diff --git a/CVE-2016/CVE-2016-10003xx/CVE-2016-1000338.json b/CVE-2016/CVE-2016-10003xx/CVE-2016-1000338.json index 3217663e80c..e60487d07ad 100644 --- a/CVE-2016/CVE-2016-10003xx/CVE-2016-1000338.json +++ b/CVE-2016/CVE-2016-10003xx/CVE-2016-1000338.json @@ -2,8 +2,8 @@ "id": "CVE-2016-1000338", "sourceIdentifier": "cve@mitre.org", "published": "2018-06-01T20:29:00.217", - "lastModified": "2024-11-21T02:43:02.427", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T14:14:28.567", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-208xx/CVE-2018-20839.json b/CVE-2018/CVE-2018-208xx/CVE-2018-20839.json index c20632f2407..b907689d510 100644 --- a/CVE-2018/CVE-2018-208xx/CVE-2018-20839.json +++ b/CVE-2018/CVE-2018-208xx/CVE-2018-20839.json @@ -2,8 +2,8 @@ "id": "CVE-2018-20839", "sourceIdentifier": "cve@mitre.org", "published": "2019-05-17T04:29:00.933", - "lastModified": "2024-11-21T04:02:17.040", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T14:14:36.570", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-57xx/CVE-2018-5729.json b/CVE-2018/CVE-2018-57xx/CVE-2018-5729.json index e4b5fad8fc6..9cab9372f2e 100644 --- a/CVE-2018/CVE-2018-57xx/CVE-2018-5729.json +++ b/CVE-2018/CVE-2018-57xx/CVE-2018-5729.json @@ -2,8 +2,8 @@ "id": "CVE-2018-5729", "sourceIdentifier": "cve@mitre.org", "published": "2018-03-06T20:29:00.563", - "lastModified": "2024-11-21T04:09:15.897", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T14:14:33.487", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-57xx/CVE-2018-5730.json b/CVE-2018/CVE-2018-57xx/CVE-2018-5730.json index 93dc3354928..89428931d9a 100644 --- a/CVE-2018/CVE-2018-57xx/CVE-2018-5730.json +++ b/CVE-2018/CVE-2018-57xx/CVE-2018-5730.json @@ -2,8 +2,8 @@ "id": "CVE-2018-5730", "sourceIdentifier": "cve@mitre.org", "published": "2018-03-06T20:29:00.657", - "lastModified": "2024-11-21T04:09:16.103", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T14:12:56.457", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-190xx/CVE-2019-19064.json b/CVE-2019/CVE-2019-190xx/CVE-2019-19064.json index 4ff2a32c403..68cbe61c787 100644 --- a/CVE-2019/CVE-2019-190xx/CVE-2019-19064.json +++ b/CVE-2019/CVE-2019-190xx/CVE-2019-19064.json @@ -2,8 +2,8 @@ "id": "CVE-2019-19064", "sourceIdentifier": "cve@mitre.org", "published": "2019-11-18T06:15:12.607", - "lastModified": "2024-11-21T04:34:06.830", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T14:12:50.043", + "vulnStatus": "Analyzed", "cveTags": [ { "sourceIdentifier": "cve@mitre.org", diff --git a/CVE-2019/CVE-2019-38xx/CVE-2019-3821.json b/CVE-2019/CVE-2019-38xx/CVE-2019-3821.json index 18763a78483..3f02e8362c8 100644 --- a/CVE-2019/CVE-2019-38xx/CVE-2019-3821.json +++ b/CVE-2019/CVE-2019-38xx/CVE-2019-3821.json @@ -2,8 +2,8 @@ "id": "CVE-2019-3821", "sourceIdentifier": "secalert@redhat.com", "published": "2019-03-27T13:29:01.507", - "lastModified": "2024-11-21T04:42:36.780", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T14:12:51.990", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-120xx/CVE-2020-12069.json b/CVE-2020/CVE-2020-120xx/CVE-2020-12069.json index 4d6f182d339..462f4bee0c2 100644 --- a/CVE-2020/CVE-2020-120xx/CVE-2020-12069.json +++ b/CVE-2020/CVE-2020-120xx/CVE-2020-12069.json @@ -2,8 +2,8 @@ "id": "CVE-2020-12069", "sourceIdentifier": "info@cert.vde.com", "published": "2022-12-26T19:15:10.520", - "lastModified": "2024-11-21T04:59:12.810", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T14:15:00.537", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-226xx/CVE-2020-22628.json b/CVE-2020/CVE-2020-226xx/CVE-2020-22628.json index 8225954f0f8..a91cbeb4e8e 100644 --- a/CVE-2020/CVE-2020-226xx/CVE-2020-22628.json +++ b/CVE-2020/CVE-2020-226xx/CVE-2020-22628.json @@ -2,8 +2,8 @@ "id": "CVE-2020-22628", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-22T19:16:19.353", - "lastModified": "2024-11-21T05:13:19.760", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T14:12:26.610", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-228xx/CVE-2020-22818.json b/CVE-2020/CVE-2020-228xx/CVE-2020-22818.json index 30ba6b0520e..ff98e30bfa6 100644 --- a/CVE-2020/CVE-2020-228xx/CVE-2020-22818.json +++ b/CVE-2020/CVE-2020-228xx/CVE-2020-22818.json @@ -2,7 +2,7 @@ "id": "CVE-2020-22818", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-03T17:15:15.893", - "lastModified": "2024-11-21T05:13:25.813", + "lastModified": "2025-05-05T14:15:21.177", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-228xx/CVE-2020-22819.json b/CVE-2020/CVE-2020-228xx/CVE-2020-22819.json index 689f8a87fc0..b9ce59864ff 100644 --- a/CVE-2020/CVE-2020-228xx/CVE-2020-22819.json +++ b/CVE-2020/CVE-2020-228xx/CVE-2020-22819.json @@ -2,7 +2,7 @@ "id": "CVE-2020-22819", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-03T17:15:16.600", - "lastModified": "2024-11-21T05:13:25.963", + "lastModified": "2025-05-05T14:15:21.420", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-228xx/CVE-2020-22820.json b/CVE-2020/CVE-2020-228xx/CVE-2020-22820.json index 0c305efea04..c3509611edf 100644 --- a/CVE-2020/CVE-2020-228xx/CVE-2020-22820.json +++ b/CVE-2020/CVE-2020-228xx/CVE-2020-22820.json @@ -2,7 +2,7 @@ "id": "CVE-2020-22820", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-03T17:15:16.910", - "lastModified": "2024-11-21T05:13:26.100", + "lastModified": "2025-05-05T14:15:21.610", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-243xx/CVE-2020-24370.json b/CVE-2020/CVE-2020-243xx/CVE-2020-24370.json index e29bc359f1b..5de9e9ac739 100644 --- a/CVE-2020/CVE-2020-243xx/CVE-2020-24370.json +++ b/CVE-2020/CVE-2020-243xx/CVE-2020-24370.json @@ -2,8 +2,8 @@ "id": "CVE-2020-24370", "sourceIdentifier": "cve@mitre.org", "published": "2020-08-17T17:15:13.877", - "lastModified": "2024-11-21T05:14:41.110", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T14:12:47.407", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-201xx/CVE-2021-20193.json b/CVE-2021/CVE-2021-201xx/CVE-2021-20193.json index 3a604d5f3b4..b875e62d1a8 100644 --- a/CVE-2021/CVE-2021-201xx/CVE-2021-20193.json +++ b/CVE-2021/CVE-2021-201xx/CVE-2021-20193.json @@ -2,8 +2,8 @@ "id": "CVE-2021-20193", "sourceIdentifier": "secalert@redhat.com", "published": "2021-03-26T17:15:12.843", - "lastModified": "2024-11-21T05:46:06.267", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T14:15:04.557", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-290xx/CVE-2021-29098.json b/CVE-2021/CVE-2021-290xx/CVE-2021-29098.json index f4e93bdc9a5..15b36179110 100644 --- a/CVE-2021/CVE-2021-290xx/CVE-2021-29098.json +++ b/CVE-2021/CVE-2021-290xx/CVE-2021-29098.json @@ -2,8 +2,8 @@ "id": "CVE-2021-29098", "sourceIdentifier": "psirt@esri.com", "published": "2021-03-25T21:15:13.543", - "lastModified": "2024-11-21T06:00:42.740", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T14:12:43.760", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-378xx/CVE-2021-37823.json b/CVE-2021/CVE-2021-378xx/CVE-2021-37823.json index 6a6afe91998..91c5bfd2350 100644 --- a/CVE-2021/CVE-2021-378xx/CVE-2021-37823.json +++ b/CVE-2021/CVE-2021-378xx/CVE-2021-37823.json @@ -2,7 +2,7 @@ "id": "CVE-2021-37823", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-03T17:15:17.217", - "lastModified": "2024-11-21T06:15:56.327", + "lastModified": "2025-05-05T14:15:21.957", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-381xx/CVE-2021-38160.json b/CVE-2021/CVE-2021-381xx/CVE-2021-38160.json index 5831698dd5e..85e8f673925 100644 --- a/CVE-2021/CVE-2021-381xx/CVE-2021-38160.json +++ b/CVE-2021/CVE-2021-381xx/CVE-2021-38160.json @@ -2,8 +2,8 @@ "id": "CVE-2021-38160", "sourceIdentifier": "cve@mitre.org", "published": "2021-08-07T04:15:06.967", - "lastModified": "2024-11-21T06:16:31.280", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T14:12:40.937", + "vulnStatus": "Analyzed", "cveTags": [ { "sourceIdentifier": "cve@mitre.org", diff --git a/CVE-2021/CVE-2021-468xx/CVE-2021-46853.json b/CVE-2021/CVE-2021-468xx/CVE-2021-46853.json index e197703727c..5140bc910c0 100644 --- a/CVE-2021/CVE-2021-468xx/CVE-2021-46853.json +++ b/CVE-2021/CVE-2021-468xx/CVE-2021-46853.json @@ -2,7 +2,7 @@ "id": "CVE-2021-46853", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-03T06:15:09.760", - "lastModified": "2024-11-21T06:34:48.690", + "lastModified": "2025-05-05T14:15:22.167", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-12xx/CVE-2022-1271.json b/CVE-2022/CVE-2022-12xx/CVE-2022-1271.json index 3fe3020b3a9..edae82eeaea 100644 --- a/CVE-2022/CVE-2022-12xx/CVE-2022-1271.json +++ b/CVE-2022/CVE-2022-12xx/CVE-2022-1271.json @@ -2,8 +2,8 @@ "id": "CVE-2022-1271", "sourceIdentifier": "secalert@redhat.com", "published": "2022-08-31T16:15:09.347", - "lastModified": "2024-11-21T06:40:23.040", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T14:12:33.207", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-224xx/CVE-2022-22425.json b/CVE-2022/CVE-2022-224xx/CVE-2022-22425.json index e92d5270cab..bd4075c4f05 100644 --- a/CVE-2022/CVE-2022-224xx/CVE-2022-22425.json +++ b/CVE-2022/CVE-2022-224xx/CVE-2022-22425.json @@ -2,7 +2,7 @@ "id": "CVE-2022-22425", "sourceIdentifier": "psirt@us.ibm.com", "published": "2022-11-03T20:15:25.257", - "lastModified": "2024-11-21T06:46:47.177", + "lastModified": "2025-05-05T14:15:22.430", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-1236" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1236" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-224xx/CVE-2022-22442.json b/CVE-2022/CVE-2022-224xx/CVE-2022-22442.json index f5ee3779a36..4f31fafc860 100644 --- a/CVE-2022/CVE-2022-224xx/CVE-2022-22442.json +++ b/CVE-2022/CVE-2022-224xx/CVE-2022-22442.json @@ -2,7 +2,7 @@ "id": "CVE-2022-22442", "sourceIdentifier": "psirt@us.ibm.com", "published": "2022-11-03T20:15:25.530", - "lastModified": "2024-11-21T06:46:48.613", + "lastModified": "2025-05-05T14:15:22.627", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-258xx/CVE-2022-25885.json b/CVE-2022/CVE-2022-258xx/CVE-2022-25885.json index d3149157842..aa758334036 100644 --- a/CVE-2022/CVE-2022-258xx/CVE-2022-25885.json +++ b/CVE-2022/CVE-2022-258xx/CVE-2022-25885.json @@ -2,7 +2,7 @@ "id": "CVE-2022-25885", "sourceIdentifier": "report@snyk.io", "published": "2022-11-01T05:15:09.810", - "lastModified": "2024-11-21T06:53:09.830", + "lastModified": "2025-05-05T14:15:22.860", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-268xx/CVE-2022-26878.json b/CVE-2022/CVE-2022-268xx/CVE-2022-26878.json index 717b3bdf400..b2012a9962a 100644 --- a/CVE-2022/CVE-2022-268xx/CVE-2022-26878.json +++ b/CVE-2022/CVE-2022-268xx/CVE-2022-26878.json @@ -2,8 +2,8 @@ "id": "CVE-2022-26878", "sourceIdentifier": "cve@mitre.org", "published": "2022-03-11T07:15:08.147", - "lastModified": "2024-11-21T06:54:43.893", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T14:12:37.230", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-306xx/CVE-2022-30608.json b/CVE-2022/CVE-2022-306xx/CVE-2022-30608.json index 1bdd2bc42ee..2f5910c034e 100644 --- a/CVE-2022/CVE-2022-306xx/CVE-2022-30608.json +++ b/CVE-2022/CVE-2022-306xx/CVE-2022-30608.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30608", "sourceIdentifier": "psirt@us.ibm.com", "published": "2022-11-03T20:15:28.520", - "lastModified": "2024-11-21T07:03:01.190", + "lastModified": "2025-05-05T14:15:23.190", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-306xx/CVE-2022-30615.json b/CVE-2022/CVE-2022-306xx/CVE-2022-30615.json index 6b4bec07a34..72e7c661e99 100644 --- a/CVE-2022/CVE-2022-306xx/CVE-2022-30615.json +++ b/CVE-2022/CVE-2022-306xx/CVE-2022-30615.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30615", "sourceIdentifier": "psirt@us.ibm.com", "published": "2022-11-03T20:15:28.633", - "lastModified": "2024-11-21T07:03:01.887", + "lastModified": "2025-05-05T14:15:23.540", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-328xx/CVE-2022-32888.json b/CVE-2022/CVE-2022-328xx/CVE-2022-32888.json index ad920d64a91..1dfc37a8880 100644 --- a/CVE-2022/CVE-2022-328xx/CVE-2022-32888.json +++ b/CVE-2022/CVE-2022-328xx/CVE-2022-32888.json @@ -2,7 +2,7 @@ "id": "CVE-2022-32888", "sourceIdentifier": "product-security@apple.com", "published": "2022-11-01T20:15:18.587", - "lastModified": "2024-11-21T07:07:10.040", + "lastModified": "2025-05-05T15:15:47.340", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-34xx/CVE-2022-3499.json b/CVE-2022/CVE-2022-34xx/CVE-2022-3499.json index bec9a77121b..43bec011f12 100644 --- a/CVE-2022/CVE-2022-34xx/CVE-2022-3499.json +++ b/CVE-2022/CVE-2022-34xx/CVE-2022-3499.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3499", "sourceIdentifier": "vulnreport@tenable.com", "published": "2022-10-31T20:15:12.927", - "lastModified": "2024-11-21T07:19:39.517", + "lastModified": "2025-05-05T15:15:48.063", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-532" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-37xx/CVE-2022-3780.json b/CVE-2022/CVE-2022-37xx/CVE-2022-3780.json index bc53672cbe2..e76a39aafe7 100644 --- a/CVE-2022/CVE-2022-37xx/CVE-2022-3780.json +++ b/CVE-2022/CVE-2022-37xx/CVE-2022-3780.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3780", "sourceIdentifier": "security@devolutions.net", "published": "2022-11-01T19:15:11.083", - "lastModified": "2024-11-21T07:20:13.510", + "lastModified": "2025-05-05T14:15:23.910", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-37xx/CVE-2022-3781.json b/CVE-2022/CVE-2022-37xx/CVE-2022-3781.json index fadc10af525..33fa489341d 100644 --- a/CVE-2022/CVE-2022-37xx/CVE-2022-3781.json +++ b/CVE-2022/CVE-2022-37xx/CVE-2022-3781.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3781", "sourceIdentifier": "security@devolutions.net", "published": "2022-11-01T19:15:11.150", - "lastModified": "2024-11-21T07:20:13.637", + "lastModified": "2025-05-05T14:15:24.353", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-407xx/CVE-2022-40747.json b/CVE-2022/CVE-2022-407xx/CVE-2022-40747.json index 5b8cf5f28d6..0c6a218d9ed 100644 --- a/CVE-2022/CVE-2022-407xx/CVE-2022-40747.json +++ b/CVE-2022/CVE-2022-407xx/CVE-2022-40747.json @@ -2,7 +2,7 @@ "id": "CVE-2022-40747", "sourceIdentifier": "psirt@us.ibm.com", "published": "2022-11-03T20:15:31.423", - "lastModified": "2024-11-21T07:21:58.613", + "lastModified": "2025-05-05T14:15:24.517", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-611" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-414xx/CVE-2022-41435.json b/CVE-2022/CVE-2022-414xx/CVE-2022-41435.json index cf3053b3299..a0d2f27322c 100644 --- a/CVE-2022/CVE-2022-414xx/CVE-2022-41435.json +++ b/CVE-2022/CVE-2022-414xx/CVE-2022-41435.json @@ -2,7 +2,7 @@ "id": "CVE-2022-41435", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-03T12:15:10.697", - "lastModified": "2024-11-21T07:23:13.633", + "lastModified": "2025-05-05T14:15:24.677", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-417xx/CVE-2022-41710.json b/CVE-2022/CVE-2022-417xx/CVE-2022-41710.json index 751e26d0190..826c12343ae 100644 --- a/CVE-2022/CVE-2022-417xx/CVE-2022-41710.json +++ b/CVE-2022/CVE-2022-417xx/CVE-2022-41710.json @@ -2,7 +2,7 @@ "id": "CVE-2022-41710", "sourceIdentifier": "help@fluidattacks.com", "published": "2022-11-03T20:15:31.567", - "lastModified": "2024-11-21T07:23:42.790", + "lastModified": "2025-05-05T14:15:24.913", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-552" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-552" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-417xx/CVE-2022-41713.json b/CVE-2022/CVE-2022-417xx/CVE-2022-41713.json index 313739569e6..ac7bd6fb663 100644 --- a/CVE-2022/CVE-2022-417xx/CVE-2022-41713.json +++ b/CVE-2022/CVE-2022-417xx/CVE-2022-41713.json @@ -2,7 +2,7 @@ "id": "CVE-2022-41713", "sourceIdentifier": "help@fluidattacks.com", "published": "2022-11-03T20:15:31.713", - "lastModified": "2024-11-21T07:23:43.127", + "lastModified": "2025-05-05T14:15:25.083", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-1321" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-417xx/CVE-2022-41714.json b/CVE-2022/CVE-2022-417xx/CVE-2022-41714.json index 21dfd0142fc..4802cac8e4d 100644 --- a/CVE-2022/CVE-2022-417xx/CVE-2022-41714.json +++ b/CVE-2022/CVE-2022-417xx/CVE-2022-41714.json @@ -2,7 +2,7 @@ "id": "CVE-2022-41714", "sourceIdentifier": "help@fluidattacks.com", "published": "2022-11-03T20:15:31.827", - "lastModified": "2024-11-21T07:23:43.237", + "lastModified": "2025-05-05T14:15:25.280", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-1321" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-424xx/CVE-2022-42442.json b/CVE-2022/CVE-2022-424xx/CVE-2022-42442.json index 0f4dc2b1120..ec99edf4037 100644 --- a/CVE-2022/CVE-2022-424xx/CVE-2022-42442.json +++ b/CVE-2022/CVE-2022-424xx/CVE-2022-42442.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42442", "sourceIdentifier": "psirt@us.ibm.com", "published": "2022-11-03T20:15:31.997", - "lastModified": "2024-11-21T07:24:58.523", + "lastModified": "2025-05-05T14:15:25.490", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-427xx/CVE-2022-42743.json b/CVE-2022/CVE-2022-427xx/CVE-2022-42743.json index bc51c22e755..a486a09068b 100644 --- a/CVE-2022/CVE-2022-427xx/CVE-2022-42743.json +++ b/CVE-2022/CVE-2022-427xx/CVE-2022-42743.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42743", "sourceIdentifier": "help@fluidattacks.com", "published": "2022-11-03T20:15:32.137", - "lastModified": "2024-11-21T07:25:15.023", + "lastModified": "2025-05-05T14:15:25.657", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-1321" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-427xx/CVE-2022-42746.json b/CVE-2022/CVE-2022-427xx/CVE-2022-42746.json index 2073a7a03d0..dce7d0b17db 100644 --- a/CVE-2022/CVE-2022-427xx/CVE-2022-42746.json +++ b/CVE-2022/CVE-2022-427xx/CVE-2022-42746.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42746", "sourceIdentifier": "help@fluidattacks.com", "published": "2022-11-03T20:15:32.503", - "lastModified": "2024-11-21T07:25:15.383", + "lastModified": "2025-05-05T14:15:25.813", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-427xx/CVE-2022-42747.json b/CVE-2022/CVE-2022-427xx/CVE-2022-42747.json index 1b960d52a14..33b424d06bd 100644 --- a/CVE-2022/CVE-2022-427xx/CVE-2022-42747.json +++ b/CVE-2022/CVE-2022-427xx/CVE-2022-42747.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42747", "sourceIdentifier": "help@fluidattacks.com", "published": "2022-11-03T20:15:32.617", - "lastModified": "2024-11-21T07:25:15.497", + "lastModified": "2025-05-05T14:15:25.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-427xx/CVE-2022-42748.json b/CVE-2022/CVE-2022-427xx/CVE-2022-42748.json index 6608c37ae02..21610695644 100644 --- a/CVE-2022/CVE-2022-427xx/CVE-2022-42748.json +++ b/CVE-2022/CVE-2022-427xx/CVE-2022-42748.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42748", "sourceIdentifier": "help@fluidattacks.com", "published": "2022-11-03T20:15:32.727", - "lastModified": "2024-11-21T07:25:15.610", + "lastModified": "2025-05-05T14:15:26.130", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-427xx/CVE-2022-42749.json b/CVE-2022/CVE-2022-427xx/CVE-2022-42749.json index a8a75837e70..7c7af851681 100644 --- a/CVE-2022/CVE-2022-427xx/CVE-2022-42749.json +++ b/CVE-2022/CVE-2022-427xx/CVE-2022-42749.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42749", "sourceIdentifier": "help@fluidattacks.com", "published": "2022-11-03T20:15:32.853", - "lastModified": "2024-11-21T07:25:15.723", + "lastModified": "2025-05-05T14:15:26.300", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-427xx/CVE-2022-42750.json b/CVE-2022/CVE-2022-427xx/CVE-2022-42750.json index 5de975d70b7..abed1fd3a6e 100644 --- a/CVE-2022/CVE-2022-427xx/CVE-2022-42750.json +++ b/CVE-2022/CVE-2022-427xx/CVE-2022-42750.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42750", "sourceIdentifier": "help@fluidattacks.com", "published": "2022-11-03T18:15:16.933", - "lastModified": "2024-11-21T07:25:15.850", + "lastModified": "2025-05-05T14:15:26.460", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-427xx/CVE-2022-42751.json b/CVE-2022/CVE-2022-427xx/CVE-2022-42751.json index f206c671725..2a52d4363ba 100644 --- a/CVE-2022/CVE-2022-427xx/CVE-2022-42751.json +++ b/CVE-2022/CVE-2022-427xx/CVE-2022-42751.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42751", "sourceIdentifier": "help@fluidattacks.com", "published": "2022-11-03T18:15:17.447", - "lastModified": "2024-11-21T07:25:15.967", + "lastModified": "2025-05-05T14:15:26.637", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-427xx/CVE-2022-42753.json b/CVE-2022/CVE-2022-427xx/CVE-2022-42753.json index 4b3cccea5c0..a499494c3d0 100644 --- a/CVE-2022/CVE-2022-427xx/CVE-2022-42753.json +++ b/CVE-2022/CVE-2022-427xx/CVE-2022-42753.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42753", "sourceIdentifier": "help@fluidattacks.com", "published": "2022-11-03T18:15:17.663", - "lastModified": "2024-11-21T07:25:16.090", + "lastModified": "2025-05-05T14:15:26.803", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-428xx/CVE-2022-42826.json b/CVE-2022/CVE-2022-428xx/CVE-2022-42826.json index eb9827940e6..fa9a3546f1a 100644 --- a/CVE-2022/CVE-2022-428xx/CVE-2022-42826.json +++ b/CVE-2022/CVE-2022-428xx/CVE-2022-42826.json @@ -2,8 +2,8 @@ "id": "CVE-2022-42826", "sourceIdentifier": "product-security@apple.com", "published": "2023-02-27T20:15:12.537", - "lastModified": "2024-11-21T07:25:25.490", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T14:14:23.453", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-42xx/CVE-2022-4244.json b/CVE-2022/CVE-2022-42xx/CVE-2022-4244.json index f50e2c07e8f..e3ea9640fd8 100644 --- a/CVE-2022/CVE-2022-42xx/CVE-2022-4244.json +++ b/CVE-2022/CVE-2022-42xx/CVE-2022-4244.json @@ -2,8 +2,8 @@ "id": "CVE-2022-4244", "sourceIdentifier": "secalert@redhat.com", "published": "2023-09-25T20:15:10.220", - "lastModified": "2024-11-21T07:34:51.510", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T14:12:14.513", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-430xx/CVE-2022-43081.json b/CVE-2022/CVE-2022-430xx/CVE-2022-43081.json index 87f766f22a7..51d255be372 100644 --- a/CVE-2022/CVE-2022-430xx/CVE-2022-43081.json +++ b/CVE-2022/CVE-2022-430xx/CVE-2022-43081.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43081", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-01T14:15:14.507", - "lastModified": "2024-11-21T07:25:54.097", + "lastModified": "2025-05-05T15:15:48.247", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-430xx/CVE-2022-43082.json b/CVE-2022/CVE-2022-430xx/CVE-2022-43082.json index 366fb67dd63..1ee0ce0ca23 100644 --- a/CVE-2022/CVE-2022-430xx/CVE-2022-43082.json +++ b/CVE-2022/CVE-2022-430xx/CVE-2022-43082.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43082", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-01T14:15:14.560", - "lastModified": "2024-11-21T07:25:54.253", + "lastModified": "2025-05-05T15:15:48.430", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-430xx/CVE-2022-43083.json b/CVE-2022/CVE-2022-430xx/CVE-2022-43083.json index d2f9c48c749..c05540adf96 100644 --- a/CVE-2022/CVE-2022-430xx/CVE-2022-43083.json +++ b/CVE-2022/CVE-2022-430xx/CVE-2022-43083.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43083", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-01T14:15:14.610", - "lastModified": "2024-11-21T07:25:54.410", + "lastModified": "2025-05-05T15:15:48.597", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-431xx/CVE-2022-43127.json b/CVE-2022/CVE-2022-431xx/CVE-2022-43127.json index 9903704dcd5..70db44a9f94 100644 --- a/CVE-2022/CVE-2022-431xx/CVE-2022-43127.json +++ b/CVE-2022/CVE-2022-431xx/CVE-2022-43127.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43127", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-01T14:15:14.950", - "lastModified": "2024-11-21T07:25:58.200", + "lastModified": "2025-05-05T15:15:48.787", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-432xx/CVE-2022-43239.json b/CVE-2022/CVE-2022-432xx/CVE-2022-43239.json index ffe49d33e92..972f1799afa 100644 --- a/CVE-2022/CVE-2022-432xx/CVE-2022-43239.json +++ b/CVE-2022/CVE-2022-432xx/CVE-2022-43239.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43239", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-02T14:15:13.140", - "lastModified": "2024-11-21T07:26:06.660", + "lastModified": "2025-05-05T14:15:27.013", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-432xx/CVE-2022-43240.json b/CVE-2022/CVE-2022-432xx/CVE-2022-43240.json index ccd28e02ff7..ff5076d40d2 100644 --- a/CVE-2022/CVE-2022-432xx/CVE-2022-43240.json +++ b/CVE-2022/CVE-2022-432xx/CVE-2022-43240.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43240", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-02T14:15:13.313", - "lastModified": "2024-11-21T07:26:06.843", + "lastModified": "2025-05-05T15:15:48.967", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-432xx/CVE-2022-43241.json b/CVE-2022/CVE-2022-432xx/CVE-2022-43241.json index 406f5c9053e..38faaff2843 100644 --- a/CVE-2022/CVE-2022-432xx/CVE-2022-43241.json +++ b/CVE-2022/CVE-2022-432xx/CVE-2022-43241.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43241", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-02T14:15:13.517", - "lastModified": "2024-11-21T07:26:07.017", + "lastModified": "2025-05-05T15:15:49.137", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-432xx/CVE-2022-43242.json b/CVE-2022/CVE-2022-432xx/CVE-2022-43242.json index dddb44a1017..2045e061fcd 100644 --- a/CVE-2022/CVE-2022-432xx/CVE-2022-43242.json +++ b/CVE-2022/CVE-2022-432xx/CVE-2022-43242.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43242", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-02T14:15:13.637", - "lastModified": "2024-11-21T07:26:07.197", + "lastModified": "2025-05-05T14:15:27.220", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-432xx/CVE-2022-43243.json b/CVE-2022/CVE-2022-432xx/CVE-2022-43243.json index 06918a3b816..9f6a644c050 100644 --- a/CVE-2022/CVE-2022-432xx/CVE-2022-43243.json +++ b/CVE-2022/CVE-2022-432xx/CVE-2022-43243.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43243", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-02T14:15:13.797", - "lastModified": "2024-11-21T07:26:07.360", + "lastModified": "2025-05-05T14:15:27.390", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-432xx/CVE-2022-43244.json b/CVE-2022/CVE-2022-432xx/CVE-2022-43244.json index e819a5e7355..d63591c6b8f 100644 --- a/CVE-2022/CVE-2022-432xx/CVE-2022-43244.json +++ b/CVE-2022/CVE-2022-432xx/CVE-2022-43244.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43244", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-02T14:15:13.967", - "lastModified": "2024-11-21T07:26:07.537", + "lastModified": "2025-05-05T14:15:27.560", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-432xx/CVE-2022-43245.json b/CVE-2022/CVE-2022-432xx/CVE-2022-43245.json index b56b3ed15ce..b0b5df3bf82 100644 --- a/CVE-2022/CVE-2022-432xx/CVE-2022-43245.json +++ b/CVE-2022/CVE-2022-432xx/CVE-2022-43245.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43245", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-02T14:15:14.123", - "lastModified": "2024-11-21T07:26:07.707", + "lastModified": "2025-05-05T14:15:27.730", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-433xx/CVE-2022-43361.json b/CVE-2022/CVE-2022-433xx/CVE-2022-43361.json index 3fe4ef74f43..3ed6b529666 100644 --- a/CVE-2022/CVE-2022-433xx/CVE-2022-43361.json +++ b/CVE-2022/CVE-2022-433xx/CVE-2022-43361.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43361", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-01T19:15:11.450", - "lastModified": "2024-11-21T07:26:20.290", + "lastModified": "2025-05-05T15:15:49.307", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-433xx/CVE-2022-43362.json b/CVE-2022/CVE-2022-433xx/CVE-2022-43362.json index a5dcd53c7a5..5de34357f4e 100644 --- a/CVE-2022/CVE-2022-433xx/CVE-2022-43362.json +++ b/CVE-2022/CVE-2022-433xx/CVE-2022-43362.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43362", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-01T19:15:11.503", - "lastModified": "2024-11-21T07:26:20.447", + "lastModified": "2025-05-05T15:15:49.480", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-439xx/CVE-2022-43989.json b/CVE-2022/CVE-2022-439xx/CVE-2022-43989.json index 64bd19dbfbe..72a25dd08fe 100644 --- a/CVE-2022/CVE-2022-439xx/CVE-2022-43989.json +++ b/CVE-2022/CVE-2022-439xx/CVE-2022-43989.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43989", "sourceIdentifier": "psirt@sick.de", "published": "2022-11-01T21:15:11.977", - "lastModified": "2024-11-21T07:27:29.150", + "lastModified": "2025-05-05T15:15:49.650", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 } ] }, diff --git a/CVE-2022/CVE-2022-439xx/CVE-2022-43990.json b/CVE-2022/CVE-2022-439xx/CVE-2022-43990.json index 8836006635c..865c892454e 100644 --- a/CVE-2022/CVE-2022-439xx/CVE-2022-43990.json +++ b/CVE-2022/CVE-2022-439xx/CVE-2022-43990.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43990", "sourceIdentifier": "psirt@sick.de", "published": "2022-11-01T21:15:12.037", - "lastModified": "2024-11-21T07:27:29.280", + "lastModified": "2025-05-05T15:15:49.863", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 } ] }, diff --git a/CVE-2022/CVE-2022-439xx/CVE-2022-43995.json b/CVE-2022/CVE-2022-439xx/CVE-2022-43995.json index 360369a965b..335641573ce 100644 --- a/CVE-2022/CVE-2022-439xx/CVE-2022-43995.json +++ b/CVE-2022/CVE-2022-439xx/CVE-2022-43995.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43995", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-02T14:15:16.187", - "lastModified": "2024-11-21T07:27:29.393", + "lastModified": "2025-05-05T14:15:27.907", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-445xx/CVE-2022-44542.json b/CVE-2022/CVE-2022-445xx/CVE-2022-44542.json index 7044ae247eb..b76648c2a22 100644 --- a/CVE-2022/CVE-2022-445xx/CVE-2022-44542.json +++ b/CVE-2022/CVE-2022-445xx/CVE-2022-44542.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44542", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-01T01:15:10.280", - "lastModified": "2024-11-21T07:28:05.897", + "lastModified": "2025-05-05T15:15:50.023", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-502" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0921.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0921.json index 22a67cfe4ee..ab31124e126 100644 --- a/CVE-2023/CVE-2023-09xx/CVE-2023-0921.json +++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0921.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0921", "sourceIdentifier": "cve@gitlab.com", "published": "2023-06-06T17:15:12.747", - "lastModified": "2024-11-21T07:38:06.130", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T14:12:29.340", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1035.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1035.json index c5b079b2800..98e3df83923 100644 --- a/CVE-2023/CVE-2023-10xx/CVE-2023-1035.json +++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1035.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1035", "sourceIdentifier": "cna@vuldb.com", "published": "2023-02-25T08:15:10.297", - "lastModified": "2024-11-21T07:38:19.757", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T14:13:50.337", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1401.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1401.json index 80ec8ec7b04..71564ad6577 100644 --- a/CVE-2023/CVE-2023-14xx/CVE-2023-1401.json +++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1401.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1401", "sourceIdentifier": "cve@gitlab.com", "published": "2023-07-26T07:15:09.103", - "lastModified": "2024-11-21T07:39:07.017", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T14:14:52.670", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-212xx/CVE-2023-21266.json b/CVE-2023/CVE-2023-212xx/CVE-2023-21266.json index 06fd1a9e7de..a3806bbb5ee 100644 --- a/CVE-2023/CVE-2023-212xx/CVE-2023-21266.json +++ b/CVE-2023/CVE-2023-212xx/CVE-2023-21266.json @@ -2,7 +2,7 @@ "id": "CVE-2023-21266", "sourceIdentifier": "security@android.com", "published": "2023-10-06T19:15:12.830", - "lastModified": "2024-11-21T07:42:31.207", + "lastModified": "2025-05-05T15:15:50.200", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-235xx/CVE-2023-23574.json b/CVE-2023/CVE-2023-235xx/CVE-2023-23574.json index 7625a58bcfa..fdbf5fa9f85 100644 --- a/CVE-2023/CVE-2023-235xx/CVE-2023-23574.json +++ b/CVE-2023/CVE-2023-235xx/CVE-2023-23574.json @@ -2,8 +2,8 @@ "id": "CVE-2023-23574", "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2023-08-09T09:15:13.767", - "lastModified": "2024-11-21T07:46:27.420", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T14:14:46.427", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2567.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2567.json index 42217031b46..c0a51e647d4 100644 --- a/CVE-2023/CVE-2023-25xx/CVE-2023-2567.json +++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2567.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2567", "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2023-09-19T11:16:19.333", - "lastModified": "2024-11-21T07:58:50.747", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T14:14:43.813", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32005.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32005.json index d8eaee95cd5..857fa6a95d2 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32005.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32005.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32005", "sourceIdentifier": "support@hackerone.com", "published": "2023-09-12T02:15:11.863", - "lastModified": "2024-11-21T08:02:30.747", + "lastModified": "2025-05-05T14:15:28.120", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-732" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-323xx/CVE-2023-32377.json b/CVE-2023/CVE-2023-323xx/CVE-2023-32377.json index 9387982004b..72929f49c78 100644 --- a/CVE-2023/CVE-2023-323xx/CVE-2023-32377.json +++ b/CVE-2023/CVE-2023-323xx/CVE-2023-32377.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32377", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:18:52.303", - "lastModified": "2024-11-21T08:03:13.940", + "lastModified": "2025-05-05T15:15:50.970", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3205.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3205.json index 785ecd2cfc8..2548fdac374 100644 --- a/CVE-2023/CVE-2023-32xx/CVE-2023-3205.json +++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3205.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3205", "sourceIdentifier": "cve@gitlab.com", "published": "2023-09-01T11:15:41.850", - "lastModified": "2024-11-21T08:16:41.637", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T14:12:22.513", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3210.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3210.json index d2623ebfe72..0b5a7650bd1 100644 --- a/CVE-2023/CVE-2023-32xx/CVE-2023-3210.json +++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3210.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3210", "sourceIdentifier": "cve@gitlab.com", "published": "2023-09-01T11:15:42.053", - "lastModified": "2024-11-21T08:16:42.243", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T14:14:12.877", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3246.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3246.json index 931e5632840..e59b47e1efc 100644 --- a/CVE-2023/CVE-2023-32xx/CVE-2023-3246.json +++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3246.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3246", "sourceIdentifier": "cve@gitlab.com", "published": "2023-11-06T13:15:09.397", - "lastModified": "2024-11-21T08:16:47.490", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T14:11:41.087", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-34xx/CVE-2023-3444.json b/CVE-2023/CVE-2023-34xx/CVE-2023-3444.json index a5ce11a8da2..1268bc8828d 100644 --- a/CVE-2023/CVE-2023-34xx/CVE-2023-3444.json +++ b/CVE-2023/CVE-2023-34xx/CVE-2023-3444.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3444", "sourceIdentifier": "cve@gitlab.com", "published": "2023-07-13T03:15:10.413", - "lastModified": "2024-11-21T08:17:16.947", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T14:14:17.207", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-389xx/CVE-2023-38950.json b/CVE-2023/CVE-2023-389xx/CVE-2023-38950.json index 1136a89ed9f..b3a6d0c89c1 100644 --- a/CVE-2023/CVE-2023-389xx/CVE-2023-38950.json +++ b/CVE-2023/CVE-2023-389xx/CVE-2023-38950.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38950", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-03T23:15:11.117", - "lastModified": "2024-11-21T08:14:31.150", + "lastModified": "2025-05-05T15:15:51.503", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -92,6 +92,10 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "https://sploitus.com/exploit?id=PACKETSTORM:177859", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-389xx/CVE-2023-38951.json b/CVE-2023/CVE-2023-389xx/CVE-2023-38951.json index 7e10eb28e42..19f7e025d48 100644 --- a/CVE-2023/CVE-2023-389xx/CVE-2023-38951.json +++ b/CVE-2023/CVE-2023-389xx/CVE-2023-38951.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38951", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-03T23:15:11.363", - "lastModified": "2024-11-21T08:14:31.290", + "lastModified": "2025-05-05T15:15:51.660", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -92,6 +92,10 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "https://sploitus.com/exploit?id=PACKETSTORM:177859", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-389xx/CVE-2023-38952.json b/CVE-2023/CVE-2023-389xx/CVE-2023-38952.json index 0cc92b44397..a957a01df82 100644 --- a/CVE-2023/CVE-2023-389xx/CVE-2023-38952.json +++ b/CVE-2023/CVE-2023-389xx/CVE-2023-38952.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38952", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-03T23:15:11.473", - "lastModified": "2024-11-21T08:14:31.430", + "lastModified": "2025-05-05T15:15:51.783", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -92,6 +92,10 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "https://sploitus.com/exploit?id=PACKETSTORM:177859", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-39xx/CVE-2023-3906.json b/CVE-2023/CVE-2023-39xx/CVE-2023-3906.json index bebfc190c57..6be2cbe5243 100644 --- a/CVE-2023/CVE-2023-39xx/CVE-2023-3906.json +++ b/CVE-2023/CVE-2023-39xx/CVE-2023-3906.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3906", "sourceIdentifier": "cve@gitlab.com", "published": "2023-09-29T07:15:13.233", - "lastModified": "2024-11-21T08:18:19.783", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T14:12:08.757", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-39xx/CVE-2023-3907.json b/CVE-2023/CVE-2023-39xx/CVE-2023-3907.json index 9fe4b4ec39f..f13de6af985 100644 --- a/CVE-2023/CVE-2023-39xx/CVE-2023-3907.json +++ b/CVE-2023/CVE-2023-39xx/CVE-2023-3907.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3907", "sourceIdentifier": "cve@gitlab.com", "published": "2023-12-17T23:15:43.937", - "lastModified": "2024-11-21T08:18:19.927", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T14:14:48.773", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-39xx/CVE-2023-3909.json b/CVE-2023/CVE-2023-39xx/CVE-2023-3909.json index 00b74bbec54..e85db151b5a 100644 --- a/CVE-2023/CVE-2023-39xx/CVE-2023-3909.json +++ b/CVE-2023/CVE-2023-39xx/CVE-2023-3909.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3909", "sourceIdentifier": "cve@gitlab.com", "published": "2023-11-06T13:15:09.653", - "lastModified": "2024-11-21T08:18:20.067", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T14:11:38.977", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-39xx/CVE-2023-3920.json b/CVE-2023/CVE-2023-39xx/CVE-2023-3920.json index 42d77930539..cd1cf1d6a6e 100644 --- a/CVE-2023/CVE-2023-39xx/CVE-2023-3920.json +++ b/CVE-2023/CVE-2023-39xx/CVE-2023-3920.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3920", "sourceIdentifier": "cve@gitlab.com", "published": "2023-09-29T07:15:13.777", - "lastModified": "2024-11-21T08:18:20.660", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T14:14:55.773", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40116.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40116.json index 48e46eeb4c7..b10bf5c562d 100644 --- a/CVE-2023/CVE-2023-401xx/CVE-2023-40116.json +++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40116.json @@ -2,7 +2,7 @@ "id": "CVE-2023-40116", "sourceIdentifier": "security@android.com", "published": "2023-10-27T21:15:08.567", - "lastModified": "2024-11-21T08:18:48.660", + "lastModified": "2025-05-05T15:15:51.907", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40120.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40120.json index 341962a85dc..21734dad4eb 100644 --- a/CVE-2023/CVE-2023-401xx/CVE-2023-40120.json +++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40120.json @@ -2,7 +2,7 @@ "id": "CVE-2023-40120", "sourceIdentifier": "security@android.com", "published": "2023-10-27T21:15:08.667", - "lastModified": "2024-11-21T08:18:48.910", + "lastModified": "2025-05-05T15:15:52.083", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40125.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40125.json index cf7b7fe4b41..5cde9e71555 100644 --- a/CVE-2023/CVE-2023-401xx/CVE-2023-40125.json +++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40125.json @@ -2,7 +2,7 @@ "id": "CVE-2023-40125", "sourceIdentifier": "security@android.com", "published": "2023-10-27T21:15:08.807", - "lastModified": "2024-11-21T08:18:49.587", + "lastModified": "2025-05-05T15:15:52.230", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40283.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40283.json index 9f3c675eed9..49e572a003c 100644 --- a/CVE-2023/CVE-2023-402xx/CVE-2023-40283.json +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40283.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40283", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-14T03:15:09.257", - "lastModified": "2024-11-21T08:19:08.070", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T14:14:38.967", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40418.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40418.json index c7f1d53cdbc..e9db5e03ce2 100644 --- a/CVE-2023/CVE-2023-404xx/CVE-2023-40418.json +++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40418.json @@ -2,7 +2,7 @@ "id": "CVE-2023-40418", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:19:09.213", - "lastModified": "2024-11-21T08:19:25.037", + "lastModified": "2025-05-05T15:15:52.370", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40419.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40419.json index 4647cde4052..e6397b61a83 100644 --- a/CVE-2023/CVE-2023-404xx/CVE-2023-40419.json +++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40419.json @@ -2,7 +2,7 @@ "id": "CVE-2023-40419", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:19:09.297", - "lastModified": "2024-11-21T08:19:25.167", + "lastModified": "2025-05-05T15:15:52.537", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-410xx/CVE-2023-41063.json b/CVE-2023/CVE-2023-410xx/CVE-2023-41063.json index 272cfe0124e..adc00bd3a77 100644 --- a/CVE-2023/CVE-2023-410xx/CVE-2023-41063.json +++ b/CVE-2023/CVE-2023-410xx/CVE-2023-41063.json @@ -2,7 +2,7 @@ "id": "CVE-2023-41063", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:19:24.917", - "lastModified": "2024-11-21T08:20:29.117", + "lastModified": "2025-05-05T15:15:52.710", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-410xx/CVE-2023-41068.json b/CVE-2023/CVE-2023-410xx/CVE-2023-41068.json index beab9b3edbb..0a9226fa863 100644 --- a/CVE-2023/CVE-2023-410xx/CVE-2023-41068.json +++ b/CVE-2023/CVE-2023-410xx/CVE-2023-41068.json @@ -2,7 +2,7 @@ "id": "CVE-2023-41068", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:19:26.157", - "lastModified": "2024-11-21T08:20:29.817", + "lastModified": "2025-05-05T15:15:52.913", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-415xx/CVE-2023-41503.json b/CVE-2023/CVE-2023-415xx/CVE-2023-41503.json index dee31d02222..384ed93c607 100644 --- a/CVE-2023/CVE-2023-415xx/CVE-2023-41503.json +++ b/CVE-2023/CVE-2023-415xx/CVE-2023-41503.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41503", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-07T09:15:38.240", - "lastModified": "2024-11-21T08:21:14.500", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T15:21:36.157", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:student_enrollment:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3EE20061-B1D6-4B66-8625-CC32F5747D33" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ASR511-OO7/CVE-2023-41503/blob/main/CVE-26", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/ASR511-OO7/CVE-2023-41503/blob/main/CVE-26", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-417xx/CVE-2023-41747.json b/CVE-2023/CVE-2023-417xx/CVE-2023-41747.json index 72af8385919..6285d804ca2 100644 --- a/CVE-2023/CVE-2023-417xx/CVE-2023-41747.json +++ b/CVE-2023/CVE-2023-417xx/CVE-2023-41747.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41747", "sourceIdentifier": "security@acronis.com", "published": "2023-08-31T18:15:09.523", - "lastModified": "2024-11-21T08:21:36.947", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T14:14:20.860", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42282.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42282.json index 3f209892ca5..d975d579cd5 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42282.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42282.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42282", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-08T17:15:10.840", - "lastModified": "2024-11-21T08:22:24.217", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T14:14:31.020", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42852.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42852.json index db8a46e71f9..c5e6cd7c601 100644 --- a/CVE-2023/CVE-2023-428xx/CVE-2023-42852.json +++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42852.json @@ -2,7 +2,7 @@ "id": "CVE-2023-42852", "sourceIdentifier": "product-security@apple.com", "published": "2023-10-25T19:15:10.843", - "lastModified": "2024-11-21T08:23:22.010", + "lastModified": "2025-05-05T15:15:53.080", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45871.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45871.json index 33de4a8cdec..0c3c8d267a3 100644 --- a/CVE-2023/CVE-2023-458xx/CVE-2023-45871.json +++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45871.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45871", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-15T01:15:09.027", - "lastModified": "2024-11-21T08:27:31.720", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T14:12:06.217", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45898.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45898.json index 3facf81da8b..74a97454540 100644 --- a/CVE-2023/CVE-2023-458xx/CVE-2023-45898.json +++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45898.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45898", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-16T03:15:09.320", - "lastModified": "2025-05-01T16:15:25.813", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T14:12:02.350", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-46xx/CVE-2023-4647.json b/CVE-2023/CVE-2023-46xx/CVE-2023-4647.json index 0249312ebd4..1477fdc9aca 100644 --- a/CVE-2023/CVE-2023-46xx/CVE-2023-4647.json +++ b/CVE-2023/CVE-2023-46xx/CVE-2023-4647.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4647", "sourceIdentifier": "cve@gitlab.com", "published": "2023-09-01T11:15:43.363", - "lastModified": "2024-11-21T08:35:36.480", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T14:12:17.193", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5174.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5174.json index 53a09e0737f..5ba00753195 100644 --- a/CVE-2023/CVE-2023-51xx/CVE-2023-5174.json +++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5174.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5174", "sourceIdentifier": "security@mozilla.org", "published": "2023-09-27T15:19:42.457", - "lastModified": "2024-11-21T08:41:14.027", + "lastModified": "2025-05-05T15:15:53.537", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-521xx/CVE-2023-52160.json b/CVE-2023/CVE-2023-521xx/CVE-2023-52160.json index 1ac8a80b2cf..c7b83792c3e 100644 --- a/CVE-2023/CVE-2023-521xx/CVE-2023-52160.json +++ b/CVE-2023/CVE-2023-521xx/CVE-2023-52160.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52160", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-22T17:15:08.263", - "lastModified": "2024-11-21T08:39:18.380", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T14:14:41.537", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-530xx/CVE-2023-53076.json b/CVE-2023/CVE-2023-530xx/CVE-2023-53076.json index 3da77e99561..d10d21cc3e6 100644 --- a/CVE-2023/CVE-2023-530xx/CVE-2023-53076.json +++ b/CVE-2023/CVE-2023-530xx/CVE-2023-53076.json @@ -2,48 +2,15 @@ "id": "CVE-2023-53076", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-05-02T16:15:26.610", - "lastModified": "2025-05-02T16:15:26.610", - "vulnStatus": "Received", + "lastModified": "2025-05-05T15:15:53.393", + "vulnStatus": "Rejected", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Adjust insufficient default bpf_jit_limit\n\nWe've seen recent AWS EKS (Kubernetes) user reports like the following:\n\n After upgrading EKS nodes from v20230203 to v20230217 on our 1.24 EKS\n clusters after a few days a number of the nodes have containers stuck\n in ContainerCreating state or liveness/readiness probes reporting the\n following error:\n\n Readiness probe errored: rpc error: code = Unknown desc = failed to\n exec in container: failed to start exec \"4a11039f730203ffc003b7[...]\":\n OCI runtime exec failed: exec failed: unable to start container process:\n unable to init seccomp: error loading seccomp filter into kernel:\n error loading seccomp filter: errno 524: unknown\n\n However, we had not been seeing this issue on previous AMIs and it only\n started to occur on v20230217 (following the upgrade from kernel 5.4 to\n 5.10) with no other changes to the underlying cluster or workloads.\n\n We tried the suggestions from that issue (sysctl net.core.bpf_jit_limit=452534528)\n which helped to immediately allow containers to be created and probes to\n execute but after approximately a day the issue returned and the value\n returned by cat /proc/vmallocinfo | grep bpf_jit | awk '{s+=$2} END {print s}'\n was steadily increasing.\n\nI tested bpf tree to observe bpf_jit_charge_modmem, bpf_jit_uncharge_modmem\ntheir sizes passed in as well as bpf_jit_current under tcpdump BPF filter,\nseccomp BPF and native (e)BPF programs, and the behavior all looks sane\nand expected, that is nothing \"leaking\" from an upstream perspective.\n\nThe bpf_jit_limit knob was originally added in order to avoid a situation\nwhere unprivileged applications loading BPF programs (e.g. seccomp BPF\npolicies) consuming all the module memory space via BPF JIT such that loading\nof kernel modules would be prevented. The default limit was defined back in\n2018 and while good enough back then, we are generally seeing far more BPF\nconsumers today.\n\nAdjust the limit for the BPF JIT pool from originally 1/4 to now 1/2 of the\nmodule memory space to better reflect today's needs and avoid more users\nrunning into potentially hard to debug issues." + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], "metrics": {}, - "references": [ - { - "url": "https://git.kernel.org/stable/c/10ec8ca8ec1a2f04c4ed90897225231c58c124a7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/374ed036309fce73f9db04c3054018a71912d46b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/42049e65d338870e93732b0b80c6c41faf6aa781", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/54869daa6a437887614274f65298ba44a3fac63a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/68ed00a37d2d1c932ff7be40be4b90c4bec48c56", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/9cda812c76067c8a771eae43bb6943481cc7effc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/a4bbab27c4bf69486f5846d44134eb31c37e9b22", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/d69c2ded95b17d51cc6632c7848cbd476381ecd6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - } - ] + "references": [] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-58xx/CVE-2023-5825.json b/CVE-2023/CVE-2023-58xx/CVE-2023-5825.json index 49d5059d7b0..b4d453eeb2d 100644 --- a/CVE-2023/CVE-2023-58xx/CVE-2023-5825.json +++ b/CVE-2023/CVE-2023-58xx/CVE-2023-5825.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5825", "sourceIdentifier": "cve@gitlab.com", "published": "2023-11-06T11:15:09.740", - "lastModified": "2024-11-21T08:42:34.227", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T14:11:43.397", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6955.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6955.json index 0390ea774f9..0fe9fa980e6 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6955.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6955.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6955", "sourceIdentifier": "cve@gitlab.com", "published": "2024-01-12T14:15:49.233", - "lastModified": "2024-11-21T08:44:54.833", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T14:11:28.143", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-02xx/CVE-2024-0211.json b/CVE-2024/CVE-2024-02xx/CVE-2024-0211.json index 5b99fd7fb7f..f70a76b132c 100644 --- a/CVE-2024/CVE-2024-02xx/CVE-2024-0211.json +++ b/CVE-2024/CVE-2024-02xx/CVE-2024-0211.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0211", "sourceIdentifier": "cve@gitlab.com", "published": "2024-01-03T08:15:11.443", - "lastModified": "2024-11-21T08:46:04.477", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T14:11:36.213", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0365.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0365.json index 7baddd831c3..0fe351b74fa 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0365.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0365.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0365", "sourceIdentifier": "contact@wpscan.com", "published": "2024-03-18T19:15:06.253", - "lastModified": "2024-11-21T08:46:24.493", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T15:15:56.690", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:radykal:fancy_product_designer:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "6.1.5", + "matchCriteriaId": "93EFACDD-8DAB-4961-A07D-6CD1E9014ACD" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/4b8b9638-d52a-40bc-b298-ae1c74788c18/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/4b8b9638-d52a-40bc-b298-ae1c74788c18/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10638.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10638.json index 997539a449c..e2f7c882b9a 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10638.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10638.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10638", "sourceIdentifier": "contact@wpscan.com", "published": "2025-03-25T06:15:38.240", - "lastModified": "2025-03-27T16:45:46.410", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T15:17:52.753", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acowebs:product_labels_for_woocommerce_\\(sale_badges\\):*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.5.11", + "matchCriteriaId": "344A40C7-06AC-46BB-A6C6-10D5C8598D44" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/32a7a778-2211-45b4-bdc2-528f27b7d4fe/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/32a7a778-2211-45b4-bdc2-528f27b7d4fe/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1066.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1066.json index f4956144a1a..542ce8de49e 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1066.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1066.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1066", "sourceIdentifier": "cve@gitlab.com", "published": "2024-02-07T22:15:09.797", - "lastModified": "2024-11-21T08:49:43.170", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T14:14:07.020", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13095.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13095.json index acb9e0acac0..2796798654f 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13095.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13095.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13095", "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-27T06:15:23.440", - "lastModified": "2025-01-28T21:15:16.453", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T15:16:55.157", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wptriggers:wp_triggers_lite:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.5.3", + "matchCriteriaId": "23053171-A735-496A-A04C-E51F3B85C39E" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/74e95fb5-025b-4d4d-a279-844b6ee3e57d/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/74e95fb5-025b-4d4d-a279-844b6ee3e57d/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-215xx/CVE-2024-21591.json b/CVE-2024/CVE-2024-215xx/CVE-2024-21591.json index bd674cb7975..c1f11533641 100644 --- a/CVE-2024/CVE-2024-215xx/CVE-2024-21591.json +++ b/CVE-2024/CVE-2024-215xx/CVE-2024-21591.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21591", "sourceIdentifier": "sirt@juniper.net", "published": "2024-01-12T01:15:46.697", - "lastModified": "2024-11-21T08:54:40.447", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T14:11:31.113", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24762.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24762.json index c1acc4e1943..923d1116165 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24762.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24762.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24762", "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-05T15:15:09.260", - "lastModified": "2024-11-21T08:59:38.960", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T14:14:26.363", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-258xx/CVE-2024-25845.json b/CVE-2024/CVE-2024-258xx/CVE-2024-25845.json index 3e95ca9413e..1d64e149a29 100644 --- a/CVE-2024/CVE-2024-258xx/CVE-2024-25845.json +++ b/CVE-2024/CVE-2024-258xx/CVE-2024-25845.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25845", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-08T02:15:50.477", - "lastModified": "2024-11-21T09:01:25.660", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T15:02:24.317", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cleanpresta:cd_custom_fields_4_orders:*:*:*:*:*:prestashop:*:*", + "versionEndIncluding": "1.0.0", + "matchCriteriaId": "3841E976-B53B-438D-9540-3C4E9BA556DD" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.friendsofpresta.org/modules/2024/03/05/cdcustomfields4orders.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Third Party Advisory" + ] }, { "url": "https://www.cleanpresta.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://security.friendsofpresta.org/modules/2024/03/05/cdcustomfields4orders.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] }, { "url": "https://www.cleanpresta.com", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-258xx/CVE-2024-25847.json b/CVE-2024/CVE-2024-258xx/CVE-2024-25847.json index bdfb20256ea..e5a284c5bdd 100644 --- a/CVE-2024/CVE-2024-258xx/CVE-2024-25847.json +++ b/CVE-2024/CVE-2024-258xx/CVE-2024-25847.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25847", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-03T09:15:06.253", - "lastModified": "2024-11-21T09:01:26.110", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T15:00:23.993", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:myprestamodules:product_catalog_\\(csv\\,_excel\\)_import:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.5.0", + "matchCriteriaId": "116DC4B6-66F3-40B0-8112-61D78C4EBD01" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/friends-of-presta/security-advisories/blob/main/_posts/2024-02-29-simpleimportproduct.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/friends-of-presta/security-advisories/blob/main/_posts/2024-02-29-simpleimportproduct.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-258xx/CVE-2024-25848.json b/CVE-2024/CVE-2024-258xx/CVE-2024-25848.json index d469316ad0a..b00bdc3f841 100644 --- a/CVE-2024/CVE-2024-258xx/CVE-2024-25848.json +++ b/CVE-2024/CVE-2024-258xx/CVE-2024-25848.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25848", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-08T02:15:50.527", - "lastModified": "2024-11-21T09:01:26.427", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T15:02:57.030", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,30 +51,66 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:team-ever:seo:*:*:*:*:*:prestashop:*:*", + "versionEndIncluding": "8.1.2", + "matchCriteriaId": "9DB1B7E0-C61B-4C07-8ADF-393CF2E3AD7B" + } + ] + } + ] + } + ], "references": [ { "url": "https://addons.prestashop.com/fr/seo-referencement-naturel/39489-ever-ultimate-seo.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://security.friendsofpresta.org/modules/2024/03/05/everpsseo.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.team-ever.com/prestashop-ever-ultimate-seo/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://addons.prestashop.com/fr/seo-referencement-naturel/39489-ever-ultimate-seo.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://security.friendsofpresta.org/modules/2024/03/05/everpsseo.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.team-ever.com/prestashop-ever-ultimate-seo/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-258xx/CVE-2024-25849.json b/CVE-2024/CVE-2024-258xx/CVE-2024-25849.json index 1c46398b389..db95140e69a 100644 --- a/CVE-2024/CVE-2024-258xx/CVE-2024-25849.json +++ b/CVE-2024/CVE-2024-258xx/CVE-2024-25849.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25849", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-08T02:15:50.580", - "lastModified": "2024-11-21T09:01:26.647", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T15:06:24.170", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:prestatoolkit:make_an_offer\\/offer_your_price:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.7.1", + "matchCriteriaId": "D7EC692A-AA03-4D95-A2E8-BEF5413827D7" + } + ] + } + ] + } + ], "references": [ { "url": "https://addons.prestashop.com/en/price-management/19507-make-an-offer.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://security.friendsofpresta.org/modules/2024/03/05/makeanoffer.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Third Party Advisory" + ] }, { "url": "https://addons.prestashop.com/en/price-management/19507-make-an-offer.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://security.friendsofpresta.org/modules/2024/03/05/makeanoffer.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-275xx/CVE-2024-27515.json b/CVE-2024/CVE-2024-275xx/CVE-2024-27515.json index 072bd8e0039..da20fd8abf9 100644 --- a/CVE-2024/CVE-2024-275xx/CVE-2024-27515.json +++ b/CVE-2024/CVE-2024-275xx/CVE-2024-27515.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27515", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-28T13:15:09.530", - "lastModified": "2024-11-21T09:04:41.443", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T14:54:48.797", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mindstellar:osclass:5.1.2:*:*:*:*:*:*:*", + "matchCriteriaId": "864B396F-F693-4CD8-8AEE-EFCD848D863B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/mindstellar/Osclass/issues/495", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://github.com/mindstellar/Osclass/issues/495", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-388xx/CVE-2024-38882.json b/CVE-2024/CVE-2024-388xx/CVE-2024-38882.json index 1faea24915c..250a33b897f 100644 --- a/CVE-2024/CVE-2024-388xx/CVE-2024-38882.json +++ b/CVE-2024/CVE-2024-388xx/CVE-2024-38882.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38882", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-02T18:16:19.300", - "lastModified": "2024-08-07T16:15:45.000", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T15:07:13.760", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:horizoncloud:caterease:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0.1.1663", + "versionEndIncluding": "24.0.1.2405", + "matchCriteriaId": "8CF50968-A476-46EC-8169-58AD4C1B8984" + } + ] + } + ] + } + ], "references": [ { "url": "http://caterease.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "http://horizon.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://packetstormsecurity.com/files/179892/Caterease-Software-SQL-Injection-Command-Injection-Bypass.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.273366", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58098.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58098.json new file mode 100644 index 00000000000..6575ea3e46a --- /dev/null +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58098.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-58098", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-05-05T15:15:53.810", + "lastModified": "2025-05-05T15:15:53.810", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: track changes_pkt_data property for global functions\n\nWhen processing calls to certain helpers, verifier invalidates all\npacket pointers in a current state. For example, consider the\nfollowing program:\n\n __attribute__((__noinline__))\n long skb_pull_data(struct __sk_buff *sk, __u32 len)\n {\n return bpf_skb_pull_data(sk, len);\n }\n\n SEC(\"tc\")\n int test_invalidate_checks(struct __sk_buff *sk)\n {\n int *p = (void *)(long)sk->data;\n if ((void *)(p + 1) > (void *)(long)sk->data_end) return TCX_DROP;\n skb_pull_data(sk, 0);\n *p = 42;\n return TCX_PASS;\n }\n\nAfter a call to bpf_skb_pull_data() the pointer 'p' can't be used\nsafely. See function filter.c:bpf_helper_changes_pkt_data() for a list\nof such helpers.\n\nAt the moment verifier invalidates packet pointers when processing\nhelper function calls, and does not traverse global sub-programs when\nprocessing calls to global sub-programs. This means that calls to\nhelpers done from global sub-programs do not invalidate pointers in\nthe caller state. E.g. the program above is unsafe, but is not\nrejected by verifier.\n\nThis commit fixes the omission by computing field\nbpf_subprog_info->changes_pkt_data for each sub-program before main\nverification pass.\nchanges_pkt_data should be set if:\n- subprogram calls helper for which bpf_helper_changes_pkt_data\n returns true;\n- subprogram calls a global function,\n for which bpf_subprog_info->changes_pkt_data should be set.\n\nThe verifier.c:check_cfg() pass is modified to compute this\ninformation. The commit relies on depth first instruction traversal\ndone by check_cfg() and absence of recursive function calls:\n- check_cfg() would eventually visit every call to subprogram S in a\n state when S is fully explored;\n- when S is fully explored:\n - every direct helper call within S is explored\n (and thus changes_pkt_data is set if needed);\n - every call to subprogram S1 called by S was visited with S1 fully\n explored (and thus S inherits changes_pkt_data from S1).\n\nThe downside of such approach is that dead code elimination is not\ntaken into account: if a helper call inside global function is dead\nbecause of current configuration, verifier would conservatively assume\nthat the call occurs for the purpose of the changes_pkt_data\ncomputation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/1d572c60488b52882b719ed273767ee3b280413d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/51081a3f25c742da5a659d7fc6fd77ebfdd555be", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-581xx/CVE-2024-58100.json b/CVE-2024/CVE-2024-581xx/CVE-2024-58100.json new file mode 100644 index 00000000000..b49c111a7b9 --- /dev/null +++ b/CVE-2024/CVE-2024-581xx/CVE-2024-58100.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-58100", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-05-05T15:15:53.913", + "lastModified": "2025-05-05T15:15:53.913", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: check changes_pkt_data property for extension programs\n\nWhen processing calls to global sub-programs, verifier decides whether\nto invalidate all packet pointers in current state depending on the\nchanges_pkt_data property of the global sub-program.\n\nBecause of this, an extension program replacing a global sub-program\nmust be compatible with changes_pkt_data property of the sub-program\nbeing replaced.\n\nThis commit:\n- adds changes_pkt_data flag to struct bpf_prog_aux:\n - this flag is set in check_cfg() for main sub-program;\n - in jit_subprogs() for other sub-programs;\n- modifies bpf_check_attach_btf_id() to check changes_pkt_data flag;\n- moves call to check_attach_btf_id() after the call to check_cfg(),\n because it needs changes_pkt_data flag to be set:\n\n bpf_check:\n ... ...\n - check_attach_btf_id resolve_pseudo_ldimm64\n resolve_pseudo_ldimm64 --> bpf_prog_is_offloaded\n bpf_prog_is_offloaded check_cfg\n check_cfg + check_attach_btf_id\n ... ...\n\nThe following fields are set by check_attach_btf_id():\n- env->ops\n- prog->aux->attach_btf_trace\n- prog->aux->attach_func_name\n- prog->aux->attach_func_proto\n- prog->aux->dst_trampoline\n- prog->aux->mod\n- prog->aux->saved_dst_attach_type\n- prog->aux->saved_dst_prog_type\n- prog->expected_attach_type\n\nNeither of these fields are used by resolve_pseudo_ldimm64() or\nbpf_prog_offload_verifier_prep() (for netronome and netdevsim\ndrivers), so the reordering is safe." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/3846e2bea565ee1c5195dcc625fda9868fb0e3b3", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/81f6d0530ba031b5f038a091619bf2ff29568852", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-582xx/CVE-2024-58237.json b/CVE-2024/CVE-2024-582xx/CVE-2024-58237.json new file mode 100644 index 00000000000..fbea1ed3777 --- /dev/null +++ b/CVE-2024/CVE-2024-582xx/CVE-2024-58237.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-58237", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-05-05T15:15:54.010", + "lastModified": "2025-05-05T15:15:54.010", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: consider that tail calls invalidate packet pointers\n\nTail-called programs could execute any of the helpers that invalidate\npacket pointers. Hence, conservatively assume that each tail call\ninvalidates packet pointers.\n\nMaking the change in bpf_helper_changes_pkt_data() automatically makes\nuse of check_cfg() logic that computes 'changes_pkt_data' effect for\nglobal sub-programs, such that the following program could be\nrejected:\n\n int tail_call(struct __sk_buff *sk)\n {\n \tbpf_tail_call_static(sk, &jmp_table, 0);\n \treturn 0;\n }\n\n SEC(\"tc\")\n int not_safe(struct __sk_buff *sk)\n {\n \tint *p = (void *)(long)sk->data;\n \t... make p valid ...\n \ttail_call(sk);\n \t*p = 42; /* this is unsafe */\n \t...\n }\n\nThe tc_bpf2bpf.c:subprog_tc() needs change: mark it as a function that\ncan invalidate packet pointers. Otherwise, it can't be freplaced with\ntailcall_freplace.c:entry_freplace() that does a tail call." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/1a4607ffba35bf2a630aab299e34dd3f6e658d70", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/1c2244437f9ad3dd91215f920401a14f2542dbfc", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0405.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0405.json index 5858bfd3724..64f9db52a28 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0405.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0405.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0405", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-13T01:15:07.430", - "lastModified": "2025-01-13T19:15:11.227", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T15:20:47.620", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,36 +142,91 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liujianview:gymxmjpa:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "73EC48B7-DE2D-405D-ABD7-4C89EA542D2F" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/liujianview/gymxmjpa/issues/3", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/liujianview/gymxmjpa/issues/3#issue-2765770918", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.291281", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.291281", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.473411", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/liujianview/gymxmjpa/issues/3", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/liujianview/gymxmjpa/issues/3#issue-2765770918", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0406.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0406.json index bcdd620899e..91b0b52564a 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0406.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0406.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0406", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-13T02:15:07.490", - "lastModified": "2025-01-13T18:15:20.490", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T15:20:54.380", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,36 +142,92 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liujianview:gymxmjpa:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "73EC48B7-DE2D-405D-ABD7-4C89EA542D2F" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/liujianview/gymxmjpa/issues/5", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/liujianview/gymxmjpa/issues/5#issue-2765786069", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.291282", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.291282", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.473417", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/liujianview/gymxmjpa/issues/5", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/liujianview/gymxmjpa/issues/5#issue-2765786069", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0407.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0407.json index ba823127122..eec4830739f 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0407.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0407.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0407", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-13T02:15:07.667", - "lastModified": "2025-01-13T18:15:21.023", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T15:21:03.203", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,36 +142,92 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liujianview:gymxmjpa:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "73EC48B7-DE2D-405D-ABD7-4C89EA542D2F" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/liujianview/gymxmjpa/issues/7", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/liujianview/gymxmjpa/issues/7#issue-2765800789", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.291283", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.291283", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.473422", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/liujianview/gymxmjpa/issues/7", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/liujianview/gymxmjpa/issues/7#issue-2765800789", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0408.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0408.json index 9fe59b41f6c..e02e2e84458 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0408.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0408.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0408", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-13T02:15:07.840", - "lastModified": "2025-01-13T14:15:10.073", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T15:21:05.883", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,36 +142,92 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liujianview:gymxmjpa:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "73EC48B7-DE2D-405D-ABD7-4C89EA542D2F" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/liujianview/gymxmjpa/issues/8", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/liujianview/gymxmjpa/issues/8#issue-2765807702", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.291284", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.291284", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.473423", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/liujianview/gymxmjpa/issues/8", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/liujianview/gymxmjpa/issues/8#issue-2765807702", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0409.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0409.json index 6c2fe9e4a9b..f16b7060e0d 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0409.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0409.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0409", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-13T03:15:06.667", - "lastModified": "2025-01-13T18:15:21.430", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T15:21:08.160", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,36 +142,92 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liujianview:gymxmjpa:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "73EC48B7-DE2D-405D-ABD7-4C89EA542D2F" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/liujianview/gymxmjpa/issues/9", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/liujianview/gymxmjpa/issues/9#issue-2765816110", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.291285", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.291285", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.473425", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/liujianview/gymxmjpa/issues/9", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/liujianview/gymxmjpa/issues/9#issue-2765816110", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0410.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0410.json index d40943743a7..d458b4a96bd 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0410.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0410.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0410", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-13T03:15:06.847", - "lastModified": "2025-01-13T18:15:21.730", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T15:21:10.997", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,36 +142,94 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liujianview:gymxmjpa:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "73EC48B7-DE2D-405D-ABD7-4C89EA542D2F" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/liujianview/gymxmjpa/issues/10", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/liujianview/gymxmjpa/issues/10#issue-2765824571", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.291286", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.291286", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.473426", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/liujianview/gymxmjpa/issues/10", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/liujianview/gymxmjpa/issues/10#issue-2765824571", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0488.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0488.json index a48604221c0..40f5649d612 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0488.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0488.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0488", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-15T21:15:15.380", - "lastModified": "2025-01-16T16:15:35.347", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T15:19:19.220", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,34 +144,83 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:native-php-cms_project:native-php-cms:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E4B76547-B907-477E-9620-0BEA1457E2A6" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Fanli2012/native-php-cms/issues/10", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://github.com/Fanli2012/native-php-cms/issues/10#issue-2769983658", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.291933", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.291933", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.475255", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/Fanli2012/native-php-cms/issues/10", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://github.com/Fanli2012/native-php-cms/issues/10#issue-2769983658", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0489.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0489.json index 886d6eff590..8423fe38a45 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0489.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0489.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0489", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-15T22:15:26.660", - "lastModified": "2025-01-16T16:15:35.517", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T15:19:28.840", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,34 +144,83 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:native-php-cms_project:native-php-cms:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E4B76547-B907-477E-9620-0BEA1457E2A6" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Fanli2012/native-php-cms/issues/11", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://github.com/Fanli2012/native-php-cms/issues/11#issue-2769999157", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.291934", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.291934", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.475256", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/Fanli2012/native-php-cms/issues/11", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://github.com/Fanli2012/native-php-cms/issues/11#issue-2769999157", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0490.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0490.json index 5e15ec2754f..12d5690c6d1 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0490.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0490.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0490", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-15T22:15:26.820", - "lastModified": "2025-01-16T16:15:35.653", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T15:19:37.540", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,34 +144,83 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:native-php-cms_project:native-php-cms:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E4B76547-B907-477E-9620-0BEA1457E2A6" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Fanli2012/native-php-cms/issues/12", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://github.com/Fanli2012/native-php-cms/issues/12#issue-2770013163", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.291935", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.291935", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.475258", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/Fanli2012/native-php-cms/issues/12", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://github.com/Fanli2012/native-php-cms/issues/12#issue-2770013163", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27007.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27007.json index ec5f0fa5dcd..5146a87a2ef 100644 --- a/CVE-2025/CVE-2025-270xx/CVE-2025-27007.json +++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27007.json @@ -2,7 +2,7 @@ "id": "CVE-2025-27007", "sourceIdentifier": "audit@patchstack.com", "published": "2025-05-01T11:15:54.517", - "lastModified": "2025-05-02T13:53:20.943", + "lastModified": "2025-05-05T14:15:28.397", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -52,6 +52,10 @@ } ], "references": [ + { + "url": "https://patchstack.com/articles/additional-critical-ottokit-formerly-suretriggers-vulnerability-patched?_s_id=cve", + "source": "audit@patchstack.com" + }, { "url": "https://patchstack.com/database/wordpress/plugin/suretriggers/vulnerability/wordpress-suretriggers-1-0-82-privilege-escalation-vulnerability?_s_id=cve", "source": "audit@patchstack.com" diff --git a/CVE-2025/CVE-2025-281xx/CVE-2025-28168.json b/CVE-2025/CVE-2025-281xx/CVE-2025-28168.json new file mode 100644 index 00000000000..4d8e882bf52 --- /dev/null +++ b/CVE-2025/CVE-2025-281xx/CVE-2025-28168.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-28168", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-05-05T14:15:28.500", + "lastModified": "2025-05-05T14:15:28.500", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Outsystems Multiple File Upload < 3.1.0 is vulnerable to Unrestricted File Upload. The vulnerability is because file extension and size validations are enforced solely on the client side. An attacker can intercept the upload request and modify the parameter to bypass extension restrictions and upload arbitrary files." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/IamLeandrooooo/01090be3023f5e7c7397bb9b1f5505b9", + "source": "cve@mitre.org" + }, + { + "url": "https://www.outsystems.com/forge/component-overview/200/multiple-file-upload-o11", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30290.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30290.json index b348b4f35ec..d9e6857348f 100644 --- a/CVE-2025/CVE-2025-302xx/CVE-2025-30290.json +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30290.json @@ -2,8 +2,8 @@ "id": "CVE-2025-30290", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T20:15:26.883", - "lastModified": "2025-04-09T20:02:41.860", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-05T15:35:10.173", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 5.8 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -51,10 +71,190 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:-:*:*:*:*:*:*", + "matchCriteriaId": "7A94B406-C011-4673-8C2B-0DD94D46CC4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update1:*:*:*:*:*:*", + "matchCriteriaId": "AFD05E3A-10F9-4C75-9710-BA46B66FF6E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update10:*:*:*:*:*:*", + "matchCriteriaId": "F1FC7D1D-6DD2-48B2-980F-B001B0F24473" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update11:*:*:*:*:*:*", + "matchCriteriaId": "1FA19E1D-61C2-4640-AF06-4BCFE750BDF3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update12:*:*:*:*:*:*", + "matchCriteriaId": "3F331DEA-F3D0-4B13-AB1E-6FE39B2BB55D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update13:*:*:*:*:*:*", + "matchCriteriaId": "63D5CF84-4B0D-48AE-95D6-262AEA2FFDE8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update14:*:*:*:*:*:*", + "matchCriteriaId": "10616A3A-0C1C-474A-BD7D-A2A5BB870F74" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update15:*:*:*:*:*:*", + "matchCriteriaId": "D7DA523E-1D9B-45FD-94D9-D4F9F2B9296B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update16:*:*:*:*:*:*", + "matchCriteriaId": "151AFF8B-F05C-4D27-85FC-DF88E9C11BEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update17:*:*:*:*:*:*", + "matchCriteriaId": "53A0E245-2915-4DFF-AFB5-A12F5C435702" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update18:*:*:*:*:*:*", + "matchCriteriaId": "C5653D18-7534-48A3-819F-9F049A418F99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update2:*:*:*:*:*:*", + "matchCriteriaId": "D57C8681-AC68-47DF-A61E-B5C4B4A47663" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update3:*:*:*:*:*:*", + "matchCriteriaId": "75608383-B727-48D6-8FFA-D552A338A562" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update4:*:*:*:*:*:*", + "matchCriteriaId": "7773DB68-414A-4BA9-960F-52471A784379" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update5:*:*:*:*:*:*", + "matchCriteriaId": "B38B9E86-BCD5-4BCA-8FB7-EC55905184E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update6:*:*:*:*:*:*", + "matchCriteriaId": "5E7BAB80-8455-4570-A2A2-8F40469EE9CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update7:*:*:*:*:*:*", + "matchCriteriaId": "F9D645A2-E02D-4E82-A2BD-0A7DE5B8FBCC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update8:*:*:*:*:*:*", + "matchCriteriaId": "6E22D701-B038-4795-AA32-A18BC93C2B6F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update9:*:*:*:*:*:*", + "matchCriteriaId": "CAC4A0EC-C3FC-47D8-86CE-0E6A87A7F0B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:-:*:*:*:*:*:*", + "matchCriteriaId": "B02A37FE-5D31-4892-A3E6-156A8FE62D28" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update1:*:*:*:*:*:*", + "matchCriteriaId": "0AA3D302-CFEE-4DFD-AB92-F53C87721BFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update10:*:*:*:*:*:*", + "matchCriteriaId": "645D1B5F-2DAB-4AB8-A465-AC37FF494F95" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update11:*:*:*:*:*:*", + "matchCriteriaId": "ED6D8996-0770-4C9F-BEA5-87EA479D40A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update12:*:*:*:*:*:*", + "matchCriteriaId": "4836086E-3D4A-4A07-A372-382D385CB490" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update2:*:*:*:*:*:*", + "matchCriteriaId": "EB88D4FE-5496-4639-BAF2-9F29F24ABF29" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update3:*:*:*:*:*:*", + "matchCriteriaId": "43E0ED98-2C1F-40B8-AF60-FEB1D85619C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update4:*:*:*:*:*:*", + "matchCriteriaId": "76204873-C6E0-4202-8A03-0773270F1802" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update5:*:*:*:*:*:*", + "matchCriteriaId": "C1A22BE9-0D47-4BA8-8BDB-9B12D7A0F7C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update6:*:*:*:*:*:*", + "matchCriteriaId": "E3A83642-BF14-4C37-BD94-FA76AABE8ADC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update7:*:*:*:*:*:*", + "matchCriteriaId": "A892E1DC-F2C8-4F53-8580-A2D1BEED5A25" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update8:*:*:*:*:*:*", + "matchCriteriaId": "DB97ADBA-C1A9-4EE0-9509-68CB12358AE5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update9:*:*:*:*:*:*", + "matchCriteriaId": "E17C38F0-9B0F-4433-9CBD-6E3D63EA9BDC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2025:-:*:*:*:*:*:*", + "matchCriteriaId": "30779417-D4E5-4A01-BE0E-1CE1D134292A" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/coldfusion/apsb25-15.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-31xx/CVE-2025-3155.json b/CVE-2025/CVE-2025-31xx/CVE-2025-3155.json index 83db7cda6a2..88c7325b6e7 100644 --- a/CVE-2025/CVE-2025-31xx/CVE-2025-3155.json +++ b/CVE-2025/CVE-2025-31xx/CVE-2025-3155.json @@ -2,7 +2,7 @@ "id": "CVE-2025-3155", "sourceIdentifier": "secalert@redhat.com", "published": "2025-04-03T14:15:46.413", - "lastModified": "2025-05-05T10:15:19.070", + "lastModified": "2025-05-05T14:15:28.677", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -64,6 +64,14 @@ "url": "https://access.redhat.com/errata/RHSA-2025:4455", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:4456", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:4457", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2025-3155", "source": "secalert@redhat.com" diff --git a/CVE-2025/CVE-2025-35xx/CVE-2025-3583.json b/CVE-2025/CVE-2025-35xx/CVE-2025-3583.json index c91e3983c45..e321155d872 100644 --- a/CVE-2025/CVE-2025-35xx/CVE-2025-3583.json +++ b/CVE-2025/CVE-2025-35xx/CVE-2025-3583.json @@ -2,16 +2,43 @@ "id": "CVE-2025-3583", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-05T06:15:31.620", - "lastModified": "2025-05-05T06:15:31.620", + "lastModified": "2025-05-05T15:15:54.273", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Newsletter WordPress plugin before 8.7.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." + }, + { + "lang": "es", + "value": "El complemento Newsletter de WordPress anterior a la versi\u00f3n 8.7.1 no depura ni escapa de algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n de varios sitios)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 2.5 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/a6582e14-e21e-48e7-9b4c-0044fb199825/", diff --git a/CVE-2025/CVE-2025-39xx/CVE-2025-3928.json b/CVE-2025/CVE-2025-39xx/CVE-2025-3928.json index 54efb6c23f0..12536612481 100644 --- a/CVE-2025/CVE-2025-39xx/CVE-2025-3928.json +++ b/CVE-2025/CVE-2025-39xx/CVE-2025-3928.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3928", "sourceIdentifier": "9119a7d8-5eab-497f-8521-727c672e3725", "published": "2025-04-25T16:15:27.817", - "lastModified": "2025-05-02T14:15:28.413", - "vulnStatus": "Analyzed", + "lastModified": "2025-05-05T14:15:28.793", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -205,6 +205,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://www.bleepingcomputer.com/news/security/commvault-says-recent-breach-didnt-impact-customer-backup-data/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-42xx/CVE-2025-4215.json b/CVE-2025/CVE-2025-42xx/CVE-2025-4215.json index 5d5c0ec4605..1b3f4b41b68 100644 --- a/CVE-2025/CVE-2025-42xx/CVE-2025-4215.json +++ b/CVE-2025/CVE-2025-42xx/CVE-2025-4215.json @@ -2,13 +2,17 @@ "id": "CVE-2025-4215", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-02T21:15:23.893", - "lastModified": "2025-05-02T21:15:23.893", + "lastModified": "2025-05-05T15:15:55.017", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in gorhill uBlock Origin up to 1.63.3b16. It has been classified as problematic. Affected is the function currentStateChanged of the file src/js/1p-filters.js of the component UI. The manipulation leads to inefficient regular expression complexity. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 1.63.3b17 is able to address this issue. The patch is identified as eaedaf5b10d2f7857c6b77fbf7d4a80681d4d46c. It is recommended to upgrade the affected component." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en gorhill uBlock Origin hasta la versi\u00f3n 1.63.3b16. Se ha clasificado como problem\u00e1tica. La funci\u00f3n currentStateChanged del archivo src/js/1p-filters.js de la interfaz de usuario del componente se ve afectada. La manipulaci\u00f3n genera una complejidad ineficiente en las expresiones regulares. Es posible ejecutar el ataque de forma remota. Es un ataque de complejidad bastante alta. Parece dif\u00edcil de explotar. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Actualizar a la versi\u00f3n 1.63.3b17 soluciona este problema. El parche se identifica como eaedaf5b10d2f7857c6b77fbf7d4a80681d4d46c. Se recomienda actualizar el componente afectado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.562301", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/gorhill/uBlock/commit/eaedaf5b10d2f7857c6b77fbf7d4a80681d4d46c", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-42xx/CVE-2025-4218.json b/CVE-2025/CVE-2025-42xx/CVE-2025-4218.json index 6cabc5cd6e8..5b91a322109 100644 --- a/CVE-2025/CVE-2025-42xx/CVE-2025-4218.json +++ b/CVE-2025/CVE-2025-42xx/CVE-2025-4218.json @@ -2,13 +2,17 @@ "id": "CVE-2025-4218", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-02T21:15:24.057", - "lastModified": "2025-05-02T21:15:24.057", + "lastModified": "2025-05-05T15:15:55.140", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in handrew browserpilot up to 0.2.51. It has been declared as critical. Affected by this vulnerability is the function GPTSeleniumAgent of the file browserpilot/browserpilot/agents/gpt_selenium_agent.py. The manipulation of the argument instructions leads to code injection. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en la versi\u00f3n 0.2.51 de handrew browserpilot. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n GPTSeleniumAgent del archivo browserpilot/browserpilot/agents/gpt_selenium_agent.py. La manipulaci\u00f3n de las instrucciones de los argumentos provoca la inyecci\u00f3n de c\u00f3digo. El ataque debe abordarse localmente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.562383", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/handrew/browserpilot/issues/20", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-42xx/CVE-2025-4243.json b/CVE-2025/CVE-2025-42xx/CVE-2025-4243.json index 5651bb90722..e60a6b71165 100644 --- a/CVE-2025/CVE-2025-42xx/CVE-2025-4243.json +++ b/CVE-2025/CVE-2025-42xx/CVE-2025-4243.json @@ -2,13 +2,17 @@ "id": "CVE-2025-4243", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-03T19:15:49.027", - "lastModified": "2025-05-03T19:15:49.027", + "lastModified": "2025-05-05T15:15:55.317", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in code-projects Online Bus Reservation System 1.0. Affected by this issue is some unknown functionality of the file /print.php. The manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en code-projects Online Bus Reservation System 1.0. Este problema afecta a una funcionalidad desconocida del archivo /print.php. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.562690", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/zzZxby/Vulnerability-Exploration/blob/main/Online%20Bus%20Reservation%20System/Online%20Bus%20Reservation%20System1.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-42xx/CVE-2025-4244.json b/CVE-2025/CVE-2025-42xx/CVE-2025-4244.json index 1516803e9f5..ce8be425269 100644 --- a/CVE-2025/CVE-2025-42xx/CVE-2025-4244.json +++ b/CVE-2025/CVE-2025-42xx/CVE-2025-4244.json @@ -2,13 +2,17 @@ "id": "CVE-2025-4244", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-03T20:15:16.823", - "lastModified": "2025-05-03T20:15:16.823", + "lastModified": "2025-05-05T15:15:55.493", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in code-projects Online Bus Reservation System 1.0. This affects an unknown part of the file /seatlocation.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en code-projects Online Bus Reservation System 1.0. Esta afecta a una parte desconocida del archivo /seatlocation.php. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.562691", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/zzZxby/Vulnerability-Exploration/blob/main/Online%20Bus%20Reservation%20System/Online%20Bus%20Reservation%20System2.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-42xx/CVE-2025-4247.json b/CVE-2025/CVE-2025-42xx/CVE-2025-4247.json index 83f19d59468..8ffba8c9b4e 100644 --- a/CVE-2025/CVE-2025-42xx/CVE-2025-4247.json +++ b/CVE-2025/CVE-2025-42xx/CVE-2025-4247.json @@ -2,13 +2,17 @@ "id": "CVE-2025-4247", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-04T05:15:30.023", - "lastModified": "2025-05-04T05:15:30.023", + "lastModified": "2025-05-05T15:15:55.613", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in SourceCodester Simple To-Do List System 1.0. Affected is an unknown function of the file /delete_task.php. The manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en SourceCodester Simple To-Do List System 1.0. La vulnerabilidad afecta a una funci\u00f3n desconocida del archivo /delete_task.php. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://www.sourcecodester.com/", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/zonesec0/findcve/issues/8", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-42xx/CVE-2025-4248.json b/CVE-2025/CVE-2025-42xx/CVE-2025-4248.json index bb53b6b4a91..864275edd01 100644 --- a/CVE-2025/CVE-2025-42xx/CVE-2025-4248.json +++ b/CVE-2025/CVE-2025-42xx/CVE-2025-4248.json @@ -2,13 +2,17 @@ "id": "CVE-2025-4248", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-04T06:15:14.667", - "lastModified": "2025-05-04T06:15:14.667", + "lastModified": "2025-05-05T15:15:55.740", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in SourceCodester Simple To-Do List System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /complete_task.php. The manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en SourceCodester Simple To-Do List System 1.0, clasificada como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /complete_task.php. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://www.sourcecodester.com/", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/zonesec0/findcve/issues/9", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-42xx/CVE-2025-4256.json b/CVE-2025/CVE-2025-42xx/CVE-2025-4256.json index 102119f38ec..dc7cfc4f977 100644 --- a/CVE-2025/CVE-2025-42xx/CVE-2025-4256.json +++ b/CVE-2025/CVE-2025-42xx/CVE-2025-4256.json @@ -2,13 +2,17 @@ "id": "CVE-2025-4256", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-05T01:15:48.970", - "lastModified": "2025-05-05T01:15:48.970", + "lastModified": "2025-05-05T15:15:55.873", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic was found in SeaCMS 13.2. This vulnerability affects unknown code of the file /admin_paylog.php. The manipulation of the argument cstatus leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como problem\u00e1tica en SeaCMS 13.2. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /admin_paylog.php. La manipulaci\u00f3n del argumento cstatus provoca ataques de cross site scriptin. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.562718", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/seacms-net/CMS/issues/25", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-43xx/CVE-2025-4316.json b/CVE-2025/CVE-2025-43xx/CVE-2025-4316.json new file mode 100644 index 00000000000..1f0180f3720 --- /dev/null +++ b/CVE-2025/CVE-2025-43xx/CVE-2025-4316.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-4316", + "sourceIdentifier": "security@devolutions.net", + "published": "2025-05-05T14:15:29.930", + "lastModified": "2025-05-05T14:15:29.930", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper access control in PAM feature in Devolutions Server 2025.1.6.0 and earlier allows a PAM user to self approve their PAM requests even if disallowed by the configured policy via specific user interface actions." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@devolutions.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://devolutions.net/security/advisories/DEVO-2025-0007/", + "source": "security@devolutions.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-457xx/CVE-2025-45751.json b/CVE-2025/CVE-2025-457xx/CVE-2025-45751.json new file mode 100644 index 00000000000..4d264b1af48 --- /dev/null +++ b/CVE-2025/CVE-2025-457xx/CVE-2025-45751.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-45751", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-05-05T14:15:28.950", + "lastModified": "2025-05-05T14:15:28.950", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SourceCodester Web Based Pharmacy Product Management System 1.0 is vulnerable to Cross Site Scripting (XSS) in add-admin.php via the Fullname text field." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/sw8y/vulnerability_research/blob/main/CVE-2025-45751/CVE-2025-45751.md", + "source": "cve@mitre.org" + }, + { + "url": "https://www.sourcecodester.com/php/17883/web-based-product-alert-system.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-472xx/CVE-2025-47240.json b/CVE-2025/CVE-2025-472xx/CVE-2025-47240.json new file mode 100644 index 00000000000..5c0db1fb715 --- /dev/null +++ b/CVE-2025/CVE-2025-472xx/CVE-2025-47240.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2025-47240", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-05-05T15:15:54.553", + "lastModified": "2025-05-05T15:15:54.553", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-472xx/CVE-2025-47268.json b/CVE-2025/CVE-2025-472xx/CVE-2025-47268.json new file mode 100644 index 00000000000..fd23c3500c3 --- /dev/null +++ b/CVE-2025/CVE-2025-472xx/CVE-2025-47268.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-47268", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-05-05T14:15:29.063", + "lastModified": "2025-05-05T14:15:29.063", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "ping in iputils through 20240905 allows a denial of service (application error or incorrect data collection) via a crafted ICMP Echo Reply packet, because of a signed 64-bit integer overflow in timestamp multiplication." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Zephkek/ping-rtt-overflow/", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/iputils/iputils/issues/584", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Zephkek/ping-rtt-overflow/", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index c3b3279f906..d8dc800a027 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-05-05T14:00:20.750314+00:00 +2025-05-05T16:00:20.548223+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-05-05T13:15:49.620000+00:00 +2025-05-05T15:35:10.173000+00:00 ``` ### Last Data Feed Release @@ -33,41 +33,52 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -292495 +292503 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `8` -- [CVE-2025-2545](CVE-2025/CVE-2025-25xx/CVE-2025-2545.json) (`2025-05-05T12:15:16.170`) +- [CVE-2024-58098](CVE-2024/CVE-2024-580xx/CVE-2024-58098.json) (`2025-05-05T15:15:53.810`) +- [CVE-2024-58100](CVE-2024/CVE-2024-581xx/CVE-2024-58100.json) (`2025-05-05T15:15:53.913`) +- [CVE-2024-58237](CVE-2024/CVE-2024-582xx/CVE-2024-58237.json) (`2025-05-05T15:15:54.010`) +- [CVE-2025-28168](CVE-2025/CVE-2025-281xx/CVE-2025-28168.json) (`2025-05-05T14:15:28.500`) +- [CVE-2025-4316](CVE-2025/CVE-2025-43xx/CVE-2025-4316.json) (`2025-05-05T14:15:29.930`) +- [CVE-2025-45751](CVE-2025/CVE-2025-457xx/CVE-2025-45751.json) (`2025-05-05T14:15:28.950`) +- [CVE-2025-47240](CVE-2025/CVE-2025-472xx/CVE-2025-47240.json) (`2025-05-05T15:15:54.553`) +- [CVE-2025-47268](CVE-2025/CVE-2025-472xx/CVE-2025-47268.json) (`2025-05-05T14:15:29.063`) ### CVEs modified in the last Commit -Recently modified CVEs: `21` +Recently modified CVEs: `134` -- [CVE-2020-21427](CVE-2020/CVE-2020-214xx/CVE-2020-21427.json) (`2025-05-05T13:15:46.093`) -- [CVE-2020-22524](CVE-2020/CVE-2020-225xx/CVE-2020-22524.json) (`2025-05-05T13:15:46.810`) -- [CVE-2022-3708](CVE-2022/CVE-2022-37xx/CVE-2022-3708.json) (`2025-05-05T13:15:46.990`) -- [CVE-2022-42744](CVE-2022/CVE-2022-427xx/CVE-2022-42744.json) (`2025-05-05T13:15:47.187`) -- [CVE-2022-43061](CVE-2022/CVE-2022-430xx/CVE-2022-43061.json) (`2025-05-05T13:15:47.360`) -- [CVE-2022-43062](CVE-2022/CVE-2022-430xx/CVE-2022-43062.json) (`2025-05-05T13:15:47.507`) -- [CVE-2022-43063](CVE-2022/CVE-2022-430xx/CVE-2022-43063.json) (`2025-05-05T13:15:47.653`) -- [CVE-2022-43102](CVE-2022/CVE-2022-431xx/CVE-2022-43102.json) (`2025-05-05T13:15:47.797`) -- [CVE-2022-43103](CVE-2022/CVE-2022-431xx/CVE-2022-43103.json) (`2025-05-05T13:15:47.967`) -- [CVE-2022-43104](CVE-2022/CVE-2022-431xx/CVE-2022-43104.json) (`2025-05-05T13:15:48.237`) -- [CVE-2022-43105](CVE-2022/CVE-2022-431xx/CVE-2022-43105.json) (`2025-05-05T13:15:48.390`) -- [CVE-2022-43108](CVE-2022/CVE-2022-431xx/CVE-2022-43108.json) (`2025-05-05T13:15:48.533`) -- [CVE-2022-43109](CVE-2022/CVE-2022-431xx/CVE-2022-43109.json) (`2025-05-05T13:15:48.683`) -- [CVE-2022-43372](CVE-2022/CVE-2022-433xx/CVE-2022-43372.json) (`2025-05-05T13:15:48.853`) -- [CVE-2023-3720](CVE-2023/CVE-2023-37xx/CVE-2023-3720.json) (`2025-05-05T13:15:49.023`) -- [CVE-2025-3551](CVE-2025/CVE-2025-35xx/CVE-2025-3551.json) (`2025-05-05T12:15:16.923`) -- [CVE-2025-3552](CVE-2025/CVE-2025-35xx/CVE-2025-3552.json) (`2025-05-05T12:15:17.017`) -- [CVE-2025-4026](CVE-2025/CVE-2025-40xx/CVE-2025-4026.json) (`2025-05-05T13:15:49.440`) -- [CVE-2025-4226](CVE-2025/CVE-2025-42xx/CVE-2025-4226.json) (`2025-05-05T13:15:49.620`) -- [CVE-2025-4272](CVE-2025/CVE-2025-42xx/CVE-2025-4272.json) (`2025-05-05T11:15:45.593`) -- [CVE-2025-46337](CVE-2025/CVE-2025-463xx/CVE-2025-46337.json) (`2025-05-05T13:15:49.323`) +- [CVE-2024-25848](CVE-2024/CVE-2024-258xx/CVE-2024-25848.json) (`2025-05-05T15:02:57.030`) +- [CVE-2024-25849](CVE-2024/CVE-2024-258xx/CVE-2024-25849.json) (`2025-05-05T15:06:24.170`) +- [CVE-2024-27515](CVE-2024/CVE-2024-275xx/CVE-2024-27515.json) (`2025-05-05T14:54:48.797`) +- [CVE-2024-38882](CVE-2024/CVE-2024-388xx/CVE-2024-38882.json) (`2025-05-05T15:07:13.760`) +- [CVE-2025-0405](CVE-2025/CVE-2025-04xx/CVE-2025-0405.json) (`2025-05-05T15:20:47.620`) +- [CVE-2025-0406](CVE-2025/CVE-2025-04xx/CVE-2025-0406.json) (`2025-05-05T15:20:54.380`) +- [CVE-2025-0407](CVE-2025/CVE-2025-04xx/CVE-2025-0407.json) (`2025-05-05T15:21:03.203`) +- [CVE-2025-0408](CVE-2025/CVE-2025-04xx/CVE-2025-0408.json) (`2025-05-05T15:21:05.883`) +- [CVE-2025-0409](CVE-2025/CVE-2025-04xx/CVE-2025-0409.json) (`2025-05-05T15:21:08.160`) +- [CVE-2025-0410](CVE-2025/CVE-2025-04xx/CVE-2025-0410.json) (`2025-05-05T15:21:10.997`) +- [CVE-2025-0488](CVE-2025/CVE-2025-04xx/CVE-2025-0488.json) (`2025-05-05T15:19:19.220`) +- [CVE-2025-0489](CVE-2025/CVE-2025-04xx/CVE-2025-0489.json) (`2025-05-05T15:19:28.840`) +- [CVE-2025-0490](CVE-2025/CVE-2025-04xx/CVE-2025-0490.json) (`2025-05-05T15:19:37.540`) +- [CVE-2025-27007](CVE-2025/CVE-2025-270xx/CVE-2025-27007.json) (`2025-05-05T14:15:28.397`) +- [CVE-2025-30290](CVE-2025/CVE-2025-302xx/CVE-2025-30290.json) (`2025-05-05T15:35:10.173`) +- [CVE-2025-3155](CVE-2025/CVE-2025-31xx/CVE-2025-3155.json) (`2025-05-05T14:15:28.677`) +- [CVE-2025-3583](CVE-2025/CVE-2025-35xx/CVE-2025-3583.json) (`2025-05-05T15:15:54.273`) +- [CVE-2025-3928](CVE-2025/CVE-2025-39xx/CVE-2025-3928.json) (`2025-05-05T14:15:28.793`) +- [CVE-2025-4215](CVE-2025/CVE-2025-42xx/CVE-2025-4215.json) (`2025-05-05T15:15:55.017`) +- [CVE-2025-4218](CVE-2025/CVE-2025-42xx/CVE-2025-4218.json) (`2025-05-05T15:15:55.140`) +- [CVE-2025-4243](CVE-2025/CVE-2025-42xx/CVE-2025-4243.json) (`2025-05-05T15:15:55.317`) +- [CVE-2025-4244](CVE-2025/CVE-2025-42xx/CVE-2025-4244.json) (`2025-05-05T15:15:55.493`) +- [CVE-2025-4247](CVE-2025/CVE-2025-42xx/CVE-2025-4247.json) (`2025-05-05T15:15:55.613`) +- [CVE-2025-4248](CVE-2025/CVE-2025-42xx/CVE-2025-4248.json) (`2025-05-05T15:15:55.740`) +- [CVE-2025-4256](CVE-2025/CVE-2025-42xx/CVE-2025-4256.json) (`2025-05-05T15:15:55.873`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 07b63ad8a51..c2fbcc1fea9 100644 --- a/_state.csv +++ b/_state.csv @@ -83298,7 +83298,7 @@ CVE-2016-1000282,0,0,80557be177d6e8e40fbed2f2f2e57bb77ee756a5dd2bdcde261698b2a84 CVE-2016-10003,0,0,347fb2ace81d0f85d5a0d8e4f5b0e6b2ace3e4cb815c0289b598466dbca88c97,2025-04-20T01:37:25.860000 CVE-2016-1000306,0,0,58929e18d7a88d76b38c9344afa685c5dfce19e3aaa94be62e69e6459dd884bf,2023-11-07T02:29:26.900000 CVE-2016-1000307,0,0,c420e05656a485dd0d1a41203c39aea40e002de6bd9bac8bcc1a35ff6073973d,2025-04-20T01:37:25.860000 -CVE-2016-1000338,0,0,8b42a1fa4a3fd538815b29563b97a96896f4444ee1c5611e8f9cdc3ead2676e6,2024-11-21T02:43:02.427000 +CVE-2016-1000338,0,1,44a95f9620e5c572a8a60c5b70848cf6081982a35e53d63261d352e134f7c33d,2025-05-05T14:14:28.567000 CVE-2016-1000339,0,0,1167a54323c1bc06607dd25e61a81bc123d187ccd40ec9a0e27f929d382d1a23,2024-11-21T02:43:02.630000 CVE-2016-1000340,0,0,b3f76354c3ef5ca6ec66e93214bd2c403247366372d2997a5cd0a7f961036eda,2024-11-21T02:43:02.803000 CVE-2016-1000341,0,0,d1d106897ada92968f10091a9eb862bd6fe4fead5a8f90b6957248a56edaad6e,2024-11-21T02:43:02.957000 @@ -120508,7 +120508,7 @@ CVE-2018-20835,0,0,71b3b1ff002bc39cf1c66f035e7000714d87e6455dd02335610a0168b1774 CVE-2018-20836,0,0,599bbd685ae09520aa8bc7c005764c85d88aea1471a36784763747f7608c878d,2024-11-21T04:02:16.550000 CVE-2018-20837,0,0,e91d6bc9dc58b0d9ffc8f6c85189b07c118dd306e265d0db70bb93865e322fb6,2024-11-21T04:02:16.740000 CVE-2018-20838,0,0,d5d753bdba79e2baf72ebb74ba47a6d521dc6cece14b3d9a4972259edf3c1d75,2024-11-21T04:02:16.890000 -CVE-2018-20839,0,0,fe817f0b4d825739c4ea27d8d2e4182de7499e5d1f175a7790ba6da9874d0be6,2024-11-21T04:02:17.040000 +CVE-2018-20839,0,1,fded315977793f76a43acf2c90f1e041594472f8022653ee128a0aa2d34e5ae2,2025-05-05T14:14:36.570000 CVE-2018-2084,0,0,0020cad952c12f021fb73c3b3288bc335919aeabb96cd67ba3037418d26b7da3,2023-11-07T02:56:47.930000 CVE-2018-20840,0,0,d5765facca17e9a0fdb2a6179a43f85026a5ea5a1452bd91fda1a09963a875f1,2024-11-21T04:02:17.197000 CVE-2018-20841,0,0,dde1de892991d602fea5e000afa95c4a251b21ff5059d2338a4327cfe3a65062,2024-11-21T04:02:17.343000 @@ -124146,8 +124146,8 @@ CVE-2018-5725,0,0,79822325c5a821de89aa81ac16682cbe9adf34cb9b9dc0b60332dbe90b0a46 CVE-2018-5726,0,0,9888f90ad7a5ba433f59922ae646282d1590adfa56cbac417170dd7df0fe8e11,2024-11-21T04:09:15.433000 CVE-2018-5727,0,0,0400648395347771cf2bba52a2ff23ab71d95d886eb1334483df8d7adb46aa80,2024-11-21T04:09:15.590000 CVE-2018-5728,0,0,eee0e1be9a3ace058ab286f15d1a895507a11b0ef98644663c15b7537728af59,2024-11-21T04:09:15.743000 -CVE-2018-5729,0,0,89a6eb17554daabd3bb7a8eacd33c665dd567d75f838e3f223e1465173be65eb,2024-11-21T04:09:15.897000 -CVE-2018-5730,0,0,10b626fe2ee5a00b32d8635c22466cb915d7c556b29d2ca6a67164ae9d497c32,2024-11-21T04:09:16.103000 +CVE-2018-5729,0,1,5a7b4a3557800fadf803de08d818e210a9f5f5e6cffc7a82032506cc4e01b8ad,2025-05-05T14:14:33.487000 +CVE-2018-5730,0,1,f9a2c4c4b297a42f58030504b97ca10a359a18276925f8cf5a8d6d1da593bf66,2025-05-05T14:12:56.457000 CVE-2018-5731,0,0,6877f354fedffb653d2353bd571c83b5162c21179ef85ea1383d9393cc6806c3,2024-11-21T04:09:16.290000 CVE-2018-5732,0,0,2abf4ff44118f8fb9993587e1d43620beb7fcf3f20e463c34e9bef8700c9c6c4,2024-11-21T04:09:16.440000 CVE-2018-5733,0,0,ebbaf69b64891cd0848f99ab0e97aa6cdecac2ad3ea42caecce14d5b5c4cbddc,2025-04-25T23:15:15.590000 @@ -136342,7 +136342,7 @@ CVE-2019-19060,0,0,d738aaad4f4b77e0f81a7ac05b7d1cd3264beddd4ccd121d1816b5cd5dae0 CVE-2019-19061,0,0,f726ff0ffe8d7a7031615ef88568fa372712e05b830d80e3e0b9bbf8d2c6835f,2024-11-21T04:34:06.290000 CVE-2019-19062,0,0,2cc525dc40b384ac52287da50b289d6083de7a5d24f55a6c572966970a320830,2024-11-21T04:34:06.457000 CVE-2019-19063,0,0,dd9f7fef5aaa480bbd9af8e7e3cc904ddf9b9c161b7da5d6e7a90defd8c8febb,2024-11-21T04:34:06.637000 -CVE-2019-19064,0,0,9c1ea68e248b182c71e74868de60664e5bae2d23d779143f67c6274cdf55be3a,2024-11-21T04:34:06.830000 +CVE-2019-19064,0,1,0a66ee22c50ea68f8644334c63b5cec61ec1d1b73555d5c01a03805ba1c890dd,2025-05-05T14:12:50.043000 CVE-2019-19065,0,0,d2170bbedba2ed59c8401426279498fd185fae12f387c72fd1346575f8b8a582,2024-11-21T04:34:06.993000 CVE-2019-19066,0,0,05b0e9001c200a682f2f1fc0bcc7e5d90897f78f4bbcf8f059c01ec15967813d,2024-11-21T04:34:07.157000 CVE-2019-19067,0,0,deb1a3163424a7c8264270fe15e3485709cb60eea77a9876a0c3550d19902282,2024-11-21T04:34:07.317000 @@ -139370,7 +139370,7 @@ CVE-2019-3817,0,0,592b35c353dd2114f26453cc560be5ec71314ec22e34ec818e406cae432df9 CVE-2019-3818,0,0,2c72062f34152025a7d1b75c2c5ab47453d3c3f5f831af1f21d2c412b82153d9,2024-11-21T04:42:36.370000 CVE-2019-3819,0,0,65d645bf308a1337721532e9edda6777a1876d494b03e0e70d4809c4f105ad63,2024-11-21T04:42:36.500000 CVE-2019-3820,0,0,4866d90338e521274bcae1e9946a2798879a88211c029e3992d6674aeecca5e8,2024-11-21T04:42:36.647000 -CVE-2019-3821,0,0,e9cbc971fc3b8054c52ed5a919ee71f6f22c7c6c6acb396cd0c957514320ae56,2024-11-21T04:42:36.780000 +CVE-2019-3821,0,1,649ef5fddbf349f3008ad447c9097032b729cfcf316a5f93575c61e61ee70656,2025-05-05T14:12:51.990000 CVE-2019-3822,0,0,7aa1d839ca2689d192c1504e68742211716bdd2f91bfcf445449fbad6385d41f,2024-11-21T04:42:36.923000 CVE-2019-3823,0,0,a6db19cf00d3ed51437a9fd5cd25eb1f3fcac889bbf6dad68c70c9d07c4ff74b,2024-11-21T04:42:37.110000 CVE-2019-3824,0,0,2474b45a27d07d91a71add860ea28e2acf277015d171c60215fd928a9a63c6fe,2024-11-21T04:42:37.283000 @@ -147273,7 +147273,7 @@ CVE-2020-12063,0,0,3927d1609f32771f4d98fcb7a9068645d3afb9729416544105554e064334a CVE-2020-12066,0,0,895951bef26856a4ddc9e9d5ec525999243aa1a62e9c36afbb44c5a0c7f2e18c,2024-11-21T04:59:12.393000 CVE-2020-12067,0,0,e7632a86215c3ff7ad44c8459a3ea305227763b8380894bc00b9635614471727,2025-04-14T17:15:23.763000 CVE-2020-12068,0,0,ae1ee6148620821fd5671e92fdfb25e86ed80548ad6c3f471284d6788880683a,2024-11-21T04:59:12.677000 -CVE-2020-12069,0,0,fd4e0dccd60de0fc0ca027582b0d93f86e52c5208959b0ebe7d18370e8607af8,2024-11-21T04:59:12.810000 +CVE-2020-12069,0,1,f241a81658f1e9e19b556969cf888738226deadc847913c743ae582079814384,2025-05-05T14:15:00.537000 CVE-2020-1207,0,0,a37aa041765dfb864723114083edcb2cb2c48dac881e24c30c597a5d43453854,2024-11-21T05:09:58.773000 CVE-2020-12070,0,0,d4c5cd5451bed1f9df244d29add8e84bf9ead67c94c679344ca9ec6ece7aab92,2024-11-21T04:59:12.997000 CVE-2020-12071,0,0,0536a9ca084f693a74284a34719ed9118698b6cbb83b4e7c89e344439c31ad6f,2024-11-21T04:59:13.130000 @@ -153144,7 +153144,7 @@ CVE-2020-21406,0,0,ee0885dc1f9dbec0d5d7225eb6da0f0a8363f9ca6205e02a9aa9a154fc0f4 CVE-2020-2141,0,0,a2ce4cfc8d83ff00e23f6c9719e321d7030412979b37981a1f5edd97ebc24719,2024-11-21T05:24:46.277000 CVE-2020-2142,0,0,71f181a129cb616d1901f9a82a7a971c490c947ba679c3a6e7fd5a99b8834b24,2024-11-21T05:24:46.440000 CVE-2020-21426,0,0,5af3493a9678386c3c7f016df5d70aa675f49e259e61782d7dc31134ff6bee2a,2024-11-21T05:12:34.370000 -CVE-2020-21427,0,1,26319f4d1a2a455ac044eb7cac937a1878eee328736652f72602fb0ddc8cf74e,2025-05-05T13:15:46.093000 +CVE-2020-21427,0,0,26319f4d1a2a455ac044eb7cac937a1878eee328736652f72602fb0ddc8cf74e,2025-05-05T13:15:46.093000 CVE-2020-21428,0,0,17470f14cac87f1a279eea106c6b7f3916fe0d59a8386ccc9e2d6d3ca4ba9874,2025-05-02T16:15:21.390000 CVE-2020-2143,0,0,cd6ac2294470db52cc3e9f73e6f3a22c99ccedb6c610adf51813cd4e51fde8ad,2024-11-21T05:24:46.623000 CVE-2020-21431,0,0,86d6763191a50d165cbdc60694040bd2bb2a8475944c289c8b1af0175a08fb8a,2024-11-21T05:12:34.827000 @@ -153550,7 +153550,7 @@ CVE-2020-2249,0,0,4edfa71e90f435a167a7837b1e7cb70ca254dc7affb5d4501517a5af33d289 CVE-2020-2250,0,0,8fecfe16c18e019bb9ccc77ec8413bba398702572999c9dabbfed3fb222e371f,2024-11-21T05:25:05.533000 CVE-2020-2251,0,0,793da98e6b49fc2a7c07abc5d925b6e15f7859acc722c50fa952b89631416de2,2024-11-21T05:25:05.717000 CVE-2020-2252,0,0,4cac5e9a08917ce061b1e4187c59e5f1aed52d9bf2226b2f260177efcf913743,2024-11-21T05:25:05.903000 -CVE-2020-22524,0,1,7e7767a030b52e1b16a4e042818e68c374e6a193668c0304bb7d616e97edfbe6,2025-05-05T13:15:46.810000 +CVE-2020-22524,0,0,7e7767a030b52e1b16a4e042818e68c374e6a193668c0304bb7d616e97edfbe6,2025-05-05T13:15:46.810000 CVE-2020-2253,0,0,00869bb39e076c4b2f8c3eba9732bf5299c54a978fdaecc7a4730785397719b7,2024-11-21T05:25:06.083000 CVE-2020-22533,0,0,9774504a2f230edded7f185bcd7c68f187d92b0742eff44f49c68adc14ba5292,2025-02-13T17:15:26.140000 CVE-2020-22535,0,0,72caa11a025607600e8592f64218fefa13fca4d00f882be47bc8422e598c2c2d,2024-11-21T05:13:17.740000 @@ -153575,7 +153575,7 @@ CVE-2020-22612,0,0,2c6bab4f525b1776cd9261fd3f340dadf1dab0378d3dbd64c11e92ebb5b94 CVE-2020-22617,0,0,eb26e6e1755645cfd54c81b9b982f9e722567f65e85f38191f5dc02089c6cb39,2024-11-21T05:13:19.450000 CVE-2020-2262,0,0,95a1201ba0fca9e36452bf9e0328a484cc5221f9e6088fb49c65aa8cf852bf8a,2024-11-21T05:25:07.810000 CVE-2020-22623,0,0,44249f87cfaea27ef10302e5dcfed045bf111bee105acc194d2fec6b4a26bbe8,2024-11-21T05:13:19.607000 -CVE-2020-22628,0,0,30702c73e90dcb2c316b36e4d043900f5dceec86145d176e8d392321e78408a6,2024-11-21T05:13:19.760000 +CVE-2020-22628,0,1,88123f069076aa3cc85324ca4110069d5ca8e3f683ed2fe801d842c150ba31a3,2025-05-05T14:12:26.610000 CVE-2020-2263,0,0,f56cf4396983f7dcc1c9d0f7ad4f5e1696838b5469a0df0274ab52e17841e471,2024-11-21T05:25:08.020000 CVE-2020-2264,0,0,049ff1acc8cfe50763bbb01d83d59fd752ee7e34a024aac5b31e2b8bafb4cde9,2024-11-21T05:25:08.237000 CVE-2020-22643,0,0,af6ae3058a1cebe2453fc6bc2d999778141cf8a6880f41e397270f387263b691,2024-11-21T05:13:19.910000 @@ -153636,10 +153636,10 @@ CVE-2020-22807,0,0,76307fe591e46b8d1ec0d4b6b5c99eaa950f119547e4e490d9e7fa44911e3 CVE-2020-22808,0,0,56ab15d58fbb81255c70a87784ce68ad6a273ba425733afb3f1dbe29f132ddf3,2024-11-21T05:13:25.530000 CVE-2020-22809,0,0,07116db0835fa4f38450ab9d16b57fc1eab7f18d97b8549b7d97d1058ce2bfed,2024-11-21T05:13:25.670000 CVE-2020-2281,0,0,9c75e3538dcc0b6329d19eab726374f0c5385c809a6cd6a68bcac647e9897a87,2024-11-21T05:25:11.487000 -CVE-2020-22818,0,0,f1a0df0a1572be96a4073271c5fb4b3a991eb61f26eda52d5f39529528a448a3,2024-11-21T05:13:25.813000 -CVE-2020-22819,0,0,2e313aef2cad5b96a58c63dc113f5bc40da58d37f2557dee0b29f3244d640abb,2024-11-21T05:13:25.963000 +CVE-2020-22818,0,1,bc8552b7faa50b6667f3e82c87528f4adcdc3a20a2ba6e0efbcab46227fd0cfb,2025-05-05T14:15:21.177000 +CVE-2020-22819,0,1,d29a3550387c93df2932060c4e72ca28273ddad516396be4fcef0550e1f9094a,2025-05-05T14:15:21.420000 CVE-2020-2282,0,0,eaf4b20c2f6da543ba2a459abdd501f57acab488f5f280e48f06b49860332557,2024-11-21T05:25:11.673000 -CVE-2020-22820,0,0,865ce48b1dd14a345d762b934cb9179503cc2d4d1a7233dc43f57572391e80a2,2024-11-21T05:13:26.100000 +CVE-2020-22820,0,1,229a7661118e7ef62f90efe8b9fc93dde2cecf6c13fb5cdf82a7ba61bfda378f,2025-05-05T14:15:21.610000 CVE-2020-2283,0,0,ee5121732d8107daaca0d348844e05de66a7a1c500e781f867f1c08b0a8ee85d,2024-11-21T05:25:11.863000 CVE-2020-22839,0,0,18c124f1b7ae75e4f70aca7c3845c21bbe9fc0f94de77294cae19c9bfd3b191e,2024-11-21T05:13:26.237000 CVE-2020-2284,0,0,82d7436c601405f10b6c46c325dba0ebb3ea902cb276346288d51ce5c12a65e7,2024-11-21T05:25:12.047000 @@ -154200,7 +154200,7 @@ CVE-2020-24366,0,0,762eb98e709d3f0bfa901baa094ed931c6e7f45e460bf1c695d1a76a8abe0 CVE-2020-24367,0,0,c61d88dc3cef09e4a47c78293e141938d02a07f117a8b5f8330365e53e84f514,2024-11-21T05:14:40.640000 CVE-2020-24368,0,0,0058d2336417b6c4f45c140e59ef139889212b47f698112b5562ad57145a6078,2024-11-21T05:14:40.790000 CVE-2020-24369,0,0,bec4416bf14ed7160ccc104bd43cd8923dce20a7695f01a882929c3bcb5cb5af,2024-11-21T05:14:40.963000 -CVE-2020-24370,0,0,10664e0286fefa74ea1ec29fa3c22e379283cf9ec27a33371755755ab1db33c1,2024-11-21T05:14:41.110000 +CVE-2020-24370,0,1,69f2ee8e92405cd31fd58e9f53b3f1df50e4f3658966623e263462ab98f1247f,2025-05-05T14:12:47.407000 CVE-2020-24371,0,0,ec9e85a8d1c4261b368f846b674fddb4e545549e39481fa0626e765b72631c55,2024-11-21T05:14:41.293000 CVE-2020-24372,0,0,44558c0f20227fd65f241600befedf161e8bcaec0afca0e61dfc8f23d55fc47e,2024-11-21T05:14:41.440000 CVE-2020-24373,0,0,79a5a7064c4d389d68707b6c6baecd24cf4cf026fb0f1d231ee55331f31ac928,2024-11-21T05:14:41.583000 @@ -166857,7 +166857,7 @@ CVE-2021-2019,0,0,28766b5dfedce9e375a169a1701aae9f3437b3d0b300453fe8c75b1ceb4bcb CVE-2021-20190,0,0,0a0d6499f55f7969e14e727ac1a5576efd662e675213d72392673a1d8e281153,2024-11-21T05:46:05.973000 CVE-2021-20191,0,0,bf5fb25f940b5ed55d9fdc882341485aa9eb38684a572419f8a0306bff592e08,2024-11-21T05:46:06.130000 CVE-2021-20192,0,0,3dd8be816a8dc6c137adf1504c8646a23863e79bd887c70954eb2bc7f2280695,2023-11-07T03:28:59.460000 -CVE-2021-20193,0,0,2d1e186528d422e8c1c7ba1f902824acd007778b5a8aa06f71cc2ea31f29c623,2024-11-21T05:46:06.267000 +CVE-2021-20193,0,1,c098470a5bdd224dd9353006ad3bed0dfdf5e9a3e48f8c2a4a97a1813e6d9eec,2025-05-05T14:15:04.557000 CVE-2021-20194,0,0,6cebac4d3ec388a7912762ab98f9d757f05504fa8287a1a81cc4264ba84146f9,2024-11-21T05:46:06.407000 CVE-2021-20195,0,0,cac9cfdf2e5527995daee31f9d8331d3f04ca616367980f995b8b42faf5d4f15,2024-11-21T05:46:06.527000 CVE-2021-20196,0,0,fc6f1ac3fc5e7cb8be6fc8239c0013b7fb0117fbac2af839e70bcead7eae3900,2024-11-21T05:46:06.653000 @@ -173963,7 +173963,7 @@ CVE-2021-29094,0,0,25c93b1929872e4da82e1bfe85ed93e091de37cd26fb7eb1b89f9eb8f3944 CVE-2021-29095,0,0,a14ae4a63d0bebd639a1508e7bf0d9b087d4084607b3b5bfcc0ec29664d0523d,2024-11-21T06:00:42.303000 CVE-2021-29096,0,0,5a806de58066ce5b6d3871c0ee0d510407cb7189725ba3b5a4c30fc312cd1c62,2024-11-21T06:00:42.430000 CVE-2021-29097,0,0,931fc6136415782919fc9b9ca60ac9226f452a06e13fc2712e7741ef4bef4441,2024-11-21T06:00:42.570000 -CVE-2021-29098,0,0,d1cce3eb5cb827416929ec2f6e22200352dfdf7ab7f8f1090d94b946be622025,2024-11-21T06:00:42.740000 +CVE-2021-29098,0,1,bed0385929cf02a562f7e9c66590030cdcbaad1e743371addfea7c8edfc0b72f,2025-05-05T14:12:43.760000 CVE-2021-29099,0,0,77554a6e7aa33cb43b684c45486110ff7029359c9a8165e39d26db6a03f809a0,2024-11-21T06:00:42.883000 CVE-2021-29100,0,0,b7b8e4516a24e07263ad6e28d7ce4fff354ef94cde333130230efea3e5791e05,2024-11-21T06:00:43.017000 CVE-2021-29101,0,0,afb42ee19407cd96a399bdf5f511896e39e485c3a2737fe7e6808deab6570d63,2024-11-21T06:00:43.160000 @@ -180531,7 +180531,7 @@ CVE-2021-37808,0,0,082ece71e98dbb4e7685d7e572a6e4ac8fd7bd0c35a007ffd1e5305415a85 CVE-2021-3781,0,0,6fba4888be3393336adb3144b7404f65c309783cde145e32de9da11cee56ca78,2024-11-21T06:22:24.880000 CVE-2021-37819,0,0,a14bdc08322a4d450813356594e0ce81796837d77251d8861c803a848fbf5294,2024-11-21T06:15:56.140000 CVE-2021-3782,0,0,96c88a500b7d9b27319acbaa8d74e9759d8b758144a8641f2bbd6b0021daa246,2024-11-21T06:22:25.027000 -CVE-2021-37823,0,0,5af544a8631c022eb1b528e1672579a4e8f59d1dcfd1fc7767606e42cd0e393f,2024-11-21T06:15:56.327000 +CVE-2021-37823,0,1,fab311305c76387e41d84e0eccc7e7941af85f4cc16c781b1978437265215210,2025-05-05T14:15:21.957000 CVE-2021-3783,0,0,32bfa769a37fa5390f63161101496066e6a95fd6b010eb8f0b42357c62eb5f5a,2024-11-21T06:22:25.167000 CVE-2021-37832,0,0,9055f51b8e5c3481ee6cef05809ef98881c94c8774f946409e4e38b7c4055c52,2024-11-21T06:15:56.507000 CVE-2021-37833,0,0,0e151068d7e21a150165f9dfce2015375c8bad872efd826614f9d14dbc47651f,2024-11-21T06:15:56.683000 @@ -180766,7 +180766,7 @@ CVE-2021-38156,0,0,c624e5b7a95ec5e7e11f258bb3442fc075e4180a3b2a304dbf3acedf7c7f2 CVE-2021-38157,0,0,17b468e618c91fad68f40ae9cddb0a6ea9553853ee67cce593231857868faa94,2024-11-21T06:16:30.893000 CVE-2021-38159,0,0,e4ab08aa747b7551a1c7dd057e351869b37515ead4a98d85d417f15077c8bdcb,2024-11-21T06:16:31.097000 CVE-2021-3816,0,0,4aa36dc92c706b88ad115c870e69b85d034b2cb701ed3a91f046fb32775392f8,2024-11-21T06:22:31.437000 -CVE-2021-38160,0,0,4561b58be9109be3c4eb29bef848540b901f6ee3513d9dbcdcf8aa69851f0e42,2024-11-21T06:16:31.280000 +CVE-2021-38160,0,1,c7ee8981daf47becc9e163fd4b24768a12e09a8c0012c12a346752e2ffceabd2,2025-05-05T14:12:40.937000 CVE-2021-38161,0,0,4258bd9e342f7c3b063d35f9d22635b85b6cc1ace79f771d6c8b8da7946a7fdb,2024-11-21T06:16:31.513000 CVE-2021-38162,0,0,ebe13498ed07b80b251296b072b427308c701e75a872df97c306a9de7d4dadaa,2024-11-21T06:16:31.677000 CVE-2021-38163,0,0,2e129aa82515fea9adbf2f5be33a936663f47da17385e177f18868f2d3be5948,2025-03-13T16:36:14.333000 @@ -187181,7 +187181,7 @@ CVE-2021-46849,0,0,a97d57b4204bee81571b4ff511b6cf0635636682ed66ca0aaf655b45e9697 CVE-2021-46850,0,0,339e2218d9385bb8f484d75e92ee069238e5447c4fd66213965f33441c51461c,2024-11-21T06:34:48.320000 CVE-2021-46851,0,0,db93105c2abc96ff46e7b2433c702319424ab2184b1c8dbd38856e1bb3e4c421,2025-05-01T18:15:46.887000 CVE-2021-46852,0,0,1b557e2f1ba4a1ee740097cc858f101ff808404ffce2b7b1ddfbfe2fc6d631f7,2025-05-01T18:15:47.070000 -CVE-2021-46853,0,0,584321f4125de6f26f178a9a570f2fec5891c881a8434007af451daed8523276,2024-11-21T06:34:48.690000 +CVE-2021-46853,0,1,6e9ba8277b503958a03876d93a4360a74c5ed9d038a096e6877cc4e17e71b8ea,2025-05-05T14:15:22.167000 CVE-2021-46854,0,0,9d0a49c1cc48ed7831e6513caf4aece9da7dca8fd5735fbe0dbb67ccd6c9d4f3,2025-04-28T21:15:55.927000 CVE-2021-46856,0,0,c343aae2884d63668d219012a270463847beb43cfdd8c1d8b51289c303bc1723,2025-04-17T14:15:19.187000 CVE-2021-46867,0,0,3b9245057f38ad51f062cc7f44b94fdcabd578b0de99fa150e2281c87b7e1c46,2025-04-10T14:15:20.953000 @@ -189151,7 +189151,7 @@ CVE-2022-1267,0,0,685937d46fe8fc36f93822774c505754a05e41482acaf9d41f386abfdf83d6 CVE-2022-1268,0,0,997c98d744203f2f7d48a8aa3d133349e67aea93f73428c6eee499f30fd272e0,2024-11-21T06:40:22.667000 CVE-2022-1269,0,0,5d4548d0624bfdcc2c580a2e1005b48c5da1d60cafdbc0a4348dc566fe222b98,2024-11-21T06:40:22.780000 CVE-2022-1270,0,0,63d228e89a77445fc65780dc39daff81fa5e58b3c221ec79ffee5d58a785ef73,2024-11-21T06:40:22.903000 -CVE-2022-1271,0,0,7c4c069fe205cc70e97bcd013a755ce6e04db60f699fdbcbf5314963fc7b424a,2024-11-21T06:40:23.040000 +CVE-2022-1271,0,1,0520cc772eb21539b0d472889f76cbc069702ebcf7f6f21a0cae614116ec6e83,2025-05-05T14:12:33.207000 CVE-2022-1273,0,0,270b7010113b82bf7ab089af2f6cae3b9118181dd514b4d77892e79b91fe5251,2024-11-21T06:40:23.207000 CVE-2022-1274,0,0,079fbce78f728303f12019f1d9d6658cdd6566d5e11c862ae6c7a104401ea957,2024-11-21T06:40:23.330000 CVE-2022-1275,0,0,6a94ffc22400b952e65d00d8e4ec345d29221956f0e1d0a565522c0900913580,2024-11-21T06:40:23.477000 @@ -192235,7 +192235,7 @@ CVE-2022-22417,0,0,74a54acbae43abaf5fede7b4138de94b87896ea53ae388c5b20cb48e36dc8 CVE-2022-2242,0,0,ed1879f6cacc392e1dc18bf78f61fe7494519d84ce72677d4bffa06f466a059b,2024-11-21T07:00:36.480000 CVE-2022-22423,0,0,584f96e1a426da10d4ed90fd73fe3d24f327f65e6da7e1f959d614fd628fdde2,2024-11-21T06:46:46.917000 CVE-2022-22424,0,0,eabc30bdac1436eca85480759f1492cf208ba9a980562f0fc0ecbe57a6e735e3,2024-11-21T06:46:47.047000 -CVE-2022-22425,0,0,388eff417332072aa6ab8a42ac810c5ba43583ad92acf538edb4bf8d485a46d7,2024-11-21T06:46:47.177000 +CVE-2022-22425,0,1,afa95609853b9a6f6c0174e3cc23565f35bf3e755c8c769d850d1f5ddb8f19b4,2025-05-05T14:15:22.430000 CVE-2022-22426,0,0,f8d584acfef698de09f000a3053c9f649869d5fc148e50891004f43e521a423a,2024-11-21T06:46:47.290000 CVE-2022-22427,0,0,664d70bee4a9f76b57b02dff4e8c689af14f9cac9bf7ebbf82ff815ebb81c4e3,2024-11-21T06:46:47.420000 CVE-2022-2243,0,0,ec371a34d8f6313a25a4607fc057011cc0c99e21cbba39ab00f5cc9f1e66642a,2024-11-21T07:00:36.590000 @@ -192245,7 +192245,7 @@ CVE-2022-22435,0,0,82536a6ab8aee7ae79b9de47cf86c66bfc39e099752c335e5649c954dfb69 CVE-2022-22436,0,0,75e57d1bc3d55bde8e4138dde96c03a8724f2da1bb1faefd445be77f04ffc2a8,2024-11-21T06:46:47.927000 CVE-2022-2244,0,0,ecea15fa9a0ca88fd807dbba13cb1ec1c123e07234a0e506db4fda5df1324ade,2024-11-21T07:00:36.710000 CVE-2022-22441,0,0,f76a53867ed61cefbe9bad17661478a8da21dd62605efd7746a7456b2e7b1a22,2024-11-21T06:46:48.483000 -CVE-2022-22442,0,0,8d2e47c7638c0f815120ca077b30d5682e503ec784bb9d915fd3fc15cc7d250f,2024-11-21T06:46:48.613000 +CVE-2022-22442,0,1,5630dba5f24247237442e0687689677d888296e682b5b9a622ea6dbca5da86a2,2025-05-05T14:15:22.627000 CVE-2022-22443,0,0,aa327d6a25844be279fd069ae3f271e2dfd34b23bd55f8f4c62bbb444c7f1176,2024-11-21T06:46:48.723000 CVE-2022-22444,0,0,6620b44c9863f34e08235a79287a2fb3a9a0dbb6c5cdd2f75840f354b98e7b66,2024-11-21T06:46:48.847000 CVE-2022-22445,0,0,d634fbc94b0a77d51c6fc89f5f7495e144dfcffb70cb1db63a44bc9d0c0ae621,2024-11-21T06:46:48.983000 @@ -195303,7 +195303,7 @@ CVE-2022-25880,0,0,9bdf2f06fdce68bef7060f2d0f02cf08ec56691227bd65bfd32ff147cb1f8 CVE-2022-25881,0,0,05c88eb576e437bc2e7c28e9de96c255f7c53c4e40e0816987d432d9a788edf6,2025-03-27T18:17:13 CVE-2022-25882,0,0,072d07dfe0cba33bd41796b620ad3a9d721c84efe9f2641106f265baab3f77b3,2025-04-01T15:15:52.107000 CVE-2022-25883,0,0,6f83b2ca5c014fe212d0f88d9bc2235d7bef4288d21b4a6c7e892fe7db010bb1,2024-12-06T17:15:07.260000 -CVE-2022-25885,0,0,ffde40917e365bd293b2bb48b692e65143802a1e9582ec4d8222e4747142e98a,2024-11-21T06:53:09.830000 +CVE-2022-25885,0,1,dc93e324bac9e3c702eba2372de296257c0c72533ff6a83862fff472a52c17fc,2025-05-05T14:15:22.860000 CVE-2022-25887,0,0,29b55c8a77b39e5c7a7774f9d20e9f9117e42bd74a6a282cfbdb68ff64b01e72,2024-11-21T06:53:09.953000 CVE-2022-25888,0,0,d92be4e426d8b4d5954c1e299d6aaa36320b329962ab4638aaf2060e42820213,2024-11-21T06:53:10.070000 CVE-2022-25889,0,0,f91c61562ca7f05abc7ba33c400aab52e6ea553c7dba031931c69208d1a7b19e,2023-11-07T03:44:52.150000 @@ -196104,7 +196104,7 @@ CVE-2022-26872,0,0,d5d620c1d0a83c40398b1603b6c313ddff66bb2e10bba71c289303bbd08be CVE-2022-26873,0,0,f1736313bc07dbae0592c59770e1dbfd9cb91bff401e1f6300117f87ae65adbe,2024-11-21T06:54:43.483000 CVE-2022-26874,0,0,f4be2a4acf62c4ca9a25936ce3fc7d52142b0519270b19d8cf1c76348ed3aca2,2024-11-21T06:54:43.603000 CVE-2022-26877,0,0,5f979b96ddc49527bf7d9fb75516d2367e396f7b8dcce2a39bc6d0e57163db93,2024-11-21T06:54:43.750000 -CVE-2022-26878,0,0,b327530039ea5d60add8e862f7ea0837cd1d2ddb8bf980de0c11179044b36d23,2024-11-21T06:54:43.893000 +CVE-2022-26878,0,1,268bc1ac43bdfcd917a9f266d5e562cd397e51b37b2f3834bfd9fd76f8e5795e,2025-05-05T14:12:37.230000 CVE-2022-2688,0,0,ccd9eb21cef178ad7994715bdc0a1b4c9fc135984f6ed451e126ab797c988b26,2024-11-21T07:01:31.063000 CVE-2022-26884,0,0,f79165fd2223609cb46b0e9e39492392e91d8c40a8f267c0cc790caa7700b8ff,2024-11-21T06:54:44.060000 CVE-2022-26885,0,0,e568e6215452c35347b4f15ba5ac5299bfeb583f7634c26e6a11d7be1ceb562c,2025-04-25T19:15:44.617000 @@ -199101,13 +199101,13 @@ CVE-2022-30603,0,0,af99fbf9c61a4371eb8c4cad4755873890edee884eb2e6eaaa1fe2e8d0379 CVE-2022-30604,0,0,b9447f0444b89e995ce2e14f16cd2c2908780578f90b6768d1b0311d34654483,2024-11-21T07:03:00.793000 CVE-2022-30605,0,0,260b1720e3416fe114b360e631463367b7abc4513107fadffe5c986bea6f6be1,2024-11-21T07:03:00.910000 CVE-2022-30607,0,0,c89c60dd694b323a8850265ec52ce78e64cc2e85204b1238f1e69b6d02e6d99d,2024-11-21T07:03:01.047000 -CVE-2022-30608,0,0,35bd38af32a84b15a3d5b2644e325c5cc6b012d046fa3cd3c40588df66093fed,2024-11-21T07:03:01.190000 +CVE-2022-30608,0,1,47b126984fbf4ef5a9bc82a61a31a785bd127a1f398e33bd54ddcad027ee9fb4,2025-05-05T14:15:23.190000 CVE-2022-3061,0,0,14927d3c9b0475ac9a2c3d69613a0f8745be7c2069fd94cda979855339e643c1,2024-11-21T07:18:44.557000 CVE-2022-30610,0,0,5929ed5fd38b8adbb8829d415de3d1a4d9c6ebcc7698fb60af42d0d15c0fc95d,2024-11-21T07:03:01.320000 CVE-2022-30611,0,0,bccf9e5036ddb5bd1bc14c3a8c645f2bdb5bfa79bb2685bfc325c82e96d0495f,2024-11-21T07:03:01.463000 CVE-2022-30613,0,0,b399fe87c11ffafbc325607d1637d6cd2e3d4403ceb96352e9ac80fe5871c778,2024-11-21T07:03:01.603000 CVE-2022-30614,0,0,c1df50a6253680c47a5724d6d7ee59fa07716c71cd15605b97a6d600b1a7b827,2024-11-21T07:03:01.740000 -CVE-2022-30615,0,0,7f380b429a9d41ef1e66a831a52e064ccd3b7fc292cebf222363d3ed7a0d5bfd,2024-11-21T07:03:01.887000 +CVE-2022-30615,0,1,95b7e7e5897323d0c2bc390ffa70b1a25b410f66ebdfab736ce060b36604e31d,2025-05-05T14:15:23.540000 CVE-2022-30616,0,0,e24fa119a09aaf7969d9e840a6f97878ac113e934ae8b9332b54aa4e71e5352a,2024-11-21T07:03:02.003000 CVE-2022-30617,0,0,49a32a380e7847d2e348c4894687f04baf4789c6d3a49d0c20d75d2efe2252d7,2024-11-21T07:03:02.130000 CVE-2022-30618,0,0,663961f77296bb963e6cfadcea5fd2c7b72bf93984cd62bde4b11c877715d73b,2024-11-21T07:03:02.257000 @@ -201085,7 +201085,7 @@ CVE-2022-32884,0,0,d6b591b7b9ebabf25884e4d421974bfa97594085f011dc02f0f6c29dbf33d CVE-2022-32885,0,0,e5d0ac6ee41b4bd09aab4458294afeb2b2f71068653660ce3f335e758ad519c5,2025-01-29T17:15:20.403000 CVE-2022-32886,0,0,84e295292da80b64c5b6d25e5a0b1e62cb123dd59b720b7956688b9b97e92f84,2024-11-21T07:07:09.753000 CVE-2022-32887,0,0,fcda640457378e78572cfb8ed1c05224940b8b80213f8b676ee6ff84d1a98fe8,2024-11-21T07:07:09.927000 -CVE-2022-32888,0,0,4819a49919cdf8e12e91127907119e5183462ac5512ffcffc3fab4870d06a6d2,2024-11-21T07:07:10.040000 +CVE-2022-32888,0,1,6b13e221737e2df7493578c03b2b0366bff622872c55e81a03bfbeab258cd442,2025-05-05T15:15:47.340000 CVE-2022-32889,0,0,e2460844c4ef16c6e6f8104f084d35290ec40172f3f975d6affa0424c61df6d4,2024-11-21T07:07:10.190000 CVE-2022-32890,0,0,785b75357f0818483d1cacb0d31d220a8c2994f7a37cf1dc95c6e55ec8b0f95f,2024-11-21T07:07:10.317000 CVE-2022-32891,0,0,64dde404899da7b8a38662bf5bf5c5c622231e25930ce78f0e30e189e29b18b4,2024-11-21T07:07:10.457000 @@ -202624,7 +202624,7 @@ CVE-2022-34982,0,0,81ddee846414e1aa31fcfd66214d203aef254e31755f477f46e6101e91189 CVE-2022-34983,0,0,c3c231b419d430d7dc146c38d26e36e624ff7e941bdfa7c2fdb6fd813661fb06,2024-11-21T07:10:31.880000 CVE-2022-34988,0,0,b4cff8b4eb087a970166e323f874159d9c83c9cbf32578b064076931ce6b76d4,2024-11-21T07:10:32.060000 CVE-2022-34989,0,0,baab8b95a4b59ec5ffe6d2b40a58f867b238141c21668f754f20574c9903f23e,2024-11-21T07:10:32.210000 -CVE-2022-3499,0,0,8582579348aab013fc90772ff95018c354ec214a2609ade3d6789fa93d5af154,2024-11-21T07:19:39.517000 +CVE-2022-3499,0,1,a7eb909dbed141d50596ed094781f9324c93c412f4595dc4c59306d97be28901,2025-05-05T15:15:48.063000 CVE-2022-34991,0,0,5609e7d62f23faa46f6dd7342771a7a37bbb3e14e6fc2ebad57be941a8550efa,2024-11-21T07:10:32.360000 CVE-2022-34992,0,0,7d077c743f2083765ce8edaa5e74d1a17f1e08db715f4eb02bd14a4905ee2762,2024-11-21T07:10:32.503000 CVE-2022-34993,0,0,1b6a8759458d67e76edf98b8072e6da3972486fb6c2349c357935e7aa37466d1,2024-11-21T07:10:32.660000 @@ -204453,7 +204453,7 @@ CVE-2022-37076,0,0,b512b46469e892f42aa5b65e5846b98dffeb88f2ecdeae97b4555492e9ca9 CVE-2022-37077,0,0,e867117f84c103d978f2f88d7472fefba51da19802a680bea32d3345430f5d50,2024-11-21T07:14:24.743000 CVE-2022-37078,0,0,4cb38d36020326d9d6f097891fc8ec29462fea3ccdd07e9c6b2119c15ac7845e,2024-11-21T07:14:24.903000 CVE-2022-37079,0,0,feadc228f1a2e1e8e1033bf0714c757d075b34aaa68983aa22bb7c40b057003d,2024-11-21T07:14:25.043000 -CVE-2022-3708,0,1,dd5faf8368c3ae793dea33866fa37bf4117244acccb7538075a0e48851506917,2025-05-05T13:15:46.990000 +CVE-2022-3708,0,0,dd5faf8368c3ae793dea33866fa37bf4117244acccb7538075a0e48851506917,2025-05-05T13:15:46.990000 CVE-2022-37080,0,0,1fe3077981a6a75cc983d719e4e9b0c2b89c67aca5a9fe956c566e096a240f84,2024-11-21T07:14:25.197000 CVE-2022-37081,0,0,f9a7b250c7d5c3966f768075d89e9c5cef50e5fe1829d0cef239fddbc0d62e89,2024-11-21T07:14:25.340000 CVE-2022-37082,0,0,183a569aa579451771a076b9a6e090c2aff4c8b1fa5d52ed0e2aa823d38ef679,2024-11-21T07:14:25.487000 @@ -204832,7 +204832,7 @@ CVE-2022-37796,0,0,c0298042a5eebd3ac1c91a0331a3d9180e1361de73a5ab66cc594c9307111 CVE-2022-37797,0,0,a5dc9e518710241921d90a09a26ebb8cc3647c59b13da4967d5be4002f6a439e,2024-11-21T07:15:11.137000 CVE-2022-37798,0,0,22251b8b14d029ad83d95a5ea412a86e776d9463efedba33a4bffd4ae26a753a,2024-11-21T07:15:11.303000 CVE-2022-37799,0,0,67a4b9adbb328eedd660d3ee51f8fb97c2944ad3f9d2f82dd4ac6eec3ee87fd9,2024-11-21T07:15:11.450000 -CVE-2022-3780,0,0,628d405bd7f82c0ade08bbf83fef798e37d5bbe0aef05f72abe30dd5df51f4f6,2024-11-21T07:20:13.510000 +CVE-2022-3780,0,1,55055d60abf272c6042add70fcd895ec3370a88cfd9f8de995acb4bd05a533fc,2025-05-05T14:15:23.910000 CVE-2022-37800,0,0,8daab3a325211fc46ee41c14867ff021e4f1960e09ba3620d9e18e0f4b193636,2024-11-21T07:15:11.610000 CVE-2022-37801,0,0,7338cabcd5cbfa52ac748198574e53e7120cdde123a0505a7a8a5e96798d2357,2024-11-21T07:15:11.760000 CVE-2022-37802,0,0,ce4e785154f30f27b35b95ee14d9c89af6e184c9a3913b3cdea4eb536ba7bd8d,2024-11-21T07:15:11.907000 @@ -204843,7 +204843,7 @@ CVE-2022-37806,0,0,c74ceea734413d0daae0b1ba28c0254f0e5790159b39bab87ea82671e3623 CVE-2022-37807,0,0,b01acc6f8efa08582b6876315999f289898158cb6973331bc53093f1655e5376,2024-11-21T07:15:12.643000 CVE-2022-37808,0,0,66906f397447009c58fc4ff003276ed85568bd39734cff173a71a65cc66d9e05,2024-11-21T07:15:12.800000 CVE-2022-37809,0,0,1287fc705fcfd3f06fc032e5405ef51c275c61dcbec865fdca81ad9df7042348,2024-11-21T07:15:12.953000 -CVE-2022-3781,0,0,508509e5bbc48e9ef854aa1e12d816d986307d215d9aef3de74e4ea7efdd5d14,2024-11-21T07:20:13.637000 +CVE-2022-3781,0,1,bc95a071df1dc8590966ded38c57069d15016f1662e5f4fc4ca3e33c5fc85aaf,2025-05-05T14:15:24.353000 CVE-2022-37810,0,0,4637f8baeaf72351e0384eff2aa3fef2824c9b11c4f4a76a760b2c1135acf468,2024-11-21T07:15:13.107000 CVE-2022-37811,0,0,0e59071963fab940115978966123b98fc790814c7c417cf813507f5b8193726b,2024-11-21T07:15:13.253000 CVE-2022-37812,0,0,e23ca879f6ddbb458e5e0a2e938045e8a96a04087b78f2a19f50f1826c1f475f,2024-11-21T07:15:13.407000 @@ -207064,7 +207064,7 @@ CVE-2022-40743,0,0,7feb38899dd8dbe36e4b9a919c02ef7fcade234085c01f4769546eb0ac653 CVE-2022-40744,0,0,617bc9aafbf5eca396913dd0a01599fb43b645c996093e50fad9c5920b76d70f,2024-11-21T07:21:58.160000 CVE-2022-40745,0,0,a06431569ea158f12afdd8c1cfddd13dbd7a572db65305c6e25068c7c625339f,2024-11-21T07:21:58.323000 CVE-2022-40746,0,0,614dfac73528451d8689aa28036626a78782a12d1335f4ff67b3521123db03d3,2024-11-21T07:21:58.473000 -CVE-2022-40747,0,0,09b3e392eb181f5049367447c7c980c81b043299b25f693a9032b2cc7862da1c,2024-11-21T07:21:58.613000 +CVE-2022-40747,0,1,125815994f5d15d4177258ac3881c13cc039631362f457d607c354903c370600,2025-05-05T14:15:24.517000 CVE-2022-40748,0,0,8015fe0668f63e6eb72c07822d53b128a8fb9b3b47ec005f1aec097def3d9d7c,2024-11-21T07:21:58.733000 CVE-2022-4075,0,0,a0cfe3c5e4328bd27eeee197ee214d350015a171e04fa811992d608d3147d1e1,2023-11-07T03:56:52.100000 CVE-2022-40750,0,0,289c8279e51155a116d421c9e53832b3110caf41d0e2be6707a2672278dc78b0,2024-11-21T07:21:58.870000 @@ -207650,7 +207650,7 @@ CVE-2022-41431,0,0,e1e25d2f98f3e7a8af3ddc6677688b6f69e469f2526d9e82d0c3dd684b084 CVE-2022-41432,0,0,66963a717601d370e87ed97a887c1e74e286b9bf7884f42d908066be4734f88c,2025-05-01T19:15:53.433000 CVE-2022-41433,0,0,69830dc20226c1f0e3e77509f9ce63b9a09fd05690a28cd1b47487eb3585950a,2025-05-01T19:15:53.613000 CVE-2022-41434,0,0,d392287cb60d76e230328d0f0c02b9eb4363ade22960338767b857be70347db7,2025-05-01T19:15:53.790000 -CVE-2022-41435,0,0,2e9d3745efae09ff8a19f34a5db6982483010a3d6156877ebd951fdbaa26043c,2024-11-21T07:23:13.633000 +CVE-2022-41435,0,1,c340054c5a014fa30019b6ce9f6674cbee507f2792d6b48f54a958dcbeca5b29,2025-05-05T14:15:24.677000 CVE-2022-41436,0,0,67ae6f6430b4ce10d4150b3580b357aa507b8df48bc66ee37216cfdb1ef5eb80,2024-11-21T07:23:13.777000 CVE-2022-41437,0,0,61cb62dc4e6bdcf1d9ad3a51fcdf3c0f4570219fc5c275ee9742690f0387b87d,2024-11-21T07:23:13.917000 CVE-2022-41439,0,0,4837757799bdc6b0b965b33af5e10557219570b80eb847c87c8582af314adcc1,2024-11-21T07:23:14.070000 @@ -207884,11 +207884,11 @@ CVE-2022-41707,0,0,4a9d9e455f5924ee13a97fda6f122fd78047511fd4f90d262337559772d2a CVE-2022-41708,0,0,f0ae3a0dc51a997bd66449e847b41d3f23c8e5707dec193c7df806c2b2b8bef2,2024-11-21T07:23:41.670000 CVE-2022-41709,0,0,eb384de69dc3c350dbd59e9256cb4322d8f1580851a9bc611b49ccda86dce130,2024-11-21T07:23:42.643000 CVE-2022-4171,0,0,0af515774a6a84b8f96d7f31c67a68fa8123a2084614a64a6ecf9a8ea719efb6,2024-11-21T07:34:42.740000 -CVE-2022-41710,0,0,a6f738cc587fa6745dfc35306fc52061e7da137b09b980edaa61690c8f048f80,2024-11-21T07:23:42.790000 +CVE-2022-41710,0,1,6e8301c0aea38fcd41ab3e7e2c2f788251c98b5e55aad80dec527df8e4e9d593,2025-05-05T14:15:24.913000 CVE-2022-41711,0,0,4a0da93cf4a22f20986ff0371539ac876543955714558323a34a16870e9b51d5,2024-11-21T07:23:42.907000 CVE-2022-41712,0,0,73177a569ce188208ca8353d3deba6a5e1b73f244df2c3ea4ef48513b3bff00e,2025-04-29T15:15:49.200000 -CVE-2022-41713,0,0,cc09b6044f18e63fc1e06c0429889b057483535ad4ec7d3e1e911cdaf52c0f8c,2024-11-21T07:23:43.127000 -CVE-2022-41714,0,0,570e59f0374fb85349e6e3d36d7cf7ab83eb3f05d5d26565d8d9fede78597ddb,2024-11-21T07:23:43.237000 +CVE-2022-41713,0,1,151ad8d0ad67110b759c22a3231da91264219bde194e8a6a8a99b78e7a87c40e,2025-05-05T14:15:25.083000 +CVE-2022-41714,0,1,17f3ce310594e339d2d1f7d5036885ac9e4bf8b266d8a8b9fbc7af5caee4f6bf,2025-05-05T14:15:25.280000 CVE-2022-41715,0,0,0fa63aa842037e23cea94933a3cc5363609a884cb26e82293349a1b4da0f190b,2024-11-21T07:23:43.367000 CVE-2022-41716,0,0,4aeff2ea5cd63163b210965f724186a2391adaf7003f82a6d81f56dbd66fcb98,2024-11-21T07:23:43.507000 CVE-2022-41717,0,0,941572206b0f8b585911e69459de25cb79196c2156fbd8befd1bb331b9ede72f,2024-11-21T07:23:43.713000 @@ -208514,8 +208514,8 @@ CVE-2022-42435,0,0,cc0e9696869ddba79598814ae00f9d8a0b0e6af0c66dd4b7021edd95824af CVE-2022-42436,0,0,c11d8d676b67bb8f105ff05e8dc4ce1e6bd487065e111bd4e854225774ac561d,2024-11-21T07:24:58.130000 CVE-2022-42438,0,0,afc2fe0cf473b52ca23d69a4275bc1761565798a837222c9234a9b499e5be663,2024-11-21T07:24:58.260000 CVE-2022-42439,0,0,4e01fbb9c33edea9106ffc0b4167a5a65dc49e1e9db6790bbdbe9b0df445cb8b,2024-11-21T07:24:58.383000 -CVE-2022-4244,0,0,16ae99c985e7b36dcab810e8ccfc14c9fa257b27663d0c72059c2a5842fdc1cc,2024-11-21T07:34:51.510000 -CVE-2022-42442,0,0,9f02592b0effba1bc336659f8f416a172ce8eaf02f19e1c1af2a6cd21863ff89,2024-11-21T07:24:58.523000 +CVE-2022-4244,0,1,2caf0f7fd2c6241797bcc610fca4617f0521b71977e574f0320e364e9120f553,2025-05-05T14:12:14.513000 +CVE-2022-42442,0,1,135edb896e871fe603eeef2a2f7899f1c20abe8235f10cfbd2e880e9c9ec1048,2025-05-05T14:15:25.490000 CVE-2022-42443,0,0,fc50246ac900a4083ccdedef27e62d7e1413964daee1a320fba3c5aaf67e1007,2025-01-22T17:11:53.350000 CVE-2022-42444,0,0,5329124ad7f1068195d555d1d0ed53c482283f2a11b45a18466b4858bf7aa527,2025-03-25T16:15:15.877000 CVE-2022-42445,0,0,dd54132cc2f25eab96c69020699c91a5ef1b4c28818402ec2478af2c03e2dd29,2025-04-25T15:15:32.680000 @@ -208667,17 +208667,17 @@ CVE-2022-4274,0,0,187a0b878abc00bcc81b1165bf1f40a5bdbbcfc11415c02bf02dc9ea441aa0 CVE-2022-42740,0,0,c80bbffc937e6b89b85d34239cf1dec529ec09e0a4db8d72b4ad656333c28f73,2023-11-07T03:53:27.247000 CVE-2022-42741,0,0,e9b9c7e523670561b91f49afd8d2ff08d85d3cef8190ac4cee7fa76264c14b53,2023-11-07T03:53:27.677000 CVE-2022-42742,0,0,620f67419b247533e0b5700ac28cdba6e8a54a70e3ce7166f3cdafe9f19bd0fb,2023-11-07T03:53:28.050000 -CVE-2022-42743,0,0,33211fe398e973ff5d2f778f2f2f0afb5f605b04a14ba24a7119c92db2cfe3c7,2024-11-21T07:25:15.023000 -CVE-2022-42744,0,1,83b42ba3b3269352ea4d88ab64d925f2b82d503451eb03cfa2becc13a327c99c,2025-05-05T13:15:47.187000 +CVE-2022-42743,0,1,733bf2568a886e3952fe807ace3c410ea96e401cede573bdce5cee28c3086dd8,2025-05-05T14:15:25.657000 +CVE-2022-42744,0,0,83b42ba3b3269352ea4d88ab64d925f2b82d503451eb03cfa2becc13a327c99c,2025-05-05T13:15:47.187000 CVE-2022-42745,0,0,a60cc6e5607f52c961cb20f9018df8f0163d2035f20f163a1c8a5964384cf3ae,2024-11-21T07:25:15.260000 -CVE-2022-42746,0,0,d2ae3b5b6394479bf8ca5d8e8db3ea12b694821b417529d9047524840126d2b4,2024-11-21T07:25:15.383000 -CVE-2022-42747,0,0,dc8518d132e7e9f49bc5d89c2401bc7b17dd701c409f822a1a831e405a792c63,2024-11-21T07:25:15.497000 -CVE-2022-42748,0,0,70908ce5dda92a277c74073f1b8a7e91a677fab82536e1d198f39c937dc9d2cb,2024-11-21T07:25:15.610000 -CVE-2022-42749,0,0,a9b7dda4ea4a104e8eeb79b0080a28614391820623535cc55023613b148c9e3c,2024-11-21T07:25:15.723000 +CVE-2022-42746,0,1,ef2d87b4e8afe5d470f6020e41c1c4a6ec178737852903fb880740ba9b954058,2025-05-05T14:15:25.813000 +CVE-2022-42747,0,1,5f65ed266194eb79232b217858127a8d266d146e73cb9107af970ed3487fb65d,2025-05-05T14:15:25.977000 +CVE-2022-42748,0,1,cf0138be2b5ba5c2aebf021d430abea9312004504712360d1fd276f3ec5675c4,2025-05-05T14:15:26.130000 +CVE-2022-42749,0,1,388de0a19de6e7e4e043392b180334694e96732f6f4cded8cec3bceeac11a833,2025-05-05T14:15:26.300000 CVE-2022-4275,0,0,54b478aef3bc9cca2a4ce5a0bb2e896ed7e94234c017afbdb3363409dee94ad2,2024-11-21T07:34:55.383000 -CVE-2022-42750,0,0,e98c6ddf9bbd6aaf711e14dc2cdfeff73eb21cb2abcdf8ab009ac1b153338433,2024-11-21T07:25:15.850000 -CVE-2022-42751,0,0,15808f9f07f8ce6d439a7a287775f2f599cb2d5ed018591fd2c042f876358fff,2024-11-21T07:25:15.967000 -CVE-2022-42753,0,0,f112e53aa8bd5c24fe46324514c3d5ea19f1a7af34e250b64989a499eab30683,2024-11-21T07:25:16.090000 +CVE-2022-42750,0,1,3184f53fe5329ea448aad75202359a81d7b52edcde18bdcec3cabfc73a134c45,2025-05-05T14:15:26.460000 +CVE-2022-42751,0,1,a11416a4f3a878c4132aa25ee94e479b2e9c07f3a9421e5e73a83ca32069c93a,2025-05-05T14:15:26.637000 +CVE-2022-42753,0,1,2835748a0704f72bb36b28ef84423df6097b0825c75c5752732427847530ad6c,2025-05-05T14:15:26.803000 CVE-2022-42754,0,0,f1cafe3d8b5ebb9eb4e3b9634cdf86d9ccc43981386d1bdcfb3b31882d2e69c1,2025-04-23T20:15:41.577000 CVE-2022-42755,0,0,321a01146d4ad740a2224f39aa84a0dbfbfa75ee238a0976ce3dce70a26fa050,2025-04-23T19:16:20.540000 CVE-2022-42756,0,0,b2f1d24556896807a483fc599440ca2802c4ca9b83809af083150c12d6e1095d,2025-04-23T20:15:41.750000 @@ -208756,7 +208756,7 @@ CVE-2022-42822,0,0,67bbc2542a632a1720052dfa2dcc2ec8cda2381ddc4abbf51e0a406addb8a CVE-2022-42823,0,0,49fc78d549e92fe999d68ef243995033e57966ef041fcc437f0c3fb9649501f1,2025-04-21T16:15:51.220000 CVE-2022-42824,0,0,6c90c9b36aea74225595bb731b6c26281e07919e4fe0a478067caf0d28855ca8,2025-04-21T16:15:51.440000 CVE-2022-42825,0,0,036eaad63339fddefe78546773ea3e6f86d0918826ec6fc2248fb574ae674509,2025-04-21T16:15:51.623000 -CVE-2022-42826,0,0,a3db93b6acc795d6f94f901a4da2959143f2f1df1d41d8a4377b77c2f10dc1bc,2024-11-21T07:25:25.490000 +CVE-2022-42826,0,1,ac349b6357a25abe289c6936479693896b0233a5c91241a501b9c548508c0b63,2025-05-05T14:14:23.453000 CVE-2022-42827,0,0,daf86a2d6525485094edeefb5bf2966711f5feb63f4b9bc9bbe70c1122307fa9,2025-02-14T16:18:40.880000 CVE-2022-42828,0,0,dba5eb309f319c44f806f6e271576603250d0aa144d4c5e4518cece57738d438,2024-11-21T07:25:25.740000 CVE-2022-42829,0,0,a0e3e3e163989e7a71d58fc013e0a21cbe7e4454a17c22c1f9d6c51c2a4c82f9,2025-04-21T20:15:18.317000 @@ -208954,9 +208954,9 @@ CVE-2022-43051,0,0,ab29a54b266079967e584701dd2f1a8fbf52de3672fe6d9f416d5f10b1447 CVE-2022-43052,0,0,30e1816df4543b5750d28f3cdb2108c4a8b93b3b986e4d49bf9ae9c791cf0b02,2024-11-21T07:25:52.130000 CVE-2022-43058,0,0,d7864ef781bad6f2a49b9f74e2def917508fc1e48c25db1427d9c8c70adcd49e,2025-05-01T15:15:55.923000 CVE-2022-4306,0,0,07e7b045aa9d351a1667711ad59312eae63454cf96522fe976d913693e8cd1f8,2025-03-27T21:15:41.030000 -CVE-2022-43061,0,1,832d9c1df518d25df887a13354c8408d68cd9f1f0609d2ed61792326dca4dc61,2025-05-05T13:15:47.360000 -CVE-2022-43062,0,1,c4aa7913c3c06c2c44ba340eaf05e2730db4a3af465cc4923443c3042f98179f,2025-05-05T13:15:47.507000 -CVE-2022-43063,0,1,55d6405e3039e918d9ec5020679ab985f17dba311ca7abcabe08e77e219621ba,2025-05-05T13:15:47.653000 +CVE-2022-43061,0,0,832d9c1df518d25df887a13354c8408d68cd9f1f0609d2ed61792326dca4dc61,2025-05-05T13:15:47.360000 +CVE-2022-43062,0,0,c4aa7913c3c06c2c44ba340eaf05e2730db4a3af465cc4923443c3042f98179f,2025-05-05T13:15:47.507000 +CVE-2022-43063,0,0,55d6405e3039e918d9ec5020679ab985f17dba311ca7abcabe08e77e219621ba,2025-05-05T13:15:47.653000 CVE-2022-43066,0,0,57a7626edb713952d6789d8a75c56eeae505c9ba00f31a4b497a17ad3067daee,2025-05-02T21:15:19.483000 CVE-2022-43068,0,0,958d302f69a4d8678b37623a01d94bd9b332b86ff24178214dd5ac9784c48ba4,2025-05-02T21:15:19.657000 CVE-2022-4307,0,0,d2459cfb839ddf72a13f90ce5aa0b7d76e9e096251a7790a43d2c48631bb74f6,2025-04-02T16:15:24.110000 @@ -208966,9 +208966,9 @@ CVE-2022-43076,0,0,245e4713b517f906023ec445d531ec476c1c8d624952e9aea7a7caacdf89a CVE-2022-43078,0,0,90b8e5dd0b6a6ecb4bfd5632cec91380d69406dc1c74f2982017f19fb9176b02,2024-11-21T07:25:53.807000 CVE-2022-43079,0,0,58a3571e035adbd8318a2f38ca451668e18449f996d62b9caea15548e3a309e5,2024-11-21T07:25:53.953000 CVE-2022-4308,0,0,9b64bbaf570c1c8e5138d1d4fed14e566bbd2347023a0540cf52c162c9b7dcce,2025-02-05T15:15:16.267000 -CVE-2022-43081,0,0,06045fa2dd4482c4ab8f424c17219d620702f697797679355f7a65a300063090,2024-11-21T07:25:54.097000 -CVE-2022-43082,0,0,592570632450a663de96e365b4535188eaae4a302ffa5fd900b1df1264e19c09,2024-11-21T07:25:54.253000 -CVE-2022-43083,0,0,1d1949a63d16a257e86bd8def77de45ea90ce13bd5cdc657f637a3c8161fc38a,2024-11-21T07:25:54.410000 +CVE-2022-43081,0,1,8dfa0b8eb31a9fdc75ff1358c217ac995639c54720e59a31c185397d4ca41e11,2025-05-05T15:15:48.247000 +CVE-2022-43082,0,1,b94e120d7dfe3d3a515c1e53efe16b04d2ecb5f8219471fbafa36464c47f6a85,2025-05-05T15:15:48.430000 +CVE-2022-43083,0,1,e4830da38f76467e7997bf03ec0d8d71d68efac076d20339fc3d6d6160b6f6f7,2025-05-05T15:15:48.597000 CVE-2022-43084,0,0,6540c9f7a568cba9bf18b75586b51b6c174f706072c405d922aa7a339d0c44d3,2024-11-21T07:25:54.563000 CVE-2022-43085,0,0,0e49daa42dd0c0a58e714a8dae9e4ce995e08f6b0b671b85ca79944a4d2ddd5d,2024-11-21T07:25:54.727000 CVE-2022-43086,0,0,6a2baf73aed9ae1fcbda843fcacb4c1c2e720c1624b6fef164b3e8cdadfdb5f3,2024-11-21T07:25:54.880000 @@ -208977,14 +208977,14 @@ CVE-2022-43096,0,0,cacb1808d34e87df5c98f16d577b4118fd80380ac6607c52704f978b00a2a CVE-2022-43097,0,0,75175cda063a45de8079a876b054bcaeb70113eec573f645c96fe03e16194fe2,2025-04-24T15:15:50.910000 CVE-2022-4310,0,0,316cd0851567879079e7e9236f16cd17e2020245edfd6d8b8e2803e6a8f4e235,2025-04-09T20:15:24.037000 CVE-2022-43101,0,0,e25941fe3cffe0ea95bbc36d06a02b123e4756a2e6ab6d51d0e4c1776f132c44,2025-05-02T20:15:18.460000 -CVE-2022-43102,0,1,16f327b40ca5fa650474484e9254f8f472860d978c157abecb246f7e74fd3e41,2025-05-05T13:15:47.797000 -CVE-2022-43103,0,1,5d53f26391e3866d1c96ddf7b803c5e9f49044b8f8f5e50e405bf9b901b0eeb7,2025-05-05T13:15:47.967000 -CVE-2022-43104,0,1,21fd70b33487f23d6871ae02a5f46e381404d16e8cbd5ee6a4788fc88b2a02e2,2025-05-05T13:15:48.237000 -CVE-2022-43105,0,1,3ced61d091dd65599a9f6c9ef5f37f218538a7d1fa238674f8060c89f421ddc6,2025-05-05T13:15:48.390000 +CVE-2022-43102,0,0,16f327b40ca5fa650474484e9254f8f472860d978c157abecb246f7e74fd3e41,2025-05-05T13:15:47.797000 +CVE-2022-43103,0,0,5d53f26391e3866d1c96ddf7b803c5e9f49044b8f8f5e50e405bf9b901b0eeb7,2025-05-05T13:15:47.967000 +CVE-2022-43104,0,0,21fd70b33487f23d6871ae02a5f46e381404d16e8cbd5ee6a4788fc88b2a02e2,2025-05-05T13:15:48.237000 +CVE-2022-43105,0,0,3ced61d091dd65599a9f6c9ef5f37f218538a7d1fa238674f8060c89f421ddc6,2025-05-05T13:15:48.390000 CVE-2022-43106,0,0,4b2c7a317c94bff7c90d27a128f7249b3fe5a626251681da368dda31e2e6b818,2025-05-02T20:15:18.630000 CVE-2022-43107,0,0,4c2a40931e203e0289c8dc655243876ba907cc7d20fab413b6a2700ba0607105,2025-05-02T20:15:18.847000 -CVE-2022-43108,0,1,23451f407fb17588c32d1104033899890a75dc9617fa2fe3db1fb6e0221200ac,2025-05-05T13:15:48.533000 -CVE-2022-43109,0,1,7af91921433268853a0fd99ccbd1948eb2f46d8352ea091663e1dfc14d0bfa7f,2025-05-05T13:15:48.683000 +CVE-2022-43108,0,0,23451f407fb17588c32d1104033899890a75dc9617fa2fe3db1fb6e0221200ac,2025-05-05T13:15:48.533000 +CVE-2022-43109,0,0,7af91921433268853a0fd99ccbd1948eb2f46d8352ea091663e1dfc14d0bfa7f,2025-05-05T13:15:48.683000 CVE-2022-4311,0,0,43ecfb8ff575d7824de4cfb034b7a4043d727ea4b982de96517473fcfda29442,2024-11-21T07:35:00.413000 CVE-2022-43117,0,0,361fe25c3fc22d738f381e0256f2b14bf2d9baff62b7851435d06c4c4337415e,2025-04-29T20:15:22.037000 CVE-2022-43118,0,0,7c30f88dc8c158a099a0e5ed8a43ceb9b453a41a5dfa3487fa3326016d1eb974,2025-05-01T16:15:23.417000 @@ -208995,7 +208995,7 @@ CVE-2022-43121,0,0,001e9e4ad7a0da02090e8a783b7ff21e6c88ae693693b63bb0c1d0c1349b1 CVE-2022-43124,0,0,1103574263e304a4ae2635887f52cc21d9cbae1d355df7eed2c88d4a13e1cc4a,2024-11-21T07:25:57.700000 CVE-2022-43125,0,0,52955030ba9f39507a30dc5358732311dc919157a079e9c12e2f9c1425bfdaaf,2024-11-21T07:25:57.873000 CVE-2022-43126,0,0,32318097da34f209f165497e141dbafa8ba796e007893cd3dca77840fb1731c1,2024-11-21T07:25:58.040000 -CVE-2022-43127,0,0,92fe347fff41b643a94872eab09e93681058f003e07c2555a4983f742d9d485c,2024-11-21T07:25:58.200000 +CVE-2022-43127,0,1,726e2d5a93169f9175a4a9f75cb83c11763f4ce6e7942fedfa291bc4d8c83969,2025-05-05T15:15:48.787000 CVE-2022-43128,0,0,f007c9f0be159632f9e69ff9af025b1f1f904f8a4fea112fe37a153e0ec1a85e,2023-11-07T03:53:43.393000 CVE-2022-4313,0,0,086460c5bd76f1575461d5a5457e280fc6c4e01652ae257ce74e884478d4e479,2025-02-27T19:15:47.290000 CVE-2022-43135,0,0,8d093e924261da2b4dc6ae06b1e1842389529dbcad0db0ccde45f2c6a77e751b,2025-04-30T16:15:26.763000 @@ -209053,14 +209053,14 @@ CVE-2022-43235,0,0,c1904db538dcaa3b1068176ea453be20f6fc7a3b031167032e23279f9c6d4 CVE-2022-43236,0,0,4acaccc0b4194a2dc4268ca3c7f34f4bc5f9cc8105b564b4522fea8769333f26,2025-05-02T21:15:20.310000 CVE-2022-43237,0,0,3f3f9c91bc1919b5f3bda5a8cf836852b263b8a6247f9a81bb17a5ed4205196a,2025-05-02T21:15:20.460000 CVE-2022-43238,0,0,b36293229102902b449ff78d28184db3d26a3115279a39e1ce5a9e4b5a6384d4,2025-05-02T21:15:20.620000 -CVE-2022-43239,0,0,6ed77626bcb16606996ebeaa4da72e1aafc63174f1bb342322ee110d812960a7,2024-11-21T07:26:06.660000 +CVE-2022-43239,0,1,255662c1e4a25e1f7757a29afb0bd41104ca2990b63ef1b336b22fa97d671e72,2025-05-05T14:15:27.013000 CVE-2022-4324,0,0,f4d825b5ee4ec2d5914222c6f1ac977c7f010bae18f0320baa5804bda740b485,2025-04-10T19:15:52.770000 -CVE-2022-43240,0,0,bb2ff58aef28f8399f2fd17082e720e9f444a1b7d86133c85f3564165f0c1b90,2024-11-21T07:26:06.843000 -CVE-2022-43241,0,0,1c6d2ab8ab67a2797aae9213680adcc7c80614a8d6286cb9af2a7f020922346a,2024-11-21T07:26:07.017000 -CVE-2022-43242,0,0,5345a16f421e4021d3736fb05a5ff404f37835cd0a92e7f86bd155988f020520,2024-11-21T07:26:07.197000 -CVE-2022-43243,0,0,92b031f01fafd8125220baa66d85feae40b4e361f6b76974ace6514287b7d5ed,2024-11-21T07:26:07.360000 -CVE-2022-43244,0,0,f7b6c4c15c4f51329d5791049d5d853f81fe6013da24d6e54601fdac38328826,2024-11-21T07:26:07.537000 -CVE-2022-43245,0,0,527c4485a36dc6afa461eb22cee472580e980da20abfbe120685568f753a1d70,2024-11-21T07:26:07.707000 +CVE-2022-43240,0,1,f41f5accfdc021d5eb61a081f8453b01e518394bf5d6497b3f047cbe8a8694c9,2025-05-05T15:15:48.967000 +CVE-2022-43241,0,1,049a774f4363e10275132ddb9c86e9e1db98c1dc91bced6e519f7089f725cc6a,2025-05-05T15:15:49.137000 +CVE-2022-43242,0,1,c42e6da3736d4d95900a3046e3610532cd6d04c352782e3091013ca06e4bb7c3,2025-05-05T14:15:27.220000 +CVE-2022-43243,0,1,d38da97391718717d8f92758461e74bc1491baf82e21af52544a0f6d0f0fc796,2025-05-05T14:15:27.390000 +CVE-2022-43244,0,1,bdf0ec65751c1ffca8698eb05a510c785734281c2723d5e16d9e4ddf78e069f3,2025-05-05T14:15:27.560000 +CVE-2022-43245,0,1,dbc340e2c4daa4a271eabc696b4be276ab88faed34911dda69ac42f225a0f207,2025-05-05T14:15:27.730000 CVE-2022-43248,0,0,a36169e94d11697e92658c3a710ac33255bc306ad24085b9eaea9155a9223436,2025-05-02T21:15:20.783000 CVE-2022-43249,0,0,6eacf88d59636b11f0a2fdd59c716c5cce388451b4a1d94883b558f98046969a,2025-05-02T21:15:20.947000 CVE-2022-4325,0,0,cedeceefcc07fb8caace033699ae9e4b3d47d7ea566fa7862ecb912a2c3bc606,2025-04-09T18:15:44.297000 @@ -209142,8 +209142,8 @@ CVE-2022-43357,0,0,49710cd3fa169042a9e0bbe187a6945bb110faff0d8151512ac67e439036a CVE-2022-43358,0,0,11dc4794f1b8bc43d2f46726b4033a61fe6070f59544c7f6fadcd79df5e58abe,2024-11-21T07:26:19.950000 CVE-2022-43359,0,0,550e63e1e793babc8f84d42dcbda311605626dfb413f2af1eb096c494f8a2384,2024-11-21T07:26:20.133000 CVE-2022-4336,0,0,c6213846d84c8eeb84cd5c6d2d9113a1416277a04a1060249af2edb42816093d,2025-04-14T18:15:26.510000 -CVE-2022-43361,0,0,e4d475ce0c7fe418249f627bbe5265cb4bd3a24d0f8881a430dc22d1391edf48,2024-11-21T07:26:20.290000 -CVE-2022-43362,0,0,a12c9dc795c60959cfd1ce2383f2c16b3121a4a48bde75306dd154ec2f7dff52,2024-11-21T07:26:20.447000 +CVE-2022-43361,0,1,0653759efdee9ddb9f4562e841085997978af6c3831b7160ce7ff75ee664b399,2025-05-05T15:15:49.307000 +CVE-2022-43362,0,1,01117472de2091a88d408a6914c586cc306eb03b2d7483eaa6c8cce04ddc8d5f,2025-05-05T15:15:49.480000 CVE-2022-43363,0,0,73bffbea2ac9b78e9cf1fc50b165cf8bd609ec9f4e517ddb2c9ed32b95f5e024,2024-11-21T07:26:20.600000 CVE-2022-43364,0,0,63752f82146451a59a88427ad5c0f8875932a19f17c02c75e793a91e7b24839c,2024-11-21T07:26:20.763000 CVE-2022-43365,0,0,bbf905773707f491fee14b92a7083e4594a0136e47d59f0edaa132df6b673304,2024-11-21T07:26:20.923000 @@ -209151,7 +209151,7 @@ CVE-2022-43366,0,0,7db21c469279c33924218d3d8a9a99c508291ff4577983dff759c07a1f8f9 CVE-2022-43367,0,0,0f127524d322d1301933e85f93b854d56dcdcb65d837cc30fbae19af7d08129f,2024-11-21T07:26:21.263000 CVE-2022-43369,0,0,c288510cfa2873237d4431d12fb5170e0150d110e82dc3c1cd60ee3ef4adc474,2025-04-23T17:16:21.187000 CVE-2022-4337,0,0,b9f9b0cb0daab30aca39b6a1c269df7932675e9405636cd8d8832ce58002361b,2024-11-21T07:35:04.923000 -CVE-2022-43372,0,1,1fbf76ddb5151dc53305afdaf6ab4bd5a37290aea4aa26db84473ce950b8410c,2025-05-05T13:15:48.853000 +CVE-2022-43372,0,0,1fbf76ddb5151dc53305afdaf6ab4bd5a37290aea4aa26db84473ce950b8410c,2025-05-05T13:15:48.853000 CVE-2022-43375,0,0,de88c97f2163c6a6206f9951cf1b7736f4611b4baf3cd246d18c7abfb7e6b10e,2024-01-04T07:15:08.893000 CVE-2022-43376,0,0,fa1cc760c7bfc31c93116318f865b54f14932659571b78e74cef0d2a26c9120a,2024-11-21T07:26:21.757000 CVE-2022-43377,0,0,303adcc98d8c18986c2658899ef83116cf828f17beb79e7cb11fe31e25b41362,2024-11-21T07:26:21.907000 @@ -209707,10 +209707,10 @@ CVE-2022-43982,0,0,14b9978d8140d0ed5f03cae117ace29d6d035ad84f43b6d632d355e7f6b49 CVE-2022-43983,0,0,ffe0d456572fb0927fd9ef42e8508dbe93ccf46936064e352cd44fb787c9c077,2025-04-29T15:15:50.410000 CVE-2022-43984,0,0,a233aca652af5af4eda212b237b971e5b32991e615e00b5d55c2171f29584bb0,2025-04-29T15:15:50.567000 CVE-2022-43985,0,0,c064e57abfa7941381c673e56612d225e29b26a39cea4b156b8e15aca3720c30,2025-05-02T21:15:23.357000 -CVE-2022-43989,0,0,374e547b05b20db43351e8931f46ba78a5e281be3b644dfdfc4d5540c878f431,2024-11-21T07:27:29.150000 +CVE-2022-43989,0,1,71986f0cfdffb767b779cfd61831d15a5c56bb0a74fda53041e0cd0652c0d7ee,2025-05-05T15:15:49.650000 CVE-2022-4399,0,0,94fdc7d9e4920644df524811c5d8899c45d13acd8330ad6e2ba1760742651413,2024-11-21T07:35:11.977000 -CVE-2022-43990,0,0,7dd25d1ddb9f90d09fd38f1b198920c9cde96f3b24d8a7d6b0e95f4d5c051987,2024-11-21T07:27:29.280000 -CVE-2022-43995,0,0,b86b14e0f07245dae778575d22a4e55917b16ced308a45ac369a1ab9adc0e4b8,2024-11-21T07:27:29.393000 +CVE-2022-43990,0,1,e46ed1873bf6c29193ab11de390233f76ca52b1d3373af4ff71ed61fd3f503e5,2025-05-05T15:15:49.863000 +CVE-2022-43995,0,1,a6f91ab278e7e3a6a4d4fbb008f2888f9a8f54aa6e6d951ae7980eeec9c26d52,2025-05-05T14:15:27.907000 CVE-2022-43996,0,0,00ba630828c18e66aeb76fab15609ed58e95a9331f043719b477fc96b704e6fe,2025-04-22T15:16:04.453000 CVE-2022-43997,0,0,5d2bff4fe8b21210545ccc85ef46ec6b03ff5710a78f3299f547d07e2df48f96,2025-04-01T16:15:16.800000 CVE-2022-43999,0,0,19e34db824fc2d124700f57127a89a5d531b5cf27ad8b60d188bb5683d323280,2025-04-30T16:15:29.953000 @@ -210029,7 +210029,7 @@ CVE-2022-44539,0,0,c0ff456894674bb03e9c56d5709dea422562154d5bbaad957588b84b77915 CVE-2022-4454,0,0,fe68c895354a4eab9b14e229c0b2f2243a6f10e671ee044a567e67283c9b12d8,2024-11-21T07:35:17.787000 CVE-2022-44540,0,0,13924fc17df420923af6fdfd5a9ac6e4566ce69b3de885cba4ebe0ff264c3b1d,2023-11-07T03:54:18.853000 CVE-2022-44541,0,0,5e7c5e63f9179662dc466a1fff3a273dabd037688c2e83077b363804c4ff58d8,2023-11-07T03:54:19.030000 -CVE-2022-44542,0,0,3e753218e976c04fd1c4f1375622b6c96505d2f5a3e796ecfbe58bf137249e4b,2024-11-21T07:28:05.897000 +CVE-2022-44542,0,1,e564440df90e8507585081534083b960e64a64a9242c373bd7039e2229b35e33,2025-05-05T15:15:50.023000 CVE-2022-44543,0,0,e322bf4d1bb1b34312267c4ab1620c4b85dfe18a5f672870a1edd5b39ed2007a,2024-11-21T07:28:06.037000 CVE-2022-44544,0,0,0cbebf6e9a8010c1a84240eaf1219d9a6b5bb9fbe42d47f532956edf0e5d8a45,2025-05-02T19:15:54.950000 CVE-2022-44546,0,0,4f50bc86bc898052cb28b6f4a0ed697458b93b9c51f7c3b2163ccca802850cc1,2025-05-01T18:15:50.247000 @@ -215111,7 +215111,7 @@ CVE-2023-0916,0,0,596b7dc36222b209b87b2899b78f27cf28a8f8d758e1f657c2c931f77289ba CVE-2023-0917,0,0,a7231a8da1c4d44e142bf303dc21b6784566ff4ddd3681cce4dc781b6b845f21,2024-11-21T07:38:05.767000 CVE-2023-0918,0,0,3991662f18a9da25feb427987e4c4ade19c212ca9558262d1cc8872eda6f4723,2024-11-21T07:38:05.887000 CVE-2023-0919,0,0,5305cf677997835fc8e97f12f98585f9abdf4bd59ff72c678671606015005d50,2024-11-21T07:38:06.010000 -CVE-2023-0921,0,0,9a1e4a3f663e00806efb8e2e5cefe6d79e69969d858bc01b2c36a8c3bb527b94,2024-11-21T07:38:06.130000 +CVE-2023-0921,0,1,faf523b88ab4fdb905a6f2a8d08c350262a4a3cae99654c80e7955aa1eddcc6e,2025-05-05T14:12:29.340000 CVE-2023-0922,0,0,cf60c569e8a1822a3b2b032815b27b121e14e27c2704870c00f09b54b60b9b81,2025-02-13T15:15:12.780000 CVE-2023-0923,0,0,7daaca2b1392cdb563ac6de27eca1f70a13e9211557487fd5d694051f34523c2,2024-11-21T07:38:06.380000 CVE-2023-0924,0,0,4e9e83a5f6fd36de10c8e0b39b632f1d97b68f294f9f811e519c5444ff1aac5b,2025-01-30T15:15:11.770000 @@ -215220,7 +215220,7 @@ CVE-2023-1031,0,0,f0c2d71c0798f9b4b9a720491da6b3ef1aa0247d4e03803b9eaba0ade3b81f CVE-2023-1032,0,0,77fcc52d1426eccd495d41e0ab921272a8345b6ca79a132e8c6439d82e73a274,2024-11-21T07:38:19.347000 CVE-2023-1033,0,0,b28d9102d05ee07421b322e9221cd65a492867a73157c7bafc4ac4bd211a216f,2024-11-21T07:38:19.497000 CVE-2023-1034,0,0,6cef5d71b24864ef8fea0fdb0b519564247133adfeaf8c0426c14cf78c223ab2,2024-11-21T07:38:19.620000 -CVE-2023-1035,0,0,91ef7939446a9bbb29db35c721c7b43b6db0c91d24495f0df58d62fe3fcc73b4,2024-11-21T07:38:19.757000 +CVE-2023-1035,0,1,e985881d5c5dcc02283a72c78d15a90129e0d63b94393a79cf46bcc7eef99557,2025-05-05T14:13:50.337000 CVE-2023-1036,0,0,3cb6547b2988ac23971cf3a32fc73ce5eec79b22f0af1f9ff45190c4b68d8f50,2024-11-21T07:38:19.907000 CVE-2023-1037,0,0,118a2e9c7bd40b84ed744da47d12028a656b490b0b5a3b2b441e0fbbaaf2bd06,2024-11-21T07:38:20.043000 CVE-2023-1038,0,0,a04b32ed84a9757d56fc4e89edb9b20c76dc991b32ea535064e758ba079ccec1,2024-11-21T07:38:20.173000 @@ -215571,7 +215571,7 @@ CVE-2023-1397,0,0,a32622303f05dfa8861d339a07430d40da1928c25f1a758930bc5b4938a02d CVE-2023-1398,0,0,4801f1c79e23eb5e524049fb56356b28ef75cafdd4656ecc95ac4834beecb15a,2024-11-21T07:39:06.657000 CVE-2023-1399,0,0,2a6baf6eb2d2cdcdc3c54b5a48379f795bf5c2b50c75dabeeb29a3b6d6be3645,2024-11-21T07:39:06.790000 CVE-2023-1400,0,0,82efe740e160ce691762fc5e8b644afd9f687070e2c167501a32b788a96d5bdf,2025-04-23T17:16:27.490000 -CVE-2023-1401,0,0,446a4ed022a1c5c6a532ccefba91ee1d1dc150f68119d11ed95f6e2ef74b13c7,2024-11-21T07:39:07.017000 +CVE-2023-1401,0,1,c03beee025254b8094ee0b4f2e68b13afd12b549d5eb26c0ce9c783ebbbdbda5,2025-05-05T14:14:52.670000 CVE-2023-1402,0,0,d94f3781ef1c97da331985c79553601bfed02974ebc48b3a2025272b504712ae,2024-11-21T07:39:07.150000 CVE-2023-1403,0,0,41359bb3315c9ed5028419254e1fc1af82a197e340dc56753c98da3da9060125,2024-11-21T07:39:07.290000 CVE-2023-1404,0,0,7de066fe901bec60cc95094448c93e74f3ffe86294e31187ecdd090526c8b5a6,2024-11-21T07:39:07.410000 @@ -217206,7 +217206,7 @@ CVE-2023-21262,0,0,7062836e18af3050d1fb86c5bdac78f453f4d42fea3980d83992a4493f8ce CVE-2023-21263,0,0,12c44f5514bec52a3cee00d8c22818b3d7cc6bb95d44b1f17bfb05921b74ded9,2024-11-21T07:42:30.787000 CVE-2023-21264,0,0,a4cebc3758d6d65ae6abca843322d0b9f8d21e739e3337bec119da3451e0be14,2024-11-21T07:42:30.903000 CVE-2023-21265,0,0,8c414f17a9aee8acf98e3dff3a8e03b89b3909d30d9c46bb8a82a1f12b9abebe,2024-11-21T07:42:31.020000 -CVE-2023-21266,0,0,41056af2ff44c658c3d7400d35b437dca755e0d267939a09aed4042fcf6b8545,2024-11-21T07:42:31.207000 +CVE-2023-21266,0,1,fa103ad6b5df256265651b0098f9259dbda6170c8817f7105736bbf756eee29a,2025-05-05T15:15:50.200000 CVE-2023-21267,0,0,6638b0087b6d8932602002a7e8d08da2fed80a4581d01b616763baebe7bf0683,2024-11-21T07:42:31.333000 CVE-2023-21268,0,0,966b6eaa52dc2224769524db7defdbe0f2eaa7a2a6172417194471cfbd373807,2024-11-21T07:42:31.460000 CVE-2023-21269,0,0,c88325238d3e3688bd26fb079dfc796c8c700d8d0bb88fb8fe9ce0403d8347f1,2024-11-21T07:42:31.587000 @@ -219158,7 +219158,7 @@ CVE-2023-23570,0,0,ae53d991ad0c75a8d614e639cfcf469a900c6650f6f42c86386439cb758fa CVE-2023-23571,0,0,8a49a84a526a246de40c6dc2d0c0c8d4f6fa8e117174b590fd0a9945ca3b6365,2024-11-21T07:46:27.017000 CVE-2023-23572,0,0,62cdba53fe6ab1c76ff42b801facaae235c9d9cc165d3a7ba35148f0a057c3fd,2025-02-11T16:15:31.730000 CVE-2023-23573,0,0,ba23d7cdf939fd80f7cd09d194e588844fcb4a2e3d1bb4517d52aca7a9ab82fc,2024-11-21T07:46:27.313000 -CVE-2023-23574,0,0,6b8e1b9069b77ce53df3b97da459e099af7d6eb31ee0177031f7ab026f682263,2024-11-21T07:46:27.420000 +CVE-2023-23574,0,1,bbd0d3d377ca96b8b8e8b15f83f79a62159bc8ae052fe092189de3817f82b693,2025-05-05T14:14:46.427000 CVE-2023-23575,0,0,09c74e176ccd36339557feac31d13abf673cd695d12689c5f877ea5e1bc7d72e,2025-02-11T16:15:31.950000 CVE-2023-23576,0,0,b405b358621de0304b34c52606701f079a0d031c87fbc51e9c9871767414aeb6,2024-11-21T07:46:27.683000 CVE-2023-23577,0,0,35e6d00d873e75d44ccd785241ea1e21f439594a9f2f964d4076d28e241d691a,2024-11-21T07:46:27.793000 @@ -220902,7 +220902,7 @@ CVE-2023-25666,0,0,86550a5bc2365842828e104139abea119cd36daf6b51660c6b9fed2be5124 CVE-2023-25667,0,0,7063ad2f427f3803430fb93cc6f69fb561dee21f54452abb690226dfd709dffb,2024-11-21T07:49:54.343000 CVE-2023-25668,0,0,eebc03a11305e809d7d2625c8d2bab19163084a693184a59b3839a32cfe9f97b,2024-11-21T07:49:54.470000 CVE-2023-25669,0,0,a1a153f751d4238e02d08ce633305b41bf47c0c848660b59b043656edbaebc12,2024-11-21T07:49:54.587000 -CVE-2023-2567,0,0,d3c076f9076ab5a5e937f9e2d7629ec46b9ed784e85b3eeba6570e01951d1f35,2024-11-21T07:58:50.747000 +CVE-2023-2567,0,1,ea44557297053fdb33f29d82816a434fc4a25ab8d7f12e7976954956d05aae6e,2025-05-05T14:14:43.813000 CVE-2023-25670,0,0,cdf046f5b1bb9ff63ee3c7c960c05ebe4e2dd47ba3aafc9b34d8e460c1677321,2024-11-21T07:49:54.710000 CVE-2023-25671,0,0,4a04df5f48ac79a78a9eb3f1c52c5f83702728fa06807c773213fe5ef76a08c6,2024-11-21T07:49:54.827000 CVE-2023-25672,0,0,1f534fa7236af88be74b59bee042f672ef6350eeed69d11b3d886b80ed86d63e,2024-11-21T07:49:54.950000 @@ -225852,7 +225852,7 @@ CVE-2023-32001,0,0,4a07408f1073d1dfd64916d583f7252d5700ef7a939deaf6950132c34c0d3 CVE-2023-32002,0,0,eb5de656fd5e345de7e98b2c256c6ce68a869bba5d4d43d360f7549a0827be7a,2024-11-21T08:02:30.353000 CVE-2023-32003,0,0,d910edc55f8c5c75b8a55456003b1975ff031f2555c8bedae971a7016a21c1f6,2024-11-21T08:02:30.480000 CVE-2023-32004,0,0,cbbaa092062a4f5510a61e528f98f6b50fa674934ad1ed60d751841c90d435e5,2024-11-21T08:02:30.617000 -CVE-2023-32005,0,0,6d4155b2672f33e3bf5b22ec572249b8c49a4805bfa01f83395becc1d3c4a3a7,2024-11-21T08:02:30.747000 +CVE-2023-32005,0,1,377aab83ba1e669dd4b43d6d2a70427f1c9de374d5e735c54712de5b3ea69bf9,2025-05-05T14:15:28.120000 CVE-2023-32006,0,0,d210f7ae470fbe6e4f3a8c259718564743c91cb71fa2e515e00cd5c340e22f37,2024-11-21T08:02:30.857000 CVE-2023-32007,0,0,a7f4defaf6106504b5e4467886e0f94b050ca341bdafacdbf0d17720699bcd3e,2025-02-13T17:16:29.410000 CVE-2023-32008,0,0,ce2c47932dbd9cd7e200b1ead822f30561332dd76259fcb9af4c00c2ee6998ba,2025-04-08T14:17:29.320000 @@ -225898,7 +225898,7 @@ CVE-2023-32045,0,0,6806b381fb83d1d65b0304d5f2c111fb9450cb947867afbbdef666424f8c5 CVE-2023-32046,0,0,ad9c814cd77fb40a827998342e25977be47e487b98c7ca5bc0bf7c87b36aa482,2025-03-10T20:45:52.913000 CVE-2023-32047,0,0,dd872c626a54ae37928bc11d8a2d53e4e59d57c0e0636c20d31bdc391f716f53,2024-11-21T08:02:36.427000 CVE-2023-32049,0,0,c0b222c9974b6e1b631fa8a835aea0bd3842558529de4974dbd89c9a75ef3673,2025-03-10T20:46:21.273000 -CVE-2023-3205,0,0,50c3646828134388f0e89125545b3a97a9759f53a21ad52dad825f46f2ba40bb,2024-11-21T08:16:41.637000 +CVE-2023-3205,0,1,a61613af50ffb6b512078f4767c5d86a1896519f54c8042a67af273178c48a17,2025-05-05T14:12:22.513000 CVE-2023-32050,0,0,6e6eab390f48e9a9854dfb0c7f4d8bd90f21437b5a0cf5482c1b3d94019e4630,2024-11-21T08:02:36.673000 CVE-2023-32051,0,0,e28d488bef227a840144c7d3649e0e8b2a0cb4501b7002045c5ae6fe6cddd6e9,2024-11-21T08:02:36.810000 CVE-2023-32052,0,0,36fd2ce403493c09343cfecfbe07111dbce91049790b71367a67d81c5134fb43,2024-11-21T08:02:36.947000 @@ -225953,7 +225953,7 @@ CVE-2023-32096,0,0,bbeaf73d8539d9cf214ea340b6f097657de9e0cde8e9999b421657beb8d92 CVE-2023-32097,0,0,bfd934f464ec434450cd17572e0a166018a22064038de6343d70af053c6b81b9,2024-11-21T08:02:42.247000 CVE-2023-32098,0,0,f3bbb0c0f9c30551da2974b258c574eba3e97da0a7be2b8ad0b5cd0f0d1f0778,2024-11-21T08:02:42.360000 CVE-2023-32099,0,0,2316d8c1c11a7785542ff81306c35caeeb605be502312c6f59a1788b52fb6139,2024-11-21T08:02:42.477000 -CVE-2023-3210,0,0,63fa519620e47876f7b9b56d01dbd0381bec88c013505c524c317cc99e3766f8,2024-11-21T08:16:42.243000 +CVE-2023-3210,0,1,c7611de26fbe6bfbae0f2c1261de18106ab68f962606e4953dec05814389176e,2025-05-05T14:14:12.877000 CVE-2023-32100,0,0,54deb1963ec78b4310f99c3986f51c01cd673183a7e4d1c4091f179ddc11ab6b,2024-11-21T08:02:42.587000 CVE-2023-32101,0,0,1f23bb498c2e5d5864951fd3bf1409ba6cc545c6d017962f6b7704df4e3c9636,2024-11-21T08:02:42.700000 CVE-2023-32102,0,0,e9f669e32a168979a1e1f6ff39c44f1bb94c2c56bdec0b3a2bcbd0be97616d87,2024-11-21T08:02:42.820000 @@ -226237,7 +226237,7 @@ CVE-2023-32372,0,0,3735b4d95466ee316c3a874d27abb685a259a2edfa2f44f9a0507c56a6f3d CVE-2023-32373,0,0,baf19a27c54c416ea4f031b5229e672209b66abb2f0ef2d9ede60a2a4dd4cf2e,2025-02-28T14:58:09.683000 CVE-2023-32375,0,0,363d658b705a2905988a4381992e7e285988cfbbe26cd1b6b8bb78ee269b1a27,2024-12-05T22:15:19.837000 CVE-2023-32376,0,0,95a529e4063990411c2ca53ecf165580bab43c05d8c5d78dd3562ccd8e98cd87,2024-11-21T08:03:13.820000 -CVE-2023-32377,0,0,ba36bd37b2f7c1e17d958e1f4d12ab4bfd5e2df22ada13420271f58cb2eaa905,2024-11-21T08:03:13.940000 +CVE-2023-32377,0,1,5edb610fe3f6955e8487692b909616fb875ed39bebfe95102ddd822179bcbb1c,2025-05-05T15:15:50.970000 CVE-2023-32378,0,0,f54c67e8e0b2a33a016cfad22ffcebe8d6c3b8cf66a297c08f57a19a2256dc18,2025-04-17T16:15:26.570000 CVE-2023-32379,0,0,223f8f4e369a5cc5760451695cf10034f949a649e540d2e810f9d2f13e976e4f,2024-11-21T08:03:14.163000 CVE-2023-3238,0,0,d28201073e1a00b996af838080d16d78f68f379c0277d3f17d97e64a237de326,2024-11-21T08:16:46.277000 @@ -226321,7 +226321,7 @@ CVE-2023-32454,0,0,48d17944d6a0bb31ad2d767a9668953ff7f1a161f1eafe11c7e2a76038194 CVE-2023-32455,0,0,79b2af405e0269e2cbd01297eac5d569c49f95e0b5377d24e8dd1a02fcb45a3c,2024-11-21T08:03:23.333000 CVE-2023-32457,0,0,4f5291e05bbe67496c719ebc152de71ca0240eefc1a95c1d9f961b6070cba8b5,2024-11-21T08:03:23.460000 CVE-2023-32458,0,0,7eb230731ddb6d353e1bdcbfbc62cf59aed6c4567b70ee6a4c4264fc5d1d34de,2024-11-21T08:03:23.590000 -CVE-2023-3246,0,0,bbc016930f562dd101d0ad06f0bf85d940a345708c9287f2dd3ac8f13119babb,2024-11-21T08:16:47.490000 +CVE-2023-3246,0,1,1a8e0710359d3568253718762b33d65f7eac3ae14dda8b8e6a2ac98e50db8a74,2025-05-05T14:11:41.087000 CVE-2023-32460,0,0,5c573bb13d44bf9d15e062a2aff259f1475cdcde7b8a4dc29018666a18995a8d,2024-11-21T08:03:23.720000 CVE-2023-32461,0,0,d558ecad6b2cbb9d4c764307d93716e775c42b7d7d6d5a412ca5b0549652d633,2024-11-21T08:03:23.967000 CVE-2023-32462,0,0,711adae30e773fae9cb02d9743d41a081fa112c58b2165a349190b69dd1037c7,2025-01-23T17:02:15.480000 @@ -228032,7 +228032,7 @@ CVE-2023-34436,0,0,a52f77ff4f42a3172ca9550768dafa87476b7004abe076fb25d6baa1c4951 CVE-2023-34437,0,0,ffb79324976fbf84ac4d9e947b2be353dc963e1d633e0950540b6e05b6d482b2,2024-11-21T08:07:14.437000 CVE-2023-34438,0,0,b1351877679d083cdea48520114a3ba271110b3005df5aeab817e94a4af9fed6,2024-11-21T08:07:14.577000 CVE-2023-34439,0,0,12d92365a2152a8a9155546ccf2a86cf9c93fef7291f80b49dd113e259a0090a,2024-11-21T08:07:14.773000 -CVE-2023-3444,0,0,220a87bbe3078548160a6777a82d48dc37b4c465b19e91b67a6f77a1a2e33e38,2024-11-21T08:17:16.947000 +CVE-2023-3444,0,1,fe99b7e7ab8b57b320c8f92b713bbbdf8d1e478d4ea504cdee87822c511e1459,2025-05-05T14:14:17.207000 CVE-2023-34440,0,0,8c67c57ddf649cb8b6d2247eb3253f51f17696d0e1baa8fcc1c13145071747f4,2025-02-12T22:15:30 CVE-2023-34441,0,0,709e6ca0756a1b647c79a79106806eec5ec48800f14208889233880446473911,2024-11-21T08:07:14.900000 CVE-2023-34442,0,0,c2b230e98e8578d0642c5ca12d198416aa93a1d597dd2fbe9c88cb899c4d004e,2024-11-21T08:07:15.040000 @@ -229874,7 +229874,7 @@ CVE-2023-37196,0,0,fe51177415a79d8a1be4f3c6a2cfe807b0088d5f23072b357fd553d9cfd21 CVE-2023-37197,0,0,0c8845fa0f2ad0a7190c4ccdc2a39c094f3d6e3b8706fd1c6efc4cdd1d1b25d8,2024-11-21T08:11:10.457000 CVE-2023-37198,0,0,fb0d5cfa16c43dce0388204170a34886ce9a2af494999b0d1b977da1b770b574,2024-11-21T08:11:10.587000 CVE-2023-37199,0,0,24bbd612e6b8da0633162370c5c9e6adea3ad25fd89c27049b7f6909f38811f4,2024-11-21T08:11:10.723000 -CVE-2023-3720,0,1,54536bbb6479b8811dd7cb0344f53080b3da93c2d30f4f15a4a3177f10bb1f37,2025-05-05T13:15:49.023000 +CVE-2023-3720,0,0,54536bbb6479b8811dd7cb0344f53080b3da93c2d30f4f15a4a3177f10bb1f37,2025-05-05T13:15:49.023000 CVE-2023-37200,0,0,7a50a629a64ef037873707d53dda21b7b323ed5920d2575b55400604f9f3aa5f,2024-11-21T08:11:10.860000 CVE-2023-37201,0,0,4ec503d6dd1bbab98da13c965ac49c0f309908584451c12f8dcb59191d317aeb,2024-11-21T08:11:10.990000 CVE-2023-37202,0,0,fba2e95a6a1831867952e5193d249c88f259b61740c43eceef8c2329fcdc69e6,2024-11-21T08:11:11.143000 @@ -231425,9 +231425,9 @@ CVE-2023-38946,0,0,f2edf9352f8495b3ca5311cea746301b6200567518be1e6d5e0353690d9a4 CVE-2023-38947,0,0,4b170c719db2192efd9102401f3f6cc979e345599bd9ddb234da0273152742ba,2024-11-21T08:14:30.630000 CVE-2023-38948,0,0,7f9a4531f6471458e67c1014544195b67754e27b0669a00f971903e09a3b5f0d,2024-11-21T08:14:30.857000 CVE-2023-38949,0,0,c240796243f9ded0b6052fbc9a21be405bd0ca548837dcc16f4cb50e1af9c800,2024-11-21T08:14:31 -CVE-2023-38950,0,0,4dce9fe8270d2ee198bb2d8d53fd7a466f1a8d730fb284e8e2d4c23ab0c48b1a,2024-11-21T08:14:31.150000 -CVE-2023-38951,0,0,b21a2377eaf336b5e9f03d6e4f9ccd78f4cc1d349f0cc031338673795bd80912,2024-11-21T08:14:31.290000 -CVE-2023-38952,0,0,63e72d1e7edd42e21d4b5092c3244ba47593c2b43cfa80e32203b55f773dd2d5,2024-11-21T08:14:31.430000 +CVE-2023-38950,0,1,f7dbb38078600c5e503bb8e376e57d8f42e2d1f1d41fc3d7220cd495185abafe,2025-05-05T15:15:51.503000 +CVE-2023-38951,0,1,cd6d31678c014b40411eb7b43ea2e2f9cf52d1b4a7c9bf2f94441e1fac064481,2025-05-05T15:15:51.660000 +CVE-2023-38952,0,1,3130468c4c5c5e5e072a3544fa07fb6ab1e5c8734864bc05f133df323b441581,2025-05-05T15:15:51.783000 CVE-2023-38954,0,0,7b8cf85856f7a78d65e2b54eff61a47a1b63674180e3bc22f06310f24e461059,2024-11-21T08:14:31.570000 CVE-2023-38955,0,0,fac357f6185dc5d8c9e0de514624c1c744d8dc53275fadc62d64a249268d3ff3,2024-11-21T08:14:31.713000 CVE-2023-38956,0,0,38afcc3f1bdc1d5c13245358bddfe34ec5264f64172b44ea151dfc803d393800,2024-11-21T08:14:31.860000 @@ -231500,21 +231500,21 @@ CVE-2023-39056,0,0,138caab92e2efc8062af775508d7e9da7767ab9fedaa06d29c4baf2de6cf5 CVE-2023-39057,0,0,bdd90acc3c6b87c57ed383bd011d3bd7142875f6ff374aebae23cdd02da8b971,2024-11-21T08:14:41.677000 CVE-2023-39058,0,0,84c75597b71198694e3f67084f467cf2e6e13ea15654adf04afb367967dd5625,2024-11-21T08:14:41.850000 CVE-2023-39059,0,0,1d169aaf249dd774ea2b5abd0d79919c2b2abffcb04baa6f898227630123c5fc,2024-11-21T08:14:42.013000 -CVE-2023-3906,0,0,43a17b46239fb87a69316eb3392cd2514b1fb93188aec0a3a8215329ab01c3f3,2024-11-21T08:18:19.783000 +CVE-2023-3906,0,1,c68a6dbbe6a7de5ec504085348b6807f1782398971294964dd9e8bf24ccf9512,2025-05-05T14:12:08.757000 CVE-2023-39061,0,0,b29b1cf147410f57071a97436f35b90a8dc3ea0efe6d4b06f99e59d55e127710,2024-11-21T08:14:42.187000 CVE-2023-39062,0,0,a69799f7d0a4aa84a4d8d8143286f1254b3965b303c65d00a9dab17a4009045e,2024-11-21T08:14:42.360000 CVE-2023-39063,0,0,59bec58b4a964df08768e8b76da2dd6c010960ff17c2477ef11a9e4b820c3b19,2024-11-21T08:14:42.523000 CVE-2023-39067,0,0,7c2869dfc102f273e0d2bd756d216e108f9757505fc388615320b8393911fc03,2024-11-21T08:14:42.747000 CVE-2023-39068,0,0,78042324453a3a47daed792062abf132a8e5ad3df36a9e95d6d9d453afb4fdd5,2024-11-21T08:14:42.907000 CVE-2023-39069,0,0,8a8cbdc3500a3d7367856db20584d97cc9930614b4fe6fd3c65b7fa7fea48a17,2024-11-21T08:14:43.067000 -CVE-2023-3907,0,0,8cbdd4650ff8274989f92ac99892cd19dc275471f245143cf3d84e1e164e67f3,2024-11-21T08:18:19.927000 +CVE-2023-3907,0,1,cc5cbc58ff48c973798814e4dfca17c209390ded0beab2758ea08205a275cdab,2025-05-05T14:14:48.773000 CVE-2023-39070,0,0,cd6c5cd1cb650d102e9cb86f954ff0b83699a2891b609c2b5477e32afe145bf9,2024-11-21T08:14:43.217000 CVE-2023-39073,0,0,fd47385843e24ff102964187512c931081304396305eac4cbaa4f96d35ec01ce,2024-11-21T08:14:43.370000 CVE-2023-39075,0,0,a9e4bf6691f22e74305634fb13389d537084810c47a3082d6ed9335f6d13a5ff,2024-11-21T08:14:43.520000 CVE-2023-39076,0,0,a8b8108e0efce66947b40e003df670e62a2d70f6f9cb3f9f6415439ad2cbe3a9,2024-11-21T08:14:43.680000 CVE-2023-3908,0,0,552fa1e9d9b6ebdbdf271fd069788c1d27ab4c3fc9bc78f5642dd2a0959cead3,2025-02-11T02:15:31.720000 CVE-2023-39086,0,0,8fd5a07bab05e2b79020430f0de41f2c2a4f0b5a42c484a42f367e3e5e01946b,2024-11-21T08:14:43.840000 -CVE-2023-3909,0,0,6937148263e852eb651b2475d72cb2c857bdf0b7b7f5e3fe437f8d7339b18f80,2024-11-21T08:18:20.067000 +CVE-2023-3909,0,1,2ab0bea0a0352ced4012c9c596893e9cefe998435aebd03960e9ea245a0ecaf9,2025-05-05T14:11:38.977000 CVE-2023-39094,0,0,6c0d713916d53365dff8241c45db4e83bc5bcd4c0cb063201233fd46abc002d1,2024-11-21T08:14:43.997000 CVE-2023-39096,0,0,f9deb7ef479626b342d6e662a93fd67893f470751e8ca92879d2e025bad23985,2024-11-21T08:14:44.143000 CVE-2023-39097,0,0,dd576abaf166e212545ac40b247cb399688c91a224387523990011a4ff9e2137,2024-11-21T08:14:44.290000 @@ -231595,7 +231595,7 @@ CVE-2023-39196,0,0,a65ce3ce09ab370e390ed71b7f02ef18f50124b52645fdcacda79475f5bee CVE-2023-39197,0,0,7622afd3fef93aa601dc56be5f18b0cea50e36d1efa43f7efaf2809bc82ae690,2024-11-21T08:14:53.713000 CVE-2023-39198,0,0,bd33d6f28c8ae984abf90546ad027ac9cf1e7c2def22fc922c1293ac68209f70,2024-11-21T08:14:53.863000 CVE-2023-39199,0,0,14869ae4105ad417e0524c8c999c01f6181039967208cddbc6adcf35c28d13dc,2024-11-21T08:14:54.020000 -CVE-2023-3920,0,0,6c4325437b9b46a0b4aea0aa1bac973590542aa064f2d7190fdb637072bd0782,2024-11-21T08:18:20.660000 +CVE-2023-3920,0,1,4d11ff95f91af79408ec6c0ca4c096c79896807ac3df5fbdee9ab622ddf21a12,2025-05-05T14:14:55.773000 CVE-2023-39201,0,0,305e735a2b9e0869070066d97678727f45b4f518c34ca8bde9f401d849f4fa64,2024-11-21T08:14:54.173000 CVE-2023-39202,0,0,7defe6346dd394ec369322d886dffeedc8814e796ba178fca59e07810aa521d6,2024-11-21T08:14:54.310000 CVE-2023-39203,0,0,b7f100d09596807cfdb22b3177cf510b82e0b10519c5f21b400fc8422b061939,2024-11-21T08:14:54.440000 @@ -232321,15 +232321,15 @@ CVE-2023-40112,0,0,8cfa7aa433e6be590742e39db58a0b094a6b9f50b8d62059c4a5c1a7757f1 CVE-2023-40113,0,0,45c2036c5618ec0d85bf3351fa1f90ed02b39f20a68780abae1e790464db81cf,2024-12-13T20:49:29.973000 CVE-2023-40114,0,0,5f34b5d35a216d6e4daa3fc19db3ed034b4519ab12a3abb1612c597ef0cff40d,2024-12-13T20:18:49.387000 CVE-2023-40115,0,0,8ea1bdc761822b41975c8bdce57c67f3fcc5e1d3112382d523599b0f63d413db,2024-12-13T20:17:13.090000 -CVE-2023-40116,0,0,07cb725b83b5b10e38b44309817f7751101900721fb69912aac618a6148cb7ef,2024-11-21T08:18:48.660000 +CVE-2023-40116,0,1,e299e28f73d860f729327818628a6d31bb0e420a1bedce88f4e09d5126aaa1ec,2025-05-05T15:15:51.907000 CVE-2023-40117,0,0,f10b05f9b4ddd454c017cc20b88fc7f7fd8d1827266be46723f5103122fbd57f,2025-04-29T20:15:24.663000 CVE-2023-4012,0,0,d0ccc28fc9c300a83e9e04c2500f6d0464287270dd40cbde585b16f9a7bcc2c5,2024-11-21T08:34:13.667000 -CVE-2023-40120,0,0,3a061c10a0f2142df09c556f360dbc985a4d6658aef6d3f480e4bd1e05a8a8b7,2024-11-21T08:18:48.910000 +CVE-2023-40120,0,1,56c39f0f43133101003f0798473d97e01ec2f898505d2936a31cc1e89e724d02,2025-05-05T15:15:52.083000 CVE-2023-40121,0,0,0fc0a905a2a8dec81d6b48461b1bae5326f64f2ed4e4b464844bce512f1dafbd,2024-11-21T08:18:49.030000 CVE-2023-40122,0,0,e5f652511263073b8f421775658dee6ba4663a9c866d5598114041a2e3078277,2024-11-26T16:32:40.380000 CVE-2023-40123,0,0,7136d01d46c9c40204c498fc55a4d3983bb6ea722109ae613c6e685fb2c2e3be,2024-11-21T08:18:49.267000 CVE-2023-40124,0,0,d1daf92f872ad28adde18c3c3a5796a58dde4862304ab1b03729051a0f3e2549,2024-12-13T20:10:19.213000 -CVE-2023-40125,0,0,8577b0aae1eedb3b44858c4977f2d7cf24fcb6e42dcca97d88f2fe55016556c1,2024-11-21T08:18:49.587000 +CVE-2023-40125,0,1,932f54693b643e56a93b3f8e877efdf306aabae7dc65660a5398d3e0bb7b242c,2025-05-05T15:15:52.230000 CVE-2023-40127,0,0,7430d82d12aa407540c5ab1c9ae7c6053d8b0e53c8bf75af044895fcc6cddf84,2024-11-21T08:18:49.697000 CVE-2023-40128,0,0,282631894a102d5a4846ef8127341715cfdea8d0d379e1fc5a9292387f94e8cc,2024-11-21T08:18:49.820000 CVE-2023-40129,0,0,4dd2dc96251ed33b386eb4bf36dbfc8133a1074a121884b0e6efce82c7a5e96e,2024-11-21T08:18:49.950000 @@ -232467,7 +232467,7 @@ CVE-2023-4028,0,0,e371668464f4c8eae1d569b0c0c0d47a37ec5ee2caea789c23ca7173cb1877 CVE-2023-40280,0,0,c45cf50ab63830f7a9f75e4a63fafae07d7eaa4f6f787d86e26989914d6bb95d,2025-04-14T13:39:52.433000 CVE-2023-40281,0,0,2b1967fd2299129e7658c6dec283a26e1de7f1934f9fe51581bfcd4cbbb260c2,2024-11-21T08:19:07.793000 CVE-2023-40282,0,0,3495f927d5ad5272c9834124fb4964646ea624e090ac7c537b5897b79aa7b7d5,2024-11-21T08:19:07.933000 -CVE-2023-40283,0,0,681b338db73ee5f9575775387f2ee47d603b6b3e45e461e477a0a32424a04c44,2024-11-21T08:19:08.070000 +CVE-2023-40283,0,1,ea7d04ab8378169ffa827568dcd4ccaafd56803cd46ec2dff1857c0ffb061d74,2025-05-05T14:14:38.967000 CVE-2023-40284,0,0,40ba64baed4793876d0e485c57177d63d9a0d12da7128802be6f21404b6b98db,2024-11-21T08:19:08.287000 CVE-2023-40285,0,0,22b4e095aff74d270c32024f39e10fa3d5174a6ea33b0ef27a5c9da66ff4b68e,2024-12-06T22:15:18.837000 CVE-2023-40286,0,0,a6a645b0a40f614cf14f6ee60b22fdd41c9e579772081f2191e4b7d4edbfca6a,2024-11-21T08:19:08.693000 @@ -232588,8 +232588,8 @@ CVE-2023-40413,0,0,cf00141c771e8b4301a1038bc20d7fab59a9e4b72d494b2fdde5ccf917d9b CVE-2023-40414,0,0,824cc719d2f919dd510d533d67bb8209810e73c8ab63a82873d065f774f8070f,2024-11-21T08:19:24.577000 CVE-2023-40416,0,0,7bb5997c1ba9179520b1b2ba66c0ddb9c7a27e2563c5bbd1ea3ab0a8b82d4005,2024-11-21T08:19:24.717000 CVE-2023-40417,0,0,716047487bdcd3d424bf7127a4857b37cacbef9f92b0bf4c25fcd15461aaf9e6,2024-11-21T08:19:24.893000 -CVE-2023-40418,0,0,e3e864b3df419acf1e206122b479240da76768ec0dd9d4c87a6fbedfbbabe0b7,2024-11-21T08:19:25.037000 -CVE-2023-40419,0,0,502ccc817b2821b73bfa6b490a9084141cfabe7f4ed89be876588f8528f60949,2024-11-21T08:19:25.167000 +CVE-2023-40418,0,1,6fc1976f104367d7457ec9d4d594361a7d0d104f20478cbe44c9462eb22ff75c,2025-05-05T15:15:52.370000 +CVE-2023-40419,0,1,47aa9a7075decc265520518aa18bbc915421ce0869695810118e660604c890b0,2025-05-05T15:15:52.537000 CVE-2023-4042,0,0,36ccf9ee8dc7e07d3a796eae812cde9e581c3a58fd11a69ff09ec3919671e87b,2024-11-21T08:34:17.053000 CVE-2023-40420,0,0,d0448076b873a609ab36a9714d028dfb0a9ece55db8ebc54316d2954e545f346,2024-11-21T08:19:25.307000 CVE-2023-40421,0,0,ab86b9aa1e0a68edcc6b4581cd06fcb9d7b87589bed51e1b8f8c14db2fa14965,2024-11-21T08:19:25.463000 @@ -233096,12 +233096,12 @@ CVE-2023-41058,0,0,470fa772de784781cb1af962887f9f1fa544cf96e26a275a911fb298344d9 CVE-2023-4106,0,0,aee4575b6bdf6692cee5993128ee226194b0209efe034a12fe845e72b8e82ba1,2024-11-21T08:34:24.353000 CVE-2023-41060,0,0,8acbf53c221aa8609455ec7009a2cfd1d896c4555480736ac3e300fbb5307d69,2024-11-21T08:20:28.793000 CVE-2023-41061,0,0,51f7d5bec3db4b4922f90bd9e41c0b71fc7a7ea6b11425d8b5b9bd5abb61bf60,2024-11-29T14:27:09.157000 -CVE-2023-41063,0,0,201d4f1370e6bb557e49bc49102255275b7136fd46e104de566667668fcbf829,2024-11-21T08:20:29.117000 +CVE-2023-41063,0,1,9c5f59abc5d190080fc45f5d45be123c7f6fdebf958be39c4843132f7bb07af8,2025-05-05T15:15:52.710000 CVE-2023-41064,0,0,42cb25cd0e83eda89b13c07146192159b474fb9f308513d596b5480b764939ea,2025-02-10T17:52:50.483000 CVE-2023-41065,0,0,7c9d34b2be3b8ffcc8a5f9fefc26e5797a4e98ed595d93b611006a9fd40e1baf,2024-11-21T08:20:29.377000 CVE-2023-41066,0,0,7fcccf01dbe2851958d26144e25ca86168baf1325738da8944d134156bc88dfa,2024-11-21T08:20:29.540000 CVE-2023-41067,0,0,be7093ae210718b9259fde08f758542a3144a7d18833986a4c00347c1e05442c,2024-11-21T08:20:29.687000 -CVE-2023-41068,0,0,192ddb10d4a23820516d2ca98321a87ccee6388fb0887245455e51f074039dc8,2024-11-21T08:20:29.817000 +CVE-2023-41068,0,1,626b9b1b32ef89ca0fe3b54c9b103ca8a1afb56461452096f2d90ee3cff9cbc6,2025-05-05T15:15:52.913000 CVE-2023-41069,0,0,9665c81a54633cc6e14c473b57622288ca287cb4232348d7b2b5987e6b08f0c6,2024-11-21T08:20:29.960000 CVE-2023-4107,0,0,3a036e120a9f48c233b5a37db6dacec3f722d5432e3a0ebe202f0e527102b3bf,2024-11-21T08:34:24.487000 CVE-2023-41070,0,0,3f998954ff9b1d569b7b10202e44ebd595e5ad6538985bde30493d6b58f8f7f7,2024-11-21T08:20:30.093000 @@ -233445,7 +233445,7 @@ CVE-2023-4148,0,0,18067946d798998c8b88d6613cfd5ae65648d69d73e0e005665f823bc2f731 CVE-2023-41484,0,0,eb80d679bc0ff0456f1b1dc2c179d5f34eaba99d134ae694ca11f3716f0b9cef,2024-11-21T08:21:14.333000 CVE-2023-4149,0,0,1718707782e58fcaf5fb2653825430b9dd33e032a0a07a964acfc3bf09d4d07a,2024-11-21T08:34:29.230000 CVE-2023-4150,0,0,69840ac6b36e455ea0e9a316c72214220fb9bf855288d2eefb3cf95ff570ac21,2025-04-23T17:16:41.570000 -CVE-2023-41503,0,0,822c7e0079ddb46f4c94411519bfeb5f802f433ceb1343a8087a2673dffd2784,2024-11-21T08:21:14.500000 +CVE-2023-41503,0,1,70871c7255ded98dbdd9a0fef2b78b876f2c82bda9568deac06ad6ae100f4efa,2025-05-05T15:21:36.157000 CVE-2023-41504,0,0,0a501b4e844d4a3cd16ecaa75d9af5a9644b2a8021a05731849ab307c6d31a9d,2024-11-21T08:21:14.717000 CVE-2023-41505,0,0,542892c6e9a5b11b222cd59017abff36cdf4a98ed7c8639aab3d6766aa874c94,2024-11-21T08:21:14.957000 CVE-2023-41506,0,0,093d4f2adb16b14a368cf141044fe417cf66ab121791b51982d90f599dcb4b18,2024-11-21T08:21:15.190000 @@ -233623,7 +233623,7 @@ CVE-2023-41743,0,0,300b87dc081073f4a60a49ce2968e64de0e216583e09a4eb0ad3f9fb1caf4 CVE-2023-41744,0,0,2bbc31f823b27294cf1bdd3bab2b59136c3c55b3bc2404622c3ac2471a0d0dad,2024-11-21T08:21:36.503000 CVE-2023-41745,0,0,42f3669b41c9732e50b7f81e6b99591faf48a9714a2e324a47e53dde5bbc4d40,2024-11-21T08:21:36.653000 CVE-2023-41746,0,0,7923996a887b453ba7564e95cb07619e8229459bf8d99a07d7353a2b244074e4,2024-11-21T08:21:36.800000 -CVE-2023-41747,0,0,ed0915ab542b0aed6f082ab7bfabc2aeb3d247af9e4511090ef577e554c3f68c,2024-11-21T08:21:36.947000 +CVE-2023-41747,0,1,f5fb7dc8a82579a0123316fcddc3c2e3b10ded7230939aad0aa7d076f9977ef9,2025-05-05T14:14:20.860000 CVE-2023-41748,0,0,931fb1991679398a5e77ba1c81acf6e68cc280f63d0b3c11632fd88826c7bf83,2024-11-21T08:21:37.090000 CVE-2023-41749,0,0,50b06e1ab4f25a324ae15269015548b2b635605ea2ed80ba0306018060b3d3a4,2024-11-21T08:21:37.243000 CVE-2023-4175,0,0,7ef3c214638e8e15c4c24188252482f2dc9a172659c334356c9ddd361c03b885,2024-11-21T08:34:32.953000 @@ -234067,7 +234067,7 @@ CVE-2023-42278,0,0,c6822e296d2947d17679e931a15b3040d5ded2ee4e2c57642de2294ad9623 CVE-2023-42279,0,0,81296cd4efac301fc85a695220ac1409ffbfc41f7db62fba143a3a85ea3d8139,2024-11-21T08:22:23.933000 CVE-2023-4228,0,0,324fe7b5e1b8dd90261b51fb78606cef50334ea9f83a5422ef00f7fc75cba541,2024-11-21T08:34:40.190000 CVE-2023-42280,0,0,8c7a3e2e7fa020287f0f7324a0478045181103321395831ce2756d0516830152,2024-11-21T08:22:24.080000 -CVE-2023-42282,0,0,460cdae217c34453c385e8dd954b8ae5b7521b517934eeaaea2a2c2658ac2bd1,2024-11-21T08:22:24.217000 +CVE-2023-42282,0,1,4a85623b5206a5c1ed3a84166283f21d8c108899de8b063f010d11fab333201e,2025-05-05T14:14:31.020000 CVE-2023-42283,0,0,4c17062cb48f6aed0478fe53bfcb9324adcb8484517a014cb0b5c041459000aa,2024-11-21T08:22:24.383000 CVE-2023-42284,0,0,851578539356c2386d7003174c272bc300f403a18586f17d1d2fafacf7cf91db,2024-11-21T08:22:24.537000 CVE-2023-42286,0,0,7728b238b2193ac4a9f1caf01393139dea3f1562965c66ef81e167897035f939,2025-04-16T15:29:38.757000 @@ -234505,7 +234505,7 @@ CVE-2023-42847,0,0,ef89253060da56e84de010d612af217bd9549ba60af8cf0fe5c6e39361b06 CVE-2023-42848,0,0,41afc67e6cb759cc2716081163a61f2a638c7941a8afcd87d6a665a042c5c438,2024-12-09T17:26:04.510000 CVE-2023-42849,0,0,e140a102d19e3920457b017a63e13939e663c6421459d92443489b4f8917d38a,2024-11-21T08:23:21.733000 CVE-2023-42850,0,0,54334b4e9a26e7dda9a6876c5d7b5cbb5e277cfaac46c75c82eb3fcc0f995d70,2024-11-21T08:23:21.897000 -CVE-2023-42852,0,0,e6fe4e48ac58948bf63acf9b410268b84a3c7dcdd7372a587847f58bbca01103,2024-11-21T08:23:22.010000 +CVE-2023-42852,0,1,f9e6baa7ff83a9cb111fc18e1c9ba9698474d31151524a0408a484fdf95db29b,2025-05-05T15:15:53.080000 CVE-2023-42853,0,0,33fba0d1c569a5e00c5e769c4ba27b19e9e5e3415ac10ac8c94425405857b0f4,2025-03-27T15:15:47.103000 CVE-2023-42854,0,0,1b847ae6b3f536ee06827e6af23c9e69d5c95c7ba7a555e91ccdc4bdf445129d,2024-11-21T08:23:22.260000 CVE-2023-42855,0,0,d73b683210c471439f24418097a00ff275f56fb1ccaca4b4a1db0b2a4b8449aa,2024-12-03T17:32:38.343000 @@ -236507,7 +236507,7 @@ CVE-2023-45867,0,0,c5950548ba5293881c74b3a11f24edec7618fa48a1057b0edd5094fcf622e CVE-2023-45868,0,0,40b498079fd380f3efc8be05a7ecf8de93dab24618d65616aa0cb8c27082264e,2024-11-21T08:27:31.390000 CVE-2023-45869,0,0,23f1d911a5119687fbd5eb685444cfff4088a5040669161b4e3b33c43519c795,2024-11-21T08:27:31.547000 CVE-2023-4587,0,0,3a9fe164cb2df923f2f50272c67b53445a791eb4750e6133681ea24bca3943de,2024-11-21T08:35:29.503000 -CVE-2023-45871,0,0,2f15152276c931c6735bf93aa2e8764da5af78c8691b69eb3143a26b1c91cba6,2024-11-21T08:27:31.720000 +CVE-2023-45871,0,1,1516e26c74b8550372d5792fdc748c49567461c4ff71f32c0b53777518e1d7ca,2025-05-05T14:12:06.217000 CVE-2023-45872,0,0,4d24e71e460fe608650758386049867baf8ea95f6f98c472e7539440ca6d03ea,2024-11-12T21:35:13.113000 CVE-2023-45873,0,0,2948218f3aad5f1a794e8c8ed14be26cf773b803ca6d74d3ad38f463759a9e22,2025-04-23T16:25:09.840000 CVE-2023-45874,0,0,a4692ad9c798e61fd677030b1bd7f110c82de92bc2cee43fd68a8276d09e0562,2025-03-26T21:15:20.047000 @@ -236529,7 +236529,7 @@ CVE-2023-45893,0,0,34d47583aa874a16434ac109ff9dd518fabe2e54448ebb5851491e432f813 CVE-2023-45894,0,0,de880eceb832483892ce51848fc3a6ccd7f091e05daf6a0d09f260cfc28fd11d,2024-11-21T08:27:34.620000 CVE-2023-45896,0,0,0503b9b22798e4cd4d8981ed89b8ee903e8e6b034923c6ae49ae42f267306f0a,2024-11-01T08:35:03.997000 CVE-2023-45897,0,0,faa8fa863cbb8a3df0b16f702e5bf414a79ba0375c914b80b5eef0716f820658,2024-11-21T08:27:34.957000 -CVE-2023-45898,0,0,451694a5ce5e8ec09a049ad326d32cfbf26a580d6d927a1e9ea908cb4ec2d605,2025-05-01T16:15:25.813000 +CVE-2023-45898,0,1,1d05530b1ae58bddc28b5a2ab61577f415aac3eb2dc4e4a38ea0785bb57364ec,2025-05-05T14:12:02.350000 CVE-2023-45899,0,0,4eaa89e132088135a262a155b9a208a643fa1600b346e15873d17b01faf07afd,2024-11-21T08:27:35.317000 CVE-2023-4590,0,0,12e804ec09e6e1f6a16ea46910457bff376fad8cfae1b0e7f548a19cb0522174,2024-11-21T08:35:29.910000 CVE-2023-45901,0,0,29d93ad7c5fc5601cc1a9b42d54ae0ac500ae2d55bc27f4e201173ee1b57b9ae,2025-04-04T15:15:06.847000 @@ -236966,7 +236966,7 @@ CVE-2023-46456,0,0,2786303d2070f5e27f6d6e6346f5c2f8465bd49d75d8a80ea65f28d1c4a7e CVE-2023-4646,0,0,33d3f167703ab8a8d3395aae556fbac749909336e4af055c40b5c82199405d06,2025-04-23T17:16:45.797000 CVE-2023-46467,0,0,ee69c138fc64569b4a2680db9893225c61f933d13844d37f2a2dec06c7a557fd,2024-11-21T08:28:33.127000 CVE-2023-46468,0,0,5b26955a3193c65b37c2ef9f9ef1fcaa89d93687b2a1cdd82f284f290e4995c0,2024-11-21T08:28:33.380000 -CVE-2023-4647,0,0,e9a3e4846e93a3b874aca1d52244d9e2d63d8580c2ec8275657d679e8af4961f,2024-11-21T08:35:36.480000 +CVE-2023-4647,0,1,22a8533f7f191199009e85b567550a48673487fe3a1d01d4c2b445a643800604,2025-05-05T14:12:17.193000 CVE-2023-46470,0,0,bc11e355e9c44593401ba9310cfe1ca146d12cb71553922456bfc5f1fd0e2c4e,2024-11-21T08:28:33.527000 CVE-2023-46471,0,0,64f27e5db9e3dc11dd6daa4f52e14d55665b0381020ed1c718166e021599e6b6,2024-11-21T08:28:33.670000 CVE-2023-46474,0,0,126d1d027bdc1eb12f6b118a041446f597fcf5d61c574e7c621f42e802cd9607,2024-11-21T08:28:33.820000 @@ -240856,7 +240856,7 @@ CVE-2023-51736,0,0,769f54f1b949510604f08bb1670827a0f223e0a2f81276f61db5d63e136e5 CVE-2023-51737,0,0,7df6dc057c91bf1d1aefbb01b850c16a3b13517bf5024de7cf4f4d4d594d152d,2024-11-21T08:38:42.310000 CVE-2023-51738,0,0,59a1474402b0e216a6f2cbcc89e5d644768494db166adc37f1c40f330a05f019,2024-11-21T08:38:42.447000 CVE-2023-51739,0,0,22cf60606fd835ea2874a4c916ed1eb7be6a8c4f630d807da40195b17f14d86b,2024-11-21T08:38:42.570000 -CVE-2023-5174,0,0,91910a3178a4f23d3cad632ed9103e94d23a123155b868d0edb77ce25f0c6296,2024-11-21T08:41:14.027000 +CVE-2023-5174,0,1,a1b1d544b132abe5962815f80b836389a4fad982964d08994ad1674d00344ed8,2025-05-05T15:15:53.537000 CVE-2023-51740,0,0,e77d635bbd78451d7159fbeaf6a78ad20c8072537a77b118f9ddaaab4842865c,2024-11-21T08:38:42.693000 CVE-2023-51741,0,0,35fdd519ad02c8603d9af6d0021df3abb8aefc1051a77a5434189b669e77f4f1,2024-11-21T08:38:42.820000 CVE-2023-51742,0,0,8f1077c90e5ee0becf9cbd3253b6c9b0acac8dd0c6a16d929e2cd226b6834851,2024-11-21T08:38:42.957000 @@ -241113,7 +241113,7 @@ CVE-2023-52153,0,0,366031e51e74dfc7b3cea9bb12c3260228422f15882e0ccb30221caf420d5 CVE-2023-52154,0,0,fee159a8d33e95a20001ea90c03a853f2f0fe4b9886c81b725f170f009997665,2025-03-25T16:53:16.827000 CVE-2023-52155,0,0,aadf58fc0fbb2e9b53c35be3378247f18419d9ef6064581f86faef6893940ac5,2025-03-25T16:53:20.547000 CVE-2023-52159,0,0,02be5a5cc129ad29aca45223f166a0dc90b5f63bf8518d8597c0a8da82ea519d,2025-03-20T20:15:30.210000 -CVE-2023-52160,0,0,f06e55ee6341dc62e094534554332f6e755d7565ef3a64b1df78df422ee61cce,2024-11-21T08:39:18.380000 +CVE-2023-52160,0,1,d875da8326433fca449fc8d3ca74cd1c49cf67851a0394860dff224877fab0e0,2025-05-05T14:14:41.537000 CVE-2023-52161,0,0,cc2ca74d32bca44f3652e1f4e14ffd83723d50b42d0c6e13fc3025c9ba0c88fd,2024-11-21T08:39:18.647000 CVE-2023-52162,0,0,a69328f8fb5f7f70dd12cdd38f629353874332b1168b51730a7e4274bd411616,2024-11-21T08:39:18.893000 CVE-2023-52163,0,0,d0db7f8714bd7c7bc69052ff4d565a82ddbfad80e4a821149bdfc65aa3f141d5,2025-02-05T17:15:20.950000 @@ -242023,7 +242023,7 @@ CVE-2023-53072,0,0,9eaa175487b5ed710e2eed3cef26b264df58ce706869330131201d4cd7665 CVE-2023-53073,0,0,c9e53df48cb56c925af656ecc4617ba5cb5c552021b012e0999f2a40320617f8,2025-05-02T16:15:26.330000 CVE-2023-53074,0,0,8a012b3b50f81e9899d82360a46534a462af5150d111fc125c42a0ea34eae724,2025-05-02T16:15:26.420000 CVE-2023-53075,0,0,5fd72f62b8c9a09ffa34b46a23818aec134969138fdef5724461fd394e79057c,2025-05-02T16:15:26.510000 -CVE-2023-53076,0,0,df180292a4fb6a7654d85b32adc1bf56bf002d7adcf679539689b7cf25cbeef4,2025-05-02T16:15:26.610000 +CVE-2023-53076,0,1,c791c1876d95803e87a45f48c82b67ae128cf9426004a1009cceb9cbc003b807,2025-05-05T15:15:53.393000 CVE-2023-53077,0,0,49e32959ff886749d2a184e9ba8dcfe6c289d2e4ae28a2858ca33d32a62bf819,2025-05-02T16:15:26.720000 CVE-2023-53078,0,0,1833ccdaf5f820c3d16983c6a379287a945e1470cdfc48f7c525ece02aad1f72,2025-05-02T16:15:26.820000 CVE-2023-53079,0,0,d854de3aa135de53519817b649fd311c3cda6ffee68e827cb327c6a22a89c36a,2025-05-02T16:15:26.923000 @@ -242579,7 +242579,7 @@ CVE-2023-5821,0,0,ecb7244d5a986f4d473fbca5b69327d65abcfb78f948cf202491660920dfdf CVE-2023-5822,0,0,8c8e1857ce4331d0c9f44b86c9674bf6266bb147bdf9707c799089e4c16a943b,2024-11-21T08:42:33.790000 CVE-2023-5823,0,0,6505dbfae39f989a655be0e6df3a3e1eddc5fff6958444be63dd993457afb38a,2025-02-19T22:15:22.040000 CVE-2023-5824,0,0,3e276b346e3abdc1f056840a28085adb6ff0c19a2603135bc4c3cbdc1391c029,2024-11-21T08:42:34.053000 -CVE-2023-5825,0,0,22d9e90388dacba67ee8f4eb858746acef0fa684b6ed469e230e2314df16ae92,2024-11-21T08:42:34.227000 +CVE-2023-5825,0,1,310c9848a7255c169cded306e93426eab1672c497702a22b23eb04b9800cc9e0,2025-05-05T14:11:43.397000 CVE-2023-5826,0,0,c75336461e525722aa453cda8398330ef11a98cb70f326c22395b8598ab8492f,2024-11-21T08:42:34.370000 CVE-2023-5827,0,0,91a679716a6c3e591fc9e2a1f46aabd86db1835399da6b6024f41352c2935676,2024-11-21T08:42:34.510000 CVE-2023-5828,0,0,d507886682f6095fcee9d5fae8226b0058d086e6211ba841f392dd2b0cd68b7d,2024-11-21T08:42:34.680000 @@ -243594,7 +243594,7 @@ CVE-2023-6950,0,0,abe9e2e0d7383949fcddc1e9a1bdb75c1a66b8207ce4e95629fab56a059c4d CVE-2023-6951,0,0,5cf81bbb22b08bd5b560463dd9595ff1b504507f72343e9bcf9ea7dcc9ded4e0,2024-11-21T08:44:54.380000 CVE-2023-6953,0,0,e3148f54ace7102cc1d1855a57ee7588a45b42a9470f40348979b8e5a6fa722c,2024-11-21T08:44:54.530000 CVE-2023-6954,0,0,87eec9d8a7d1d4f7a21fe0bbd97c710f1708d0f75d7960a297d83c4cc61eb89c,2025-03-21T19:16:22.783000 -CVE-2023-6955,0,0,6a651484610368fe70f3374eca3c9f0c198fcea15a2b7edd8250009a7dd2fbe3,2024-11-21T08:44:54.833000 +CVE-2023-6955,0,1,4f383a527663c1f9a23920869e93bff5d1bcbdfc2f3e6ff17344b8f39fff6c80,2025-05-05T14:11:28.143000 CVE-2023-6956,0,0,5a2b668004fecf802df77f05304bc63d47f9be8a32adf14edea244199bcfda67,2024-11-21T08:44:54.980000 CVE-2023-6957,0,0,cb1ff440e5334bce772d063adf3231a9100fbe70520d0f63d8b214d93c538fde,2025-04-04T15:45:18.910000 CVE-2023-6958,0,0,8eff2e5006ddc42d34f29662a93cea1b72db9351fc15f0bfc55007f882f03985,2024-11-21T08:44:55.267000 @@ -244090,7 +244090,7 @@ CVE-2024-0207,0,0,2f8199e7587e0ab7fd695f2e21796f49ca2a9c52404d11018e2d7fe3fb4b03 CVE-2024-0208,0,0,c48034d32cc5e3825676980fa833995caf0072eaa3255befb81ec0b9fa8eaab2,2024-11-21T08:46:04.067000 CVE-2024-0209,0,0,d62ad56c5f5181d0170dae51eedcbc8ff0c56f160e205412087b3cfaf32cbef8,2024-11-21T08:46:04.213000 CVE-2024-0210,0,0,3e3263d06e9e2414d005bdf018e3ac186b89d2c16fdab7f3f6d450605a18e935,2024-11-21T08:46:04.343000 -CVE-2024-0211,0,0,db139d3ab8a09a067c9b9f5b5cd4990847e57ddfdc32945b1d21f8f8d3c5fdf4,2024-11-21T08:46:04.477000 +CVE-2024-0211,0,1,bdf6179e8e3f0d376daf60c2dd0913c115b15386e0a1347883169cf873e2eece,2025-05-05T14:11:36.213000 CVE-2024-0212,0,0,784ab3b2f20d203077325210d85dfb226b3b60fbbe17d80b9e980ad16507df45,2024-11-21T08:46:04.600000 CVE-2024-0213,0,0,a3c9ab11a6a0368595a21ae168a31d99ac28221226b55ad6e7d8e169ef3ce09c,2024-11-21T08:46:04.773000 CVE-2024-0216,0,0,e4bd8121abd9e5a805c6628369bc176788e2422a7cbd79b7611977e63bf24c1d,2024-11-21T08:46:04.897000 @@ -244233,7 +244233,7 @@ CVE-2024-0361,0,0,3dc9d7bf421bae00488f94c88afc6771c421477ca1838be81848fe19122c6d CVE-2024-0362,0,0,2dae3e29e9a46ea69e160989091905eb00c9f936d9623f3d74e01f2d296e9539,2024-11-21T08:46:24.060000 CVE-2024-0363,0,0,eab3c7c502b7083f0ededeeadc04aa0b93ac5031608b303c114acc8926d36094,2024-11-21T08:46:24.210000 CVE-2024-0364,0,0,fc5e9c4d5b92f36d5cb37600d7a577e9db411985fc8c6664aa14c93002f43fc8,2024-11-21T08:46:24.353000 -CVE-2024-0365,0,0,6330dc9c65bc7b0feac7964c9827559d58a01eff371b255e1ae6ca863ee3bee1,2024-11-21T08:46:24.493000 +CVE-2024-0365,0,1,c557c9671033497b779ae59b4c06bb6b0eeb115fb7d34a43080eee69eefed5a2,2025-05-05T15:15:56.690000 CVE-2024-0366,0,0,d9a8bcb4396969d09c13425c35f8a459ee3d209f50fb7952a9047948dbedc093,2024-11-21T08:46:24.730000 CVE-2024-0367,0,0,0a5c92f994d7e7b665499a1831b012939ef81fa4760bd4e5b44d22048017d521,2025-01-30T16:01:22.873000 CVE-2024-0368,0,0,3df6d995102e550ffbfb4d5c3fe297b9e15666f30a71d9cf0c085ef80bfb55ec,2025-03-11T16:51:23.420000 @@ -245460,7 +245460,7 @@ CVE-2024-10633,0,0,b64cd913918c140fe334bc0b3014f8ec940be53af9967d66db1f33e12d719 CVE-2024-10635,0,0,ad33254dc3c41a00d944d2223809b783fffc168d0923e1f85af07a07899e30b7,2025-04-29T13:52:10.697000 CVE-2024-10636,0,0,51d65a9a72ca10606ebab57795a091094c53b3e14bb9b9ea00131b43cbb9d73d,2025-01-26T06:15:23.293000 CVE-2024-10637,0,0,93d08933ba9c4ceaffb9a190c50c42965d9f07240a31bdb136bdb3d17454c3d0,2024-12-12T19:15:08.570000 -CVE-2024-10638,0,0,926faaaa5f1c45ab4ab2897c0e9a2827db426d973efb8ce13a837011bf085037,2025-03-27T16:45:46.410000 +CVE-2024-10638,0,1,a805a2bc656c6d2f418b460617c587bf83b4c6a21228903a2c48c039f122eee9,2025-05-05T15:17:52.753000 CVE-2024-1064,0,0,7b760eef6fec23e7e81fb51d838ef1bddf15caed76d88b6ad1d3e688cbbd4a4b,2024-11-21T08:49:42.843000 CVE-2024-10640,0,0,a398cd6d72329485656ef5fe95883039ee9518985823ed26e6c02ea5501d6402,2024-11-12T13:56:24.513000 CVE-2024-10644,0,0,24b1196d3a89910eef3bf89e7297c4850190ffc7a66fef42f48e110e352ea628,2025-02-11T16:15:38.360000 @@ -245480,7 +245480,7 @@ CVE-2024-10656,0,0,6a9c2ea00e33366ef08d41c370d91f9326101b5384c55b9760d8981100c96 CVE-2024-10657,0,0,9ba68410d60d8b4027ec1ef39aa8cd6c91220d7679502c5a5b889ed775c305d9,2024-11-04T19:47:03.377000 CVE-2024-10658,0,0,59c355ccdbdb5bd7d187726f02bf0d66e0585fe05188237a417f240cb1df426a,2024-11-04T19:46:45.707000 CVE-2024-10659,0,0,8f2b10caf8dabeb6e892951cda6e14b0c555447044fa18a1e0f998953acf6bae,2024-11-05T17:04:55.647000 -CVE-2024-1066,0,0,e5906ef2c2a880429c794bad136f9b9a150ce05d70c2bb41665469c6b92cd7dc,2024-11-21T08:49:43.170000 +CVE-2024-1066,0,1,ff0a46f4976e8ab7440dc0ebd07825872e277ede466a96c38273f06832961226,2025-05-05T14:14:07.020000 CVE-2024-10660,0,0,0d1db00ebbc8eee74945888e16da206ea400511483214be85aa9b5590dfe879d,2024-11-05T17:04:45.093000 CVE-2024-10661,0,0,465b6695bccdc8f1a33c90652588d8def49e6ceef8f964bf43514d006f0a2276,2024-11-05T14:30:37.787000 CVE-2024-10662,0,0,46683ece41f9c56808609a9d20699483705efa11ae3175da2eb7291d6c063cd0,2024-11-05T14:30:16.847000 @@ -247918,7 +247918,7 @@ CVE-2024-13091,0,0,e9978d25b15eb759e2bc9cfbde0802cf5e89ad556f7a4c0b02504deb75ff4 CVE-2024-13092,0,0,a2750c0c790f467a547694b70414fe45b0b02ded27bb4d4c2a0fae1c1a0700ca,2025-04-03T14:45:17.077000 CVE-2024-13093,0,0,cb18337e8ee0e8d57eaca2c3b85d5fad081ebf6db3df956f09ca020aa48a7de0,2025-04-03T14:43:53.770000 CVE-2024-13094,0,0,9ac9d2be9436a217ce3041a5940412523df76b53272d00d484a4498861e0a213,2025-01-27T20:15:33.390000 -CVE-2024-13095,0,0,9e04417f927960907008ee1ac1eae5467b51f290b3281be9b0db7e2636c10ea2,2025-01-28T21:15:16.453000 +CVE-2024-13095,0,1,72d3ab3466e695bd88dd818288e17b312c26d3e7363b2b54700519ba7f8fcd20,2025-05-05T15:16:55.157000 CVE-2024-13096,0,0,e394892ba9ce8094a2ccfbbd5df37629777d24751d3f1b41ffba61866abf8ee7,2025-02-04T21:15:25.683000 CVE-2024-13097,0,0,e31f5b74da7130e8cf944defb54d136cfb4b1ae3525a603a9fc442a513a02907,2025-02-04T21:15:25.820000 CVE-2024-13098,0,0,c89143d13a1d841d589b3ca2dfd254c31ffedc675416b58546c854d01b645f2e,2025-02-04T21:15:25.940000 @@ -250781,7 +250781,7 @@ CVE-2024-21587,0,0,12ceab6a8617bba884c3945746bd38a150022a8ae92c14a7557faa5ca62c0 CVE-2024-21589,0,0,560c0b598f44df34a42456a042b42a8f6628db58cb45afae50413837290c425f,2024-11-21T08:54:40.180000 CVE-2024-2159,0,0,8e46002478f5bef6fada5f3d931932d4001932442e5a9dd314099fb8485f027c,2024-11-21T09:09:09.353000 CVE-2024-21590,0,0,b72c7e75d3285f4274ae413038786b8da2e8ac5d0d8c2ace3bbf64363f6259fe,2025-01-23T15:29:31.793000 -CVE-2024-21591,0,0,e8f6d00f93c02570161f5591198239dc4f248af46e3e55650ebb582a1422b056,2024-11-21T08:54:40.447000 +CVE-2024-21591,0,1,fac24436a739f6e2d52bf11aedfdb48727ce4862dc14e5ecd2214297f0866eb4,2025-05-05T14:11:31.113000 CVE-2024-21593,0,0,59c32920ee60d205e951a785ff1e6afa498e3c95b97e34979cba9e81a1db6a15,2024-11-21T08:54:40.607000 CVE-2024-21594,0,0,96f7ffccc5e1b95b526e0770e66b0a10aca6419927605427f2f6947a28f56f72,2024-11-21T08:54:40.743000 CVE-2024-21595,0,0,bd277db179ef1b9c3f18b64f4122244b30bcbe5b85c2ccd02aace5ef31bc05f5,2024-11-21T08:54:40.903000 @@ -253091,7 +253091,7 @@ CVE-2024-24759,0,0,bd2b641e986341b0a72b91e9f2e60b7e2583d3f50b45962ebfdef214c7c04 CVE-2024-2476,0,0,90b5e4103c7ae319e953ad3d1458413586b71bb6a73e5c06e79a094f5dab90c3,2024-11-21T09:09:50.223000 CVE-2024-24760,0,0,3fe1a751d069d7b8010ebbb79d495848e61e10c807ef786aff2bbeb1d9cf233a,2024-11-21T08:59:38.663000 CVE-2024-24761,0,0,0f3bfc3d46bb7c13829bd1222c8ca1e601f0b45217b897df8b3af2231e5f6681,2024-12-17T20:06:11.133000 -CVE-2024-24762,0,0,add0619bc8a2dc2d3cf09ae4e92547850c474eb49112738f2a54931e34316f89,2024-11-21T08:59:38.960000 +CVE-2024-24762,0,1,4e232fd59605c6945346685c5e0a1af745e97f8b216b101a7b5e8b4737368ba1,2025-05-05T14:14:26.363000 CVE-2024-24763,0,0,a3cb5a362cbc9759e4dfff129e417ed8fe8655a360f6b85267085ff3a65924a0,2024-12-17T20:03:30.613000 CVE-2024-24764,0,0,bd24953d32a72f44cfa0aa95a6afd87968520e7afc30faacb56958a776ae9755,2024-11-21T08:59:39.267000 CVE-2024-24765,0,0,a87f94b332a46c6af533c4c84b1150f2143a31d3e25a0a572a479643ec30486a,2025-02-26T16:48:40.320000 @@ -253880,11 +253880,11 @@ CVE-2024-25841,0,0,1ea0930dcee998cd37e02f06f69392382cd1216e7c6d354c3bc8cb5d1f430 CVE-2024-25842,0,0,725e012c25977b97f510479bb5fe3204b70fbd41422299d54daeced1729d99c0,2024-11-21T09:01:25.070000 CVE-2024-25843,0,0,26f9c7266a38d37996d9673906e83ca1aaa70dcf9feb13f1d783d41e2372c3cc,2024-11-21T09:01:25.297000 CVE-2024-25844,0,0,4b00a435876e8faafac20cc3bbe78c98fc2be74b78dc7fa3e08039e078fe968d,2025-03-27T17:15:54.563000 -CVE-2024-25845,0,0,b554ab0ab805366a5a4ed50bd8e95833581fb5d9aff43bbf01dd5f3a1636e52e,2024-11-21T09:01:25.660000 +CVE-2024-25845,0,1,c10cc9c942d18188e53e32461e0739017dcf603e3b7469f41963d358e5078b8b,2025-05-05T15:02:24.317000 CVE-2024-25846,0,0,e7bf022eac6bd73ada64163774de44af3ed84c49d0a5b45ce113cd22667186aa,2025-04-30T16:52:44.680000 -CVE-2024-25847,0,0,4f5de495fa8768593f1d8d113c536211f045d66dd93a68ce6cb336534947a1ea,2024-11-21T09:01:26.110000 -CVE-2024-25848,0,0,df0bd8a71cef5585c7d93228f7c0e15600e52dd484b6b940c3c1b2400d0b0be4,2024-11-21T09:01:26.427000 -CVE-2024-25849,0,0,22d7bd033280f45af75e54429b20175df89438d4554c2bab68315619fb4d9aca,2024-11-21T09:01:26.647000 +CVE-2024-25847,0,1,b2e13c3c39013eac03de2d8e2a1da9acdf443a6b05cf235324680626eed62c11,2025-05-05T15:00:23.993000 +CVE-2024-25848,0,1,e1e344daa02ab51a9681ccfcd0d9aa3ba24471620cc87c845b61eb4e8e1f8370,2025-05-05T15:02:57.030000 +CVE-2024-25849,0,1,3085eeaaf4ecdc54eed4ae984bac4fcb6b635b5574e86da67eaf80dde60b9c2e,2025-05-05T15:06:24.170000 CVE-2024-2585,0,0,d9d93859e5e3284cb2bdc1438f43d213cf4edd23b8c2d8b20f88b8f07aa4c0e7,2025-04-10T20:47:32.580000 CVE-2024-25850,0,0,55179944fddc433c0323293658753090900ae504a85ed3315876dc507f4364e9,2025-04-03T13:18:56.597000 CVE-2024-25851,0,0,1b5997130a1972ee6380cdffd7d0b86375452f194e58ed3021fd3f9770919e9a,2025-04-03T13:18:49.410000 @@ -255387,7 +255387,7 @@ CVE-2024-2750,0,0,7a22bbbb3a616bb457587b001fe4c1da677362ec1b983db201c6134fde3c55 CVE-2024-27507,0,0,8eb5d509c5e38838221aa17529156e7c7f3c4125b24fe1781cb0694d9fe89b29,2024-11-21T09:04:41.003000 CVE-2024-27508,0,0,01dd0be44ff9b2d2b7bffbdc4bf1608e07f98eb2f01050faeab4938cdacaab40,2024-11-21T09:04:41.233000 CVE-2024-2751,0,0,731068c630daa539bb9d0592e90de50b3a8924b87427016d470c9a67f208bd9c,2025-01-21T20:43:29.390000 -CVE-2024-27515,0,0,99053ff998755b72572ab8f6878cd3b8e42c37263b4efe932188d0f4f75351b6,2024-11-21T09:04:41.443000 +CVE-2024-27515,0,1,aed152ae07bfe4a9deffa9a28aec1d0813c6965c11d08dcb00f6986628e99b3a,2025-05-05T14:54:48.797000 CVE-2024-27516,0,0,943112bdb918e1b9a970447aadd0b0088749d6881aa84e92f38879c2320c71e9,2025-04-30T16:53:33.410000 CVE-2024-27517,0,0,61bba897ef6c7df8c717bde8dddefddaaf590b57ddb936696ecbce893483c7aa,2024-12-16T19:26:43.387000 CVE-2024-27518,0,0,ffa086f895acef0377a6ec9aa3cbe7a6b2b9559a416120e3c86afef2ec482fed,2024-11-21T09:04:42.103000 @@ -264253,7 +264253,7 @@ CVE-2024-38878,0,0,0427331b5276e0aaf96c22ec915ceec80379648af41050ea650c27397769e CVE-2024-38879,0,0,fcfccc70fa0ac42365026f63a4551a44729065e0a573e4e158db10a43518fef3,2024-09-20T23:26:28.767000 CVE-2024-3888,0,0,e0bd97205fab6861cec7fc0a514eb713dd612d5aa192700db84e37079152ed48,2024-11-21T09:30:38.173000 CVE-2024-38881,0,0,bf5388132fc3ad04ee4337d690dfc12e4e30dec145929014252e78ff32a406f4,2024-08-07T16:15:44.930000 -CVE-2024-38882,0,0,3cbc37f1b277e0149c3d323f4e8d7f9f4b51f95d15be1156b92d8d2754e3ddb2,2024-08-07T16:15:45 +CVE-2024-38882,0,1,27b2cf418b4d2954bad86ff9a89b80263b3a16cb63b7598da4a5cd04b50a8c77,2025-05-05T15:07:13.760000 CVE-2024-38883,0,0,e9ec19e346e1aa79f68b7fad3f3e8362e3f27cee7f35f02482382b46889f84c7,2024-08-07T16:15:45.053000 CVE-2024-38884,0,0,f87b33c704542b349f1c8d8e07c80a3b80eb1b7f207d392ed07ffafd7a1c8876,2024-08-07T16:15:45.113000 CVE-2024-38885,0,0,fc9aa073b2684756df7587fa501512c94999bc49f31b2217db5838cb91090528,2024-08-05T12:41:45.957000 @@ -277823,8 +277823,10 @@ CVE-2024-58094,0,0,8782554bc1cb811541a04fd5d44adc0e07d4f24c9b0379c52881ede96a6e3 CVE-2024-58095,0,0,5a11b1a1572d7f73207595e48df39b1cbc4887f1b9dadbb6561746f204688aae,2025-04-17T20:22:16.240000 CVE-2024-58096,0,0,e3cf19ba0049ded05d28f9f4eee1d254b368b8d7f24ce5837d77302ac8b64350,2025-04-17T20:22:16.240000 CVE-2024-58097,0,0,829351fa47e1ca310ec798ee35487845f1d2b10416b1f63b0d0df39432631b4b,2025-04-17T20:22:16.240000 +CVE-2024-58098,1,1,4ad328d271f3a72f50677bf4d93100ab754998c46d132bf17b2769df86d5cd26,2025-05-05T15:15:53.810000 CVE-2024-58099,0,0,1c6f89da4311047427174f81b5d3582c8815da6118534d0fcb2e3de6182139e3,2025-04-29T13:52:10.697000 CVE-2024-5810,0,0,1cfa1d347c98633461d8a7b5c70e7a88c8da42418f63ef991acf03eb3681102e,2024-11-21T09:48:22.557000 +CVE-2024-58100,1,1,64b267ab0e9289d736e04fecbe509c573f731dfcf7f1fb351ff3499a8b6d64fd,2025-05-05T15:15:53.913000 CVE-2024-58102,0,0,dd42630c366d4fe40426e956fe445b75d82fa202b00380f941f341e0dcc8270f,2025-03-11T08:15:10.917000 CVE-2024-58103,0,0,10a7b3d9d518bc786063856000a89f8cacb058ea7d9597066e2f5581bacc0a09,2025-03-16T04:15:12.313000 CVE-2024-58104,0,0,ef5194668e17b2fae71aeef1b8cd3db28854aa445adae506302dfff073d0b351,2025-03-27T16:45:46.410000 @@ -277865,6 +277867,7 @@ CVE-2024-5820,0,0,2c0985f3b66fb0ad2bec318f7e5cd61bb5fb275037c5522342e1692fe433f6 CVE-2024-5821,0,0,cdc4850be9f4379fb404f40f957b7dcfb9ddb61cd13ba59124a4fa6283f25e1b,2024-11-21T09:48:23.980000 CVE-2024-5822,0,0,8c7f438faa6a9af9b480613b911dd93a88e19e70cffdeac82cc67d739c737fc3,2024-11-21T09:48:24.107000 CVE-2024-5823,0,0,5123d89c111b48b404a1b53c7b20aef07938a088538cba82da9ac7e629cc09b9,2024-10-31T18:05:00.637000 +CVE-2024-58237,1,1,fff90e77db198c38ad8b386637f8dd51a9de24bc89559ea8756ec0d81f710012,2025-05-05T15:15:54.010000 CVE-2024-5824,0,0,e1bcdf6d43e3da8ae6ba6ab7de5f8d3f3eaee723b9a1ed9af8e8dbb46b2110c6,2024-11-21T09:48:24.360000 CVE-2024-58248,0,0,7692b9f3aadd9d67cd9e0636049612c05994b9b19e06740b9f1997015f2271cc,2025-04-17T20:22:16.240000 CVE-2024-58249,0,0,46e082cbdc4436e2ec6bd62f3df3fb3fe143b90b067e29566efeb2e0b2706af9,2025-04-17T20:22:16.240000 @@ -281961,12 +281964,12 @@ CVE-2025-0401,0,0,e28ac611dac5ccc353159280e42c7dbe095deba0fb16978be45f3520dfbf52 CVE-2025-0402,0,0,9bf64bef3b9db66be1e1f275fdc45859ac180f1ff0f0f0f10151840e7b671ae3,2025-01-13T00:15:07.707000 CVE-2025-0403,0,0,955aaef4a0987af487cc8288d98058e213e44bf5864735134179f45fde1e364f,2025-01-13T00:15:07.873000 CVE-2025-0404,0,0,cd15ccea7eff00f81e4e6e95a1480a2cf284dff640ba86ceb409f1e0bcb7de9b,2025-01-13T01:15:07.227000 -CVE-2025-0405,0,0,e6ca9eed6d4c720b7d64c848e58513a94f47101f3fb8b5daecc964168db7884d,2025-01-13T19:15:11.227000 -CVE-2025-0406,0,0,df6af17319d2b56bb53e5e67cf3b651e2f65a92586d2a5d2fedec5c5b48c6a3c,2025-01-13T18:15:20.490000 -CVE-2025-0407,0,0,7f9daeebf4e6e20bf76e0bafe8b30be43a905f27af83a0c7720c08a60edee5cd,2025-01-13T18:15:21.023000 -CVE-2025-0408,0,0,68bf5cbb0ea748fb7df5c6abefbac8000e6de86e1e6d8726e2e86659c93309cd,2025-01-13T14:15:10.073000 -CVE-2025-0409,0,0,464e402a5bdcfb4739244f9392e149f22529929b182eeda1bef4538b2ea99006,2025-01-13T18:15:21.430000 -CVE-2025-0410,0,0,fbd80accc06a325f034beccdfeacf1635fc309e9b35e9d6f0151d8be1f40cc63,2025-01-13T18:15:21.730000 +CVE-2025-0405,0,1,00e26834a3f53d00a5276590641a2e5a3803478a5fcdbc24fd986b91387d8e4c,2025-05-05T15:20:47.620000 +CVE-2025-0406,0,1,9170e24fdbeb604b6a516fb9fd67cf4ebfac93be4958b43f48ae41c2867e0a73,2025-05-05T15:20:54.380000 +CVE-2025-0407,0,1,38e8a1c98d5249f6d66a2f99e5341f055cb99dac0cbdea890bb28ab86060bcfd,2025-05-05T15:21:03.203000 +CVE-2025-0408,0,1,7511e8e551d856ef5db5d956ed1c86ac7c61fb5ce5c1981aa435b49c55e83dd7,2025-05-05T15:21:05.883000 +CVE-2025-0409,0,1,61629f2d30de43c220bd7cf7e3bdee616f9b3bf2b21138df0830f8cc35daac4b,2025-05-05T15:21:08.160000 +CVE-2025-0410,0,1,f8d7d1f014737c72078a340db366cf62185a89a4f7376c7d110406f608d986b9,2025-05-05T15:21:10.997000 CVE-2025-0411,0,0,963fb93dc9f22be5b01fb4ee24ffe0ff364fead29af110d8c8255d7fa3a39b9c,2025-02-12T18:14:13.143000 CVE-2025-0412,0,0,c39a3dcab0c6d49c3211d3247bc68e95a0d8b1c80f2a5bafe11ee5bd72adb69a,2025-01-13T04:15:06.477000 CVE-2025-0413,0,0,5baedddf5946af9550556770de7dca6787e2b2456cc377371a820cf1ed6c2bef,2025-02-05T00:15:28.173000 @@ -282039,9 +282042,9 @@ CVE-2025-0484,0,0,0002264fdf5b2c94094f61a64ae866e24c998ac41355e5985064d681269c09 CVE-2025-0485,0,0,16b896520120048747f8ab0104dfcc613129cdf43400af81dad4a6cb58e99696,2025-02-27T02:27:15.483000 CVE-2025-0486,0,0,fa6f0ea1055636ce8b3dcb74edd3e0eb112f85f5c9ff1ffa46a351c2f1f7f66d,2025-02-27T02:22:11.140000 CVE-2025-0487,0,0,8dd674f6ce6acba50f53c31c6aaa21bf018e9017f84d3b634b486b36f6573216,2025-02-27T02:18:09.290000 -CVE-2025-0488,0,0,b49e1c91b432d0914a8fb060e7cfb1f96c61c2e8055697622817a3d3f16a3e60,2025-01-16T16:15:35.347000 -CVE-2025-0489,0,0,2ba4b4e29ba85b85d1444bc0f0469ef1d917afcf978373a21ca587e47fc5aa75,2025-01-16T16:15:35.517000 -CVE-2025-0490,0,0,c65e2a16d4486d9d0da396af733cf2f491d4afb18710cfbb6757f3bf5e97445c,2025-01-16T16:15:35.653000 +CVE-2025-0488,0,1,6ee094ad97fa8642127f34e244a0f2714bf896b27f87f8685b3821531b0ff442,2025-05-05T15:19:19.220000 +CVE-2025-0489,0,1,6a2ca2069e59c979db0d7d2b81b74aeda76110fce718e1c25e2acf3d93e4408f,2025-05-05T15:19:28.840000 +CVE-2025-0490,0,1,3938123b41da26070777cb437e121a9d066d1667882f423e74af8e245d5b6c74,2025-05-05T15:19:37.540000 CVE-2025-0491,0,0,605e36a5c7b096692d1bdfc2e824349e44626e3a1aec074112e94704bcdb5c25,2025-02-27T02:13:27.390000 CVE-2025-0492,0,0,27d87476bd6b826bc3af22114d6782dfe423698f66d86c8805485dca2b3eca57,2025-01-15T22:15:27.157000 CVE-2025-0493,0,0,fdfc8e0b7f438cb924061cba763cc9775cadf54d53fcaa6b7c0c5eccbf337244,2025-01-31T05:15:10.087000 @@ -287083,7 +287086,7 @@ CVE-2025-2543,0,0,e89290715b7ff44fef4dfaed136aca0776aa85b6a60156361d49a21cd6e637 CVE-2025-25430,0,0,50260f923bd873de4abd7f0df967d0eede640f192673faf640418e3d9b47a728,2025-03-04T16:15:39.763000 CVE-2025-25431,0,0,6493b573a6bc4f77e64c4c34f4cdf2e4b7b95c4c86320184de47aad5a831415a,2025-04-30T13:55:17.703000 CVE-2025-2544,0,0,61f3dad808e2359bbac367a26f479ab656345326f5e769e424e5a0af4077faa5,2025-04-07T14:17:50.220000 -CVE-2025-2545,1,1,db3af2f95a403b230c1f16c83491fcdd9f9b57b5828c91ae35c10175ea775766,2025-05-05T12:15:16.170000 +CVE-2025-2545,0,0,db3af2f95a403b230c1f16c83491fcdd9f9b57b5828c91ae35c10175ea775766,2025-05-05T12:15:16.170000 CVE-2025-25450,0,0,e3ddffa39d860b594bb74ab98ef16e7416f14ecc887f5721e7943e1b1d73ce80,2025-03-07T17:15:21.640000 CVE-2025-25451,0,0,4c60686324e8dfbebc3bac09932f9dca9715cd901e8b055c1d7eb1acd46fa78d,2025-03-07T17:15:21.803000 CVE-2025-25452,0,0,f8ac00e705c69600b7bd756ffd6640407ab44891503ee6108f0e991980324498,2025-03-07T17:15:21.947000 @@ -287917,7 +287920,7 @@ CVE-2025-26999,0,0,cdacabf1a660ac6dee9a5685fa630f6b1572dbc44af9dd2498823746cb2cf CVE-2025-2700,0,0,834dcedd7f40ed7b4107c8c13076bfc0c6c6096a854321a45822e8d64deac3c4,2025-04-01T20:47:42.813000 CVE-2025-27000,0,0,1ac554f083699af2e8a7ca7e5b9fee0cf63423d6e7b9eac2cf80407f8bbcfb4d,2025-02-25T15:15:31.853000 CVE-2025-27001,0,0,9549fdac37d52ebf8e1c75331c3601de8f03a77a6f35cd82e54896fef08473b7,2025-03-28T18:11:40.180000 -CVE-2025-27007,0,0,9e5eccc8ae0efaeff421ec793a44f731ff34b3f6e64f90bcad36cf900c114612,2025-05-02T13:53:20.943000 +CVE-2025-27007,0,1,163137bfb68009875ce1d020c91c2ace4403f1ca28a464d52c0095ce66759174,2025-05-05T14:15:28.397000 CVE-2025-27008,0,0,1708de4dfae031876ed7d8e7fae7765e4b7ae93e2aef72116fe164d3c1e29fab,2025-04-16T13:25:37.340000 CVE-2025-27009,0,0,ba7a3973ccfababfdb452ae41b4eb27fe597fd251e088b37a2e2b8e171857c6b,2025-04-15T18:39:27.967000 CVE-2025-2701,0,0,4a00a8c87ae1a8f8d8996e5497fbf475b3761e12c82cf113f0ba83ecc0864e95,2025-03-24T09:15:13.950000 @@ -288609,6 +288612,7 @@ CVE-2025-28145,0,0,f7cb8550c771e1ecfdbfb7b5a33b47f3e562fa1cb415f334ceae3bd2faf80 CVE-2025-28146,0,0,32c9b208c84d9df041320792b106820cf214078a35a3cb79372374645d1870eb,2025-04-15T15:16:08.660000 CVE-2025-2815,0,0,242155fff6e988a29170d3e8e0a0ff904f29004fb7975cc06cbc247a50a0c090,2025-03-28T18:11:40.180000 CVE-2025-2816,0,0,8918792d05d094d45bd0083e096b879f2d55fadf6ac4bf6b845b2b3a33bbcd26,2025-05-02T13:53:40.163000 +CVE-2025-28168,1,1,98c31977eb285b04b142b5a0359fb0eac56ad3919ac212b75264d5bfed78368b,2025-05-05T14:15:28.500000 CVE-2025-28169,0,0,daded7404590ead49179714046cf4550734ad214e781473e5f10c5129c2c88e7,2025-04-29T13:52:47.470000 CVE-2025-2817,0,0,f2c71b94e67aca9d965323c14cd9650af88f4e7480e24b1b7222a49bf56e1bb1,2025-05-02T13:53:49.480000 CVE-2025-2819,0,0,38e9c36ae873a346ecdd7625eb6881a65dff946dea1e4d5fe1469a7230964dac,2025-03-27T16:45:27.850000 @@ -289280,7 +289284,7 @@ CVE-2025-30287,0,0,cfba5e30d00b0ea1f9e3186daae1e06e7a41e02e3eff9eb946dfb1e9f63fd CVE-2025-30288,0,0,7ebda2759f8e697945c0209a13ef42324b103f6e936b296d6ab17084cc79ec3a,2025-04-21T18:33:41.280000 CVE-2025-30289,0,0,74bb0d7be5819361195fdb8735afaf14b7214a7806aa46122308e1d7c38fadd4,2025-04-24T17:23:25.580000 CVE-2025-3029,0,0,4233f9fe2c15ae070846afc464376435b2c22dc54bb1ae100ef75b468d792887,2025-04-07T13:31:33.743000 -CVE-2025-30290,0,0,6f893833437291deb8fbb2322de2982f9eef638dfc164661994353e52e717a27,2025-04-09T20:02:41.860000 +CVE-2025-30290,0,1,4c07a28f27c23ffedb6701e4daa06d57d378b164c4d644ce35436b4eb3fd2703,2025-05-05T15:35:10.173000 CVE-2025-30291,0,0,0c6ed0811056cacd99d9c6197839316b5d895bab1a16f448bf4091054f02bc12,2025-04-21T18:32:52.167000 CVE-2025-30292,0,0,3e4f7c22f08308c313ba2352bafd20592d5f6ffab99962cdfee668ba5f921588,2025-04-14T15:57:32.107000 CVE-2025-30293,0,0,0a67e32c0cceae33f8c0206da1ab6856527bd4b635f1ab88551bfa3c3ba00cb7,2025-04-21T18:39:13.447000 @@ -290148,7 +290152,7 @@ CVE-2025-31546,0,0,ea1a0fbb32fc0d8f843e251c2900c9f3bf773f8bead39ce5af4bea45a6c7d CVE-2025-31547,0,0,f5607c580924af16dd0ada70846ece32dcd8885ccfe1f299b8e940090918b0c6,2025-04-01T20:26:30.593000 CVE-2025-31548,0,0,d1b4214b4f31dcd8a9025f858166713a075840a49164ed00e12986869a0aecde,2025-04-02T14:58:07.527000 CVE-2025-31549,0,0,6e04d0af8bd8de1ee53eb25324158c685c942726fcb5a8e75e9378a9fbb44aac,2025-04-01T20:26:30.593000 -CVE-2025-3155,0,0,42594a9805480fca76677ac7615c5408a480a3df3e6b3e5921b807d2ed6898f0,2025-05-05T10:15:19.070000 +CVE-2025-3155,0,1,ca3eb0f94d611cac0b265bbcbc42df7e455dac69907644579b6198f758ec9e76,2025-05-05T14:15:28.677000 CVE-2025-31550,0,0,83f208aa53a9d367608231584d9c7b6b24f74f32a0a08dd8a80b85123a4b82ee,2025-04-02T14:58:07.527000 CVE-2025-31551,0,0,01a6ff107cfbcc3282db3d6ad9a7d1be104aab604084a23cac69debe8b4c1934,2025-04-02T14:58:07.527000 CVE-2025-31552,0,0,acadf09f28068f6285801331d50088e92d056876ddaa343a4a85705dae7fcdc2,2025-04-02T14:58:07.527000 @@ -291416,8 +291420,8 @@ CVE-2025-3547,0,0,b8a8bcfd16382c6f669ee8b0e767a9b348387ef570b4ccac540ec0ccce46c6 CVE-2025-3548,0,0,6144ed5d0d918b47e0b3455f4989275371cbf6245da9570b52c077e637e4dc46,2025-04-15T18:39:27.967000 CVE-2025-3549,0,0,fd480975e611b3aa329471ac846d61053e320de544cf16373b88df2f23530e93,2025-04-15T18:39:27.967000 CVE-2025-3550,0,0,f579947c5b178a817932c0b6fcead0a074c3d6bb705e7020a43daf576a1fe1fe,2025-04-15T18:39:27.967000 -CVE-2025-3551,0,1,02f49e41bd19b4bc0a570ea31d163ad8aafb8780d1e0f66c99f406d2f08f15ca,2025-05-05T12:15:16.923000 -CVE-2025-3552,0,1,d8dea9ae72a1aad2fd2130f4534dbc6d0eec5b00f9120e1a475f869c79df2754,2025-05-05T12:15:17.017000 +CVE-2025-3551,0,0,02f49e41bd19b4bc0a570ea31d163ad8aafb8780d1e0f66c99f406d2f08f15ca,2025-05-05T12:15:16.923000 +CVE-2025-3552,0,0,d8dea9ae72a1aad2fd2130f4534dbc6d0eec5b00f9120e1a475f869c79df2754,2025-05-05T12:15:17.017000 CVE-2025-3553,0,0,8c1f5e14061a66a48b1706566e256d4f8488eab0bb5ab64ca443be3751b0a454,2025-04-15T18:39:27.967000 CVE-2025-3554,0,0,c0abfdbdf90c0e224f35d24ce51fd8768d7addfcdcc1d013eb7c63964315f5b4,2025-04-15T18:39:27.967000 CVE-2025-3555,0,0,b7c360be3db59a3fe1c48e7f971bfcde48092d0da4916799343add506c814c87,2025-04-16T12:15:16.760000 @@ -291445,7 +291449,7 @@ CVE-2025-3576,0,0,fcfdd1e678fdad628e7417f5b3843fb736313985ccb3419de0d7118ddd0404 CVE-2025-3577,0,0,dfdef997e669866588ab8eb7c1ca73b6cf2cbe16fcb69f43d2b34abd27af8076,2025-04-23T14:08:13.383000 CVE-2025-3578,0,0,e13e840aaf0a24c67a679c44959c85bec14fbcb560caa6c65722eed662e1826f,2025-04-15T18:39:27.967000 CVE-2025-3579,0,0,6c0217c9a43a942438244f9ebf630b5c65085fd986d644363e1cb943f76ed2bf,2025-04-15T18:39:27.967000 -CVE-2025-3583,0,0,0900c0a3d334b78543d9f9691ce90569e70246880afdd85df4ee0b94418c38a4,2025-05-05T06:15:31.620000 +CVE-2025-3583,0,1,7299a2e3bfa9ccc76f4d8547dd6bc1911e8e69d4c59942bed45cdc8de9741c97,2025-05-05T15:15:54.273000 CVE-2025-3585,0,0,a54288693643171c0acabc6ec95ab94f7327c2199882403bf0dab9c0f61422eb,2025-04-15T18:39:27.967000 CVE-2025-3587,0,0,766ca17a6eb8489be0c0c9a1346a82464f26020cfd84ceca7694920ed05f0f9c,2025-04-15T18:39:27.967000 CVE-2025-3588,0,0,da176b06433f826abfeb7533e116e8f1c0acf114fe10a330f45ab13cc6f35417,2025-04-15T18:39:27.967000 @@ -291721,7 +291725,7 @@ CVE-2025-3915,0,0,7ef07e3557a0599cd61ae2360c99d37066278383396fda2be6ec28859bbb44 CVE-2025-3918,0,0,78444e6a9c0a46715cf65bc19e5d16644ec350c792fa6f0430cd0c875f0221a0,2025-05-03T03:15:28.040000 CVE-2025-3923,0,0,ee152c7f1a42d63e1ca21cb1c49adcbe2fb8c27f05521d2bf1672c2da0c26904,2025-04-29T13:52:28.490000 CVE-2025-3927,0,0,9d4990b47789dce40b6ef7685dc00d0cccd4e67e2ae4c3634787a9e35c6249df,2025-05-02T16:15:34.273000 -CVE-2025-3928,0,0,d46b9c14e7aba95c51abe31baac71f7d9ed492709d856a746740d4fe91efaa0e,2025-05-02T14:15:28.413000 +CVE-2025-3928,0,1,83a0809de1a0edc8dc4f4af3ed72246720b692a4958d733053fb98519a258338,2025-05-05T14:15:28.793000 CVE-2025-3929,0,0,2a38a98459a708cd9d0d1bae67ceef7cd34761c71e33edea585561657181b8b1,2025-04-29T13:52:10.697000 CVE-2025-3935,0,0,80d75d2841d93927d14c762eb28687b5d04ff0b86b4afd1b2a25489128931894,2025-04-29T13:52:28.490000 CVE-2025-39359,0,0,8cade7eb5a0a3d62159777effed30e36c7660bd8375986e1563b0eb49736a1f5,2025-04-29T13:52:47.470000 @@ -291951,7 +291955,7 @@ CVE-2025-4022,0,0,361eab4e61076ddd9008c4fde1f99386bd7ca1e563eed81b6ab5a74ec2d8bf CVE-2025-4023,0,0,ae7b514950acb1d0e8a150143b756522352dcc0109ccfba026d3a22b56f57b8b,2025-04-29T13:52:10.697000 CVE-2025-4024,0,0,51d2aadaef1787c43205dd3a26db8f1f59a78292def543fea6c4eff7af3b3357,2025-04-30T19:55:28.690000 CVE-2025-4025,0,0,fdb9397839d24231984d6fd8388d95b4eaa67ef5893900c4575f5927c6dd287e,2025-04-30T19:52:29.283000 -CVE-2025-4026,0,1,ade78218aee5b26ac157ef8116ca28c3d198000c7abc8ac928bd26875ab232c6,2025-05-05T13:15:49.440000 +CVE-2025-4026,0,0,ade78218aee5b26ac157ef8116ca28c3d198000c7abc8ac928bd26875ab232c6,2025-05-05T13:15:49.440000 CVE-2025-4027,0,0,86331e57ccecf1fae9d0cc0baebb4281a8160f843c30036be646a9e7df5b2dfc,2025-04-30T18:11:46.973000 CVE-2025-4028,0,0,dd51e1ab5053c7eecef2be2c9fbcbe2297b84c3538711bf10f87d7bd104885d3,2025-04-29T13:52:10.697000 CVE-2025-4029,0,0,a9bcd92523de8592e834652d809a888cd67eac5c67d3e4d8a9af846b8a3bed44,2025-04-29T13:52:10.697000 @@ -292089,10 +292093,10 @@ CVE-2025-4204,0,0,b9df2a1e113f2262dc1922a48306035d7f1d7459c849de132b9aee720dbefb CVE-2025-4210,0,0,af861b701427c03cc1825521a8f85486a15b444e199aec55a73933be4bb55862,2025-05-02T16:15:36.743000 CVE-2025-4213,0,0,9422ab70029ffc8edda9a67c9aaaf9b104f2c99c9bbeb40f4cd08defac23c8ed,2025-05-02T18:15:28.160000 CVE-2025-4214,0,0,8cee5e2c191dc5f7c39625764e80f36dacfe3615ac2ff5e798d6d9dcab815ab0,2025-05-02T20:15:20.003000 -CVE-2025-4215,0,0,5fd7a49b2f2c9f1e10a1eaa6aaf7951ee590f9e0aaf9c857c08ce31bb1852fbe,2025-05-02T21:15:23.893000 -CVE-2025-4218,0,0,a58de78c748f0c970b32963cfb0c0c4b002aa8f4aa47c3e31af6ad119f6d5528,2025-05-02T21:15:24.057000 +CVE-2025-4215,0,1,06946e02eb92c6ad790e0cf7c1b28f402d6206c03a42c16676dc8b18e30cf8f8,2025-05-05T15:15:55.017000 +CVE-2025-4218,0,1,0f4ea4a1b065bbdda0bd2da4e8ba5ae4d91791731e16d9a75d3c3ab04f91d2b2,2025-05-05T15:15:55.140000 CVE-2025-4222,0,0,d7e55c8bdf6a556e71c00ab53da641e383f5a7392abda11a90f9dd5f2800bf1c,2025-05-03T03:15:29.217000 -CVE-2025-4226,0,1,9f819de35b7715e56db80248d10b79fef538c6358ac0946b3a95bcb0c8229a7c,2025-05-05T13:15:49.620000 +CVE-2025-4226,0,0,9f819de35b7715e56db80248d10b79fef538c6358ac0946b3a95bcb0c8229a7c,2025-05-05T13:15:49.620000 CVE-2025-4236,0,0,b02b73d2178832a88f0069b14b0ab050d3506e4246a4c6b03a35dfdf221c36c3,2025-05-03T14:15:16.360000 CVE-2025-4237,0,0,b8dfb524fe6a3cc945f250dd88926768b7e86e7db972e69849a5847496c728cf,2025-05-03T15:15:46.190000 CVE-2025-4238,0,0,8159de3399b6ac3e45ec65e0d9f2690cadc7e0050833ff85bb7b37dbd5e9d30c,2025-05-03T17:15:45.373000 @@ -292100,10 +292104,10 @@ CVE-2025-4239,0,0,1f7e77a27bdbe1c1dd34b8c30b8371d164a7cfb5ede6187f8be8f7ac6716c8 CVE-2025-4240,0,0,f26bf65514dd8c01d51b1f9fb8b60d9ea6fac4a8ec23574bceefd11ac00c996f,2025-05-03T18:15:15.907000 CVE-2025-4241,0,0,b9a7a2be54fc788970e27d7aa11cd8be4bbc589b7f6f58b0a6c7b1661f0fb025,2025-05-03T18:15:16.087000 CVE-2025-4242,0,0,a18e1f98cd095d87c40d74111ad793041b0163f20bf3618b9ca69660145ea961,2025-05-03T19:15:48.833000 -CVE-2025-4243,0,0,1310f6c5e6634d5424783242fba5844e05f34db18655d16c2c6fd75c9f0b8c71,2025-05-03T19:15:49.027000 -CVE-2025-4244,0,0,8b259f15428f0a929d71608db34d9147c9a97e4976e654353b7049d3e328affd,2025-05-03T20:15:16.823000 -CVE-2025-4247,0,0,4066868d5713f167ac200dcde7dfb560fab9c8107c8253230c4533ff119125d3,2025-05-04T05:15:30.023000 -CVE-2025-4248,0,0,10b332005681a83a5eb8712d3b70b6c24668ed9d699c7f927584d89d73073617,2025-05-04T06:15:14.667000 +CVE-2025-4243,0,1,e0535a6a694c5ba1c5654b8e69a68e74071ffa502dc4b055cd4edc6bcbf6472e,2025-05-05T15:15:55.317000 +CVE-2025-4244,0,1,a5f2385463620ac1a725285377b5c5a8604b82d12fe2de5ba6fcf8ae100fc9a7,2025-05-05T15:15:55.493000 +CVE-2025-4247,0,1,a88f9feefb5d3c3dca5c0e86775f25553979c300497cb2b827aeceb56a2f08ef,2025-05-05T15:15:55.613000 +CVE-2025-4248,0,1,fb97712b125822c1646a7f82867acff1b75da448467f4d703d13266ffcd63987,2025-05-05T15:15:55.740000 CVE-2025-4249,0,0,d31747f38e68f199ab53d1fe66543ef4d8c9ad2cd04e2e300ea5e49f2b1f49da,2025-05-04T07:15:46.510000 CVE-2025-4250,0,0,86985e0aebed8aa40005de56bff217d887fc19a8d92dae3bd1a8c05066ef5a91,2025-05-04T09:17:08.230000 CVE-2025-4251,0,0,9be76bce51ad4a4def0d0b1ba1022dbde65d442bae915e21b4e949e3e1992c87,2025-05-04T22:15:32.773000 @@ -292111,7 +292115,7 @@ CVE-2025-4252,0,0,3a3ede34768f259dfc19c49ebd459910e8cf96fbb0eeaf40d76aecab0dc142 CVE-2025-4253,0,0,eb700f3ff597f1d4cde62344388ef60bc86a36b95a84e5ee8ea7695e0ec83d5a,2025-05-04T23:15:46.010000 CVE-2025-4254,0,0,a50047622692b9d859d7852bac702655419f7cc4afc2d2eac1d731f2659bc1ed,2025-05-05T00:15:14.763000 CVE-2025-4255,0,0,78403e2fd28a1c6741dd043adf5fec0cac79fee6ef014c28c523c170b97207c9,2025-05-05T00:15:15.660000 -CVE-2025-4256,0,0,5ec2281ad2530d1c8ac5a993a04d43cb86dacfdcbb4f3b65df2fcd1232d87eb3,2025-05-05T01:15:48.970000 +CVE-2025-4256,0,1,8cf38ae7f18d9e1fe438422351dccee2d669aba2a8a23a0cfc7df7a467276d3e,2025-05-05T15:15:55.873000 CVE-2025-4257,0,0,7697797d572603a4b43e82dfc2c17399e0afb1951612a29ef544469152f78b6d,2025-05-05T01:15:49.367000 CVE-2025-4258,0,0,678599ffed8339ffc9301b7e98fb29ee2bbab82c17ce92bef538ede501f97c27,2025-05-05T02:15:18.480000 CVE-2025-4259,0,0,4360e3e48ffe0a4f6494efdde6020a048eea775c81b2573d21663600a329ac67,2025-05-05T03:15:23.477000 @@ -292135,7 +292139,7 @@ CVE-2025-4268,0,0,d7aff7ace9b956cb58e8b96b53613955ec37be56f4fae590b7616f66a3dedd CVE-2025-4269,0,0,e2311b72273c8b46f09502d544720d97d410109479b95f05c9f848567950d4d6,2025-05-05T07:15:48.233000 CVE-2025-4270,0,0,9157f526750597c098048759b02d02e77018675548819e2f5114007e720ff2d9,2025-05-05T08:15:15.607000 CVE-2025-4271,0,0,fe703aebab016cfa9484994c8ee2380801a9c825b53934e2145c5ec7a62d0266,2025-05-05T08:15:15.790000 -CVE-2025-4272,0,1,6301d184cf7e061ea599b1cd1c49765a2ed78e425f40c7a36c8dc08cb34c0d62,2025-05-05T11:15:45.593000 +CVE-2025-4272,0,0,6301d184cf7e061ea599b1cd1c49765a2ed78e425f40c7a36c8dc08cb34c0d62,2025-05-05T11:15:45.593000 CVE-2025-4273,0,0,30513e1edc3f48937d8031e4da5082aaf23e8e7c6784fd5493bc847cf717c492,2025-05-05T03:15:23.837000 CVE-2025-42921,0,0,fe45c9bf48d8b64b0cac9604dcc1ad3071452dfd7112cafe12dd9c33c82af017,2025-04-23T15:25:30.927000 CVE-2025-43012,0,0,f78eba67b396c6aab09f0e687e4ef58662e96b01c2404836843202e2dfdd4f0d,2025-04-17T20:21:05.203000 @@ -292143,6 +292147,7 @@ CVE-2025-43013,0,0,cea29fefbb7874147d20ca0439a948894c9ed92ca59da3ffe37724562ec07 CVE-2025-43014,0,0,8c8e187893b05115834c1fe60888f6689d95da1f55e6603f1b98a0a40089dd30,2025-04-23T16:11:35.837000 CVE-2025-43015,0,0,e1099e2d690e6500afcce9f63f8d90a3ffca94e6d4b413f55df99246e9d63336,2025-04-25T16:30:24.887000 CVE-2025-43016,0,0,f2c72cd86df0dc4f466aff47f20427f717da38e7cfd3bc2cf6bf3e8b276a88fe,2025-04-29T13:52:28.490000 +CVE-2025-4316,1,1,b5ee414db954cba5ade409f660d3e347fa52dbc81fef989b6028cf5d48f17797,2025-05-05T14:15:29.930000 CVE-2025-43595,0,0,639a97cf595df7ab33930e9fd17fe542d2f8123e314605b09346a74d940c7c9a,2025-05-02T13:52:51.693000 CVE-2025-43703,0,0,d6625a868be77b8d7893d215165a3a98f3361eec5aed450c8d69ce3a9dfaf391,2025-04-17T20:21:48.243000 CVE-2025-43704,0,0,e4a4f68c1c515be2555ad90b5dc0fde58f5ff1d76445660f48da718ee733becf,2025-04-17T20:21:48.243000 @@ -292242,6 +292247,7 @@ CVE-2025-45021,0,0,0570c2ba1a9bca30da6999bec8772c055b0034e01feec4d7b897bff6a185f CVE-2025-45427,0,0,2acb289b4531d79e0a4fdda0743ea875280a2030836ee1f38a4e78112f2ff823,2025-04-30T13:51:20.023000 CVE-2025-45428,0,0,a55753fec0ea61e23d5357aef97cfebf259250af906a54fae9de1214ab7deb77,2025-04-30T16:12:11.190000 CVE-2025-45429,0,0,32099a126e41e157c073e4b282e42326bf59a85e3c0de57c5dd11afb3e22532d,2025-04-30T15:48:51.963000 +CVE-2025-45751,1,1,1eb50bd19aa9c1d2f3cc167611b8a581352e2b09f3f2752a064141c7a6c0f389,2025-05-05T14:15:28.950000 CVE-2025-45800,0,0,a77d3a8dbf101835cb427b4c2e8f5bcf9b064432ed9cdca7565eb017dda72333,2025-05-02T17:15:52.423000 CVE-2025-45947,0,0,359c9dbf14e503988017d67aa788a499a7ac3bca9ffc4dc379e7011548317f85,2025-04-30T18:59:47.113000 CVE-2025-45949,0,0,2cec517c1301a76b89b8ccefb135dc95210f8464628904a6679478252432eda9,2025-04-30T18:03:41.357000 @@ -292302,7 +292308,7 @@ CVE-2025-46330,0,0,b6188a8dd9c3f0271d5a6760a7791d144665d3896d323b09f5649df3cc20b CVE-2025-46331,0,0,361ec4e6d8671e18323b0342483f801d5e5ac6de37d5bb066d6159aeff4b631e,2025-05-02T13:53:40.163000 CVE-2025-46332,0,0,96c2c457d28c67b449d8bc341e96f939c65e42814860e9980e4634cb0c192469,2025-05-02T17:15:52.947000 CVE-2025-46333,0,0,4ca215b72a98284b0530b719160d5251f8056ccde380184cb21e0e8b208b2507,2025-04-29T13:52:10.697000 -CVE-2025-46337,0,1,b0c7c5a04b7cd0d7c11d627a62b8d7e7338302f8d07f8fa9c84ea057ad9b0e48,2025-05-05T13:15:49.323000 +CVE-2025-46337,0,0,b0c7c5a04b7cd0d7c11d627a62b8d7e7338302f8d07f8fa9c84ea057ad9b0e48,2025-05-05T13:15:49.323000 CVE-2025-46338,0,0,e5ecbe8dfd6a5f1493e32f5c03131bbc11de3ed65d7bf0cc647180c8514ea1d2,2025-04-29T13:52:10.697000 CVE-2025-46342,0,0,4ccc97d67fbd9483c430474edc15b07bba02e1cfa6beb1ec434c2eab17b79121,2025-05-02T13:53:40.163000 CVE-2025-46343,0,0,aef42e784a4ba3ff6f4f92863ddf79ead99fe488ce3e4bc3bc064b7acfc66c93,2025-04-29T13:52:10.697000 @@ -292491,6 +292497,8 @@ CVE-2025-47154,0,0,6a55c646b5911b6b02123224674cd90dd2e3787c01df5f2ac266b60ca2d45 CVE-2025-47201,0,0,5909e655c347961adc92b049fc3b858cea6b26374920e4415466c07622f39f83,2025-05-02T13:52:51.693000 CVE-2025-47226,0,0,641f5bc349e6560fce4b9dbdd42056ce41fc882613061d87d593cee39dbb6d9a,2025-05-03T20:15:15.923000 CVE-2025-47229,0,0,6fec8ddd5443564353f10001f8967a7abfc9875f230e3648131bfcf21a9215a1,2025-05-03T03:15:28.183000 +CVE-2025-47240,1,1,6f2483b413224281be63c9ed06c49c6df7591950e649ffc34f5e0ba5adfd4086,2025-05-05T15:15:54.553000 CVE-2025-47241,0,0,62e4a8eb3802da3b010dd896661f13466c93ea94ff76b65b4508e15bf74e0b70,2025-05-03T21:15:48.023000 CVE-2025-47244,0,0,bfc121492ab9ab4995b077e613b5f51cff71abcfeaef217e8aa0887e5405d2d6,2025-05-03T23:15:48.150000 CVE-2025-47245,0,0,7c65e02bed3c5f6157c0a56e0c696229330ea4a006690ae51bdd9f5a0ceca314,2025-05-04T00:15:15.373000 +CVE-2025-47268,1,1,f74133ddbf54c182ee0c4a9be24bbfff4920a6203b7acdba2733f32acfb9fcfa,2025-05-05T14:15:29.063000