "2025-06-03T14:15:50.600", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out of bounds read and write in V8 in Google Chrome prior to 137.0.7151.68 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)" + }, + { + "lang": "es", + "value": "La lectura y escritura fuera de los l\u00edmites en la versi\u00f3n 8 de Google Chrome anterior a la versi\u00f3n 137.0.7151.68 permit\u00eda a un atacante remoto explotar la corrupci\u00f3n del mont\u00f3n mediante una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chromium: Alta)" } ], "metrics": { @@ -40,6 +44,10 @@ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [ + { + "lang": "en", + "value": "CWE-125" + }, { "lang": "en", "value": "CWE-787" diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5493.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5493.json index f2ce677500e..ee1ed225dad 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5493.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5493.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5493", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-03T11:15:21.230", - "lastModified": "2025-06-03T11:15:21.230", + "lastModified": "2025-06-03T14:15:51.033", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Baison Channel Middleware Product 2.0.1 and classified as critical. Affected by this issue is some unknown functionality of the file /e3api/api/main/ToJsonByControlName. The manipulation of the argument data leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Baison Channel Middleware Product 2.0.1, clasificada como cr\u00edtica. Este problema afecta a una funcionalidad desconocida del archivo /e3api/api/main/ToJsonByControlName. La manipulaci\u00f3n de los datos de los argumentos provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +140,10 @@ { "url": "https://vuldb.com/?submit.586972", "source": "cna@vuldb.com" + }, + { + "url": "https://medium.com/@luoluoxi311/sql-injection-in-baison-channel-middleware-product-version-2-0-1-e0d1ec95c697", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5495.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5495.json index ecea6db3cd4..fb4c9e164f4 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5495.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5495.json @@ -2,7 +2,7 @@ "id": "CVE-2025-5495", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-03T13:15:21.123", - "lastModified": "2025-06-03T13:15:21.123", + "lastModified": "2025-06-03T14:15:51.170", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +136,10 @@ { "url": "https://www.netgear.com/", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Shuanunio/CVE_Requests/blob/main/Netgear/WNR614/ACL%20bypass%20Vulnerability%20in%20Netgear%20WNR614.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5497.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5497.json index ee19c3827f6..b4c6b8955ec 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5497.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5497.json @@ -2,7 +2,7 @@ "id": "CVE-2025-5497", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-03T13:15:21.310", - "lastModified": "2025-06-03T13:15:21.310", + "lastModified": "2025-06-03T15:15:59.873", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +140,10 @@ { "url": "https://vuldb.com/?submit.577999", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/3em0/cve_repo/blob/main/phpwcms/phar%20vulnerability%20in%20phpwcms.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5498.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5498.json new file mode 100644 index 00000000000..afd7a6a48eb --- /dev/null +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5498.json @@ -0,0 +1,153 @@ +{ + "id": "CVE-2025-5498", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-03T14:15:51.313", + "lastModified": "2025-06-03T14:15:51.313", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in slackero phpwcms up to 1.9.45/1.10.8. It has been rated as critical. This issue affects the function file_get_contents/is_file of the file include/inc_lib/content/cnt21.readform.inc.php of the component Custom Source Tab. The manipulation of the argument cpage_custom leads to deserialization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.9.46 and 1.10.9 is able to address this issue. It is recommended to upgrade the affected component." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + }, + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/3em0/cve_repo/blob/main/phpwcms/cnt21.readform.inc.php%23file_get_contents.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/3em0/cve_repo/blob/main/phpwcms/cnt21.readform.inc.php%23is_file.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/slackero/phpwcms/releases/tag/v1.10.9", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.310913", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.310913", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.578054", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.578055", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5499.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5499.json new file mode 100644 index 00000000000..856dd41ee5d --- /dev/null +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5499.json @@ -0,0 +1,149 @@ +{ + "id": "CVE-2025-5499", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-03T14:15:51.513", + "lastModified": "2025-06-03T14:15:51.513", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in slackero phpwcms up to 1.9.45/1.10.8. Affected is the function is_file/getimagesize of the file image_resized.php. The manipulation of the argument imgfile leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.9.46 and 1.10.9 is able to address this issue. It is recommended to upgrade the affected component." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + }, + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/3em0/cve_repo/blob/main/phpwcms/image_resized%23getimagesize.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/slackero/phpwcms/releases/tag/v1.10.9", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.310914", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.310914", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.578082", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.578083", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5501.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5501.json new file mode 100644 index 00000000000..9bd9eddc89a --- /dev/null +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5501.json @@ -0,0 +1,153 @@ +{ + "id": "CVE-2025-5501", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-03T14:15:51.703", + "lastModified": "2025-06-03T15:16:00.003", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic was found in Open5GS up to 2.7.3. Affected by this vulnerability is the function ngap_handle_path_switch_request_transfer of the file src/smf/ngap-handler.c of the component NGAP PathSwitchRequest Message Handler. The manipulation leads to reachable assertion. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The patch is named 2daa44adab762c47a8cef69cc984946973a845b3. It is recommended to apply a patch to fix this issue." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/open5gs/open5gs/commit/2daa44adab762c47a8cef69cc984946973a845b3", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/open5gs/open5gs/issues/3909", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/open5gs/open5gs/issues/3909#issuecomment-2926682623", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/user-attachments/files/20362183/AMF.crash.due.to.pathswitchrequest.zip", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.310915", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.310915", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.582265", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/open5gs/open5gs/issues/3909", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5502.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5502.json new file mode 100644 index 00000000000..b5bb19f8c7d --- /dev/null +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5502.json @@ -0,0 +1,149 @@ +{ + "id": "CVE-2025-5502", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-03T14:15:51.893", + "lastModified": "2025-06-03T15:16:00.167", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in TOTOLINK X15 1.0.0-B20230714.1105. Affected by this issue is the function formMapReboot of the file /boafrm/formMapReboot. The manipulation of the argument deviceMacAddr leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Yhuanhuan01/TOTOlink/blob/main/TOTOlink-x15.md#poc1-code-injection", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.310916", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.310916", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.583562", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.totolink.net/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Yhuanhuan01/TOTOlink/blob/main/TOTOlink-x15.md#poc1-code-injection", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5503.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5503.json new file mode 100644 index 00000000000..4547987171e --- /dev/null +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5503.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-5503", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-03T15:16:00.350", + "lastModified": "2025-06-03T15:16:00.350", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in TOTOLINK X15 1.0.0-B20230714.1105. This affects the function formMapReboot of the file /boafrm/formMapReboot. The manipulation of the argument deviceMacAddr leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Yhuanhuan01/TOTOlink/blob/main/TOTOlink-x15.md#poc2-stack_overflow", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.310917", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.310917", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.totolink.net/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5504.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5504.json new file mode 100644 index 00000000000..672a9d913fb --- /dev/null +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5504.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-5504", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-03T15:16:00.533", + "lastModified": "2025-06-03T15:16:00.533", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in TOTOLINK X2000R 1.0.0-B20230726.1108 and classified as critical. This vulnerability affects unknown code of the file /boafrm/formWsc. The manipulation of the argument peerRptPin leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/fizz-is-on-the-way/Iot_vuls/blob/main/X2000R/RCE_formWsc/RCE_formWsc.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.310918", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.310918", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.584660", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.totolink.net/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5505.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5505.json new file mode 100644 index 00000000000..fff00dbbe5e --- /dev/null +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5505.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-5505", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-03T15:16:00.717", + "lastModified": "2025-06-03T15:16:00.717", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in TOTOLINK A3002RU 2.1.1-B20230720.1011 and classified as problematic. This issue affects some unknown processing of the file /boafrm/formPortFw of the component Virtual Server Page. The manipulation of the argument service_type leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 2.4, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N", + "baseScore": 3.3, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "LOW", + "exploitabilityScore": 6.4, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/fizz-is-on-the-way/Iot_vuls/tree/main/A3002RU_V2/XSS_virtual_server", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.310919", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.310919", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.584662", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.totolink.net/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5506.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5506.json new file mode 100644 index 00000000000..7fcb1cd47f8 --- /dev/null +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5506.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-5506", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-03T15:16:00.897", + "lastModified": "2025-06-03T15:16:00.897", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in TOTOLINK A3002RU 2.1.1-B20230720.1011. It has been classified as problematic. Affected is an unknown function of the component NAT Mapping Page. The manipulation of the argument Comment leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 2.4, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N", + "baseScore": 3.3, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "LOW", + "exploitabilityScore": 6.4, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/fizz-is-on-the-way/Iot_vuls/tree/main/A3002RU_V2/XSS_Nat_Mapping", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.310920", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.310920", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.584663", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.totolink.net/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 31ddc93cd4e..46ea8d2d340 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-03T14:00:19.235697+00:00 +2025-06-03T16:00:19.126715+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-06-03T13:53:41.553000+00:00 +2025-06-03T15:57:57.250000+00:00 ``` ### Last Data Feed Release @@ -33,47 +33,60 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -296314 +296330 ``` ### CVEs added in the last Commit -Recently added CVEs: `10` +Recently added CVEs: `16` -- [CVE-2024-12718](CVE-2024/CVE-2024-127xx/CVE-2024-12718.json) (`2025-06-03T13:15:20.183`) -- [CVE-2025-4138](CVE-2025/CVE-2025-41xx/CVE-2025-4138.json) (`2025-06-03T13:15:20.377`) -- [CVE-2025-4205](CVE-2025/CVE-2025-42xx/CVE-2025-4205.json) (`2025-06-03T12:15:21.350`) -- [CVE-2025-4330](CVE-2025/CVE-2025-43xx/CVE-2025-4330.json) (`2025-06-03T13:15:20.503`) -- [CVE-2025-4435](CVE-2025/CVE-2025-44xx/CVE-2025-4435.json) (`2025-06-03T13:15:20.630`) -- [CVE-2025-4517](CVE-2025/CVE-2025-45xx/CVE-2025-4517.json) (`2025-06-03T13:15:20.837`) -- [CVE-2025-4671](CVE-2025/CVE-2025-46xx/CVE-2025-4671.json) (`2025-06-03T12:15:22.443`) -- [CVE-2025-5340](CVE-2025/CVE-2025-53xx/CVE-2025-5340.json) (`2025-06-03T12:15:22.603`) -- [CVE-2025-5495](CVE-2025/CVE-2025-54xx/CVE-2025-5495.json) (`2025-06-03T13:15:21.123`) -- [CVE-2025-5497](CVE-2025/CVE-2025-54xx/CVE-2025-5497.json) (`2025-06-03T13:15:21.310`) +- [CVE-2024-45655](CVE-2024/CVE-2024-456xx/CVE-2024-45655.json) (`2025-06-03T15:15:58.093`) +- [CVE-2025-36564](CVE-2025/CVE-2025-365xx/CVE-2025-36564.json) (`2025-06-03T15:15:58.600`) +- [CVE-2025-43923](CVE-2025/CVE-2025-439xx/CVE-2025-43923.json) (`2025-06-03T15:15:58.767`) +- [CVE-2025-43924](CVE-2025/CVE-2025-439xx/CVE-2025-43924.json) (`2025-06-03T15:15:58.883`) +- [CVE-2025-43925](CVE-2025/CVE-2025-439xx/CVE-2025-43925.json) (`2025-06-03T15:15:58.997`) +- [CVE-2025-45855](CVE-2025/CVE-2025-458xx/CVE-2025-45855.json) (`2025-06-03T14:15:48.750`) +- [CVE-2025-46154](CVE-2025/CVE-2025-461xx/CVE-2025-46154.json) (`2025-06-03T14:15:48.880`) +- [CVE-2025-46548](CVE-2025/CVE-2025-465xx/CVE-2025-46548.json) (`2025-06-03T15:15:59.110`) +- [CVE-2025-5498](CVE-2025/CVE-2025-54xx/CVE-2025-5498.json) (`2025-06-03T14:15:51.313`) +- [CVE-2025-5499](CVE-2025/CVE-2025-54xx/CVE-2025-5499.json) (`2025-06-03T14:15:51.513`) +- [CVE-2025-5501](CVE-2025/CVE-2025-55xx/CVE-2025-5501.json) (`2025-06-03T14:15:51.703`) +- [CVE-2025-5502](CVE-2025/CVE-2025-55xx/CVE-2025-5502.json) (`2025-06-03T14:15:51.893`) +- [CVE-2025-5503](CVE-2025/CVE-2025-55xx/CVE-2025-5503.json) (`2025-06-03T15:16:00.350`) +- [CVE-2025-5504](CVE-2025/CVE-2025-55xx/CVE-2025-5504.json) (`2025-06-03T15:16:00.533`) +- [CVE-2025-5505](CVE-2025/CVE-2025-55xx/CVE-2025-5505.json) (`2025-06-03T15:16:00.717`) +- [CVE-2025-5506](CVE-2025/CVE-2025-55xx/CVE-2025-5506.json) (`2025-06-03T15:16:00.897`) ### CVEs modified in the last Commit -Recently modified CVEs: `18` +Recently modified CVEs: `281` -- [CVE-2024-41339](CVE-2024/CVE-2024-413xx/CVE-2024-41339.json) (`2025-06-03T13:52:39.957`) -- [CVE-2024-41340](CVE-2024/CVE-2024-413xx/CVE-2024-41340.json) (`2025-06-03T13:52:23.300`) -- [CVE-2024-41592](CVE-2024/CVE-2024-415xx/CVE-2024-41592.json) (`2025-06-03T13:52:04.560`) -- [CVE-2024-54188](CVE-2024/CVE-2024-541xx/CVE-2024-54188.json) (`2025-06-03T13:52:30.580`) -- [CVE-2025-27997](CVE-2025/CVE-2025-279xx/CVE-2025-27997.json) (`2025-06-03T13:52:50.260`) -- [CVE-2025-32813](CVE-2025/CVE-2025-328xx/CVE-2025-32813.json) (`2025-06-03T13:53:24.730`) -- [CVE-2025-32814](CVE-2025/CVE-2025-328xx/CVE-2025-32814.json) (`2025-06-03T12:59:57.153`) -- [CVE-2025-32815](CVE-2025/CVE-2025-328xx/CVE-2025-32815.json) (`2025-06-03T12:59:26.683`) -- [CVE-2025-44083](CVE-2025/CVE-2025-440xx/CVE-2025-44083.json) (`2025-06-03T13:52:39.333`) -- [CVE-2025-44892](CVE-2025/CVE-2025-448xx/CVE-2025-44892.json) (`2025-06-03T13:53:03.090`) -- [CVE-2025-44895](CVE-2025/CVE-2025-448xx/CVE-2025-44895.json) (`2025-06-03T13:52:57.017`) -- [CVE-2025-4696](CVE-2025/CVE-2025-46xx/CVE-2025-4696.json) (`2025-06-03T13:15:20.963`) -- [CVE-2025-5149](CVE-2025/CVE-2025-51xx/CVE-2025-5149.json) (`2025-06-03T12:59:06.597`) -- [CVE-2025-5150](CVE-2025/CVE-2025-51xx/CVE-2025-5150.json) (`2025-06-03T12:58:43.070`) -- [CVE-2025-5151](CVE-2025/CVE-2025-51xx/CVE-2025-5151.json) (`2025-06-03T12:58:22.147`) -- [CVE-2025-5152](CVE-2025/CVE-2025-51xx/CVE-2025-5152.json) (`2025-06-03T12:58:01.413`) -- [CVE-2025-5153](CVE-2025/CVE-2025-51xx/CVE-2025-5153.json) (`2025-06-03T12:57:15.430`) -- [CVE-2025-5154](CVE-2025/CVE-2025-51xx/CVE-2025-5154.json) (`2025-06-03T13:53:41.553`) +- [CVE-2025-5175](CVE-2025/CVE-2025-51xx/CVE-2025-5175.json) (`2025-06-03T15:43:45.590`) +- [CVE-2025-5176](CVE-2025/CVE-2025-51xx/CVE-2025-5176.json) (`2025-06-03T15:44:04.310`) +- [CVE-2025-5177](CVE-2025/CVE-2025-51xx/CVE-2025-5177.json) (`2025-06-03T15:44:51.087`) +- [CVE-2025-5178](CVE-2025/CVE-2025-51xx/CVE-2025-5178.json) (`2025-06-03T15:45:01.163`) +- [CVE-2025-5179](CVE-2025/CVE-2025-51xx/CVE-2025-5179.json) (`2025-06-03T15:45:10.347`) +- [CVE-2025-5180](CVE-2025/CVE-2025-51xx/CVE-2025-5180.json) (`2025-06-03T15:45:24.887`) +- [CVE-2025-5181](CVE-2025/CVE-2025-51xx/CVE-2025-5181.json) (`2025-06-03T15:45:42.630`) +- [CVE-2025-5182](CVE-2025/CVE-2025-51xx/CVE-2025-5182.json) (`2025-06-03T15:45:55.413`) +- [CVE-2025-5183](CVE-2025/CVE-2025-51xx/CVE-2025-5183.json) (`2025-06-03T15:46:11.980`) +- [CVE-2025-5184](CVE-2025/CVE-2025-51xx/CVE-2025-5184.json) (`2025-06-03T15:46:21.597`) +- [CVE-2025-5360](CVE-2025/CVE-2025-53xx/CVE-2025-5360.json) (`2025-06-03T15:35:19.237`) +- [CVE-2025-5361](CVE-2025/CVE-2025-53xx/CVE-2025-5361.json) (`2025-06-03T15:35:09.950`) +- [CVE-2025-5362](CVE-2025/CVE-2025-53xx/CVE-2025-5362.json) (`2025-06-03T15:34:57.473`) +- [CVE-2025-5363](CVE-2025/CVE-2025-53xx/CVE-2025-5363.json) (`2025-06-03T15:34:39.567`) +- [CVE-2025-5364](CVE-2025/CVE-2025-53xx/CVE-2025-5364.json) (`2025-06-03T15:34:20.917`) +- [CVE-2025-5365](CVE-2025/CVE-2025-53xx/CVE-2025-5365.json) (`2025-06-03T15:34:08.383`) +- [CVE-2025-5367](CVE-2025/CVE-2025-53xx/CVE-2025-5367.json) (`2025-06-03T15:33:39.070`) +- [CVE-2025-5368](CVE-2025/CVE-2025-53xx/CVE-2025-5368.json) (`2025-06-03T15:32:13.583`) +- [CVE-2025-5373](CVE-2025/CVE-2025-53xx/CVE-2025-5373.json) (`2025-06-03T15:31:55.267`) +- [CVE-2025-5374](CVE-2025/CVE-2025-53xx/CVE-2025-5374.json) (`2025-06-03T15:31:45.257`) +- [CVE-2025-5375](CVE-2025/CVE-2025-53xx/CVE-2025-5375.json) (`2025-06-03T15:31:34.527`) +- [CVE-2025-5419](CVE-2025/CVE-2025-54xx/CVE-2025-5419.json) (`2025-06-03T14:15:50.600`) +- [CVE-2025-5493](CVE-2025/CVE-2025-54xx/CVE-2025-5493.json) (`2025-06-03T14:15:51.033`) +- [CVE-2025-5495](CVE-2025/CVE-2025-54xx/CVE-2025-5495.json) (`2025-06-03T14:15:51.170`) +- [CVE-2025-5497](CVE-2025/CVE-2025-54xx/CVE-2025-5497.json) (`2025-06-03T15:15:59.873`) ## Download and Usage diff --git a/_state.csv b/_state.csv index b96c54cec21..5f41a9c3b2e 100644 --- a/_state.csv +++ b/_state.csv @@ -85388,7 +85388,7 @@ CVE-2016-20016,0,0,c2c42705d865492545175402ab5bbe5f976fa1c90daffabefac4d8828fb97 CVE-2016-20017,0,0,0b28d9274db53048c20ec4de505ef6ac15653b20835f27a5def94a6a8f48a9d4,2025-03-14T20:00:42.390000 CVE-2016-20018,0,0,62c09eb5dba9905cc98613f73c036000dc23cdec0f8a6845db0dc239c7ec6f18,2024-11-21T02:47:34.203000 CVE-2016-2002,0,0,46fb4a8745a4558123d305387c39b0b73e581db9564a14c4a75a28a8c155f048,2025-04-12T10:46:40.837000 -CVE-2016-20021,0,0,ddf15001084ec81189844eec1b1019cd1afd4763fd6f96fb5217f33cd8b25ba3,2024-11-21T02:47:34.367000 +CVE-2016-20021,0,1,4c0bb541ca009b5d3374ad6a22f85f63acf8e0c180eb227f6601ee2b69627cb0,2025-06-03T14:15:26.830000 CVE-2016-20022,0,0,f3b79e4e40b7b258a06430f1aad64a75e784e076547d4ddff1aa1a207dd3d2a6,2025-03-13T18:15:35.470000 CVE-2016-2003,0,0,bb11b401da15b32c0d63ef7b69ec2cb9fbbe494777c30d27975cdf22b552adb2,2025-04-12T10:46:40.837000 CVE-2016-2004,0,0,f52df976e977d8cf55fdef3a116501f8beee39979c830285072b3d77a2a7ee20,2025-04-12T10:46:40.837000 @@ -121438,7 +121438,7 @@ CVE-2018-25091,0,0,54f943f8656bae1d4d9ef940d994e9ff4a6f80ed8bf83569ab76189d6222a CVE-2018-25092,0,0,6c9a213de560531761ef5baf464f1c90bd58143c3d4d8d3d4f34493690d53b3d,2024-11-21T04:03:32.477000 CVE-2018-25093,0,0,085b167721648bff6a310b200ec532e145933a6f06eac9041868f2e7da6d145d,2024-11-21T04:03:32.633000 CVE-2018-25094,0,0,7abebba68c45fd432111578f27883900d833004af783ef26a64ddf0d8b156b41,2024-11-21T04:03:32.790000 -CVE-2018-25095,0,0,be6e3ddfc1f1c172d3bb6f893dbc1fd84fff26521a720323b4576e782cb1f76c,2024-11-21T04:03:32.950000 +CVE-2018-25095,0,1,dd8bc2930323584d0506d1150aa0f7e073b346817625f238e40f523cfb86bef5,2025-06-03T15:15:22.710000 CVE-2018-25096,0,0,bb1fa2d0b00ed0732a5399a38ed0543f6be56e53004e5eb10cc1087fb02ba6f1,2024-11-21T04:03:33.080000 CVE-2018-25097,0,0,9368c42fcc01f2e8aff8f4ee5ea3f33da1ddbaf894de01f47af1e77c4aa4e221,2024-11-21T04:03:33.240000 CVE-2018-25098,0,0,a6b61057b4574c99b0b20873a5c0399a4cd5317fce0d2f912e80f26080f0fa56,2024-11-21T04:03:33.403000 @@ -144315,7 +144315,7 @@ CVE-2019-9974,0,0,3d465d230eebcc442b36b854518a61956b66b4f7c5cb1a8559528635dc13d7 CVE-2019-9975,0,0,98ea233ad4ab91a3d7caa85b949afb9bd21131dba357cfd25275f86660656db9,2024-11-21T04:52:42.890000 CVE-2019-9976,0,0,e28cafc2e4c205dd3c8e228a98a0141fc2e10296a093b2bf71f683cbc803d51c,2024-11-21T04:52:43.043000 CVE-2019-9977,0,0,ec2527cc5067dbfc68f10d30dace6b96bf83e89c5a29082622eeba6e74a9d826,2024-11-21T04:52:43.187000 -CVE-2019-9978,0,0,82011be03f32f9f2fafcc415a12990b98b48c5f49a1ec3325a6e1d7d2914fbfe,2025-02-28T18:06:20.323000 +CVE-2019-9978,0,1,ac7ac561adcc0fb5ff3222e99c602a91dc9bd7019e7041ee465230d320a1b76d,2025-06-03T15:15:22.957000 CVE-2019-9983,0,0,511c668feaebd8d95980cf01158100a0f8ab755779eb3befa71dddab6b9af4b5,2023-11-07T03:13:49.863000 CVE-2020-0001,0,0,8fec3cabe322d4c072da09e85c8cbcbccee53ecf75a633aa320b9ff47c927d42,2024-11-21T04:52:43.530000 CVE-2020-0002,0,0,b62b8053cf851d60e105942a11975e98647ccd87f935c5857126072ec7aef36d,2024-11-21T04:52:43.650000 @@ -151095,7 +151095,7 @@ CVE-2020-16161,0,0,42be27fe5670150d34e63a6c401287ede1696ecbf2e6f11fddf9cc34f08e2 CVE-2020-16162,0,0,12b3814189e58ce175bd3b4a872927c8258550683536cb11ece3257aa2a75a86,2024-11-21T05:06:53.003000 CVE-2020-16163,0,0,18b75bdf25545d0401c20e89e6d14b3e60656db4fd67745b5c0db76dfbc8d8a8,2024-11-21T05:06:53.150000 CVE-2020-16164,0,0,f82953d488ba751f75d6713e94bfc75c530eaa5720ca00b3e460139abd93c38e,2024-11-21T05:06:53.287000 -CVE-2020-16165,0,0,289dedb5cd73141365cde6b690d03824294d443d74559792ded12fd36f5f1b21,2024-11-21T05:06:53.433000 +CVE-2020-16165,0,1,9ca2259d017d776a3a5b18531c6e034799191bbbc2a00f39ba4056bae02b3d55,2025-06-03T14:38:14.490000 CVE-2020-16166,0,0,9cdac4f1f7b17d07bf87b4abedea9b5c998ae4506f2fa5c74dbb265cb8ce39e5,2024-11-21T05:06:53.577000 CVE-2020-16167,0,0,e6a53c9de8fba7567c46d3a5de1b061090094c61e9d8113e1c35aaa2f45a9daf,2024-11-21T05:06:53.813000 CVE-2020-16168,0,0,9056fd8b2c75dd8faee2863d299fd82f459d57cf4c53a145834f941eb6e2026b,2024-11-21T05:06:53.940000 @@ -155846,10 +155846,10 @@ CVE-2020-26607,0,0,3dbe3549008aeaf39825b6fbcae98e5de99d2ae5fb6bd7c92bf413dbc6412 CVE-2020-26609,0,0,b1276559e5b51c36ad0921b31d3936560cbed7e566c5fa9bbb4ba97236bfe5b1,2024-11-21T05:20:09.277000 CVE-2020-2661,0,0,b1681b156bb98adb26337cecd3379426ae8a0e7db82d2af964418ee42cdb2ee2,2024-11-21T05:25:55.800000 CVE-2020-2662,0,0,7dbc120400ef515c83858eecd30b062aebd984fcafe369707b3ed824c04f53f5,2024-11-21T05:25:55.960000 -CVE-2020-26623,0,0,b8fcc79d843ef480ae6b1513803a314eb013e3aad2622c7319340447295705a3,2024-11-21T05:20:09.427000 +CVE-2020-26623,0,1,868ae7c90cab410e748b26b3f8ba89a6ba9fa063d74adcd261dfe52b6b1621be,2025-06-03T15:15:23.283000 CVE-2020-26624,0,0,6ae1dd581800c36f7d6764595aeacb52c77420ca90c8addb5d4d4a79a20fc344,2024-11-21T05:20:09.577000 CVE-2020-26625,0,0,9bda7c918951fc23775bec67f6e88eb70fd1e6dcd3b4d8a1fd00dac18775a0c4,2025-05-16T18:16:00.633000 -CVE-2020-26627,0,0,c151567ab1b42a63633a3d00517a56eb92c009b907461770e1f713f8ac586c1c,2024-11-21T05:20:09.853000 +CVE-2020-26627,0,1,3ffd8644f12b90c2141a35b8b18f5821a93ffe24227a55d35b514592c33fde48,2025-06-03T15:15:23.537000 CVE-2020-26628,0,0,4bd8fc6faf7cbc587d496d53268fae79ceb010e9b3aa4d7dc06728be5812e026,2024-11-21T05:20:09.997000 CVE-2020-26629,0,0,77897a339e117ff2a4c670657458d5ece8e0bd980de11a7fc787223e433fa825,2025-05-09T19:15:50.430000 CVE-2020-2663,0,0,3118638803c8403be12951765b6c6469d49e159b376e18af70a045e3472dee0e,2024-11-21T05:25:56.130000 @@ -201490,7 +201490,7 @@ CVE-2022-33276,0,0,48079cf0c2ef597e53be50bcca796df79253e3ceb90a86a726c6109f32d7f CVE-2022-33277,0,0,2936d8b0927b48bd4756ed0f101f23f351674417c517434aa0e87b014c6ef2b1,2024-11-21T07:08:00.227000 CVE-2022-33278,0,0,2f7d6b15a13909ee0007b1193a6fd1661f6d47abdc59b0f7c86fa1f3e89e1a7b,2024-11-21T07:08:00.637000 CVE-2022-33279,0,0,bd1ef22fa1622222b518105a5511c35b56c36008594615716803a7e7411f90da,2024-11-21T07:08:01.297000 -CVE-2022-3328,0,0,86695cf62eb55a8fad8804eb74b4f5bceb89a20227dc5319f811e552edc0837f,2024-11-21T07:19:18.427000 +CVE-2022-3328,0,1,7bc40dfbdb52b29e085aa2968afdc4d3ed887847cf5f75541acf0a42a7e69669,2025-06-03T15:15:24.243000 CVE-2022-33280,0,0,bb24028af04c8fa33c588e4000406e670fa455c119c68eb43ab1a9be24daa44a,2024-11-21T07:08:01.620000 CVE-2022-33281,0,0,f4e49fb80349ba2d0e2edff8d48752e776fcac380e26caa0531cd294766e90a1,2024-11-21T07:08:01.883000 CVE-2022-33282,0,0,5264c0bc04bfde589df3d6df23110146e7b1918991da5532d10ff4eb314699c0,2024-11-21T07:08:02.060000 @@ -205924,7 +205924,7 @@ CVE-2022-39005,0,0,bb038691d3c9b2647d99c2d3d754f543f897343ca588c27b73aa9219dbc2b CVE-2022-39006,0,0,4e90bab8727385556db167a91a3124d39f57d43ae89918436df265931d283a53,2024-11-21T07:17:21.667000 CVE-2022-39007,0,0,7fc777ea84ac318ad37d1260f6a95c70839432ae8f33a471cdc0b4a0084f6de1,2024-11-21T07:17:21.790000 CVE-2022-39008,0,0,128aad5fce305a2c3d0ab626ab274ea90dd3e829a9a10904593ff7f4948e5557,2024-11-21T07:17:21.917000 -CVE-2022-39009,0,0,eda2df18d7f64bd3a4f7faabef921882a939420ac3cdfa10bcec1b32dc16d05d,2024-11-21T07:17:22.037000 +CVE-2022-39009,0,1,b896b8a63f7928729c8192168e0ad07db261db60734cf117e43949b71fd8ea45,2025-06-03T15:15:23.920000 CVE-2022-3901,0,0,3cc556239d48e1db8221484e2bc0245df3dc66f0884fdcb68b8018423d2f7edf,2024-11-21T07:20:29.840000 CVE-2022-39010,0,0,25fe72a1917e3d3ef25524a08262176093c1131bc90ebf66c29745ac63353dad,2024-11-21T07:17:22.150000 CVE-2022-39011,0,0,481444f2749c9cfd925c2e5fe4739c0df67690b5a71803595a9b9c7760c9af2d,2025-05-15T15:16:00.747000 @@ -212902,7 +212902,7 @@ CVE-2022-48500,0,0,6310235f960528754f08d70ed3f4267ddf7cea72255caec824bcdc5aef729 CVE-2022-48501,0,0,8a0b77d4bf434c94f5c2fe749e48bd0f0aadcff848b8775a58207b270e9c05ee,2024-12-26T19:15:07.243000 CVE-2022-48502,0,0,2adfaa33b4930a948be53d3289ccf59a8e279ba01a027a20fdd402eac46f646a,2024-11-21T07:33:27.053000 CVE-2022-48503,0,0,7ca5e4a2ecf7d57cc7963ec1506f0ba99bc2307a20ec10df332428b97de7a46b,2024-11-21T07:33:27.223000 -CVE-2022-48504,0,0,1e653928f1612ade3b215a0fd94b2dfcb65ea165ebeedba29e2e638ad426fdbc,2024-11-21T07:33:27.350000 +CVE-2022-48504,0,1,ef7281940e721cfe98e3e05c36cd8858038c8ea30b4619c0474b159210623cba,2025-06-03T15:15:24.477000 CVE-2022-48505,0,0,5f3cb211c9bfbabf92ef9a5f9f86fda7c50566ffef0a43661562171697633f57,2024-11-27T15:15:21.747000 CVE-2022-48506,0,0,430454da0ceacca6d82951d494cd6855f4189162831ae96e829e65c1abbdf6c0,2025-01-02T21:15:08.130000 CVE-2022-48507,0,0,2ef6df2fe4a95a723fbc7aa6904109deb767124e4243c8736930bb46fe76d08b,2024-11-21T07:33:27.737000 @@ -212983,7 +212983,7 @@ CVE-2022-48616,0,0,8d4f1e489de29041e735dfd21302720627a6ca753dd668e0c1a59241fa9e8 CVE-2022-48618,0,0,de34ff3ddea313accfbbe411a01db06c948b304c4d3b83cf4b319c3e5e33aa26,2025-02-14T16:20:50.207000 CVE-2022-48619,0,0,f430858d69110262595d406cd59141f3129992f61f2999c2d0d7c3d7ff52a7cd,2024-11-21T07:33:36.937000 CVE-2022-4862,0,0,be69f043a9d2fc07d2bd44e10e599677353fe08d4b473ec2a857caa22c42f526,2024-11-21T07:36:05.530000 -CVE-2022-48620,0,0,3a0147023a2ce808093311def3d214b6bfe6456b70abb680e638fd93230ae406,2024-11-21T07:33:37.200000 +CVE-2022-48620,0,1,a90bb57b2706f8a1d27770252035085c19044c843d13825eb0ad93e66ed275da,2025-06-03T14:15:27.857000 CVE-2022-48621,0,0,c3ea733991c9569be28a3881359c152b589cecfc7eed92953da9d8d07b95b6a9,2024-12-06T22:15:18.107000 CVE-2022-48622,0,0,027039012cc730313011d3d53c704afbb96ace1aeb42a1768b9d920edb82e8f4,2024-11-21T07:33:37.483000 CVE-2022-48623,0,0,36b40d73baf0aa0e574ac39123b25f61f9a9cd0abff90b96d80fc828fe2febf3,2024-11-21T07:33:37.723000 @@ -222116,7 +222116,7 @@ CVE-2023-26986,0,0,94a9ca1cf50bdd19fafa94e5e971b449f42a846e0edee43ac0ab234f9a96a CVE-2023-26987,0,0,7e0a4eaa4d803abc17024cde6c193682bcccb5a7d9831d5d98e1851f634d4d3c,2025-01-30T17:15:13.323000 CVE-2023-2699,0,0,1c04a3cc51ebb405d698cee0fe2e32f286ab499340c1d6cc19532b802b686fe7,2024-11-21T07:59:06.680000 CVE-2023-26991,0,0,0ad8a895e031d4c9a4158a29415ca5b8b3237fd1895d18e017bf0b3958cb796c,2025-02-12T16:15:37.270000 -CVE-2023-26998,0,0,70b29c0ae973491d7cc5b4fabac39d4344cee5de103e705010b9f8f4a253d792,2024-11-21T07:52:09.940000 +CVE-2023-26998,0,1,3d595fa31191b7e424e9de2bc1d4611c2d67b331f560fb4101add8705568686f,2025-06-03T15:15:24.743000 CVE-2023-26999,0,0,0a6e26719d32d20a55674544c2b16e84e883bad504358330da63d67239bce96a,2024-11-21T07:52:10.107000 CVE-2023-2700,0,0,39eae528fab2c9005417e2728ba40351fd5c31be39110f823a95f3ceafdaaa56,2025-01-28T17:15:14.093000 CVE-2023-27000,0,0,e7632f817e61d8a12de30f7cfd641dc1805aa79e66ef1ddb4d0513ee23d486e3,2024-11-21T07:52:10.270000 @@ -223121,7 +223121,7 @@ CVE-2023-2818,0,0,735a9c6bb7b4e983aea153a48d7553aa85a0db10d10608cbd385e641830a29 CVE-2023-28180,0,0,69b9a6f7415b36b0c99c67cdc91356de8a172290896e650ad757311e8403aef7,2025-01-29T16:15:41.527000 CVE-2023-28181,0,0,4b3711a77bdb13988b7724ea5507328a7a26d0228769f67b09bc7ffb2c019845,2025-01-29T16:15:41.680000 CVE-2023-28182,0,0,610380eae69cbd3ed058b252db51e61a56661a134bc6a2bb30cdba530e143aa6,2025-01-29T16:15:41.830000 -CVE-2023-28185,0,0,daea7675bd9566307ac8ce74e72790c4119b91a66b24f2f9152cc8c5ddb3b31c,2024-11-21T07:54:33.430000 +CVE-2023-28185,0,1,4588cfaf837941caf9322bb1cd82aebabde1b4802d19d3d03202ba39b1b146b9,2025-06-03T15:15:25.450000 CVE-2023-28187,0,0,40a29a1b4bc9415b4849d4f34e04745eda7dc3fb7e002919cc6706a7403562d0,2024-11-21T07:54:33.587000 CVE-2023-28188,0,0,25a78be88c94d9bf595f284b54e423d2516fc344a5483e69e2bfc4dddd4809a5,2024-11-21T07:54:33.713000 CVE-2023-28189,0,0,76ebb62413fdcdfd41eb7fc8f6657bbfe927a2bcd04ef4ec509a00609474a7c3,2025-01-29T16:15:41.980000 @@ -224624,7 +224624,7 @@ CVE-2023-2995,0,0,45e26ed257351b65f773f5a86ad5ea665099e253da89f7335243354cc30c3b CVE-2023-29950,0,0,1f742992ea5a9dddba6994af01866b36c0c4d0e1b1bcb3658fb7bc02a7c45aca,2025-01-31T19:15:13.540000 CVE-2023-2996,0,0,81e2857483a196eaf1f4afd1167fc00f2bbcc9dc2db923790dd33a7054d73806,2024-11-21T07:59:43.287000 CVE-2023-29961,0,0,2270065ec3cb92874d59f3ab87c65b981feb389aa3fac93847ad8b4df414a89d,2025-01-23T17:15:10.487000 -CVE-2023-29962,0,0,ca5d776a8d4ea81e976b0c0486c5877c66a51f08bb42aa5afb555fbccd40e3bd,2024-11-21T07:57:42.377000 +CVE-2023-29962,0,1,7574b0d04ea4579153755ddcc719d8338c6f7735826d16cd25cd0532e5fbb1e0,2025-06-03T15:15:25.857000 CVE-2023-29963,0,0,282ba176f8613c49c678335c5d8e386a1fbebb275a32e465d7927b29a75b386c,2025-01-29T21:15:17.483000 CVE-2023-29973,0,0,5d9ee80e86badd3f9db3dbfa1987e97512008502a69f06bef379036dc888d2ec,2024-11-21T07:57:42.650000 CVE-2023-29974,0,0,ddbcecfa997b6645a33f5ae1f43bd5460df6e86eec2a4de1694b2b486d1c9ddf,2024-11-21T07:57:42.783000 @@ -224642,8 +224642,8 @@ CVE-2023-29998,0,0,36ba70eaadb7eebd89d04a5e6b87032b4e12183e3cd2e580393c51588e115 CVE-2023-3000,0,0,26231e5f3656da19dbdc45838f0543965d52112a545acdde6e514882e4865386,2024-11-21T08:16:12.630000 CVE-2023-3001,0,0,3422166239ad6147dfcc4947163b2f901679d2edc6b64411329c2307ae9ed360,2024-11-21T08:16:12.773000 CVE-2023-30013,0,0,87c423e25c792fce5bc83e4bf6f191c6949f57951a943ba2dbea908977a95311,2025-01-29T18:15:45.250000 -CVE-2023-30014,0,0,a95da5bb2e1f0a3eb649392bdbe225202726295716a128babe4fa9213a383b07,2024-11-21T07:59:43.863000 -CVE-2023-30015,0,0,05f333297f7113bf639f3b646fe86ed6b63258a109425f50ff11d2040e362f46,2024-11-21T07:59:44.037000 +CVE-2023-30014,0,1,c25d07a9b10467d8a81b8f99c285188b5233b991f593a5cc4ae374c8a47170b7,2025-06-03T14:15:28.273000 +CVE-2023-30015,0,1,40b0b67b16765db8506efbe7dc65d7079ffa5f47785eb5eb8dfd8418315bcf50,2025-06-03T14:15:28.520000 CVE-2023-30016,0,0,15f8f4e6a88099d8bd439611780be917f0cdc3ed18540c6617a226e38e12f3f7,2024-11-21T07:59:44.183000 CVE-2023-30018,0,0,e3f57612825baf4fdd015a9a7ad749e649f5b089f96ef39965f1e4153c74540b,2025-01-29T18:15:45.480000 CVE-2023-30019,0,0,d18659419e06c338eefa0bf00be3cdf4b0454013961f70a506a1ecacfd6dde5f,2025-01-29T17:15:24.177000 @@ -226465,7 +226465,7 @@ CVE-2023-32420,0,0,78945dca235dc25e80c2cfb8ec433c55079c2c188282dcadc5fc5d529647d CVE-2023-32421,0,0,d77d924a3f2984827f1e9563a2e4b6b5331da9100b5eceb620082e3d44ec5a14,2024-11-21T08:03:19.320000 CVE-2023-32422,0,0,73d03fdf9e33246a7bce76c8257d96b2959f868905ce0c084bd026fd40188c02,2024-11-21T08:03:19.437000 CVE-2023-32423,0,0,5ac574426d628b0d4d134786b8b784e9b610514d299167ff8b328ac1fbe2c169,2025-03-20T17:00:39.597000 -CVE-2023-32424,0,0,683ff3dc266ba5113bf26052502eced1eeaa3aa9593de767afbcbc26a6c1779e,2024-11-21T08:03:19.700000 +CVE-2023-32424,0,1,97017a6cc15d4890cb4aa92de645813b1b9389ba84b5af3ce330827e1c7ad791,2025-06-03T15:15:26.780000 CVE-2023-32425,0,0,5d12e602e911c4507fec6203eb76478f80fb57b35ff46e09bf5daa53d5a2bd48,2024-12-12T14:26:18.893000 CVE-2023-32426,0,0,fd77e42b4f67240428062c33ae76dc6a71f3f5905a3245c0ec491d905903d45f,2024-11-21T08:03:19.950000 CVE-2023-32427,0,0,cc5468223a597b0de35ba767fe8127d59a8f1edf477272ab39a011b2f2e623cf,2024-11-21T08:03:20.073000 @@ -226912,11 +226912,11 @@ CVE-2023-32869,0,0,e4e4ed6365e7de773cf75acab8547cfac45d2bd17079ca0c7f02940b1eb05 CVE-2023-3287,0,0,bc7945fe3a8e884c43817a325b466366474e030f34cb4e7e12d35f6606d96524,2024-11-21T08:16:55.950000 CVE-2023-32870,0,0,1b9b9ded4bc521561b65c39463b9a8aea214fedf975162131593e8034abbcb15,2024-11-21T08:04:14.310000 CVE-2023-32871,0,0,1cbff93574653701e16618044bc91b0e8074f9510e1fd52933100c19b5d7164b,2025-05-05T16:57:14.013000 -CVE-2023-32872,0,0,2a65468222c513a5c3283cca063ae50eb6f570358214a2c573d783a17d20d9df,2024-11-21T08:04:14.590000 +CVE-2023-32872,0,1,72b6debaf478b80a7bc9842a9517ff93ff126a39f91bf7a8206613b85fa529f9,2025-06-03T15:15:27.703000 CVE-2023-32873,0,0,65dac95621bd11945fe69863088e83b075fc0f7059f5ab1bf54e4c8c6481065f,2025-03-13T22:15:13.450000 CVE-2023-32874,0,0,c4200f00c39dfa54f423142533ef1bf0a08fc0bb69117733aa52fbe5c9f656b1,2025-04-17T19:15:55.677000 CVE-2023-32875,0,0,0fbd6550b4e96abf60d2bf3371650742ac8f81b4037c5a1b07eb6564d6c71804,2024-11-21T08:04:14.997000 -CVE-2023-32876,0,0,a8fdb8d227637f01ee3e815b45bedce18fa99fe9942402aa9e81494656415d09,2024-11-21T08:04:15.130000 +CVE-2023-32876,0,1,0ae622faa86eb2c45443b265e1b7ebe82ce175c154a1e7253080cf1b32a32f57,2025-06-03T15:15:28.200000 CVE-2023-32877,0,0,67b00d8236c06bb5ef6d6f69f0da656f18ef587e78402deb79f54c65a21d78e8,2024-11-21T08:04:15.263000 CVE-2023-32878,0,0,4ba592dccc3a790199397e7a15851c09029e953a4e17fee7a5caf3a9a68ebe8b,2025-05-16T18:16:00.943000 CVE-2023-32879,0,0,ead4f2b3a3d5dc3209c2b1326d161a11da486100675f641d2a72c75b316501f9,2024-11-21T08:04:15.503000 @@ -226924,10 +226924,10 @@ CVE-2023-3288,0,0,460dcdccbabb639d059f18f9cc926d0a7bdc301d497ebf5a7732131065332b CVE-2023-32880,0,0,562a89df1245f45fe5675387ef75d30aead46b79b497a987863d83c15e7ce4fb,2024-11-21T08:04:15.610000 CVE-2023-32881,0,0,43e1299ff03db1b6e1d6258a5127ac0bc8e255685734d8371c193d563d99f4b0,2024-11-21T08:04:15.733000 CVE-2023-32882,0,0,c60d89dd5502e97e6ef3af8c4e0e062d4968f496a86b3ae3dbc3ce0dae41d2a8,2024-11-21T08:04:15.870000 -CVE-2023-32883,0,0,a06b9891266759c8d75e138740d12a4965dbc54146d3215b8d37cef3dadc1a77,2024-11-21T08:04:15.983000 -CVE-2023-32884,0,0,e8a21e61867fe994cd0d376af5618f9a77da3b44dcbb9787dc2b6cb288efdfad,2024-11-21T08:04:16.120000 +CVE-2023-32883,0,1,18723e3d230f195bc0a868976daaa68e0e09f50ea939aff9a7f50817007d344d,2025-06-03T15:15:30.633000 +CVE-2023-32884,0,1,badab0b564d8b0671ccccd8220cc21ebd691ade4e70a70e9932ae240cc9e9b1d,2025-06-03T15:15:31.293000 CVE-2023-32885,0,0,e6ad4cab5f683cd31277c541f39b573a4cab547e3c7cbe67334cd94792821ed1,2025-04-17T19:15:55.867000 -CVE-2023-32886,0,0,770c4de1d003f4b46130e55a74e31f5151d891d450b64ebcf8b46fe3bdd3b259,2024-11-21T08:04:16.400000 +CVE-2023-32886,0,1,b130264fbebddf30b7785f9804d4b6984dea839b524cc40be854e297927fa567,2025-06-03T15:15:31.613000 CVE-2023-32887,0,0,d53315a2428ef259dc65ccac326b9b796be0211c3ebada7a131e2c99a0b9899b,2024-11-21T08:04:16.530000 CVE-2023-32888,0,0,752087afa621d16e61d32ee9c8700b21050b1a9343589eda4eef2d1b19855fd8,2025-05-16T18:16:01.257000 CVE-2023-32889,0,0,e2d8dfe153faa54fe19d590087d31f3105782c0ca961382255d5f028954e56ad,2024-11-21T08:04:16.780000 @@ -227833,7 +227833,7 @@ CVE-2023-34058,0,0,a0d110aa3005667043c6cc6fda4058edfc29f5aec6a59d90d13839ef54f77 CVE-2023-34059,0,0,973b3e3aa24fb1da7f85a92d2bb757b23faf3999164d42dd87bb0ae425656feb,2025-03-06T16:15:42.033000 CVE-2023-3406,0,0,932f55ab16fb6316d15d1bcc321abb01d6031539906cd4d55424f8f89bfb1504,2024-11-21T08:17:12.073000 CVE-2023-34060,0,0,3e5a9882e83d81f853f8b71eeb1694bc2ff8ad4f0c10273aaf0873d1d85d02cf,2024-11-21T08:06:29.930000 -CVE-2023-34061,0,0,06d7c75de09eb9adcce12a4d4977539a997e0f8c87108057d925c9e02894d369,2024-11-21T08:06:30.063000 +CVE-2023-34061,0,1,fae90f40612ba36f64c62a028b26ae62c364123dd374076d4cceff44a5ab24a5,2025-06-03T14:15:29.037000 CVE-2023-34062,0,0,05f56d4f09796a15a9b50cdf03fa36e5b2e2ba492435d47d7314218a9c86f456,2024-11-21T08:06:30.190000 CVE-2023-34063,0,0,f8d0a1886ff215131e796275b71750a6de78fab291b1492ecf6a4b99bb21ab79,2024-11-21T08:06:30.323000 CVE-2023-34064,0,0,d997af2f9d974ef23db891dbce6d95f88d3007b2af447ffe30cf303f8dd8db58,2024-11-21T08:06:30.453000 @@ -228094,8 +228094,8 @@ CVE-2023-34323,0,0,c9666c7e08ad11d579022037c2965696792a47f3cb9a41b99360a12b786e1 CVE-2023-34324,0,0,55615d71b4e037b274e3e998b94ff2ac8cf6c518c3266aa12ecee423bedfa884,2025-02-13T17:16:35.600000 CVE-2023-34325,0,0,8d171e72e3391d4512ff40f9509202b8293500262e4ebd744e2064f395a23963,2024-11-21T08:07:01.010000 CVE-2023-34326,0,0,842f5231247c84f04288ea17ff2993ac4355ff248452e84b35faead2a34c5838,2024-11-21T08:07:01.133000 -CVE-2023-34327,0,0,764222e660f190c9cda57a1cdf6b6b8c4fd8e3ef8bd92fb5f2e0d6ba2d00ab90,2024-11-21T08:07:01.247000 -CVE-2023-34328,0,0,d4ef6207d1aec95656d58f52dfffd4fbe85fc9d5099914b1475e036d16c4c034,2024-11-21T08:07:01.367000 +CVE-2023-34327,0,1,867acc28b37a7d2940eb46d0d91081785db55d91a3e7cfc1a30dbf02c1f27180,2025-06-03T15:15:33.647000 +CVE-2023-34328,0,1,320018e5ccdc624a789ebe8c7f04ef0214e1ad8799611e659628fbf87ab3ab22,2025-06-03T15:15:34.270000 CVE-2023-34329,0,0,2b0d5d5b72b8299a831265df8b976faec9602482bf80be9e9a65a8abfb868a40,2025-02-13T17:16:35.730000 CVE-2023-3433,0,0,6729980df23b8feb4ff4016cbf8858fc8265372f173a40d03fa4781e8f15ab69,2024-11-21T08:17:15.390000 CVE-2023-34330,0,0,c2b3cc471d3396c8ce6c882bcdff263e8e2a001497216e51a1031deff6b58627,2025-02-13T17:16:35.883000 @@ -230444,8 +230444,8 @@ CVE-2023-37600,0,0,a0e0adb7fb43570994dd8c5afaa8b2f588c15c0351b4651d28b606094b68d CVE-2023-37601,0,0,e2984cb5d8500ff15239303b08f5c88c126cfaa6be8221e3aadb81bedc365219,2024-11-21T08:12:00.980000 CVE-2023-37602,0,0,a2c70e63d1efa35dc3e4902cc0501af26c70792159da95830eb485d7a041518e,2024-11-21T08:12:01.153000 CVE-2023-37605,0,0,cb8d68973c5c7623435b91a91e8ce1dc44a51baa61c4b6d0f6c7d8623df6ca67,2024-11-21T08:12:01.330000 -CVE-2023-37607,0,0,a278728ed3c3e62f7c1222d930c8b5f6a28cc916e10424971d8ec00637a05f9f,2024-11-21T08:12:01.500000 -CVE-2023-37608,0,0,6cfb5cee9351a5986e403ccd425709d3855182e7a166887d575f5370e711cff0,2024-11-21T08:12:01.683000 +CVE-2023-37607,0,1,8c431dbced66aa59bafaec5bef4153966ec899f8c6159b11b7db2b44415bd0b5,2025-06-03T15:15:36.683000 +CVE-2023-37608,0,1,7dfa8990b729c2e512213f17f6527d0122762bd2013181615190a074f17937f3,2025-06-03T15:15:37.517000 CVE-2023-3761,0,0,749dd409dd918dffac2197272e966878901fc32e7b1a4132f4cad3199d5ceba7,2024-11-21T08:18:00.297000 CVE-2023-37611,0,0,3cc1387ea46cb613ee45f5c6eda166368b0f0bb6c3da2b2c323086fffff284c8,2024-11-21T08:12:01.843000 CVE-2023-37613,0,0,b52885aae1e0196b950aeeb0a00379745ec592c1e078a8e91f8dacb85d962d98,2024-11-21T08:12:02.037000 @@ -230463,7 +230463,7 @@ CVE-2023-37635,0,0,66cd4536eba447f539b0023909007684be4a79585cdf704dce66486363806 CVE-2023-37636,0,0,eb9b531f42b7b65bacb1b4444b2ecacb57af1996fa58173fc9842ca0b720e90e,2024-11-21T08:12:03.677000 CVE-2023-37637,0,0,82f431cfc6fb1853ab152c645e02583d4d0df76f17950f97954898789cda20eb,2023-11-07T04:17:01.293000 CVE-2023-3764,0,0,eebbc87b1c2284a0011c87b0dbd3e5b82049c3525425941023ca464af6e28da5,2024-11-21T08:18:00.713000 -CVE-2023-37644,0,0,4046c265aff15de2c0df8fb5e96456c9fc9acc455c4fec99916204e2008b00fe,2024-11-21T08:12:03.850000 +CVE-2023-37644,0,1,e763f5a31b6b08c5a6b042c8d8b264750a90dbe13e4c5ee3a03b78e7420de466,2025-06-03T15:15:38.063000 CVE-2023-37645,0,0,51be6f94a41a8f747898142800c68d1eb554d1ea822aa30afb10098c499b2f29,2024-11-21T08:12:04.027000 CVE-2023-37646,0,0,77f71339407b0412e39ee9896465a47478424f4fdd91d5669d2c206a738aa400,2024-11-21T08:12:04.200000 CVE-2023-37647,0,0,0cd13e3976732f9ee529dfa6a0c21e943e1d9e29d2edb06badf5b67b59193ebe,2024-11-21T08:12:04.387000 @@ -231340,13 +231340,13 @@ CVE-2023-38603,0,0,3b1aeb4279e9a72566723129b4591a8f4eb4626ffa5df730d18436c112bf2 CVE-2023-38604,0,0,edd6ccf1f6e5c9d1039ee28e906bff0ecfd51c4f2cf711bacef59881f1c1bc7a,2024-11-21T08:13:55.367000 CVE-2023-38605,0,0,b0abc5c82d50cfe3f60678db440f32ed275f350d9f541ab6dc0f93798cb931ed,2024-11-21T08:13:55.520000 CVE-2023-38606,0,0,be2ce8b8e37e0c214c5363009492de6ad601684e5f0181d8984506ce255e7876,2025-01-23T16:36:53.287000 -CVE-2023-38607,0,0,ed91d934a8c96da5801c1130f6f03d6ae7447713b74a628f2d24774628ad63d0,2024-11-21T08:13:55.797000 +CVE-2023-38607,0,1,2ce363c1d9b97cb3747e23823fba83b3f8ee2adfbf120a92c7b78eb51b356e5c,2025-06-03T15:15:38.327000 CVE-2023-38608,0,0,b71d5a2655ed04c8dddf465e235f7b0639be5f023e883b9a5ba1758064cc8e3b,2024-11-21T08:13:55.913000 CVE-2023-38609,0,0,6dc79f9d60fa5646ad0e783262026af7df43cd2e155e3927d10dda9c9455089f,2024-11-21T08:13:56.030000 CVE-2023-3861,0,0,256bdf9cd413cbfa70ed4e6a0b9211792976947f22c0d0ba6729c1ba3a66e3fc,2024-11-21T08:18:14.550000 CVE-2023-38610,0,0,5b1c562f1f49f921b46133fee8d471ee29cf078a6629ab5095e1922e4043b83d,2024-11-21T08:13:56.150000 CVE-2023-38611,0,0,0c21e67a52c96f626024280838ea08bd20ff315d2265b8b2d16822974fdb8823,2024-11-21T08:13:56.267000 -CVE-2023-38612,0,0,48cd578239b90ed5f53555ebc56b60ba0fce0c95cc22952e8f469727beb8f38b,2024-11-21T08:13:56.393000 +CVE-2023-38612,0,1,dc7d175e74c392b2fa34b19b326d494d7537b9d88be3ebe3dbd10253f9d4194b,2025-06-03T15:15:38.607000 CVE-2023-38614,0,0,62fbad3f38dd4f4036a676d9c766532164d35e9d276fb55f22cda5a23b82d493,2025-04-25T16:55:31.270000 CVE-2023-38615,0,0,a8f4597f6654da3b13036e9ec530267f0b88dd33d2d4abd938114b7489b77465,2025-05-05T16:15:43.130000 CVE-2023-38616,0,0,ea82608142832dcfd883bf3693a7c0861aa42b549f974e01baec1cf033c971f4,2024-11-21T08:13:56.663000 @@ -231496,7 +231496,7 @@ CVE-2023-3882,0,0,444c96bf639eaba5c5e11c4b1be3fd64667922722cd1e3c7603c25d682c81b CVE-2023-38823,0,0,aa44355d2943f6c9f7a40cdea13d12711a8057a15c5a620712fe9a0a751b47f2,2024-11-21T08:14:13.427000 CVE-2023-38825,0,0,b5dc7921fec8f930362d7e11d3f5725ad347a7557f1899b34604e07196bf8968,2025-03-05T18:49:13.880000 CVE-2023-38826,0,0,d70943162fe82eb28a7a7256c113a957db59bad2f162c4e502e1cf20871c0cca,2024-11-21T08:14:14.593000 -CVE-2023-38827,0,0,15d6e2facfb6109aa5168ffa504a04d99bba843862c4ade896b7f160a2676a7a,2024-11-21T08:14:14.737000 +CVE-2023-38827,0,1,5767919e44df42a6fdfd6672329daed951da4e76b81458a2e8fcf17855625181,2025-06-03T15:15:39.060000 CVE-2023-38829,0,0,f18a04dc8235c21595d960d1c76e0c18e8aba026cbaca717e8d078afcc182e76,2024-11-21T08:14:14.883000 CVE-2023-3883,0,0,634cd7fd7d0f5ced6fd868d96b8d577b8d6108800b9ae362b62f8ad754505ea9,2024-11-21T08:18:17.027000 CVE-2023-38830,0,0,3aba0baa36880c42a16b45890d05f8d90c8dca065e6857a99618f2043633059a,2024-11-21T08:14:15.030000 @@ -231899,7 +231899,7 @@ CVE-2023-39331,0,0,52c8cba1c28278a9bc76fabd21779ea663683e88e69b7e7ac58011698f052 CVE-2023-39332,0,0,8f53d3ac5f238bb32dc4986b77b9af5b7f974e6425beeb434fc3f42e5583bf43,2024-11-21T08:15:10.603000 CVE-2023-39333,0,0,e051bf5203aec703e29735d56bc743ce0d9e11af1985a057d091d7922386bb36,2024-11-21T08:15:10.733000 CVE-2023-39335,0,0,d8f1e645023b880b39ed7ca8e5cb62cde10eb37340038953d3c7d299de038a6e,2024-11-21T08:15:10.943000 -CVE-2023-39336,0,0,6dda6ece3fc4616e0ad5a57be50d577fd350516d78b8246c3ca861a18bcc6dc0,2024-11-21T08:15:11.080000 +CVE-2023-39336,0,1,c70c6d9251ae252a768e246768411960cc8615f71b29af396d2f5068cd918f70,2025-06-03T15:15:39.337000 CVE-2023-39337,0,0,618ca86c4677f98253e6355ba68d233a37618c4fec301f0b9e3ad234fa3c8488,2024-11-21T08:15:11.210000 CVE-2023-3934,0,0,93607ebe5e28d01c6af66883d27d5c254c919d8cfda8bf80592289ba11a55d64,2024-01-31T06:15:45.870000 CVE-2023-39340,0,0,56b2e65d896c83cd69a1cdf4a5083448c855c118d981cd14a9e16bf9a62754cb,2024-11-21T08:15:11.343000 @@ -232786,11 +232786,11 @@ CVE-2023-4043,0,0,9a8bc853664d147b14cbbd8801f8710e9dec912653518803c35a75f0658c9c CVE-2023-40430,0,0,be6233b911e3e5d30ce87808f0eb453302526809d353e64e991ca1bc35da0ecd,2024-11-21T08:19:26.687000 CVE-2023-40431,0,0,2a14d432f6672d624abf752ad888ee00cba735d5fd81d3c99dcc762cf78af0dd,2025-05-05T16:15:48.657000 CVE-2023-40432,0,0,939fc5a4365649b6636dd4db5277d98f2786400df035f2ffda17af46cab061a5,2025-05-05T16:15:48.850000 -CVE-2023-40433,0,0,0791995384e04e1c4d71c1921e981c70cbde1700fb6f77daa6406db627837ab0,2024-11-21T08:19:27.070000 +CVE-2023-40433,0,1,167e415cfee6994e338ddf265561e7486886ca87dc1bbc12328e0057e576e684,2025-06-03T15:15:39.577000 CVE-2023-40434,0,0,fa668870b59891089aafaccb6ecef6bdd947766ed1a867b7f04b298f3e372a88,2024-11-21T08:19:27.190000 CVE-2023-40435,0,0,bb9150df3836336087fc14ee3cfd4cd315cb2b427f6fcd22ad9a93250ebe3994,2024-11-21T08:19:27.333000 CVE-2023-40436,0,0,90410f3428ec3c0f70df09350b2ef419de266b0778de17f3ee3dbc90314c2358,2024-11-21T08:19:27.457000 -CVE-2023-40437,0,0,995bef65603a1ac5ced344d4457681ca5b8e05ab4283f22c0b0cd9b71dd690b6,2024-11-21T08:19:27.590000 +CVE-2023-40437,0,1,0ab5a085d49713ff2c8f15349e4eecdca2d395af9ec58dd192c52aee5718adaa,2025-06-03T15:15:39.763000 CVE-2023-40438,0,0,f9d79815b4cb69aa3a1a379362b8b58c8785aec4fe6cf680f14a7edb9d5c3a56,2024-11-21T08:19:27.710000 CVE-2023-40439,0,0,e98845f24da53d3fb0ec86a5fdc2d3faabc66289c138aee82fbcaa72b90778f4,2024-11-21T08:19:27.830000 CVE-2023-40440,0,0,1e63deb61460d8bcb507365efe2a1c55d8617d89790a99af3cf45de490d0468b,2024-11-21T08:19:27.977000 @@ -232881,7 +232881,7 @@ CVE-2023-40519,0,0,1f6f4cb7746d7f88673be509549444b12d63376e9ac886e2f201d1d19ab7f CVE-2023-4052,0,0,9047ccf20cd8c84c2a66fbd18b0f60a137d33fb0e49b02affd1f0048e38cd65e,2024-11-21T08:34:18.353000 CVE-2023-40520,0,0,742ec0da6d8bf66dc564c12e2591856aad00f0e16bb052816d48e8215848f203,2024-11-21T08:19:39.223000 CVE-2023-40528,0,0,f9fbdff6844facbe6173a6e47914c3d91f874f543b95f1922c246943b5d3f0c6,2024-11-21T08:19:39.357000 -CVE-2023-40529,0,0,14fdb6d6b5c6cc74bde05799b4bd1a94219cf68284c85c99249fed86af9af175,2024-11-21T08:19:39.517000 +CVE-2023-40529,0,1,9b76d7a1138c2fbfa4c3a39e002d783a539eb51e228d32d64edbd43acdffebb1,2025-06-03T15:15:40 CVE-2023-4053,0,0,b8f9fab5db8defaa3507209042f316e9e9b9297eb03ddaca0327fdf1529d88a0,2024-11-21T08:34:18.487000 CVE-2023-40530,0,0,388ccfaaf775101bd91ce91880118cd6c940d61b08356f28dcd0a17ad66c8021,2024-11-21T08:19:39.630000 CVE-2023-40531,0,0,970ad806a41a8bf120e653f2af0f2a226157d0477075fb5a516e5c95fc3607d3,2024-11-21T08:19:39.757000 @@ -233665,7 +233665,7 @@ CVE-2023-4158,0,0,12f1a79b4e7a5eaf05eacfbcfe8f03a5d7b48d22d1f42f6ba8ec39d1944754 CVE-2023-41580,0,0,9a725b15d09f37d68ea7c0dae6fb7da95dfcffec64cfc9e8c59b17de4d5b9772,2024-11-21T08:21:19.257000 CVE-2023-41588,0,0,4e8c94bf5c41f233e5511b783e56b9b07030c74b63ddaca19aa137520b078860,2024-11-21T08:21:19.417000 CVE-2023-4159,0,0,f5b9413c57f0198a30bbae0938048f2d94e984136b741075d0166b19fd943b3c,2024-11-21T08:34:30.600000 -CVE-2023-41591,0,0,5c308c54a7cdba1a50ca0561662a3fade63297d1c726882074c90c7f4ee3da86,2025-05-30T16:31:03.107000 +CVE-2023-41591,0,1,9d512315c1dd88bd382e01b4d3cc06a0ef748d82eb2e577ce786c4b3963bbbfd,2025-06-03T15:36:09.540000 CVE-2023-41592,0,0,5ebc236abb4b931009d1e5044dddcdc2f5eeec0af7772d41e3bd997b2271a9bd,2024-11-21T08:21:19.573000 CVE-2023-41593,0,0,d872b4c0768b38994565ff5d3254acebea5da2a49cd231ef8f55ef8b9cb715a5,2024-11-21T08:21:19.730000 CVE-2023-41594,0,0,72b228dd417b4ed5906ca5517b4b817ad29595ce20f1ecd2f078073cc9af0001,2024-11-21T08:21:19.890000 @@ -234357,7 +234357,7 @@ CVE-2023-42476,0,0,0cef1a2428f97a12e74e9c0a54737e40dc108204c538b49750474fcf64601 CVE-2023-42477,0,0,5845170909e8b3fdf46b2ffd42908b5d90e35c2a00e797eb7765f38d8e820617,2024-11-21T08:22:38.047000 CVE-2023-42478,0,0,c8d5e50d04ad56a5395528c3b689a6d6c4d6a24b988e5152818533e58554f6b8,2024-11-21T08:22:38.170000 CVE-2023-42479,0,0,dabccc87b63b203a396b878791c49239d0fb3dd3051d3a09abe0debb52fe9806,2024-11-21T08:22:38.303000 -CVE-2023-4248,0,0,2af0dd50d58cffd096726aead52766cc987590ebc83258737bd2e420cc34872b,2024-11-21T08:34:42.623000 +CVE-2023-4248,0,1,9b23adfa700656b59cb02d0a5483a683afbe6fcb6b1e1881e046ce540fea98fe,2025-06-03T14:15:32.177000 CVE-2023-42480,0,0,6abbe61995d3c41e40a46861acc8785c38fb8def6f518ccdf4945e274bab40fe,2024-11-21T08:22:38.427000 CVE-2023-42481,0,0,cc29bb63be246e1b291d7abb83503d8d0b9ed0159a86595fd228b082aac2508d,2024-11-21T08:22:38.557000 CVE-2023-42482,0,0,e6795b4e44bb80092dc77425ae0ed54bd7043b8d7cc49ce58d3cbe2fd7cb05fc,2024-11-21T08:22:38.683000 @@ -234664,11 +234664,11 @@ CVE-2023-42822,0,0,2f12b9667c0089695f3dbc4631aa6e777e0815403a5e6f16792c902d77d9a CVE-2023-42823,0,0,70dd7f6b5c8bc5a829a8a72c8db49652d99b172be25cab71e1ba63a6c349e42a,2024-12-06T14:10:33.737000 CVE-2023-42824,0,0,1d56b2a90a1e8e670b6a5d7cd3fc30dea4a91558fd83545a928009c662371663,2025-02-10T17:55:03.120000 CVE-2023-42826,0,0,18c3f092c50325a7434f872ea53a0b6e051bdd304850f7e7d1728b663c8625b1,2024-11-21T08:23:17.873000 -CVE-2023-42828,0,0,7dc273404c9d73cdc9817148a82a06ac9c6ab358e3afe28eb8eecd4dd3650dc5,2024-11-21T08:23:17.990000 +CVE-2023-42828,0,1,1917ac70f76136038cf1b9e7463f762c4055e1714d2667257140cb09ebf5a5e6,2025-06-03T15:15:40.397000 CVE-2023-42829,0,0,ed6ced541e4937b8fd45903738fb6c679a366c4155f22cf3dcc5650154983d96,2024-11-21T08:23:18.103000 CVE-2023-4283,0,0,7066506cc1cd5ebe88013c9024fabe9a80079a1bccd3d06bc3966cb1988dca3c,2024-11-21T08:34:47.247000 CVE-2023-42830,0,0,f37d233e13e41a6606dcfa7f78d37fb73273bfc1148c980442c030f9d7f79641,2024-11-21T08:23:18.227000 -CVE-2023-42831,0,0,04f406feadbacd61c0778bb937e50aa05b6c24304cfa69b24a2581fe43f41f87,2024-11-21T08:23:18.350000 +CVE-2023-42831,0,1,7b7c0daaa4f44bde638608a77499418d33f4d217ef0f0d5d3e0c7288b3529133,2025-06-03T15:15:40.560000 CVE-2023-42832,0,0,20161022248ee70a0d412b2295321290a82b38c10081e02331219a80e14b38b6,2024-11-21T08:23:18.470000 CVE-2023-42833,0,0,237c2cbac6cc9cc6b5198fc158f853ecb9923af0c1fcf6e8eae3c5c14e89ebfb,2024-11-21T08:23:19.410000 CVE-2023-42834,0,0,14e2fba0f6e9a7407b7066d6e47f2e3f9c9cd1e34de0be9cbc98c4daf103a291,2024-12-06T02:57:06.637000 @@ -234700,12 +234700,12 @@ CVE-2023-42860,0,0,deb5203476f8e10dae004b1a553ababb9a26bdca00f61493796b1a710a2a4 CVE-2023-42861,0,0,51ef0be30f968445e5bb0e3fe6e386464916f684c592ec33960870427fb703b9,2024-11-21T08:23:23.360000 CVE-2023-42862,0,0,da0a0390e3a6b251cbbd44904ae0343ada1c1e47a22f5cdb9211a360309b1627,2024-11-21T08:23:23.490000 CVE-2023-42865,0,0,6b1adebbfe54199fbd88c1f48a0707dd7d763317de7e8283554c7140f7d3ec4c,2024-11-21T08:23:23.610000 -CVE-2023-42866,0,0,4825ed625b05a8c1608b93e75feb0484113e67d00eb04b720f74b3d42b768e19,2024-11-21T08:23:23.730000 +CVE-2023-42866,0,1,bf7e6f0ca842a75a046ea505050beda13bcacd636d6e9ba969353206ffff38eb,2025-06-03T15:15:40.753000 CVE-2023-42867,0,0,a59a0de35750defb2550242cea9df9f6f508011ed263a1760cce6815d999cb89,2025-01-06T14:20:04.917000 CVE-2023-42869,0,0,4b525b2d4d78240e429f6120cff3fbea3a9a62626e791bc07518dbd60f150db6,2024-11-21T08:23:23.850000 CVE-2023-42870,0,0,b052e765ed6b314dbe419b522569170970500fb212cc8d9009eece0ef048ce07,2024-11-21T08:23:23.957000 CVE-2023-42871,0,0,963706ec8bdab800d3414b1302df9d51d4aa8c4afd4e0c4221c23edb35923c52,2025-05-15T20:15:26.633000 -CVE-2023-42872,0,0,f3648f3deeaad97df776a3d1c44a939ca77b2546d7b8c107ac43dbb6270e605d,2024-11-21T08:23:24.257000 +CVE-2023-42872,0,1,7c99422f13fb294f7903a67316b13642578a08acc8fac35dd0fe035a48e81352,2025-06-03T15:15:41.320000 CVE-2023-42873,0,0,b3dfa63eb459c092ac2aa5aedcda220b27286ce47f315d5d35a9e624e19fb581,2025-03-26T21:15:19.500000 CVE-2023-42874,0,0,8d97b98bb633cc5493c7ddadbc5a3fcb0aafa4a63566c7b95c55d43990d4043d,2024-11-21T08:23:24.537000 CVE-2023-42875,0,0,27055301fd938208881d98240bb9101599be819875b923f96ac8491d73dcdb70,2025-04-25T16:56:23.237000 @@ -234766,7 +234766,7 @@ CVE-2023-4293,0,0,9fec83a175e041c854dcb2a5fb9a0694cdd7b06bced71f7469a7fdafb589db CVE-2023-42930,0,0,25d7bd3e87a738a5f8af648624bebea7e0c1dc473f29a8a931720dc503713871,2025-03-18T14:15:37.640000 CVE-2023-42931,0,0,1f1699814f13af297276399444ed2998af062ed9a892f7f5fa3b5215b4d8431f,2024-11-21T08:23:32.337000 CVE-2023-42932,0,0,0fa8aee74d53ff347eeb67002789734567a456a1e02e04a09f94fc7aac778003,2024-11-21T08:23:32.547000 -CVE-2023-42933,0,0,19e86fdfeca504e0149a8d635152cff97edbafa25dc596c6f832b0f0e3718e0c,2024-11-21T08:23:32.693000 +CVE-2023-42933,0,1,5713f0658791b4cd4ce1ab97802e470f6344d72dd03ac51ca904c59883f5d98b,2025-06-03T15:15:41.490000 CVE-2023-42934,0,0,26bdda20c2081dc4127985c6fa43773d2aa5c9fe6c47e51d9295f6a1c17e69a7,2024-11-21T08:23:32.807000 CVE-2023-42935,0,0,4e62087546c6b1071bb765248bf44433404a9c0853a77f0e1c8ab26acf6fb187,2024-11-21T08:23:32.953000 CVE-2023-42936,0,0,d1102dd9c65e329c7ac0196a6b1865b66051af90fa701dee5f7d4dc54af5b86b,2025-03-13T20:15:15.700000 @@ -235027,7 +235027,7 @@ CVE-2023-4341,0,0,bdaba6a2c58a05c99deef16e4182d8e9a7ae661282ec0f69783ecb175a139f CVE-2023-4342,0,0,11a0e7d3848497ebd53033c8b54ef39a8939ca022eaca7a46ef1b4a29355162b,2024-11-21T08:34:53.460000 CVE-2023-4343,0,0,73fcdf657bda05733de21e0f1f92ed8390a01d2eb212f093085b4c50d06e2f7c,2024-11-21T08:34:53.567000 CVE-2023-4344,0,0,28db0278d4dbecb2ab9df790c0d628b9099f1a1bb203c9f34f4eee5405586c32,2024-11-21T08:34:53.680000 -CVE-2023-43449,0,0,aa9c0fe16d534766fbc058478e8f2abc97008d7e5e4a96a62be89d49ddb97b47,2024-11-21T08:24:05.680000 +CVE-2023-43449,0,1,05f98b0910b23f2adc686e766b35961e9de76908774cb7fb0dfde802bf00f43f,2025-06-03T14:15:29.620000 CVE-2023-4345,0,0,afb6dc3da5e7c560fc0e9f21780effaf19c558d0ea05d5b4c4c81749c9f26878,2024-11-21T08:34:53.863000 CVE-2023-43453,0,0,aa3212f1fae17a9c0382ecfd9618e6f8d1acec2b206544f3b0c7496a1a000cd2,2024-11-21T08:24:05.823000 CVE-2023-43454,0,0,5d7217250e06a3040e1a3bb982811d58eeb62aaf84a0cc858e6c0a3110943bc2,2024-11-21T08:24:05.980000 @@ -235354,8 +235354,8 @@ CVE-2023-43835,0,0,b1f4cdd39144525746a45831d7db0a6512af4f1774d978e74991fedf4e60e CVE-2023-43836,0,0,3b0d9276a93d278890f7faf0327c7a68c2af594b35e525f7d34073354d60e707,2024-11-21T08:24:51.997000 CVE-2023-43838,0,0,a0fe14adfc37c12282dc6d33e5dcb774fbcfe38af0b2c3859ac6eea7bf1338e3,2024-11-21T08:24:52.140000 CVE-2023-4384,0,0,a9c159a666874867101d105e063082f2ecf0da73c6d5b3797a2054473bea4326,2024-11-21T08:34:58.823000 -CVE-2023-43842,0,0,45a79d8daa24971923d0328f6cb0605d43dbc531058b5b09bdaaa1f425b41e02,2024-11-21T08:24:52.290000 -CVE-2023-43843,0,0,46372ee0d319e462187c951e8016c6e4cb4b1bd31e409d6987b63535e7d7438a,2024-11-21T08:24:52.487000 +CVE-2023-43842,0,1,fb103666d90bf375b58624dcee412399ff412d6103cc30122dd933114179b992,2025-06-03T15:23:29.073000 +CVE-2023-43843,0,1,863e2d75d842070880233e552cee74224ac5ec981556bc28f1f62832f2502f41,2025-06-03T15:23:39.380000 CVE-2023-43844,0,0,725df6920e84b917ae7ce5796a9668926f71aa16df0ee11115b2e20883db1549,2025-05-30T16:25:06.967000 CVE-2023-43845,0,0,2fa6ef9620a0711563937b761df45e6f913495eee21ffdec99cd1cf81f0d5f4a,2025-05-30T16:25:14.470000 CVE-2023-43846,0,0,7c459d43661a5c2c851986b687e334375dc3a6c03fe6f7b74d0f180f4c59c2da,2025-05-30T16:25:20.410000 @@ -236404,7 +236404,7 @@ CVE-2023-45554,0,0,3b0b16921f63b1269252720c6dc4d88c721707015d813ea50b04bb949e423 CVE-2023-45555,0,0,718a497417d8eb484622bf8d9402f96540d4022a2f9bb228126de3fa8bdec796,2024-11-21T08:26:57.643000 CVE-2023-45556,0,0,036e3f485ca723c298407660cb9b641339813d940bd6d0f367172dfd68f6770a,2024-11-21T08:26:57.797000 CVE-2023-45558,0,0,4d7f6de57ac102e2ee1f964702dbe50662939618d8ec1fa531feb7f9ab546414,2024-11-21T08:26:57.960000 -CVE-2023-45559,0,0,4ff56170e88765e2637974c6665dfa62d3a4bc3600cc68a899fe67240b13cfd6,2024-11-21T08:26:58.190000 +CVE-2023-45559,0,1,18ae001886324b4ca5da02b2841c46dd32a1776c17cfe890dd474363af09009b,2025-06-03T15:15:41.780000 CVE-2023-4556,0,0,caefaaddee68ca463260118ce760210f7343cfccc093d6993a9dce41bece3dcd,2024-11-21T08:35:24.853000 CVE-2023-45560,0,0,c2b7367c807c37fa00e457d81c2730ec09ed5efba8f0f2c8f075bad4f994fd66,2024-11-21T08:26:58.337000 CVE-2023-45561,0,0,3903da016d639f97685a22cc77a5917ca04e9b0dfd6c7ff06c7480a2e03f98be,2024-11-21T08:26:58.493000 @@ -236553,7 +236553,7 @@ CVE-2023-45718,0,0,754af3a08acba42f2cc19229946946168b603ef826afde0b714ef1ec50486 CVE-2023-4572,0,0,be8392d0455d62db8c0a15d78ccb49361a26744883b49c8f128de40a1bbdb6e5,2024-11-21T08:35:27.320000 CVE-2023-45720,0,0,15729e2d90d21fef225dc04d60d757b3285a8b643a826dfca9c1dea910dea463,2025-04-29T13:52:28.490000 CVE-2023-45721,0,0,cea85b6d837b6fba3e2c78404333a05ec3945468bef96c2c12d049daced62667,2025-05-02T13:53:40.163000 -CVE-2023-45722,0,0,dd55f822b6dd59b54b4470940c4d94618ab4b0b0e9b50e18c2a4b985f0f4f4ab,2024-11-21T08:27:15.667000 +CVE-2023-45722,0,1,9b999bcf6e7a42c9dea4f9451aba052a6484fea8093a322c274fb7ed993d7b9f,2025-06-03T15:15:41.983000 CVE-2023-45723,0,0,79b1a5a3943b613f022799dd777cd849441476730640fec148b6a4bf15f81e2b,2024-11-21T08:27:15.800000 CVE-2023-45724,0,0,9e806cc0fc5d3cf7c5034db719efcff91840bb366b3937b0b5805ed02057bedc,2024-11-21T08:27:15.927000 CVE-2023-45725,0,0,4153b4d0c93c7af18977077a76a7f4f679b27ab179fc8cde17eac28e3f333df7,2024-11-21T08:27:16.050000 @@ -237037,7 +237037,7 @@ CVE-2023-46303,0,0,55ee7627fd442d2c572e24ebcd5eace257e241d3acf1f298d9c1ca5720615 CVE-2023-46304,0,0,f2372dc5470965e8b8d434baa041e58a0b63aa9b2d99dbb0474b89b2ad7e222b,2025-04-22T17:53:58.067000 CVE-2023-46306,0,0,1946a9bf182a07cba889b2e537e7d7e313fbf7cad532e1102bd4f27c441c4602,2024-11-21T08:28:16.250000 CVE-2023-46307,0,0,18b21f71b226f4699b2a4e129c329bc38fe300550642da8fc3acf9cf969ac9b6,2025-05-28T16:15:31.017000 -CVE-2023-46308,0,0,0c06a52efad3554b70fdc84de1b2b99159a549294651d3cda5934c77c762b50b,2024-11-21T08:28:16.600000 +CVE-2023-46308,0,1,85d6c27547c27371f7aa8bb6942c3307948449279f466e739107774ad62736bc,2025-06-03T15:15:42.150000 CVE-2023-46309,0,0,131bc76396854c14437c2f3ba4e84f7c28e34513421469710f163e4dc0c648a4,2025-05-29T20:19:10.047000 CVE-2023-4631,0,0,d8a7a67fa3928c56ed5ec097ac8c90dd8e319e03958cbb27b073a22ff897c681,2025-04-23T17:16:45.497000 CVE-2023-46310,0,0,60f88990678416a7f410769587125df232cafde8df7a171155bbc19649773ddf,2025-05-29T20:21:22.037000 @@ -237152,7 +237152,7 @@ CVE-2023-46468,0,0,5b26955a3193c65b37c2ef9f9ef1fcaa89d93687b2a1cdd82f284f290e499 CVE-2023-4647,0,0,22a8533f7f191199009e85b567550a48673487fe3a1d01d4c2b445a643800604,2025-05-05T14:12:17.193000 CVE-2023-46470,0,0,bc11e355e9c44593401ba9310cfe1ca146d12cb71553922456bfc5f1fd0e2c4e,2024-11-21T08:28:33.527000 CVE-2023-46471,0,0,64f27e5db9e3dc11dd6daa4f52e14d55665b0381020ed1c718166e021599e6b6,2024-11-21T08:28:33.670000 -CVE-2023-46474,0,0,126d1d027bdc1eb12f6b118a041446f597fcf5d61c574e7c621f42e802cd9607,2024-11-21T08:28:33.820000 +CVE-2023-46474,0,1,42f8e24ad47e96f102a785fd1dffe4d442c1799b9f437138569d16c61d20de87,2025-06-03T15:15:42.350000 CVE-2023-46475,0,0,3750704742c926668653b403b3427e7ab0b9ebb5d3f09b11dc63210a79ce85b0,2024-11-21T08:28:33.980000 CVE-2023-46478,0,0,9cd62f743f5e56e366cd21405c36fcbfd89a66ae0fc1710aac938780d922d5ec,2024-11-21T08:28:34.133000 CVE-2023-4648,0,0,b1ec9af7b3bc1114385a2a01b08166bf324b98829edcb1c0a7241f6e22e3d696,2024-11-21T08:35:36.657000 @@ -237392,7 +237392,7 @@ CVE-2023-46745,0,0,72bfe8dee9904993308c31f30bd1d6ac69903497bda35b8c59700b0f3e449 CVE-2023-46746,0,0,8d9a465bcf637aaa981540fd97a6cea502730f35264a8fc185ce78699ac4ecc1,2024-11-21T08:29:12.980000 CVE-2023-46747,0,0,4a79781a67d5b15e3aa9cd9424dc267a69983b1af847beb13c952289be4de40e,2025-04-02T20:32:09.563000 CVE-2023-46748,0,0,a2883aa8b0a754434719df500d544794c1ba14f4eea71e433b2061a478a93ddc,2025-01-27T21:31:47.437000 -CVE-2023-46749,0,0,2f19e4464f8f3f0ce00e69ecab410ba07b6b6caed2514a926b7dd21c13238728,2024-11-21T08:29:13.427000 +CVE-2023-46749,0,1,bfc101d7b9215af4a8ba701ac5d32be8a4c491e2ab9061fd8604626c612c4d07,2025-06-03T14:15:29.913000 CVE-2023-4675,0,0,dced6548a59893b388f5ce9e332c65ba7c13334f5303c10edca1fdcf7123be5b,2024-11-21T08:35:39.720000 CVE-2023-46750,0,0,218481d6a8817488a05ab80037937f5b723194651f461e3372ea830503a99e90,2025-05-22T18:15:27.123000 CVE-2023-46751,0,0,c31affddd23b5f3ead7937b92b343604e36c57e71d905f0e8bdf15936e27685f,2024-11-21T08:29:13.667000 @@ -237476,7 +237476,7 @@ CVE-2023-46823,0,0,390e0f2ddef1798883ebea1153aed26564e373ee8a6a17430d89c5a65cea2 CVE-2023-46824,0,0,986b06bf57d50728dbf5f80c95830764c980384db658e4991e6c4a53a212b030,2024-11-21T08:29:23.420000 CVE-2023-4683,0,0,76ee54862a2b6294ce73a6e0f8dddb60dfaac815f4119e8c25a08426a72a9401,2024-11-21T08:35:40.860000 CVE-2023-46835,0,0,e8b24f3a833cecb5e26772221ee94c6e7de234b62344eeb1bf8a83632146bc3e,2024-11-21T08:29:23.593000 -CVE-2023-46836,0,0,18e05259cf490aa10e2aa65112d5b9fb05b134c55ea366fa6806f10b8f3c5320,2024-11-21T08:29:23.713000 +CVE-2023-46836,0,1,e0785f3778eb579729a1be636dffebd4a5f98f6ffcf042af2ec5bc63df61c452,2025-06-03T15:15:42.700000 CVE-2023-46837,0,0,1bb6613e2e07b449f908ca9113d195b087a4c2a6aa5d2fdfb0d8a9fa0ba02b59,2025-02-13T18:15:37.283000 CVE-2023-46838,0,0,f1babf526c3f5839d278fd86f9852b1cd10fd3733391c516fd9386abab96da86,2025-06-02T19:15:21.687000 CVE-2023-46839,0,0,110c4574be648ab625e9ba9b9f041f367f3cfe8e1328db16490d89d1854556ab,2024-11-21T20:15:36.450000 @@ -237532,7 +237532,7 @@ CVE-2023-46931,0,0,bb6408849ec9c295aab3c6fa0e9d6574d8e4bdd90f2d6c3cd94bf5f6edda3 CVE-2023-46932,0,0,524d40aa3f6af165130509fcf91989cd4ee3ca0fa0d4261bbc3f88c873972fbf,2025-05-27T16:15:29.693000 CVE-2023-46935,0,0,ced87f58548b5dd1534f4b8f389d35654de92aca68c360da95cf6a8fb3dc001f,2024-11-21T08:29:30.957000 CVE-2023-4694,0,0,fb84afd3e76e08f6c607ad177ff4544fd20a8b79b526e2eee3a8e8fb32acde21,2024-11-21T08:35:42.300000 -CVE-2023-46942,0,0,8976eba7dc458dcd8b6772d281b50abb4ec0eafd82c6fb764acb5da436e79319,2024-11-21T08:29:31.170000 +CVE-2023-46942,0,1,fc7ce7cc31cc5b84ecd012f01c1590783a709af040df7147893279a904594d84,2025-06-03T14:15:30.177000 CVE-2023-46943,0,0,13ee8a8d3ec9cdd20857e3e3868d14a3d314e57cb77a4facce1a53cebfe9089e,2024-11-21T08:29:31.330000 CVE-2023-46944,0,0,3c49de6a4932a09f18539f17dba141d0b2eb727223abdf23ea960a776d6cb8b3,2024-11-21T08:29:31.547000 CVE-2023-46947,0,0,3f8569ac31aba31e63d8105fdf0f12081e3940282fa7deec6a6d07d78e7fc39d,2024-11-21T08:29:31.690000 @@ -237896,7 +237896,7 @@ CVE-2023-47456,0,0,94455eb91f04e2efd938158be69472aade01c2367b32d68b500778120d29c CVE-2023-47458,0,0,f391e485d60b83d3d8d45247dc4baffbe1838a0c9624fc971b10488b40e013ed,2025-04-17T19:15:56.623000 CVE-2023-47459,0,0,737998f833253b375194771681f7df2bde95d2b92d9bdec5577e19f6ba6a2678,2024-11-21T08:30:18.770000 CVE-2023-4746,0,0,230357900d23be3acc63b84709c5d8c500ba3e7046dd45386ca00c77bd4c5402,2024-11-21T08:35:53.300000 -CVE-2023-47460,0,0,ef88ed42ae5ca206822b29cd45626707c8fbac73cfd89eea4dc0280bd91901e4,2024-11-21T08:30:18.923000 +CVE-2023-47460,0,1,947cfb0ae500daec46d71b927594299b6015adfa293385ed7e7e9f447fc75452,2025-06-03T14:15:30.510000 CVE-2023-47462,0,0,f1bf3848d047a4866fc56326aa518610d5414553ed4e273e404c014bc2a98b20,2024-11-21T08:30:19.070000 CVE-2023-47463,0,0,0541ee3717b8322b97dac7f750f2995e29ff4cd4a180c5edb6b5dda3791de031,2024-11-21T08:30:19.220000 CVE-2023-47464,0,0,7c9763775a297246e7eabbd1396f7e73a34b64da9e214d1e4ef5477011355e5e,2024-11-21T08:30:19.480000 @@ -238262,7 +238262,7 @@ CVE-2023-47877,0,0,28d0f86cb84c40f17691aae3c9e59f0461c4ae1ea9d2eb19edd88fae1e61d CVE-2023-47882,0,0,60e460e6e85e1b44f66394fcccc007c5f7bf2cef121786b19bbbd35c82eb90ea,2024-11-21T08:30:57.323000 CVE-2023-47883,0,0,66ec6ae02612b6bdccb41dc290a1ceedcfd1c92c39010a1edb651f0d3694ed8e,2024-11-21T08:30:57.477000 CVE-2023-47889,0,0,da14c7fc9f4a86398cd8e63a4e7f73d0ea3bd2cce9d8ec27b1ac9e1489687a83,2024-11-21T08:30:57.627000 -CVE-2023-47890,0,0,98b525aabad0edf9b56e2d6c280df3746eb5d7c196b7c60ebf947d011a5353d8,2024-11-21T08:30:57.770000 +CVE-2023-47890,0,1,513d1bf6ced078572b23c68b2105d21a006f245fd31c006cd4fc92bdb03c909a,2025-06-03T15:15:43.023000 CVE-2023-4792,0,0,3e481bdd6704e3fb023561ff864e10939dc8626670501ec8b2b325a05e4b9528,2024-11-21T08:35:58.810000 CVE-2023-4795,0,0,66ab528ab409ac4e78048a9197028b857df476458bfcdd3192e81fb4a555f2ad,2025-04-23T17:16:46.760000 CVE-2023-4796,0,0,174b4314aaa8c035bf11e89024369681d0e00581af9621aa4013b842ff1df80a,2024-11-21T08:35:59.060000 @@ -238272,10 +238272,10 @@ CVE-2023-4799,0,0,558c235aabfb2387b92520d51aaa44b39f07bec2490486672a9fc9dbb362c3 CVE-2023-47990,0,0,b7f0f5706cb2fe9396d4ff2d5410da8aa316eeeafaad37c03473b436762127e0,2024-11-21T08:30:57.933000 CVE-2023-47992,0,0,fe24f1aa11f2356cc1f6bef2ceb6b3575e2eed89c42621a4bea139c16971c4ac,2024-11-21T08:30:58.143000 CVE-2023-47993,0,0,4e284b73bd9fe17ae1056cad08fe2f2a91c1b5f5da23b264ad6ded5944b9cfde,2024-11-21T08:30:58.303000 -CVE-2023-47994,0,0,2407410d7ded4d367a026e01fddb621dfd45ee7da03ef596706b72aa354b0825,2024-11-21T08:30:58.440000 +CVE-2023-47994,0,1,92489c4a485cd96f12a1f70ccfbfd5c8899bb612161dc3404f8b25847a7916fa,2025-06-03T15:15:43.230000 CVE-2023-47995,0,0,41535b8005f55226bfe09c7387ca5fca2008636be7e90857db9ae84df1ea6ae9,2024-11-21T08:30:58.580000 CVE-2023-47996,0,0,18ee71e616bc3e90c37f89ce29ec7d75726d27056d8341b36770f980a8ba3a32,2025-05-14T20:15:19.250000 -CVE-2023-47997,0,0,12c5b586b678f710d3488c6ea0bce408a7fe54f1116b3c5b1079fafd971845e4,2024-11-21T08:30:58.883000 +CVE-2023-47997,0,1,b1a1b245d00ddfe6d34df7416a616ea2348b9bdc15418373779e7f2104a03f14,2025-06-03T15:15:43.447000 CVE-2023-4800,0,0,9219a8d689175c8d23a477f020fd49ec8ed19f426bdc6d7efdfde3cebd54d0c9,2025-03-06T16:15:44.567000 CVE-2023-48003,0,0,39e2d8087ac8da7a3c050c642a95f0b99731fa2299f4641ccbdf29b34156ea6a,2024-11-21T08:30:59.023000 CVE-2023-4801,0,0,1612b8ad8a100bd0095834f8cf820b43c1529313117b5922e35f752cf57742d4,2024-11-21T08:35:59.690000 @@ -238434,7 +238434,7 @@ CVE-2023-48258,0,0,e8ab0876a002fc12b026c91efb5b2e76d175892972a2125091223b5ed59d6 CVE-2023-48259,0,0,752ab52e6f90488c4a5d756a19838a3c84b9304074e35bc25825e363594633c9,2024-11-21T08:31:20.930000 CVE-2023-4826,0,0,d10e3a01416b8bfa17ed054c662aaa360e21f9e7572e0c618932621717140bd5,2024-11-21T08:36:03.157000 CVE-2023-48260,0,0,74549ab3f91f78063f4549f5689fbe4c6c12557c8f567d97cb1e936f0f723306,2024-11-21T08:31:21.143000 -CVE-2023-48261,0,0,163ba954ab4c7512111f74c673e15491056411ab417b7e801c12eae9d1a3ba9d,2024-11-21T08:31:21.357000 +CVE-2023-48261,0,1,f5b765210161481ac3b60b71a22c675cdff231841fb7092c856ccc7f99627438,2025-06-03T15:15:43.660000 CVE-2023-48262,0,0,594621d8477f9b7cb03509a417a27b259a3c489ae5b8415112066db7426179ef,2024-11-21T08:31:21.590000 CVE-2023-48263,0,0,5cd17b43c6572cf707058ff25b5882dc78817d65af663319afb531bd3ae3eed1,2024-11-21T08:31:21.803000 CVE-2023-48264,0,0,155ac9cd802d1046ea7aa31346b2075c14152026a738330e825a741016831192,2024-11-21T08:31:22.033000 @@ -239313,15 +239313,15 @@ CVE-2023-49251,0,0,01ca2beaf55c18d1be789df49fc505c84be3a39a54948a0d4102115385e1a CVE-2023-49252,0,0,31d6e12391faa1705447ae9df7eec645cf78cd359e8def8e22dbaae5739e95f1,2024-11-21T08:33:07.477000 CVE-2023-49253,0,0,6bcc1caa4fe1d5c3fb930e1e6d020cd5af57d2e223b7cbb7cd40bd8b4d0fed53,2024-11-21T08:33:07.623000 CVE-2023-49254,0,0,a445b0f6ae60f2a245881debdbe67f95e0164deb25a5fc48870fb7ac271514fd,2024-11-21T08:33:07.753000 -CVE-2023-49255,0,0,be1a86a7ebe6cb806c0e930c172298693eeb28b862f6d586da20eb0e6d65bdee,2024-11-21T08:33:07.887000 +CVE-2023-49255,0,1,582226205ec035046418ed5e399d4028af5a2900f25a51a0db30bfb7694f68b3,2025-06-03T14:15:31.060000 CVE-2023-49256,0,0,fff3d693d0a8b193751618615483e39254622d7ab4a90cb947bccce2afd3ac77,2024-11-21T08:33:08.020000 CVE-2023-49257,0,0,54ad6ba0bc630625b0d5652f7d642002aac152a755f3cb3c12d2224b524c8ac0,2025-03-03T18:15:28.480000 -CVE-2023-49258,0,0,d7e58c6a3363f56f570266892ee4f64dc7320b8854779a72f83922532b52a158,2024-11-21T08:33:08.297000 +CVE-2023-49258,0,1,ac19dcbb8bbc96b9e1908ed1dedfaea8a715d7cb5cfe244e017545677be50630,2025-06-03T14:15:31.327000 CVE-2023-49259,0,0,e6244212b1909acee79666099d746c8f2782df1d6d7e2a3deb92b50aa1d48a86,2024-11-21T08:33:08.450000 CVE-2023-4926,0,0,a48ef158a7272869542d1ef25731d510dff8d9f79e54c406506be9432559e2ad,2024-11-21T08:36:16.977000 -CVE-2023-49260,0,0,ab226b4b210ca7eeb1b56a8f699dfeccc8d893baa60c762b95169a6215c24bea,2024-11-21T08:33:08.603000 +CVE-2023-49260,0,1,773fdf30e0c25b3d56b2691f44895d6c17902cc64c91fed416ff1cfc7d2eb84e,2025-06-03T14:15:31.547000 CVE-2023-49261,0,0,441608204e06976088b51e2bf645a1cf3b6d5773dff621320a09d83d1165d4dd,2024-11-21T08:33:08.767000 -CVE-2023-49262,0,0,da86d00ccff48017e36569e70a73f1b76a410606f88b6254de0c2f14be79ea38,2024-11-21T08:33:08.980000 +CVE-2023-49262,0,1,d0276c8a71a73169b0e2a2c62ba121798df12078a330aeba456f567e59598ccd,2025-06-03T14:15:31.757000 CVE-2023-49269,0,0,3ee2b6be123b753f0880752c7e793cd62bc9128fff7d1be0ca6d7cda7f8d93ae,2025-05-19T15:15:20.340000 CVE-2023-4927,0,0,55f7d84d6ee2e561906b47967e0e36a78c53e1a6cd2ff892848b96d8a06c895c,2025-02-08T22:15:27.843000 CVE-2023-49270,0,0,eeb8d92e7cce856dd7d8549f0d32dcd3952b5abdaa9d5e38d334266ec83414df,2025-05-19T15:15:21.230000 @@ -239409,7 +239409,7 @@ CVE-2023-49382,0,0,812c25d786532d8eed84723dd2c6d1101880c933b1ced91a92f044eb9b2bb CVE-2023-49383,0,0,c75c716e83a9485967f8bd09d96921ab7082346c7372c6995d31aee1323f71dc,2024-11-21T08:33:19.680000 CVE-2023-4939,0,0,2d23e45d4b9e623335ad7fa8f6e1ea108b7b242091da03f86464527dbd9cb96f,2024-11-21T08:36:18.713000 CVE-2023-49391,0,0,78295f0c5638fe71f010d66cb1709bb62557a8faf92e350147b46c4576160b3b,2024-11-21T08:33:19.830000 -CVE-2023-49394,0,0,d3f3d06c7f078aab1056aec6fee88cc24554b13c1378052b7b02621c07af3812,2024-11-21T08:33:20.060000 +CVE-2023-49394,0,1,b3b001a556d0729d9634a5f35a11310347790f19f3652d99e6b1b36c74befd73,2025-06-03T15:15:43.960000 CVE-2023-49395,0,0,3bbaecd7a1ae079833e38cd0605b25ec975076e11f81e71ebe1aa04d0d68b247,2024-11-21T08:33:20.207000 CVE-2023-49396,0,0,17783b6c0ae7868afb24225d2f112e1aefbc2b0d4c87d140c71e601d02bcc32c,2024-11-21T08:33:20.350000 CVE-2023-49397,0,0,247217a6488fe485f09ead7242f4b3e6f6f2eab7f230b956c8cab7c085b1f29a,2024-11-21T08:33:20.500000 @@ -239463,7 +239463,7 @@ CVE-2023-49467,0,0,ccfdd8b4b4bed01d2a5cbf227c069582268c93a046efc506e0e66499b5a09 CVE-2023-49468,0,0,b78f6929ceb3a35b940d92a0df230f857ead3378adc4638a3a8041f9db0307da,2024-11-21T08:33:26.970000 CVE-2023-49469,0,0,bd35c220b2e60cc8c4e4c44e295b6d92fa6ff932fd96afabc1e9909afe53041d,2024-11-21T08:33:27.197000 CVE-2023-4947,0,0,e478da0e9c72e386dd9d21064d784c4aa16de46cf623691aff1d52bde7ec3fce,2025-02-12T16:02:11.947000 -CVE-2023-49471,0,0,b3aedcdbf5c2c22919d5fe222006e48c8c22c32d80f1490d607aa2941a69482b,2024-11-21T08:33:27.343000 +CVE-2023-49471,0,1,852fdc6f4995837a09ced172272e612ebc4fa5b2e2001ba39b706217db9c35fb,2025-06-03T15:15:44.147000 CVE-2023-49473,0,0,da24daebf1eb8ea092d68cac47bc80e47b66bc61f8b5fa69cd97defcfe685aea,2024-11-21T08:33:27.510000 CVE-2023-4948,0,0,8e5e91b593e9456690177fa740ac53095abc30a31cb01c0f0f8ab9ce7fd799e7,2024-11-21T08:36:19.700000 CVE-2023-49484,0,0,6822f4290b2440fecf3f8a1129e9eecfda2346f99f1699f17aee220066b3942a,2024-11-21T08:33:27.753000 @@ -239478,8 +239478,8 @@ CVE-2023-49492,0,0,8979154d2f69e779adbff4208daf4f2d2347cffd70301ef63b265d34176c6 CVE-2023-49493,0,0,0a8943e52cc88404e66a7a342a9d826faf2cf732f8cbf261bc09e6b2274edf02,2025-05-28T16:15:32.107000 CVE-2023-49494,0,0,81ae2af9aba1f0599f724889e50222fc1614d4f34df24851ef830a84c7e56013,2024-11-21T08:33:29.217000 CVE-2023-4950,0,0,2393f54c0dbf9e74f2b94eab0806cb1f4ca256d269ff7f1a1e2e83a6b9c5aa20,2025-04-23T17:16:48.187000 -CVE-2023-49501,0,0,70a8b180b28b6630a37f7975b2482757b7f0a909829496d1b56b0c4da3e15fd8,2024-11-21T08:33:29.360000 -CVE-2023-49502,0,0,69af41f78008495447faebfcddd8fb8f31648e607af034680c599387b5e347d5,2024-11-21T08:33:29.580000 +CVE-2023-49501,0,1,a6e90d1dd289591e0b018464da2e59769af212fd489d42322167c76e40f5a392,2025-06-03T14:03:02.550000 +CVE-2023-49502,0,1,4bfa2f2c0ac55478ea5c51834071685156f178121633d8fc890500ca5f591e2c,2025-06-03T14:03:10.227000 CVE-2023-49508,0,0,a06f67b805f448f282f17a49613360ae1ef3e331d48eb4a72cdc35f3932734bd,2025-03-27T15:15:47.470000 CVE-2023-4951,0,0,1bbc4959ac980f797457caaf60413d1bbf7dabd5bc8076002f966e17295d986f,2024-11-21T08:36:20.073000 CVE-2023-49515,0,0,a4c0f2e305f9bd09bbc07b299160e9ee82b974a0de89b6dbf4caf99ad0f89a33,2024-11-21T08:33:29.953000 @@ -239496,12 +239496,12 @@ CVE-2023-49549,0,0,9a2cebaebaf97239f2bfd9173576257a692bf9d1d5d1560d13729dd131766 CVE-2023-49550,0,0,2c81aa1b1a990754ef879c26f0a6ee754ede0d23bfa96a1085f14891646cb258,2025-05-16T18:16:01.490000 CVE-2023-49551,0,0,ed28c559f9ba8d4b8aae8d2d4e401c8834ea212cf18214e50de777924bce03bc,2024-11-21T08:33:32.447000 CVE-2023-49552,0,0,ae4e673718d2ece6c9d20818d4dbdbed3840be8be0432a45b27d72d6dac502e9,2025-04-17T19:15:57.020000 -CVE-2023-49553,0,0,5e7997ac702404cb67f4e8eb084b66e9daabd4eef798bb85fadc8f62931a91e1,2024-11-21T08:33:32.833000 +CVE-2023-49553,0,1,f5a2de3fae47322a562731f44f06c408d7681f7f809450979edcc8af55ca5998,2025-06-03T15:15:44.347000 CVE-2023-49554,0,0,4f68cb754854d63acd9365f8b0122719686d5cfd0d456a25b250937761837d10,2024-11-21T08:33:33.003000 CVE-2023-49555,0,0,3d611cc9fb62f73679e661f606f72cc1b42e4a571ad514dfe8234668ab022b6c,2024-11-21T08:33:33.173000 -CVE-2023-49556,0,0,4d1311991b38f48e3495474939ceee1b06e1c276936d09965ec93354da915e8a,2024-11-21T08:33:33.360000 +CVE-2023-49556,0,1,8f9673211e0ff071db165546f07d2c6311913168ff7ad6ad9f83cf15e8fca2f5,2025-06-03T15:15:44.527000 CVE-2023-49557,0,0,9e4b61319195199e69dcd83b0c550bfc12cdf2a8881984eda0e476f76b2e0787,2024-11-21T08:33:33.517000 -CVE-2023-49558,0,0,e33fbc2762e0a1a11cca065bd03c7c3f0cb11284b57b56fb6d5907f358f02c4c,2024-11-21T08:33:33.667000 +CVE-2023-49558,0,1,1e5d8699900db0999c663b951b7c8210d75f6742b254d7583dcf1acb61638835,2025-06-03T15:15:44.710000 CVE-2023-49559,0,0,c02603e188bc3a0923b448b626bdc5315d4d54d2e42179dbe4f4a8ce296ed722,2024-12-03T20:15:14.317000 CVE-2023-4956,0,0,0a6d3910e674100356604d3d8d3216b6f2df7e342de4b121b9643b7573049256,2024-11-21T08:36:20.217000 CVE-2023-49563,0,0,8f16b612c6db1a5649cc1fdbd0c2c7e839b657e1b128fa50df9443a38615eaf2,2024-11-21T08:33:33.980000 @@ -239533,7 +239533,7 @@ CVE-2023-49594,0,0,441b1cf634c83c878638e9a3095fe5064b389f2d88cc4c29b7c0eddd12c69 CVE-2023-49595,0,0,8fc65a47793fc32f84c0a744bf297f283dd69dcc2b15136a2e2fcd19c982b339,2024-11-21T08:33:37.123000 CVE-2023-49598,0,0,e758410bd290a11a398e846d4228fea614a25c82ab963e99462e14bdaa9d6db8,2024-11-21T08:33:37.250000 CVE-2023-49599,0,0,d1843241f8db11fafc599c0daba9e074b74894e48b5aec8ec283f1589c2f8286,2024-11-21T08:33:37.373000 -CVE-2023-4960,0,0,4efdb33cc3b8c9e490e625ca3e4a0d80c52b3418324639edab36acb9b27c0262,2024-11-21T08:36:20.780000 +CVE-2023-4960,0,1,cb185a862824bac8ac9921d121cf83957b00e0981bd2befd7a4b7aa145e42ae2,2025-06-03T14:15:32.713000 CVE-2023-49600,0,0,e8cd8de4b2ab88bf4f8aa920e4b463bde1ee47923e6fd2d0106580cacd664710,2025-02-12T16:14:59.787000 CVE-2023-49602,0,0,a12c06e1c2027365532346b2edbb24aca3a0ac358acd9f611803ef679cef3d63,2024-12-16T19:59:21.097000 CVE-2023-49603,0,0,f58d77fe3b83a54efd36e03481394249b1ba956a42002e122efd004ff9e97d2f,2025-02-12T22:15:30.623000 @@ -239852,11 +239852,11 @@ CVE-2023-5000,0,0,ca145d434ef78afde8baf845ef782ae70d2a6f81f3578034c776b9e6afa964 CVE-2023-50000,0,0,9303e689005b0c8a4301ef6bd1bd2ca995b57e67a6d525af305aa46ffbb9e881,2024-11-21T08:36:26.030000 CVE-2023-50001,0,0,734983cd528f2562aaca65cff059559350959419eb7e04ae50d0c3329ca87599,2024-11-21T08:36:26.190000 CVE-2023-50002,0,0,5af4b860d9debcdf09ef053e01b1af62697929da76f8027f5201dda7b0dc5c1b,2024-11-21T08:36:26.340000 -CVE-2023-50007,0,0,b8a0e3dcf67c4ec25ee06928abba91077bad38912da3be2f1be89e364a97a0a6,2024-11-21T08:36:26.483000 -CVE-2023-50008,0,0,70f57aa1070162ead047c5a0134bd26b179f2c6b7850715b4b38b014c6e7d3bb,2024-11-21T08:36:26.723000 -CVE-2023-50009,0,0,0591a3624d12993b6589895faebc4cb16f7e1db3d96ffc38c87140bb97b11818,2024-11-21T08:36:26.953000 +CVE-2023-50007,0,1,c324038ea6de1d43c326007c7591c63de101a20d52ff7e9f2890024bb399c093,2025-06-03T14:03:20.290000 +CVE-2023-50008,0,1,2d39a41484ab17f44b713d4e6786f6b4490f8c9d78f2a3533db1a7419b8ce6e3,2025-06-03T14:03:27.343000 +CVE-2023-50009,0,1,4677aa15cec0f5b67e56dec0eca49300257b677144e0ff2cb4286d3cbd8193f4,2025-06-03T14:03:43.703000 CVE-2023-5001,0,0,46a46eb4a9d00426fc31810a58f9e35e63999d4ce41dddac44ee505be864f62d,2024-11-21T08:40:51.740000 -CVE-2023-50010,0,0,299a5fdd8304d0f7d3bd2271a643cf45c450da796a099129e8fabd1f401ec923,2024-11-21T08:36:27.173000 +CVE-2023-50010,0,1,00286101dd1058e64a5383470e8961901ebc8436a636224859d77e6fb16db9b3,2025-06-03T14:03:49.420000 CVE-2023-50011,0,0,c145ed175ced09124989fb0d5c0560e5d4be3fc7d3053a21b9fb20dd3ee3570a,2024-11-21T08:36:27.393000 CVE-2023-50015,0,0,81d964821e2816fe2561e9089dee93e252d3d542d5e7f85273c1ee10dfab97b6,2024-11-21T08:36:27.550000 CVE-2023-50017,0,0,96df0348a505f917ffed422b82173deffa45385055ad565f5fae0e0f776722e3,2024-11-21T08:36:27.780000 @@ -239864,7 +239864,7 @@ CVE-2023-50019,0,0,11f18c8bbb0e792f75bbcaf149f0112c6dcc0576fda4017e928fa5d72d9e5 CVE-2023-5002,0,0,987bc6cf7338c0e2792735e9cea7dbd327df20b8bcec6e3a4dcd230105906ca4,2025-03-17T16:43:52.873000 CVE-2023-50020,0,0,72f019b0b67d78b3e19cc9985f2bbcc228431a3d95399a3b630e069fbd7c9428,2024-11-21T08:36:28.110000 CVE-2023-50026,0,0,2c912893dbdaa7ca70a39c536f9dc106ab1015ffc09774484bb6765128e9e35f,2025-05-15T20:15:27.827000 -CVE-2023-50027,0,0,a9df9652fe85e440e14297428e35023f622e0d6fad228e66bd9862e8e00d25cf,2024-11-21T08:36:28.440000 +CVE-2023-50027,0,1,54f7e60682047bd3af2a6a3c9f4323ec2b40c4e4eb5883fc15d40539dfc265fd,2025-06-03T15:15:44.937000 CVE-2023-50028,0,0,bc4cce8055493dfdc46bdad95dfbbf2fe4b4742039c0ec649a3686cbb73699b0,2025-06-02T15:15:24.133000 CVE-2023-50029,0,0,d9c3518854c85e69d880a1ad286a67c19e645e056a6c80ec6fbac44c0b5d546c,2024-11-21T08:36:28.757000 CVE-2023-5003,0,0,f64093738a42959932d4b4b997e13e1d8afd18db58cb4f2c4944b7622d19fcb4,2025-04-23T17:16:49.257000 @@ -239882,13 +239882,13 @@ CVE-2023-50069,0,0,b71f8536bef12223a4c105b4e9ff0aa2898083e6c30ed4a80a79caa1476db CVE-2023-5007,0,0,362d913ccda67742a7f1569049bf26900c5cd794e59a7a280d855a5151f8e909,2025-05-19T19:15:46.530000 CVE-2023-50070,0,0,55802cd5fb52a0c3ba3e8f7f6ae58a039144b2b168ec670aeb0f21c06f255794,2024-11-21T08:36:30.420000 CVE-2023-50071,0,0,67164ec6c5e306ff0d77e21300e1e7a85d56fab29a7408e33997c8dca4250682,2024-11-21T08:36:30.560000 -CVE-2023-50072,0,0,2a914871d13074f6d18d68c6fed9b0eec84f6653bf9614cdc5c929a88b6756d3,2024-11-21T08:36:30.810000 +CVE-2023-50072,0,1,9bb7fc835e7ba4506bb65f66a9dc0083dc42c81b32a0958b592a7939ea4984fa,2025-06-03T14:15:33.203000 CVE-2023-50073,0,0,190f93ffa639ac4f9c506da9e26929c9075fd5a31bfef6a257be42c3ae157596,2024-11-21T08:36:30.957000 CVE-2023-5008,0,0,9e4707c0b3fe5a219380547420894ae5baf0950f280d19c00d0e3b897e54240b,2024-11-21T08:40:52.673000 CVE-2023-50082,0,0,4cc4156615a954b9ba8ed1073b5450500435b3bd1a876483cc54968a9d27b155,2024-11-21T08:36:31.107000 CVE-2023-50089,0,0,d33613a887a220c499775a25dda05d09dfef7e795fa35eda4f482e6a763d7e2a,2024-11-21T08:36:31.280000 CVE-2023-5009,0,0,35408e77aa4900e01203d06c8f9e3f4f29457fd7f26fabd2fe43d34123496ea4,2024-11-21T08:40:52.813000 -CVE-2023-50090,0,0,603f4c0d8b8993b594b1f0a4035110b478e0f5523d1f4436205cd3eb76b7c74b,2024-11-21T08:36:31.450000 +CVE-2023-50090,0,1,cad3d649dbd0d9b587c55c1c7dc6c0fa772ceaae43671f8c77eb1791d27298af,2025-06-03T15:15:45.127000 CVE-2023-50092,0,0,04017ffef753169462d7dc6dbea7fb7afaa51cdd5e99e80a1dfbd8737a9b464f,2024-11-21T08:36:31.603000 CVE-2023-50093,0,0,381436511af78c1a813793739d4ce2615a674eca504c83ce1804b940739a8692,2024-11-21T08:36:31.750000 CVE-2023-50094,0,0,0eed21f9091634fd1e6cdaea525a1902a98b78322121c191f1e5141f864834ad,2025-04-17T19:15:57.367000 @@ -239907,19 +239907,19 @@ CVE-2023-50121,0,0,83543b915dbe59b1decd0b348dd0ec8b7a1cac43a6ac16a29726b6e5c0588 CVE-2023-50123,0,0,3d01fdcf7d90e15e54be935dbf7dc3242097d1b21f1d1fca185bdf90d6d71e8c,2024-11-21T08:36:33.523000 CVE-2023-50124,0,0,4118b7c8292a42f12e0b5874f2aa2e3e655793c5a33b95945dc2a04d2c82c49e,2024-11-21T08:36:33.683000 CVE-2023-50125,0,0,501eded84d5c591d3cb937fe7de9f9d1fcf057184ec3a02126c62cf0d652d4c2,2024-11-21T08:36:33.920000 -CVE-2023-50126,0,0,9e3b85731905bf81ffa234eba092d8badaaea7534ac803b723ddbb27f2d00759,2024-11-21T08:36:34.097000 +CVE-2023-50126,0,1,fff31bf5b2309eecbe6171e27ceadd686de06e10e910ff193e0328dd4f4ed1bb,2025-06-03T15:15:45.317000 CVE-2023-50127,0,0,e02d76a5015dbf08acfb42c9ae4fb60c67004426c00cd43a218c146856e19850,2024-11-21T08:36:34.263000 CVE-2023-50128,0,0,f1d9097015575625af727f109bc0eb508d2c4564ca094c594f72b9365a03057d,2024-11-21T08:36:34.423000 CVE-2023-50129,0,0,c44b6918e36dcf127ee6c8195fcc9a1eced6846312ecd45619f9b4caed6fa9da,2024-11-21T08:36:34.587000 CVE-2023-5013,0,0,f16ea34e6308f284f7a8061d789dc68420ec9046ca4dc4a745c0f6cd76191e8d,2024-11-21T08:40:53.353000 -CVE-2023-50136,0,0,a304bd929a31e7198aae64a8ac21a538a741cf061312d82f432e5ea57b2618b4,2024-11-21T08:36:34.737000 +CVE-2023-50136,0,1,6a04844723db34de3d1e0a3bb15e878041ae117e6a24c5802b7207a55ff2b4ff,2025-06-03T15:15:45.523000 CVE-2023-50137,0,0,a1720248acc6f96a561cc6f0b015fe9470e649a00ef2696efe9cf0801b102c7f,2024-11-21T08:36:34.890000 CVE-2023-5014,0,0,31a8800adc61f436afbab9b8209bb9295e19c2d0375e80603f405bad8cd67946,2024-11-21T08:40:53.487000 CVE-2023-50147,0,0,f23717065daed7241f1d0c833652afaf8297ee2b2429a7d8d5c9a0bbf8279596,2024-11-21T08:36:35.040000 CVE-2023-5015,0,0,0a79f471efa314b0a75819ea6cbc43b6d991b6272135dd1065e06001b7417809,2024-11-21T08:40:53.627000 CVE-2023-50159,0,0,f50506045434c75550eab5a86334afe67b0040a148e17684ab6c549121ccc00d,2024-11-21T08:36:35.210000 CVE-2023-5016,0,0,e05d4b20c441ee2ccf6f3ed4e5a7bc23579fc8a676959f4e8109a2e467e6a542,2024-11-21T08:40:53.777000 -CVE-2023-50162,0,0,5dfe10d61702489d0fe770232e2bd40333b6e078026813bfcffc569401e1c734,2024-11-21T08:36:35.373000 +CVE-2023-50162,0,1,f1e42e8945f52eef776b6a8d46c45b9cdd4d41817bdbd351491d661d54fd41bf,2025-06-03T15:15:45.710000 CVE-2023-50164,0,0,e18c1e2e56aa6d16a340ca1e7b7002833634623e78fc7ce4907b03db9f183199,2025-02-13T18:15:49.103000 CVE-2023-50165,0,0,f0f9c7ccf1e457e83f559bc213e758a4620263a795313eb97cd9fa622da413fe,2024-11-21T08:36:35.660000 CVE-2023-50166,0,0,0dcbea6361437caef094634aee7c12a95fcd6fe10938ebb89131abbf42b409e6,2024-11-21T08:36:35.803000 @@ -240079,7 +240079,7 @@ CVE-2023-50341,0,0,8195dd6e596441aa96b36ea59f42709823e87aa0a02938565b92d43cf0c34 CVE-2023-50342,0,0,fff61ec55ec142cdf45da38990f2f1187c171dafa08aee36d3cc08c99a63dbc8,2024-11-21T08:36:52.100000 CVE-2023-50343,0,0,241bedf6af5c9f21abb99a12a4dabedf2004e86cf3b643963019f1db39842581,2024-11-21T08:36:52.223000 CVE-2023-50344,0,0,76f6f681a838e8820a381918febdcbde9a2cb6bf7c5729949f2aad6faf7aba5e,2024-11-21T08:36:52.363000 -CVE-2023-50345,0,0,4410924492f765305fa13bf5053c8fdb483837e3206087a89dd80ea17ca81ee2,2024-11-21T08:36:52.490000 +CVE-2023-50345,0,1,e2758c7891f3e07e0f876eddafb4bcb37d46388f174fc0dfebaa3808b58b6709,2025-06-03T15:15:45.897000 CVE-2023-50346,0,0,0097f91bef2d7c2a9b761c97c84833c41706a8639abf8e375574f8f9efc75af9,2024-11-21T08:36:52.637000 CVE-2023-50347,0,0,9a33bf1af37465bf00544ed480830a737720d89d2307c84b9625fdb376cec1a9,2025-05-08T18:34:18.523000 CVE-2023-50348,0,0,ad72756ee849276173d56c732de879c59807720bbad7ea6472261f42ea483ef2,2024-11-21T08:36:52.907000 @@ -240137,7 +240137,7 @@ CVE-2023-50436,0,0,6d689c5db758786dc18d932378f481aa9cefe0e32a180fa33c49f707b470e CVE-2023-50437,0,0,79207b25246f96dfe395d6eeeeda3f56498ab321fd452e1226798a9a9e1974d7,2025-04-08T14:59:29.210000 CVE-2023-50439,0,0,b9333a48792e694ecb429826240aa9e8549a615bafdaa24f546dc83d888a1801,2024-11-21T08:36:59.663000 CVE-2023-5044,0,0,8b654baabac3a3b7d6bb2712ab47175087f213bbee40e147356d5fb760e520d2,2025-02-13T18:15:54.743000 -CVE-2023-50440,0,0,5e15d6e64ed867cc390df43bc190dfe74e9d14c2e3db9a4ebba6d61e77ba7f3d,2024-11-21T08:36:59.820000 +CVE-2023-50440,0,1,22b2f40484633a3f3d81b97ca90b2f2ab348eef81cdab4dfb34a00e5594a8b1c,2025-06-03T14:15:33.780000 CVE-2023-50441,0,0,9bab21ce75db2372d3359c231dd9eefa860be9bd68859467c153b0e8db94aec3,2024-11-21T08:36:59.963000 CVE-2023-50442,0,0,281dd8023e939624cb509f313e427d1c8701d05f1c680ecfd7b9c65fd2334034,2024-11-21T08:37:00.110000 CVE-2023-50443,0,0,bb4d84d6f9a1a0ac8fa7321e60851a82f9948b84e5dfbb9cbb7f2f382149731d,2024-11-21T08:37:00.253000 @@ -240190,20 +240190,20 @@ CVE-2023-50571,0,0,998520a255901da97c0bbe385a06d0883776af653a2618fcb24fdcfa5b933 CVE-2023-50572,0,0,8ecea8fa3c39bfb5971ef3a73cca6e7b011fe46d95e29c7f7523effc7e00a4a8,2024-11-21T08:37:05.737000 CVE-2023-50578,0,0,eea4b88df935876b521403edfd9033d7b81bc3c69766b3e164f321c2d565f81f,2024-11-21T08:37:05.880000 CVE-2023-5058,0,0,54f3589163df8d384443efce205f25ecd11f58b795e95800814d384f8443118d,2024-11-21T08:40:59.497000 -CVE-2023-50585,0,0,291a212957d4b41153b169b1dac51fcc41aff62d83ffb63ca40d8802ab3f2a79,2024-11-21T08:37:06.090000 +CVE-2023-50585,0,1,1f0660ea86048b1bab04513bd230afb0d9a192a72430f720b0fd82c5a9df5905,2025-06-03T15:15:46.043000 CVE-2023-50589,0,0,0725e9a512749d0b0a9374ffd6f808073bf293b6b7c51447451fb507615b9b6f,2024-11-21T08:37:06.267000 CVE-2023-5059,0,0,7db2a7aaf69875fe4765af750cd1378ca8c81eb759716e8bf3cf50fa766ec2d9,2024-11-21T08:40:59.617000 CVE-2023-5060,0,0,4574fa407e4590e9fd333d833ef5274bf3db629345459d700e302888d935f764,2024-11-21T08:40:59.740000 -CVE-2023-50609,0,0,f80477abf1bcb4c89dc5f0283b2f56c0951fc7ab7b4a7af6354987ec28dafe5d,2024-11-21T08:37:06.417000 +CVE-2023-50609,0,1,d0af8304c6b901443cbaab94a4c783bdcd5d851aee1de058fed233ef39a39bf9,2025-06-03T15:15:46.233000 CVE-2023-5061,0,0,f3239aefbd571c3e8110326969216870974de4180583b15bd07a3906f8857990,2024-11-21T08:40:59.863000 -CVE-2023-50612,0,0,8a3cdcecef68339ac40ada42c54dc9cfa15e10322d3e9be0f306c5a124855ae8,2024-11-21T08:37:06.553000 +CVE-2023-50612,0,1,1af6abba2b700cdc579eeda72a5cd4700f18f48dd3bd4dc03ccd2b69e5634974,2025-06-03T15:15:46.423000 CVE-2023-50614,0,0,abccd3fd3dfaae01017e527ded905c443dc3f38755467f11a80755ddb21c0975,2025-06-02T15:15:24.323000 CVE-2023-5062,0,0,a3c8c9da9f4ae90413061e2dc1660ee905e810b7907b2ee50509044256141aeb,2024-11-21T08:40:59.990000 CVE-2023-50628,0,0,d8930aee5643d37a5e41c25c0bd2db48cc9b207f7f7080df4d264736e6b98d92,2024-11-21T08:37:06.853000 CVE-2023-5063,0,0,f5d5f4de39b41820cb511287250db03c41d294954bbc6486f419a4e3d5f5130a,2024-11-21T08:41:00.110000 CVE-2023-50630,0,0,32319e6471b794433fda96c591f7458445cc5552528b6ec545aa9dcb0be0ffee,2025-04-17T19:15:57.713000 CVE-2023-50639,0,0,03297125d78f38daaf7c0196d08dfd470a6a791503a996682011d62638ce1b3a,2024-11-21T08:37:07.163000 -CVE-2023-50643,0,0,cc00cae8660f5c20f31a1093794aa899031aa9748a4455a1b7cb595c24cb9459,2024-11-21T08:37:07.320000 +CVE-2023-50643,0,1,7e0877f12f18c88840f91624bd31d7409670149b7c67916cc175317671c01217,2025-06-03T15:15:46.607000 CVE-2023-50651,0,0,4b9181da40737f3995e5c685d7421320d5df5276e47068cd17b6b4e05839bbad,2025-04-17T20:15:25.913000 CVE-2023-50658,0,0,c92512a20999d7407c8304f5036f6d05cc8dcfebc839dcc3d2db58122486a5ac,2025-02-14T17:23:19.307000 CVE-2023-50671,0,0,8d9bac08f508e00fca763688579686289c21939edf6a27019691dba16f2a55ba,2024-11-21T08:37:07.797000 @@ -240397,13 +240397,13 @@ CVE-2023-5091,0,0,a39b26730104903f58075a55a24779cae4366a2e11fabfff6cd7d12e1dc891 CVE-2023-50913,0,0,b8952c5f9cefbad968ab10bb33543ea53a3af411cf109c1a8265edd9f3910c7e,2024-12-11T17:15:13.987000 CVE-2023-50914,0,0,a68f3bdcc37bb0a7b603c178c02c36faa0c57813aa230f12907d1e36d8e33aa4,2024-11-21T08:37:30.730000 CVE-2023-50915,0,0,b718adabc5f0c3ed022a04b284460615aa6f2acd4ff76258d6584f160da65bc7,2025-03-28T20:15:19.030000 -CVE-2023-50916,0,0,c28a373211a1c6b097f18432ad4535a66138f49347d4a2ac6a8ca52f359ef919,2024-11-21T08:37:31.173000 +CVE-2023-50916,0,1,ac7fa2eda83705fe92c59e59e17c46249fbc654fdc581f478b27673bb03e9683,2025-06-03T15:15:46.977000 CVE-2023-50917,0,0,3f916802d0f63f67bbe9fd1cb699f9d2d1ea5caac78e3407d252fde7a2ce6399,2024-11-21T08:37:31.330000 CVE-2023-50918,0,0,3bd138645574b73973c08b3a844cba4338423e9c84ad12ff60485ed62052d1dd,2024-11-21T08:37:31.503000 -CVE-2023-50919,0,0,d1e33829081d1fc9fde789b1c42dffae9e2dba078b7c10981f6ec0d14019e3e8,2024-11-21T08:37:31.660000 +CVE-2023-50919,0,1,06e02dc32eab33c64c6609ee14b758bcfc233317751e99fb4b44a3fb94e5ed85,2025-06-03T14:15:34.507000 CVE-2023-50920,0,0,1dbd8a73f8b59f6600ce9b9d1645b6eef39ee4f3ef38d633bcef35756dfde79f,2024-11-21T08:37:31.863000 CVE-2023-50921,0,0,938369d9c8668a29bcca45e4c45256ef98a4698e826c58f3dc016d7e58bdd1dc,2024-11-21T08:37:32.043000 -CVE-2023-50922,0,0,6bf236a9898ccf306bebe92404b72fd903bc082b793476e5e69a5665a62b5a9d,2024-11-21T08:37:32.207000 +CVE-2023-50922,0,1,6c76fb17af29b8d15b465f56aedab3d9916b95da00bc60d05fe4e9b6efb91a76,2025-06-03T15:15:47.190000 CVE-2023-50923,0,0,41746b2328d03f226300e1d453aa06f98f173172b6df557f7fc6b5b090ebfb79,2024-12-04T21:15:19.777000 CVE-2023-50924,0,0,ca556db944b3691a7d54a96ff4cb871f507ba9ba13687ba88c121111ca983c8d,2024-11-21T08:37:32.523000 CVE-2023-50926,0,0,bd9e26d125e89ba14d77cc8e80fb87b46ea39ca58778d29d384b0f164c76a0f8,2025-01-06T15:30:54.840000 @@ -240456,7 +240456,7 @@ CVE-2023-50979,0,0,c34a5b3739799c165cfad79601f63155c289f46472f397f82ce3ba65f3b27 CVE-2023-5098,0,0,40a8681da5f5f840b442247483cbbaaa6b4b7f45ed6cc73175fcd3cd12b68a5a,2025-04-23T17:16:49.753000 CVE-2023-50980,0,0,a7739994a11b34e70bde0b442ee1279735f9a1c926768cffd28c87fee13273ac,2024-11-21T08:37:39.123000 CVE-2023-50981,0,0,e661eb882fb353d92df10777fd9a2cf26d9b194c3f2d654883ea7923db4f7e78,2025-05-07T21:15:59.267000 -CVE-2023-50982,0,0,16c3719c9e31d141df1bcd65b94c6b031c0c3c97ca81225b53c038c036cb7b7c,2024-11-21T08:37:39.403000 +CVE-2023-50982,0,1,083eab89d20269c3a6fee99f55cb2c5a4261b21c714aa34ddc8f3986e4a444c3,2025-06-03T15:15:47.430000 CVE-2023-50983,0,0,d893cf247330e6f1ba327554c7a2d00d8095f5ee3b640f4aa32cec08c6e78938,2024-11-21T08:37:39.557000 CVE-2023-50984,0,0,044e0dcd8d45e52c57069f48d84da84028c6895cf15034a08ee7fbbe858aa409,2024-11-21T08:37:39.723000 CVE-2023-50985,0,0,531c84afcd2f18c2c421ea275c78b3bdf1d8c6042309095ec60f33bc8cb34d03,2024-11-21T08:37:39.873000 @@ -240505,17 +240505,17 @@ CVE-2023-5105,0,0,3790ac3351e2f7a9d5de761591faf4e59c4a83b72084a8fcc8594b6b69c808 CVE-2023-51050,0,0,e9debe8306ec8f668863517f87698b12a685da79cc0b9beb08be7049ef33cdcd,2024-11-21T08:37:45.793000 CVE-2023-51051,0,0,744e5500a13f5c9deecc0112a7f7aaab643116c874f024b3fb66f4b076fa685d,2024-11-21T08:37:45.937000 CVE-2023-51052,0,0,477d35c12399ac529bd71abf689bd6d961a73dab60fea793ebdbb936cfb3b5de,2025-04-24T15:15:55.750000 -CVE-2023-51059,0,0,268e2579a4081767ee2b807bc155fb258142698926067a6c2b04b8249b5d843a,2024-11-21T08:37:46.320000 +CVE-2023-51059,0,1,004497bfab3180fe47aa10adfd3ccf55dd4ec1ad28b9deea0b81351657558ebd,2025-06-03T14:15:34.823000 CVE-2023-5106,0,0,3aabfc04c84796d8d1d3759a073777491acfd04b69c00fb679d005dc5bdda562,2024-11-21T08:41:04.403000 CVE-2023-51062,0,0,c4d26065aea61164cd94e5740c25fcf98affae93d235042fce14abc4035df4d1,2024-11-21T08:37:46.483000 -CVE-2023-51063,0,0,d9775bf4d5fb773a49830fe0bc14adf19b549237aaf28c1b3d0a9acd0634fd63,2024-11-21T08:37:46.653000 +CVE-2023-51063,0,1,d6a3adaf86fc781b9f2a5af11397f798ef8b1f7340e79fd3aeb086d2edb46179,2025-06-03T14:15:35.093000 CVE-2023-51064,0,0,ca0ab562e1d270d302d7ee9af163118ffd7d082e8903dabe5ad1a6f47bd6053e,2024-11-21T08:37:46.807000 CVE-2023-51065,0,0,746a1c418c8dd44ecd96b2c4fea91a97e39f30fcb8a70fcf7ee2132e6d90fa0c,2024-11-21T08:37:46.960000 CVE-2023-51066,0,0,c2053d9aad5f56b18aa60a7c5d8a38a02292c71b9cd5de4a87d39c1a8eea830f,2024-11-21T08:37:47.127000 CVE-2023-51067,0,0,211fafffd4ad7f121bffffda53667bb393908d2a8e79256008619faf142b6f09,2024-11-21T08:37:47.283000 -CVE-2023-51068,0,0,40e4d476aeaea0bdf60db3ef15be3b00a1ebff77061297fe3b7b246aa1c809e7,2024-11-21T08:37:47.433000 +CVE-2023-51068,0,1,282c3efa7b3af611d540941f8e83a340de6c2d7f1ef9098f9e1e4738480b3dee,2025-06-03T14:15:35.343000 CVE-2023-51070,0,0,24bbcd606897fb44ae06f6cc135cff684e1e093a584c09c3b737a82a9f9fcd27,2024-11-21T08:37:47.580000 -CVE-2023-51071,0,0,a954829baa5e599d0d8521eec133cb8ae02ee0c7f386c34c34f6d5f92c7fc18d,2024-11-21T08:37:47.807000 +CVE-2023-51071,0,1,5779136ab5bf6bc9e8dbec25fb4a2f04ca68a168a750387289476ebd9974254a,2025-06-03T14:15:35.590000 CVE-2023-51072,0,0,15431623baf0b14c6242732ada0ddfd67045dbe39acda2b95c158f351f1ae4b5,2024-11-21T08:37:47.947000 CVE-2023-51073,0,0,079109e4eaeb76f838e44f4d04c6486ec382f4d520143f94bf79266b06727585,2024-11-21T08:37:48.103000 CVE-2023-51074,0,0,48d02316a72b8244c4105b5c72b98898757b408d087a97349efeb45b3a3aa785,2024-11-21T08:37:48.267000 @@ -240547,7 +240547,7 @@ CVE-2023-5111,0,0,579a323422f11ea9398da1ace9ba54187a315b780303d099f83466063ddfd5 CVE-2023-5112,0,0,9d894980cad1eff18d53be3e3468a0d85f03b51cec011611b33224831b63d06b,2024-11-21T08:41:05.037000 CVE-2023-51123,0,0,f6aab2eda99a55d90797da072caf96c0de19fee30e18fe8f452eec10022e7a33,2024-11-21T08:37:51.960000 CVE-2023-51126,0,0,f6c1b547924c46345aa463a0833a5ceb6a05809cb277107c787e280e62f79be0,2024-11-21T08:37:52.140000 -CVE-2023-51127,0,0,38083f2c0078e2cf382ba15151d9dc113c0224c9cadc58b4b2b95d31ca4d63bd,2024-11-21T08:37:52.300000 +CVE-2023-51127,0,1,aa621043c51204edc35dc6b763e600797844c947ecc95d456eddb61568293e72,2025-06-03T15:15:47.610000 CVE-2023-5113,0,0,dbf260130cf07a6007766cbad6d6f117b0447af4ac28db71281cf94759954da5,2024-11-21T08:41:05.160000 CVE-2023-51133,0,0,7e253e9b1e303637eda58ceb26f2cc1aaccac0d1b3bf87803e50306b8c4c3ab3,2024-11-21T08:37:52.453000 CVE-2023-51135,0,0,0d81e9b079e4abbb791cbc6e697b029db9f22b1e7248f9b6ff418b0581edf78a,2024-11-21T08:37:52.630000 @@ -240590,7 +240590,7 @@ CVE-2023-51257,0,0,90b22239bf890d3fc63ae3f964b089055a4d848b182551d7b4269d1443ece CVE-2023-51258,0,0,ec28a0a15d7a11b4651530e5700ed9ad63f41ec2f158cbfe61cb19d8a000bf06,2024-11-21T08:37:56.040000 CVE-2023-5126,0,0,9ada6a8f2e9b9491a8fe3f4eeafb2a31d386842291921479a06d9dd8a73add4b,2024-11-21T08:41:06.877000 CVE-2023-5127,0,0,3fdbc762852bea80fea6b909cf2814d7df78ac1c27f25416e9e0960c134130e0,2024-11-21T08:41:06.983000 -CVE-2023-51277,0,0,ab81eaea8de114fbc99d2d9587fb99b0e511144ce0a98dd0d340bbd095f06374,2024-11-21T08:37:56.290000 +CVE-2023-51277,0,1,71531b68baf02f85eaeef36923f7d51d7e051421ccffd83857febc5bd81c2ba7,2025-06-03T15:15:47.833000 CVE-2023-5128,0,0,bfe204edd11054b27893926793a261843cc5aafcba80836f465a9cbe06b587f5,2024-11-21T08:41:07.113000 CVE-2023-51281,0,0,79b04eca98fe1dab6ef30c2f8202fae9473ab06251454d69918e9613759ab9ff,2025-03-28T14:35:27.157000 CVE-2023-51282,0,0,8e64a1bfc8d57aa569e5ddaeb84ba0deccb82f824ea2197546b9a82d011d8c15,2024-11-21T08:37:56.710000 @@ -241109,7 +241109,7 @@ CVE-2023-51800,0,0,54253e4b44d1940d6e734d57099afc70939b7b9b5a4325b2ab331e73f231a CVE-2023-51801,0,0,ec42a439c27172fd48cca6f5ddb491f47e8681239aae5c5ebfc31cb931cf3bcf,2024-12-16T19:26:10.307000 CVE-2023-51802,0,0,a5fc2560572437e6a66ad5ea884e670cf683a41199837b730484753648b3dc1c,2024-12-16T19:24:55.930000 CVE-2023-51803,0,0,00ea25ecef8fedf998024e910dfdd7c1b6b78679f0acecc7815160cc81872bcd,2024-11-21T08:38:51.430000 -CVE-2023-51804,0,0,10b25a6fb4a3e368b6a0755087fc6272069c758669c1fa2370a72d6e0622e4c6,2024-11-21T08:38:51.647000 +CVE-2023-51804,0,1,35bfc330f066882a5f381c36c366805b9556da0735c46410158fc82cf4c90c22,2025-06-03T14:15:35.820000 CVE-2023-51805,0,0,8eb6e27a51fa3d297acc67d84eee3cae33c74f3cad452c1edf45ad1db3d4349f,2024-11-21T08:38:51.793000 CVE-2023-51806,0,0,660b920eb85b6f0f9f9767bf56e21c5285d9f3c4f583646a7a0393426eede40c,2024-11-21T08:38:51.933000 CVE-2023-51807,0,0,541918dc718b400fd01f828f1368fcab2efc24bcc25d26f0cb9995f0afce75c6,2024-11-21T08:38:52.083000 @@ -241163,9 +241163,9 @@ CVE-2023-5195,0,0,4fba762738d404050a918ef817aa3ea8706723df28403bb7c96fcef7cefd7c CVE-2023-51951,0,0,5723b90f8ddbc77ac2ddda0fc1e2439842eb75405bb5261a8a3e2df9c2cf4985,2024-11-21T08:38:57.697000 CVE-2023-51952,0,0,3ff812a795eaa25f84bb2cdf16d16a7db5f97ece164e4994297049e490772af3,2024-11-21T08:38:57.857000 CVE-2023-51953,0,0,e37612a11a9d71533ddd7b4d06ce9ab58a42bfa22633c0e0e14163f964928244,2024-11-21T08:38:58.023000 -CVE-2023-51954,0,0,1a63ed88384dcaa98b9fa910c88b445d2a8a986186286d61e3af1f5b22a257ae,2024-11-21T08:38:58.167000 +CVE-2023-51954,0,1,85e766fbe54eb5b441d6d8b766aaaa8bbf9b36980c73e269479ea77b43aa8a5b,2025-06-03T15:15:48.140000 CVE-2023-51955,0,0,5f78dd931fba7ab7497e17e4dfd1de6af1617d08da87d818625e30d5879ec9dd,2024-11-21T08:38:58.313000 -CVE-2023-51956,0,0,2eca512dd68f217da788f293c3eb827769d1449f935d497ac5cd4c38e22a9237,2024-11-21T08:38:58.467000 +CVE-2023-51956,0,1,c9c9aba31f78dd96dd4adf02499c39dd256279663ddea11006140c39508764c3,2025-06-03T15:15:48.350000 CVE-2023-51957,0,0,76e7b32685a00f4369bdf2c6a596ac0c87298633fbf5a80d5facb022abc68579,2024-11-21T08:38:58.610000 CVE-2023-51958,0,0,e40fe21fa221ac8f194540f4f239f90de6fe1826c8d380d968a5794f965ba175,2024-11-21T08:38:58.840000 CVE-2023-51959,0,0,2d44c13e4c787a6cecef943c2eed674bc93a171c71d5831b10b6164f2b3b6797,2025-04-17T16:15:26.863000 @@ -241174,7 +241174,7 @@ CVE-2023-51960,0,0,d99170c489c547d3f83ff1a6674b088067c6a2aefdb730351d8853530cde0 CVE-2023-51961,0,0,3b00fb3276b49f9fffdfcb1925c3f545d044a2352a24f879d34feb252d4dfc0a,2024-11-21T08:38:59.380000 CVE-2023-51962,0,0,5e316a09319d989b7564bcb691d5efbe3b784c220dcd2970d39c1209d338f73c,2025-04-17T16:15:27.027000 CVE-2023-51963,0,0,2438d815c3cde583ba6c318825935c352dcbdd28acd5472281ef2006903f9338,2024-11-21T08:38:59.760000 -CVE-2023-51964,0,0,388eb3809f0ad90ba5bdbaf93339d12567e0a6beecf80b76284b0fad60d8781f,2024-11-21T08:38:59.907000 +CVE-2023-51964,0,1,54c26e8926bd760985a7262f05be5b5df31c32e52619a8a196d0f93ab4244443,2025-06-03T15:15:48.530000 CVE-2023-51965,0,0,fe8c5776a709014a13cb758504a6626529037e76e045bc9ae2dc9b36c2231459,2024-11-21T08:39:00.060000 CVE-2023-51966,0,0,effb6ec6a62155e28efa2e9cab4f51b6c17366dc8d65bfa8a0572a6385fbee55,2024-11-21T08:39:00.207000 CVE-2023-51967,0,0,2cb4246532f158435c6cddc83f1bc1a1bee919aa536370b435bffb31af09fe47,2024-11-21T08:39:00.367000 @@ -241182,7 +241182,7 @@ CVE-2023-51968,0,0,a45f56623e2b7e4cf92c44fe06a15bfeb007c79ea91a9fbde1e24cb964396 CVE-2023-51969,0,0,1b2d79ec40b9b8810438c51c12e1f9bce474f459a14a1a971257b4a5426b09f6,2024-11-21T08:39:00.673000 CVE-2023-5197,0,0,2851837e120c4945743a2216bea20f08c7f889c5aecff7259dfdaca43296e555,2025-02-13T18:15:55.957000 CVE-2023-51970,0,0,99bdf3ae3db13391e7563cff1020a7e09cc4ececf36cce5cdf6964be1c7ffa77,2024-11-21T08:39:00.820000 -CVE-2023-51971,0,0,2cfa33d525026ac7cce302737ae631ded8a7e1ff5d8e08a51ab8254f54ec6db9,2024-11-21T08:39:00.970000 +CVE-2023-51971,0,1,886d5979c7e2cc90f3294c001d1cccf221d2de952c7fbdea64222d4255f011db,2025-06-03T15:15:48.710000 CVE-2023-51972,0,0,202757266703edec5ff500872e56c52da7b7407ba3d45efe59537d91c0d995d9,2024-11-21T08:39:01.127000 CVE-2023-51978,0,0,1e11205fb92794a6778edc67b202a3881469e65fcec0fb5386682634b3e04005,2024-11-21T08:39:01.360000 CVE-2023-5198,0,0,de903421c2b76d1d4e5b68b5cf976895de07c8dc464ab743e7b00ddfd7b551a2,2024-11-21T08:41:17.097000 @@ -241199,7 +241199,7 @@ CVE-2023-52028,0,0,8dfce2170e42e91ff3ac1ea3f553c318de190a3298fa7efc6d11a6dcb6ac9 CVE-2023-52029,0,0,ded14f1492191a90ab9b2dfc9b6f39adc1c3c071931bb22dd43a8a99d88f3c67,2024-11-21T08:39:02.573000 CVE-2023-5203,0,0,7fa210ffb971b4eef44e9726f598e7acff4028f9372a76da85ed815e64bbbac0,2024-11-21T08:41:17.580000 CVE-2023-52030,0,0,6a98053b86d79fb19dbd295e1e2501b2ea7ae15c4004b4efe760c6a885606eb1,2025-05-14T20:15:20.593000 -CVE-2023-52031,0,0,472ce35d329afd8ec3cfec1083f5c29bbdd3b418b92a9971a3482b7b8b022fd9,2024-11-21T08:39:02.880000 +CVE-2023-52031,0,1,de0e66aef02bfa15fd90e4805761b505563baf6b0540d5057e33522d94b496a1,2025-06-03T15:15:48.887000 CVE-2023-52032,0,0,96c86c56404afffb324ec68fcb2332326cf375a43929cebbd6cd1839647aee2d,2024-11-21T08:39:03.040000 CVE-2023-52038,0,0,eb1de472f1082b9c50008ec04a4ae7d3a6185d807b63ff44d5cad288b96f92a0,2025-05-30T15:15:26.660000 CVE-2023-52039,0,0,aa7e1ecd8fcca88faf9d723d93e4259830cdff734e4be1c030b047b447472d4f,2025-05-30T15:15:26.850000 @@ -241216,7 +241216,7 @@ CVE-2023-52048,0,0,dc6a64e99c990ac71e2e5fd5c1632b65bf305feb3beb43bad667892a5fedb CVE-2023-5205,0,0,ad9e6403ed51d32e238949552f23850cd3c894ce7b700f7f43181c17b96bcabf,2024-11-21T08:41:17.900000 CVE-2023-52059,0,0,a96a611b175ef8777d7672cb4ce468c3a11ff626f3e6b8a3d782cc7d392a72a5,2025-05-09T19:15:57.370000 CVE-2023-52060,0,0,916b6d0023ba25356201b349f9585af7af15e0ab89951480565e91e01992b734,2025-03-13T20:15:16.240000 -CVE-2023-52064,0,0,cdef612cbf98d13deb7aa4b99c2c8a1e376d46e030d189acdda80c813318fa18,2025-05-05T18:10:51.717000 +CVE-2023-52064,0,1,84a03cadee2ac767013f9e98ae0f6daf49428eeefcec560235e446723d15bee7,2025-06-03T15:15:49.073000 CVE-2023-52066,0,0,09340d84a37f64a7d281f33481a88c11d08d9b9bd7b6e5fa961539ad3a21cbc4,2024-11-04T19:35:02.827000 CVE-2023-52068,0,0,7ecac2896ebd66625aba5f276e9edc1208d7d8cbeb72808da2150f1beda62c3b,2024-11-21T08:39:06.050000 CVE-2023-52069,0,0,cb766f3ce59eaab19dc14320a95af22e4429e8b1bf17c2b999051f5953ca169f,2025-06-02T15:15:25 @@ -241224,7 +241224,7 @@ CVE-2023-5207,0,0,ef2c43a59a01bbaf7d89946b8ee60b66ebea7013b82a60d36b9f98785d4ada CVE-2023-52070,0,0,250134024d350dfc154d8e35b8085d7897bef84e646a77739f4c15d2bc8cf353,2025-05-27T14:20:46.280000 CVE-2023-52071,0,0,812221a84c238215dcedea186e9ad0947ed6c219cfb74718c68ca339bd585423,2024-02-23T09:15:21.867000 CVE-2023-52072,0,0,da47f0f32ccc3973848e15cd0c301535b950c574a4913e948e1c17e24c6846fa,2025-04-17T19:15:58.003000 -CVE-2023-52073,0,0,b9136ea3af198cbdf796cb0d3bc5aed82611b5a0ed26b992f6082397cf3bdade,2024-11-21T08:39:06.797000 +CVE-2023-52073,0,1,bf3a80a7f116b0237280e58fd1d5955464cfab36093fd51e83f88ec763351be4,2025-06-03T15:15:49.393000 CVE-2023-52074,0,0,8c8a30c4bc95b4cc098140e899189032dc53c8e311db85ed0acff923c7d4273b,2024-11-21T08:39:06.930000 CVE-2023-52075,0,0,6cb7b154b23a7ded2e6e2ff32f253a0202b2ab2ab046e1434391aa5436f4d8b1,2024-11-21T08:39:07.077000 CVE-2023-52076,0,0,16004d644550cb5d8dcf358a683e5a43d21402d3ab67056829ed5a1140278995,2024-11-21T08:39:07.200000 @@ -241399,7 +241399,7 @@ CVE-2023-52267,0,0,7fd7ab95f822f1e651ef1bebd48ee09c578c250a3336618df2106c77d6afb CVE-2023-52268,0,0,1b0b7ef0d2fb72f2b7edf19b6fb3b5739c81bf28748d5e8b0a3b8a72f706dc87,2024-11-19T17:35:07.247000 CVE-2023-52269,0,0,516d533dfa8c6290792f2090b24908b8159d9155695f920b0fcb2ab9af69ccb3,2024-11-21T08:39:29.960000 CVE-2023-5227,0,0,8ee9136d2a0ef8c8ed9ac4878403fa3e57059a535434f53ef241826854e5d278,2024-11-21T08:41:19.890000 -CVE-2023-52271,0,0,4c6f638ce55a4a6c6467286faf780981fac1225cb835c04997cbed9387d4fcaf,2024-11-21T08:39:30.110000 +CVE-2023-52271,0,1,9450777f6bab9253fdfdde21c15fda563de571b75640a70b87ae0ec1c3358f97,2025-06-03T15:15:49.577000 CVE-2023-52274,0,0,389a55c83cac3864063dca6e30624c31edc3fc644e9a642bf4297a65364264d9,2024-11-21T08:39:30.250000 CVE-2023-52275,0,0,2151576f50a8628bd0153b6e4823546d8cc4d670c3ade4063acdb22c78bbd81e,2024-11-21T08:39:30.400000 CVE-2023-52277,0,0,92aed5c74319ac5b3416260f2ad92570a8956ebbd61f72e98fe27de424fe9f4b,2024-11-21T08:39:30.547000 @@ -241437,8 +241437,8 @@ CVE-2023-52319,0,0,e326bd10ab372e5dbfe110c4a0b261c9e4031b82a33e178aef38287157eaa CVE-2023-5232,0,0,49a427ae480ae124affbf449399e7da8cb8fe56219272eccdd509d95d18e123f,2024-11-21T08:41:20.480000 CVE-2023-52320,0,0,a2e3835f942e704e7c041ec1f0aca2a58e4519b09723d16cefab2c2944110b3c,2025-03-17T15:15:39.447000 CVE-2023-52321,0,0,38b2d25260232018ddee415ea22e9f2d56eb76e7ddf63e8dc4ce3183ee974844,2025-03-17T15:15:39.493000 -CVE-2023-52322,0,0,5a514ddc56e42aa70ee9fde3f16bc6524f527a148576f5d3847f0bbcfaac59b3,2024-11-21T08:39:33.753000 -CVE-2023-52323,0,0,08475ca63860bd34bf2ef591b2be91ed9160e70b5e3785d352a5c423089d5803,2024-11-21T08:39:33.907000 +CVE-2023-52322,0,1,a5429a785cf794898960cc594d0b7285dfcdb4ce1060e97708d12002504b5983,2025-06-03T15:15:49.910000 +CVE-2023-52323,0,1,5047ec1eea863ec22a1711a690094809ecbf2819ee94889ef05f8b413d77b71f,2025-06-03T15:15:50.097000 CVE-2023-52324,0,0,8219fd3e2b91a9351d3ad6f2b15c51b4ed6abf5e2c2be2e8d09079b7ee738090,2025-05-30T15:15:27.220000 CVE-2023-52325,0,0,f5525f43f03162b910035324e34ab7fb2c2ae44212abd9e4678019af952a10a3,2024-11-21T08:39:34.187000 CVE-2023-52326,0,0,da19caf54b4b9c6f0f2871573057ccccaa3ece34653376422ad5d13e167c6c07,2024-11-21T08:39:34.327000 @@ -242651,7 +242651,7 @@ CVE-2023-5687,0,0,3071b13cb0224a4d20066c8ec03aae14cd5b53716e40c1deaa28975aaf0e82 CVE-2023-5688,0,0,549773e1096b04f34ec3d765f54a0c2c43cbe676834aed190451a95caa6d1670,2024-11-21T08:42:16.997000 CVE-2023-5689,0,0,2cc06f9fb4292035a09e277d3f1eb4eff318f6f587969fde503798e5c1a37adf,2024-11-21T08:42:17.120000 CVE-2023-5690,0,0,f8b40c9715bf5dd95b1b5c0c4166f5da18a1380b3f4ebbc19555a2407b4f7557,2024-11-21T08:42:17.250000 -CVE-2023-5691,0,0,dcfbe832ed08c31a747dfe917168d7b6c8c6dbbd84ab3a8a01bdebd30d316774,2024-11-21T08:42:17.377000 +CVE-2023-5691,0,1,cad0b716247395304aae37db80b33d1afee4ecd338f1480c80bee01edb0c360e,2025-06-03T14:15:36.070000 CVE-2023-5692,0,0,ee1bc9665539fa3c6543adfed40072b05d16ff7afd002b2b7851687fa2cad8a4,2024-11-21T08:42:17.493000 CVE-2023-5693,0,0,03536d2ad3aa023e0e97f8aeaf4edfa883bcdf98271b63d0efa4208e6040b9d1,2024-11-21T08:42:17.610000 CVE-2023-5694,0,0,095e3aeeb1daa8040d178707c8227112fa51f03aa18959a4ad2dd1117d73a6d1,2024-11-21T08:42:17.750000 @@ -242829,7 +242829,7 @@ CVE-2023-5873,0,0,4565f2533b7873e9d8c2b04e4c698be6f096a14e4af834fe7cfce2c09e4910 CVE-2023-5874,0,0,dd61cd67fed13703f808971419d344cc716cf5ad7d139407d0801a023b6cc735,2024-11-21T08:42:41.227000 CVE-2023-5875,0,0,f1f7faebc6ba4cb15f28cb7ae4bdc4c183d92d4775c3240c6986c2275f2b5151,2024-11-21T08:42:41.340000 CVE-2023-5876,0,0,7092fe874093e7c748a8690b4f8d200e8010fc692198617a50fa4e0b81b9ccd1,2024-11-21T08:42:41.470000 -CVE-2023-5877,0,0,73ceb7d5aaf8d15835a0884caddb22352416a5e9bce586b5a36f1744f12e9b5c,2024-11-21T08:42:41.620000 +CVE-2023-5877,0,1,2b875eabd603b87069a73f1d773896abb133ed482491f327633935c9a61996fd,2025-06-03T15:15:50.457000 CVE-2023-5878,0,0,4e98f97b1003305f5b621753411aa2b80b4584395725c691e3d319177faea9ae,2025-02-18T19:15:11.780000 CVE-2023-5879,0,0,fcf4b86da110819690859211077713888e893add9d5e42a19026356852c20925,2024-11-21T08:42:41.747000 CVE-2023-5880,0,0,89b89a6d3786a30714c59d15910e2f7c5af54e211b13f29d200705d6dae8f949,2024-11-21T08:42:41.887000 @@ -242986,15 +242986,15 @@ CVE-2023-6037,0,0,10c87d0771ed355c76b76471bb64fea437b08dedd593c478e64e1dd1e6d946 CVE-2023-6038,0,0,38e21c217a90ed33859cada982cbe80c168d919c2fafa2a5ab02f324a89741ad,2024-11-21T08:43:01.400000 CVE-2023-6039,0,0,5850560424a6fac744afad862c21a0ff5137909114305ba93dbfba8a32223798,2024-11-21T08:43:01.540000 CVE-2023-6040,0,0,2c5b544532b5161e18a2ab1fa95a6915936274a3b5c0947bfcb8db0ac1b54bd9,2025-03-20T16:59:40.090000 -CVE-2023-6042,0,0,770a83e8ca4c04a38df95021dd3bfa1c21160c8069b93ca6ec030276dc95f0e6,2024-11-25T16:47:33.943000 +CVE-2023-6042,0,1,5a6beb1982277055638d84970fd2ebf10d5ed02f98ac1b82a1a894a223cf81e3,2025-06-03T15:15:50.620000 CVE-2023-6043,0,0,4d42ba0e4248fe66359ed05a1105448d1de43c6b28a8a42326e051bf553c2cb4,2024-11-21T08:43:01.947000 CVE-2023-6044,0,0,8488b0c2d64eaa394ac1e3ea1a8d07bf823d734aa681fcc8f9f80375294cb645,2024-11-21T08:43:02.067000 CVE-2023-6045,0,0,76a475eac8826ed563f079c0db54754b4e53e106a6075c3fd8ea1a519b7171fd,2024-11-21T08:43:02.177000 CVE-2023-6046,0,0,83b94aa63a7eb00bfbac001e7c18dbf142feb1ad6b62ec50413f35175e462282,2024-11-21T08:43:02.283000 CVE-2023-6047,0,0,868eb42a71d0149629e023fc0079068a8fb59df13b2c61959658fd336ed1c500,2025-03-19T14:28:26.253000 -CVE-2023-6048,0,0,067012cb654f53d5db93a1350dd348e4f2947ac9ac3b7fa72a8e5d0708989146,2024-11-21T08:43:02.490000 -CVE-2023-6049,0,0,481e4a5d6e72e8ce41e29e3b424a68dbe30b0171d92f9fc9f17ac971e6297e1e,2024-11-21T08:43:02.593000 -CVE-2023-6050,0,0,60c3b462fc30a652d1716b02c3dad5506b3f869a4b27869644e1d4ff3ddb9858,2024-11-21T08:43:02.693000 +CVE-2023-6048,0,1,8dcc631672e0881734390a3bcf8bb92b5481f9694c5a48003976aa8a3b8cc9d9,2025-06-03T14:15:36.313000 +CVE-2023-6049,0,1,65f146e0176b9f315eaa71d39f97f43c7d7b2d88f9f72a13b192748fc1a37bfc,2025-06-03T14:15:36.510000 +CVE-2023-6050,0,1,77c67508d3d74425569667270d862898280cd297828142ee93108b7fa43c5b05,2025-06-03T14:15:36.733000 CVE-2023-6051,0,0,2a891be9424c0c3c1db0f2436feb83a8fe230fee2d58240c1717bdb64d3857d0,2024-11-21T08:43:02.800000 CVE-2023-6052,0,0,53fb1b56b05a6845ccf9f26bdfc53c191b6187cfb34c117b1a6b04f1a3c29289,2024-11-21T08:43:02.920000 CVE-2023-6053,0,0,30ea7128291182122385d11847e8be068ff4d1bee160e39a5f53ecd344ca3d15,2024-11-21T08:43:03.053000 @@ -243081,7 +243081,7 @@ CVE-2023-6135,0,0,1f8e012a65e6eeca4456aa6063abc00d29d85d43d7090333000c5dc17c6c09 CVE-2023-6136,0,0,45ce3a717bfcce01e5d1508d612e82b002f81783c9b8d7e99cab5bd7dcaaaa65,2024-11-21T08:43:12.523000 CVE-2023-6137,0,0,e3bd038fc131dac2a0d7e6fb77f1fe795c09c7d5d92e7805b4e9c88d3439987a,2024-11-21T08:43:12.677000 CVE-2023-6138,0,0,9fbc5a5afdec0bfe4fff9400344e979b612031d89d48c359c46849648544488c,2024-11-21T22:15:06.777000 -CVE-2023-6139,0,0,ca93103786808cb8a49c99163ce6bb9655b86c53d74b6021274be9b445ac0875,2024-11-21T08:43:12.943000 +CVE-2023-6139,0,1,93c5808c2715b44d9dbae56ac4e90de53b03674e795a7758ed62ffdf43cdee3a,2025-06-03T15:15:50.827000 CVE-2023-6140,0,0,e3f0b49aae0dbd8083c5c583d409a770ec4ec9ed99dba52e90bd841d8a40d619,2024-11-21T08:43:13.170000 CVE-2023-6141,0,0,e34f444a7cad88ae42deac54928af564d316c3382aedfa473cf22cf569675e69,2024-11-21T08:43:13.980000 CVE-2023-6142,0,0,c98f27a5a63484f472a268d83da1ea58b0c3135500f6934b255bd59dfc593f9d,2025-05-19T14:15:21.667000 @@ -243100,7 +243100,7 @@ CVE-2023-6154,0,0,d63fadf1273c1f5006b1e71d031da07df6c758a25a6405e0d285b451d9f682 CVE-2023-6155,0,0,1ca87508cb212f6d9790e674b5d5fb3e5fe5e4d0394f74f4a00e7a64c2414cf6,2024-11-21T08:43:15.900000 CVE-2023-6156,0,0,5fc02ab61cd2ed718511f530b9ea72a65257db8373765178bea2f68bfe851dc7,2024-11-21T08:43:16.090000 CVE-2023-6157,0,0,080d6cd4cc425a0afe05178fb35b017e8e858b49dece9cd4a0bbac63bc23cea1,2024-11-21T08:43:16.270000 -CVE-2023-6158,0,0,5c7c192e38b041f6a19fc7c14e16ff9d87ad988ac0e446c258208d630de0b397,2024-11-21T08:43:16.450000 +CVE-2023-6158,0,1,5d5c75a44d75ddb6195e5041513e2cfb5614b8f718ceb15f790e06f6777c1804,2025-06-03T15:15:50.993000 CVE-2023-6159,0,0,267ca5e8b86acd22eae5e8507e284e28e024960b25212ba7e8a55dfdd4a59ae6,2024-11-21T08:43:16.580000 CVE-2023-6160,0,0,120d064e1078ef21ebae8d628d0427ec7c55f80773b38dc89d07e36d52c35e0e,2024-11-21T08:43:16.717000 CVE-2023-6161,0,0,f3edb5d2f57bc23de1bebbbb38f32a23d08c15db099a50cf3dfe50ede0913ad0,2024-11-21T08:43:16.843000 @@ -243150,10 +243150,10 @@ CVE-2023-6214,0,0,6f3433661378c99c919faf9765a3284bbb5cef0c55192d3e277278d0823236 CVE-2023-6217,0,0,9810ecf6c59d7329e827cb6762f25b7a286bf752aa3fb224aef47a9922d524e1,2024-11-21T08:43:23.267000 CVE-2023-6218,0,0,6b136ed227e6d9a106a997506bd0ab6d1193880266b28ad779eecdafbfc0d320,2024-11-21T08:43:23.390000 CVE-2023-6219,0,0,234e803ae44ea198b1c5cbc3f7d287ef9f28d26cb17bcbe2e74596b21799789c,2024-11-21T08:43:23.520000 -CVE-2023-6220,0,0,ec0ce1c875c147be40326aeb859f616e32bb29f24b45251695062f0ebe8752ba,2024-11-21T08:43:23.640000 +CVE-2023-6220,0,1,f2d97d403181d975445a9702faf42b0ee8dd0f5d46939eee7ca61f5713ad6b3c,2025-06-03T14:15:36.930000 CVE-2023-6221,0,0,5dcab29b7240413c11815c5b685cfcbfeef08dca950bd076682ca96372a1c5d9,2024-11-21T08:43:23.773000 CVE-2023-6222,0,0,34699e42e1c91b1c43662e6be016387f02dbed126964709fe0e62e80b0a03068,2024-11-21T08:43:23.917000 -CVE-2023-6223,0,0,65192a2be8646a50baf715a10d0bcf75b33694f9b5882941b4e4bd2f4307d43a,2024-11-21T08:43:24.110000 +CVE-2023-6223,0,1,df463eeeec757cc83a70546c300d3921a8827166b3d5e94400d23740ca752249,2025-06-03T15:15:51.153000 CVE-2023-6225,0,0,8b56a92ae234f25dbd37d1f5dd5a7bf531c2ab8502494e71ef35077655c40024,2024-11-21T08:43:24.237000 CVE-2023-6226,0,0,c656a17970e7cb376453f8e8e103c562385f9f2401b3c81719a81d20638dcf36,2024-11-21T08:43:24.353000 CVE-2023-6228,0,0,199b4763994656cb0c21d4c77e6f9fcbf9c283904f91554de41cea33d12d23ba,2024-11-21T08:43:24.483000 @@ -243170,9 +243170,9 @@ CVE-2023-6238,0,0,95209c564a0593710dfee71136d3bd0a21ebd111bb3b66b72e39616dd9c42e CVE-2023-6239,0,0,23ec102c48637724d1f8f19a9b5527f1e263273c714e62310ac3c85295bb0d07,2024-11-21T08:43:26.313000 CVE-2023-6240,0,0,d3745d29035fc7070a9c7004aca37fcbc936cb1c4066d5a2c66d8dd89e5a5cf1,2024-11-21T08:43:26.437000 CVE-2023-6241,0,0,dcf1599476a36ff5efb8599271918b4115cc8bafbe33827ad5197468c0e6ec55,2025-03-13T15:15:39.600000 -CVE-2023-6242,0,0,2b00744b5b722242e7ce285a7048179707e39658b19298917feb7bca95bae5a8,2024-11-21T08:43:26.727000 +CVE-2023-6242,0,1,8d181b240007fb22f96ee7e973b2cd7e7c0c1b7f561dd1517e7b76dacd096a46,2025-06-03T14:15:37.100000 CVE-2023-6243,0,0,a958e472f97b481b072e99316972b16cf8edc0cebea4b62612eda4f001f26a95,2024-11-01T15:26:34.970000 -CVE-2023-6244,0,0,8058cc2920551000e4b6b762fe446c0df14f4d39d9046ee18f6509c25339584a,2024-11-21T08:43:26.927000 +CVE-2023-6244,0,1,6119f534c3f08dc45174d8f1c94e28283683b6c5612fa1b6a7c704abe7b2715f,2025-06-03T14:15:37.283000 CVE-2023-6245,0,0,86ad3c799cca921eea11c9559eae0401f064a4ebe34dfdc5bef5d093c5e44eba,2024-11-21T08:43:27.050000 CVE-2023-6246,0,0,95971c2d561c34e86e5f6f8d8778f25efdd22a29156440c4c1080fae60ebb497,2024-11-21T08:43:27.197000 CVE-2023-6247,0,0,2e8f45b275b1e8e03e30fbc6dd95842afc6b75dfe8d1ccbf5a63f250b926d164,2024-11-21T08:43:27.387000 @@ -243284,7 +243284,7 @@ CVE-2023-6365,0,0,a5467049004f34f0bfbf9b8cf991cfca9762e275783f2368d5559f0a9ee778 CVE-2023-6366,0,0,c81700b7298857b773609357411d7cd6d0b02ac8393a73ce8a6606b05ba2d9f3,2024-11-21T08:43:43.047000 CVE-2023-6367,0,0,13d76c3bab03b632a5ac104354ccaddbcb44c50528fde449f747852266366fe0,2024-11-21T08:43:43.187000 CVE-2023-6368,0,0,bf6668ac323ef0210a0c6bf92cbf9c53c3e0681603d7ddc432cc49d166d104b4,2024-11-21T08:43:43.327000 -CVE-2023-6369,0,0,0684710d5098cb455bcc0c897289ba2b2e7af1dfe38f32171dee435c9acf05ec,2024-11-21T08:43:43.477000 +CVE-2023-6369,0,1,1775e2da4d5e6f65d57bc57eb2a92283b10c2d35f09fdb9544f30e4ba5dbcb36,2025-06-03T14:15:37.713000 CVE-2023-6371,0,0,bdf202c7e40c357c6b073175b5c7e7998f357cc642b231c8ed78a6a3a7f4c6ae,2024-12-11T20:26:05.660000 CVE-2023-6373,0,0,ae50e94c3438b36e9a3ebda05fda95ad4b2f8a3d74d2aabbf5139492357e4296,2024-11-21T08:43:43.753000 CVE-2023-6374,0,0,f1c2acbe939f89ee3c3508fc2c9531a95e62ba35a3ad0a73f40eb373fea33793,2024-11-21T08:43:43.890000 @@ -243399,9 +243399,9 @@ CVE-2023-6500,0,0,bec47075df0cbe609ff10fff5ee6f4906652b23633d65e9d1469bc6bcf8a5e CVE-2023-6501,0,0,6f2dc2709e1b57686a19fefd5c1e1fcc332f27a18d730116c38d63c3bae6f271,2024-11-21T08:43:58.757000 CVE-2023-6502,0,0,5e7a8b2091d4a37ad266a08e313a593b848022dcc218baabffeee78d247bdc81,2024-12-16T15:02:44.123000 CVE-2023-6503,0,0,2d5c1424ed18e9dd785945146151ea8b1c4510f654a5483a2962a659987e5f4a,2024-11-21T08:43:59.070000 -CVE-2023-6504,0,0,8e655520d7536acf89272f10beaa18e7e4dffa257788006ae7916faa3a5ccd1f,2024-11-21T08:43:59.267000 +CVE-2023-6504,0,1,9c5032181cad12a3536cf687f67426c67797daba0dcf341485f84434cab2bee8,2025-06-03T14:15:38.090000 CVE-2023-6505,0,0,954651d154db76177d18b36b315a18c42ed03916477a417e4bdfe342dbafb892,2024-11-21T08:43:59.383000 -CVE-2023-6506,0,0,25b297636b1a6c9de482250fb2a6d9d42c7333ece9ffeaa66b16fd2a77690525,2024-11-21T08:43:59.500000 +CVE-2023-6506,0,1,1e27092831dab6984dc39000c37e2ec93457d3bd2a78e548cb1c324d2afa5208,2025-06-03T15:15:51.403000 CVE-2023-6507,0,0,9f93a063813bb95f6366bfd10c33611ee5f1a1e3c625fdfe9a2ab6bea0f24351,2024-11-21T08:43:59.623000 CVE-2023-6508,0,0,06890a5d3d2912af751c636f5f39bbbf4acfc1ab4901c4449366a89d5994cfaf,2024-11-21T08:43:59.780000 CVE-2023-6509,0,0,4ee41e5ecde626ca24239c44adf44fa9a4cb98664b000e4ae17efb97d9fc2334,2024-11-21T08:43:59.947000 @@ -243421,7 +243421,7 @@ CVE-2023-6524,0,0,52717d9b94b1d98190c25f795880fd21d413e1cbd68e94baf71389434c2531 CVE-2023-6525,0,0,e512780e9c702981f55ac0ecc6a0aab39a371fc823678e4cae8ed313199ee495,2025-01-08T18:14:29.763000 CVE-2023-6526,0,0,f8f0d865119e82482403f18e9a51af7f31b616d1332e44468383b613e24fcf9c,2024-11-21T08:44:01.927000 CVE-2023-6527,0,0,f83b98db9940fc2d07ac6bee8934ba7dfadea973059a49837e3f07772d0918a8,2024-11-21T08:44:02.060000 -CVE-2023-6528,0,0,e5808da770e68ec72828be023621b1cdae2dbfcadf3e368652daf09efc602185,2024-11-21T08:44:02.193000 +CVE-2023-6528,0,1,46b02e314107366ecf039e539daba0be4205f56ce2c228a615126f74d2c12f12,2025-06-03T15:15:51.557000 CVE-2023-6529,0,0,240c5593c284be620aaef4c418f20fc5ee1fe4c5e2d8935497486f145436ed9c,2024-11-21T08:44:02.310000 CVE-2023-6530,0,0,39aafe339a8028897d1da4f92b11d8610d15c57fe75f40d3eca003d90d0b4206,2025-05-29T16:15:31.280000 CVE-2023-6531,0,0,2d6149ae0c8a10dbdb11207763b3720a41951691f853d6aae900ea62fb8245ce,2024-11-21T08:44:02.570000 @@ -243440,14 +243440,14 @@ CVE-2023-6546,0,0,98b68a3af0a15a0068638f07b644dc53746c858334baf86a98026fd937105e CVE-2023-6547,0,0,c4ff98e3248f31fa63347423d773a8919d562297a8c0e91051d8ff227b9aa16c,2024-11-21T08:44:04.430000 CVE-2023-6548,0,0,b0563c71e3ad8eb527a1874d973561f03f4bf45cc435c7c128fb5597bc1e0276,2025-01-27T21:48:11.423000 CVE-2023-6549,0,0,7e11c8fad52973603e3179d94ee1a295e8e310b2e5cd407c1b678726c90dfeca,2025-01-27T21:48:20.317000 -CVE-2023-6551,0,0,5e214e3aa8ff5e3f715af97a368a9a2e558b8da4056b867a432250e33fd7a623,2024-11-21T08:44:04.863000 +CVE-2023-6551,0,1,f6367aaf5be7cac489faf4cab3df28b303212f8a516d4877944ff588c002af40,2025-06-03T15:15:51.720000 CVE-2023-6552,0,0,d8c38a4ba7af99600fe48e8b6b6ebb343d60587bf3e5eb12ecb9ac12119f9fa2,2025-04-17T18:15:46.510000 CVE-2023-6553,0,0,9fe6ba65a0d77010f186caeb0187c109a6bf56b37171f408dec2a79762549a40,2024-11-21T08:44:05.137000 CVE-2023-6554,0,0,96e3d97587e63f20c07acb165d3061a20c8cea7f350aba251197c5f784ea531a,2024-11-21T08:44:05.283000 CVE-2023-6555,0,0,22429b14c8099a949fbf3427000dd3ee1e85d66c4f6a2a0eedb4f0442626506f,2024-11-21T08:44:05.410000 CVE-2023-6556,0,0,a8c0fa8ede1b67bfc76ae3ad4b01a4c4319fad35e5789f455549acff72591786,2024-11-21T08:44:05.523000 CVE-2023-6557,0,0,52937601cacb562c92a69023b43bc3dd3b10e49d6482d2700c5b2e7b88165d00,2024-11-21T08:44:05.653000 -CVE-2023-6558,0,0,cd0f7c71fb3c17a745aca1b38416d4221afbdd4be6ec8f2bad8c5f39310f6d6b,2024-11-21T08:44:05.787000 +CVE-2023-6558,0,1,03358a8f6f7af5f2bcc93fee47c848bdf3900de2ad68347206fe0b920ec4e695,2025-06-03T14:15:38.260000 CVE-2023-6559,0,0,2606a804296e02c729a34e76c38e75dc0da9eed539339298716199ee141c83c5,2024-11-21T08:44:05.913000 CVE-2023-6560,0,0,35aaf7e82d716e6e5c4e58cde3963dee7e17f71db9a98296f1d87179f3db08b0,2024-11-21T08:44:06.050000 CVE-2023-6561,0,0,1be0360627d55bb08a8e0cdf24f754177a21066cc59c1c91f4d148b22e0de641,2024-11-21T08:44:06.200000 @@ -243485,7 +243485,7 @@ CVE-2023-6596,0,0,04634fa2c86fd88f678ac8182593f2b5ce29771b9dd5847925e698b6bc39e7 CVE-2023-6597,0,0,89b58fa3929cae1473acd78809c36d26c8296660b8913ae3a27336303cbd4900,2024-11-21T08:44:10.463000 CVE-2023-6598,0,0,6053f14e270dc7076cdc46c9acbd31f7f0ee707160eb4a14b11a84dc8ad71002,2024-11-21T08:44:10.607000 CVE-2023-6599,0,0,b0308b9ca19634b3fb537e54bec970bdcf5229a8d791c9c7b7b83a8cf17b1088,2024-11-21T08:44:10.740000 -CVE-2023-6600,0,0,2434010c942a6205776298fb5a7e14d80ba060213c80be479cc1c00dcc02dd91,2024-11-21T08:44:10.873000 +CVE-2023-6600,0,1,890566cd2e8f1a0dded0d670df6a0dd429e50abd2f4191c65e77f2ff2a13e26b,2025-06-03T15:15:51.917000 CVE-2023-6601,0,0,db14bd55698577943f9024a246116c6d46b26eb1e57b3a7eb0ccaa8ee9ebfc64,2025-01-06T17:15:14.217000 CVE-2023-6602,0,0,e0877473547f910a8588ed11eb91ba8b3675748d9c2594fc2145bffdfbe00648,2024-12-31T15:15:06.240000 CVE-2023-6603,0,0,9aeb997ea554f48a351013a629215d389c56876326bb96fdae1efe8e5cbc8376,2024-12-31T15:15:07.490000 @@ -243518,11 +243518,11 @@ CVE-2023-6630,0,0,9baaec14deaa0d4c280d09899b9df460d60de4671a97e63673112926364cb1 CVE-2023-6631,0,0,d65a876fea60cbb966ab4a3c78ebf3e505b13dea7efc69a9b29acd9ab40c5bac,2024-11-21T08:44:15.150000 CVE-2023-6632,0,0,b1c54670c8f8c580830f651c478abdde4fbaf49444ee1158170f1e733bd09850,2024-11-21T08:44:15.300000 CVE-2023-6633,0,0,8de7c9ebad96e1b1e63f7ee0917437d9c45b07d67508fbd0e4ab2d9fea33ad99,2024-11-21T08:44:15.430000 -CVE-2023-6634,0,0,f2e5051ef8f86e80e07477a7a34def5b903007503bb3bef3a86e6032f5c03222,2024-11-21T08:44:15.633000 +CVE-2023-6634,0,1,4af0f8971e0f53e2ae5ef41811e9e37b2a73aed3245e588807fa0f78f7b0d874,2025-06-03T14:15:38.520000 CVE-2023-6635,0,0,b930d159660c5d2dffbcce188a715975fef9441e89d59344c487a6ad08f8bfaa,2025-05-15T20:15:29.143000 CVE-2023-6636,0,0,429cb004753d2958d8159d67d03a4c3da4034ff661609c524ad4820a55c5adc8,2024-11-21T08:44:15.893000 -CVE-2023-6637,0,0,658a49059cae63311affd21fa1606543afd182ef89cebe04c989e779114ea7dd,2024-11-21T08:44:16.027000 -CVE-2023-6638,0,0,f3b7729d9690cdf79e7af1a70f8733fc6e0ac86a16db8e9baa0550ae1589413e,2024-11-21T08:44:16.170000 +CVE-2023-6637,0,1,7c52b1639bf05012c19eced66616ae6b856e66a997b8457370ac22577ad50c58,2025-06-03T14:15:38.693000 +CVE-2023-6638,0,1,8202a3e7efa91557985af40a6a0d3f94586e929450e1bc51f40a6c7f47210d9b,2025-06-03T14:15:39.293000 CVE-2023-6640,0,0,4c1de3385a32f286c0b75b0b253dae7e11e4d89cf203bb099ad3f58f6c385c6a,2025-02-12T16:52:28.897000 CVE-2023-6645,0,0,18d7b1db6d45d511489f0088fbcda1d70409d9803c5553814d8e2b60fd676b42,2024-11-21T08:44:16.430000 CVE-2023-6646,0,0,43309576514af4cb07e93f126e0f158d82b8629e3c47d5943302d08d30997d61,2024-11-21T08:44:16.600000 @@ -243552,7 +243552,7 @@ CVE-2023-6680,0,0,c5ebb765eb58422ad2a1705f900d6e487ec280b792c1875e94c130510d5cd8 CVE-2023-6681,0,0,91563fb598452f1c3484ee761789db25b2163bbe2e240203cbbf2d313053bbda,2024-11-21T08:44:20.090000 CVE-2023-6682,0,0,e5f52769cb0df59da632712a20fc3a5019a15366395589044f5cca544e417af7,2024-12-12T16:34:32.097000 CVE-2023-6683,0,0,2bdb354cf02c0c4d7da52cc2f5b9bf3dc195b2a8a0f750e60f3de3f2eab108a9,2025-05-02T15:10:54.503000 -CVE-2023-6684,0,0,077aa23593860d2811e2eec2f5b3b49e9dc6e8fc11783a007b7a12730a0938d5,2024-11-21T08:44:20.570000 +CVE-2023-6684,0,1,c44888465b29457f5dc48fe9492d3bd30362fea960a9bfd20a3ddfe94d9c6b6d,2025-06-03T14:15:40.577000 CVE-2023-6687,0,0,3d3661beda757389237f16a8f5299e52a2c9157ad3825608cd2860f3616f9968,2024-11-21T08:44:20.717000 CVE-2023-6688,0,0,d3bb8809ac7ec300c23ba3bd9b118a2caeda400dec41170962ba5dd127422cc6,2024-12-12T16:22:38.713000 CVE-2023-6689,0,0,d064cd3541f8f9a340526a7829ef4e84ba2f9efc7cb13be1ea622126cf308037,2024-11-21T08:44:21.947000 @@ -243678,7 +243678,7 @@ CVE-2023-6825,0,0,845f3b8dc7ab11e1c2ecb4386382902354586f757829a438ba42c0cd37e618 CVE-2023-6826,0,0,b208dc6477e1edbb2a5c9b182cdaa4613958a196948adf4df4f3ad9a78b515f1,2024-11-21T08:44:37.730000 CVE-2023-6827,0,0,d8f0dad984c43b91bb182c8fe61ef45b35e904037fc9f7210557988036ea909b,2024-11-21T08:44:37.870000 CVE-2023-6828,0,0,8fb23e4ef37f948a57aefc44f8f73503347dc7333cbded170377d64198955648,2024-11-21T08:44:38.010000 -CVE-2023-6830,0,0,d4d5f3c6eb595b3babab0a45eecc4c610ba0ea34741824580c45b653af02ca34,2024-11-21T08:44:38.137000 +CVE-2023-6830,0,1,ad20ffd28d74fbe6027aff6f3fff7f3b002c2a3c419fdf2cd9d049d47f30c873,2025-06-03T15:15:52.143000 CVE-2023-6831,0,0,8c4d00ed8997b091b2afa2c22cbacedf6ddf6aae72da3420274d0bde04c1fffb,2024-11-21T08:44:38.267000 CVE-2023-6832,0,0,6a90580492f9d38df9fd6d1827ce228df2bbc5f49746cd9544810f80933154ce,2024-11-21T08:44:38.407000 CVE-2023-6833,0,0,5b3660cdc42820823ba7a126010a2a7497c2a7133a3e273438edd05670d71c65,2024-11-21T08:44:38.547000 @@ -243690,7 +243690,7 @@ CVE-2023-6839,0,0,33aa58158b721beae894461c30e7e6926f93c29fdec2cf47a3d03407368eac CVE-2023-6840,0,0,6d546453dbc1e0a3746d923568ce015e06fbb09e2bd08253f5dd212306e4b902,2024-11-21T08:44:39.447000 CVE-2023-6841,0,0,2129d22c894c63018f73c1eef70b7b46b58a4225e676119f0a9ab3a63275c659,2024-10-01T14:15:05.207000 CVE-2023-6842,0,0,c746174de0b6a4058a080b55bc4babb0a03fbc085ff4ee543c2333922d8d2f86,2024-11-21T08:44:39.673000 -CVE-2023-6843,0,0,0ee91a45bfb72841fbbf62833a54745e9715ffbc699c5f10535357e7c998519f,2024-11-21T08:44:39.820000 +CVE-2023-6843,0,1,4008f714102face0335ba9d2a5132e453790b527e529293e8963550c0604726c,2025-06-03T14:15:40.893000 CVE-2023-6844,0,0,b7c30bc6ead1b15cbdaa75d31e178696bf967f2cadcefa85a597cf9570012a4f,2024-11-21T08:44:39.957000 CVE-2023-6845,0,0,92835e0b8e0cba7cb0f677beef46cb67d6b21648e13b453216b8ec8ced218f88,2025-05-16T16:15:27.633000 CVE-2023-6846,0,0,ebb46df2c9f110f7ea709e514c6acced7f5e6f1744abde7c29817e528d0f5b4d,2024-11-21T08:44:40.213000 @@ -243702,7 +243702,7 @@ CVE-2023-6851,0,0,4eec17c71f5d1b8fc317a1c6b3755ece82149b7bfe304f3f9868e00ab0a110 CVE-2023-6852,0,0,b81118f2d8f8ad44cbd787223c17b15971c5b8e1ba9e73411c3129d591022195,2024-11-21T08:44:41.110000 CVE-2023-6853,0,0,5babc6151fd7d30feb4a9b3a83247718deab6560e509daf16221de58f1d2f34d,2024-11-21T08:44:41.243000 CVE-2023-6854,0,0,3310e5d43d2d0d0534b1ddbfc4babe13eb4e7ec4d4c87c84e5cc8acdf0ad0e91,2024-11-21T08:44:41.400000 -CVE-2023-6855,0,0,86dacbada7c7051dd9510f50d1e2e0d70e401ade7305a0d7f806316466844550,2024-11-21T08:44:41.540000 +CVE-2023-6855,0,1,8e555429c4e17aa958f6e332dcf403e0baa9ef3dba0bdaaa3f17eaf21e36b0c1,2025-06-03T14:15:41.083000 CVE-2023-6856,0,0,3b0a4967dd5dff90bb579837388d3357bdcd8369b041c6069abda8fe1c842cf6,2024-11-21T08:44:41.670000 CVE-2023-6857,0,0,8fa9ea6f8160963884d87fb210eba9cc61c252b5cf7187fc84698b52cad9d52e,2024-11-21T08:44:41.833000 CVE-2023-6858,0,0,aab063570721a90c493e96bfdea4860626a405903b914601a395b789f937b42b,2025-05-07T21:15:59.953000 @@ -243722,14 +243722,14 @@ CVE-2023-6871,0,0,511d4882be5db00c394cdfeeb6a4cc1e13661ce1e47eebfbe0cf051a715444 CVE-2023-6872,0,0,521677033aca1dce6a332258b5d43dc9c75835ee9f4ffab4da8af2afd696e21f,2024-11-21T08:44:43.980000 CVE-2023-6873,0,0,11191143d74c70782f4c4c7af6235b3379062eb4b20224b8179127fcaa1f0fb4,2024-11-21T08:44:44.090000 CVE-2023-6874,0,0,7874c25a9da01453ebdee524d3e762543cfd9a546f837538ea948cc463619afc,2024-11-21T08:44:44.203000 -CVE-2023-6875,0,0,e8541b5b76cddb600be511182c1a7b1a3a68b7a9e5b3c38a30625b9f431fec9d,2024-11-21T08:44:44.337000 +CVE-2023-6875,0,1,d3a36dcb01c69573768e69040770ae42451d38267f6f0ffa42a03619ab0a1b9d,2025-06-03T14:15:41.283000 CVE-2023-6876,0,0,f89af48ef5f5504c2e692ad4c07df9536f428f7191488caaa8dee49bae4e0312,2024-11-21T08:44:44.470000 CVE-2023-6877,0,0,fabb8390ccad1bd1daff92a75095fb666b1adbb5bb5a0b20ea6adb5df4bb8118,2025-01-14T20:36:35.477000 CVE-2023-6878,0,0,072a14737a3d37e6ab8da6421d172d02428f32099c58474343ed93f02dcb71b5,2024-11-21T08:44:44.710000 CVE-2023-6879,0,0,f1f96843d103435325ea87c5b8ea2f9b483c450b2865b6a3179b33cb579d60eb,2025-02-13T18:16:11.250000 CVE-2023-6880,0,0,296ac6abd2edfa431631b4239fc0a231b36d76de83e79ada82ef4d723929d3b3,2025-02-07T17:53:27.143000 CVE-2023-6881,0,0,7bfa2ec32b027aa5865ebc07b4feaa8e4b5032871f0c7d9166ef12cdc25a4378,2025-01-23T17:36:24.093000 -CVE-2023-6882,0,0,9bbad07936941d4e1b156f1f177d08f2b37a0f935af4f7f0c2f03369cf66f998,2024-11-21T08:44:45.207000 +CVE-2023-6882,0,1,6f5a732357826149d26a7095b2ffb71484cab9d29ecdc0406f94ccfe8adc0c8c,2025-06-03T14:15:41.567000 CVE-2023-6883,0,0,64f26e18895349d73071ab6a57976a51c6f336b16a457d791e5ce153082071bb,2024-11-21T08:44:45.330000 CVE-2023-6884,0,0,325cb4d80a10c19ccc5abb91aa27cbcec7cb4ede33246224b08e86e585a5e29c,2024-11-21T08:44:45.463000 CVE-2023-6885,0,0,7b845b1be444b4fe79192551fbd6f8334d7b2df6a7218aefd3d22f5c17cc87ca,2024-11-21T08:44:45.587000 @@ -243770,7 +243770,7 @@ CVE-2023-6920,0,0,37a62df40338edf4e2085b1799d12571c2818464eff322f68954c3edf354c4 CVE-2023-6921,0,0,1af211c25f9e58e423e8f924d051d998908e50819ef5769471814b0d4bca7c59,2024-11-21T08:44:50.407000 CVE-2023-6922,0,0,e40b295eaa9baaff1cb86447e5b6e3e7edc0d7c6f4a583d8eb4ae84301658ffb,2025-02-07T01:33:31.247000 CVE-2023-6923,0,0,5a203eb4aa5286863191fba54aacf754f2c6c0e7816ac6f22902c1e5cca1f03a,2025-04-01T15:25:41.127000 -CVE-2023-6924,0,0,005626efa9c2b82f79f958b1e65823ab96777a9824de0ff4e246405ae71a5d12,2024-11-21T08:44:50.747000 +CVE-2023-6924,0,1,57a307082ed46bd92873685e5dc9b4895bdacc463c6f249db46cfe9ad4200d19,2025-06-03T14:15:41.760000 CVE-2023-6925,0,0,3b94392aabe8561b1ec7f8beb3e4f9a709c257b32cc645b90de2b15223c70e1f,2025-05-15T20:15:29.603000 CVE-2023-6926,0,0,62ee2a373ec9807d708305a7019d3a774d2445c898bc9cd0c95b3d686cfe80d4,2024-11-21T08:44:50.977000 CVE-2023-6927,0,0,0a4de019b85ca56d6cc3d66271a034448a6319d621f3a4db272768b8616cde16,2024-11-21T08:44:51.110000 @@ -243828,11 +243828,11 @@ CVE-2023-6980,0,0,7ec27631f978614b79cfb2cd242dd6a9e1167c5e8c04e3949cc9c2f79817ef CVE-2023-6981,0,0,f9532becf10c0ada5bbc774f24d6b259065b9498ec48eac4f2ce903fb819ae94,2024-12-17T18:23:16.780000 CVE-2023-6982,0,0,b436b8f784e0cdfcf4b3ab43fd58644f93c6954f2370123613b993b44f196e4f,2024-11-21T08:44:58.260000 CVE-2023-6983,0,0,16d1eef28b0d8931b7fd26285166996016464f36e78f9bcffebcb62244a14122,2024-11-21T08:44:58.397000 -CVE-2023-6984,0,0,0fa95dc64612e7719ea89f33eda0e2aa98db098f2325bf4f3826261660bcf426,2024-11-21T08:44:58.520000 +CVE-2023-6984,0,1,e0fa827ab97551f5d9a2677481744976fdc52400c656f13ee42f661262ada5d7,2025-06-03T15:15:52.303000 CVE-2023-6985,0,0,39b5416ae5a6957527b54640099225aad98f343d1acd5d58d0525c5a0f009898,2024-11-21T08:44:58.637000 CVE-2023-6986,0,0,35263d0e6a34aba69163da20cf20cb4447c735afc0f09a6f7d85caadaa86a2eb,2024-11-21T08:44:58.767000 CVE-2023-6987,0,0,16d74826a109879523e1dafb7411a0188240cb5dbd8827d31af837201deb1242,2024-09-26T22:34:54.020000 -CVE-2023-6988,0,0,9931f4d5d404cb9698dbfe6146c855ec28f3724a37091e9c357d5891e18bd248,2024-11-21T08:44:58.967000 +CVE-2023-6988,0,1,4e4bdfe1554cab03eda0e14f2ad20b2b1e6e885b5a5682ed416b2d17da2fe213,2025-06-03T14:15:41.997000 CVE-2023-6989,0,0,6998747d29175c6d4c401d212a5cba6b98b86fb42d479aba14d647122d58b354,2024-11-21T08:44:59.100000 CVE-2023-6990,0,0,2e1de2e4261bd71a68f765da05c14775304a5543f23a6ded9bca35b75caeadb1,2024-11-21T08:44:59.233000 CVE-2023-6991,0,0,6fba63e18025ca5ef715e9096ac039fe74f563f01d11647610eb23d7332ffbd8,2024-11-21T08:44:59.343000 @@ -243860,7 +243860,7 @@ CVE-2023-7015,0,0,837f8928d4bacdb4165fbe97df8f427b89ba4e7dbf94ab46f05c311c8bd923 CVE-2023-7016,0,0,f9669269817ff79bd80255e475f39b8d7b628d9f32d8cc26032e9f2535a2efc7,2025-03-04T18:57:43.117000 CVE-2023-7017,0,0,a7d76a9613a406592ea0d3b77deef438f8a559b81e5dbf4800b4015e18fbcec7,2024-11-21T08:45:02.830000 CVE-2023-7018,0,0,1290b1c32659b3fcd542bcca682f3223abc0de7d6b3c98e245baa0204fc8197c,2024-11-21T08:45:03.013000 -CVE-2023-7019,0,0,d5593188720056230c3acf1620e5e2ad03ee71cc5f934f9bd3fe8cb3fa8c2202,2024-11-21T08:45:03.143000 +CVE-2023-7019,0,1,741475462aceef0480ae9acbc4e39e999eb997d3abe3e822490932b890a3187d,2025-06-03T14:15:42.220000 CVE-2023-7020,0,0,39dedb068ab3bc17ad7a6cfb114bacb8abbd36a86d99999dcf7d885377f37951,2025-03-19T15:40:12.583000 CVE-2023-7021,0,0,c90f0d59c2315eb60681259fead187f0526d5fbf18a87677fa680c04abf0c8f3,2024-11-21T08:45:03.430000 CVE-2023-7022,0,0,d793b9f693ae32fd0a45d3959fab9a9e5ee8f315c84fd72288c539700160d215,2025-03-19T15:40:12.583000 @@ -243888,7 +243888,7 @@ CVE-2023-7044,0,0,4b7c27dce7304073dd78a5bb892bf830c509362fae366908279694ceaf22f1 CVE-2023-7045,0,0,98a8774beb494cb0c7248a35a26f93b03e84f08e6386defa76e011922311f01a,2024-12-16T14:53:47.797000 CVE-2023-7046,0,0,5d4c931d9aea160f71b837f0ea5c95e1bbc8655d1b57caa26519037753dd2641,2024-11-21T08:45:07.287000 CVE-2023-7047,0,0,f28612c5562b035b32d90a44d0cf5fe459f404ee856d792a7bb78b40199c9e07,2024-11-21T08:45:07.427000 -CVE-2023-7048,0,0,b66d62789806fd7dd0d2e7878a9665ac16327cb8e61757e4e17b937cac1f1c8f,2024-11-21T08:45:07.573000 +CVE-2023-7048,0,1,51ff09cde878a80e1a805a24ed0ac2d6e734a737473f8809e9bf483bfc2280ab,2025-06-03T14:15:42.403000 CVE-2023-7049,0,0,ad48776440fa4c58e4467f9ec8ff0d044b9f85cfdc3c5ac14d916e66374a0051,2024-08-19T13:00:23.117000 CVE-2023-7050,0,0,f0244950662be0e595748bd6da87277b01574ca0f07a3ec07d8edf520ee4b012,2024-11-21T08:45:07.860000 CVE-2023-7051,0,0,9c70dd7a4649c3c22cc84f30401f726dbe380e4ba931bf463bb05bd0a0fd5375,2024-11-21T08:45:08.023000 @@ -243911,7 +243911,7 @@ CVE-2023-7067,0,0,d703ff75cd0311e2934c68e550aa7f54efe3cdedce6faa928bde998da7043c CVE-2023-7068,0,0,66612add00985bee1cb0a47a183f4ec85fafb21e3c327acc340b0d97270e845b,2024-11-21T08:45:10.813000 CVE-2023-7069,0,0,34c08207af52ed58978c3a450428597e03be145f6a2130e41378d9419807b940,2024-11-21T08:45:10.960000 CVE-2023-7070,0,0,d4f8c7975a3506a7dcc8c4cfe544d8efda7b15b1eb3e3eebf34fdba11847a94d,2024-11-21T08:45:11.107000 -CVE-2023-7071,0,0,48fee3396f888c148a3fc3a5c0899df76aaf5be1af3e416151e1024486b5674c,2024-11-21T08:45:11.260000 +CVE-2023-7071,0,1,f60f3c803bde63d7b882878d79ca913dba396e005e3f7370bbe2b6854179506d,2025-06-03T14:15:42.597000 CVE-2023-7072,0,0,23fa1af2087ffb27192d96427a8ce6f5c19cc93d8c827b357e0e8ace44d8ce0f,2025-01-22T17:40:31.817000 CVE-2023-7073,0,0,85b3734eba0e857f75453bf3ac337fab097371ed1baa19537546b7ca2054c908,2024-11-21T08:45:11.537000 CVE-2023-7074,0,0,291d8c5c534661f5dfaf35a7ff2936d8f8587deb8df66b45ac15b47f998232e9,2024-11-21T08:45:11.670000 @@ -244327,7 +244327,7 @@ CVE-2024-0226,0,0,943a9fde746ea2679c3f028c232c04dd4fa98a62a3466194b1b925f9782c1e CVE-2024-0227,0,0,a4e84e1b9f9ff8bb72dc26c9ff00c9b99f09150a51fa56e523e138aad08ff049,2024-03-18T14:15:07.283000 CVE-2024-0228,0,0,fd96fc161d3d60477c711a5fbf3929339bbdfc61029c2327b7af9a111ceab709,2024-01-09T17:15:12.223000 CVE-2024-0229,0,0,5ca2b2c0bd60bdd487153e220a1232958974705af5fcc61a7dfe7c3bd4ecb7cd,2024-11-23T03:15:07.287000 -CVE-2024-0230,0,0,f812bcc11083994ac682934bd933c8213dc261b0593f6c6767f6fb334f64b84f,2024-11-21T08:46:06.627000 +CVE-2024-0230,0,1,acbd5467b8c4266a5fbc7dea6c985305fc0cd7cc280ccaef10088e2ed6ea48e1,2025-06-03T14:15:42.793000 CVE-2024-0231,0,0,71544c07cf2d665ea915b517c808cc42b5308f1c57a266b2ee76fe0f96d950c4,2024-11-21T08:46:06.753000 CVE-2024-0232,0,0,262e92a8eff0d97ac80a34d49e9c5090de92ad24c159801550ee9096cf11a2ee,2024-11-21T08:46:06.907000 CVE-2024-0233,0,0,2d775dbc62efafb6903af80f3e57ab3523829ba69aef8d027ebe3eb91ae9c2e9,2024-11-21T08:46:07.087000 @@ -244422,7 +244422,7 @@ CVE-2024-0323,0,0,012c43b162f91d6084c80cb64b18a55c4b55dd954daba9bedd6e4c83bde298 CVE-2024-0324,0,0,e2d38446dc7d7a417b9a981bb6249772ea166bef690856e3cc99ca77c6ce8a55,2025-05-15T20:15:31.177000 CVE-2024-0325,0,0,ace4a4c77432bf075e7908c77bf3779d15ba3b48033325228190ef50b39a6beb,2024-11-21T08:46:19.720000 CVE-2024-0326,0,0,4f2afa07e72550f4595fb8c179f6215ac9757cd142cd1e1e0117528682dcf792,2025-01-08T18:33:51.347000 -CVE-2024-0333,0,0,8d02600923b0d02e1b6c7070d1a8ded2d1f193f4c1d7d9ca81e40af9ef96b049,2024-11-21T08:46:19.987000 +CVE-2024-0333,0,1,e7f412431e6d0e16d3b5d873a104eb835ef0dd1929f680fb948a0aa713f0234e,2025-06-03T15:15:54.087000 CVE-2024-0334,0,0,9739f711655d826c400a7f20155e945d56271247c9d6ef10170fd1b34ef501d2,2025-01-15T18:09:14.237000 CVE-2024-0335,0,0,ad5113205ca29b2f8742e9d2c19760bae855fe4340c6c1425f590ec6a288b45e,2024-11-21T08:46:20.327000 CVE-2024-0336,0,0,29ee6e88418307cb76eac16294907a5939d0f088f63097c202d7c40f3061674e,2024-11-21T08:46:20.463000 @@ -247842,7 +247842,7 @@ CVE-2024-12714,0,0,77ca4adc457ee2cb7bcf6b4729e9e3da4bd5b80759ff32cfa0b1a48f0e1da CVE-2024-12715,0,0,086ac6f63a614715bc3ba7cc5f74d04535b93d69419ca1a2a2c4d332775ec147,2025-05-17T02:34:13.747000 CVE-2024-12716,0,0,76fb5b10d1d55e12576bb9ea3415a4aa0dee741e120bfe88d50611e73dc17ede,2025-05-20T20:15:31.240000 CVE-2024-12717,0,0,154dca6e7c3997c611d8bf724a605e850f7ca5cd826b6b3b708c332cefe51032,2025-04-21T17:09:36.177000 -CVE-2024-12718,1,1,d487ececc7bc2ebf8aad00f8f138790d9fd40699572f8596b3ae1e03dc7a989f,2025-06-03T13:15:20.183000 +CVE-2024-12718,0,1,6fce088652208e2d7c34e4b895fe3c4694da9cac740ac054cd16636b621b4763,2025-06-03T14:15:45.190000 CVE-2024-12719,0,0,c34442f4a2a9e42bf0beba4200827e8cdf35e75eae83c71d20db9392843712f7,2025-03-13T17:23:01.420000 CVE-2024-1272,0,0,6fe2ae3dbf4ac28af0ee3734ec3f1128a5e90306284fb984019a39811655512d,2024-11-21T08:50:12.417000 CVE-2024-12720,0,0,64cad461a43fc8f5d0410c610c99186515778fe2e8eacf77eec51f5a2921a1e2,2025-03-20T14:15:18.290000 @@ -250345,7 +250345,7 @@ CVE-2024-20800,0,0,3e1286748fe132681235db9037b419b3f3a64e6b1aea425df63f483fcc64d CVE-2024-20802,0,0,b6ec8effb16bc2b9b150c8b32cf431a5ef935934c449b3d76f10dedb6390682c,2024-11-21T08:53:10.213000 CVE-2024-20803,0,0,4280b86f530ef2f86bc6e20d4c2e8a22feccef2d085d1dbd136842d7ffefbca0,2024-11-21T08:53:10.347000 CVE-2024-20804,0,0,1767e770907a95921ff646eb6c8dd13b0d5424f8b34f8bf869600e8865abe881,2024-11-21T08:53:10.523000 -CVE-2024-20805,0,0,dc9b29630ed3559f939fb5985a04aefed01feb498fba8d9b3c57cf0f9495d252,2024-11-21T08:53:10.667000 +CVE-2024-20805,0,1,3b2e8b7dfc0a2220407aa57cf31c234057e88ceda0d23cff988cb65b48605add,2025-06-03T15:15:55.220000 CVE-2024-20806,0,0,f84687e6ca27853ea722b74b6896660825869789a3d6900811ae37e86ae973e0,2024-11-21T08:53:10.820000 CVE-2024-20807,0,0,77916569275eb8dd7e9f7d46cda3d6f7424ea6382ea63bf17b9f16c373d503f2,2024-11-21T08:53:10.990000 CVE-2024-20808,0,0,357e606a78af1d093b1e517a3f4f56db91192b24dcbbb4daa0a7f54fb5863c47,2024-11-21T08:53:11.133000 @@ -251275,7 +251275,7 @@ CVE-2024-21729,0,0,1891d8574862b25d66b7e90d29c18f14ce7b7ae18dbc6e5f2430f36e44738 CVE-2024-2173,0,0,c84705e6544c7810b2dd24a487d4a093d605aa797e9da01d225283aed5e17c0f,2025-03-21T21:15:35.110000 CVE-2024-21730,0,0,3fb54c28ca30ec2bd40b6d6fb2091cbe68d186fd51891abb72beb75eef450a5a,2025-03-19T17:15:39.783000 CVE-2024-21731,0,0,5498da9c2571dd8675b69a41552ec2344ce7a7dd99f451ca8cb3acc427b2e6ef,2025-03-13T15:15:41.053000 -CVE-2024-21732,0,0,d84d78afb3d7bd3a899864117012493afdbe0d959599084e232b1e639d2c57f8,2024-11-21T08:54:53.800000 +CVE-2024-21732,0,1,24137ad844492856b4c0e788ad2796debe96d3c45db9a67efcbc8ecc63e4982f,2025-06-03T15:15:56.083000 CVE-2024-21733,0,0,b4e277d651a67cc40677cb23dcfabd83b71c95e7ccb1c0ef3df3cb43157c87cc,2025-02-13T18:16:43.363000 CVE-2024-21734,0,0,05a714dc545e8464bb57c1634923299c8c0fea8fc589e5ef7cd7d6f5a6804036,2024-11-21T08:54:54.110000 CVE-2024-21735,0,0,48d2102a1a8b1e565f1eca95901e1f59c8f6f1a12fe9aee88f5bbf6e5aa085f5,2024-11-21T08:54:54.260000 @@ -251318,7 +251318,7 @@ CVE-2024-21769,0,0,81801103350fc71e36272496321c10e15fc298a9ed5a85d5fc83b01c8b842 CVE-2024-2177,0,0,f9e7f05183b3a4fb393fd62d1dfcd2efdae1986952ae52e8c0bb49fb64060fd1,2024-12-12T20:17:46.297000 CVE-2024-21771,0,0,ab15c029b2a8de74c335899cdd8619c9b4ccb8c3ce5740cf19c510262d5a7661,2025-01-23T19:42:31.247000 CVE-2024-21772,0,0,f310ab481479ca6605eb33ed866f077d30a9cc043049a45b9dca7b65aacaec66,2024-11-21T08:54:58.620000 -CVE-2024-21773,0,0,18ffd55c3b3bc88b769a0a60072a06b2f11c2c5bd2e42489d365ecf87e312471,2024-11-21T08:54:58.750000 +CVE-2024-21773,0,1,4ee26f1749911bd0202977864bdc77ca381424b9d57297db631472d6194e04e4,2025-06-03T15:15:56.360000 CVE-2024-21774,0,0,9dbd9d2730674cbb6b04cd32f96f031daf4202c8c95abac61f10ac5023434369,2024-11-21T08:54:58.900000 CVE-2024-21775,0,0,47f96747d440c6bdfc57b6dcff5e30996dbaa9514148a866fef0d4c01b291f4b,2024-11-26T16:34:43.767000 CVE-2024-21777,0,0,9d9da8fd426a048a07298737e57d1d9170bf2ffe1a77d8fcf54bf75758ed7581,2025-01-28T17:39:26.460000 @@ -251442,7 +251442,7 @@ CVE-2024-21905,0,0,469703936188b94ece407b3d13d9c6fee645c75e967b54431a9667f862ed2 CVE-2024-21906,0,0,703121ded601f427920708f0f3722381e25f131e62ec71819c3c7a77891db0f4,2024-09-20T16:49:57.010000 CVE-2024-21907,0,0,8502a768128101ecb4d536b3bb5920a53e1dbbdd707673a2cac70fbf1d42ebdf,2024-11-21T08:55:14.583000 CVE-2024-21908,0,0,cce13c883394955391674a2e12bc0e0e2ee6c7838209f9899146c6567d81f04d,2025-04-17T19:15:58.860000 -CVE-2024-21909,0,0,5935a0bac56f64a585bf3a5d3a58749af3bd9b1b55e7d46981370442467347b6,2024-11-21T08:55:15.167000 +CVE-2024-21909,0,1,d305e29ad85f2553c573d5dda0030b13ee55f9f7b5aa39917b091bf0d3039632,2025-06-03T15:15:56.530000 CVE-2024-2191,0,0,2ea7af8dfa3f2d954261631f5f16de3015020c3ac677923869e661d02374a882,2024-11-21T09:09:13.543000 CVE-2024-21910,0,0,cbc277b52828b6f42ba8f990f48e48761bee9669b10721072e9f971531fa5b89,2024-11-21T08:55:15.320000 CVE-2024-21911,0,0,ecf2241468adf940e2c0a2f0db8992eda0c6792ed4a6f3737c2295eb4920e7ae,2024-11-21T08:55:15.477000 @@ -251521,7 +251521,7 @@ CVE-2024-22024,0,0,93165f8fe2064fd12244d65b0ff1d38fd1b104a54c3868e2f94817da6f11e CVE-2024-22025,0,0,87aa7a5c474a1100d38041a0ee3808e7b8e61bab104dc2e3bd348952332c62d3,2024-11-21T08:55:25.347000 CVE-2024-22026,0,0,fc1af49b9ec4afa79ee72a8c6a6d4423ef8d1a7b1b37296b5d1f6a1651e2a40a,2025-03-13T17:15:28.180000 CVE-2024-22027,0,0,a7c9d5934453bf5491b14a748b6f63eed219ee655c259739b4569f7e9106ab3b,2024-11-21T08:55:25.607000 -CVE-2024-22028,0,0,dc1d72f35c957d83174df179949d0c9b62a42ce5572e7016a9a9c3503481ee68,2024-11-21T08:55:25.737000 +CVE-2024-22028,0,1,ea8978580ea9bd87813ebb4ed4d29fd2f16b6337dfe99bd528d2c80dfd0ad8c6,2025-06-03T14:15:45.720000 CVE-2024-22029,0,0,c36e7c91b129030370bcc538c88e9a98c9f8acc0097f342d0f3d7ad0afd31d0c,2025-01-27T18:15:37.237000 CVE-2024-2203,0,0,a1dbf17e8623e342c5dbc7964579ef9e95cc5b4f168448d3f20b2a34388d28be,2025-01-28T19:35:13.377000 CVE-2024-22030,0,0,e02699b846d34a18e8b7b6cf5888c535b133634cfe2a017ed58e28205a0d0b6d,2024-10-16T16:38:14.557000 @@ -251541,7 +251541,7 @@ CVE-2024-22044,0,0,3785c041801c9e494f1163bcded486ac4d8ba2b4daeeba43f718d07aa287c CVE-2024-22045,0,0,0fc85a36de1553626b26231251df9561b8f82694677467031c0736aaeb797b1f,2024-11-21T08:55:27.243000 CVE-2024-22047,0,0,d68430b2edf0851d21b381563fe0dbf2b683387b65fe0fd96257221e8d051bd8,2024-11-21T08:55:27.380000 CVE-2024-22048,0,0,f15cd1f3f1c1d5aad1b69f7b2678636ee603e886f2e299c8103fbe3a3ae5f83b,2024-11-21T08:55:27.533000 -CVE-2024-22049,0,0,02a5c32705cec3f7931772ad911210198dab00eb66956538c3d5974db88ad2ea,2025-02-13T18:16:45.870000 +CVE-2024-22049,0,1,a1b964cc03288247a11bfeed2ea96977953a2e2787b63c60f3d57d8bec564860,2025-06-03T15:15:56.780000 CVE-2024-22050,0,0,e1cb308d379dc9b0fd0d21838c350f2334d03c72b5ac66c2e1a1d1fd634f4cfe,2024-11-21T08:55:27.833000 CVE-2024-22051,0,0,f86dfde6e0319e1e548f64efe750a5e71365e897154e51ab6597eeb44aaac8b1,2025-04-17T19:15:59.030000 CVE-2024-22052,0,0,fb73937d7972ce431af34c9c065dbcdabf7e31300916b9f35e3aabe9a5b95c49,2024-11-21T08:55:28.100000 @@ -251575,7 +251575,7 @@ CVE-2024-22083,0,0,1f84f16ebf68d49cabc45078359788df4ac05c36d153951fdf60802b16170 CVE-2024-22084,0,0,45e548f26426deb5138ddbf3599b1e4809d534876b2502454dcdc22cc7512f94,2025-04-16T17:29:41.147000 CVE-2024-22085,0,0,92a4746240244f0b9e0cc7fa01ea7c56d7c00fcf408654b3646a2f1bdbf45d0d,2025-04-16T17:29:50.383000 CVE-2024-22086,0,0,ccf04b7fead9091d371d166b8b6ba124ecbd7f89906bfa16b59048116faac25a,2024-11-21T08:55:32.947000 -CVE-2024-22087,0,0,ec802683c5b66e52af14e7628ea08e3ca753e0f7613afcd6c141ed5e6585f365,2024-11-21T08:55:33.113000 +CVE-2024-22087,0,1,34b84749a462df6e37b1e541c9fe49b0ae3aed752ce347aadbc5c54c8879a1e0,2025-06-03T15:15:56.987000 CVE-2024-22088,0,0,1b4567f28bc62e821780e1476d393aa95092e316c51213253216ae85b00a6597,2024-11-21T08:55:33.300000 CVE-2024-2209,0,0,43898b6a7f163b77384dde920a53e0f2dea9f1872d0d31a7c7ecd456628e1dc3,2024-11-21T09:09:15.580000 CVE-2024-22091,0,0,603d4671063bcc72655ac3cb57b9cdd6926bb49117f82c2c37ff6f9135815afa,2025-05-12T13:37:38.673000 @@ -251650,7 +251650,7 @@ CVE-2024-22160,0,0,b819051e34e9234e111b852fd9c5505322413788c8a26b1b066d41b18b98d CVE-2024-22161,0,0,087e4c0756ad54ddbfdf9c750ee2910357166816bcbd26dd97d1dd6081f048b2,2024-11-21T08:55:42.657000 CVE-2024-22162,0,0,46817da129923a3008d2032cbedf6b796801cc08a3f0d4e91aef0b7e6b7de6b4,2024-11-21T08:55:42.783000 CVE-2024-22163,0,0,be7c1b86c2d20a9bb41242d003e78ad9b1a17a09805d071f6e57125dc144dfa0,2024-11-21T08:55:42.920000 -CVE-2024-22164,0,0,ac0dcaf11ad2aa7aab9d3b0f3f9055d556eb30a14a361fc2510dc45bcd521493,2024-11-21T08:55:43.037000 +CVE-2024-22164,0,1,a69fa2d58e0d2f627890aef19b596cd5bbd23093b4156b7267d401460dd2b3cf,2025-06-03T15:15:57.183000 CVE-2024-22165,0,0,4bf395a54ab701d1a862babd45e61c23b8a69ad8d18895c9217241789ff079c7,2024-11-21T08:55:43.170000 CVE-2024-22167,0,0,71fa82658e52e6543324b951fcbd7f24601cf6a02348db432a60a5a4c1f69476,2024-11-21T08:55:43.293000 CVE-2024-22168,0,0,ffbdca5ead34d422066560a5055cdcf4c889db426b8b6b86305754a14722129d,2024-11-21T08:55:43.430000 @@ -251847,7 +251847,7 @@ CVE-2024-22362,0,0,705f53d7ba8da6e617c593b50e91059ca5aaea304adfd35e91b92257da6c4 CVE-2024-22363,0,0,5d981d34e499a40dd74e46e831c996b8cc8dc776c7d18bde043e34f03135f439,2024-11-21T08:56:07.530000 CVE-2024-22365,0,0,f6559aadb4f641ffb3dbe70bcd8cbadf0fb096bff38d1a8ddc63de3ba072a9ad,2024-11-21T08:56:07.760000 CVE-2024-22366,0,0,c9d4eac273888b8ed913f9e915823a299a656b6afa80a9997d2f8e6593e55a53,2024-11-21T08:56:07.920000 -CVE-2024-22368,0,0,42f1e51c584ac67c724cd77ff67e48a5ec43d1dc3a71a029cf38e486d8136cd2,2024-11-21T08:56:08.047000 +CVE-2024-22368,0,1,4962d052924d2b2dcaf8fef7c405c31bd171b02dbbc7f1ab1a6d924c3ef5d04a,2025-06-03T15:15:57.437000 CVE-2024-22369,0,0,25a54f5eeb18cbdc2e924f131f0d3183c031ad520a18106efbe880eefbb69d70,2025-04-02T20:17:04.160000 CVE-2024-2237,0,0,10342a3bcedc4ff39999af4eb389909f61f2ebcb0c10fb4672d2ed188d1b8434,2025-01-23T16:35:26.147000 CVE-2024-22370,0,0,154c2c04f020f54de37bfc5e89569563afcd67d6a9da771051468d73c892d8f9,2024-11-21T08:56:08.407000 @@ -251952,9 +251952,9 @@ CVE-2024-2248,0,0,128b03ee143838230434475acf9988ac8d0fdb2e64239ea0133c82e2fa2397 CVE-2024-2249,0,0,b7479f791c44ab2d743eb04162d89712e9af7b6acd224caaf8514c7a95cb2cf5,2024-11-21T09:09:20.920000 CVE-2024-22490,0,0,66a82b0e51a88056ee4e8dc9f25a0a6cdc86338bb5341bd044469b861097582d,2024-11-21T08:56:21.247000 CVE-2024-22491,0,0,a7e8274b6222971c8e56e21df04de28db6683d46867835e2cadf2f0873c1303d,2024-11-21T08:56:21.500000 -CVE-2024-22492,0,0,e5b01de89d6869ada043630fd5bb3042a45209250cc8e75716793df2024c2b62,2024-11-21T08:56:21.667000 +CVE-2024-22492,0,1,ed6de9697d3c906be7c158fd443e2bb6e676d19d1e729007bba5d9124eec42ed,2025-06-03T14:15:45.907000 CVE-2024-22493,0,0,d1de2606acc42e9246a369eac46d44910ba2e76842dbf24e36a84134fb92547b,2024-11-21T08:56:21.833000 -CVE-2024-22494,0,0,67d01224686369569b4069ddb6e34f5bd30610c1ce6d875a4c492f06687c9164,2024-11-21T08:56:22.063000 +CVE-2024-22494,0,1,7fbb8a11ee1bbf88d2756d28c0b8ac308ed852b26511ea038c2d543b1972b9be,2025-06-03T14:15:46.107000 CVE-2024-22496,0,0,547a12e469d1d1e2802e19ff5c412a9af7dedfee083bf2aa0eb0877b66473555,2024-11-21T08:56:22.223000 CVE-2024-22497,0,0,ff572cda88166cf6585a584534a7d1d7bbdcd92ab60805918e3f5eff37ca88e5,2025-05-30T15:15:32.113000 CVE-2024-2250,0,0,a87c6f56d5dd84af04d11000c391d5a607a245dd07e99e9b67f0a55566cf4dab,2024-11-21T09:09:21.053000 @@ -252072,7 +252072,7 @@ CVE-2024-22771,0,0,7617e8b0c6fda881a2255f1c01157125766b59da1dde7549613282f406c1f CVE-2024-22772,0,0,6e8dcc0f3ba13d7faed0c0b32e429861dfb883dcd31116729c58831e9e06cf69,2024-11-21T08:56:37.907000 CVE-2024-22773,0,0,646a02adc84f9f652da242d98da5deef6d761cdcdfe6e3cca98d2a6500db4945,2024-11-21T08:56:38.063000 CVE-2024-22774,0,0,bf99e95ba77966932ead4482e007477f567af9449f7b58c442b7bc149d68a0d2,2024-11-21T08:56:38.250000 -CVE-2024-22776,0,0,59980efabc9a4e25484dd41e1274f6f7fedcd9abaeb9ed44a6660b418bf2fb3e,2024-11-21T08:56:38.483000 +CVE-2024-22776,0,1,ac97c16d22417af4ad2e5b6a94863a309580579998c043682a4e721adb21bb91,2025-06-03T15:02:52.760000 CVE-2024-22778,0,0,a19e88b93f3a20f6985aafecb50988a912c284a2e54ec0c0867139360136dc20,2025-05-06T12:26:00.203000 CVE-2024-22779,0,0,4b2529eb2a537ec4153614b263ea5bd6cc064ff2067dc5f922966e44620967d9,2024-11-21T08:56:38.937000 CVE-2024-2278,0,0,f074ce15da8dc9e3375db8894f9d7d715eb941b2a9deb7fc4da96933fdcaa115,2025-05-07T01:07:01.500000 @@ -252150,7 +252150,7 @@ CVE-2024-22936,0,0,1b600cbd732fd3caba706bed37e6aff42d5f330e74d21c7a465e5893df843 CVE-2024-22938,0,0,bf757ce55bb478ce48b83b300ac4d39cd6b219e711215f790946fc5b1657970d,2025-05-29T15:15:30.053000 CVE-2024-22939,0,0,3ffcf95a5808ba6dc907299c9eb15e660c1b5ea83eb26cb77d823340e741ecb2,2025-01-16T17:52:27.713000 CVE-2024-2294,0,0,1effbd22458256fe66408ac0ea8ed3a355e6b8e30245f685a9acaa494c340f66,2024-11-21T09:09:26.897000 -CVE-2024-22942,0,0,70fbb7b13690db5e0ea270a9db06cbef5fc5d22db003b9b7feed6994516eabac,2024-11-21T08:56:50.037000 +CVE-2024-22942,0,1,ee4fc29f6a40b054b925dc80d6c0f5f4755598349e7124ba699ceab2867b1fe2,2025-06-03T15:15:57.660000 CVE-2024-22949,0,0,cb0cac585149f16a1a09cbc1fab5df7027b6f9a3a5a1944d37037b65f317f383,2025-05-27T14:20:22.080000 CVE-2024-2295,0,0,b1c9b0d97e63019f8386fb1489354d559a699343cfdffce8bb3f3ebff26916ab,2024-11-21T09:09:27.030000 CVE-2024-22955,0,0,368533f40a34e5fae1d8925340aae6f4475eac5e111ca232f404b1633e3b2a3a,2024-11-21T08:56:50.440000 @@ -252179,7 +252179,7 @@ CVE-2024-23054,0,0,57c8ee13e5deea4252b00a79726f9264b2ea14e0ed94c41b033e36787c15e CVE-2024-23055,0,0,424171c81b8faebe79d8fa44169374c5df8b725bc8a3c3cfaa5dd80c008f24c8,2024-11-21T08:56:52.597000 CVE-2024-23057,0,0,c9a0fba17c8ddfbbfffb041e148435e71b05f1ddb663ebd20878bf31d80a5eb5,2024-11-21T08:56:52.757000 CVE-2024-23058,0,0,6732b65704f03192487f327f389531e0f75a12286a4a4827a9806d807ef51a3e,2024-11-21T08:56:53.007000 -CVE-2024-23059,0,0,3e2f9ca86f8605a168572175f138494492130814cb605b3987a5097b6662d545,2024-11-21T08:56:53.240000 +CVE-2024-23059,0,1,b446b502f04bc0516858214fe2428dbfd12b0f88e8abdb01c38d33250c3b500c,2025-06-03T15:15:57.867000 CVE-2024-2306,0,0,d41638acfecbdd652371ae4f4cd9618cb78c9fc11c8a0f6b5723d00e4e76749f,2024-11-21T09:09:28.290000 CVE-2024-23060,0,0,5209cfaba5a6d46a729be0f178690e9761de468745e7dadbfd05deccb8228185,2024-11-21T08:56:53.390000 CVE-2024-23061,0,0,19c53f1d2815dfb48d7dbce1711a79cc09ee323a839343c4b0d8badd6ecde7e7,2024-11-21T08:56:53.533000 @@ -252267,10 +252267,10 @@ CVE-2024-2317,0,0,28ff1b529d0defa986bd83b72f9ca183158fc25cf191dacef2d67f1bf508f9 CVE-2024-23170,0,0,268f0a563023a4ecee170c2c2a538f43bf34cf80fcec28a68775c17939e45eb6,2024-11-21T08:57:06.877000 CVE-2024-23171,0,0,70c0fa678e5b29818735a906a916ff67de22d23af48d8373974888133417fea3,2024-11-21T08:57:07.033000 CVE-2024-23172,0,0,5c1a5fe9b7cebf0c34d4878687c3005ec538c3891848fbba3ae0ca350177b5dc,2024-11-21T08:57:07.193000 -CVE-2024-23173,0,0,f2954006373f695b1da89c4d3e9e4bbf0b14d9a7a5d31bd76d0a2d7ef5f3ee54,2024-11-21T08:57:07.347000 +CVE-2024-23173,0,1,d5fb28d1821d8ebd301583b67d682c577a0093f1caf20e3f36bfd17bff959da3,2025-06-03T14:15:46.297000 CVE-2024-23174,0,0,b365b4a7fe1ddb2e20fb66243fbd5adf68894f7b7cd98618c8d61e49dd2ec41b,2024-11-21T08:57:07.513000 -CVE-2024-23177,0,0,8b91bc203f90870c1a75a5cb701cd33e8f61d2c917fd1118980a206b25552dfa,2024-11-21T08:57:07.670000 -CVE-2024-23178,0,0,04b37e6ff372dacf7ac0e246b176a9bcad7982ad859a27a7ee12d21227a12cd0,2024-11-21T08:57:07.827000 +CVE-2024-23177,0,1,657988e82fc58793fb35144a73273b10bccc46bb10e02359ba79eb0adb30003e,2025-06-03T14:15:46.497000 +CVE-2024-23178,0,1,4f65f9875f3e43b2db767153c71363ddbe13dd87e4f9f4f76dc9f3b3643a1450,2025-06-03T14:15:46.693000 CVE-2024-23179,0,0,8fe0b61f68b15248ff6f58e9fa788ade334a5eb3775d6fe6f432905314bfee6f,2024-11-21T08:57:07.983000 CVE-2024-2318,0,0,c68350f065b4b24293d1da1917b4683204d081089ecbf0feb1653e629de1cbbe,2025-03-13T01:29:15.533000 CVE-2024-23180,0,0,82bc86ce8146f94a4beb2cc5bf0aa8034221974bf93c155ca56b74784dce48b1,2024-11-21T08:57:08.213000 @@ -255607,19 +255607,19 @@ CVE-2024-27331,0,0,e195e88155826ea4b63da1691e81b356a034bba1f2ef928e8838c78e72e60 CVE-2024-27332,0,0,aaa4dffc6bf333f244c6f25f902be7cb0c54ea98dcf6de9140197a28969da44c,2024-11-21T09:04:21.157000 CVE-2024-27333,0,0,f58d62b250dc7953b5817392243b8bacd85355fa7e2ecfa777dcb474e93a4774,2024-11-21T09:04:21.300000 CVE-2024-27334,0,0,e079668eadb913cfa44caa22d26dd046da7aada8bea4d59c6565a9eb2c318a99,2024-11-21T09:04:21.430000 -CVE-2024-27335,0,0,46ef41280c312a7a60d9d96e54f31a491192cda38bc9de9d8467b0e6f09921f7,2025-02-27T21:15:35.387000 -CVE-2024-27336,0,0,f451aa639b89955df4ed460970ddb63928e49f1630282fa16bbcb7be7a61b64d,2024-11-21T09:04:21.690000 -CVE-2024-27337,0,0,0293166c3e15b3edf5f6ff911e0852dd1ae021446b6a0432164fd920b6d80f00,2024-11-21T09:04:21.820000 -CVE-2024-27338,0,0,baa4da4da850c3498ed407f3f58c5fd49009eee05b0f97badf1726fe0938faeb,2024-11-21T09:04:21.953000 -CVE-2024-27339,0,0,b0fde9d96733134d01c491066de4e2d8f4a32844d0f11e4b2f17790dcd8d1a0d,2024-11-21T09:04:22.120000 +CVE-2024-27335,0,1,f69d0b5301f1e028d09865f9891150fb7295d8ac0466e453dc471345a8c095a3,2025-06-03T14:01:59.353000 +CVE-2024-27336,0,1,57e27002496461f912eb0b97a8d471ced9c1ae606cd73fa6844d3a7c679c210a,2025-06-03T14:01:49.420000 +CVE-2024-27337,0,1,851de2ea188a042014b1789737f121096c5110a311539994f4b55ea2b7350899,2025-06-03T14:01:31.090000 +CVE-2024-27338,0,1,2df5d0489c100179df339ea49ec86087d80d2d7e526ef7f82599623bdb1c0727,2025-06-03T14:01:23.003000 +CVE-2024-27339,0,1,866ac70eb041ea40e6a89a082535f79f5ac9691e3be871b7ab5046b7eef41991,2025-06-03T14:01:12.847000 CVE-2024-2734,0,0,15700c39506c6737511a90240e8902ac502bcd36576bf0b22c45142008dd44d1,2025-01-08T17:52:29.340000 -CVE-2024-27340,0,0,f36e18cf85e55466ea3939cec47112efece761bc0cb8912ed2ef16f37a355200,2024-11-21T09:04:22.263000 -CVE-2024-27341,0,0,57d10a6b44f068af625750ac8eef21cb80d69750ad86343df7d759956945a7d9,2024-11-21T09:04:22.403000 -CVE-2024-27342,0,0,f7049b74a43629a48ff8c63940e317e9918fc09d38c91d26da3d80887201518d,2024-11-21T09:04:22.547000 -CVE-2024-27343,0,0,0a2ec7d99641a484393ca1a56904234857596beed4167b7ed491ed7fc74d16b9,2024-11-21T09:04:22.677000 -CVE-2024-27344,0,0,a9c88533356512e2adc2fb01a06a9a612baab50fa51a93eb67c45a4dbf7bc7cd,2024-11-21T09:04:22.803000 -CVE-2024-27345,0,0,c60ce80498a9b655469b1aab222b3ccf0fae4fbb0c9cd642a9e9a9d519dce41d,2025-02-27T20:15:38.220000 -CVE-2024-27346,0,0,7ab349a15a99206f8a9fda6cd57bac9de6c9ea7ec74779233966bed71f5d0607,2024-11-21T09:04:23.063000 +CVE-2024-27340,0,1,bea49f267ced0237f8a0839e2ab57f3ff50893bd116ce8d1b8c12555264fd822,2025-06-03T14:01:02.503000 +CVE-2024-27341,0,1,938f74e0b241741499c983a4afd1b47f0fa07c62ecf1b9a5a95ba584b54ce968,2025-06-03T14:00:54.577000 +CVE-2024-27342,0,1,00827f980e88f01b6c50d175d545e0ee0bf79b4f7eb872ff24196bbb94a89040,2025-06-03T14:00:44.240000 +CVE-2024-27343,0,1,3b9ef9065f889250a6345904dc17e76f6d392227dcda5a79f450bcc5c0b20233,2025-06-03T14:04:41.540000 +CVE-2024-27344,0,1,b426cf84eef50a7ccec37e89123b4858ecf20ef639a4adec92556779b3abaf3d,2025-06-03T14:04:36.303000 +CVE-2024-27345,0,1,a4369b48085574fb0972204c9a85931f4fd2335cd55818c9bbe8a03ec0d8696b,2025-06-03T14:04:30.040000 +CVE-2024-27346,0,1,4712679a769bd25944f6f559fc6e64f28d8f9acca2d3a5f8f11400a82d0bf1f6,2025-06-03T14:04:23.937000 CVE-2024-27347,0,0,dbda497b12017e7409f9dc9e20d1261b56f61b10be208d0427d8ee6a8ba51174,2025-02-13T18:17:30.360000 CVE-2024-27348,0,0,669bcbd1e55ec75a3ad61036b9f77bb9bb8b13952b8aa48af92d630c6b35ec0e,2025-03-07T16:51:58.463000 CVE-2024-27349,0,0,182a6ef32e9c7d451197e3afb7e727cfc2c680a5848b8ff28e90f7790debc56e,2025-02-13T18:17:30.980000 @@ -257066,7 +257066,7 @@ CVE-2024-29316,0,0,fcf08fc934238242be85211e527308a25a1845e213d3df0567dedd77f3e73 CVE-2024-29318,0,0,5979223274c4257063a5f43d788a95d0cf9d1ec53d4b8ec4ca8fde4767552fe5,2025-03-13T18:15:39.140000 CVE-2024-29319,0,0,69fb3b2cb652eb32dd1d717d0873133a6783ff4c6e6a16c234669dea86327af7,2024-11-21T09:07:56.937000 CVE-2024-2932,0,0,cbf0bb95027acacae205bf7ec5cdaba9d4ee4be661262823250aa4008f7086ad,2025-02-18T17:02:22.437000 -CVE-2024-29320,0,0,9982221ae2ee12973c2d99f649aa7d2d34252735124519ff1ea14f9a4a1f1f89,2024-11-21T09:07:57.167000 +CVE-2024-29320,0,1,0d50c4fb907c73fade940869a802428c977a5616ce86d464055f71dbfcaa7722,2025-06-03T15:00:55.543000 CVE-2024-2933,0,0,aa36ab561887564bee0d2b5b8199cbbcfe3b5235044831189f4ad1e0368010a4,2024-11-21T09:10:52.387000 CVE-2024-29338,0,0,3256c7f30ffd5e0486bc787c933363bd34a9e24e8b56cf9ebf1d4bc36ec0ab07,2025-03-28T17:39:33.607000 CVE-2024-2934,0,0,ce8a2e0cd96895cbdc241c11fcca1001cf9d7fac6a58f752da2f615ab7465389,2025-02-18T17:04:28.120000 @@ -258793,14 +258793,14 @@ CVE-2024-3157,0,0,5c1f6766720e1d98546d836f15225c87cd525dbba6c411ab58632b58973295 CVE-2024-31570,0,0,c7fdb5046d4520e2262e4587513529624659baf1b342c0161aa56fd989afbbe1,2024-09-25T14:57:47.337000 CVE-2024-31574,0,0,eda266a12496af246ed53e1fd05e929d584bd2ec9d1bc8cdbb80fa6f19bd3e61,2025-04-30T16:45:06.993000 CVE-2024-31576,0,0,5516a552c9c9455eff9be85911cca0846e5ef96c3e87d0189e8480595497f956,2024-04-15T16:15:07.270000 -CVE-2024-31578,0,0,0468c38476b6ebfc5093c4dd57fa6ef08081d5e466097f09da37e033c9c0d20f,2024-11-21T09:13:42.703000 +CVE-2024-31578,0,1,5b6726d3dfd059e536be6b4442ee4efe98b9ae1e93cef9a272627e98b92ebcb6,2025-06-03T15:29:02.313000 CVE-2024-3158,0,0,64ba1d8f16765085f53ed9bc04ebfd9e3747ac661f2c36e1e05c9b39e1f126dc,2025-03-13T15:15:46.370000 CVE-2024-31580,0,0,edde7918add3c016a5d1a89364b3c85df232b957b4de682b61bed612a4074f41,2025-03-29T00:15:21.733000 -CVE-2024-31581,0,0,50c9d2160be3437aabfd635c2f061c7ee8a3953790cf8ee16fec8f12f4083e78,2024-11-21T09:13:43.080000 -CVE-2024-31582,0,0,2e7753b69642bcc6b6230ca8ade764974c8922c29b212d8635d64fe7b8691ce4,2024-11-21T09:13:43.320000 +CVE-2024-31581,0,1,26f0b24afcce49599eab006e4dd0f04d587c422933e6a771f6252572dbc45bb1,2025-06-03T15:30:44.147000 +CVE-2024-31582,0,1,99d23ed94eadae550f3d5e4c7af4b99a2ab1c155adf84f6b0b2f2ac44026309e,2025-06-03T15:42:14.187000 CVE-2024-31583,0,0,f1ca2f57a4fb9ac891f614bcec1b1782e644a75286acabe19e0169b0f358659a,2024-11-21T09:13:43.540000 -CVE-2024-31584,0,0,2c1cb4dd8513aa6f2089e58e892de3946ec4402779491b513ac04d929541c15a,2024-11-21T09:13:43.753000 -CVE-2024-31585,0,0,b7d3b3f61277150824ef787ae80167eabb028ae6f92f559e33e90d4991cfe63d,2024-11-21T09:13:43.997000 +CVE-2024-31584,0,1,420fc644c705856ba8dd98ddb90300aaa523243bcaf8db7ce5ea0fd2d33809c9,2025-06-03T14:04:04.327000 +CVE-2024-31585,0,1,23c4991f294843e85e6d21439b9755a77565ad5708152734d6ae73de51e40078,2025-06-03T15:35:31.007000 CVE-2024-31586,0,0,5efc79e21fbd8ed4e63282b64efbd5820d7cef26890f5053c7ad3f1ac2b5e4c1,2025-04-11T15:15:56.880000 CVE-2024-31587,0,0,64a72d90b20c34ecaa52200bea056ae28aa202759df67583d32f57bc2f17b2c4,2024-11-21T09:13:44.450000 CVE-2024-3159,0,0,9ad64a7e8e8b198934b72a1295500c693ba9441f53eef8df46db67ac5cdd2018,2024-11-21T09:29:01.997000 @@ -259205,7 +259205,7 @@ CVE-2024-3216,0,0,1a66c657b2c05dec189fbd499b73aad44096e6f6bac1f349f7d19898fe5882 CVE-2024-32161,0,0,cb2deed9f6e74d1bad8c4ac0a4a083fd718fbc2543bdd58e0130db87d5af1609,2025-04-18T16:49:30.837000 CVE-2024-32162,0,0,49a1080a66cfb15b07046e1f64a1c5472a37fc77adc083db591cf171e3385c57,2025-04-14T13:43:17.153000 CVE-2024-32163,0,0,baef0d988f05813168516aac8ab7f415d223ea7551ec61622d6cd5771d4b42ad,2025-04-14T13:43:41.323000 -CVE-2024-32166,0,0,eda0a3984b189dee2c1a19c615f862a1114c6fbc7afcf89812ad385b8dd94adf,2024-11-21T09:14:34.507000 +CVE-2024-32166,0,1,016131f58073d677024fd4f49226869b45311502c5e65d5c1562bf56abcb7c47,2025-06-03T14:02:49.403000 CVE-2024-32167,0,0,cb4f69058b5157952ca42b4b0dff18755b8866e500c0e1b176d4a09ec44841bc,2024-11-21T09:14:34.797000 CVE-2024-3217,0,0,6489e5216e63df8c00e811264de72ef6159728dccee24b60dc679b123dbf8257,2025-02-27T16:14:24.610000 CVE-2024-3218,0,0,81581ac92c0291d6ed71dd9b38de9b17941e2f3f078e37375ed0e3bad56cd497,2024-11-21T09:29:10.287000 @@ -259219,8 +259219,8 @@ CVE-2024-32211,0,0,7aeac149ce230244d2b917a1cbedf2ade22ef2010393663a9a7c7fa147fe4 CVE-2024-32212,0,0,7cd205f7167ada2f68e262de4294c6c67108c8ee8cd5d0da8a582987800d41d7,2024-11-21T09:14:36.050000 CVE-2024-32213,0,0,19c43429bb818652ab99bbe37809d02ce3f96c90b91ce1bde49a718b22b44a4a,2024-11-21T09:14:36.277000 CVE-2024-3222,0,0,92677841c971e0402ae023e5f268d0bf5183344acc2d541cfc7be0528b9fe484,2025-03-06T16:40:25.713000 -CVE-2024-32228,0,0,e57d95e8f71189130c733a36f368f79ef579cdde5db0685584478be60c584dcb,2024-11-21T09:14:36.510000 -CVE-2024-32229,0,0,1d4f889ca9079678836d30c226b4e93776fba7e81888461dc8750343cc23771a,2024-11-21T09:14:36.740000 +CVE-2024-32228,0,1,502c04483ea7bf3011683646f8a0df6fbe2c05bd1ef4514d7173de808c391f85,2025-06-03T15:33:22.030000 +CVE-2024-32229,0,1,418256d25f8ca55f55ae867533da85d818aaf3335c82f0fef678eaedbecb15e6,2025-06-03T15:31:43.907000 CVE-2024-3223,0,0,8e7acace2f55ce6993a57e9091bfa8f8a1a4cee64bee3cc490425b03226e7528,2025-03-06T16:39:43.707000 CVE-2024-32230,0,0,e28e51470155b6141e18d3206d842725b0ba198262e901f564ec6439f16f995d,2025-03-14T17:15:45.373000 CVE-2024-32231,0,0,d1de02a20304f8a2541a989359910105e9a5fbaf303edcdd97dc7ff7c4722cb9,2024-11-22T21:15:17.970000 @@ -259295,7 +259295,7 @@ CVE-2024-32352,0,0,9e0b54507f9b9eb3d2ad7ddb5423ec4fda2fac97ff0a5ce7a681ecfc6468d CVE-2024-32353,0,0,620267c47e5f46c980fa54c20fbc922c145b966dc5ffe4ee45be2e25cec8e165,2025-04-04T14:27:54.030000 CVE-2024-32354,0,0,a1e5084b4d833613ad9c6c5bbaac4456ec4b139350bf43e48bab709d35e2a067,2025-04-04T14:27:44.107000 CVE-2024-32355,0,0,9fa0e3279bec3777869df2c40c2c766fc99b6c0cf067e0545d21d5fcde2a4280,2025-04-04T14:27:30.180000 -CVE-2024-32358,0,0,21ea9ff1c032aba5395318a0923946814fac3fa8c2e15356c02ee13d8c44b34e,2024-11-21T09:14:50.107000 +CVE-2024-32358,0,1,03d109f507822e16876fe418e33fd54f0ba7dd730791e620009fa026e5853655,2025-06-03T14:24:31.497000 CVE-2024-32359,0,0,ef4c262a9b41e8b1ee8c7d6c0a007e5a9d60fc4e1c81af267581106864b95657,2024-11-21T09:14:50.353000 CVE-2024-3236,0,0,82a34baaaa711321bad45088f518ec376f3076a6a7d3536611a576843547b80d,2025-05-13T01:40:22.563000 CVE-2024-32368,0,0,69495dd3fa258789ba336775e330898a1abcfccbf8ce6963e00a2882344d70d7,2024-11-22T15:15:07.323000 @@ -260088,7 +260088,7 @@ CVE-2024-33328,0,0,fc2bdeaba3b7dd7009d38cf6406ca7c1fec328e0f9c137dd15557c77d7ba9 CVE-2024-33329,0,0,d4d0f441496ab2cb72ec2a1eaf521e1593c173b9f73cac9da40b7af11d1fd8ea,2025-03-13T17:15:31.257000 CVE-2024-3333,0,0,f129aa773166eeb870b4fb2c5a97277e3780bb525c110816b5ab5c270e03e8c4,2025-01-08T19:43:24.987000 CVE-2024-33331,0,0,9615eb671a81caf99447cfe3f11a47c5fdeef0f060420da831650ede0c65f0d0,2024-04-28T23:15:07.120000 -CVE-2024-33332,0,0,300db20dc0bac4e3e788b589181331a5c5c240195a8f462a7a9a7bb71afe86e6,2025-03-27T17:15:55.883000 +CVE-2024-33332,0,1,32997c2a7c25602fe157fca1aa1d188a60f8ff75f00035634dd0b74a8655efc5,2025-06-03T14:29:05.990000 CVE-2024-33335,0,0,611d5c247a5ed8c68e8c37144affed7213a93ec1992045174cf05e693148d5b1,2024-11-21T09:16:48.797000 CVE-2024-33338,0,0,9aba9f074eed914559e92385b75aa2e67badfc0f8399adc4210b14741ab06231,2025-04-23T01:28:50.760000 CVE-2024-33339,0,0,1bca262a290e7823541ac5c56ca607cb8f0a9af8877c53f0a0d3e60cf0f91403,2024-04-29T05:15:06.340000 @@ -261395,13 +261395,13 @@ CVE-2024-35048,0,0,f4caaa37edf81632e592e2ac74471d6da56a0a50519cb393f406faa79d160 CVE-2024-35049,0,0,c8b16e8ca5d1366ea9ac534249fdc137d8e7035b5a9be28ef8d5e2dbb4eb0886,2025-04-23T15:06:12.960000 CVE-2024-3505,0,0,b0e518dbdaaf48c704866354ca2287d24bf142f790f45dca79b53d52c65303e2,2025-04-01T13:59:28.320000 CVE-2024-35050,0,0,efd2f0e4ef0267d800eec2bffaf8f871a4eaf151b0df61c13ae24b3f4fc6cf31,2025-04-23T15:06:01.440000 -CVE-2024-35056,0,0,5bb4b3eec69b99e503d263335f8a917b0ec760243c03362963b1801335fa8f1e,2024-11-21T09:19:43.337000 -CVE-2024-35057,0,0,c5f5df651a8e1976bbef4b1310b5e7d96ced4ed1dda690999700a3e13594e811,2024-11-21T09:19:43.570000 -CVE-2024-35058,0,0,c3148f19aa99a77be3b91ce9dca18a095dcc009b518f44a76210891d3114f1fc,2024-11-21T09:19:43.810000 -CVE-2024-35059,0,0,e8a21898cb95abe27f395dd6cda7c9f1facb0118d280ea28ebf8b22efaeef1b8,2024-11-21T09:19:44.017000 +CVE-2024-35056,0,1,a89f0fa0b60500ca321459ad39eb3b6a542dc42fc9da83dc1716edb1417b594a,2025-06-03T14:14:43.347000 +CVE-2024-35057,0,1,5b010d116ffd228bebe7eaff37dcb0eb1aeb26acfc32462841518fd210e9e9f6,2025-06-03T14:15:27.450000 +CVE-2024-35058,0,1,11fdb0f1e54d0aacf1f69a0b6c7f8baf2c1f6c53d7f281b2f7589e7a15f0780d,2025-06-03T14:15:39.230000 +CVE-2024-35059,0,1,891482832b9e82615c739b5b21b76c0796d3bb5c2991f415c1565fc46928f7d3,2025-06-03T14:15:55.690000 CVE-2024-3506,0,0,d06dc8e750c6189fc0bf3ae0bda503177bc37ef031377f8e0010ed289fcd7cba,2024-10-10T12:56:30.817000 -CVE-2024-35060,0,0,48329851289316a3899df093cd0a3e80dfc59ce466391e53233943eb729426bf,2024-11-21T09:19:44.223000 -CVE-2024-35061,0,0,cf113420409365d91e7e29b84a787f3a87a889a760101165d9ce858f45762a61,2024-11-21T09:19:44.430000 +CVE-2024-35060,0,1,e08ed2413b3aaa73845ba4bfa5840d334e37d63b5ca7fc98d8b050824e3abf91,2025-06-03T14:16:05.870000 +CVE-2024-35061,0,1,716074cbcd1dd00e94063666f229890e912cfdb88f2d0ac99c8b9dd3336d5502,2025-06-03T14:16:41.090000 CVE-2024-3507,0,0,b850f062ccc43f4e4c0e6ead5b6a4b3c0640a1367570b0ad21f801def210d43e,2024-11-21T09:29:45.143000 CVE-2024-35079,0,0,c7f5acfe3b2f0e9a156edcb000ce4008794e387d0d5744a419ab8b839597d566,2024-11-21T09:19:44.643000 CVE-2024-3508,0,0,f28b9628557a40987c94d2d9328a5b43c616617d96f0a1dd8a7e646835b5dd3c,2024-11-21T09:29:45.263000 @@ -262594,7 +262594,7 @@ CVE-2024-36481,0,0,4eb9f12e83487746bcd563f74e1338838b3bacec77ea996220050453df93a CVE-2024-36482,0,0,535472baf1dda6517f1f0290a0b6663d8509986e45cf2f1daae2170dddb08280,2025-02-04T18:27:28.993000 CVE-2024-36484,0,0,a06783a9b3c79d8cb9b5fe8bfffb1618ea1a5c1aab2918e64ca3d8f674b8e0e9,2024-11-21T09:22:16.280000 CVE-2024-36485,0,0,d951588f4dcc00d26595f8d25b71cc0d010f10ca23d6ec7bebb340fbcf7c88da,2024-11-07T11:15:04.637000 -CVE-2024-36486,0,0,f73d4a75bbec382c2c22d4bedbdf9571ea4a7e892b6da8db6348c9897cdcd113,2025-06-03T11:15:20.383000 +CVE-2024-36486,0,1,5e9d8b9e5c98838f92d258f45e5a8d0460ab627b98c77f922645c3de174b5758,2025-06-03T14:15:47.160000 CVE-2024-36488,0,0,abe66b275816c86c5f144981d7bda84aea8ae8a17414a41070e511c1200662b4,2025-02-04T18:32:08.450000 CVE-2024-36489,0,0,483f02515bfc91c5ae3d16c61773df6c14d7d1b71a9ade79929d031b233a7f89,2024-11-21T09:22:16.667000 CVE-2024-3649,0,0,9d4b3c873377dc252861a0a03bd9c832139a807a0ffd6ec04c3597a6690414bd,2024-11-21T09:30:04.903000 @@ -266340,12 +266340,12 @@ CVE-2024-41320,0,0,a79b85660c1cf59b258558e38111a441ef391482fc8a8fe32a74335db9a67 CVE-2024-4133,0,0,b3ef04d8b613050399a6f1883ffb08523c57dc187e5da232762cb73f9e44251f,2024-11-21T09:42:15.257000 CVE-2024-41332,0,0,cc02f33b74ee2fc09a400d920f2e51c2c74d8736b4d9412bf001181512ef987f,2024-08-21T18:53:15.927000 CVE-2024-41333,0,0,66c3404ed9fde92a95b14a6fa3a4ef4f2a79fe01a45aa1f77c349897e4ca886b,2025-03-13T19:15:46.613000 -CVE-2024-41334,0,0,bd83d808106a0cdf34c5bd0d266ad1873f452b388b393a505965d6482da15bf9,2025-05-06T18:15:36.477000 +CVE-2024-41334,0,1,3ae8a4ee8c88441e1eb5ab8927a9b6d515b9f8f5444d477547ec610083935fa2,2025-06-03T14:06:43.900000 CVE-2024-41335,0,0,c8c1f90aa3d7a2b3364d2b6b3802ebf58472c838a6fe8b359715ce31f6ae5a06,2025-02-28T22:15:38.717000 CVE-2024-41336,0,0,c5754e32e597dd06648e4c1bce1a6d8904ca7d235187f9c7249b8af45fc0e8c2,2025-02-28T17:15:15.283000 -CVE-2024-41338,0,0,3d4d3c14e6a706d11950b062e207cfd97ec4d7120e053896e8685f12c2e47adf,2025-02-28T15:15:11.727000 -CVE-2024-41339,0,1,83f55f10174f13ec8d1637a068734c7ad23defbd407fbca71e52f6b6f367a5e3,2025-06-03T13:52:39.957000 -CVE-2024-41340,0,1,a23ca879f4b0d753c3c7ea37d7f92aad2ddbd6f00f96c7e4f8049055d9f1b397,2025-06-03T13:52:23.300000 +CVE-2024-41338,0,1,9a9b2e01ba5959d0a7cb4b88b1c998552219f4f0176a8a77c344dd9b10484cd4,2025-06-03T14:06:40.670000 +CVE-2024-41339,0,0,83f55f10174f13ec8d1637a068734c7ad23defbd407fbca71e52f6b6f367a5e3,2025-06-03T13:52:39.957000 +CVE-2024-41340,0,0,a23ca879f4b0d753c3c7ea37d7f92aad2ddbd6f00f96c7e4f8049055d9f1b397,2025-06-03T13:52:23.300000 CVE-2024-41344,0,0,c38269b43014f5cca22fcf4afc82639c77f2b3bf5d57b1fd1305828277d7aa4f,2024-10-16T16:38:43.170000 CVE-2024-41345,0,0,8a6a87dfa4080752a61cdb78a92bacc8a547bb5d8e3779dd7c2648fc92fcbe83,2024-09-04T14:17:57.747000 CVE-2024-41346,0,0,0540832c689d17af41de8a3343c268de3942f748213352372f3709587645288c,2024-09-04T16:05:09.933000 @@ -266454,7 +266454,7 @@ CVE-2024-41589,0,0,e9c30a32e1d5bd5f4b6364fc650d57d72e5e61f9fa07da023f0932b49a187 CVE-2024-4159,0,0,79fc1543f1260705e74b8deeae175c555b129f183a9014a6e4288a6f9681a384,2025-02-06T17:49:55.727000 CVE-2024-41590,0,0,ae72a29310011ac761f22598a9a9fd38be630e5dd14d9297905fcb9bb42b92be,2024-10-07T19:37:16.150000 CVE-2024-41591,0,0,fbe56be2c7d21e58694890c979fd5b2525d6606e74bcf44af4f4eb9ebfc7cb62,2025-03-14T16:15:34.730000 -CVE-2024-41592,0,1,da34ad5373a3e4f26de17396b443b16c2b3db924958258ea30640b9d1bddd551,2025-06-03T13:52:04.560000 +CVE-2024-41592,0,0,da34ad5373a3e4f26de17396b443b16c2b3db924958258ea30640b9d1bddd551,2025-06-03T13:52:04.560000 CVE-2024-41593,0,0,4c655fb675e2e26beb224f3146b60f9a593776c70e4428cbb9b0d5eb10e9c063,2025-03-13T19:15:47.260000 CVE-2024-41594,0,0,0fa2ba762c2fbc09f3e5499bc08c98877b67fafe9367aa7a338ecace00d5bdc7,2025-03-19T16:15:26.387000 CVE-2024-41595,0,0,55147bb2c7f980be0e8dfce69050f7ac0e8d3bd44beedc81b56dc3a9145dbb12,2025-04-10T14:37:24.073000 @@ -267617,11 +267617,11 @@ CVE-2024-4302,0,0,66fdb40d5f922d2d4de0317e9018af0cd3a3e189a8df49df25906e12ec5df6 CVE-2024-43022,0,0,6dd36dbe448d45eb7a8e2a6d270ed1fa3392e6dac24d3cfcfa8fbab652b67ef9,2024-08-21T18:35:09.733000 CVE-2024-43024,0,0,507dcfcbd4b2b29a81b5056df81401c3171f398b1dbaf241d0884c827484474b,2025-03-25T17:16:04.940000 CVE-2024-43025,0,0,7dd23a231e6d914120103f8f8ea77a404f5ee6acdc732b6bf60404286e8285bf,2025-03-25T17:16:05.183000 -CVE-2024-43027,0,0,814746a6fb857f9362f60378e5438ac474166c5b6273f97f35597c3346909714,2024-08-23T18:35:06.387000 +CVE-2024-43027,0,1,d807a996acee7c3dd301e4fea0010d6710bb7325330a042d8f9796ba210fec90,2025-06-03T14:09:46.200000 CVE-2024-4303,0,0,8558a39b8938ead9c60e5736f29106b617e4d47937b91dcb53a6b3ef3d113751,2024-11-21T09:42:34.883000 CVE-2024-43031,0,0,59c0c5f270464fa026aeecdc5742bae2b3d743f28014f3026186da26f2ab7ef0,2024-08-23T18:15:07.490000 CVE-2024-43032,0,0,18b99d3355201ea4acf0eb44eda6a1e306b05dc1e3d0ee879bca1d4326d3e3d8,2024-08-23T18:15:07.550000 -CVE-2024-43033,0,0,61cb1d729f419f00d724e94bb424f40e1986a75f38d4e14efd14a7888d5d3b83,2024-08-22T16:35:08.663000 +CVE-2024-43033,0,1,21f6705a87b231305743cecca569947109c9ce4e34e99a5a4e46a0acb7655c89,2025-06-03T14:25:22.093000 CVE-2024-4304,0,0,4054bd88475cadb76c02355483cf65150a5e69b7cb6fd0e573c22d8126fc0423,2024-11-21T09:42:35.003000 CVE-2024-43040,0,0,24c7fc00bcabba765361dc058df000d90f1495a06d1cc7d23caabc1efe8ac904,2024-09-12T14:35:15.010000 CVE-2024-43042,0,0,7a4652f9042c3f41111ed646c3bc80b0acd0b77a5c21df60dcb23d137df071e0,2025-03-19T21:15:36.690000 @@ -269743,6 +269743,7 @@ CVE-2024-45651,0,0,4f9f23eef66740309b9e8955f221f531c3a000a787665716e547fa7586956 CVE-2024-45652,0,0,6254bd590ce03a9259b82c0dba15561aacbeb1df97e69b146f493975ca4a2427,2025-01-19T03:15:06.647000 CVE-2024-45653,0,0,d05af724d0f2d97aebbefd0fd2c35f86104d5a99b0f0c483f158528d2ddf8549,2025-03-25T14:27:46.903000 CVE-2024-45654,0,0,84e0b6e2caafc48baa1b35c20875028bfa1c53921b9ea64b0881773217e0e97d,2025-01-19T03:15:07.787000 +CVE-2024-45655,1,1,4b2cfa78237986db3160929d8dee0742a3cac3c918c8a81c2f5946984defa634,2025-06-03T15:15:58.093000 CVE-2024-45656,0,0,bd9c2ffe8b9cbe4ee804430325ca28b90db5a453ccc34b145371cf00c3254208,2024-10-29T14:34:04.427000 CVE-2024-45657,0,0,7a5eef9b925442dc8d84e1f516344c5c80c75658a7c519c6cc81634b57ca69fa,2025-02-04T21:15:26.687000 CVE-2024-45658,0,0,8932f3a8cf0f70fa04aa4437185397d20fc6ebf566ce62ce8b08260d14a6ce74,2025-02-04T21:15:26.833000 @@ -273737,7 +273738,7 @@ CVE-2024-51051,0,0,4589e8828150b90b78c5f1b073be1ebbc9d60f7f75517bd8ffdf59f3d0d8d CVE-2024-51053,0,0,df14748197642c19f425f4579e26ed4da48eb787396a4dfdc60ac3edccac61ce,2024-11-19T21:57:32.967000 CVE-2024-51054,0,0,9c83c4dee9971bc3a669766fe722afb325ac96c292c33bbdad6b4959da2c3ae0,2025-03-27T17:35:17.357000 CVE-2024-51055,0,0,d6c5c38e19622742f0bcc20051b6266df2bd2c4877230f8ecdc6475d8b7a4c5c,2025-04-18T14:38:02.220000 -CVE-2024-51058,0,0,db758675651afe02bbec0e7f15c2da95c569ca097a3bc345df4dbadfb7d58480,2024-11-26T20:15:33.253000 +CVE-2024-51058,0,1,d3e3753e4314141041ca17bbbe8696837d2d96d946b9be7a4b83ae96d803bb15,2025-06-03T14:21:08.673000 CVE-2024-5106,0,0,b32baeddd5d7517902783f8698c8ddf8d7704de9303360c6ce08bd697c855461,2025-03-05T16:18:39.727000 CVE-2024-51060,0,0,6d3ed40e4198086015f639f27bd43af69041211fd9988548637ff6beae812eac,2025-05-06T20:15:26.800000 CVE-2024-51063,0,0,baaa401f76f83c10a16a16ac2300c7ff206c0294cf7e048885c9427fd5cc3d20,2025-03-31T19:26:46.460000 @@ -273755,11 +273756,11 @@ CVE-2024-5109,0,0,201d22e49633dedbd9075bde70b198276469698b3f8d182c50744f61f285b6 CVE-2024-51091,0,0,5e78b6015d2c820814efac8df60c412b14455b3c1ffa2d633d89a588bbd70514,2025-03-04T17:15:12.870000 CVE-2024-51093,0,0,a6898e879de35c8cf2e460ec5a84ae7f0123df10aa875737ef5d0e250287c851,2024-11-21T18:15:11.043000 CVE-2024-51094,0,0,428eba4d2b25aa4f0722ef2b3d4daef54792a17342b2b8a3a1bd37dc73e6ba77,2025-05-22T17:28:00.107000 -CVE-2024-51099,0,0,45dd21cbe2f6eb7e6f11db4fd7bb462d79daf2dcfa2588668865288170d42a71,2025-05-29T16:15:39.070000 +CVE-2024-51099,0,1,055804974cb075da81ff16f9aa419bc0d59d2d99eaaaea2af3fdcca94267384f,2025-06-03T15:47:00.773000 CVE-2024-5110,0,0,6a4943fa22d3a4c423b7bacab486aa156591a7b82c2720ae65bc973c202b558e,2025-02-21T20:12:32.623000 CVE-2024-51101,0,0,1e585fcf6359bc5e52fdc711553790ea577ab99f1e4328d006edab7ebc98d86a,2025-05-29T16:15:39.240000 -CVE-2024-51102,0,0,b8e6887cc86e3b59ebe8b81e37b4a703d33e9f4ba7558cf0e6fc0af8de30ba3a,2025-05-28T14:58:52.920000 -CVE-2024-51103,0,0,c37fc371936994c3c36f36cbcf4c346db304bac5decffc6bf233c8a8f5f89149,2025-05-28T14:58:52.920000 +CVE-2024-51102,0,1,ddb54c7d697dcbf84ff4d213573d426b3a8d0b25b7f332849a85916302d0060e,2025-06-03T15:47:17.760000 +CVE-2024-51103,0,1,23f73f7fac27f7645c3783a2bf65bd3a67f69886a6a57757f7f9178559e6c993,2025-06-03T15:47:09.077000 CVE-2024-51106,0,0,52316175fd89c5253300b2e14d9e26b21a88903277d9d4c00394f347fe89ca33,2025-05-28T01:00:45.410000 CVE-2024-51107,0,0,e8d058f3275405ee8cd75167ee7b3a8d0fe895b1ba608a5341abd7bfb19c6ae4,2025-05-29T16:15:39.417000 CVE-2024-51108,0,0,108ab97d939edd0739dfced9619f858244df5832269b3c37e393a485718cb7cc,2025-05-29T16:15:39.603000 @@ -273963,10 +273964,10 @@ CVE-2024-51502,0,0,d7dbefbfb53dbcc55361828d1af8973baaef8a002ed3b6e965f9f64679273 CVE-2024-51503,0,0,e1b49616d4a00e7d7d3cfa9d7aea7e4c02706f35f12a6b64bc3311e1675452c3,2024-11-19T21:56:45.533000 CVE-2024-51504,0,0,a627aebc8984112665cce121693ae08102fe7e16b5ed7919df3a69779ab68805,2024-11-21T09:45:38.483000 CVE-2024-51505,0,0,59a9c27ff1aa6293764a1805d129d78b3200f41b807deae85bed614c1c751bd1,2025-02-18T18:15:26.420000 -CVE-2024-51506,0,0,b178b442b2bdb7b669ec86a27dfc7425971d45d55efe8b6638c3f2ba9afa9bb1,2024-10-29T19:35:28.723000 -CVE-2024-51507,0,0,280a5088dc034adc96d5f76a4585c4c85f8d3f94be47be06d48feb0ea53be16c,2024-10-29T19:35:29.513000 -CVE-2024-51508,0,0,72235e6a47b6475f69ed0473809812bfd40f39e6cb3d792e2a451a4f8b756855,2024-10-29T19:35:30.513000 -CVE-2024-51509,0,0,68b18830049716f13e24d8cf7049dcc26bd118383020eaba03a5849d186a3ef9,2024-10-29T19:35:31.290000 +CVE-2024-51506,0,1,0f188b847dff5756f20c14ac8f67f7dd3df9f93024ac2a0910692ac01579c55b,2025-06-03T14:53:08.277000 +CVE-2024-51507,0,1,30943843e052c701df27f4a2af3e73dbcc49ed636de642936e8481f479bbdf57,2025-06-03T14:55:25.300000 +CVE-2024-51508,0,1,901589856b8fa403037021fe671b36d535aff9717da72829b56db0fb69aad539,2025-06-03T14:57:49.447000 +CVE-2024-51509,0,1,f3d571c9b1494568378ed4e15eadb49ca5063c272a2f0f9eedaeecc62e999817,2025-06-03T14:57:28.683000 CVE-2024-5151,0,0,4fbc905adbfaecaa9a4c412eecf63022061d0cc1e8ed79e920ddaf02b3594cc0,2025-05-13T16:36:00.963000 CVE-2024-51510,0,0,a49bbbf03d7561244e86cd9ec8d7e7123d78881067b26e7ca105d7f2699960f2,2024-11-07T17:03:03.297000 CVE-2024-51511,0,0,2956967ac1c158dde3e08414a76f80f738f43f813b57ca5b599bcfd7c81d0baf,2024-11-07T17:03:12.743000 @@ -274848,7 +274849,7 @@ CVE-2024-52558,0,0,862aa816f99d7d175aef88936bc531a11569a19b5f814c5d7b923875345c7 CVE-2024-52559,0,0,af632a7cbb87ee504be0a00b900d193f82666532e997cddf8a97d190ed2c3153,2025-03-07T12:32:44.420000 CVE-2024-5256,0,0,351ec0133ebd6057956e3a32f156ca3c6d3a5e82f4f6d83d2ed56c2cf43e8b33,2024-11-21T09:47:17.300000 CVE-2024-52560,0,0,17f5696064cc8a54449a3e1cfd601a790042146971352f114ead14ce71af8bb4,2025-02-27T03:15:10.573000 -CVE-2024-52561,0,0,ae58a3d9d667cb71a74b2a189fc197d330ecda202d1ff14b20d44ddd32761443,2025-06-03T11:15:20.513000 +CVE-2024-52561,0,1,2523b665c8eb8ca7f837a0d2c7074f6d6db590847937a13f6b1632c675ea3603,2025-06-03T14:15:47.283000 CVE-2024-52564,0,0,082fb97e963e24eeaf48108489383b26257575861650145a72a41c8a27e90eeb,2024-12-05T10:31:40.663000 CVE-2024-52565,0,0,02d8cf9601a79a81a90ae9c5bdc3d5a4c9c0865f4264720b000e5fe215f3cc2e,2024-12-10T14:30:45.133000 CVE-2024-52566,0,0,ad9914b2c2d53afe57085e24afde6d252d9adbd5430cfab4bef8a3994295e334,2024-12-10T14:30:45.280000 @@ -275485,7 +275486,7 @@ CVE-2024-53407,0,0,028a3e4d14bfc90eea9cc0c6159117f08c823fe19cf4dd25d6c1d6ae5f969 CVE-2024-53408,0,0,1aab9be4aaf2573b8ac1b0fb3d37a28e2e7437d63a980cdaed7de900ff3950a1,2025-02-28T15:15:12.317000 CVE-2024-5341,0,0,65ff8689965c5e29ef124f69d82afd0c059edc6db5694aac65d8224f8b995833,2025-01-29T18:09:48.960000 CVE-2024-5342,0,0,c19ccffd3ff364daed28ff3ce4f3e63c62c97b909f79a312d9891c60f97a9cce,2024-11-21T09:47:27.517000 -CVE-2024-53423,0,0,28d33619b167a4c51747ed614ba74bcf268536be5c47d91daa2d3ca4835c3e86,2025-05-30T16:31:03.107000 +CVE-2024-53423,0,1,ed5e6f4c3c0fed5d53906280cf00f9afdb869719488d1d9f4f5f554e2cdae7ad,2025-06-03T15:36:02.130000 CVE-2024-53425,0,0,aae3a6cf9674370bd2268c15eab8b624fc94d815c3107a8babad046995af7e1e,2024-11-26T18:15:20.090000 CVE-2024-53426,0,0,9339130e86a75243ea176c2c1911663d0047bd370b4ea0fccb09719eca2c3ad9,2024-11-26T18:15:20.330000 CVE-2024-53427,0,0,7046890ce65dccc1bf63a6a08e048f989a61810260a23dacfa371c3a036c1add,2025-03-28T17:15:27.420000 @@ -276034,8 +276035,8 @@ CVE-2024-54176,0,0,5463f590e796ae65427debb4e96d6df8b03f447d67021c1f3c7471918becb CVE-2024-54179,0,0,cc40342456ec0e93880ba1ff6de6912ca898fe0485f93a482cde3b645de39dc5,2025-03-03T14:15:33.960000 CVE-2024-5418,0,0,e8b4cd9b422aa40da5d2622d5e29796eb5a07db3f41b03941ba29e731fed299e,2025-03-24T14:25:36.727000 CVE-2024-54181,0,0,3e04974e8b1a6b14bc562b3f38845258be106e346d87e72f2301979081de7867,2025-03-28T16:32:40.990000 -CVE-2024-54188,0,1,abfb7e0b3ec5ac91b1cbb24f50653752798673c16f4b76b78e719e6a3d07cb8f,2025-06-03T13:52:30.580000 -CVE-2024-54189,0,0,53b3c84b96ec6f2b48c423db2ab6870480f6c5c9438d15dd5505454cf313d7c5,2025-06-03T11:15:20.613000 +CVE-2024-54188,0,0,abfb7e0b3ec5ac91b1cbb24f50653752798673c16f4b76b78e719e6a3d07cb8f,2025-06-03T13:52:30.580000 +CVE-2024-54189,0,1,0f3cc39a5af1bfc82a2227ac28e0b27304da82983c6ee72ae7e8c56f95d17bfb,2025-06-03T14:15:47.803000 CVE-2024-5419,0,0,bf78f58706f13dc16fbd00574fc12a2ad63186889150404f7c80cf6aaa4041da,2024-11-21T09:47:37.083000 CVE-2024-54191,0,0,247e99cd867b0b816f93e1330170d487e47438a01b1b24e3eb1ed293d8adb8cf,2025-01-16T16:21:27.237000 CVE-2024-54193,0,0,d4064cbcdedae86603fba40721ede5426ca6ed68b9bf4e5893ada8c0fb6b87d9,2025-01-11T13:15:26.840000 @@ -276662,8 +276663,8 @@ CVE-2024-55355,0,0,2bb36a027cfc17a18c27f2dfa7ccd1dd7e44d92fe7cc55df027cf0c874369 CVE-2024-55356,0,0,24a1f90c25942035af99f5d3d7ecc4294dd5cf67c67caa2d1d5b1544ce44efca,2025-01-08T01:15:07.370000 CVE-2024-5536,0,0,1f54d5f4d84e17ea150621a726d470a096ebe102b1b2c9727888baf5a5215c0e,2024-11-21T09:47:53.307000 CVE-2024-5537,0,0,dc964262ed4087ff313c4be3be100753a858d893c6319a531383572e591004b1,2024-05-30T17:15:34.583000 -CVE-2024-55371,0,0,9da985ab55a55149aea6ce791b17b177bb167f3e34443886c7a4223eded144cc,2025-04-17T20:21:48.243000 -CVE-2024-55372,0,0,0be9d23b1d8362c5d38ea060b8d7d4ae7c0da50128cfe0c51d905511424cd408,2025-04-17T20:21:48.243000 +CVE-2024-55371,0,1,feddde3523c65dbcee232eefdd14dbcd2dd4d745017407a529be2ee7d5c38701,2025-06-03T15:00:13.860000 +CVE-2024-55372,0,1,aaab4d829019cc18a3b0ad8bf8d5901315ffe4d7e6d69945226c868299e0a3b8,2025-06-03T14:59:54.913000 CVE-2024-5538,0,0,349018b8a831720930f224f86428ace57b32dfb3177832784fb8b5e53a9e5993,2024-05-31T11:15:09.923000 CVE-2024-55407,0,0,556b85e1087b7070a9c561b1629c1e863de59c432206201377d38b83402acd89,2025-01-07T16:15:36.480000 CVE-2024-55408,0,0,8039c7c557373745154d588f7a6e9302bbcff3813cc276ec09ae1bbee5edf7a3,2025-02-11T01:15:09.410000 @@ -284707,7 +284708,7 @@ CVE-2025-21447,0,0,426315f42c42f42a5481406e4be3e161d98a87e5838d319262f923ee65bfa CVE-2025-21448,0,0,7ebc4e443c7ecb4c31b427e79060d2d52e541e1fd347aab91892496c29efee53,2025-04-07T14:17:50.220000 CVE-2025-21453,0,0,a6792c38b141416584424c30fdb9e75757be44c603a39ac6c3466999938a3409,2025-05-09T19:10:06.443000 CVE-2025-21459,0,0,5c386ebea9ff578717babb7aa51aad849d73bca7cd137939105262b1d5b65dd6,2025-05-09T19:09:53.410000 -CVE-2025-2146,0,0,9b4f4783eb3d5c38d2a6495db29ef3bd1558c0661d5a4cf523d11e6f32aeaf66,2025-05-28T15:01:30.720000 +CVE-2025-2146,0,1,f9f0ee70a1a39eb0556adf9eb68f745a3064e4c76eb406a896b9039c6428fac4,2025-06-03T15:49:50.793000 CVE-2025-21460,0,0,389cc7be8fa099528db069375678ba8c4a64d44cb4ba042b2379ea417e3aa0f3,2025-05-09T19:09:33.447000 CVE-2025-21462,0,0,472fd520000393ead0a178585c5420674292d66900bca0ccacb3268944c15d7e,2025-05-09T19:09:19.660000 CVE-2025-21463,0,0,eea414ba69f1a4ee5ca75c5097c270c878111730470586c60280c9221d600948,2025-06-03T06:15:25.983000 @@ -289365,12 +289366,12 @@ CVE-2025-27519,0,0,ccdb73c39ee93a016094b17abcf363c0c91c0cb8a87d6bd768900a706722d CVE-2025-2752,0,0,2f419f61cff45431dc494e5de187ba8801ef12bb80b36cdd91ab6ec55e9d9f14,2025-03-27T16:45:46.410000 CVE-2025-27520,0,0,eb3d510e2ec71b4e6facfc8b91a612963b703d70470ba5885965b0fab915d40f,2025-04-07T14:18:15.560000 CVE-2025-27521,0,0,3b64245e66b6009e2ff156d542cd7e2067920fb3d6a5d36cfbeb94f5872a522c,2025-03-05T14:00:54.577000 -CVE-2025-27522,0,0,dabd79fe42db17ea6772cf7cb08f0e4b9228b90f69bcc90800af616240d47c06,2025-05-28T15:01:30.720000 +CVE-2025-27522,0,1,696458a683e55fef610b49e4469bf149a24c3d2db9dc4de0c90e10cb90e511a7,2025-06-03T14:09:41.360000 CVE-2025-27523,0,0,bb9bf879a4a84d072dc50ee133463ba6132b66b8ea0e902d92b1b9d5ddef4012,2025-05-16T14:43:26.160000 CVE-2025-27524,0,0,b22286f387851a121c30750c9a0aadd0e2c1a393c996670a2629cc46dcf81966,2025-05-16T14:43:26.160000 CVE-2025-27525,0,0,a4b246e05aa8e9149e0a9842b4c6807efcd61fab385038ed52473da98c7e4213,2025-05-16T14:43:26.160000 -CVE-2025-27526,0,0,ff5d306885873dea26acd993b83c5193ee84c1b9d6996174882cdb40b9f62f9e,2025-05-28T15:01:30.720000 -CVE-2025-27528,0,0,ad2452d2bdc760f9b4a1dee7b5a8f361e527aa6ee62fb566ad0910c827599386,2025-05-28T15:01:30.720000 +CVE-2025-27526,0,1,ddc528ca33e807ad7bd5971d3e294beeb24112a05eee8ee501fa1c1a70ff05da,2025-06-03T15:36:56.813000 +CVE-2025-27528,0,1,737d925979e07df03f0b19543dbdef55dc6a203923452f1c2a733ea2711ffa92,2025-06-03T15:36:47.120000 CVE-2025-2753,0,0,e912daa6c2718d8ed3f24e43ec3e9ee9f4a48455fb53e9e67461e5144c99f550,2025-03-27T16:45:46.410000 CVE-2025-27532,0,0,651aa4a409c4869b141a04074791dba5e586b669772ff0617df8a664fec2b98e,2025-05-02T13:53:40.163000 CVE-2025-27533,0,0,b646a1fe0a6d11554ef785ea8ecefbb2ab2f1a88b51b3c456731090eb57b5f27,2025-05-07T14:13:20.483000 @@ -289641,7 +289642,7 @@ CVE-2025-27937,0,0,46e59abc87395fad933022253638fee740418314c08fa44c43852bb835ed4 CVE-2025-27938,0,0,bf71cc20089ab7c31af5546076ba78a2d82abe6a041a4a3a3ccbdca3b4c0c117,2025-04-16T13:25:59.640000 CVE-2025-27939,0,0,62ad4faad8f2ae97298e92fdca3809e2a8391141ef6e47b0825e7d4aff3fc3a9,2025-04-16T13:25:59.640000 CVE-2025-2794,0,0,b6c5052929166b2fdf6e3c269a20ead353e60c001082fefc35ed2b51aad72541,2025-04-01T20:26:22.890000 -CVE-2025-27953,0,0,bd5d299962b20a4c612e462e31c8b7918d03abf485f4ba366793dcee8c50b1d3,2025-06-02T18:15:23.903000 +CVE-2025-27953,0,1,e1fe6f7ea803db9839cc70851f2034cc4e6965b9af336700d9e8d1bb811fc4e7,2025-06-03T14:15:48.417000 CVE-2025-27954,0,0,26f7ce405d9ad47135f9093c8e426f158d69b2f6a8ce5bf5187b90f21a872722,2025-06-02T18:15:24.030000 CVE-2025-27955,0,0,9d48c50a5b04551b3c0263e29c22a2f1b905b4b581942a2a4b26a65fe8579834,2025-06-02T18:15:24.143000 CVE-2025-27956,0,0,f83c1ea0a2e602acb31301329bc9603c7e2b266381e2a33441e08eb2880cbfcf,2025-06-02T21:15:21.757000 @@ -289649,7 +289650,7 @@ CVE-2025-2796,0,0,53e1f7c20777e5a56703d611323bf74e7aea306b658a5fd01e0390cfe50e5f CVE-2025-2797,0,0,b1486c99f88bb0fe24ee44879fb68daede55b0ca436e040e01e9162820f0ca7f,2025-04-07T14:18:15.560000 CVE-2025-2798,0,0,ce50f1abf598f0e20dbb0b231565f286c9fd88d139aecf5e428c88b471d2c0d4,2025-04-07T14:18:15.560000 CVE-2025-27980,0,0,d2f5f5ebada616a2bc11216168eecc9bced7938b2c036a22eb2533c1949980c8,2025-05-22T15:53:24.823000 -CVE-2025-27997,0,1,49dff829a8f0719aa45380b67d75f5744bcdb3728e9a50fef8e564d4ebde0f7b,2025-06-03T13:52:50.260000 +CVE-2025-27997,0,0,49dff829a8f0719aa45380b67d75f5744bcdb3728e9a50fef8e564d4ebde0f7b,2025-06-03T13:52:50.260000 CVE-2025-27998,0,0,e2041bcf49a632feab6490bf111893b4aff14b4c68e166fea0065c463e83030f,2025-05-21T20:24:58.133000 CVE-2025-28009,0,0,a53f54ff1cb907c68aed417d9d3fb82ce6e4849595f09833f1f065fa722c8f58,2025-04-23T18:53:10.863000 CVE-2025-2801,0,0,16a11cb918ada33c7729454af370785440a0ad0fb25c308d414a326a19159ddb,2025-04-29T13:52:10.697000 @@ -291319,7 +291320,7 @@ CVE-2025-31352,0,0,3b4ee61ff7706e5b838ec3976d4739ae6e58eadd39aa9e1b3ccd9b903a2bb CVE-2025-31353,0,0,aade972dfa9ec47d3e07b242f41f20d76a01f8f078e181747ee000ca91c0162c,2025-04-17T20:21:48.243000 CVE-2025-31354,0,0,a2c1ecbfcb3235477ad8200431c0ea4c81321e989c49ca93cbcc9e6a449508c8,2025-04-15T18:39:43.697000 CVE-2025-31357,0,0,10568eb634d6e712fcbab95ba9d1ba1b9cae9c7b98346cc44a3edcb291c43f89,2025-04-16T13:25:37.340000 -CVE-2025-31359,0,0,1d3622d08cc48c9b0671aec4181cb1d8ea59cbc2bc6ecdef7deac6781b872199,2025-06-03T11:15:20.913000 +CVE-2025-31359,0,1,efa4c1aa02572e03d29ac6983572a8f7d5d8225325b318b6fa0acc55bdad5715,2025-06-03T14:15:48.583000 CVE-2025-3136,0,0,7ff98ba975809b4188d01f2e115e9c45862abffa34dc2aa33ad7cd01529a1bca,2025-05-28T15:59:54.130000 CVE-2025-31360,0,0,d1f586e795abef0eb367609debec6330cd41ffe8fbde4933f6aef94b2cc696ff,2025-04-16T13:25:37.340000 CVE-2025-31362,0,0,29e714bdac918165d1f72d9b66a1fef39fc1fe95242e3501acdc160e75ffc0c8,2025-04-11T15:39:52.920000 @@ -292532,9 +292533,9 @@ CVE-2025-32807,0,0,791ea9650394de4a3c6a4bce28448af084ce5e8fb834d69b1769b35b955fd CVE-2025-32808,0,0,4460b802a312298836218e51f145ee69f847802ae0b680f0631fd4c9d767af72,2025-04-11T16:15:20.673000 CVE-2025-32809,0,0,ca90ff3ced06efa4e939486b48b76783f1482c86186847921ab08cd5bd99e3d5,2025-04-11T16:15:20.807000 CVE-2025-3281,0,0,ec755842ab4ad4eb29d7b4965032bf66aea5a460b05e17db155f703ad8aca992,2025-05-07T14:13:20.483000 -CVE-2025-32813,0,1,3ae7b9a50cdfee1053be6ba464b53733c1d00420316ae6cbc0792171bfb5820a,2025-06-03T13:53:24.730000 -CVE-2025-32814,0,1,b486ea28ae83d5fedf670c2f98bcd408517564c12f53e7955bdf45be9e270508,2025-06-03T12:59:57.153000 -CVE-2025-32815,0,1,a5041bc0f5a993c4fb34b215b647402f77ade33abbbafd6ae9b32630db56eefd,2025-06-03T12:59:26.683000 +CVE-2025-32813,0,0,3ae7b9a50cdfee1053be6ba464b53733c1d00420316ae6cbc0792171bfb5820a,2025-06-03T13:53:24.730000 +CVE-2025-32814,0,0,b486ea28ae83d5fedf670c2f98bcd408517564c12f53e7955bdf45be9e270508,2025-06-03T12:59:57.153000 +CVE-2025-32815,0,0,a5041bc0f5a993c4fb34b215b647402f77ade33abbbafd6ae9b32630db56eefd,2025-06-03T12:59:26.683000 CVE-2025-32816,0,0,7146ab229fea4de6245a9faadeb60513e017f27b734755baaf195d3f55011510,2025-04-11T15:39:52.920000 CVE-2025-32817,0,0,8b6f04caa830a0ea93810ab4c8eba574bc1867ee17bc40202e1fbd1543823077,2025-04-17T20:21:48.243000 CVE-2025-32818,0,0,5e54d238f6a350e89e91e1728be0dc339348ac2a1d2e8bfcf1b4dfe58cd7bcde,2025-04-29T13:52:47.470000 @@ -293016,6 +293017,7 @@ CVE-2025-36546,0,0,a3d190116ff33d28a9568351832ce70c70aecf8ab001cfb216ed0ea5695cb CVE-2025-36557,0,0,10d4b26bd4092d9203a2e113b056bea851721ed63eca24b2006dce264ace1ecf,2025-05-08T14:39:09.683000 CVE-2025-36558,0,0,f7ba1efb73da33ba35418104474d3de926b1549af2f93d6130fc139c04b0fc60,2025-05-02T13:52:51.693000 CVE-2025-36560,0,0,69f4a5989b5124f7f2b1a6e9227991ebf4cb4743ed3c1503408fd719a2cf79d8,2025-05-19T13:35:20.460000 +CVE-2025-36564,1,1,a2533d975a72c787726d963234957c35e86278b6e196783fbd751c9900d3950e,2025-06-03T15:15:58.600000 CVE-2025-36572,0,0,058b67de5ee82f1e6220c3754353a9e125a12fbf0176dd2f3a1d9ddfb79707a8,2025-05-29T14:29:50.247000 CVE-2025-3659,0,0,039e45884228ee6931146a26d674c81218c137b52a98fba4b25ba26a78f9ee4c,2025-05-13T19:35:25.503000 CVE-2025-3661,0,0,dd52ef0b5adcc429dab993fa8b0a07866db488604856f931ffdf953b111b0450,2025-04-21T14:23:45.950000 @@ -294007,7 +294009,7 @@ CVE-2025-4136,0,0,b8475b2b882f1f1345ee88b0d17b9c4d6134110c252d26b338548acd634728 CVE-2025-41377,0,0,82ea15ae2890a38734e5e2f1f2c12a7594e41baf3f931c262286eb5faac8ce5f,2025-05-23T15:54:42.643000 CVE-2025-41378,0,0,5b6d8d5c702a8167efa977dcd19f35f0ca2360c022be8191a2107adcf7208804,2025-05-23T15:54:42.643000 CVE-2025-41379,0,0,f86511b9b1e0ab25605878d94a89c39fe68bd0e872e48361b86d201a5e51e7e4,2025-05-23T15:54:42.643000 -CVE-2025-4138,1,1,61406e10d0f91f874f0547e0f54b306c605ec487f5513b6f97b8ebe834f2a7a3,2025-06-03T13:15:20.377000 +CVE-2025-4138,0,1,9424f0a7ce130760d6af1a031f1dac7a9be3603489bf073c176d02a324f4719b,2025-06-03T15:15:59.337000 CVE-2025-41380,0,0,6a50932054dc502ee7c0d77cfea4430344ce4717310545d50ac9fc3a7b76dc81,2025-05-23T15:54:42.643000 CVE-2025-41385,0,0,f202cf376f952bff64515c4550ff9565840ff906c956113907527beb89e5cb1d,2025-05-30T16:31:03.107000 CVE-2025-4139,0,0,5054f893b63e445c1832a76be273932e408388835ee5cae9b0b72cff821e3844,2025-05-02T13:53:40.163000 @@ -294030,7 +294032,7 @@ CVE-2025-41431,0,0,457130baf4dd6b7cc1c6ae128560ec31a298f522cc0ef7f373b70c3f0729a CVE-2025-41433,0,0,f6273c3cc0a212df803e85bf8ba3fed5695ff63848595dbd80f25b739ca0954c,2025-05-08T14:39:09.683000 CVE-2025-41438,0,0,11ba6504cbbbf79eb2cd396e9c090ab75fa4dee3d0b15e980e071c03e0563d88,2025-05-30T16:31:03.107000 CVE-2025-4144,0,0,ed44a24e80e1487d547bfe32499c8ba4450309e0e9d0acd2df7ebfcd519c74a9,2025-05-12T19:39:31.053000 -CVE-2025-41441,0,0,35c96ebb7dbe005f9542387bd208ceeaccfbc21065e2c3279b499e72acf7c94d,2025-05-28T15:01:30.720000 +CVE-2025-41441,0,1,3b51a802d5e876ef5e3db952c79744bda892bc6a2133cce8cddd52ad9c2cfab2,2025-06-03T15:42:40.710000 CVE-2025-4145,0,0,fa58d4933201d65cc9b44e9816af7313e719b690552f69a8a0e4a077c4fb877f,2025-05-12T19:39:15.540000 CVE-2025-41450,0,0,4e7db9e6a2f333eacb62d02ca3c8295c9ab4584aaa2c1829b76057cf389c3cab,2025-05-14T10:15:17.687000 CVE-2025-4146,0,0,07eb7fcc601b4a07c54a54f1a27fd62b73f5d21ac1225fa7710ce74139eda2a3,2025-05-12T19:38:57.493000 @@ -294093,7 +294095,7 @@ CVE-2025-4197,0,0,ed8ec740b973b92253a741cf6d5d0ac209bbd44763ac57f0fdc0af84aaf28e CVE-2025-4198,0,0,e5602874b7c5cc6f9012651f4a60dc8d2e789373501ddfec072de22c80a74167,2025-05-05T20:54:19.760000 CVE-2025-4199,0,0,553c17b65a2b6efd623dda6e1567d529495701f64dcb6b078b725c7f2893112f,2025-05-05T20:54:19.760000 CVE-2025-4204,0,0,add65f309bdc246d6795c562286e41c6c66577fba27c15ab2d96b83692acdeca,2025-05-02T13:52:51.693000 -CVE-2025-4205,1,1,2c141e5d9e41338cdcd1ebfdf5579522051df0e6935c94c94147aa7b09749577,2025-06-03T12:15:21.350000 +CVE-2025-4205,0,0,2c141e5d9e41338cdcd1ebfdf5579522051df0e6935c94c94147aa7b09749577,2025-06-03T12:15:21.350000 CVE-2025-4206,0,0,bb3cb9f07bfc9d08a2c0843d010f353ba8ba2d3caafa1bbc30e33b9667f14930,2025-05-12T17:32:32.760000 CVE-2025-4207,0,0,98d1135f1a385487da30c39cd5b8b4714c39d026b29a623db1f9e974ad20dd9e,2025-05-12T17:32:52.810000 CVE-2025-4208,0,0,cc84649383f4f5239cac290e4c572d2111da796611d3a4f7f84518996f0b2e35,2025-05-08T14:39:09.683000 @@ -294216,7 +294218,7 @@ CVE-2025-4326,0,0,b744367347fcdc6325488ca30d0fb2ae6b89ccb51a35e88456cf45435deb24 CVE-2025-4327,0,0,b094135b5b47a7bd79bfcd45815e0460a9020df27d7ecc56f318e0e775dfd78d,2025-05-07T14:13:35.980000 CVE-2025-4328,0,0,e8bdcc0bd3fa88242159a44c5ca54793c131dd6edc873e6391897450ed26b86c,2025-05-07T14:13:35.980000 CVE-2025-4329,0,0,f1d879305600d1c851583b5c74d0d1aabeddb925980971909508f84a0c2f2037,2025-05-07T14:13:35.980000 -CVE-2025-4330,1,1,fa3d9f99092784fcacd7cf3b27e5e94c01fb05d895593fb799b7c7850995da13,2025-06-03T13:15:20.503000 +CVE-2025-4330,0,1,ddba602adf86ab7aa00c89aecec1419602d57fe852efa3c202d4accd376c488a,2025-06-03T15:15:59.493000 CVE-2025-4331,0,0,620e0da85354d81a367a41b7f2e39eeaeb31d846f9c0b35d1175b07ed628b224,2025-05-17T15:15:46.090000 CVE-2025-4332,0,0,db3fe613c2dc0144a41ad5ccdf0f64634590f7b602471c6e9907c2e2377073ab,2025-05-09T13:36:24.223000 CVE-2025-4333,0,0,df346cc767abe9739cdcb38e3128deec2b82a2cef52e4ce255a43a7764d0a6a8,2025-05-07T14:13:20.483000 @@ -294349,6 +294351,9 @@ CVE-2025-4392,0,0,dac40497d85d0008ac6df90c7725f33db178c5c730ecf0a95d45819f9fba52 CVE-2025-43920,0,0,a93ea085d5c9b285842c20a6cabb6e3bd669bd42c39c42462b7c06195a41f1d6,2025-04-28T14:15:22.323000 CVE-2025-43921,0,0,4042bcd81d7e3864da5b8ba4d01fe494ca12b33f201fc6021c6725eb890091e8,2025-04-28T14:15:22.477000 CVE-2025-43922,0,0,78ba59a603bfb99812991a8e1a7955ce6faa943c6ec5cbadbdfa1e2ab9c91614,2025-04-23T14:08:13.383000 +CVE-2025-43923,1,1,da6e8263b74032f35bf428bc0766d5001c56f7c5442e780f5e968168aaf9acbb,2025-06-03T15:15:58.767000 +CVE-2025-43924,1,1,7bd9370679e298fe3412475b90e04f5f5caebf7be0bfaac9bee8139c30da1039,2025-06-03T15:15:58.883000 +CVE-2025-43925,1,1,ff82877a2c4bc5fc9b326898cac24f50109d6bc9b3a1c39eaa987865e253cd94,2025-06-03T15:15:58.997000 CVE-2025-43926,0,0,2f3d1ec98578fa56e3654b3927ae44c5545787a634e6f39282c1fc647bb3404c,2025-05-12T19:15:49.287000 CVE-2025-43928,0,0,ada37df9b018408af843f1b1cc9151f6f5a494aafca776d997eba7b7d4788264,2025-04-24T16:00:50.257000 CVE-2025-43929,0,0,867435a167581ab99f3a2b85e0ea6073e3538639a37e0ae43a9f94228cfe9a85,2025-04-24T15:46:35.757000 @@ -294385,7 +294390,7 @@ CVE-2025-44071,0,0,2772db9d2d7dc3a2f1886d3495d15be2a65239054354b12c18090ea5927d5 CVE-2025-44072,0,0,66cb314272334a06d99ce1609f65344916890c52ec9c458ff627cd7071565ba0,2025-05-13T20:05:16.493000 CVE-2025-44073,0,0,bbfcd71568565582165c8104d1cd8b3658d2eb1d27beb6ace6f7708030ebca5f,2025-05-07T14:15:44.040000 CVE-2025-44074,0,0,a07abf1517695aa7f067711dbd8501cec1c1dac19368b70ce83f8cc0a4c96967,2025-05-13T20:05:29.563000 -CVE-2025-44083,0,1,9046793f34bd6f929b6235055941a80a823b0cd56db66235de77c34aa9f0f37d,2025-06-03T13:52:39.333000 +CVE-2025-44083,0,0,9046793f34bd6f929b6235055941a80a823b0cd56db66235de77c34aa9f0f37d,2025-06-03T13:52:39.333000 CVE-2025-44084,0,0,9e514baa1a1b4ecd455bdc468a519f4662e489440f358688b169a12eb8124052,2025-05-30T16:19:21.193000 CVE-2025-44108,0,0,e6c69187ec79a73187c11fc6f0b558211f29323e42fdaf803e3406ad9e85069c,2025-05-21T20:25:33.823000 CVE-2025-44110,0,0,5163d7a49439bc569f2ec884f7cd894f40697aa11ba471170347f7df11cdac30,2025-05-16T14:43:26.160000 @@ -294395,7 +294400,7 @@ CVE-2025-44134,0,0,45b85d904dd860695476948041d246707a0696d9dc7fe9b405a5e27a85d44 CVE-2025-44135,0,0,e8d32c865e9ccdb8b63503c21fad4c48843876d5709a3df063410109f034ccc9,2025-05-14T13:04:58.830000 CVE-2025-4415,0,0,842147d08c13efcbee3eee94c9e6b73fdc7bd886265d0112fafca4c76640377e,2025-05-21T20:24:58.133000 CVE-2025-4416,0,0,947e34b55b1f3a049a504a042d77855f4bb594e5af127c8b711744c73ee871aa,2025-05-21T20:24:58.133000 -CVE-2025-44172,0,0,155e1086e0413c6b32f4cf000a1475273ce2ecf630c036131001eda4747e3954,2025-06-02T19:15:27.917000 +CVE-2025-44172,0,1,c78f9d9932a5093f6fd2dd92edb0ece1c73f28734d84b3772f8246b249ade2e9,2025-06-03T15:55:33.757000 CVE-2025-44175,0,0,6a1ea2c060c5151e759fb4f6f9f8a177685f1f644be37fecaa66c9a597ac256e,2025-05-13T19:35:25.503000 CVE-2025-44176,0,0,06ea95c07747d5a57bc4a45bf66b04996fa2438a7e4362161ea04e3f0c60e03f,2025-05-23T19:00:51.080000 CVE-2025-44180,0,0,cbbf280e22b3f1eceb8396c23851cf21862b54048f76231b82a81c5cae091205,2025-05-28T14:30:23.873000 @@ -294418,7 +294423,7 @@ CVE-2025-4431,0,0,f9a9311c0ec05bc4663ed94b4ec1f8c56db08bd61ae75a55c59b8e564c2166 CVE-2025-4432,0,0,813cec0cb180e837181e2d39de9b9b934de385ad08a799d2cf0711f93bd8b820,2025-05-12T17:32:32.760000 CVE-2025-4433,0,0,21bfa3b45038dc83bff46fd300c483ce25e6e5c5938f9f5483c2a41e15b72262,2025-05-30T16:31:03.107000 CVE-2025-4434,0,0,680d6f1c8416e0c44eb562c208640fb3f26973e13f6fa443eed77fbf8e133505,2025-05-30T21:15:20.920000 -CVE-2025-4435,1,1,4915b90f54430bf63e81c4befbc1048e76aa4df13747f203bcf9bf027e9e9bf9,2025-06-03T13:15:20.630000 +CVE-2025-4435,0,1,fe024f5fab3ca4f532474fa710a603c471a7556486dbe9d63f7490b8b78de22c,2025-06-03T15:15:59.597000 CVE-2025-4436,0,0,85a8f0318ccedc4ef4ef6314b458049fc833acf857a8e235d2ecff13798cf4d4,2025-05-20T23:15:19.440000 CVE-2025-4440,0,0,2664c1cf05645457f92ebc54a1f1ba520a15af0474bcfaabcae2efe1f592618e,2025-05-12T17:32:52.810000 CVE-2025-4441,0,0,b51083d28e8ffdf67b9f556d8821335246ec3c3d0df9af168bdc304029601b6d,2025-05-13T20:23:21.277000 @@ -294511,18 +294516,18 @@ CVE-2025-44888,0,0,c6298735a15b8093736a3fa265484c93b7002c1dc05f52c6b6a97c50c018e CVE-2025-4489,0,0,cb384b96cb79a18c629a4cd7799ac59df883e74bbe4965dab7b87a7ec502eeef,2025-05-13T18:57:46.763000 CVE-2025-44890,0,0,9e5880ae78af3911bb6a291aa676a8e4e3f86319880a494fa9b7f860d2eefb07,2025-05-29T15:54:27.860000 CVE-2025-44891,0,0,d8402d540bc6c377a7023855038aea2e3c2467ae7309d3c98213991c3c1e7b4d,2025-05-29T15:53:56.800000 -CVE-2025-44892,0,1,b478ba0909d0a6b2c2bea7c8dde08680662470abc51772883b12f8f68d61ed08,2025-06-03T13:53:03.090000 +CVE-2025-44892,0,0,b478ba0909d0a6b2c2bea7c8dde08680662470abc51772883b12f8f68d61ed08,2025-06-03T13:53:03.090000 CVE-2025-44893,0,0,fd7ec4214a76e57a4903bbb5716df905f6577b948d6dce87891c2a0e0a727536,2025-05-29T15:54:20.800000 CVE-2025-44894,0,0,64b103b40caa12dded4715d01742d3f671571afd0773eb2b7670cae1b8947970,2025-05-29T15:53:52.840000 -CVE-2025-44895,0,1,32607d9226d2fb9dbb00c1875c22799a7986dea9671545f844d8ff3aa5110f5b,2025-06-03T13:52:57.017000 +CVE-2025-44895,0,0,32607d9226d2fb9dbb00c1875c22799a7986dea9671545f844d8ff3aa5110f5b,2025-06-03T13:52:57.017000 CVE-2025-44896,0,0,85bb59de7db7b78740fbb4cd07bf1b6569831419d96796e84abcfadb76c4b44a,2025-05-29T15:53:41.187000 CVE-2025-44897,0,0,679bdd226c04e8fab647142a7da2ce38f8d8c0338e8d6bccae2189d1d1ac46c6,2025-05-29T15:53:05.230000 CVE-2025-44898,0,0,00f56bc57a320f91df3fa7fc95ffaa1ee96996a1e9fa9168f201ce677148e359,2025-05-29T15:52:54.290000 CVE-2025-44899,0,0,daff59fb519a4db32f0424c3af721844425c74737f1b70db9fa7d94f9f3ccd1d,2025-05-07T14:15:44.197000 CVE-2025-4490,0,0,241f08f705ae3e66d0cf435e9f641db9abaac260a233ab4f24995312c1bd3320,2025-05-13T18:57:34.007000 CVE-2025-44900,0,0,e39f280a6d5d7101926ad5d62b1a5cfd8d8a3095b970f6561ef9a5281cbaf6fa,2025-05-07T14:13:20.483000 -CVE-2025-44904,0,0,91b38e22bbff7645e277455a40203c8c8fcd48f51ec99689b3bec30e9052fe44,2025-05-30T22:15:23.140000 -CVE-2025-44905,0,0,739020bba2388a94502d89f080b5760d7bf180464391daafff834662c3f430f3,2025-05-30T22:15:23.313000 +CVE-2025-44904,0,1,698017dffc9baafe7f90678fc77c6bf37e6dde2be1b0112d7bbe4b0cba948021,2025-06-03T15:35:50.377000 +CVE-2025-44905,0,1,55f5d849eeb5a9403dc8d40445e406a7d903c79ed83689e9e12fa9fbbf4ce28a,2025-06-03T15:35:40.283000 CVE-2025-44906,0,0,c8103e878c3fa1d7356459ae8dc1dfff176124c9cda8bf86409428eb2bb7d846,2025-05-30T22:15:23.487000 CVE-2025-4491,0,0,ba256d8517f70212e591537769bd709f798dda4e9421bc8dc0e19810c50211c2,2025-05-13T18:57:25.977000 CVE-2025-4492,0,0,4eec4ffb9ff09b31eb69062234f9086984737bbfc848cc0a9df2b8747073742a,2025-05-13T18:57:16.670000 @@ -294561,8 +294566,8 @@ CVE-2025-4512,0,0,4bc127dad728cea971a7dc75249591809a3cb32fae7bb8b8e7b7b730a069ef CVE-2025-4513,0,0,07bb12809c9624505f96cc0b646724d4d7277016849e93a883dbac45774258bd,2025-05-12T17:32:32.760000 CVE-2025-4514,0,0,8ec1805f4f97bd70a1c948cf3cee2fc7b4e3869030a6e61bb33b5355ac6812fc,2025-05-12T17:32:32.760000 CVE-2025-4515,0,0,15842f64bc5158ee594ebc8bcc08fddcbccd67b13581d77b6c2aa4b49c2d35dc,2025-05-12T17:32:32.760000 -CVE-2025-4516,0,0,d7a0c85e9cd45537863a16b74c4514afb35344857f27707c19295f71193283d7,2025-05-19T10:15:21.153000 -CVE-2025-4517,1,1,8f3c4917e8c8a32ffcd063dc31965b78ca29ab9e3b2df784943081d5aa47b9eb,2025-06-03T13:15:20.837000 +CVE-2025-4516,0,1,796b8f07feac2cf0afff20513d00fadb85e8da28c0408ddb3453089e5fc0ed01,2025-06-03T14:15:49.697000 +CVE-2025-4517,0,1,201f59572a0d0e4a5ee93e73f389eb0d1e29e78ec18180781772f8c363438c2e,2025-06-03T15:15:59.713000 CVE-2025-4520,0,0,2649cd1b163a0622d5bf29e4b3dee5950ca643285f952a7b68fc954427092ffd,2025-05-16T14:43:56.797000 CVE-2025-45236,0,0,4ca5831e33dd66784c123f97c0a9d8265ca1feabbffaf4dc2d39d3c2f66d4ff5,2025-05-06T04:16:13.253000 CVE-2025-45237,0,0,414c6d4926aa8e975f1ceb6a1391c6c89ae9a0f19f49206e4657b3ab23d52111,2025-05-06T04:16:14.413000 @@ -294585,7 +294590,7 @@ CVE-2025-45321,0,0,9227564f6386651a6df0923ea8fb2c1e9f2a2f4487dcf05f9020b166648d7 CVE-2025-45322,0,0,bd98baac9032c4924e89f536321099d3c4e9b0a26b0e91693b82dcae0f7fc3be,2025-05-07T16:40:08.760000 CVE-2025-4533,0,0,958714e8219e4b36bf6a5171f1844fbafd960204dc55ae1eaffcf3377f047967,2025-05-12T17:32:32.760000 CVE-2025-4534,0,0,d56048b96631b6a170c2f4a1ae209f80a8905f2c01c2315ddf151590a444fbdb,2025-05-12T17:32:32.760000 -CVE-2025-45343,0,0,87e0c5dce58665f21194fe4e4a14d5ffc3984ef6b35dd2736d75ce3201a7b44f,2025-05-29T14:29:50.247000 +CVE-2025-45343,0,1,7615694706f3e006934d6364d7caac354737a6562145f3bc3ab74518e76c62f3,2025-06-03T15:36:32.347000 CVE-2025-4535,0,0,211c420ea7fc40b2c6369c81b50b72179abd6b1518746dfb87b4fb36af845bbb,2025-05-12T17:32:32.760000 CVE-2025-4536,0,0,a2b8008b92a195b68a0752c6339879ccac94f1f570a919d5eaed929b26125f6f,2025-05-12T17:32:32.760000 CVE-2025-4537,0,0,3541ad22bbf9e4ca3f8ea882220c2357e61730ded40620327b0ee2be0afe12a2,2025-05-12T17:32:32.760000 @@ -294677,6 +294682,7 @@ CVE-2025-45844,0,0,170e4458f6e69c5733a6ca0576787120453cf06374da04006dfb1f43b2021 CVE-2025-45845,0,0,93cb9b992f3083f016f98f51918ecbc05e2ba26a62766c25f0e76aaacb981d93,2025-05-16T15:39:26.913000 CVE-2025-45846,0,0,51d693d14f22c6c735df1fa76b25052e8a11d20981dbbc646066d2d29016b231,2025-06-02T17:27:55.547000 CVE-2025-45847,0,0,4ed18ef753848179b985042a19837700c8f0cb1a81c7d5ce45292d9f94eadadb,2025-06-02T17:27:39.587000 +CVE-2025-45855,1,1,12c5469ad3d27d6123219aa1ff10d058a4ba03ede71f8bfb87d8f433af01178d,2025-06-03T14:15:48.750000 CVE-2025-45857,0,0,dcf851c628b00f7cbf7f9997f2bbb8d1869ef466c2968b3bd76ff4947bdcf23b,2025-05-14T14:15:29.737000 CVE-2025-45858,0,0,a000c9c9a64c590fb591b967028ca45d12f9b4512bdd2b8ce0395e50725e9c2d,2025-05-23T18:57:36.203000 CVE-2025-45859,0,0,7ccc8c579c3ded8b511a16ef9ebce8f599ee2988593652c331af7f7565fecb66,2025-05-14T15:15:59.213000 @@ -294711,8 +294717,9 @@ CVE-2025-46078,0,0,0eb88b6bfe107f39e1f01c9c7323500ca853b14a91822349f3833fbc9fae5 CVE-2025-46080,0,0,9dac460bdcd48bf067de342a171618029005d40237a5299adf62044164e1ba7a,2025-05-29T15:15:33.980000 CVE-2025-4610,0,0,d61d953fe0fd6f0d2b21233839836df5133468380db75b47c2a05d78020b6b82,2025-05-19T13:35:20.460000 CVE-2025-4611,0,0,551957ca30c77144066c2501102cbe8b5cc59e5d0e8959ef20d14b731299a950,2025-05-21T20:24:58.133000 +CVE-2025-46154,1,1,c163f254d02cd8d61a891e3606f69308846a7c7b7635653ada2f8e83982eab5b,2025-06-03T14:15:48.880000 CVE-2025-46173,0,0,f1e36ec33a02fee01307659dfca8b67a706a6ca070153a7459464089a027cd3e,2025-05-28T15:01:30.720000 -CVE-2025-46176,0,0,e8b2440ac8c1596714ad0cb298a50dffacec6508dc1809912d8739da1096182d,2025-05-28T14:58:52.920000 +CVE-2025-46176,0,1,4ad29bbeee58de7eb7d271c0fb79c01a588d38da2dcbe15f5042a3054d2345a5,2025-06-03T15:47:26.543000 CVE-2025-46188,0,0,1f058d9f060b53aea2c6bd942ff17e7f4fc325ea6eb31f01c661d2a700e76c55,2025-05-22T19:03:17.713000 CVE-2025-46189,0,0,deb091a7b16f83dfae0adf87dba814de45a16152802aa3583ba953e5461c909b,2025-05-22T19:01:31.820000 CVE-2025-46190,0,0,49ae57538389712e46bb1f8218d4d6fdb9fc8500296b0c348e5059e767ffc2b0,2025-05-22T18:51:35.560000 @@ -294942,6 +294949,7 @@ CVE-2025-46544,0,0,4120aae58d7c5277d6551ad1cdb9c175cafe443f251085276d872524c1be7 CVE-2025-46545,0,0,49c64419c783edc04be167542f9c9c5b3bb0718a9532c122371098e6fd9aab5b,2025-04-29T13:52:28.490000 CVE-2025-46546,0,0,96c9755ac24b0a80a46cd7d4b516355010ab85eac7107b893b6b384fa219f3a1,2025-04-29T13:52:28.490000 CVE-2025-46547,0,0,8acc1afe45e6a60f966cb7e5b4fe1e3f801c3ab7386ec5552ef5a599cdb15e24,2025-04-29T13:52:28.490000 +CVE-2025-46548,1,1,9a070986bbc1eba8320fabaeeef1fff55de3284813a82df5e452daec0c7d4107,2025-06-03T15:15:59.110000 CVE-2025-46549,0,0,d16e6050d76f8adb18df47e56a286200cdec050678fcac3a8faadc8a470f689f,2025-05-09T13:59:06.793000 CVE-2025-46550,0,0,6a81f91460b68bcff7d1aabec24c95eeb7dcdf5ca7521f79c790b91d18cc58d2,2025-05-09T13:59:35.920000 CVE-2025-46551,0,0,374f0eaea258cbc432bcc1a6904795cec2ccd3999573fed32821ee79090bc308,2025-05-08T14:39:09.683000 @@ -295023,7 +295031,7 @@ CVE-2025-4669,0,0,54ec364588ee900808fd1aa8d968e01bed1a2da1f35945030ba5d2b9e5be2c CVE-2025-46690,0,0,973a37c2db031d79f10319288b5777f494d38cd710bbcf14cf819512ce030af8,2025-05-12T19:31:51.950000 CVE-2025-4670,0,0,b10edf3b6f71bdf8699eb65a94c6cf4caaaea0ef9ffd3b5514b32f41c78e11d6,2025-05-29T14:29:50.247000 CVE-2025-46701,0,0,deda192404567412c4b0078d632358a2acbdb043d7c4dcfd46aed0b54a6719a4,2025-05-30T16:31:03.107000 -CVE-2025-4671,1,1,a3a15760409cc2dae9dd8a50130dcff02497fe88bcaf05bef18e03df780b19dc,2025-06-03T12:15:22.443000 +CVE-2025-4671,0,0,a3a15760409cc2dae9dd8a50130dcff02497fe88bcaf05bef18e03df780b19dc,2025-06-03T12:15:22.443000 CVE-2025-46712,0,0,0c073dcafa656dd770ca6df4993eba5d01868e4680b3acd34dd6f33ce4c7aa2a,2025-05-12T17:32:52.810000 CVE-2025-46713,0,0,52b5f47481eed81cdfa77d7fdf7e1eb397e2770a52108ac1a8158bbb54118740,2025-05-23T15:55:02.040000 CVE-2025-46714,0,0,0a41c2a9ca714c22e2b0866438762cfc18c811db79b3df98db455c7fc3a6108b,2025-05-23T15:55:02.040000 @@ -295111,7 +295119,7 @@ CVE-2025-4687,0,0,1640607bc7fe5794fbf2fa14f9879451ac745ec329229aee355cca70f8ae7d CVE-2025-4691,0,0,083ed8350a09bb36584a393f0bafb56c66e0bf68ceeb64aade909a168c7898a1,2025-06-02T17:32:17.397000 CVE-2025-4692,0,0,6b3541c77076c4057b96e95cd4d05354ec769644d2ab1b6cb8b6a2615ff8f8d7,2025-05-23T15:54:42.643000 CVE-2025-4695,0,0,0a0f54d4c59f025a44c7f56cf61d2ee6bfa8db27b80bd2484bf98e0dfa12f657,2025-05-30T09:15:25.950000 -CVE-2025-4696,0,1,3c1d80c21a5ec0ac6ab835b04972aa87d384361ad09ac9685636f2795bbaa348,2025-06-03T13:15:20.963000 +CVE-2025-4696,0,0,3c1d80c21a5ec0ac6ab835b04972aa87d384361ad09ac9685636f2795bbaa348,2025-06-03T13:15:20.963000 CVE-2025-4697,0,0,bfbb2280e3ce953d874c6922904cbb0aa3f9380019c3332d7eae9696f7039e5d,2025-05-28T14:30:43.507000 CVE-2025-4698,0,0,629d6280fd3d3fe101760664e35242f9f6abe094cabf022cd7d827567767722a,2025-05-28T14:22:16.457000 CVE-2025-4699,0,0,8050368b263de08669c173a654994e653b6b74b6e1b034c43e19a012e2c34d52,2025-05-28T14:29:57.107000 @@ -295145,7 +295153,7 @@ CVE-2025-47203,0,0,5affb412d65195e809b09967884d230d1db85b53ddc355815b9628e8d17b2 CVE-2025-47204,0,0,1087581499a2135246bfaa4b4dda36ede5f4134f69e3bfd8a83443409525f3f7,2025-05-14T14:15:30.460000 CVE-2025-4721,0,0,5b12152a812ee0a8141ca92ad1ce07fe54f58122d1a25434c4f23dc9f9b473ec,2025-05-27T14:13:32.497000 CVE-2025-4722,0,0,7a9f4792d9d2d1bd9669bfc9ead090bdeb53cca7dd5e461fb6c113463a0e9c32,2025-05-27T14:14:15.353000 -CVE-2025-47226,0,0,d24600cdea8bff5b0bb5f4b42246b8ace6d10040efe8cb8117d12a87f04487ed,2025-05-05T20:54:19.760000 +CVE-2025-47226,0,1,9e9ee9e6a0d1290ebfec3cf4efbf332e325ff8173805761710078650f408fa82,2025-06-03T14:44:17.277000 CVE-2025-47229,0,0,ce628b1ca08883508604ad35fbd46640a7a9f93ddbaf98a26f657b9032cc95b5,2025-05-05T20:54:19.760000 CVE-2025-4723,0,0,0415daa35bafd9e63de1b551374da44563d1be8395330dcde3975fc4eef0ad28,2025-05-27T14:14:25.467000 CVE-2025-4724,0,0,22ef6d583945f18353bdb4e3bec008d3a4110d3da2137080faced1b57a1b5a5d,2025-05-27T14:14:38.270000 @@ -295234,7 +295242,7 @@ CVE-2025-47456,0,0,9655633786000f2348a6229ff73cecc6744b6845eff3de91192d8993b0213 CVE-2025-47457,0,0,37c3eadc5530d1f853e7d9cbf2f977594859777d8a9dcb482717a9250c2989bf,2025-05-08T14:39:18.800000 CVE-2025-47458,0,0,3e7fc2c96e325707093948334208194e05ea07b94f01013aa34df28215b2ee2b,2025-05-23T15:54:42.643000 CVE-2025-47459,0,0,42f1a6e384afeaaebf50b1e28c828d44792e6d9e0605b7d697062f10110052a5,2025-05-08T14:39:18.800000 -CVE-2025-4746,0,0,f78bf1e85aa20c79e4528cb7e6f6a6a31b3c9c5e25ea8495775d577ae8300682,2025-05-16T14:42:18.700000 +CVE-2025-4746,0,1,bf02eed6b3260262be226df3330f98321e746d334dfe3c3676cc04f27c4ca6c8,2025-06-03T15:57:51.383000 CVE-2025-47460,0,0,b7519dac17710856824fe060b1c9bdeb3f7906d05f1b9bddac0fbc9972454a5b,2025-05-08T14:39:18.800000 CVE-2025-47461,0,0,8ddb18c03b7f2c4dda33b119c3abc1c1564a904f027eb292e4a5bfb29a1f4914,2025-05-23T15:54:42.643000 CVE-2025-47462,0,0,f885e8e128ef3f4b0f8a086643e3c654a8015bc64dba9334b08e5a6ad86732f1,2025-05-08T14:39:18.800000 @@ -295261,7 +295269,7 @@ CVE-2025-47485,0,0,6d13ac9b94cd4d028acaaeec342682658517eaa04d82957f21abc9e77c21f CVE-2025-47486,0,0,c9e146c45d6cc866b625b59b9fbbdc42abd43e31899b0596a5f0fd0f2495a7c3,2025-05-08T14:39:18.800000 CVE-2025-47488,0,0,a98cbe0ad2250a56d46a3630b47fec1848107877b1365f7ff9f869c1ad4ead6f,2025-05-08T14:39:18.800000 CVE-2025-47489,0,0,12b13751b7f1741a87725c19ad09a24bfe30a7cd9497783102cd5f2ca284033a,2025-05-08T14:39:18.800000 -CVE-2025-4749,0,0,545072c573d800f3415fc3e9e36ad22f8a906446dc78ffc1000fb1f1fde5ec45,2025-05-16T14:42:18.700000 +CVE-2025-4749,0,1,b8451e4b2a66fc656a3e06b6a82340ac94c8546a4a1043c5826895b1adbdd4dc,2025-06-03T15:57:57.250000 CVE-2025-47490,0,0,c65cb7bb420a74f0e511fe29fc325d1c729132949363b535d2eeb9a69e51f93d,2025-05-08T14:39:18.800000 CVE-2025-47491,0,0,8539788897f813b4235d8f65d76d2326778922ae49a55f7baf045a6f62d97368,2025-05-08T14:39:18.800000 CVE-2025-47492,0,0,77e5089f80376c21123b79b960f017570370e3561eb34c9fd5b966964f4c3e46,2025-05-23T15:54:42.643000 @@ -295272,7 +295280,7 @@ CVE-2025-47496,0,0,5c8e292662c44174edcb0c4f029df6e187c40589089801ecc24be99bac3c1 CVE-2025-47497,0,0,86b3b77fd9a509784cafa6764818343c9cb3babb4ab5d50cc6888e4658282512,2025-05-29T23:15:26.450000 CVE-2025-47498,0,0,edd75d355a4d6930d9c348986a43b0cc1172a1641e93a5ae5794f19f04c66ab7,2025-05-08T14:39:18.800000 CVE-2025-47499,0,0,148d1c310044253544a786f9c6801edeb3fc66df77b55f69c198fce07f0914c1,2025-05-08T14:39:18.800000 -CVE-2025-4750,0,0,c39c561cc222830a237918280b3d54c76431a4d0607d407184e71db361ae033f,2025-05-16T14:42:18.700000 +CVE-2025-4750,0,1,5dfc21f5c195b0983a8447424be275e18192cca790db6f443fc2d4ddc294fe8c,2025-06-03T15:57:18.617000 CVE-2025-47501,0,0,caa9fc0456ba86c7e8ed214c64fe873a8ca7672639e2a88cb850d3092e7754b2,2025-05-08T14:39:18.800000 CVE-2025-47502,0,0,27e63cd3a1befd2e0bab68fa911441eb8659df54127fdae5b0a0764bd8081153,2025-05-08T14:39:18.800000 CVE-2025-47503,0,0,526a1c5feb7110e9cb7e39d55420ec79e06c8cc7fd891c681f47060404490ba1,2025-05-08T14:39:18.800000 @@ -295292,7 +295300,7 @@ CVE-2025-47516,0,0,b2eb33a5eb2f9375da399b2fedde3b15db5a6455a1e221c062c5c05d43902 CVE-2025-47517,0,0,f48432f587313f652c512b2834b4be27b8469e7ea3679fc1c5902743c664d207,2025-05-08T14:39:18.800000 CVE-2025-47518,0,0,56be80b7ed16bc5859df2738940fa4ad1abe9cd81ed70721387b471047e1a8e4,2025-05-08T14:39:18.800000 CVE-2025-47519,0,0,82faa4938f6bcc117e58d0fe57c033c9b2d74bd280d23d892ff4cd5d9a218a03,2025-05-08T14:39:18.800000 -CVE-2025-4752,0,0,8c6b3296937a5edc410dcdce78d7ff92151d1b0026ee646f2317777b2dab538b,2025-05-16T14:42:18.700000 +CVE-2025-4752,0,1,71ecb3805838491b3f922e9909741b5d39114983f46c1fc3689a183b7bc137b8,2025-06-03T15:57:01.207000 CVE-2025-47520,0,0,d18a17027cd2b8cac9f3bf316ee28f3cf5b688b8b956315c2d0ae17930218121,2025-05-08T14:39:18.800000 CVE-2025-47521,0,0,7d62e725a48e4eaa144b4dbbbf30e91ef7a6f7e54094cdcc4aea5b96a19b4249,2025-05-08T14:39:18.800000 CVE-2025-47522,0,0,70d5fdb3920b0648d8945d8e745345dbd2c42b40abf5ca7a1b77fabb9963fe6a,2025-05-08T14:39:18.800000 @@ -295302,7 +295310,7 @@ CVE-2025-47525,0,0,c9982bfde9e29cc589962b2ab6b0cc05071ee8c75d4a9adc1c76947e243b4 CVE-2025-47526,0,0,2617da7eb4e53828410b6046c72bd451966e899374e3c43d789b40911de09b0a,2025-05-08T14:39:18.800000 CVE-2025-47528,0,0,d66dcd6b8cb0f20189f7b42b9cc8eaecf41c7f7aaf00bef51aa11af3d26b7264,2025-05-08T14:39:18.800000 CVE-2025-47529,0,0,4a75f2f5bd05f7907a3ee7f414497b38e29c095125f774724be8f9f672bef815,2025-05-23T15:54:42.643000 -CVE-2025-4753,0,0,563ea1afb6cc91dda230ec8f12a0c742a94bfeba08fc0fb4305000966910ec0f,2025-05-16T14:42:18.700000 +CVE-2025-4753,0,1,2948282b1598cd584288af9cdfce742cbef3102e97979315e3768adbf7400cdf,2025-06-03T15:56:54.033000 CVE-2025-47530,0,0,5e2ccda8b44d387827c140542466f33de83fcd47940449a1f46fdf7f7f7152a7,2025-05-23T15:54:42.643000 CVE-2025-47531,0,0,98c0ab5ded9eb5f3abf9e04c6567486b41ce47cf3d183679428934787ad2a5fc,2025-05-08T14:39:18.800000 CVE-2025-47532,0,0,d64d7c5adb962e6fb70a525b1bb06ce5375308ec585614836cb71fe97409038a,2025-05-23T15:54:42.643000 @@ -295322,7 +295330,7 @@ CVE-2025-47546,0,0,0c8e112d3c35e9c6509a51b3a5f38078b38ffd29d5792f4deca7389b817c8 CVE-2025-47547,0,0,498b0d6c34a50a4c18c9d84a45cde3521f3b595288dde4e643cb72daa195cd18,2025-05-12T20:15:40.177000 CVE-2025-47548,0,0,493e9cbcaa429ab9b74964aaae672a86c2f2315a71ab6aa744cf76ddb5313d03,2025-05-12T20:15:03.363000 CVE-2025-47549,0,0,ed97603d6e02c8f9a5c99560912341977730ec705edf91dfbf48ab66cfb4c661,2025-05-12T20:14:25.300000 -CVE-2025-4755,0,0,ee87a2045516c23659f00ef19f1b4170b78ca06e79ee613640ffc683ecc6b0f6,2025-05-16T14:42:18.700000 +CVE-2025-4755,0,1,f30460b613e5bf41ec60293bc6d3cb35e3c78f7f2bf0f1fea07d44dbfe5d9704,2025-06-03T15:56:44.563000 CVE-2025-47550,0,0,629dfc1b5d3dae27c215f668b417f5d7d77b81c396c5312e859726ef80f60e5b,2025-05-12T20:14:02.440000 CVE-2025-47551,0,0,1ff47bb4d657c7e33aa1dcc67f35e113ebaf811e1c3c764c0a360a72784cc1b2,2025-05-08T14:39:09.683000 CVE-2025-47556,0,0,06063b9894785c3f6de11ab2418874bc9eef693faf7cbeeae3efc54dd06a8e64,2025-05-19T13:35:50.497000 @@ -295348,7 +295356,7 @@ CVE-2025-47583,0,0,1447e339117a9a31aae8a4edc7a31b549eb22fd590c4a31cc41a6525b62c1 CVE-2025-47585,0,0,30964a57aa57d1e9adb58ba4a187b04158425b814d49506ed055aa17f584fceb,2025-06-02T20:15:22.780000 CVE-2025-47587,0,0,c69129af37bc8e41d28b40b1a600e9f976cf3e139ddd0ff0333903f8e74cc56f,2025-05-08T14:39:09.683000 CVE-2025-47589,0,0,d77c0dcf400db13a9ebaf0299e125dc013f6c4414d58c98a50eaa87722aba073,2025-05-08T14:39:09.683000 -CVE-2025-4759,0,0,059499d642c14084f3a6edc6a5fb5686175a3d72aa86cfde2abe0406f35c6c25,2025-05-16T14:42:18.700000 +CVE-2025-4759,0,1,692e47a0363707f39adcc4448402c52b3a812a567b6a3e05960dde7e6e1d11d0,2025-06-03T15:57:29.763000 CVE-2025-47590,0,0,9243ec7a75311c877a33618cc4768d246e40102b3880a9643865812318c9e620,2025-05-08T14:39:09.683000 CVE-2025-47591,0,0,cc4254f3f72360a7c518b3a6ccb193e332480270cd678821d7c2abd99b2677a1,2025-05-08T14:39:09.683000 CVE-2025-47592,0,0,fe65a6f4325780154e0d81baf67dba35a84bfaf239e7062c7c6af4d6b07fd3cc,2025-05-08T14:39:09.683000 @@ -295764,7 +295772,7 @@ CVE-2025-48389,0,0,e0a06862dbd5de9d0e30b39ba95e12152ebb3f987c91aebc43d8b22f341a7 CVE-2025-4839,0,0,3e65b07de0e0b2e6d627bc237ff1a0e673826cc1b3416686e2911073e2351e4f,2025-05-19T15:15:34.287000 CVE-2025-48390,0,0,e08fc2fcf4792cfdc29a5c8dbd607faa716468223eb98fd8cb285bd470941f51,2025-05-30T16:31:03.107000 CVE-2025-48391,0,0,6ff3d1038c2add63bd7e7b8b38f9227bd17f067c0122feb999c7084ff1a9050a,2025-05-21T20:24:58.133000 -CVE-2025-4841,0,0,106812e18b2c2f4d3a8d922ab838c995ef48093efe462829e961e7a7425149e0,2025-05-19T13:35:20.460000 +CVE-2025-4841,0,1,9ef74f3a79e56684383036ff7085bf06d0eca4b2dbe84beb51e4af0435bfe603,2025-06-03T15:57:42.837000 CVE-2025-48413,0,0,b3b11f8a7ba8622574fd750e056164f0578951072345d9f4cba4efbb84a42403,2025-05-21T20:24:58.133000 CVE-2025-48414,0,0,e314f6955b624ffe6cbb1b252b69ac45f584829d39abb7e04746fd27a97f3f9b,2025-05-21T20:24:58.133000 CVE-2025-48415,0,0,c0e8d815f253e488d8a6810d8e7f9a03ea35ca15ba1cc81107210203e9620bc1,2025-05-21T20:24:58.133000 @@ -296091,11 +296099,11 @@ CVE-2025-5127,0,0,7a64d2e3a1c19302b37f8a44391f03e9fc812375ea47ae5f3f49c753f63873 CVE-2025-5128,0,0,6fe3700356303c45a9067b6294bb5c54f9b61d4a0638ae7ce7b11822443181a0,2025-05-28T18:15:28.403000 CVE-2025-5129,0,0,56c8280b7ab9d50626d5099e1e35b516047027b3308a199d92ac8ca29c27bb60,2025-05-28T18:29:27.117000 CVE-2025-5130,0,0,67e5b4838ca1431971c5acebe16c1194f9d3c4df6cec429597c531b7d6fb1171,2025-05-28T18:15:28.740000 -CVE-2025-5131,0,0,d68f2cdf182b092718d940f2643d6bc1787b1be674a097bce7fad50645084378,2025-05-28T18:15:28.903000 +CVE-2025-5131,0,1,eeda3e678c6bf3cae3baaa36d3f477414d472841fe55de3fbb95328097797894,2025-06-03T15:47:41.350000 CVE-2025-5132,0,0,75f126b9a30c6a99c86e64c66ea7fd046bea3a2d72f9d0c6076ceb7040c4fbd7,2025-05-28T18:15:29.037000 -CVE-2025-5133,0,0,9efeb5e03ee463d00e42fc9de1ba56f91b977c7bd992a461e7b0ec85f6861234,2025-05-28T18:15:29.160000 -CVE-2025-5134,0,0,e6299a527615fdc21c9e0da34d766bbd97a350c6d1ff17bb4cf7353121119f1a,2025-05-28T18:15:29.287000 -CVE-2025-5135,0,0,7e1e10f6dd0f2054f3d7d8d511a459c0778068a613df540a11dbd00c31fa1143,2025-05-28T18:15:29.410000 +CVE-2025-5133,0,1,71ff685cb41d220918422266a9a9027a78bee24552031db902c458276c3d0621,2025-06-03T15:48:15.610000 +CVE-2025-5134,0,1,d420ea46d85516af4902b09065e0670f0f7a966eecf320488abdd86a620ad3ac,2025-06-03T15:48:28.580000 +CVE-2025-5135,0,1,ff5e4b4f352f002c704ddb4fec56d312bfa70e7ac4d7428009d05887b065c456,2025-06-03T15:48:40.953000 CVE-2025-5136,0,0,6b5f88824c6819c9067ba2a7cc4e9b248d29b2e219ade7b27acd010192e50f7f,2025-05-28T18:15:29.530000 CVE-2025-5137,0,0,c83c907e9ec05e68313328484d50f5a3a65ffbd23d70539d45126ec5cf338d9e,2025-06-03T10:15:22.570000 CVE-2025-5138,0,0,3bae41860cd01f5b3b29a66081652cec538a389d28958af017b419d06b38908c,2025-05-28T14:58:52.920000 @@ -296106,42 +296114,42 @@ CVE-2025-5145,0,0,79eef495ab65fcf81286a635001443af56e362b501d3db2d9a57e69f802a1c CVE-2025-5146,0,0,30dc5c61e39c6bb48e155d9bcd0fd66e2395886111a482cc56b330fb6c74d9f8,2025-05-29T07:15:25.120000 CVE-2025-5147,0,0,0d68c3226bde9ea189f2d3e4a81d7d02206c36b54e63b2ea80685be3458a5459,2025-05-29T07:15:25.330000 CVE-2025-5148,0,0,e705b08d57c65751e98253970896c194e2ab2e652c77fd2e71af7f4c3d292657,2025-05-28T14:58:52.920000 -CVE-2025-5149,0,1,232f8025201c94e932b0de4b6beaec630d660e75c65564c2e0e05e78bac44fbc,2025-06-03T12:59:06.597000 -CVE-2025-5150,0,1,731d534d853663d7736c9488a0539f48e53bdc24ab46a192850406c9ec4e44b1,2025-06-03T12:58:43.070000 -CVE-2025-5151,0,1,f69cbfb5c903d5d447e7553b520eeb9d37e647953843b9705ad237fa911dfb9f,2025-06-03T12:58:22.147000 -CVE-2025-5152,0,1,14af672ecff9629e38712560386221bdddcf7525a7996aadc18527a713942cf3,2025-06-03T12:58:01.413000 -CVE-2025-5153,0,1,e619a356d8dd3fe9a2dfe3427efb356c517b0ec5343ec58be466ecf317c1584c,2025-06-03T12:57:15.430000 -CVE-2025-5154,0,1,32aa9018b09141ec32c555932a86e63e78a30ce0e8e0487280812c154cd835f3,2025-06-03T13:53:41.553000 -CVE-2025-5155,0,0,b14b5ac3b483c33efb9fbab6b9a2c557705be4868f8f81f37484db81210e8392,2025-05-28T14:58:52.920000 -CVE-2025-5156,0,0,00f32a4deb1f97ddf167d363fce23195315b5eb0d8327be55813064d244fb135,2025-05-28T18:15:30.970000 -CVE-2025-5157,0,0,cb3fb44793380e2d8687a8d6862ab5e21f2f4e96f3a623cc057479932a365ebe,2025-05-28T15:01:30.720000 -CVE-2025-5158,0,0,84035fb6b1387cf047b4e3c31029b6eea23fb78fa9b93b94cb139ea56df04907,2025-05-28T15:01:30.720000 -CVE-2025-5159,0,0,6f24881acbbfdda6f4a0b1d0ad743fa501ef35693296c91b3c6922f040eb6a7d,2025-05-28T15:01:30.720000 -CVE-2025-5160,0,0,4d854a0ccb3bf76606d7e3a63f4767b5c59e24d14403858ae4bf557824d771d8,2025-05-28T15:01:30.720000 -CVE-2025-5161,0,0,2a42b7645caf52309a9089d261689fa6ef18940544e44f49444803f7bfd80a48,2025-05-28T15:01:30.720000 -CVE-2025-5162,0,0,2c0b74ffc78347774dcfa9fed27492dafdcc5815af1f0846252f9e4c12ed7066,2025-05-28T15:01:30.720000 -CVE-2025-5163,0,0,f6a692a19c05ad93cf91719cbe0fce57a844feb7808c753862c6824cb0f75c27,2025-05-28T18:15:31.477000 -CVE-2025-5164,0,0,6654b4b4a24d0b52f0f038f1fc555afd72292294abe58a44dcfdab1ef61451fa,2025-05-28T18:15:31.600000 -CVE-2025-5165,0,0,a2c45398eef4a38eb77e99a24918be24b736a353a44013ebd5bb4c98bb650d82,2025-05-28T18:15:31.733000 -CVE-2025-5166,0,0,4dba51f2fdf960fcc1e3df28473742ab30ad33f8dc5dc0661b6436f8b5fe3e23,2025-05-28T18:15:31.857000 -CVE-2025-5167,0,0,2168a39d3317dc72c79322a134203ba87fa3d6a0a1aa2544dddb0a2d56c9f52d,2025-05-28T18:15:31.987000 -CVE-2025-5168,0,0,18db6f6b8718c544c1a02564481da62e6e617203d3443b72b037f062282d4517,2025-05-28T18:15:32.120000 -CVE-2025-5169,0,0,955adc72aac1b4e2599214155f44198ca45830640fd24f37336939cfc41e9549,2025-05-28T18:15:32.240000 -CVE-2025-5170,0,0,ab19fee771cf90f3452232df11d938435b51717bbb2bc53aff4f2e317602b28d,2025-05-28T15:01:30.720000 -CVE-2025-5171,0,0,db6a1fd5f038e5202b3fe88a98d53372b86ba93374c7a00dca08dfd8e7537670,2025-05-28T15:01:30.720000 -CVE-2025-5172,0,0,a0057ac8eacb00e0773b16aa8db10900a0d1bf0d5437f41f128dbf129681c0a8,2025-05-28T15:01:30.720000 -CVE-2025-5173,0,0,bdff11e517a2b5233c0139567fa2aa01ebd51fedca5593584a2ff499ec236934,2025-05-28T15:01:30.720000 -CVE-2025-5174,0,0,198a54db4381c599b504edca5e7e74bcca1f4c6c35b2850546b8930d41384bfa,2025-05-28T18:15:32.620000 -CVE-2025-5175,0,0,9517169b8bbd4227cd73bf71df5f5870193c215290a98923d3f56455fb58dbff,2025-05-28T18:15:32.750000 -CVE-2025-5176,0,0,8a71da7d6978d0cc7e01c40544422db314c9ffb56b65dc692a17a45f885a44ff,2025-05-28T15:01:30.720000 -CVE-2025-5177,0,0,f71341e0de1b6fa3c25e775c99d80559acf5ccf9cabcb449b463ad9dea31d3be,2025-05-28T15:01:30.720000 -CVE-2025-5178,0,0,e132b99561aca0130eed3276272a3532695644215e271fba739246536f385b02,2025-05-28T15:01:30.720000 -CVE-2025-5179,0,0,d0ec7a2a22f8ca9050ceb5def99225b2f131ea8e1347ebfd6f7aeb377d8f0be1,2025-05-28T15:01:30.720000 -CVE-2025-5180,0,0,b16bc2d506a6353a1d10043c67a86c0ac2bc088c8126184f3f78c0ae00caf971,2025-05-28T18:15:33.063000 -CVE-2025-5181,0,0,e07754b1e19ea60d131dbfb3081ffbb20c60074497b0d45924db480240ca21be,2025-05-28T18:15:33.180000 -CVE-2025-5182,0,0,250faeff89836d475b7977444ebb5352a8fb0ede3ae08e37026f6706f8ab0297,2025-05-28T18:15:33.307000 -CVE-2025-5183,0,0,b4f06aba110f0f79316d91a07640dea408b6c5a6e3c6dad0375df8a63e6e8e5e,2025-05-28T15:01:30.720000 -CVE-2025-5184,0,0,6e3a2f33c6b0b7e0ba3662be4d27e28b69bae17cbe01a1a28949ed0a0d31f0e4,2025-05-28T15:01:30.720000 +CVE-2025-5149,0,0,232f8025201c94e932b0de4b6beaec630d660e75c65564c2e0e05e78bac44fbc,2025-06-03T12:59:06.597000 +CVE-2025-5150,0,0,731d534d853663d7736c9488a0539f48e53bdc24ab46a192850406c9ec4e44b1,2025-06-03T12:58:43.070000 +CVE-2025-5151,0,0,f69cbfb5c903d5d447e7553b520eeb9d37e647953843b9705ad237fa911dfb9f,2025-06-03T12:58:22.147000 +CVE-2025-5152,0,0,14af672ecff9629e38712560386221bdddcf7525a7996aadc18527a713942cf3,2025-06-03T12:58:01.413000 +CVE-2025-5153,0,0,e619a356d8dd3fe9a2dfe3427efb356c517b0ec5343ec58be466ecf317c1584c,2025-06-03T12:57:15.430000 +CVE-2025-5154,0,0,32aa9018b09141ec32c555932a86e63e78a30ce0e8e0487280812c154cd835f3,2025-06-03T13:53:41.553000 +CVE-2025-5155,0,1,f81e1b85b3078516f2c3945c3bd59d8c1f3a3d0722cdfd211297ecf7cff85865,2025-06-03T15:49:04.067000 +CVE-2025-5156,0,1,68bed54271dda4608ffddb30cb3112288a963055e57472ba1990378bbae76a4e,2025-06-03T15:49:18.683000 +CVE-2025-5157,0,1,9b9638c0ce751673f8d3288054af2157dba239649834b6e835b1fd15e3f51701,2025-06-03T15:49:29.117000 +CVE-2025-5158,0,1,afff8646a47910589978b020b75b5c91a2af0ed8317ed133e2c97048f31b5669,2025-06-03T15:49:42.017000 +CVE-2025-5159,0,1,7e4f9c87fa8cb36ab68827992685bd7dce5d985f906e0eb5e604d5603336b531,2025-06-03T15:49:57.750000 +CVE-2025-5160,0,1,f919be7838aa30c255a76663bf4c9d8598a6f73a59956860ab06a9d9592b0c8c,2025-06-03T15:50:06.560000 +CVE-2025-5161,0,1,7d2724ee70b30412111ba9ccac6c315b2b363b98ec43755c244ae3101e4b62fd,2025-06-03T15:38:55.197000 +CVE-2025-5162,0,1,6870380b991c455dda6522e17853c595e237b4e03d01755ee360cfa7a50a77d6,2025-06-03T15:39:22.517000 +CVE-2025-5163,0,1,224be0d0ffbc863a8d827933ac5a7d5342c1bc463bf798f73deb456faae945ff,2025-06-03T15:39:35.613000 +CVE-2025-5164,0,1,228da27fe94094da78c818ea5e2c1e5953ef9870e1a7763a1facd97f4dd57f52,2025-06-03T15:39:48.230000 +CVE-2025-5165,0,1,b944072ac0091ca469e0b415fb7abdf162d341970b7082fcfaff9d04957c85a4,2025-06-03T15:40:01.863000 +CVE-2025-5166,0,1,c51ae421fabf1219a3900c58419bdaa5117f65f9603b27137cff53c0e0d61b00,2025-06-03T15:40:15.497000 +CVE-2025-5167,0,1,d0507ecf0b5b21e24f107649f2515c6afbb660790e07751f18cd594dd93f34bc,2025-06-03T15:40:34.607000 +CVE-2025-5168,0,1,74f02a822faaa8b5a46a78e41282b22e771403dfc5a44608e54bea89178ff6fe,2025-06-03T15:40:48.337000 +CVE-2025-5169,0,1,478bfc131e88e29d02dd1ccd61a9e6c142c0208ac4743abe27cdac119eac9f7b,2025-06-03T15:41:01.973000 +CVE-2025-5170,0,1,2d3c44ad97f24506915e1ae8aa2894c6137b30f378f725193e8dabaa89f599c6,2025-06-03T15:41:52.177000 +CVE-2025-5171,0,1,96d19a8e2ea6d385b9d42aa5840cf4238b741a62095e3edbc5c4cd314ed8a184,2025-06-03T15:42:12.330000 +CVE-2025-5172,0,1,fb1582df4274c0482f1954ab79acd5d33b09b5f1bc7f95a9fa14e4f214a4d799,2025-06-03T15:42:27.910000 +CVE-2025-5173,0,1,1430d4eb187fe7662b39b87d5d1d295c601da53c2063e9cac9e7b105087f1ef1,2025-06-03T15:43:08.747000 +CVE-2025-5174,0,1,666f51e1c83f8449a101e32df52afc75a64feaefaf4dfc7cd50d6a01c6d801e7,2025-06-03T15:43:36.410000 +CVE-2025-5175,0,1,d7f50a48a36d891f277ba5f9aa91eb3ff6844f593f98bc4286ac2ddccf6eef9f,2025-06-03T15:43:45.590000 +CVE-2025-5176,0,1,b7e9ab58bad802ea6e5e368aa5ccf7019285885c1634811b6d9f9d262958f4a5,2025-06-03T15:44:04.310000 +CVE-2025-5177,0,1,e38a00bfed870e333bba0bf44859feff5ffd85dfc09e5c28d1b01b1264cfbad9,2025-06-03T15:44:51.087000 +CVE-2025-5178,0,1,b7d5af1ba17b377b37a69a628a403977f14bd11fb2e46e9fb198f5c59eb3a29f,2025-06-03T15:45:01.163000 +CVE-2025-5179,0,1,268b5a1de38de37705630e8ff7b8d64567a8fb33e2605eff760f161300a9b9bf,2025-06-03T15:45:10.347000 +CVE-2025-5180,0,1,ab929673d111ae96ba4c2d70b35d834abe0c052662b6c35081a74c590c6a8845,2025-06-03T15:45:24.887000 +CVE-2025-5181,0,1,6b9678f1034433ee31ef41571152dcfee6247bf7f5825450a9a179b056095fc4,2025-06-03T15:45:42.630000 +CVE-2025-5182,0,1,4eefedcebcd03f2aef74c4ef5b4b53fddb71d62561004fb9557d198433f5447c,2025-06-03T15:45:55.413000 +CVE-2025-5183,0,1,c805e02643e0e27a9dd9169f81c14e80e19028c481797ace1339fadf2ddd19a0,2025-06-03T15:46:11.980000 +CVE-2025-5184,0,1,0c83a5fa50189682781f691fc4b3c0711f14dbbbb155d47eaa329f84d4444e80,2025-06-03T15:46:21.597000 CVE-2025-5185,0,0,38d3e8df6b4bf723f8b7c203881d74ed487013508bbfe062800873a9ef93893c,2025-05-28T15:01:30.720000 CVE-2025-5186,0,0,f1c0dc9e00200ceb159990b282fc6fc2adc0cb5ea875d85c26223f5d5865c3f8,2025-05-28T18:15:33.550000 CVE-2025-5190,0,0,70a052004bc045461af67b84ae1100d2a7e875422f170d4e9a768a5f2460c6a4,2025-05-30T16:31:03.107000 @@ -296233,25 +296241,25 @@ CVE-2025-5330,0,0,d834ad4ad61a847f16cff13c2e41a3edc0634ba2b8cfe9a60897f96120871d CVE-2025-5331,0,0,6d6e63e0f8a1a491f6a38b24f4a10f691f644991827baf7d50b9fb0e398065a6,2025-05-30T16:31:03.107000 CVE-2025-5332,0,0,82ee30c4e52e5834476106098d4d0bb383f3fc75f42e8372dd2b5af78b5ad6f8,2025-05-30T16:31:03.107000 CVE-2025-5334,0,0,aae33d23bbf6c41c89830eb61bfdac6ed00173515e45aa173ca7510ab84466a1,2025-05-30T16:31:03.107000 -CVE-2025-5340,1,1,7020a70a3de2f6c094d459513197cd61ccd3c0da7f59f936f106febecd0be85a,2025-06-03T12:15:22.603000 +CVE-2025-5340,0,0,7020a70a3de2f6c094d459513197cd61ccd3c0da7f59f936f106febecd0be85a,2025-06-03T12:15:22.603000 CVE-2025-5356,0,0,21392522e07ca9a487f30a83cb437c3946fac9f76c3d7bf47bcf1046c70d9769,2025-06-02T17:32:17.397000 CVE-2025-5357,0,0,6d225f1517736407e2a985f06fb943b8c693ee3a8fb797d8fef47d394fbcd075,2025-06-02T17:32:17.397000 CVE-2025-5358,0,0,db1fd286294db8040b1bdb4a6c8b2445c4920d6583d92ce80f74471f2c3e9ca3,2025-06-02T17:32:17.397000 CVE-2025-5359,0,0,6872eab38593592d2ac8b60b8829baf13b29b09b97911624b463fcce371b0135,2025-06-02T17:32:17.397000 -CVE-2025-5360,0,0,da61a9b89274978d6601e709073bc1a595355e03cabdefa20ebca310f77dba1d,2025-06-02T17:32:17.397000 -CVE-2025-5361,0,0,1649d5038464b073a4112f088f89a1b31f87b82ecd92131880bb2fe0215e8627,2025-06-02T17:32:17.397000 -CVE-2025-5362,0,0,eeadf1b5ff0850394a7c3443ef016f6474b45ad7aca69f6d66a7e6101e03f810,2025-06-02T17:32:17.397000 -CVE-2025-5363,0,0,04a9c165b5fe56a880b4b6347c1b592d66ac5c1853082ef30428ed5a9758ad76,2025-06-02T17:32:17.397000 -CVE-2025-5364,0,0,fc3f8b4d3be9bcb646742e6477dae97d1e8924c1d54109562eb2bf4dcace8dd0,2025-06-02T17:32:17.397000 -CVE-2025-5365,0,0,c2ce7c39a2d5ad4c9e04a733e80f3623719a2e75195e2c5949419320fa8bdb45,2025-06-02T17:32:17.397000 -CVE-2025-5367,0,0,ca3e9071cc386d3aa1fb99c5971e7b59702f0c97e08682bfd371e5337fc39af7,2025-06-02T17:32:17.397000 -CVE-2025-5368,0,0,639272a969d7d769e09837dc704923d42e226ac34fc2e3def3b86ede931108d4,2025-06-02T17:32:17.397000 +CVE-2025-5360,0,1,f6f6f0a68bcc88f729faa5e7b6e62c265dbe0f87de895580450e0ebfdb395bd6,2025-06-03T15:35:19.237000 +CVE-2025-5361,0,1,63ed55da0a8819c3072e9ae5cbf20f6ad96bd8fa3415071144a15d946aef0cb0,2025-06-03T15:35:09.950000 +CVE-2025-5362,0,1,33b74730f9e7ac14985e93de797c2da60e582983293fbae692e330f50a44162c,2025-06-03T15:34:57.473000 +CVE-2025-5363,0,1,d48d3a878cc2187658148b214cb6829e36972108c01dfa0cb86b9cac54da6616,2025-06-03T15:34:39.567000 +CVE-2025-5364,0,1,95a5e56210a5d35c1ea6e33ff22c35248d45f8b8e37cb258e052523a9909bca6,2025-06-03T15:34:20.917000 +CVE-2025-5365,0,1,0d1ce8893a30ec21d7e83dd6a06faaa956ad93af9fce8162c82d46544a42f85c,2025-06-03T15:34:08.383000 +CVE-2025-5367,0,1,d74e7f7b5df4373a6cb4c4912d3e92ada0700cf6b4dd42f020dd71a2e6663e2f,2025-06-03T15:33:39.070000 +CVE-2025-5368,0,1,9330ec771717069f27ceda5473a12198f97847c6ad28dab99e3c2364851c8dad,2025-06-03T15:32:13.583000 CVE-2025-5369,0,0,972604ef45925af569944bd9beb457f4f976d47cf3dd4c088b381c8005f3c50f,2025-06-02T17:32:17.397000 CVE-2025-5370,0,0,82a251850084559b91e242285060e0c4abaf9bc7e82cc860e4eab24b23ff9ab2,2025-06-02T17:32:17.397000 CVE-2025-5371,0,0,9f397c17a7e949930d643fd08899e51e874df614daf6399186765ec917525b09,2025-06-02T17:32:17.397000 -CVE-2025-5373,0,0,9c95628d3d12e397c93da215349fee8191cb7b7341cb28b5177b7183e58f02a1,2025-06-02T17:32:17.397000 -CVE-2025-5374,0,0,a885ee940f21f7635bfa5f1c8f253f0d229d0784428678d4a215ac41e45dae39,2025-06-02T17:32:17.397000 -CVE-2025-5375,0,0,d2626bef22fc86c929bdb2f9b6f34aa0e50d5512d6f41ef70238e6d275e1bebb,2025-06-02T17:32:17.397000 +CVE-2025-5373,0,1,c749a6b1c61526825a3ec95e76f4d6286fc94a99723ecde6b20b472fbeaf94ea,2025-06-03T15:31:55.267000 +CVE-2025-5374,0,1,08ec0fbe437c75568e797a6883653990f3916903b217127f6e162f78c26a7157,2025-06-03T15:31:45.257000 +CVE-2025-5375,0,1,79ab6f61d55d13152e6cea237408e960f1fbc5f1ab43084ee7b9d3d96e5ce6a0,2025-06-03T15:31:34.527000 CVE-2025-5376,0,0,767f922892e4f198a07a4d3c4bd62b52ad7663bdfadce9556e33dd86dee03fe9,2025-06-02T17:32:17.397000 CVE-2025-5377,0,0,2399afc5a584b224c0f03f84e3b6a4e678bfb49aff7469b5d56f8cceeaa86dbf,2025-06-02T17:32:17.397000 CVE-2025-5378,0,0,9f7ed04f1de786bdd2d9d69c07c5596ce5f130ac7f59918f74e0b6694512c231,2025-06-02T17:32:17.397000 @@ -296279,7 +296287,7 @@ CVE-2025-5409,0,0,209b521ab5ccc30904997673163794c81e8bbcd661514ad5d6db90496c692a CVE-2025-5410,0,0,8f6aec665b1901bf160e99989f915904c0b12f976e27a46b4117cb6a4d26984d,2025-06-02T17:32:17.397000 CVE-2025-5411,0,0,bda57e821f06e7acb04b67298784cbbe1631c5e86f17b6a45cfc7ca79da6e664,2025-06-02T17:32:17.397000 CVE-2025-5412,0,0,753b4152a593f449df2c00057cf330d4f98993025991e4c159242de574477a9d,2025-06-02T17:32:17.397000 -CVE-2025-5419,0,0,7c182b9e1d8229ac433b17b025bf2a361a490b3acf344a00cf760ddbe7a51b03,2025-06-03T03:15:28.460000 +CVE-2025-5419,0,1,c776bb9ab2faecd21cf664d5602ad17c914cf30eed820a8a672cba50f6bf30f1,2025-06-03T14:15:50.600000 CVE-2025-5420,0,0,febb25c16bce360c4a759b2a4127c671c1e4f8d4aafbd5e7bf731b1578cd725f,2025-06-02T17:32:17.397000 CVE-2025-5421,0,0,aaf7308ceb57221ad68dbb7db22ba2000af542ccf461039f6c7d796fca57cef7,2025-06-02T17:32:17.397000 CVE-2025-5422,0,0,9e450c046e1f91b7dd55771f187d3de2563113f044a3b50f5e4e98096355fb9a,2025-06-02T17:32:17.397000 @@ -296310,6 +296318,14 @@ CVE-2025-5446,0,0,9d168da398a778ce0b0095a7e0a8e3bca462cdb12a826e6bb187c380e071a1 CVE-2025-5447,0,0,a5cb8bc4c7a4de9ae3bfa5d338b695456ece1a5a0b2112b238cb5da4d8fbdcc4,2025-06-02T17:32:17.397000 CVE-2025-5455,0,0,49ebfbc7472b909f08e0e5deb4e4ea5f4cedd298a2046130e62c9603cffb4aad,2025-06-02T17:32:17.397000 CVE-2025-5492,0,0,b5038878420625bb26f8489e550a4b7b6eed1512f61db614ac007c24853837c9,2025-06-03T11:15:21.023000 -CVE-2025-5493,0,0,a858c3594792a90731d1aaa0c94c119619aaf3566be815bfa56f0bef72a8553e,2025-06-03T11:15:21.230000 -CVE-2025-5495,1,1,4758066ebedc519b5ed9f8b8b2a39099d8ed8a054109f4b557ae0a51061a6460,2025-06-03T13:15:21.123000 -CVE-2025-5497,1,1,84593bed82c3818c7607bf57023d5e1a9be6cbf72965bf659feddfbb4cfcd7cc,2025-06-03T13:15:21.310000 +CVE-2025-5493,0,1,7c4c7427ac4f478c1fac76ad33eb9aa6e606061e63893081420b4dcedc256f44,2025-06-03T14:15:51.033000 +CVE-2025-5495,0,1,43edca9627a89460bd01070c801d65887312b95c9d61a9db86524fe113b90a84,2025-06-03T14:15:51.170000 +CVE-2025-5497,0,1,a8de3db2e2278b6fc7cafd662d5aa984c05704ded4a531c8dfc9f9a30c93da7f,2025-06-03T15:15:59.873000 +CVE-2025-5498,1,1,4fd881cb88c856d4f02decacef5f3bfebcdc60b0213fa3a73485c281982b83ac,2025-06-03T14:15:51.313000 +CVE-2025-5499,1,1,a432bd909af75fac9cb457ce4b5a51e444731b50dd1752d2e11039ebe1690e24,2025-06-03T14:15:51.513000 +CVE-2025-5501,1,1,1d92eab107d9e53a5a633ee870b2bd48694ac873329eb842d7ea7dbc8902262b,2025-06-03T15:16:00.003000 +CVE-2025-5502,1,1,357ad77fe133e9200902486817ff0da918ec75e0cc00e60428b08434d29a86ea,2025-06-03T15:16:00.167000 +CVE-2025-5503,1,1,ccdeb36a29da4538b170a70975f0b4d0ec0964e1627752fbf8e00064e21faf74,2025-06-03T15:16:00.350000 +CVE-2025-5504,1,1,519adfd18697319d23478620e8ad4cf49a90b8eea0f72f0181794d980eed6182,2025-06-03T15:16:00.533000 +CVE-2025-5505,1,1,c2f4eeb646708394355dfe8433bf9f300376e0a139884b40277c30dafce0254e,2025-06-03T15:16:00.717000 +CVE-2025-5506,1,1,9724d42823132dffb8d1392ad0cd8995fdf46fb303bf952172f9e364bdb4eb19,2025-06-03T15:16:00.897000