From aeb9995614a514683466bb021c8e00d68a23ccaf Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 14 Apr 2025 16:04:02 +0000 Subject: [PATCH] Auto-Update: 2025-04-14T16:00:20.178011+00:00 --- CVE-2022/CVE-2022-269xx/CVE-2022-26969.json | 32 +- CVE-2022/CVE-2022-314xx/CVE-2022-31469.json | 32 +- CVE-2022/CVE-2022-366xx/CVE-2022-36664.json | 32 +- CVE-2022/CVE-2022-373xx/CVE-2022-37307.json | 32 +- CVE-2022/CVE-2022-373xx/CVE-2022-37308.json | 32 +- CVE-2022/CVE-2022-373xx/CVE-2022-37309.json | 32 +- CVE-2022/CVE-2022-373xx/CVE-2022-37310.json | 32 +- CVE-2022/CVE-2022-373xx/CVE-2022-37311.json | 32 +- CVE-2022/CVE-2022-373xx/CVE-2022-37312.json | 32 +- CVE-2022/CVE-2022-373xx/CVE-2022-37313.json | 32 +- CVE-2022/CVE-2022-38xx/CVE-2022-3840.json | 22 +- CVE-2022/CVE-2022-40xx/CVE-2022-4047.json | 22 +- CVE-2022/CVE-2022-417xx/CVE-2022-41765.json | 32 +- CVE-2022/CVE-2022-417xx/CVE-2022-41767.json | 32 +- CVE-2022/CVE-2022-41xx/CVE-2022-4110.json | 22 +- CVE-2022/CVE-2022-41xx/CVE-2022-4117.json | 22 +- CVE-2022/CVE-2022-41xx/CVE-2022-4120.json | 22 +- CVE-2022/CVE-2022-41xx/CVE-2022-4152.json | 22 +- CVE-2022/CVE-2022-41xx/CVE-2022-4154.json | 22 +- CVE-2022/CVE-2022-41xx/CVE-2022-4156.json | 22 +- CVE-2022/CVE-2022-41xx/CVE-2022-4159.json | 22 +- CVE-2022/CVE-2022-41xx/CVE-2022-4160.json | 22 +- CVE-2022/CVE-2022-41xx/CVE-2022-4161.json | 22 +- CVE-2022/CVE-2022-41xx/CVE-2022-4162.json | 22 +- CVE-2022/CVE-2022-41xx/CVE-2022-4163.json | 22 +- CVE-2022/CVE-2022-41xx/CVE-2022-4164.json | 22 +- CVE-2022/CVE-2022-42xx/CVE-2022-4226.json | 22 +- CVE-2022/CVE-2022-42xx/CVE-2022-4227.json | 22 +- CVE-2022/CVE-2022-42xx/CVE-2022-4239.json | 22 +- CVE-2022/CVE-2022-42xx/CVE-2022-4242.json | 32 +- CVE-2022/CVE-2022-42xx/CVE-2022-4266.json | 22 +- CVE-2022/CVE-2022-42xx/CVE-2022-4267.json | 22 +- CVE-2022/CVE-2022-42xx/CVE-2022-4268.json | 22 +- CVE-2022/CVE-2022-454xx/CVE-2022-45424.json | 32 +- CVE-2022/CVE-2022-454xx/CVE-2022-45425.json | 32 +- CVE-2022/CVE-2022-454xx/CVE-2022-45426.json | 32 +- CVE-2022/CVE-2022-454xx/CVE-2022-45427.json | 32 +- CVE-2022/CVE-2022-454xx/CVE-2022-45428.json | 32 +- CVE-2022/CVE-2022-454xx/CVE-2022-45432.json | 32 +- CVE-2022/CVE-2022-454xx/CVE-2022-45433.json | 32 +- CVE-2023/CVE-2023-416xx/CVE-2023-41610.json | 39 ++- CVE-2023/CVE-2023-416xx/CVE-2023-41611.json | 38 ++- CVE-2023/CVE-2023-416xx/CVE-2023-41612.json | 38 ++- CVE-2024/CVE-2024-24xx/CVE-2024-2429.json | 46 ++- CVE-2024/CVE-2024-24xx/CVE-2024-2439.json | 46 ++- CVE-2024/CVE-2024-28xx/CVE-2024-2837.json | 46 ++- CVE-2024/CVE-2024-315xx/CVE-2024-31551.json | 31 +- CVE-2024/CVE-2024-334xx/CVE-2024-33423.json | 33 ++- CVE-2024/CVE-2024-334xx/CVE-2024-33424.json | 33 ++- CVE-2024/CVE-2024-343xx/CVE-2024-34315.json | 33 ++- CVE-2024/CVE-2024-357xx/CVE-2024-35739.json | 8 +- CVE-2024/CVE-2024-393xx/CVE-2024-39311.json | 72 ++++- CVE-2024/CVE-2024-486xx/CVE-2024-48615.json | 39 ++- CVE-2024/CVE-2024-498xx/CVE-2024-49825.json | 56 ++++ CVE-2024/CVE-2024-535xx/CVE-2024-53504.json | 35 ++- CVE-2024/CVE-2024-535xx/CVE-2024-53505.json | 32 +- CVE-2024/CVE-2024-535xx/CVE-2024-53506.json | 34 ++- CVE-2024/CVE-2024-535xx/CVE-2024-53507.json | 34 ++- CVE-2024/CVE-2024-539xx/CVE-2024-53967.json | 33 ++- CVE-2024/CVE-2024-539xx/CVE-2024-53968.json | 33 ++- CVE-2024/CVE-2024-539xx/CVE-2024-53969.json | 33 ++- CVE-2024/CVE-2024-539xx/CVE-2024-53970.json | 33 ++- CVE-2024/CVE-2024-549xx/CVE-2024-54918.json | 27 +- CVE-2024/CVE-2024-549xx/CVE-2024-54921.json | 27 +- CVE-2024/CVE-2024-549xx/CVE-2024-54923.json | 27 +- CVE-2024/CVE-2024-549xx/CVE-2024-54924.json | 27 +- CVE-2024/CVE-2024-549xx/CVE-2024-54925.json | 27 +- CVE-2024/CVE-2024-92xx/CVE-2024-9230.json | 27 +- CVE-2025/CVE-2025-211xx/CVE-2025-21170.json | 27 +- CVE-2025/CVE-2025-21xx/CVE-2025-2160.json | 56 ++++ CVE-2025/CVE-2025-21xx/CVE-2025-2161.json | 56 ++++ CVE-2025/CVE-2025-22xx/CVE-2025-2259.json | 6 +- CVE-2025/CVE-2025-22xx/CVE-2025-2260.json | 6 +- CVE-2025/CVE-2025-24xx/CVE-2025-2424.json | 56 ++++ CVE-2025/CVE-2025-24xx/CVE-2025-2475.json | 56 ++++ CVE-2025/CVE-2025-25xx/CVE-2025-2563.json | 27 +- CVE-2025/CVE-2025-271xx/CVE-2025-27176.json | 51 +++- CVE-2025/CVE-2025-271xx/CVE-2025-27177.json | 61 +++- CVE-2025/CVE-2025-271xx/CVE-2025-27178.json | 51 +++- CVE-2025/CVE-2025-271xx/CVE-2025-27179.json | 51 +++- CVE-2025/CVE-2025-290xx/CVE-2025-29087.json | 42 ++- CVE-2025/CVE-2025-290xx/CVE-2025-29088.json | 42 ++- CVE-2025/CVE-2025-29xx/CVE-2025-2915.json | 82 +++++- CVE-2025/CVE-2025-302xx/CVE-2025-30291.json | 218 +++++++++++++- CVE-2025/CVE-2025-302xx/CVE-2025-30292.json | 186 +++++++++++- CVE-2025/CVE-2025-303xx/CVE-2025-30372.json | 54 +++- CVE-2025/CVE-2025-322xx/CVE-2025-32200.json | 54 +--- CVE-2025/CVE-2025-329xx/CVE-2025-32906.json | 60 ++++ CVE-2025/CVE-2025-329xx/CVE-2025-32907.json | 60 ++++ CVE-2025/CVE-2025-329xx/CVE-2025-32908.json | 60 ++++ CVE-2025/CVE-2025-329xx/CVE-2025-32909.json | 60 ++++ CVE-2025/CVE-2025-329xx/CVE-2025-32910.json | 60 ++++ CVE-2025/CVE-2025-329xx/CVE-2025-32912.json | 60 ++++ CVE-2025/CVE-2025-329xx/CVE-2025-32913.json | 60 ++++ CVE-2025/CVE-2025-329xx/CVE-2025-32914.json | 60 ++++ CVE-2025/CVE-2025-329xx/CVE-2025-32930.json | 16 + CVE-2025/CVE-2025-35xx/CVE-2025-3566.json | 32 +- CVE-2025/CVE-2025-35xx/CVE-2025-3568.json | 145 +++++++++ CVE-2025/CVE-2025-35xx/CVE-2025-3569.json | 141 +++++++++ CVE-2025/CVE-2025-35xx/CVE-2025-3570.json | 145 +++++++++ CVE-2025/CVE-2025-35xx/CVE-2025-3571.json | 141 +++++++++ README.md | 93 +++--- _state.csv | 308 +++++++++++--------- 103 files changed, 4335 insertions(+), 415 deletions(-) create mode 100644 CVE-2024/CVE-2024-498xx/CVE-2024-49825.json create mode 100644 CVE-2025/CVE-2025-21xx/CVE-2025-2160.json create mode 100644 CVE-2025/CVE-2025-21xx/CVE-2025-2161.json create mode 100644 CVE-2025/CVE-2025-24xx/CVE-2025-2424.json create mode 100644 CVE-2025/CVE-2025-24xx/CVE-2025-2475.json create mode 100644 CVE-2025/CVE-2025-329xx/CVE-2025-32906.json create mode 100644 CVE-2025/CVE-2025-329xx/CVE-2025-32907.json create mode 100644 CVE-2025/CVE-2025-329xx/CVE-2025-32908.json create mode 100644 CVE-2025/CVE-2025-329xx/CVE-2025-32909.json create mode 100644 CVE-2025/CVE-2025-329xx/CVE-2025-32910.json create mode 100644 CVE-2025/CVE-2025-329xx/CVE-2025-32912.json create mode 100644 CVE-2025/CVE-2025-329xx/CVE-2025-32913.json create mode 100644 CVE-2025/CVE-2025-329xx/CVE-2025-32914.json create mode 100644 CVE-2025/CVE-2025-329xx/CVE-2025-32930.json create mode 100644 CVE-2025/CVE-2025-35xx/CVE-2025-3568.json create mode 100644 CVE-2025/CVE-2025-35xx/CVE-2025-3569.json create mode 100644 CVE-2025/CVE-2025-35xx/CVE-2025-3570.json create mode 100644 CVE-2025/CVE-2025-35xx/CVE-2025-3571.json diff --git a/CVE-2022/CVE-2022-269xx/CVE-2022-26969.json b/CVE-2022/CVE-2022-269xx/CVE-2022-26969.json index b8ae28da2d9..ea6bbf5026f 100644 --- a/CVE-2022/CVE-2022-269xx/CVE-2022-26969.json +++ b/CVE-2022/CVE-2022-269xx/CVE-2022-26969.json @@ -2,7 +2,7 @@ "id": "CVE-2022-26969", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-26T06:15:10.893", - "lastModified": "2024-11-21T06:54:53.077", + "lastModified": "2025-04-14T15:15:17.007", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-942" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-314xx/CVE-2022-31469.json b/CVE-2022/CVE-2022-314xx/CVE-2022-31469.json index e854a1fdec3..c174c6699e3 100644 --- a/CVE-2022/CVE-2022-314xx/CVE-2022-31469.json +++ b/CVE-2022/CVE-2022-314xx/CVE-2022-31469.json @@ -2,7 +2,7 @@ "id": "CVE-2022-31469", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-26T02:15:09.573", - "lastModified": "2024-11-21T07:04:30.917", + "lastModified": "2025-04-14T15:15:17.677", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-366xx/CVE-2022-36664.json b/CVE-2022/CVE-2022-366xx/CVE-2022-36664.json index 7119280be95..3640b43e536 100644 --- a/CVE-2022/CVE-2022-366xx/CVE-2022-36664.json +++ b/CVE-2022/CVE-2022-366xx/CVE-2022-36664.json @@ -2,7 +2,7 @@ "id": "CVE-2022-36664", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-26T22:15:10.473", - "lastModified": "2024-11-21T07:13:28.397", + "lastModified": "2025-04-14T15:15:17.927", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-373xx/CVE-2022-37307.json b/CVE-2022/CVE-2022-373xx/CVE-2022-37307.json index e56e74c7c46..9f57519ae8f 100644 --- a/CVE-2022/CVE-2022-373xx/CVE-2022-37307.json +++ b/CVE-2022/CVE-2022-373xx/CVE-2022-37307.json @@ -2,7 +2,7 @@ "id": "CVE-2022-37307", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-26T02:15:09.633", - "lastModified": "2024-11-21T07:14:43.430", + "lastModified": "2025-04-14T15:15:18.210", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-373xx/CVE-2022-37308.json b/CVE-2022/CVE-2022-373xx/CVE-2022-37308.json index 5a9394f78fb..87812b424ab 100644 --- a/CVE-2022/CVE-2022-373xx/CVE-2022-37308.json +++ b/CVE-2022/CVE-2022-373xx/CVE-2022-37308.json @@ -2,7 +2,7 @@ "id": "CVE-2022-37308", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-26T03:15:11.767", - "lastModified": "2024-11-21T07:14:43.603", + "lastModified": "2025-04-14T15:15:18.710", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-373xx/CVE-2022-37309.json b/CVE-2022/CVE-2022-373xx/CVE-2022-37309.json index 7cec9e7ca7c..a9d176815c1 100644 --- a/CVE-2022/CVE-2022-373xx/CVE-2022-37309.json +++ b/CVE-2022/CVE-2022-373xx/CVE-2022-37309.json @@ -2,7 +2,7 @@ "id": "CVE-2022-37309", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-26T04:15:10.443", - "lastModified": "2024-11-21T07:14:43.780", + "lastModified": "2025-04-14T15:15:19.253", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-373xx/CVE-2022-37310.json b/CVE-2022/CVE-2022-373xx/CVE-2022-37310.json index 9162a105992..d3034156967 100644 --- a/CVE-2022/CVE-2022-373xx/CVE-2022-37310.json +++ b/CVE-2022/CVE-2022-373xx/CVE-2022-37310.json @@ -2,7 +2,7 @@ "id": "CVE-2022-37310", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-26T04:15:10.497", - "lastModified": "2024-11-21T07:14:43.953", + "lastModified": "2025-04-14T15:15:19.463", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-373xx/CVE-2022-37311.json b/CVE-2022/CVE-2022-373xx/CVE-2022-37311.json index d127b2f2a84..2585a249257 100644 --- a/CVE-2022/CVE-2022-373xx/CVE-2022-37311.json +++ b/CVE-2022/CVE-2022-373xx/CVE-2022-37311.json @@ -2,7 +2,7 @@ "id": "CVE-2022-37311", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-26T02:15:09.683", - "lastModified": "2024-11-21T07:14:44.123", + "lastModified": "2025-04-14T15:15:19.687", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-1284" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1284" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-373xx/CVE-2022-37312.json b/CVE-2022/CVE-2022-373xx/CVE-2022-37312.json index 9cc136dd9aa..8dc07c79a20 100644 --- a/CVE-2022/CVE-2022-373xx/CVE-2022-37312.json +++ b/CVE-2022/CVE-2022-373xx/CVE-2022-37312.json @@ -2,7 +2,7 @@ "id": "CVE-2022-37312", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-26T02:15:09.743", - "lastModified": "2024-11-21T07:14:44.290", + "lastModified": "2025-04-14T15:15:20.163", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-1284" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1284" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-373xx/CVE-2022-37313.json b/CVE-2022/CVE-2022-373xx/CVE-2022-37313.json index 70179b6ad9e..4f178e5013d 100644 --- a/CVE-2022/CVE-2022-373xx/CVE-2022-37313.json +++ b/CVE-2022/CVE-2022-373xx/CVE-2022-37313.json @@ -2,7 +2,7 @@ "id": "CVE-2022-37313", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-26T02:15:09.810", - "lastModified": "2024-11-21T07:14:44.457", + "lastModified": "2025-04-14T15:15:20.983", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-918" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-38xx/CVE-2022-3840.json b/CVE-2022/CVE-2022-38xx/CVE-2022-3840.json index cfec8cd1be0..d966b6d12b4 100644 --- a/CVE-2022/CVE-2022-38xx/CVE-2022-3840.json +++ b/CVE-2022/CVE-2022-38xx/CVE-2022-3840.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3840", "sourceIdentifier": "contact@wpscan.com", "published": "2022-12-26T13:15:12.113", - "lastModified": "2024-11-21T07:20:20.597", + "lastModified": "2025-04-14T14:15:19.550", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-40xx/CVE-2022-4047.json b/CVE-2022/CVE-2022-40xx/CVE-2022-4047.json index e09958a458a..3726760b6b3 100644 --- a/CVE-2022/CVE-2022-40xx/CVE-2022-4047.json +++ b/CVE-2022/CVE-2022-40xx/CVE-2022-4047.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4047", "sourceIdentifier": "contact@wpscan.com", "published": "2022-12-26T13:15:12.250", - "lastModified": "2024-11-21T07:34:30.487", + "lastModified": "2025-04-14T14:15:21.480", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2022/CVE-2022-417xx/CVE-2022-41765.json b/CVE-2022/CVE-2022-417xx/CVE-2022-41765.json index fa45307e681..c4de0022742 100644 --- a/CVE-2022/CVE-2022-417xx/CVE-2022-41765.json +++ b/CVE-2022/CVE-2022-417xx/CVE-2022-41765.json @@ -2,7 +2,7 @@ "id": "CVE-2022-41765", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-26T06:15:11.007", - "lastModified": "2024-11-21T07:23:48.227", + "lastModified": "2025-04-14T15:15:21.573", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-203" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-417xx/CVE-2022-41767.json b/CVE-2022/CVE-2022-417xx/CVE-2022-41767.json index cfd8333dba3..5a1f8af1f54 100644 --- a/CVE-2022/CVE-2022-417xx/CVE-2022-41767.json +++ b/CVE-2022/CVE-2022-417xx/CVE-2022-41767.json @@ -2,7 +2,7 @@ "id": "CVE-2022-41767", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-26T06:15:11.057", - "lastModified": "2024-11-21T07:23:48.530", + "lastModified": "2025-04-14T15:15:21.840", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-41xx/CVE-2022-4110.json b/CVE-2022/CVE-2022-41xx/CVE-2022-4110.json index ed420d00e35..28c776d0b70 100644 --- a/CVE-2022/CVE-2022-41xx/CVE-2022-4110.json +++ b/CVE-2022/CVE-2022-41xx/CVE-2022-4110.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4110", "sourceIdentifier": "contact@wpscan.com", "published": "2022-12-26T13:15:12.313", - "lastModified": "2024-11-21T07:34:36.053", + "lastModified": "2025-04-14T14:15:21.643", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-41xx/CVE-2022-4117.json b/CVE-2022/CVE-2022-41xx/CVE-2022-4117.json index acf2733f30f..2a69eeca47b 100644 --- a/CVE-2022/CVE-2022-41xx/CVE-2022-4117.json +++ b/CVE-2022/CVE-2022-41xx/CVE-2022-4117.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4117", "sourceIdentifier": "contact@wpscan.com", "published": "2022-12-26T13:15:12.373", - "lastModified": "2024-11-21T07:34:36.690", + "lastModified": "2025-04-14T15:15:22.283", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2022/CVE-2022-41xx/CVE-2022-4120.json b/CVE-2022/CVE-2022-41xx/CVE-2022-4120.json index a2c83e4ecc4..651dc09fec3 100644 --- a/CVE-2022/CVE-2022-41xx/CVE-2022-4120.json +++ b/CVE-2022/CVE-2022-41xx/CVE-2022-4120.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4120", "sourceIdentifier": "contact@wpscan.com", "published": "2022-12-26T13:15:12.437", - "lastModified": "2024-11-21T07:34:37.000", + "lastModified": "2025-04-14T14:15:21.803", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2022/CVE-2022-41xx/CVE-2022-4152.json b/CVE-2022/CVE-2022-41xx/CVE-2022-4152.json index 4db040da82a..53bef2bacba 100644 --- a/CVE-2022/CVE-2022-41xx/CVE-2022-4152.json +++ b/CVE-2022/CVE-2022-41xx/CVE-2022-4152.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4152", "sourceIdentifier": "contact@wpscan.com", "published": "2022-12-26T13:15:12.650", - "lastModified": "2024-11-21T07:34:40.720", + "lastModified": "2025-04-14T14:15:21.957", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-41xx/CVE-2022-4154.json b/CVE-2022/CVE-2022-41xx/CVE-2022-4154.json index e821eb89509..b87b7fbbf38 100644 --- a/CVE-2022/CVE-2022-41xx/CVE-2022-4154.json +++ b/CVE-2022/CVE-2022-41xx/CVE-2022-4154.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4154", "sourceIdentifier": "contact@wpscan.com", "published": "2022-12-26T13:15:12.837", - "lastModified": "2024-11-21T07:34:40.933", + "lastModified": "2025-04-14T15:15:22.547", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-41xx/CVE-2022-4156.json b/CVE-2022/CVE-2022-41xx/CVE-2022-4156.json index a66c4899655..021714a5aae 100644 --- a/CVE-2022/CVE-2022-41xx/CVE-2022-4156.json +++ b/CVE-2022/CVE-2022-41xx/CVE-2022-4156.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4156", "sourceIdentifier": "contact@wpscan.com", "published": "2022-12-26T13:15:12.963", - "lastModified": "2024-11-21T07:34:41.160", + "lastModified": "2025-04-14T15:15:22.737", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-41xx/CVE-2022-4159.json b/CVE-2022/CVE-2022-41xx/CVE-2022-4159.json index 4b20f7d53c5..d185ae37c12 100644 --- a/CVE-2022/CVE-2022-41xx/CVE-2022-4159.json +++ b/CVE-2022/CVE-2022-41xx/CVE-2022-4159.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4159", "sourceIdentifier": "contact@wpscan.com", "published": "2022-12-26T13:15:13.153", - "lastModified": "2024-11-21T07:34:41.503", + "lastModified": "2025-04-14T14:15:22.113", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-41xx/CVE-2022-4160.json b/CVE-2022/CVE-2022-41xx/CVE-2022-4160.json index f28e236ca41..20ba80c8645 100644 --- a/CVE-2022/CVE-2022-41xx/CVE-2022-4160.json +++ b/CVE-2022/CVE-2022-41xx/CVE-2022-4160.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4160", "sourceIdentifier": "contact@wpscan.com", "published": "2022-12-26T13:15:13.217", - "lastModified": "2024-11-21T07:34:41.620", + "lastModified": "2025-04-14T14:15:22.320", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-41xx/CVE-2022-4161.json b/CVE-2022/CVE-2022-41xx/CVE-2022-4161.json index 947b820af8a..ac0478d6beb 100644 --- a/CVE-2022/CVE-2022-41xx/CVE-2022-4161.json +++ b/CVE-2022/CVE-2022-41xx/CVE-2022-4161.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4161", "sourceIdentifier": "contact@wpscan.com", "published": "2022-12-26T13:15:13.280", - "lastModified": "2024-11-21T07:34:41.737", + "lastModified": "2025-04-14T15:15:22.907", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-41xx/CVE-2022-4162.json b/CVE-2022/CVE-2022-41xx/CVE-2022-4162.json index 316bbc783cc..6f188940927 100644 --- a/CVE-2022/CVE-2022-41xx/CVE-2022-4162.json +++ b/CVE-2022/CVE-2022-41xx/CVE-2022-4162.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4162", "sourceIdentifier": "contact@wpscan.com", "published": "2022-12-26T13:15:13.343", - "lastModified": "2024-11-21T07:34:41.850", + "lastModified": "2025-04-14T14:15:22.480", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-41xx/CVE-2022-4163.json b/CVE-2022/CVE-2022-41xx/CVE-2022-4163.json index 93d7c648978..5b7f157b69a 100644 --- a/CVE-2022/CVE-2022-41xx/CVE-2022-4163.json +++ b/CVE-2022/CVE-2022-41xx/CVE-2022-4163.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4163", "sourceIdentifier": "contact@wpscan.com", "published": "2022-12-26T13:15:13.403", - "lastModified": "2024-11-21T07:34:41.950", + "lastModified": "2025-04-14T15:15:23.080", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-41xx/CVE-2022-4164.json b/CVE-2022/CVE-2022-41xx/CVE-2022-4164.json index 05c20232c0f..e9db6316c80 100644 --- a/CVE-2022/CVE-2022-41xx/CVE-2022-4164.json +++ b/CVE-2022/CVE-2022-41xx/CVE-2022-4164.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4164", "sourceIdentifier": "contact@wpscan.com", "published": "2022-12-26T13:15:13.467", - "lastModified": "2024-11-21T07:34:42.053", + "lastModified": "2025-04-14T14:15:22.633", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-42xx/CVE-2022-4226.json b/CVE-2022/CVE-2022-42xx/CVE-2022-4226.json index 125fb03d39a..1a29992429d 100644 --- a/CVE-2022/CVE-2022-42xx/CVE-2022-4226.json +++ b/CVE-2022/CVE-2022-42xx/CVE-2022-4226.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4226", "sourceIdentifier": "contact@wpscan.com", "published": "2022-12-26T13:15:13.717", - "lastModified": "2024-11-21T07:34:49.660", + "lastModified": "2025-04-14T14:15:22.790", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-42xx/CVE-2022-4227.json b/CVE-2022/CVE-2022-42xx/CVE-2022-4227.json index 1d89b534b49..4b9c9df6a91 100644 --- a/CVE-2022/CVE-2022-42xx/CVE-2022-4227.json +++ b/CVE-2022/CVE-2022-42xx/CVE-2022-4227.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4227", "sourceIdentifier": "contact@wpscan.com", "published": "2022-12-26T13:15:13.777", - "lastModified": "2024-11-21T07:34:49.770", + "lastModified": "2025-04-14T14:15:22.950", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-42xx/CVE-2022-4239.json b/CVE-2022/CVE-2022-42xx/CVE-2022-4239.json index 6bccff91abb..67f080257b5 100644 --- a/CVE-2022/CVE-2022-42xx/CVE-2022-4239.json +++ b/CVE-2022/CVE-2022-42xx/CVE-2022-4239.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4239", "sourceIdentifier": "contact@wpscan.com", "published": "2022-12-26T13:15:13.840", - "lastModified": "2024-11-21T07:34:51.060", + "lastModified": "2025-04-14T14:15:23.100", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-42xx/CVE-2022-4242.json b/CVE-2022/CVE-2022-42xx/CVE-2022-4242.json index 9ac41c8fc4c..8f93ba72bcb 100644 --- a/CVE-2022/CVE-2022-42xx/CVE-2022-4242.json +++ b/CVE-2022/CVE-2022-42xx/CVE-2022-4242.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4242", "sourceIdentifier": "contact@wpscan.com", "published": "2022-12-26T13:15:13.903", - "lastModified": "2024-11-21T07:34:51.290", + "lastModified": "2025-04-14T14:15:23.247", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-42xx/CVE-2022-4266.json b/CVE-2022/CVE-2022-42xx/CVE-2022-4266.json index f4460163371..903d6ce415d 100644 --- a/CVE-2022/CVE-2022-42xx/CVE-2022-4266.json +++ b/CVE-2022/CVE-2022-42xx/CVE-2022-4266.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4266", "sourceIdentifier": "contact@wpscan.com", "published": "2022-12-26T13:15:14.023", - "lastModified": "2024-11-21T07:34:54.307", + "lastModified": "2025-04-14T14:15:23.407", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-42xx/CVE-2022-4267.json b/CVE-2022/CVE-2022-42xx/CVE-2022-4267.json index 368328b3278..f042c389ea9 100644 --- a/CVE-2022/CVE-2022-42xx/CVE-2022-4267.json +++ b/CVE-2022/CVE-2022-42xx/CVE-2022-4267.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4267", "sourceIdentifier": "contact@wpscan.com", "published": "2022-12-26T13:15:14.087", - "lastModified": "2024-11-21T07:34:54.420", + "lastModified": "2025-04-14T15:15:23.240", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-42xx/CVE-2022-4268.json b/CVE-2022/CVE-2022-42xx/CVE-2022-4268.json index 1a19c252176..af3ee046732 100644 --- a/CVE-2022/CVE-2022-42xx/CVE-2022-4268.json +++ b/CVE-2022/CVE-2022-42xx/CVE-2022-4268.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4268", "sourceIdentifier": "contact@wpscan.com", "published": "2022-12-26T13:15:14.150", - "lastModified": "2024-11-21T07:34:54.530", + "lastModified": "2025-04-14T15:15:23.423", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, diff --git a/CVE-2022/CVE-2022-454xx/CVE-2022-45424.json b/CVE-2022/CVE-2022-454xx/CVE-2022-45424.json index bbf25912d60..acd94a19062 100644 --- a/CVE-2022/CVE-2022-454xx/CVE-2022-45424.json +++ b/CVE-2022/CVE-2022-454xx/CVE-2022-45424.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45424", "sourceIdentifier": "cybersecurity@dahuatech.com", "published": "2022-12-27T18:15:10.450", - "lastModified": "2024-11-21T07:29:14.120", + "lastModified": "2025-04-14T14:15:20.313", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-306" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-454xx/CVE-2022-45425.json b/CVE-2022/CVE-2022-454xx/CVE-2022-45425.json index 086abd06948..3d59dfb0d9e 100644 --- a/CVE-2022/CVE-2022-454xx/CVE-2022-45425.json +++ b/CVE-2022/CVE-2022-454xx/CVE-2022-45425.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45425", "sourceIdentifier": "cybersecurity@dahuatech.com", "published": "2022-12-27T18:15:10.500", - "lastModified": "2024-11-21T07:29:14.227", + "lastModified": "2025-04-14T14:15:20.493", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-798" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-454xx/CVE-2022-45426.json b/CVE-2022/CVE-2022-454xx/CVE-2022-45426.json index 7c454e83b67..e18547cc14e 100644 --- a/CVE-2022/CVE-2022-454xx/CVE-2022-45426.json +++ b/CVE-2022/CVE-2022-454xx/CVE-2022-45426.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45426", "sourceIdentifier": "cybersecurity@dahuatech.com", "published": "2022-12-27T18:15:10.553", - "lastModified": "2024-11-21T07:29:14.330", + "lastModified": "2025-04-14T14:15:20.653", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-552" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-552" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-454xx/CVE-2022-45427.json b/CVE-2022/CVE-2022-454xx/CVE-2022-45427.json index 3be6ad0adad..3cee090b69a 100644 --- a/CVE-2022/CVE-2022-454xx/CVE-2022-45427.json +++ b/CVE-2022/CVE-2022-454xx/CVE-2022-45427.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45427", "sourceIdentifier": "cybersecurity@dahuatech.com", "published": "2022-12-27T18:15:10.600", - "lastModified": "2024-11-21T07:29:14.437", + "lastModified": "2025-04-14T14:15:20.827", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-454xx/CVE-2022-45428.json b/CVE-2022/CVE-2022-454xx/CVE-2022-45428.json index 2ac5d07f0eb..f672085de42 100644 --- a/CVE-2022/CVE-2022-454xx/CVE-2022-45428.json +++ b/CVE-2022/CVE-2022-454xx/CVE-2022-45428.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45428", "sourceIdentifier": "cybersecurity@dahuatech.com", "published": "2022-12-27T18:15:10.650", - "lastModified": "2024-11-21T07:29:14.540", + "lastModified": "2025-04-14T14:15:20.990", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 2.7, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-201" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-454xx/CVE-2022-45432.json b/CVE-2022/CVE-2022-454xx/CVE-2022-45432.json index 8bc342b0146..397b57b575e 100644 --- a/CVE-2022/CVE-2022-454xx/CVE-2022-45432.json +++ b/CVE-2022/CVE-2022-454xx/CVE-2022-45432.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45432", "sourceIdentifier": "cybersecurity@dahuatech.com", "published": "2022-12-27T18:15:10.847", - "lastModified": "2024-11-21T07:29:14.990", + "lastModified": "2025-04-14T14:15:21.160", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-454xx/CVE-2022-45433.json b/CVE-2022/CVE-2022-454xx/CVE-2022-45433.json index 5e2d0c89229..0e94fd2d41b 100644 --- a/CVE-2022/CVE-2022-454xx/CVE-2022-45433.json +++ b/CVE-2022/CVE-2022-454xx/CVE-2022-45433.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45433", "sourceIdentifier": "cybersecurity@dahuatech.com", "published": "2022-12-27T18:15:10.907", - "lastModified": "2024-11-21T07:29:15.093", + "lastModified": "2025-04-14T14:15:21.313", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 3.7, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-416xx/CVE-2023-41610.json b/CVE-2023/CVE-2023-416xx/CVE-2023-41610.json index 667607eb8d9..9335dff4816 100644 --- a/CVE-2023/CVE-2023-416xx/CVE-2023-41610.json +++ b/CVE-2023/CVE-2023-416xx/CVE-2023-41610.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41610", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-18T18:15:05.680", - "lastModified": "2024-09-20T12:30:17.483", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-14T15:09:27.940", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -55,10 +55,43 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:govicture:pc420_firmware:1.1.39:*:*:*:*:*:*:*", + "matchCriteriaId": "7AD3C163-8116-47EB-8198-EB85F3800703" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:govicture:pc420:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D51F2A1-5B4A-468F-862E-C426F29A8EED" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.trevorkems.com/operation-big-brother-iot-camera/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-416xx/CVE-2023-41611.json b/CVE-2023/CVE-2023-416xx/CVE-2023-41611.json index 6da51e12867..9b87b752bdb 100644 --- a/CVE-2023/CVE-2023-416xx/CVE-2023-41611.json +++ b/CVE-2023/CVE-2023-416xx/CVE-2023-41611.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41611", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-18T18:15:05.750", - "lastModified": "2024-11-21T17:15:07.103", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-14T15:09:32.227", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,42 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:govicture:pc420_firmware:1.1.39:*:*:*:*:*:*:*", + "matchCriteriaId": "7AD3C163-8116-47EB-8198-EB85F3800703" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:govicture:pc420:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D51F2A1-5B4A-468F-862E-C426F29A8EED" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.trevorkems.com/operation-big-brother-iot-camera/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-416xx/CVE-2023-41612.json b/CVE-2023/CVE-2023-416xx/CVE-2023-41612.json index d689693acd4..5327ff95317 100644 --- a/CVE-2023/CVE-2023-416xx/CVE-2023-41612.json +++ b/CVE-2023/CVE-2023-416xx/CVE-2023-41612.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41612", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-18T18:15:05.803", - "lastModified": "2024-09-20T14:35:07.740", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-14T15:09:35.363", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,42 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:govicture:pc420_firmware:1.1.39:*:*:*:*:*:*:*", + "matchCriteriaId": "7AD3C163-8116-47EB-8198-EB85F3800703" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:govicture:pc420:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D51F2A1-5B4A-468F-862E-C426F29A8EED" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.trevorkems.com/operation-big-brother-iot-camera/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2429.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2429.json index 250ae469789..51e0c0c080c 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2429.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2429.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2429", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-26T05:15:50.083", - "lastModified": "2024-11-21T09:09:44.177", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-14T14:18:25.260", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:salonbookingsystem:salon_booking_system:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "9.6.6", + "matchCriteriaId": "F3E333BD-1AE1-453F-9C2D-57B45EFC3F11" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/1c6812d8-a218-4c15-9e2d-d43f3f3b0e78/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/1c6812d8-a218-4c15-9e2d-d43f3f3b0e78/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2439.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2439.json index 2d4141ccda6..9158ed20918 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2439.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2439.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2439", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-26T05:15:50.127", - "lastModified": "2025-03-29T00:15:21.110", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-14T14:18:39.200", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:salonbookingsystem:salon_booking_system:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "9.6.6", + "matchCriteriaId": "F3E333BD-1AE1-453F-9C2D-57B45EFC3F11" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/7a375077-fc70-4389-b109-28fce3db2aef/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/7a375077-fc70-4389-b109-28fce3db2aef/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2837.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2837.json index 20aac6bd8d3..acdef93a9a1 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2837.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2837.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2837", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-26T05:15:50.200", - "lastModified": "2024-11-21T09:10:38.710", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-14T14:20:24.840", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ninjateam:wp_chat_app:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.6.4", + "matchCriteriaId": "B31E4A66-590D-4B77-93A7-F9BE77DA2E84" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/91058c48-f262-4fcc-9390-472d59d61115/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/91058c48-f262-4fcc-9390-472d59d61115/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-315xx/CVE-2024-31551.json b/CVE-2024/CVE-2024-315xx/CVE-2024-31551.json index f0aa0aeee9f..1f73ebff057 100644 --- a/CVE-2024/CVE-2024-315xx/CVE-2024-31551.json +++ b/CVE-2024/CVE-2024-315xx/CVE-2024-31551.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31551", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-26T22:15:08.080", - "lastModified": "2024-11-21T09:13:41.600", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-14T14:20:58.263", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cmseasy:cmseasy:7.7.7.9:*:*:*:*:*:*:*", + "matchCriteriaId": "C47FE864-5B8E-428F-80DC-AA29EDB454DA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.yuque.com/sickle-ffnce/awixr8/qu8i0p9y0h277m6u", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.yuque.com/sickle-ffnce/awixr8/qu8i0p9y0h277m6u", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-334xx/CVE-2024-33423.json b/CVE-2024/CVE-2024-334xx/CVE-2024-33423.json index 6e1c68624e4..f058b118829 100644 --- a/CVE-2024/CVE-2024-334xx/CVE-2024-33423.json +++ b/CVE-2024/CVE-2024-334xx/CVE-2024-33423.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33423", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-01T20:15:12.887", - "lastModified": "2024-11-21T09:16:55.627", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-14T14:22:00.643", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cmsimple:cmsimple:5.15:*:*:*:*:*:*:*", + "matchCriteriaId": "1A242371-65BD-4A8F-AAD0-D390BCC73B67" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/adiapera/xss_language_cmsimple_5.15", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/adiapera/xss_language_cmsimple_5.15", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-334xx/CVE-2024-33424.json b/CVE-2024/CVE-2024-334xx/CVE-2024-33424.json index c98c5474ef8..5bebfba26cb 100644 --- a/CVE-2024/CVE-2024-334xx/CVE-2024-33424.json +++ b/CVE-2024/CVE-2024-334xx/CVE-2024-33424.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33424", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-01T19:15:27.070", - "lastModified": "2024-11-21T09:16:55.843", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-14T14:21:50.547", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cmsimple:cmsimple:5.15:*:*:*:*:*:*:*", + "matchCriteriaId": "1A242371-65BD-4A8F-AAD0-D390BCC73B67" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/adiapera/xss_language_cmsimple_5.15", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/adiapera/xss_language_cmsimple_5.15", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-343xx/CVE-2024-34315.json b/CVE-2024/CVE-2024-343xx/CVE-2024-34315.json index 858af4718ac..5ff76f6c366 100644 --- a/CVE-2024/CVE-2024-343xx/CVE-2024-34315.json +++ b/CVE-2024/CVE-2024-343xx/CVE-2024-34315.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34315", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-07T19:15:08.447", - "lastModified": "2024-11-21T09:18:25.930", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-14T14:21:13.200", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cmseasy:cmseasy:7.7.7.9:*:*:*:*:*:*:*", + "matchCriteriaId": "C47FE864-5B8E-428F-80DC-AA29EDB454DA" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/H3rmesk1t/vulnerability-paper/blob/main/CmsEasy-7.7.7.9-File%20Inclusion2.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/H3rmesk1t/vulnerability-paper/blob/main/CmsEasy-7.7.7.9-File%20Inclusion2.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-357xx/CVE-2024-35739.json b/CVE-2024/CVE-2024-357xx/CVE-2024-35739.json index a3f0c23f19e..32bd77035c8 100644 --- a/CVE-2024/CVE-2024-357xx/CVE-2024-35739.json +++ b/CVE-2024/CVE-2024-357xx/CVE-2024-35739.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35739", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-08T13:15:56.660", - "lastModified": "2024-11-21T09:20:47.013", - "vulnStatus": "Modified", + "lastModified": "2025-04-14T14:16:28.413", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,9 +80,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:radiustheme:post_grid:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:radiustheme:the_post_grid:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "7.7.2", - "matchCriteriaId": "705EA9B4-5219-47A8-ABD8-8791B3D6D3B4" + "matchCriteriaId": "0181ECD4-44C0-432C-80B6-70123A9FBE22" } ] } diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39311.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39311.json index f816067cd5f..2a5fd4b356e 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39311.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39311.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39311", "sourceIdentifier": "security-advisories@github.com", "published": "2025-03-28T15:15:44.647", - "lastModified": "2025-03-28T18:11:40.180", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-14T14:24:49.550", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } ] }, "weaknesses": [ @@ -73,14 +95,56 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:publify:publify:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.1", + "matchCriteriaId": "87C5F03F-C0E9-41ED-B498-E03CF3CA27DF" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:publify:publify_core:*:*:*:*:*:ruby:*:*", + "versionEndExcluding": "10.0.2", + "matchCriteriaId": "17C10FE3-54A1-4D58-8A4E-9F6A58C69B5D" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/publify/publify/security/advisories/GHSA-8fm5-gg2f-f66q", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/publify/publify/security/advisories/GHSA-8fm5-gg2f-f66q", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-486xx/CVE-2024-48615.json b/CVE-2024/CVE-2024-486xx/CVE-2024-48615.json index 0efbbd9e862..c04fe258d71 100644 --- a/CVE-2024/CVE-2024-486xx/CVE-2024-48615.json +++ b/CVE-2024/CVE-2024-486xx/CVE-2024-48615.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48615", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-28T15:15:45.023", - "lastModified": "2025-04-01T14:15:20.253", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-14T14:36:30.827", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:libarchive:libarchive:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.7.6", + "matchCriteriaId": "61C16EE1-76E6-4968-BEA3-F2EAD603AF3F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/88Sanghy88/crash-test", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/libarchive/libarchive/releases/download/v3.7.6/libarchive-3.7.6.tar.gz", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/88Sanghy88/crash-test", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49825.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49825.json new file mode 100644 index 00000000000..04778b969d7 --- /dev/null +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49825.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49825", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-04-14T15:15:23.627", + "lastModified": "2025-04-14T15:15:23.627", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Robotic Process Automation and Robotic Process Automation for Cloud Pak 21.0.0 through 21.0.7.20 and 23.0.0 through 23.0.20 does not invalidate session after a logout which could allow an authenticated user to impersonate another user on the system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-613" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7230848", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-535xx/CVE-2024-53504.json b/CVE-2024/CVE-2024-535xx/CVE-2024-53504.json index a6a23b5b519..49fe0d22c42 100644 --- a/CVE-2024/CVE-2024-535xx/CVE-2024-53504.json +++ b/CVE-2024/CVE-2024-535xx/CVE-2024-53504.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53504", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-29T20:15:20.763", - "lastModified": "2024-12-02T17:15:13.047", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-14T14:30:52.157", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,41 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:b3log:siyuan:3.1.11:-:*:*:*:*:*:*", + "matchCriteriaId": "2234F607-B506-47AC-A554-8B5F74C5353A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/siyuan-note/siyuan/issues/13058", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://github.com/siyuan-note/siyuan/issues/13077", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-535xx/CVE-2024-53505.json b/CVE-2024/CVE-2024-535xx/CVE-2024-53505.json index 47dc1bb2d7e..47e70e999b3 100644 --- a/CVE-2024/CVE-2024-535xx/CVE-2024-53505.json +++ b/CVE-2024/CVE-2024-535xx/CVE-2024-53505.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53505", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-29T20:15:20.853", - "lastModified": "2024-12-02T17:15:13.257", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-14T14:57:53.313", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:b3log:siyuan:3.1.11:-:*:*:*:*:*:*", + "matchCriteriaId": "2234F607-B506-47AC-A554-8B5F74C5353A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/siyuan-note/siyuan/issues/13059", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://github.com/siyuan-note/siyuan/issues/13077", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-535xx/CVE-2024-53506.json b/CVE-2024/CVE-2024-535xx/CVE-2024-53506.json index 97afa0400cd..51880aa8e54 100644 --- a/CVE-2024/CVE-2024-535xx/CVE-2024-53506.json +++ b/CVE-2024/CVE-2024-535xx/CVE-2024-53506.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53506", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-29T20:15:20.943", - "lastModified": "2024-12-02T17:15:13.497", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-14T14:57:37.513", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:b3log:siyuan:3.1.11:-:*:*:*:*:*:*", + "matchCriteriaId": "2234F607-B506-47AC-A554-8B5F74C5353A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/siyuan-note/siyuan/issues/13060", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://github.com/siyuan-note/siyuan/issues/13077", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-535xx/CVE-2024-53507.json b/CVE-2024/CVE-2024-535xx/CVE-2024-53507.json index 562ae7836e1..89d42f7090f 100644 --- a/CVE-2024/CVE-2024-535xx/CVE-2024-53507.json +++ b/CVE-2024/CVE-2024-535xx/CVE-2024-53507.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53507", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-29T20:15:21.027", - "lastModified": "2024-12-02T17:15:13.707", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-14T14:57:23.033", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:b3log:siyuan:3.1.11:-:*:*:*:*:*:*", + "matchCriteriaId": "2234F607-B506-47AC-A554-8B5F74C5353A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/siyuan-note/siyuan/issues/13057", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://github.com/siyuan-note/siyuan/issues/13077", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53967.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53967.json index dbf912b91f0..771bda3594b 100644 --- a/CVE-2024/CVE-2024-539xx/CVE-2024-53967.json +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53967.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53967", "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-19T17:15:40.313", - "lastModified": "2025-03-19T17:15:40.313", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-14T14:58:05.883", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22.0", + "matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53968.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53968.json index cfbe533ef77..b522e997345 100644 --- a/CVE-2024/CVE-2024-539xx/CVE-2024-53968.json +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53968.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53968", "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-19T17:15:40.467", - "lastModified": "2025-03-19T17:15:40.467", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-14T14:57:30.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22.0", + "matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53969.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53969.json index e6b75d85bb2..92fbda1c9b6 100644 --- a/CVE-2024/CVE-2024-539xx/CVE-2024-53969.json +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53969.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53969", "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-19T17:15:40.610", - "lastModified": "2025-03-19T17:15:40.610", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-14T14:56:28.223", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22.0", + "matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53970.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53970.json index 6f9a2a8941d..70371965e0b 100644 --- a/CVE-2024/CVE-2024-539xx/CVE-2024-53970.json +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53970.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53970", "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-19T17:15:40.750", - "lastModified": "2025-03-19T17:15:40.750", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-14T14:55:33.210", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22.0", + "matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-549xx/CVE-2024-54918.json b/CVE-2024/CVE-2024-549xx/CVE-2024-54918.json index 3152a6848a1..dc04eeeae5b 100644 --- a/CVE-2024/CVE-2024-549xx/CVE-2024-54918.json +++ b/CVE-2024/CVE-2024-549xx/CVE-2024-54918.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54918", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-09T19:15:15.707", - "lastModified": "2024-12-12T18:15:25.790", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-14T15:14:03.093", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lopalopa:e-learning_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BFD62B66-BEBB-4F0C-9F2F-66A7DC3E83E7" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/m14r41/Writeups/blob/main/CVE/Kashipara/E-learning%20Management%20System%20project/RCE%20by%20File%20Upload%20-%20Update%20Avatar.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-549xx/CVE-2024-54921.json b/CVE-2024/CVE-2024-549xx/CVE-2024-54921.json index a379a94dee4..6dfae11da24 100644 --- a/CVE-2024/CVE-2024-549xx/CVE-2024-54921.json +++ b/CVE-2024/CVE-2024-549xx/CVE-2024-54921.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54921", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-09T19:15:15.940", - "lastModified": "2024-12-11T16:15:15.127", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-14T15:15:41.963", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lopalopa:e-learning_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BFD62B66-BEBB-4F0C-9F2F-66A7DC3E83E7" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/m14r41/Writeups/blob/main/CVE/Kashipara/E-learning%20Management%20System%20project/SQL%20Injection%20-%20Signup%20Student.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-549xx/CVE-2024-54923.json b/CVE-2024/CVE-2024-549xx/CVE-2024-54923.json index 0dc331d4ebd..d586f1ccea6 100644 --- a/CVE-2024/CVE-2024-549xx/CVE-2024-54923.json +++ b/CVE-2024/CVE-2024-549xx/CVE-2024-54923.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54923", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-09T19:15:16.137", - "lastModified": "2024-12-11T16:15:15.347", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-14T15:15:34.353", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lopalopa:e-learning_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BFD62B66-BEBB-4F0C-9F2F-66A7DC3E83E7" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/m14r41/Writeups/blob/main/CVE/Kashipara/E-learning%20Management%20System%20project/SQL%20Injection%20-%20edit_teacher.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-549xx/CVE-2024-54924.json b/CVE-2024/CVE-2024-549xx/CVE-2024-54924.json index bbf260715d3..6f0cfe823be 100644 --- a/CVE-2024/CVE-2024-549xx/CVE-2024-54924.json +++ b/CVE-2024/CVE-2024-549xx/CVE-2024-54924.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54924", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-09T19:15:16.243", - "lastModified": "2024-12-11T16:15:15.547", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-14T15:15:25.957", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lopalopa:e-learning_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BFD62B66-BEBB-4F0C-9F2F-66A7DC3E83E7" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/m14r41/Writeups/blob/main/CVE/Kashipara/E-learning%20Management%20System%20project/SQL%20Injection%20-%20edit%20content.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-549xx/CVE-2024-54925.json b/CVE-2024/CVE-2024-549xx/CVE-2024-54925.json index 39b01304a9e..697543e32e1 100644 --- a/CVE-2024/CVE-2024-549xx/CVE-2024-54925.json +++ b/CVE-2024/CVE-2024-549xx/CVE-2024-54925.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54925", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-09T19:15:16.350", - "lastModified": "2024-12-12T18:15:26.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-14T15:14:31.077", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lopalopa:e-learning_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BFD62B66-BEBB-4F0C-9F2F-66A7DC3E83E7" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/m14r41/Writeups/blob/main/CVE/Kashipara/E-learning%20Management%20System%20project/SQL%20Injection%20-%20remove_sent_message.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9230.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9230.json index ea321b193c6..a5291315b16 100644 --- a/CVE-2024/CVE-2024-92xx/CVE-2024-9230.json +++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9230.json @@ -2,7 +2,7 @@ "id": "CVE-2024-9230", "sourceIdentifier": "contact@wpscan.com", "published": "2025-04-14T06:15:15.223", - "lastModified": "2025-04-14T06:15:15.223", + "lastModified": "2025-04-14T15:15:23.897", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "The PowerPress Podcasting plugin by Blubrry WordPress plugin before 11.9.18 does not sanitise and escape some of its settings when adding a podcast, which could allow author and above users to perform Stored Cross-Site Scripting attacks" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/ab5eaf57-fb61-4a08-b439-42dea40b7914/", diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21170.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21170.json index 265d63cab17..27b281cd674 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21170.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21170.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21170", "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T21:15:42.150", - "lastModified": "2025-03-11T21:15:42.150", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-14T15:10:23.137", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:substance_3d_modeler:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.21.0", + "matchCriteriaId": "C4521236-E92E-4C1B-8D91-F9C13457D473" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/substance3d-modeler/apsb25-21.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-21xx/CVE-2025-2160.json b/CVE-2025/CVE-2025-21xx/CVE-2025-2160.json new file mode 100644 index 00000000000..4f6395cc9d6 --- /dev/null +++ b/CVE-2025/CVE-2025-21xx/CVE-2025-2160.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-2160", + "sourceIdentifier": "security@pega.com", + "published": "2025-04-14T15:15:24.093", + "lastModified": "2025-04-14T15:15:24.093", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Pega Platform versions 8.4.3 to Infinity 24.2.1 are affected by an XSS issue with Mashup" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@pega.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "security@pega.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://support.pega.com/support-doc/pega-security-advisory-d25-vulnerability-remediation-note", + "source": "security@pega.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-21xx/CVE-2025-2161.json b/CVE-2025/CVE-2025-21xx/CVE-2025-2161.json new file mode 100644 index 00000000000..2fcaa1a9eae --- /dev/null +++ b/CVE-2025/CVE-2025-21xx/CVE-2025-2161.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-2161", + "sourceIdentifier": "security@pega.com", + "published": "2025-04-14T15:15:24.247", + "lastModified": "2025-04-14T15:15:24.247", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Pega Platform versions 7.2.1 to Infinity 24.2.1 are affected by an XSS issue with Mashup" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@pega.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "security@pega.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://support.pega.com/support-doc/pega-security-advisory-d25-vulnerability-remediation-note", + "source": "security@pega.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-22xx/CVE-2025-2259.json b/CVE-2025/CVE-2025-22xx/CVE-2025-2259.json index 9c036350cf7..051b276a0ef 100644 --- a/CVE-2025/CVE-2025-22xx/CVE-2025-2259.json +++ b/CVE-2025/CVE-2025-22xx/CVE-2025-2259.json @@ -2,7 +2,7 @@ "id": "CVE-2025-2259", "sourceIdentifier": "emo@eclipse.org", "published": "2025-04-06T19:15:41.020", - "lastModified": "2025-04-07T14:17:50.220", + "lastModified": "2025-04-14T15:15:24.383", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -81,6 +81,10 @@ { "url": "https://github.com/eclipse-threadx/netxduo/security/advisories/GHSA-chhp-gmxc-46rq", "source": "emo@eclipse.org" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2104", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-22xx/CVE-2025-2260.json b/CVE-2025/CVE-2025-22xx/CVE-2025-2260.json index cdfdcdf8142..003a0e8dc73 100644 --- a/CVE-2025/CVE-2025-22xx/CVE-2025-2260.json +++ b/CVE-2025/CVE-2025-22xx/CVE-2025-2260.json @@ -2,7 +2,7 @@ "id": "CVE-2025-2260", "sourceIdentifier": "emo@eclipse.org", "published": "2025-04-06T19:15:41.153", - "lastModified": "2025-04-07T14:17:50.220", + "lastModified": "2025-04-14T15:15:24.513", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -81,6 +81,10 @@ { "url": "https://github.com/eclipse-threadx/netxduo/security/advisories/GHSA-f42f-6fvv-xqx3", "source": "emo@eclipse.org" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2098", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-24xx/CVE-2025-2424.json b/CVE-2025/CVE-2025-24xx/CVE-2025-2424.json new file mode 100644 index 00000000000..f81f09b2e0e --- /dev/null +++ b/CVE-2025/CVE-2025-24xx/CVE-2025-2424.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-2424", + "sourceIdentifier": "responsibledisclosure@mattermost.com", + "published": "2025-04-14T15:15:24.630", + "lastModified": "2025-04-14T15:15:24.630", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Mattermost versions 10.5.x <= 10.5.1, 9.11.x <= 9.11.9 fail to check if a file has been deleted when creating a bookmark which allows an attacker who knows the IDs of deleted files to obtain metadata of the files via bookmark creation." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "responsibledisclosure@mattermost.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 3.1, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "responsibledisclosure@mattermost.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://mattermost.com/security-updates", + "source": "responsibledisclosure@mattermost.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-24xx/CVE-2025-2475.json b/CVE-2025/CVE-2025-24xx/CVE-2025-2475.json new file mode 100644 index 00000000000..4d599f087f0 --- /dev/null +++ b/CVE-2025/CVE-2025-24xx/CVE-2025-2475.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-2475", + "sourceIdentifier": "responsibledisclosure@mattermost.com", + "published": "2025-04-14T15:15:24.777", + "lastModified": "2025-04-14T15:15:24.777", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Mattermost versions 10.5.x <= 10.5.1, 10.4.x <= 10.4.3, 9.11.x <= 9.11.9 fail to invalidate the cache when a user account is converted to a bot which allows an attacker to login to the bot exactly one time via normal credentials." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "responsibledisclosure@mattermost.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "responsibledisclosure@mattermost.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-303" + } + ] + } + ], + "references": [ + { + "url": "https://mattermost.com/security-updates", + "source": "responsibledisclosure@mattermost.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-25xx/CVE-2025-2563.json b/CVE-2025/CVE-2025-25xx/CVE-2025-2563.json index a18699cbff9..fc72bf105e5 100644 --- a/CVE-2025/CVE-2025-25xx/CVE-2025-2563.json +++ b/CVE-2025/CVE-2025-25xx/CVE-2025-2563.json @@ -2,7 +2,7 @@ "id": "CVE-2025-2563", "sourceIdentifier": "contact@wpscan.com", "published": "2025-04-14T06:15:16.333", - "lastModified": "2025-04-14T06:15:16.333", + "lastModified": "2025-04-14T15:15:24.927", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "The User Registration & Membership WordPress plugin before 4.1.2 does not prevent users to set their account role when the Membership Addon is enabled, leading to a privilege escalation issue and allowing unauthenticated users to gain admin privileges" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/2c0f62a1-9510-4f90-a297-17634e6c8b75/", diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27176.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27176.json index 364b947eddf..b9c6a67f0ab 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27176.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27176.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27176", "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T18:15:35.897", - "lastModified": "2025-03-11T18:15:35.897", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-14T15:03:27.653", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,55 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionEndExcluding": "19.5.3", + "matchCriteriaId": "FEA7F6BC-BB3B-45EE-B1FD-6F59999D06B8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionStartIncluding": "20.0", + "versionEndExcluding": "20.2", + "matchCriteriaId": "99847383-1F78-434C-B425-04DE40E36D99" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/indesign/apsb25-19.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27177.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27177.json index 27012710ea1..9af8ad432cf 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27177.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27177.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27177", "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T18:15:36.047", - "lastModified": "2025-03-11T18:15:36.047", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-14T15:04:42.487", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,67 @@ "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionEndExcluding": "19.5.3", + "matchCriteriaId": "FEA7F6BC-BB3B-45EE-B1FD-6F59999D06B8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionStartIncluding": "20.0", + "versionEndExcluding": "20.2", + "matchCriteriaId": "99847383-1F78-434C-B425-04DE40E36D99" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] } ], "references": [ { "url": "https://helpx.adobe.com/security/products/indesign/apsb25-19.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27178.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27178.json index 6939e84a89f..0cb9d551a6c 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27178.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27178.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27178", "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T18:15:36.200", - "lastModified": "2025-03-11T18:15:36.200", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-14T15:12:39.180", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,55 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionEndExcluding": "19.5.3", + "matchCriteriaId": "FEA7F6BC-BB3B-45EE-B1FD-6F59999D06B8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionStartIncluding": "20.0", + "versionEndExcluding": "20.2", + "matchCriteriaId": "99847383-1F78-434C-B425-04DE40E36D99" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/indesign/apsb25-19.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27179.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27179.json index 7675c91f8db..47acb81c5fb 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27179.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27179.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27179", "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T18:15:36.353", - "lastModified": "2025-03-11T18:15:36.353", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-14T15:11:35.763", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,55 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionEndExcluding": "19.5.3", + "matchCriteriaId": "FEA7F6BC-BB3B-45EE-B1FD-6F59999D06B8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionStartIncluding": "20.0", + "versionEndExcluding": "20.2", + "matchCriteriaId": "99847383-1F78-434C-B425-04DE40E36D99" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/indesign/apsb25-19.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-290xx/CVE-2025-29087.json b/CVE-2025/CVE-2025-290xx/CVE-2025-29087.json index 2cb78c964c9..6184e04a1aa 100644 --- a/CVE-2025/CVE-2025-290xx/CVE-2025-29087.json +++ b/CVE-2025/CVE-2025-290xx/CVE-2025-29087.json @@ -2,13 +2,13 @@ "id": "CVE-2025-29087", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-07T20:15:20.253", - "lastModified": "2025-04-08T18:13:53.347", + "lastModified": "2025-04-14T14:15:23.813", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Sqlite 3.49.0 is susceptible to integer overflow through the concat function." + "value": "In SQLite 3.44.0 through 3.49.0 before 3.49.1, the concat_ws() SQL function can cause memory to be written beyond the end of a malloc-allocated buffer. If the separator argument is attacker-controlled and has a large string (e.g., 2MB or more), an integer overflow occurs in calculating the size of the result buffer, and thus malloc may not allocate enough memory." }, { "lang": "es", @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L", + "baseScore": 3.2, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.4, + "impactScore": 1.4 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -55,6 +85,14 @@ { "url": "https://gist.github.com/ylwango613/a44a29f1ef074fa783e29f04a0afd62a", "source": "cve@mitre.org" + }, + { + "url": "https://sqlite.org/releaselog/3_49_1.html", + "source": "cve@mitre.org" + }, + { + "url": "https://www.sqlite.org/cves.html", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-290xx/CVE-2025-29088.json b/CVE-2025/CVE-2025-290xx/CVE-2025-29088.json index 200831287cc..bff1b4a368b 100644 --- a/CVE-2025/CVE-2025-290xx/CVE-2025-29088.json +++ b/CVE-2025/CVE-2025-290xx/CVE-2025-29088.json @@ -2,13 +2,13 @@ "id": "CVE-2025-29088", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-10T14:15:27.163", - "lastModified": "2025-04-11T20:15:21.553", + "lastModified": "2025-04-14T14:15:23.993", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "An issue in sqlite v.3.49.0 allows an attacker to cause a denial of service via the SQLITE_DBCONFIG_LOOKASIDE component" + "value": "In SQLite 3.49.0 before 3.49.1, certain argument values to sqlite3_db_config (in the C-language API) can cause a denial of service (application crash). An sz*nBig multiplication is not cast to a 64-bit integer, and consequently some memory allocations may be incorrect." }, { "lang": "es", @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L", + "baseScore": 5.6, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.4, + "impactScore": 3.7 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -60,6 +90,14 @@ "url": "https://github.com/sqlite/sqlite/commit/56d2fd008b108109f489339f5fd55212bb50afd4", "source": "cve@mitre.org" }, + { + "url": "https://sqlite.org/forum/forumpost/48f365daec", + "source": "cve@mitre.org" + }, + { + "url": "https://sqlite.org/releaselog/3_49_1.html", + "source": "cve@mitre.org" + }, { "url": "https://www.sqlite.org/cves.html", "source": "cve@mitre.org" diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2915.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2915.json index bc3d5905f5a..bb2b8c99f6c 100644 --- a/CVE-2025/CVE-2025-29xx/CVE-2025-2915.json +++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2915.json @@ -2,7 +2,7 @@ "id": "CVE-2025-2915", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-28T17:15:30.750", - "lastModified": "2025-03-28T18:15:17.060", + "lastModified": "2025-04-14T14:03:21.190", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -80,6 +80,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -122,28 +142,78 @@ "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hdfgroup:hdf5:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.14.6", + "matchCriteriaId": "F9158517-069A-4BE6-98F2-EBFDE3437236" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/HDFGroup/hdf5/issues/5380", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.301888", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.301888", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.520899", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/HDFGroup/hdf5/issues/5380", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30291.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30291.json index 441359a0895..6b7ad633a65 100644 --- a/CVE-2025/CVE-2025-302xx/CVE-2025-30291.json +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30291.json @@ -2,8 +2,8 @@ "id": "CVE-2025-30291", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T20:15:27.057", - "lastModified": "2025-04-09T20:02:41.860", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-14T15:26:47.470", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.5, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,12 +69,202 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:-:*:*:*:*:*:*", + "matchCriteriaId": "7A94B406-C011-4673-8C2B-0DD94D46CC4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update1:*:*:*:*:*:*", + "matchCriteriaId": "AFD05E3A-10F9-4C75-9710-BA46B66FF6E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update10:*:*:*:*:*:*", + "matchCriteriaId": "F1FC7D1D-6DD2-48B2-980F-B001B0F24473" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update11:*:*:*:*:*:*", + "matchCriteriaId": "1FA19E1D-61C2-4640-AF06-4BCFE750BDF3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update12:*:*:*:*:*:*", + "matchCriteriaId": "3F331DEA-F3D0-4B13-AB1E-6FE39B2BB55D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update13:*:*:*:*:*:*", + "matchCriteriaId": "63D5CF84-4B0D-48AE-95D6-262AEA2FFDE8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update14:*:*:*:*:*:*", + "matchCriteriaId": "10616A3A-0C1C-474A-BD7D-A2A5BB870F74" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update15:*:*:*:*:*:*", + "matchCriteriaId": "D7DA523E-1D9B-45FD-94D9-D4F9F2B9296B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update16:*:*:*:*:*:*", + "matchCriteriaId": "151AFF8B-F05C-4D27-85FC-DF88E9C11BEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update17:*:*:*:*:*:*", + "matchCriteriaId": "53A0E245-2915-4DFF-AFB5-A12F5C435702" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update18:*:*:*:*:*:*", + "matchCriteriaId": "C5653D18-7534-48A3-819F-9F049A418F99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update2:*:*:*:*:*:*", + "matchCriteriaId": "D57C8681-AC68-47DF-A61E-B5C4B4A47663" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update3:*:*:*:*:*:*", + "matchCriteriaId": "75608383-B727-48D6-8FFA-D552A338A562" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update4:*:*:*:*:*:*", + "matchCriteriaId": "7773DB68-414A-4BA9-960F-52471A784379" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update5:*:*:*:*:*:*", + "matchCriteriaId": "B38B9E86-BCD5-4BCA-8FB7-EC55905184E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update6:*:*:*:*:*:*", + "matchCriteriaId": "5E7BAB80-8455-4570-A2A2-8F40469EE9CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update7:*:*:*:*:*:*", + "matchCriteriaId": "F9D645A2-E02D-4E82-A2BD-0A7DE5B8FBCC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update8:*:*:*:*:*:*", + "matchCriteriaId": "6E22D701-B038-4795-AA32-A18BC93C2B6F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update9:*:*:*:*:*:*", + "matchCriteriaId": "CAC4A0EC-C3FC-47D8-86CE-0E6A87A7F0B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:-:*:*:*:*:*:*", + "matchCriteriaId": "B02A37FE-5D31-4892-A3E6-156A8FE62D28" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update1:*:*:*:*:*:*", + "matchCriteriaId": "0AA3D302-CFEE-4DFD-AB92-F53C87721BFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update10:*:*:*:*:*:*", + "matchCriteriaId": "645D1B5F-2DAB-4AB8-A465-AC37FF494F95" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update11:*:*:*:*:*:*", + "matchCriteriaId": "ED6D8996-0770-4C9F-BEA5-87EA479D40A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update12:*:*:*:*:*:*", + "matchCriteriaId": "4836086E-3D4A-4A07-A372-382D385CB490" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update2:*:*:*:*:*:*", + "matchCriteriaId": "EB88D4FE-5496-4639-BAF2-9F29F24ABF29" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update3:*:*:*:*:*:*", + "matchCriteriaId": "43E0ED98-2C1F-40B8-AF60-FEB1D85619C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update4:*:*:*:*:*:*", + "matchCriteriaId": "76204873-C6E0-4202-8A03-0773270F1802" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update5:*:*:*:*:*:*", + "matchCriteriaId": "C1A22BE9-0D47-4BA8-8BDB-9B12D7A0F7C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update6:*:*:*:*:*:*", + "matchCriteriaId": "E3A83642-BF14-4C37-BD94-FA76AABE8ADC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update7:*:*:*:*:*:*", + "matchCriteriaId": "A892E1DC-F2C8-4F53-8580-A2D1BEED5A25" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update8:*:*:*:*:*:*", + "matchCriteriaId": "DB97ADBA-C1A9-4EE0-9509-68CB12358AE5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update9:*:*:*:*:*:*", + "matchCriteriaId": "E17C38F0-9B0F-4433-9CBD-6E3D63EA9BDC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2025:-:*:*:*:*:*:*", + "matchCriteriaId": "30779417-D4E5-4A01-BE0E-1CE1D134292A" + } + ] + } + ] } ], "references": [ { "url": "https://helpx.adobe.com/security/products/coldfusion/apsb25-15.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30292.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30292.json index b4c6ee72966..40d08d0a633 100644 --- a/CVE-2025/CVE-2025-302xx/CVE-2025-30292.json +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30292.json @@ -2,8 +2,8 @@ "id": "CVE-2025-30292", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T20:15:27.210", - "lastModified": "2025-04-09T20:02:41.860", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-14T15:57:32.107", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,190 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:-:*:*:*:*:*:*", + "matchCriteriaId": "7A94B406-C011-4673-8C2B-0DD94D46CC4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update1:*:*:*:*:*:*", + "matchCriteriaId": "AFD05E3A-10F9-4C75-9710-BA46B66FF6E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update10:*:*:*:*:*:*", + "matchCriteriaId": "F1FC7D1D-6DD2-48B2-980F-B001B0F24473" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update11:*:*:*:*:*:*", + "matchCriteriaId": "1FA19E1D-61C2-4640-AF06-4BCFE750BDF3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update12:*:*:*:*:*:*", + "matchCriteriaId": "3F331DEA-F3D0-4B13-AB1E-6FE39B2BB55D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update13:*:*:*:*:*:*", + "matchCriteriaId": "63D5CF84-4B0D-48AE-95D6-262AEA2FFDE8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update14:*:*:*:*:*:*", + "matchCriteriaId": "10616A3A-0C1C-474A-BD7D-A2A5BB870F74" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update15:*:*:*:*:*:*", + "matchCriteriaId": "D7DA523E-1D9B-45FD-94D9-D4F9F2B9296B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update16:*:*:*:*:*:*", + "matchCriteriaId": "151AFF8B-F05C-4D27-85FC-DF88E9C11BEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update17:*:*:*:*:*:*", + "matchCriteriaId": "53A0E245-2915-4DFF-AFB5-A12F5C435702" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update18:*:*:*:*:*:*", + "matchCriteriaId": "C5653D18-7534-48A3-819F-9F049A418F99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update2:*:*:*:*:*:*", + "matchCriteriaId": "D57C8681-AC68-47DF-A61E-B5C4B4A47663" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update3:*:*:*:*:*:*", + "matchCriteriaId": "75608383-B727-48D6-8FFA-D552A338A562" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update4:*:*:*:*:*:*", + "matchCriteriaId": "7773DB68-414A-4BA9-960F-52471A784379" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update5:*:*:*:*:*:*", + "matchCriteriaId": "B38B9E86-BCD5-4BCA-8FB7-EC55905184E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update6:*:*:*:*:*:*", + "matchCriteriaId": "5E7BAB80-8455-4570-A2A2-8F40469EE9CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update7:*:*:*:*:*:*", + "matchCriteriaId": "F9D645A2-E02D-4E82-A2BD-0A7DE5B8FBCC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update8:*:*:*:*:*:*", + "matchCriteriaId": "6E22D701-B038-4795-AA32-A18BC93C2B6F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update9:*:*:*:*:*:*", + "matchCriteriaId": "CAC4A0EC-C3FC-47D8-86CE-0E6A87A7F0B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:-:*:*:*:*:*:*", + "matchCriteriaId": "B02A37FE-5D31-4892-A3E6-156A8FE62D28" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update1:*:*:*:*:*:*", + "matchCriteriaId": "0AA3D302-CFEE-4DFD-AB92-F53C87721BFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update10:*:*:*:*:*:*", + "matchCriteriaId": "645D1B5F-2DAB-4AB8-A465-AC37FF494F95" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update11:*:*:*:*:*:*", + "matchCriteriaId": "ED6D8996-0770-4C9F-BEA5-87EA479D40A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update12:*:*:*:*:*:*", + "matchCriteriaId": "4836086E-3D4A-4A07-A372-382D385CB490" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update2:*:*:*:*:*:*", + "matchCriteriaId": "EB88D4FE-5496-4639-BAF2-9F29F24ABF29" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update3:*:*:*:*:*:*", + "matchCriteriaId": "43E0ED98-2C1F-40B8-AF60-FEB1D85619C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update4:*:*:*:*:*:*", + "matchCriteriaId": "76204873-C6E0-4202-8A03-0773270F1802" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update5:*:*:*:*:*:*", + "matchCriteriaId": "C1A22BE9-0D47-4BA8-8BDB-9B12D7A0F7C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update6:*:*:*:*:*:*", + "matchCriteriaId": "E3A83642-BF14-4C37-BD94-FA76AABE8ADC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update7:*:*:*:*:*:*", + "matchCriteriaId": "A892E1DC-F2C8-4F53-8580-A2D1BEED5A25" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update8:*:*:*:*:*:*", + "matchCriteriaId": "DB97ADBA-C1A9-4EE0-9509-68CB12358AE5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update9:*:*:*:*:*:*", + "matchCriteriaId": "E17C38F0-9B0F-4433-9CBD-6E3D63EA9BDC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2025:-:*:*:*:*:*:*", + "matchCriteriaId": "30779417-D4E5-4A01-BE0E-1CE1D134292A" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/coldfusion/apsb25-15.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-303xx/CVE-2025-30372.json b/CVE-2025/CVE-2025-303xx/CVE-2025-30372.json index d4abaca0852..a3e6777b7d8 100644 --- a/CVE-2025/CVE-2025-303xx/CVE-2025-30372.json +++ b/CVE-2025/CVE-2025-303xx/CVE-2025-30372.json @@ -2,8 +2,8 @@ "id": "CVE-2025-30372", "sourceIdentifier": "security-advisories@github.com", "published": "2025-03-28T15:15:51.227", - "lastModified": "2025-03-28T18:11:40.180", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-14T14:49:16.873", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } ] }, "weaknesses": [ @@ -73,14 +95,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:*", + "versionEndExcluding": "2.5.9", + "matchCriteriaId": "F7C597C9-8486-4AD6-9A75-636E7CC5FED5" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/emlog/emlog/security/advisories/GHSA-w6xc-r6x5-m77c", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/emlog/emlog/security/advisories/GHSA-w6xc-r6x5-m77c", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32200.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32200.json index 58bcbb2eae9..508fe0479a4 100644 --- a/CVE-2025/CVE-2025-322xx/CVE-2025-32200.json +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32200.json @@ -2,59 +2,15 @@ "id": "CVE-2025-32200", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-04T16:15:30.107", - "lastModified": "2025-04-07T14:18:15.560", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-14T14:15:24.357", + "vulnStatus": "Rejected", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in Nikita Advanced WordPress Backgrounds allows Code Injection. This issue affects Advanced WordPress Backgrounds: from n/a through 1.12.4." - }, - { - "lang": "es", - "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de etiquetas HTML relacionadas con scripts en una p\u00e1gina web (XSS b\u00e1sico) en Nikita Advanced WordPress Backgrounds permite la inyecci\u00f3n de c\u00f3digo. Este problema afecta a Advanced WordPress Backgrounds desde n/d hasta la versi\u00f3n 1.12.4." + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "audit@patchstack.com", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", - "baseScore": 5.4, - "baseSeverity": "MEDIUM", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "LOW", - "availabilityImpact": "LOW" - }, - "exploitabilityScore": 2.8, - "impactScore": 2.5 - } - ] - }, - "weaknesses": [ - { - "source": "audit@patchstack.com", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-80" - } - ] - } - ], - "references": [ - { - "url": "https://patchstack.com/database/wordpress/plugin/advanced-backgrounds/vulnerability/wordpress-advanced-wordpress-backgrounds-plugin-1-12-4-content-injection-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-329xx/CVE-2025-32906.json b/CVE-2025/CVE-2025-329xx/CVE-2025-32906.json new file mode 100644 index 00000000000..0ed7de0aeda --- /dev/null +++ b/CVE-2025/CVE-2025-329xx/CVE-2025-32906.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-32906", + "sourceIdentifier": "secalert@redhat.com", + "published": "2025-04-14T14:15:24.433", + "lastModified": "2025-04-14T14:15:24.433", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in libsoup, where the soup_headers_parse_request() function may be vulnerable to an out-of-bound read. This flaw allows a malicious user to use a specially crafted HTTP request to crash the HTTP server." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2025-32906", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359341", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-329xx/CVE-2025-32907.json b/CVE-2025/CVE-2025-329xx/CVE-2025-32907.json new file mode 100644 index 00000000000..abe17fa2c8b --- /dev/null +++ b/CVE-2025/CVE-2025-329xx/CVE-2025-32907.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-32907", + "sourceIdentifier": "secalert@redhat.com", + "published": "2025-04-14T14:15:24.580", + "lastModified": "2025-04-14T14:15:24.580", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in libsoup. The implementation of HTTP range requests is vulnerable to a resource consumption attack. This flaw allows a malicious client to request the same range many times in a single HTTP request, causing the server to use large amounts of memory." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1050" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2025-32907", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359342", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-329xx/CVE-2025-32908.json b/CVE-2025/CVE-2025-329xx/CVE-2025-32908.json new file mode 100644 index 00000000000..ae7de37ed05 --- /dev/null +++ b/CVE-2025/CVE-2025-329xx/CVE-2025-32908.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-32908", + "sourceIdentifier": "secalert@redhat.com", + "published": "2025-04-14T14:15:24.717", + "lastModified": "2025-04-14T14:15:24.717", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in libsoup. The HTTP/2 server in libsoup may not fully validate the values of pseudo-headers :scheme, :authority, and :path, which may allow a user to cause a denial of service (DoS)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-115" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2025-32908", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359343", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-329xx/CVE-2025-32909.json b/CVE-2025/CVE-2025-329xx/CVE-2025-32909.json new file mode 100644 index 00000000000..6d87e064924 --- /dev/null +++ b/CVE-2025/CVE-2025-329xx/CVE-2025-32909.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-32909", + "sourceIdentifier": "secalert@redhat.com", + "published": "2025-04-14T15:15:25.140", + "lastModified": "2025-04-14T15:15:25.140", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in libsoup. SoupContentSniffer may be vulnerable to a NULL pointer dereference in the sniff_mp4 function. The HTTP server may cause the libsoup client to crash." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2025-32909", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359353", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-329xx/CVE-2025-32910.json b/CVE-2025/CVE-2025-329xx/CVE-2025-32910.json new file mode 100644 index 00000000000..ce93ee53a91 --- /dev/null +++ b/CVE-2025/CVE-2025-329xx/CVE-2025-32910.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-32910", + "sourceIdentifier": "secalert@redhat.com", + "published": "2025-04-14T15:15:25.307", + "lastModified": "2025-04-14T15:15:25.307", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in libsoup, where soup_auth_digest_authenticate() is vulnerable to a NULL pointer dereference. This issue may cause the libsoup client to crash." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2025-32910", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359354", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-329xx/CVE-2025-32912.json b/CVE-2025/CVE-2025-329xx/CVE-2025-32912.json new file mode 100644 index 00000000000..0e22e78a2da --- /dev/null +++ b/CVE-2025/CVE-2025-329xx/CVE-2025-32912.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-32912", + "sourceIdentifier": "secalert@redhat.com", + "published": "2025-04-14T15:15:25.477", + "lastModified": "2025-04-14T15:15:25.477", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in libsoup, where SoupAuthDigest is vulnerable to a NULL pointer dereference. The HTTP server may cause the libsoup client to crash." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2025-32912", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359356", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-329xx/CVE-2025-32913.json b/CVE-2025/CVE-2025-329xx/CVE-2025-32913.json new file mode 100644 index 00000000000..cc55e5ac1a6 --- /dev/null +++ b/CVE-2025/CVE-2025-329xx/CVE-2025-32913.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-32913", + "sourceIdentifier": "secalert@redhat.com", + "published": "2025-04-14T14:15:24.860", + "lastModified": "2025-04-14T14:15:24.860", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in libsoup, where the soup_message_headers_get_content_disposition() function is vulnerable to a NULL pointer dereference. This flaw allows a malicious HTTP peer to crash a libsoup client or server that uses this function." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2025-32913", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359357", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-329xx/CVE-2025-32914.json b/CVE-2025/CVE-2025-329xx/CVE-2025-32914.json new file mode 100644 index 00000000000..694e3c26254 --- /dev/null +++ b/CVE-2025/CVE-2025-329xx/CVE-2025-32914.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-32914", + "sourceIdentifier": "secalert@redhat.com", + "published": "2025-04-14T15:15:25.633", + "lastModified": "2025-04-14T15:15:25.633", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in libsoup, where the soup_multipart_new_from_message() function is vulnerable to an out-of-bounds read. This flaw allows a malicious HTTP client to induce the libsoup server to read out of bounds." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2025-32914", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359358", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-329xx/CVE-2025-32930.json b/CVE-2025/CVE-2025-329xx/CVE-2025-32930.json new file mode 100644 index 00000000000..a0f1ffad956 --- /dev/null +++ b/CVE-2025/CVE-2025-329xx/CVE-2025-32930.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2025-32930", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-14T15:15:25.787", + "lastModified": "2025-04-14T15:15:25.787", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-35xx/CVE-2025-3566.json b/CVE-2025/CVE-2025-35xx/CVE-2025-3566.json index 47dd9c57bc3..f1b6ff0dc49 100644 --- a/CVE-2025/CVE-2025-35xx/CVE-2025-3566.json +++ b/CVE-2025/CVE-2025-35xx/CVE-2025-3566.json @@ -2,7 +2,7 @@ "id": "CVE-2025-3566", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-14T13:15:17.247", - "lastModified": "2025-04-14T13:15:17.247", + "lastModified": "2025-04-14T14:15:25.373", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -76,6 +76,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -118,6 +138,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-35xx/CVE-2025-3568.json b/CVE-2025/CVE-2025-35xx/CVE-2025-3568.json new file mode 100644 index 00000000000..3d8a87e9120 --- /dev/null +++ b/CVE-2025/CVE-2025-35xx/CVE-2025-3568.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-3568", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-14T14:15:25.630", + "lastModified": "2025-04-14T14:15:25.630", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in Webkul Krayin CRM up to 2.1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/settings/users/edit/ of the component SVG File Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor prepares a fix for the next major release and explains that he does not think therefore that this should qualify for a CVE." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://drive.google.com/file/d/1LMzZyCgloWquJRWzJAV2bpWMTuiMs6Xa/view?usp=sharing", + "source": "cna@vuldb.com" + }, + { + "url": "https://gist.github.com/shellkraft/a8b1f35d5c3ba313605065889563fb00", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.304609", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.304609", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.549591", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-35xx/CVE-2025-3569.json b/CVE-2025/CVE-2025-35xx/CVE-2025-3569.json new file mode 100644 index 00000000000..9e930bf6746 --- /dev/null +++ b/CVE-2025/CVE-2025-35xx/CVE-2025-3569.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-3569", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-14T14:15:25.813", + "lastModified": "2025-04-14T14:15:25.813", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in JamesZBL/code-projects db-hospital-drug 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file ShiroConfig.java. The manipulation leads to improper authorization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + }, + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/buluorifu/Vulnerability-recurrence/blob/main/Refer/db-hospital-drug-authority.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.304610", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.304610", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.549920", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-35xx/CVE-2025-3570.json b/CVE-2025/CVE-2025-35xx/CVE-2025-3570.json new file mode 100644 index 00000000000..a08558d44ab --- /dev/null +++ b/CVE-2025/CVE-2025-35xx/CVE-2025-3570.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-3570", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-14T15:15:26.333", + "lastModified": "2025-04-14T15:15:26.333", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in JamesZBL/code-projects db-hospital-drug 1.0. It has been classified as problematic. This affects the function Save of the file ContentController.java. The manipulation of the argument content leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/buluorifu/Vulnerability-recurrence/blob/main/Refer/db-hospital-drug-xss.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.304611", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.304611", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.549923", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/buluorifu/Vulnerability-recurrence/blob/main/Refer/db-hospital-drug-xss.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-35xx/CVE-2025-3571.json b/CVE-2025/CVE-2025-35xx/CVE-2025-3571.json new file mode 100644 index 00000000000..dbc095523d8 --- /dev/null +++ b/CVE-2025/CVE-2025-35xx/CVE-2025-3571.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-3571", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-14T15:15:26.523", + "lastModified": "2025-04-14T15:15:26.523", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Fannuo Enterprise Content Management System \u51e1\u8bfa\u4f01\u4e1a\u7f51\u7ad9\u7ba1\u7406\u7cfb\u7edf 1.1/4.0. It has been declared as critical. This vulnerability affects unknown code of the file admin/cms_chip.php. The manipulation of the argument del leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://vuldb.com/?ctiid.304612", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.304612", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.549927", + "source": "cna@vuldb.com" + }, + { + "url": "https://wiki.shikangsi.com/post/share/c46c50d3-c8d7-46a0-9fed-8d79a64abb44", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index a499375d896..d94974897b6 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-04-14T14:00:21.118736+00:00 +2025-04-14T16:00:20.178011+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-04-14T13:53:30.877000+00:00 +2025-04-14T15:57:32.107000+00:00 ``` ### Last Data Feed Release @@ -33,59 +33,62 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -289778 +289796 ``` ### CVEs added in the last Commit -Recently added CVEs: `15` +Recently added CVEs: `18` -- [CVE-2024-10087](CVE-2024/CVE-2024-100xx/CVE-2024-10087.json) (`2025-04-14T12:15:13.630`) -- [CVE-2024-10088](CVE-2024/CVE-2024-100xx/CVE-2024-10088.json) (`2025-04-14T12:15:14.263`) -- [CVE-2024-10089](CVE-2024/CVE-2024-100xx/CVE-2024-10089.json) (`2025-04-14T12:15:14.403`) -- [CVE-2024-10090](CVE-2024/CVE-2024-100xx/CVE-2024-10090.json) (`2025-04-14T12:15:14.533`) -- [CVE-2024-13597](CVE-2024/CVE-2024-135xx/CVE-2024-13597.json) (`2025-04-14T12:15:14.680`) -- [CVE-2024-13598](CVE-2024/CVE-2024-135xx/CVE-2024-13598.json) (`2025-04-14T12:15:14.820`) -- [CVE-2024-49705](CVE-2024/CVE-2024-497xx/CVE-2024-49705.json) (`2025-04-14T12:15:15.120`) -- [CVE-2024-49706](CVE-2024/CVE-2024-497xx/CVE-2024-49706.json) (`2025-04-14T12:15:15.280`) -- [CVE-2024-49707](CVE-2024/CVE-2024-497xx/CVE-2024-49707.json) (`2025-04-14T12:15:15.423`) -- [CVE-2024-49708](CVE-2024/CVE-2024-497xx/CVE-2024-49708.json) (`2025-04-14T12:15:15.567`) -- [CVE-2024-49709](CVE-2024/CVE-2024-497xx/CVE-2024-49709.json) (`2025-04-14T12:15:15.707`) -- [CVE-2025-3564](CVE-2025/CVE-2025-35xx/CVE-2025-3564.json) (`2025-04-14T12:15:16.447`) -- [CVE-2025-3565](CVE-2025/CVE-2025-35xx/CVE-2025-3565.json) (`2025-04-14T12:15:16.627`) -- [CVE-2025-3566](CVE-2025/CVE-2025-35xx/CVE-2025-3566.json) (`2025-04-14T13:15:17.247`) -- [CVE-2025-3567](CVE-2025/CVE-2025-35xx/CVE-2025-3567.json) (`2025-04-14T13:15:17.417`) +- [CVE-2024-49825](CVE-2024/CVE-2024-498xx/CVE-2024-49825.json) (`2025-04-14T15:15:23.627`) +- [CVE-2025-2160](CVE-2025/CVE-2025-21xx/CVE-2025-2160.json) (`2025-04-14T15:15:24.093`) +- [CVE-2025-2161](CVE-2025/CVE-2025-21xx/CVE-2025-2161.json) (`2025-04-14T15:15:24.247`) +- [CVE-2025-2424](CVE-2025/CVE-2025-24xx/CVE-2025-2424.json) (`2025-04-14T15:15:24.630`) +- [CVE-2025-2475](CVE-2025/CVE-2025-24xx/CVE-2025-2475.json) (`2025-04-14T15:15:24.777`) +- [CVE-2025-32906](CVE-2025/CVE-2025-329xx/CVE-2025-32906.json) (`2025-04-14T14:15:24.433`) +- [CVE-2025-32907](CVE-2025/CVE-2025-329xx/CVE-2025-32907.json) (`2025-04-14T14:15:24.580`) +- [CVE-2025-32908](CVE-2025/CVE-2025-329xx/CVE-2025-32908.json) (`2025-04-14T14:15:24.717`) +- [CVE-2025-32909](CVE-2025/CVE-2025-329xx/CVE-2025-32909.json) (`2025-04-14T15:15:25.140`) +- [CVE-2025-32910](CVE-2025/CVE-2025-329xx/CVE-2025-32910.json) (`2025-04-14T15:15:25.307`) +- [CVE-2025-32912](CVE-2025/CVE-2025-329xx/CVE-2025-32912.json) (`2025-04-14T15:15:25.477`) +- [CVE-2025-32913](CVE-2025/CVE-2025-329xx/CVE-2025-32913.json) (`2025-04-14T14:15:24.860`) +- [CVE-2025-32914](CVE-2025/CVE-2025-329xx/CVE-2025-32914.json) (`2025-04-14T15:15:25.633`) +- [CVE-2025-32930](CVE-2025/CVE-2025-329xx/CVE-2025-32930.json) (`2025-04-14T15:15:25.787`) +- [CVE-2025-3568](CVE-2025/CVE-2025-35xx/CVE-2025-3568.json) (`2025-04-14T14:15:25.630`) +- [CVE-2025-3569](CVE-2025/CVE-2025-35xx/CVE-2025-3569.json) (`2025-04-14T14:15:25.813`) +- [CVE-2025-3570](CVE-2025/CVE-2025-35xx/CVE-2025-3570.json) (`2025-04-14T15:15:26.333`) +- [CVE-2025-3571](CVE-2025/CVE-2025-35xx/CVE-2025-3571.json) (`2025-04-14T15:15:26.523`) ### CVEs modified in the last Commit -Recently modified CVEs: `48` +Recently modified CVEs: `83` -- [CVE-2024-31545](CVE-2024/CVE-2024-315xx/CVE-2024-31545.json) (`2025-04-14T13:46:09.530`) -- [CVE-2024-31546](CVE-2024/CVE-2024-315xx/CVE-2024-31546.json) (`2025-04-14T13:45:18.260`) -- [CVE-2024-31547](CVE-2024/CVE-2024-315xx/CVE-2024-31547.json) (`2025-04-14T13:45:51.980`) -- [CVE-2024-32162](CVE-2024/CVE-2024-321xx/CVE-2024-32162.json) (`2025-04-14T13:43:17.153`) -- [CVE-2024-32163](CVE-2024/CVE-2024-321xx/CVE-2024-32163.json) (`2025-04-14T13:43:41.323`) -- [CVE-2024-32236](CVE-2024/CVE-2024-322xx/CVE-2024-32236.json) (`2025-04-14T13:47:26.123`) -- [CVE-2024-32392](CVE-2024/CVE-2024-323xx/CVE-2024-32392.json) (`2025-04-14T13:49:29.703`) -- [CVE-2024-3893](CVE-2024/CVE-2024-38xx/CVE-2024-3893.json) (`2025-04-14T13:50:53.753`) -- [CVE-2024-47822](CVE-2024/CVE-2024-478xx/CVE-2024-47822.json) (`2025-04-14T12:15:14.970`) -- [CVE-2025-21959](CVE-2025/CVE-2025-219xx/CVE-2025-21959.json) (`2025-04-14T12:47:37.577`) -- [CVE-2025-21961](CVE-2025/CVE-2025-219xx/CVE-2025-21961.json) (`2025-04-14T12:45:14.773`) -- [CVE-2025-21962](CVE-2025/CVE-2025-219xx/CVE-2025-21962.json) (`2025-04-14T12:44:11.260`) -- [CVE-2025-21963](CVE-2025/CVE-2025-219xx/CVE-2025-21963.json) (`2025-04-14T12:41:54.493`) -- [CVE-2025-21964](CVE-2025/CVE-2025-219xx/CVE-2025-21964.json) (`2025-04-14T12:40:30.847`) -- [CVE-2025-21966](CVE-2025/CVE-2025-219xx/CVE-2025-21966.json) (`2025-04-14T12:39:17.060`) -- [CVE-2025-21967](CVE-2025/CVE-2025-219xx/CVE-2025-21967.json) (`2025-04-14T12:38:03.853`) -- [CVE-2025-21968](CVE-2025/CVE-2025-219xx/CVE-2025-21968.json) (`2025-04-14T12:37:24.997`) -- [CVE-2025-21969](CVE-2025/CVE-2025-219xx/CVE-2025-21969.json) (`2025-04-14T12:36:32.997`) -- [CVE-2025-21995](CVE-2025/CVE-2025-219xx/CVE-2025-21995.json) (`2025-04-14T12:35:14.330`) -- [CVE-2025-21996](CVE-2025/CVE-2025-219xx/CVE-2025-21996.json) (`2025-04-14T12:31:44.620`) -- [CVE-2025-2917](CVE-2025/CVE-2025-29xx/CVE-2025-2917.json) (`2025-04-14T13:53:30.877`) -- [CVE-2025-31560](CVE-2025/CVE-2025-315xx/CVE-2025-31560.json) (`2025-04-14T12:41:00.653`) -- [CVE-2025-31859](CVE-2025/CVE-2025-318xx/CVE-2025-31859.json) (`2025-04-14T12:15:15.967`) -- [CVE-2025-32275](CVE-2025/CVE-2025-322xx/CVE-2025-32275.json) (`2025-04-14T12:36:13.380`) -- [CVE-2025-3360](CVE-2025/CVE-2025-33xx/CVE-2025-3360.json) (`2025-04-14T12:15:16.087`) +- [CVE-2024-53968](CVE-2024/CVE-2024-539xx/CVE-2024-53968.json) (`2025-04-14T14:57:30.890`) +- [CVE-2024-53969](CVE-2024/CVE-2024-539xx/CVE-2024-53969.json) (`2025-04-14T14:56:28.223`) +- [CVE-2024-53970](CVE-2024/CVE-2024-539xx/CVE-2024-53970.json) (`2025-04-14T14:55:33.210`) +- [CVE-2024-54918](CVE-2024/CVE-2024-549xx/CVE-2024-54918.json) (`2025-04-14T15:14:03.093`) +- [CVE-2024-54921](CVE-2024/CVE-2024-549xx/CVE-2024-54921.json) (`2025-04-14T15:15:41.963`) +- [CVE-2024-54923](CVE-2024/CVE-2024-549xx/CVE-2024-54923.json) (`2025-04-14T15:15:34.353`) +- [CVE-2024-54924](CVE-2024/CVE-2024-549xx/CVE-2024-54924.json) (`2025-04-14T15:15:25.957`) +- [CVE-2024-54925](CVE-2024/CVE-2024-549xx/CVE-2024-54925.json) (`2025-04-14T15:14:31.077`) +- [CVE-2024-9230](CVE-2024/CVE-2024-92xx/CVE-2024-9230.json) (`2025-04-14T15:15:23.897`) +- [CVE-2025-21170](CVE-2025/CVE-2025-211xx/CVE-2025-21170.json) (`2025-04-14T15:10:23.137`) +- [CVE-2025-2259](CVE-2025/CVE-2025-22xx/CVE-2025-2259.json) (`2025-04-14T15:15:24.383`) +- [CVE-2025-2260](CVE-2025/CVE-2025-22xx/CVE-2025-2260.json) (`2025-04-14T15:15:24.513`) +- [CVE-2025-2563](CVE-2025/CVE-2025-25xx/CVE-2025-2563.json) (`2025-04-14T15:15:24.927`) +- [CVE-2025-27176](CVE-2025/CVE-2025-271xx/CVE-2025-27176.json) (`2025-04-14T15:03:27.653`) +- [CVE-2025-27177](CVE-2025/CVE-2025-271xx/CVE-2025-27177.json) (`2025-04-14T15:04:42.487`) +- [CVE-2025-27178](CVE-2025/CVE-2025-271xx/CVE-2025-27178.json) (`2025-04-14T15:12:39.180`) +- [CVE-2025-27179](CVE-2025/CVE-2025-271xx/CVE-2025-27179.json) (`2025-04-14T15:11:35.763`) +- [CVE-2025-29087](CVE-2025/CVE-2025-290xx/CVE-2025-29087.json) (`2025-04-14T14:15:23.813`) +- [CVE-2025-29088](CVE-2025/CVE-2025-290xx/CVE-2025-29088.json) (`2025-04-14T14:15:23.993`) +- [CVE-2025-2915](CVE-2025/CVE-2025-29xx/CVE-2025-2915.json) (`2025-04-14T14:03:21.190`) +- [CVE-2025-30291](CVE-2025/CVE-2025-302xx/CVE-2025-30291.json) (`2025-04-14T15:26:47.470`) +- [CVE-2025-30292](CVE-2025/CVE-2025-302xx/CVE-2025-30292.json) (`2025-04-14T15:57:32.107`) +- [CVE-2025-30372](CVE-2025/CVE-2025-303xx/CVE-2025-30372.json) (`2025-04-14T14:49:16.873`) +- [CVE-2025-32200](CVE-2025/CVE-2025-322xx/CVE-2025-32200.json) (`2025-04-14T14:15:24.357`) +- [CVE-2025-3566](CVE-2025/CVE-2025-35xx/CVE-2025-3566.json) (`2025-04-14T14:15:25.373`) ## Download and Usage diff --git a/_state.csv b/_state.csv index d801c08858e..ba9b4beb826 100644 --- a/_state.csv +++ b/_state.csv @@ -171140,7 +171140,7 @@ CVE-2021-24938,0,0,5968f91765e885319bbe441748078f7d7a907817db4026de746f72cffabe7 CVE-2021-24939,0,0,4c55dd3e897f2edc270594a8defb1b0a40bdbc8f33ec414436ecb94c4b48a830,2024-11-21T05:54:02.873000 CVE-2021-24940,0,0,07021d83337a7c95494caac5f96f4b2bd732dddc809e16d09102874b2ed5bdf1,2024-11-21T05:54:02.983000 CVE-2021-24941,0,0,60baa73020cc5686e989c9c5717873c0f30d1532006a130eae1d912a6101ab2c,2024-11-21T05:54:03.097000 -CVE-2021-24942,0,1,88c26fa093029cbef1ba1f6de78286b9d09db07ca06d695bb59e7f9101256dd4,2025-04-14T13:15:14.923000 +CVE-2021-24942,0,0,88c26fa093029cbef1ba1f6de78286b9d09db07ca06d695bb59e7f9101256dd4,2025-04-14T13:15:14.923000 CVE-2021-24943,0,0,fda1d8e5e6ae6f6c7943b865f978afcfb10f683c5fcd112e2871552e581d8574,2024-11-21T05:54:03.340000 CVE-2021-24944,0,0,abb2b46908b7faa87810fc08a173309a08681d5e8f82e2e1c339a75a8dae84e8,2024-11-21T05:54:03.453000 CVE-2021-24945,0,0,f1b738634d88162c63dc2808d622f639347e33f966dd78018e7d8127a1bb93fd,2024-11-21T05:54:03.563000 @@ -196163,7 +196163,7 @@ CVE-2022-26964,0,0,26f568ba5eaef2aca7f61c9f4cb12945bb3a06d174d98937ccfd662a5d8d9 CVE-2022-26965,0,0,0eee63ccef10e99830b56d975e0cd966832e99566aa6c895dd1d84e6b78dc070,2024-11-21T06:54:52.667000 CVE-2022-26966,0,0,606492474a263c3f06e4b3cc934e12be505b96f19699b5edf65a5f479817a11b,2024-11-21T06:54:52.797000 CVE-2022-26967,0,0,43ac7ea8a944baecd7e718ef11590bbe5759186b24182b91fc646c42e07104bf,2024-11-21T06:54:52.947000 -CVE-2022-26969,0,0,20073f91fb097e332147cd42eb55d1d5f92cb7aa5bf530ee829c9e66f05626b7,2024-11-21T06:54:53.077000 +CVE-2022-26969,0,1,83689b76c5dd5a470ab66b37b49429e52ff02f38c5f5b58ba2008b3dc30f4672,2025-04-14T15:15:17.007000 CVE-2022-2697,0,0,f9972674290c4e695636a3d56abcb3ac76c1a48633c9105fdc25e84f94d1f823,2024-11-21T07:01:32.283000 CVE-2022-26971,0,0,fe31df6da86e6423e071d18fcac4c814f8887e1de6435145f4d2ef1f6c050305,2024-11-21T06:54:53.213000 CVE-2022-26972,0,0,27442c4c811527f3243b3d20813c0f0cbb195e3176a8664133a0a14e2b8fe935,2024-11-21T06:54:53.353000 @@ -199818,7 +199818,7 @@ CVE-2022-31465,0,0,b03bd7bdef30b27f07a91a4027ba0f01abe464db0360d3cc676c45ba32b3b CVE-2022-31466,0,0,c0127fa2311cbd0df2e7da23129407c6fb1a963932f658dbdb33008b2cfb6e52,2024-11-21T07:04:30.453000 CVE-2022-31467,0,0,12e2b0698bc6e1842cbe3ab7aa80a844f995902fcd1f0b9f5e085d4a31f083c1,2024-11-21T07:04:30.610000 CVE-2022-31468,0,0,9b8a0b37c095874c28aee71feea507e436f9dbc7f16de2bebdf1a447d8037dcc,2024-11-21T07:04:30.767000 -CVE-2022-31469,0,0,8a518bdf40f1dfa4d27a78d7eaca7b882033f4f9e4715b62c2f5a403b009ac8c,2024-11-21T07:04:30.917000 +CVE-2022-31469,0,1,696b4f782c45342206cbd4d8b1053fdfc39f917e7e05220db51bf1ed006822ac,2025-04-14T15:15:17.677000 CVE-2022-3147,0,0,2afb344724a4a899ecbd6887876fb1cbb2be9bb29d22e82fa00791845a379651,2024-11-21T07:18:55.493000 CVE-2022-31470,0,0,8296433ba90d796a785568d66b4d3f475ea783c4dc7de047888e8d699d7d1b3e,2024-11-21T07:04:31.110000 CVE-2022-31471,0,0,647489892103383cd9123b26f31ab22c6d518dd895c672ed57e02d876fd344b2,2024-11-21T07:04:31.290000 @@ -204053,7 +204053,7 @@ CVE-2022-3666,0,0,1b1324e5edeb4324781ab7bd60588bcd64e98e7fba370d4d7eb58a273cc8bf CVE-2022-36660,0,0,036c509a1e051b4a52c9cbdb5226853bbaef7c8594f1573de8c0ead4817590e7,2024-11-21T07:13:27.947000 CVE-2022-36661,0,0,db6e4fb5a251e88f60d41084bcfe61f9ccb1a043bc4e9212ad7cbd0d837c014f,2024-11-21T07:13:28.100000 CVE-2022-36663,0,0,5ac3b0b87659681fb7fa0e03ce8d62d71f7ae5765aaef06035788a64c1ac3b50,2024-11-21T07:13:28.243000 -CVE-2022-36664,0,0,88179c97efba4d75723e9705380a2e6d395de556857fce0e7990e8327a4e8bd8,2024-11-21T07:13:28.397000 +CVE-2022-36664,0,1,9557dd161c5043c5f1852f2c554b1f38faa40ecfa3a0c2f8ac76d0b6516a7213,2025-04-14T15:15:17.927000 CVE-2022-36667,0,0,39a884885b4309ef081e44fd8cd5d2fd2a6351ffff065e2a574c21cf01023e87,2024-11-21T07:13:28.573000 CVE-2022-36668,0,0,b8ae9841907fd7f38754f3cb043462ec3d77b1f7d9255c3bd0ecedab029e463b,2024-11-21T07:13:28.720000 CVE-2022-36669,0,0,ab53f0ff43e4e0dda45778a916d3f6c6c0323d482da8458e3fa89dce6639ba81,2024-11-21T07:13:28.867000 @@ -204571,14 +204571,14 @@ CVE-2022-37303,0,0,394a1138eb8cd4597e63c32292d5a91afd61907453ed5f5373f376f45db8c CVE-2022-37304,0,0,1aeb7ab2f32a8cce00783bda87e1cbc232d17f8628242843c3274f43439c8ad8,2023-11-07T03:49:45.793000 CVE-2022-37305,0,0,9cfa40f430b959845ff73051089acaa256b6769898037a9d2a19661e2e8bed82,2024-11-21T07:14:43.080000 CVE-2022-37306,0,0,5893daaad7baca32dc7bd81e97fcd602dd52f0d1a8ea7bfc765d6c47902f95ee,2025-02-06T18:15:29.597000 -CVE-2022-37307,0,0,65c4f06a1b68ef83151bd639dd168391bf3ff662764488664598d4773f19924d,2024-11-21T07:14:43.430000 -CVE-2022-37308,0,0,52c5cfd626263d8055234a1e156afe0004db2e9456196a323c018912ee84e101,2024-11-21T07:14:43.603000 -CVE-2022-37309,0,0,66cbbc842075d57bb070bd4670fdebc39bbe16faf87280b30e4e934a6e4bdff5,2024-11-21T07:14:43.780000 +CVE-2022-37307,0,1,b11001a8fff6e298a64dea3331448d7e8a47057674aa66ea2bc013b4dc875ba3,2025-04-14T15:15:18.210000 +CVE-2022-37308,0,1,ba6bcd780fc35f9e249261ff667d3e230d23e41d70ad495c2977a1c0cc1facbf,2025-04-14T15:15:18.710000 +CVE-2022-37309,0,1,4f85afc33c198258cbb23aa23f5f306d0af90e94f51003644cd16fcef326436d,2025-04-14T15:15:19.253000 CVE-2022-3731,0,0,105c94dbbbb807ce76968a1c9b500ba1dd180f70020b7699b2dc368513360963,2024-11-21T07:20:07.527000 -CVE-2022-37310,0,0,8380c050acc8102edf3394afea2db3548e7c74bfd15255d95aeeed48b65cc5b0,2024-11-21T07:14:43.953000 -CVE-2022-37311,0,0,a3c4ea2c3f19afcdfdceab43846afdbdd2909c03a966ae134ff54b897bdd05e4,2024-11-21T07:14:44.123000 -CVE-2022-37312,0,0,3c9b0c453daf9e4c76d17d6e98b1db52b84acf4f6f371f1bbfe927007158a0ab,2024-11-21T07:14:44.290000 -CVE-2022-37313,0,0,bc275fcfdf689ac449ebd83e85f7ed2f07b6c0af851787a2a6bc4687caea2d83,2024-11-21T07:14:44.457000 +CVE-2022-37310,0,1,5ff6102b26487380f11756a2dcaa47fc1c37bf08b5ddcde01d7d9cefdb929332,2025-04-14T15:15:19.463000 +CVE-2022-37311,0,1,20576e0c4d771559cf472084a37d9e2b597702e3ec9dd7706568de47e4678b48,2025-04-14T15:15:19.687000 +CVE-2022-37312,0,1,0ee7974f5327bded6089e9c21b854fea9a9998fd0c5e77fe7a32bcd7514508d6,2025-04-14T15:15:20.163000 +CVE-2022-37313,0,1,e90987da09970877cf3448a6fab931ba48bc7b6c99fe696b480323adc31edc7a,2025-04-14T15:15:20.983000 CVE-2022-37315,0,0,4b50435e964ff8a9249573d6012aa885f283712d5bc36d94e9f55e102817630f,2024-11-21T07:14:44.620000 CVE-2022-37316,0,0,b8acf4b8add25dcddcb12560a914e5e30f170f7dc4646845a1b26523c5055900,2024-11-21T07:14:44.770000 CVE-2022-37317,0,0,0700f64b5727bb97850778151a9b13431195d7ed06a2620641b14cd0c75f208b,2024-11-21T07:14:44.937000 @@ -205342,7 +205342,7 @@ CVE-2022-38395,0,0,cfcb668401bd5813de584737eff8c3891c56785144a5591936ff493fec406 CVE-2022-38396,0,0,ccf65267c7bff1abb00bf62b70955412f3eddde67edb5798b3f7912bcd529939,2025-03-25T21:15:37.403000 CVE-2022-38398,0,0,6a42f93d3fa9024783f093b7fe9aec6a4e04d54ba123711065cff063d6c513ba,2024-11-21T07:16:23.787000 CVE-2022-38399,0,0,fbdab86e47ac4bb6e6d4f4f54a6c9f624ce567cab1c9d585a8c551ba79061925,2024-11-21T07:16:23.913000 -CVE-2022-3840,0,0,ca26b5f638bd8b15ccabcee943b1fdea5fba46d99d379fbee57a7f5504c9e824,2024-11-21T07:20:20.597000 +CVE-2022-3840,0,1,1932f8e8946d43e7cc430df0480b524cf58970df5bb60e9e5cd92ae732ab52e9,2025-04-14T14:15:19.550000 CVE-2022-38400,0,0,115c4f349a3abc4dbaf940659933620649000e038a407562eabcc43845a06fc4,2024-11-21T07:16:24.030000 CVE-2022-38401,0,0,de16817fd142c4fc6e0252cd7ea66e9c15984d59d86d7a748d5bc7792759de04,2024-11-21T07:16:24.147000 CVE-2022-38402,0,0,157883e2ef0f5b21e57faad04120125097d16b42c415613eefa9925a48895484,2024-11-21T07:16:24.280000 @@ -206778,7 +206778,7 @@ CVE-2022-4045,0,0,57846339700d99f66e875d8e09a14aab39e2a28261bb3e0e17acdf5d962b38 CVE-2022-4046,0,0,9ba78e6ddfd29a74591b95afa9f55ed1fc9c3c5d06b17000ec0d786adc965117,2024-11-21T07:34:30.347000 CVE-2022-40468,0,0,848e6c2687a6946bed2849af4419ac0073de05f6b1ed15845414b3975106dd98,2024-11-21T07:21:25.437000 CVE-2022-40469,0,0,5f074aeffac02cbdfac35517f2f1de14e022c44a5e6899a61966b9ce17e11e14,2024-11-21T07:21:25.603000 -CVE-2022-4047,0,0,b13ab6a1ada42a04f4ec7acb8339d023229140c895820323e24738274d30db7a,2024-11-21T07:34:30.487000 +CVE-2022-4047,0,1,7e6fa65e419cb592ed720d5874c4b9673ddd13d6032def0c20db74fd71a81590,2025-04-14T14:15:21.480000 CVE-2022-40470,0,0,f536ae9e7ef0e2c13674a6846efa79975cc29ad2c4686eb7dd5bcd848ed8d017,2024-11-21T07:21:25.763000 CVE-2022-40471,0,0,5d9a608d261203a8a446b2f191a6e44b0a4c916c78122c9e260d4a26169b1eb5,2024-11-21T07:21:25.907000 CVE-2022-40472,0,0,698ca87b18685350f67cad77fb6d5eb2a1bdf126d780e84bc2d8c9994638b9ce,2024-11-21T07:21:26.060000 @@ -207329,7 +207329,7 @@ CVE-2022-41096,0,0,7e343507fc52ff8dd2b62a05cbe7a14dd37100304244b3189472b46a5a191 CVE-2022-41097,0,0,7103e372a8a3cff66657e2df58958f6ffb052fd020b515d2d69037ecc392d303,2024-11-21T07:22:36.537000 CVE-2022-41098,0,0,f68ecb5ccf6ed44e57547abb2e63021b407cc64921012c82c01d5d152151f77a,2024-11-21T07:22:36.683000 CVE-2022-41099,0,0,befebb05338fc8c82f149b240ef4268e8d18140b07e50e95efa5ec89c6a3260f,2024-11-21T07:22:36.830000 -CVE-2022-4110,0,0,ba614deeedfaedbc6d0ca45228f2622d013d2040233d635c7f77f057002f76fc,2024-11-21T07:34:36.053000 +CVE-2022-4110,0,1,338ad75e8f6d77dfa184e79f35661a0cecf2ee737889276fc208f8471fa1404e,2025-04-14T14:15:21.643000 CVE-2022-41100,0,0,a84ba9888a3107f07d9aca26f56e978e53dea06a80fc20388c23818c1cb93bd5,2024-11-21T07:22:36.957000 CVE-2022-41101,0,0,f4d9524902c8877294eeab80bf2491d9deaf8b307142c3f68898bdd7c8ccd7a5,2024-11-21T07:22:37.100000 CVE-2022-41102,0,0,e7e45da71d57c3e483d2e1d2b360b95a5a161ad9ec4a54c843049ca65d5741f7,2024-11-21T07:22:37.230000 @@ -207389,7 +207389,7 @@ CVE-2022-41166,0,0,a76a71b0948f97da4b90ede949cd85c4f503075b34cefdd7ed25e366da000 CVE-2022-41167,0,0,be372b800f5eb807e33f8f0dba16ef891e6b620251459dce333642808caf7832,2024-11-21T07:22:44.113000 CVE-2022-41168,0,0,f32acecbc45220e30b28b26f06675f9fbaeca50f2651eca40ca67fe674b4177b,2024-11-21T07:22:44.267000 CVE-2022-41169,0,0,9e1f255eb1f3733fdc9d0a0169fe5e38e5863c182087aa26b331b637592eb32c,2024-11-21T07:22:44.407000 -CVE-2022-4117,0,0,b6e491a8572274d52f27845ba7bea0db68b8935089bf5668d265e465b3d05a76,2024-11-21T07:34:36.690000 +CVE-2022-4117,0,1,f2ae1ba61c2b10f0bfa08d5a426c7d3f7d658b3bebbcca08d578b9a75eeaf393,2025-04-14T15:15:22.283000 CVE-2022-41170,0,0,7125ad4e9078ab158d02d9b0e94bc639cd1e228bbd9014ec73a9facd96ba4a37,2024-11-21T07:22:44.547000 CVE-2022-41171,0,0,18227e34fe7600ed58b195acbcb8c89e4da84799009f600e2ce7ef00529b1eef,2024-11-21T07:22:44.690000 CVE-2022-41172,0,0,3da4403abd8bcc63a46070dc346ffa6bf06b59184789c41dfa3831fc859680a2,2024-11-21T07:22:44.827000 @@ -207422,7 +207422,7 @@ CVE-2022-41196,0,0,27bc6cf65aed914f8998f1baf07f7cdae29a626dbf7cc9030d867fcc9eecf CVE-2022-41197,0,0,b4776e27e5cdfc263f5d09b4ca1f2d3005b011299ad0f5d90dabd4ad22d83e71,2024-11-21T07:22:48.233000 CVE-2022-41198,0,0,9d19538e3944845ea45b72a9b2e336a906bae73f770d121d7c204ed859300dd9,2024-11-21T07:22:48.380000 CVE-2022-41199,0,0,0038093fceee1feedaa39d04eb073690615230f939ffadd3ce08005f60af3efd,2024-11-21T07:22:48.540000 -CVE-2022-4120,0,0,af834e743a2c3e4f46598d3904b0183068cf4aacec1134fae31496d90f563a25,2024-11-21T07:34:37 +CVE-2022-4120,0,1,b990eb9006df625bc1397c0b73d40d500395693d0c7729ff0563cfc07d4e0f88,2025-04-14T14:15:21.803000 CVE-2022-41200,0,0,0d23bff378498aed526e6273387954eca8cc5421aa981045ee3239d974a1ea8f,2024-11-21T07:22:48.687000 CVE-2022-41201,0,0,9a5869c3012a81fb4b7a50e3fbedf2f45e96c4b03392a81246335cabfdf9a363,2024-11-21T07:22:48.827000 CVE-2022-41202,0,0,3a8865598b112a2b1918bc1687027bd391b00a403e92719827c8ee5c733d3c85,2024-11-21T07:22:48.977000 @@ -207674,7 +207674,7 @@ CVE-2022-41514,0,0,3b0ef7067dc943ee4ad676295886d4b7fc63f333bc6524d0075d110fbd563 CVE-2022-41515,0,0,90e8430cfb234013f32aa3816def4af035de0b6807b102377265bf7708dc0012,2024-11-21T07:23:18.740000 CVE-2022-41517,0,0,105ad14451c3943bf568fd731013da851dc09ff40a5e53fe6224bd7a4024467e,2024-11-21T07:23:18.883000 CVE-2022-41518,0,0,453c58b79c08e118f10694e8ce792c3bbbc6680d5bd0d7114fa85c4d2be5293e,2024-11-21T07:23:19.027000 -CVE-2022-4152,0,0,9d76559915ecb68ac1c68c31d4cb5562e3eb5496a0f5cbd0d5e94f95c5bab565,2024-11-21T07:34:40.720000 +CVE-2022-4152,0,1,1f1431c0e094868d002c4af64f1ee621140edb92c17255f63aff228bd75c9427,2025-04-14T14:15:21.957000 CVE-2022-41520,0,0,57c7b1d1a50cc6701c25556c6e93648bbad2fdf7868794233a7da50cf3235564,2024-11-21T07:23:19.183000 CVE-2022-41521,0,0,17920ac61c6835b5950ded8579067ee7e9bd4a037f2ec95ba3c27b0eabe1d656,2024-11-21T07:23:19.333000 CVE-2022-41522,0,0,4d744247bf624b8d2b1ec60f3b9b540c6219cba5f3cc1402158508aa3f9136b0,2024-11-21T07:23:19.480000 @@ -207694,7 +207694,7 @@ CVE-2022-41536,0,0,0795a246ea93fb8d7361fa2f8cb02ec2d981bca7ef70288daefeab44cc14f CVE-2022-41537,0,0,8e8e0e1b07ac1ff64069cbb0cb82626f2f97f9901d160d7d50b7c41172f72ded,2024-11-21T07:23:21.390000 CVE-2022-41538,0,0,b3eed3c0f3efe70c2b32b71a23ce47ebdc983ff413b7d99df8662e3b011e3812,2024-11-21T07:23:21.537000 CVE-2022-41539,0,0,15337987b15e0a1e8831e42304bd2b4243484a97f37b880041418cf56ec34048,2024-11-21T07:23:21.677000 -CVE-2022-4154,0,0,eb4244e602f828dfb9c156be7f033e3b7083ec6e6fbf6b706baf234523476ef1,2024-11-21T07:34:40.933000 +CVE-2022-4154,0,1,8394f837a25c89098bae851c653ed72d67a157225bfd4ca1baef12ebec02f5fd,2025-04-14T15:15:22.547000 CVE-2022-41540,0,0,0835f451e4365b2ba89b1d7b967d89d4dd5dc079f33fca09331bff3bc262ed1b,2024-11-21T07:23:21.810000 CVE-2022-41541,0,0,00e52175bebb5443f9ce3da1abf7765314cf802ecb11e4a93b1fe3d7e8087047,2024-11-21T07:23:21.950000 CVE-2022-41542,0,0,8fc7301d48c78688e1f0813f0699c56fa4214aeaacc0eee0cbdaeba78bf09c2b,2024-11-21T07:23:22.110000 @@ -207711,7 +207711,7 @@ CVE-2022-41555,0,0,dcc45366714f50e34da445217c329775dde88029115394752a6e1f4814ad6 CVE-2022-41556,0,0,2edfb1aee1b095a86f2880c5ba197b25e416f6a37ee017278b1d31667c0c2e31,2024-11-21T07:23:23.323000 CVE-2022-41558,0,0,8597b36762e79ee3ea2f6ed202351a58b2eb17d1a11c6854bfa4d7bdbc0aca2f,2024-11-21T07:23:23.477000 CVE-2022-41559,0,0,2d236f7b8bf1d14330e2f079117bfcaf0c0b94d8bf4a67d32b9a29f687595ccb,2024-11-21T07:23:23.633000 -CVE-2022-4156,0,0,1d5582c4fbb4cd1521fd2e6ff293688fdca34c9b4d2257e15a6a686dc3fe8524,2024-11-21T07:34:41.160000 +CVE-2022-4156,0,1,cb04e2f52def22ef2d291f3167d278087062f214f3a15368a3ed8e3cbdcdf1f2,2025-04-14T15:15:22.737000 CVE-2022-41560,0,0,436d1214c18862b81bf15dd8b6a702f25157660b531d90d8e8e0d731993456c5,2024-11-21T07:23:23.747000 CVE-2022-41561,0,0,def5c97e16c8c154be52e949f6428816c53f670ddacab2c9072968cd00951bfe,2024-11-21T07:23:23.867000 CVE-2022-41562,0,0,bce74996bd956a065db0973f0c4f7ff8a90350d84d9c339d8d325636545fb686,2024-11-21T07:23:24 @@ -207743,7 +207743,7 @@ CVE-2022-41586,0,0,8fa4dbcbfe6b8504dd33b16227876b60db283c9a4740cee5b902830558ffb CVE-2022-41587,0,0,71ddf76b7d967725149062c3f674f767a19e557841340630e2ed7cca7deb2745,2024-11-21T07:23:26.697000 CVE-2022-41588,0,0,d2d1d621b02c6d65a210adfe0cf852b5909b9210e8e7b48dfa79179b99f2d55c,2024-11-21T07:23:26.800000 CVE-2022-41589,0,0,df81cdf961c79450240400ee123e3eed929d02e9ab93809b04f5cb1b7b73ccdf,2024-11-21T07:23:26.920000 -CVE-2022-4159,0,0,afa1bbc6ab8a6e6f52111287949493072d0416bfd9f6cf858fc85a6f1a2bd805,2024-11-21T07:34:41.503000 +CVE-2022-4159,0,1,5ae53b03611bc296ce8eb2ca452e8d07b6e19f0555d14c40cfcf72834f6657d4,2025-04-14T14:15:22.113000 CVE-2022-41590,0,0,e4a3852cd559eac66e9e200c710b0a77b5e1c8f8f714bc60a6527ce384c9bb2c,2024-11-21T07:23:27.037000 CVE-2022-41591,0,0,d7ccd1d75d325de93ede6d7b2d94c4c6aa4f0d4dd64def86ea3678fd8db3708f,2024-11-21T07:23:27.150000 CVE-2022-41592,0,0,2f53602e1dacb448723c2744167fa6dca36e04c03b452a57349e6910782d2f32,2024-11-21T07:23:27.267000 @@ -207754,7 +207754,7 @@ CVE-2022-41596,0,0,ebf1d7c5d93b89ab78039b721cf6c90d612bce2bd31945e548457b760710a CVE-2022-41597,0,0,8bbc3a9d1ba94b7636350bf27962428f8e0752b5d85ff0310eb7121d5db5b678,2024-11-21T07:23:27.830000 CVE-2022-41598,0,0,3e6667733ab8125561cc2cf7fc591fde294838537990594b73b50fd3fff1fec3,2024-11-21T07:23:27.937000 CVE-2022-41599,0,0,d7e4d6d300650eb73b9f41f9578c4fe50251c5d9857e9738ead6c47271c7ba6a,2024-11-21T07:23:28.043000 -CVE-2022-4160,0,0,3028f58e378ca11382c997d666b3959c93f516ef3a88b1fb8a1d6db9d156180c,2024-11-21T07:34:41.620000 +CVE-2022-4160,0,1,d343f21791e9ee32c2919aa6e657810aec6fa6621f25ba3a551afa6313d65f24,2025-04-14T14:15:22.320000 CVE-2022-41600,0,0,210c18862c3c081bd88fe62c9ab2bec3efc0f145e380fec608948330f7f2a6ff,2024-11-21T07:23:28.157000 CVE-2022-41601,0,0,c5fd107b0c1e24a02349a7e960f98f9f0357a7873a2542bbe9eabd760104e254,2024-11-21T07:23:28.267000 CVE-2022-41602,0,0,d5420d6322669a1b5ee52de0ad103fa36aaf3b62b4f2d28d7f25105b279570a2,2024-11-21T07:23:28.373000 @@ -207764,7 +207764,7 @@ CVE-2022-41606,0,0,5fbdfd19136bdab0328807a3044e9da0f1efcba696449074aad12fd1e1860 CVE-2022-41607,0,0,fec15647a927c1a9177aa1340b3d45d4bf6b0ec29089053774f903aa7fa4a2d9,2024-11-21T07:23:28.887000 CVE-2022-41608,0,0,75f28081740bbb5bdf38042c0cab722b26762f045d7e09023dcbe6d1f106899c,2024-11-21T07:23:29.017000 CVE-2022-41609,0,0,fa5e054d373255c9d48ac5f87c991d6eb78f1abf6e64b013c8a86565003d417a,2024-11-21T07:23:29.143000 -CVE-2022-4161,0,0,60ef588cd2217a1dd13d72f474966586e17c15bd1d647295ce371178fd78f693,2024-11-21T07:34:41.737000 +CVE-2022-4161,0,1,723c1b4afcf2f85795be4bbb82409331554becd8f3639884c9309451e03504d0,2025-04-14T15:15:22.907000 CVE-2022-41610,0,0,8ba9608a898bc73c43b6e2e7fcffee6e7fe94b9b0af732e17675f500ad051e0a,2024-11-21T07:23:29.270000 CVE-2022-41611,0,0,a4032ab0fc1fcd1ac2e1cbec4062926723a4e8607e64ca5fedb59914ae9745db,2024-11-21T07:23:29.430000 CVE-2022-41612,0,0,8c1c1aecb835d67fac7d914cfee724d57c9edb42324d2447d09c5bc604784945,2024-11-21T07:23:29.567000 @@ -207775,7 +207775,7 @@ CVE-2022-41616,0,0,98079ec1e3bd9a619a9215159ea53212342456d42017f8b5738a1398d76ee CVE-2022-41617,0,0,d5289e8fcd6fdd78f246b59baf60ed697829801a7bd9825d59bf33fce7a641c5,2024-11-21T07:23:30.390000 CVE-2022-41618,0,0,3ad4cc66222dd817dd1bb1f016b94aa9b69d17267d00bd9b5558276fbe18ef88,2024-11-21T07:23:30.513000 CVE-2022-41619,0,0,e3ddebc956b74b9a49b37c562d1154e8cc7e151d1925c18ab1914b8b4da27ea8,2024-11-21T07:23:30.660000 -CVE-2022-4162,0,0,e4bf07175146deb5ac7db367e878ef6a6659fbf712498d4917fc64785f1e6f40,2024-11-21T07:34:41.850000 +CVE-2022-4162,0,1,2b179b8dc0b9116576bf0e25b4260302a2ab79d0da1b6a1bbcc94c0fb773ca01,2025-04-14T14:15:22.480000 CVE-2022-41620,0,0,998fed2fb43574d04ebce1ef365e1e420680951dd618e44c218cb59975494867,2024-11-21T07:23:30.803000 CVE-2022-41621,0,0,fbab525081b029089eb706c7a4079dab693a127cda4408b3b306c26eb0a87f2a,2024-11-21T07:23:30.927000 CVE-2022-41622,0,0,8fea4715e383253c0ceabe6742719e7443de15039530f61adfe7b23ce6bb39d0,2024-11-21T07:23:31.063000 @@ -207784,14 +207784,14 @@ CVE-2022-41624,0,0,488cb61fd8728c68ca695b0423df28dd19adfc4f82bdcb0ed98190c8c82af CVE-2022-41627,0,0,264ccbc02cdf8c0d42823cc0b642848959f06dd182461ebcd61549eef668554b,2024-11-21T07:23:31.537000 CVE-2022-41628,0,0,c97a25de0adc59833bd9e27c7d8eb5f9659aee4e8f5ef0648560efa4d30a8181,2024-11-21T07:23:31.690000 CVE-2022-41629,0,0,0f39225ec15debd63c9f58385cfee1dee1f1d95f3ec06813ec1687b86b4e7782,2024-11-21T07:23:31.840000 -CVE-2022-4163,0,0,674cba72550b5a7a6f7ce2c63065018da3701a64a01c845f2d85fb8cf8ea3dce,2024-11-21T07:34:41.950000 +CVE-2022-4163,0,1,c1f1fe4d8b7c722afcd571b8936a07aa8d2846a4f3c4a6489a64b9a46a996447,2025-04-14T15:15:23.080000 CVE-2022-41633,0,0,ceda74215a57250d2e948e57d4a4f1271618f66c4a371d95e6352addc88fb983,2024-11-21T07:23:31.983000 CVE-2022-41634,0,0,8c16fbcd9fab37f006bd6577ace0020f66aeb001e27abe94e01897189f1b4a32,2024-11-21T07:23:32.130000 CVE-2022-41635,0,0,d9b6df16964b4ef2333e6a4886c562b4236724988a3974e85e2fa7452bd6e8d1,2024-11-21T07:23:32.263000 CVE-2022-41636,0,0,5906f45a2f41c083488ce3786406755bc940e852725df55fd600994642ab1c35,2024-11-21T07:23:32.403000 CVE-2022-41638,0,0,ed1f477e898e3b317caeb59606a6d830c333a56466581cdf7d228ceab966f777,2024-11-21T07:23:32.533000 CVE-2022-41639,0,0,c4e3c7ea6a1b07a94fb32dac5df3169afe195155f4eccd942db726426f1d468c,2024-11-21T07:23:32.673000 -CVE-2022-4164,0,0,8ce0fa509f108409649d14ef33031283af3fbdeb4252d2a175d1659877309217,2024-11-21T07:34:42.053000 +CVE-2022-4164,0,1,15cba15be53e66dde616a2a697c96ba255cf848dc81bcc3967fa482a1494e2bd,2025-04-14T14:15:22.633000 CVE-2022-41640,0,0,49d1c855d989cedc5c18b2091216ba28f70836d6ff4c4bb8556e6e7cba597309,2024-11-21T07:23:32.823000 CVE-2022-41642,0,0,89f1941886cce0191e4364f2a8699d5836b04374e7b031d6ac5116e2ae2ac13a,2024-11-21T07:23:32.980000 CVE-2022-41643,0,0,b1920c9e66420104c8d4308636fa5b3e5afec6e9d265886d7d255454a77f9f64,2024-11-21T07:23:33.110000 @@ -207913,9 +207913,9 @@ CVE-2022-41760,0,0,bcf4a451560df21a15fe081880cc00c486c852abd440fd38627d1ff83f25b CVE-2022-41761,0,0,e7808633517783e13f8d72963bb1e23d9e68df3697c699f99eeb843667067078,2024-11-21T07:23:47.800000 CVE-2022-41762,0,0,8bc00770aa2d410ed2e856daf4387154011542288a0ff1f908d1f50901fb401d,2024-11-21T07:23:47.940000 CVE-2022-41763,0,0,400c8a54bc0e361661597ad2c3cf0d72a6c31041540b0b3e13e3089c2f9e1a6a,2024-11-21T07:23:48.080000 -CVE-2022-41765,0,0,38c51fce165e6a3539532850b9e4dacb3c3436beb758363d2b3c7b185f8ea094,2024-11-21T07:23:48.227000 +CVE-2022-41765,0,1,1e7fe269cd1829c7176e9a07bbc0cd28e51c6b8578c7852b87185e732d2de7d4,2025-04-14T15:15:21.573000 CVE-2022-41766,0,0,ef6357cbd97a74f460ddad2c123b9747ad6c038817eb7f7f46e7f75a626e81fc,2024-11-21T07:23:48.380000 -CVE-2022-41767,0,0,674512c7d9c99b7f7197b651b8ee785a2f04775b41fa75299e82066c14a0fdb8,2024-11-21T07:23:48.530000 +CVE-2022-41767,0,1,5baf7e3c9f4a7ebb4ad3b2ebad4b681ca50b7bf534c3f6a539c3c806b0f0d0ef,2025-04-14T15:15:21.840000 CVE-2022-41769,0,0,e934680356f3e04b3df48dc46d469e1c50516dc92a1f3410102db7f76dd3fdb2,2024-11-21T07:23:48.677000 CVE-2022-4177,0,0,e4a2869c6a7ddca5fc0c01f59acc4f5fcefc7c047ffd690e5cc77e5a717e7afd,2024-11-21T07:34:43.480000 CVE-2022-41770,0,0,9ba99438d011ade00cdd0bfe03c05926791d3dad0b041e00c763150fcfca33df,2024-11-21T07:23:48.790000 @@ -208306,7 +208306,7 @@ CVE-2022-42256,0,0,071f16b1e5dd1eb080fdda55613ca3428a0018f605514e2de5c54c7ff8cea CVE-2022-42257,0,0,23c39481f8d56fbde6601c6e14bc6e3c79c51e39f035a70f1c7ffeaeffd72871,2024-11-21T07:24:35.930000 CVE-2022-42258,0,0,519440de60a2be70eb28c2586bd54199050c95ac19232698738b3347dc927431,2024-11-21T07:24:36.087000 CVE-2022-42259,0,0,0d4bb119ccff53e2c816e79d9167064354b80db10027e3fa524712da4dc1b796,2024-11-21T07:24:36.247000 -CVE-2022-4226,0,0,6a6c377f8f6167b401699179582f927c816389771e08d9eb8e5763f22788504f,2024-11-21T07:34:49.660000 +CVE-2022-4226,0,1,f6a8a51348488a013ba6530213f8aa2203d43bd8608b56ac32ca3a5f39cb2a0e,2025-04-14T14:15:22.790000 CVE-2022-42260,0,0,2d607ea9e51997d010ab8894102a3d2e0d439908a8a980a66fd1555ad0670278,2024-11-21T07:24:36.410000 CVE-2022-42261,0,0,f8e63bec402e38f1b450f2c3868e1147f4dec660ff71fec7668687593c9bdb4d,2024-11-21T07:24:36.560000 CVE-2022-42262,0,0,dc9451182e27d6d202169be4a09a396d22f21f252df02ebffe727b5eef82ccd4,2024-11-21T07:24:36.697000 @@ -208317,7 +208317,7 @@ CVE-2022-42266,0,0,b8520b28840225ee8364dffcfa4b650e5134c750b9ededc3de9dad9a93a2f CVE-2022-42267,0,0,49b3a72d7b52ed5c280a1fd8aa6642b89e908673d3c5ec6529decbf46bffaad4,2024-11-21T07:24:37.403000 CVE-2022-42268,0,0,2f9f482e179f0b2fa2ffde2a07be7fc4c27f7eb66dfc3408e8a6360b510e4d0e,2024-11-21T07:24:37.537000 CVE-2022-42269,0,0,7c88409040abf7c304cf8f59a3190f7e460197a87c5600ffaee37bed09725520,2024-11-21T07:24:37.670000 -CVE-2022-4227,0,0,3b7b00790ef4f1fca7f408be92a37f858577b34277410758e383f6376a03e8d5,2024-11-21T07:34:49.770000 +CVE-2022-4227,0,1,bf778e9e4a8eff10163e9767ce3fd96ac57e6207593af8e16d999e1c965a0adc,2025-04-14T14:15:22.950000 CVE-2022-42270,0,0,7468dfa1a646cb3d0ab13047bb1c94d04b0587b02a861e7d73c58f5c7a64d1c1,2024-11-21T07:24:37.790000 CVE-2022-42271,0,0,8cdda5369432004a6ea993b0da78d1caea6f21def4a18c8eee4faf79e6c31c07,2024-11-21T07:24:37.913000 CVE-2022-42272,0,0,3b7b074fcfda5e082c28e52db513113754af046052affd0ace80e7f9fa06cb36,2024-11-21T07:24:38.047000 @@ -208440,7 +208440,7 @@ CVE-2022-42386,0,0,7fa7b62f59851c72aafe95773b6b2aa3c1d30f77950288eaee86605c66ce1 CVE-2022-42387,0,0,7a2cc87606161cd5381961a7c8ad1089b3150bf153a76b864a901292af641b48,2024-11-27T20:11:45.410000 CVE-2022-42388,0,0,25d7feadfc759f43de93d93f58e13ec14388c4948bccceaf8f071e59685ba653,2024-11-27T20:11:45.410000 CVE-2022-42389,0,0,5f816fdffee14014a16f529d19d17bd9e9d90a04f1047e3a1b9f025baf850cf1,2024-11-27T20:11:45.410000 -CVE-2022-4239,0,0,1f67b22263b3abfbe177f1e0f84295e91bd630fd8e47a79f9c29043be8f1a3c8,2024-11-21T07:34:51.060000 +CVE-2022-4239,0,1,db48a5c06635ab01e7855f23f366f8759d1730963944906f2de241194143c030,2025-04-14T14:15:23.100000 CVE-2022-42390,0,0,a864f65e195bf8d49d9f4a867bea1803ee1743f7a74b4aa13a98a83dd08833b9,2024-11-27T20:11:45.410000 CVE-2022-42391,0,0,d3d766231df3ed16b759983fbf73b1076251be23f66d70838ee522ec74ea90fa,2024-11-27T20:11:45.410000 CVE-2022-42392,0,0,94bb4ab970ae9e35e1514dfd6c3128ee8be0e8e7c4b6df30817107211fdea842,2024-11-27T20:11:45.410000 @@ -208472,7 +208472,7 @@ CVE-2022-42416,0,0,626ba49d9186a77a6b534e51939f366ee08382838f630b45c5fbe92f0214e CVE-2022-42417,0,0,4b8bf2301eaf12c8a08c897c247b72653690a2d5a407d90643243465f951480b,2024-11-27T20:11:45.410000 CVE-2022-42418,0,0,285a7d56355c74d5d1ec1b822a6ec8a682d05e41a8b26fc8fa782273582cc677,2024-11-27T20:11:45.410000 CVE-2022-42419,0,0,cdf59c004bb5c6fe61a23720b935dbce778eb41f36b74f324bf49475de3cf380,2024-11-27T20:11:45.410000 -CVE-2022-4242,0,0,1e1c4d3dc2fcfa2f7c1a0a379d3ae0a0598a9b70b2a8ef5ea746558fa59eba35,2024-11-21T07:34:51.290000 +CVE-2022-4242,0,1,3e74c09023913ebe4a8b698cf2d2e87fe22b0619a0f272cdabc63618f726fd4b,2025-04-14T14:15:23.247000 CVE-2022-42420,0,0,bd9595004ca71495accaa4ea608616a3c053633929c2c096ed5426af2b5d9d75,2024-11-27T20:11:45.410000 CVE-2022-42421,0,0,5c5412b050543e16bed109cae37159461d471c62e47773189004f8452820895b,2024-11-27T20:11:45.410000 CVE-2022-42423,0,0,e40f5c4ce77c38a09d7bbf9388d86f717f7bdc8cb40a0a2e0049922d709ed7e9,2024-11-27T20:11:45.410000 @@ -208603,9 +208603,9 @@ CVE-2022-4261,0,0,f3ea8fa04a826c810d7c11a81d1a2eb57dc66ca87dd7fa34d25ba3d72ca659 CVE-2022-4262,0,0,3f46ff2abe5e3a6b173bc24940053d39599d67a394f29911490dc411d2a895fd,2025-02-19T19:39:42.963000 CVE-2022-4264,0,0,6e9c9191bcb2e4227a9683fd2ad7545762b7af98bacbcf085a177a7b291032dc,2024-11-21T07:34:54.050000 CVE-2022-4265,0,0,8b357a7011cd27505cd0ba7f0b4aec702727c845cd20fec392b57cdb6696670b,2025-03-06T16:15:39.280000 -CVE-2022-4266,0,0,e93286bb1d277696fa139681d8d5b6a89c7a738e871d31529d0a1ed21cc63007,2024-11-21T07:34:54.307000 -CVE-2022-4267,0,0,49b1995577721f848edd800036b41f8cb432ceecbfc076e67b6aa8a1394a170e,2024-11-21T07:34:54.420000 -CVE-2022-4268,0,0,3035ab9381654c059b335789faac47f434be3715828f3135b4a7ef2721562826,2024-11-21T07:34:54.530000 +CVE-2022-4266,0,1,71e21b7c1fbc27bd76a8a9dbf480e6f49f978fe838017e83bb2089d740ff53bb,2025-04-14T14:15:23.407000 +CVE-2022-4267,0,1,5b5b888ff4c23c35faaf93a4a1ba2acd0c900c62067218605d86adc0e723daae,2025-04-14T15:15:23.240000 +CVE-2022-4268,0,1,455523bd1e5f3baa79bf61756cbb9d448ba35f3faf4836b62d93ae7d22693dde,2025-04-14T15:15:23.423000 CVE-2022-4269,0,0,9df952c8ef43f102c30a89ef66bb51d9dc7606e78f74e40303b2682a0f4d6cb8,2024-11-21T07:34:54.643000 CVE-2022-42698,0,0,041fe502147bbed62c1718cca402bce2022efa54087bc0796befc6b89c7fdbac,2024-11-21T07:25:10.733000 CVE-2022-42699,0,0,eded6b867ee0fc28eb81d333cb675abc695633534b9159942ba29f1a4b77bc8c,2024-11-21T07:25:10.857000 @@ -210586,19 +210586,19 @@ CVE-2022-4542,0,0,1e8daab49fb467c0edc9286efcd4cbc9b024e0d6f613c2ff20ca5238d9ed32 CVE-2022-45420,0,0,6bc3bebb0742881684eb3b131dc39819aedd5b50d45fbaa55109d109dd71a106,2024-11-21T07:29:13.703000 CVE-2022-45421,0,0,2f6974415a5b53e06eadfac3a9bb3689b0c9ae62b562617f27ed557ddba58b08,2024-11-21T07:29:13.803000 CVE-2022-45422,0,0,1b36c85fe2672583a3ef0eda64ee1cd537bbee4b3a3cd5639f8e7b843dc1fbf9,2024-11-21T07:29:13.907000 -CVE-2022-45423,0,1,1f033df1fc4960b99357cb040b9af81355eeabbedd198749f65aa65f3ad0d51f,2025-04-14T13:15:15.970000 -CVE-2022-45424,0,0,edc0633f5c4f97a85a56ce4f2da90f0955913a45cf6b1ef6180f1efb13b5fd98,2024-11-21T07:29:14.120000 -CVE-2022-45425,0,0,43c52e2f7acff172cc265310f731df1226c0260291bee542448490610103160c,2024-11-21T07:29:14.227000 -CVE-2022-45426,0,0,2d4ab6865b03625f85f3c4b2f1712e2df45e659f11d9b421515a08b954b0f3ec,2024-11-21T07:29:14.330000 -CVE-2022-45427,0,0,835476620aec109e2a89e5f969eee4a817957776f030aaa6e0f567e525239d46,2024-11-21T07:29:14.437000 -CVE-2022-45428,0,0,106cc04b757d402637babdc730850f739b6ebeb14d6c0ab86fb4c8e9a7047bd6,2024-11-21T07:29:14.540000 +CVE-2022-45423,0,0,1f033df1fc4960b99357cb040b9af81355eeabbedd198749f65aa65f3ad0d51f,2025-04-14T13:15:15.970000 +CVE-2022-45424,0,1,2c9d05b22d8c4b9c1e6d273139d88262e63599a434074936adacad9cb44fafe0,2025-04-14T14:15:20.313000 +CVE-2022-45425,0,1,520990494cde392487585b2b2277647d9ae6ee50312a99a0315937862c6404ea,2025-04-14T14:15:20.493000 +CVE-2022-45426,0,1,266ecdc1d8a68c696975ee2102a1715443c5750bfc350910b7f31d3cd4baac75,2025-04-14T14:15:20.653000 +CVE-2022-45427,0,1,44de3c9295020c4867499c5bf2d89b726e5810392769a08d01ffc775ee21b7ba,2025-04-14T14:15:20.827000 +CVE-2022-45428,0,1,6947a7560471da3fc489a094f9efb85a7be488403cf1aad75e52964fd6c8916f,2025-04-14T14:15:20.990000 CVE-2022-45429,0,0,9c1dcef02e610bca31e4751870d1350f16242d9942209e5d40505e30f9cbdb83,2025-04-12T00:15:16.660000 CVE-2022-4543,0,0,5e1620f85447ab8dbd56e515f0ba76ca9acefe3aa9f4b86757f468bbb8bd251a,2025-04-08T20:15:18.790000 CVE-2022-45430,0,0,c9393f2d8b36f397ba79e0cc67130d45b46470364fe3a560d272e5f98aa642c9,2025-04-11T23:15:27.287000 CVE-2022-45431,0,0,9e67a906a9ff0852af82d0202e976a6fa5c8a9e118cc082216adc7d642c1ae81,2025-04-11T23:15:27.477000 -CVE-2022-45432,0,0,d97baa8664ca85e25892ee145ed23c2b677e3ebc29a31df6396761ef223ec532,2024-11-21T07:29:14.990000 -CVE-2022-45433,0,0,de7d3303b7c9c21890b217e002752a534a26edebec6e97cec0e228c99a967026,2024-11-21T07:29:15.093000 -CVE-2022-45434,0,1,a80cfc89a33ca4f88c164fad761fc7385951c2b97426fa24a63c968ab6b2da8a,2025-04-14T13:15:16.190000 +CVE-2022-45432,0,1,fbeb8c0396de1605e802af35316dcbd00569f19edf82a5f36b76fe70cc7e0b19,2025-04-14T14:15:21.160000 +CVE-2022-45433,0,1,5a610d94aad1a3e1956b4b4b1f70dfed91a3a64deada2940768c8b87554b985a,2025-04-14T14:15:21.313000 +CVE-2022-45434,0,0,a80cfc89a33ca4f88c164fad761fc7385951c2b97426fa24a63c968ab6b2da8a,2025-04-14T13:15:16.190000 CVE-2022-45435,0,0,2ae9f9d4909880487916f70222e3ae5d59947fc0b9311c5c53536eab473efaeb,2024-11-21T07:29:15.307000 CVE-2022-45436,0,0,26478b4b3221d62b5a88c2cfb3350a1361d84d348bc36416cf7023808d336b1d,2024-11-21T07:29:15.450000 CVE-2022-45437,0,0,37f67dea4683e962f10bf4a33833df214a4a8ed4981967791f260672153c1514,2024-11-21T07:29:15.567000 @@ -210823,7 +210823,7 @@ CVE-2022-45769,0,0,1e8f47f2d9403072669e2f933abb158f13fef15333df9238a51a36c60ca74 CVE-2022-4577,0,0,0ee64bdcd89d460efc049aed42aba77caafdf317c23948db93ad4449cf4198e2,2025-03-26T14:15:25.800000 CVE-2022-45770,0,0,8c5a7a8c2aa10a10529c3afa32edfc0cf29620d9a30ac85ce666d9550489805b,2025-03-31T19:15:39.220000 CVE-2022-45771,0,0,187d8b7379b23beda0c4ec7f844878da04db33c0b9e71fb3308e9216031fa00e,2024-11-21T07:29:41.360000 -CVE-2022-45778,0,1,6159fac87db910c3b1f8c869345f93b58cbbe64d8c203399095add77bb3fff22,2025-04-14T13:15:16.370000 +CVE-2022-45778,0,0,6159fac87db910c3b1f8c869345f93b58cbbe64d8c203399095add77bb3fff22,2025-04-14T13:15:16.370000 CVE-2022-4578,0,0,0091dbfe61807d3d6222e763f755507c6258d0b757f211c729d481eaf768318b,2025-04-08T20:15:18.993000 CVE-2022-45781,0,0,af5875681fe2ee1d5531c6d8ee1f3bdb8a6d138970efb5e8ab0f5142c741d481,2024-11-21T07:29:41.657000 CVE-2022-45782,0,0,a59b27b99382bd10a76e661b4fe5742a9cc6b713ba3a1c1b65c94ef76a444b06,2025-03-27T17:15:37.873000 @@ -228905,7 +228905,7 @@ CVE-2023-36234,0,0,371f1a9fe6d1b1dc16b9d1ea10ea114e7eb692627ec7f646d52589df5fbb3 CVE-2023-36235,0,0,56fa8a6f0b0f2b4f0219461a84aee903f6020ec4f89b7326ea4f56a42f7e81c5,2024-11-21T08:09:26.153000 CVE-2023-36236,0,0,ed892a5be5cd89045bf58519030585ee3526284778a1f01ad439665801e2d638,2024-11-21T08:09:26.313000 CVE-2023-36237,0,0,66f4fa284ac8cd77d5adf7806a99441b2c7c7fb7455a5b3f41d46f4424732243,2025-04-11T20:20:35.777000 -CVE-2023-36238,0,1,74d82b6db1d7c339bcbf92fb4d805a86745b3c5d31c3da1e2ecff2f0a20d7720,2025-04-14T13:13:25.427000 +CVE-2023-36238,0,0,74d82b6db1d7c339bcbf92fb4d805a86745b3c5d31c3da1e2ecff2f0a20d7720,2025-04-14T13:13:25.427000 CVE-2023-36239,0,0,f9d13b68c05b1055dba1062750873e061858f8074fa25ddf4d3138bb3886ad07,2024-11-21T08:09:26.837000 CVE-2023-3624,0,0,2025944c7157b8cf2d838f068ccc1caf2355db6b7eabc04395d11fb3bbfef051,2024-11-21T08:17:41.887000 CVE-2023-36243,0,0,2cf7f1307f09ea5aae10578d1b5ffd1b192d31d2c4846725f9e1202b3aec6be5,2024-11-21T08:09:26.983000 @@ -232240,13 +232240,13 @@ CVE-2023-40271,0,0,58b9e500b3335459e48d9510a81748248f4fb7e2ae6d2e1a1cced5bcefe13 CVE-2023-40272,0,0,18cd605c11e8b3c7f961e42afabc4389f379b038b590089aba46a1b532aad88f,2025-02-13T17:17:01.100000 CVE-2023-40273,0,0,9df40b02a274398d63e1d1e22319cdf26c00e3d6db49eb05f13f3cf140404356,2024-11-21T08:19:06.063000 CVE-2023-40274,0,0,0cc73049c8d9956251fb71d685c3599e0bc3145d4e28751af9e28a2734bce6ad,2024-11-21T08:19:06.283000 -CVE-2023-40275,0,1,86aa2f13ba2e84ce3bb0236d893968b737ba0a601e20562abfbefcfd8d0eeca8,2025-04-14T13:39:18.027000 -CVE-2023-40276,0,1,3c3edfd152174ebedaa606f3fd74f5c1660806ef086f5d4c7dd11b3816c10eee,2025-04-14T13:39:36.927000 -CVE-2023-40277,0,1,7d3440be5db651dcc92463d4b7308fc7bca1b2eb986121518252a16a93c482df,2025-04-14T13:39:46.240000 -CVE-2023-40278,0,1,e9a2f29d65003b33f6d3e112345cda85759b80a12d3db4904cbe7afa5ee29b8d,2025-04-14T13:40:03.483000 -CVE-2023-40279,0,1,2f4a387ce34f90122d4e647f327a14b7a882fd41f084afbb139e794fe6f603c0,2025-04-14T13:40:11.207000 +CVE-2023-40275,0,0,86aa2f13ba2e84ce3bb0236d893968b737ba0a601e20562abfbefcfd8d0eeca8,2025-04-14T13:39:18.027000 +CVE-2023-40276,0,0,3c3edfd152174ebedaa606f3fd74f5c1660806ef086f5d4c7dd11b3816c10eee,2025-04-14T13:39:36.927000 +CVE-2023-40277,0,0,7d3440be5db651dcc92463d4b7308fc7bca1b2eb986121518252a16a93c482df,2025-04-14T13:39:46.240000 +CVE-2023-40278,0,0,e9a2f29d65003b33f6d3e112345cda85759b80a12d3db4904cbe7afa5ee29b8d,2025-04-14T13:40:03.483000 +CVE-2023-40279,0,0,2f4a387ce34f90122d4e647f327a14b7a882fd41f084afbb139e794fe6f603c0,2025-04-14T13:40:11.207000 CVE-2023-4028,0,0,e371668464f4c8eae1d569b0c0c0d47a37ec5ee2caea789c23ca7173cb18770b,2024-11-21T08:34:15.500000 -CVE-2023-40280,0,1,c45cf50ab63830f7a9f75e4a63fafae07d7eaa4f6f787d86e26989914d6bb95d,2025-04-14T13:39:52.433000 +CVE-2023-40280,0,0,c45cf50ab63830f7a9f75e4a63fafae07d7eaa4f6f787d86e26989914d6bb95d,2025-04-14T13:39:52.433000 CVE-2023-40281,0,0,2b1967fd2299129e7658c6dec283a26e1de7f1934f9fe51581bfcd4cbbb260c2,2024-11-21T08:19:07.793000 CVE-2023-40282,0,0,3495f927d5ad5272c9834124fb4964646ea624e090ac7c537b5897b79aa7b7d5,2024-11-21T08:19:07.933000 CVE-2023-40283,0,0,681b338db73ee5f9575775387f2ee47d603b6b3e45e461e477a0a32424a04c44,2024-11-21T08:19:08.070000 @@ -233278,9 +233278,9 @@ CVE-2023-41603,0,0,8eb478987d245c7b6de074e010ebd6030297e2591a61a5f824ceb1790257c CVE-2023-41605,0,0,c09977e342b3399cb054a02d7c15a161158f613f02f666ee1f6dfa3b4009a9cb,2023-11-07T04:21:00.217000 CVE-2023-41609,0,0,3747e1ed83937126e5396342cc162e4eef8bb929a03669760aca4d758f928cf1,2024-11-21T08:21:20.847000 CVE-2023-4161,0,0,88c3198491b8220b9dce01db5627b327e6a34ffa8751aa701863f06bc73cd321,2024-11-21T08:34:30.910000 -CVE-2023-41610,0,0,6e76b61007de26ae71dac437b86b42c88eeee65f10c284eebe643af79a2b80c1,2024-09-20T12:30:17.483000 -CVE-2023-41611,0,0,74963956407eb35aa13e3c0f640119fe79c81f43d1b7fd5fa52bc09b6ef17a8d,2024-11-21T17:15:07.103000 -CVE-2023-41612,0,0,264244d3f45dd0ec9a7a549051b5e6b945dbf01e3ff6f7f4cee240bb195a799a,2024-09-20T14:35:07.740000 +CVE-2023-41610,0,1,91b6a7f6b800275c49e7443593c30969c6ee96bbbc13c5ca329b5ba2ac52bf1b,2025-04-14T15:09:27.940000 +CVE-2023-41611,0,1,56d024ca5c5240ee5c9d59a37d95bd5f40dfaa83e4dece7eb7d173451944dbfe,2025-04-14T15:09:32.227000 +CVE-2023-41612,0,1,558127d04059da34d1476d1d8d8bb7635c79a49151beb7421556c71c6c3ba7ef,2025-04-14T15:09:35.363000 CVE-2023-41613,0,0,895d3b8d870a02d436a0e175df2b876b67cf27da6f6fef86b05455e19589b329,2024-11-21T08:21:21.527000 CVE-2023-41614,0,0,473f0868afe256b12bdb6706cd6bcf83da7008cd75b2c4f092cdc42965ccc911,2024-11-21T08:21:21.673000 CVE-2023-41615,0,0,5c740539020a533e0f45c6f5a4c4f60eb637c281d3a7c4fe6f84e11ca55e056c,2024-11-21T08:21:21.823000 @@ -239067,8 +239067,8 @@ CVE-2023-49508,0,0,a06f67b805f448f282f17a49613360ae1ef3e331d48eb4a72cdc35f393273 CVE-2023-4951,0,0,1bbc4959ac980f797457caaf60413d1bbf7dabd5bc8076002f966e17295d986f,2024-11-21T08:36:20.073000 CVE-2023-49515,0,0,a4c0f2e305f9bd09bbc07b299160e9ee82b974a0de89b6dbf4caf99ad0f89a33,2024-11-21T08:33:29.953000 CVE-2023-49528,0,0,ae59a6a1bbac46ad56a1a54c31382ae08b7998b27d77cdcde165b61ff049b910,2024-11-21T08:33:30.187000 -CVE-2023-49539,0,1,6c1a1c576d32ef46d5e4268335e72acb623b3fb07800faa6d6779ff5f8b6d865,2025-04-14T13:03:09.210000 -CVE-2023-49540,0,1,f48df38fc2cc2401a7c459c3ce7d9fc5cdd2304594218c5a375b797b03c07892,2025-04-14T13:03:20.370000 +CVE-2023-49539,0,0,6c1a1c576d32ef46d5e4268335e72acb623b3fb07800faa6d6779ff5f8b6d865,2025-04-14T13:03:09.210000 +CVE-2023-49540,0,0,f48df38fc2cc2401a7c459c3ce7d9fc5cdd2304594218c5a375b797b03c07892,2025-04-14T13:03:20.370000 CVE-2023-49543,0,0,fa8051b8098d156d6e67409c2f03a6fbf1ec445cc35240b3209d3f41a86c13ec,2024-11-21T08:33:30.863000 CVE-2023-49544,0,0,0301b7ebbb7307dcf91d87a01cd77032d46e6521bb077908d4fae3d5f9e2e193,2025-03-28T14:26:54.410000 CVE-2023-49545,0,0,47f3429e08f2c293fa1cc12b36624cb4d5f68d2ea9bef0685b799dd88a7d2b5b,2025-03-28T14:33:00.380000 @@ -239419,8 +239419,8 @@ CVE-2023-49984,0,0,8fde47656eaf23c1499783ecedf1880bc620212ebe787cb9504bc990dcf37 CVE-2023-49985,0,0,00e4511d313543a6f453aec7234ac951f249152a4d8538234e5e9f2fdf42c41d,2024-11-21T08:34:09.813000 CVE-2023-49986,0,0,2c447334fcc7b21c1634d5c903e312dc3dfab899b5f0c890ee24c364722e4826,2024-11-21T08:34:10.023000 CVE-2023-49987,0,0,b4e109e2508280ce944041d4910bd65d47d15ff58e2c03f58540ccf627f98faf,2024-12-05T20:15:20.770000 -CVE-2023-49988,0,1,597893455b19d1c3e3b397b7740cd82475f4cb26d139386412956cfbcb07815d,2025-04-14T13:10:56.490000 -CVE-2023-49989,0,1,77680336326ffda28b2242753eb0310c502d25c97ff1b17de007db09068bf2e4,2025-04-14T13:10:59.897000 +CVE-2023-49988,0,0,597893455b19d1c3e3b397b7740cd82475f4cb26d139386412956cfbcb07815d,2025-04-14T13:10:56.490000 +CVE-2023-49989,0,0,77680336326ffda28b2242753eb0310c502d25c97ff1b17de007db09068bf2e4,2025-04-14T13:10:59.897000 CVE-2023-4999,0,0,7e4a5a98874b3ec521ba696176f47c2ee08de90ad71124ef23b399a1dc93396e,2024-11-21T08:36:25.917000 CVE-2023-49990,0,0,852a1856dce9ded9ee777580b2a74b219da66ee05f1c7eb98b00dcb53bb32cb4,2024-11-21T08:34:10.780000 CVE-2023-49991,0,0,c2e0cd59db38ba698a2da6cb7cd66c4213aa234957dcab1572321e606eeb2d82,2024-11-21T08:34:11.013000 @@ -244564,11 +244564,11 @@ CVE-2024-10082,0,0,06415cdb965ac64636892c496f9de214d59f82f169c648183613af8a98253 CVE-2024-10083,0,0,38e5dd874f867621565e43b60ceb8e1f354d946ee13dde203b48c3daa671568c,2025-02-13T06:15:19.210000 CVE-2024-10084,0,0,aa7524ac6f9ff0a4b9d5665381cefd3535aab2cd20f5b5573266707557de2a8a,2024-11-06T18:17:17.287000 CVE-2024-10086,0,0,c34575f938553fa7d7ae7ba88022934e50d186981e616c6c9f4320956c07bcc0,2025-01-10T13:15:08.623000 -CVE-2024-10087,1,1,71c0c6a4cc8c5ae52f6ea075f9e42c1a2436f772ada03c984452ac81b7787544,2025-04-14T12:15:13.630000 -CVE-2024-10088,1,1,235cdc7e824dbe58e3948767a9b8a81892796714177812d3621435cbf73ad32b,2025-04-14T12:15:14.263000 -CVE-2024-10089,1,1,b01960cc7b07a01283c4648adf3043e21d40016220e6339da998fb1dc6aed6f8,2025-04-14T12:15:14.403000 +CVE-2024-10087,0,0,71c0c6a4cc8c5ae52f6ea075f9e42c1a2436f772ada03c984452ac81b7787544,2025-04-14T12:15:13.630000 +CVE-2024-10088,0,0,235cdc7e824dbe58e3948767a9b8a81892796714177812d3621435cbf73ad32b,2025-04-14T12:15:14.263000 +CVE-2024-10089,0,0,b01960cc7b07a01283c4648adf3043e21d40016220e6339da998fb1dc6aed6f8,2025-04-14T12:15:14.403000 CVE-2024-1009,0,0,7f10991a2aedcbb0eeb168a4df9621d13325fa39adae509b0e5c1de61defa9f2,2024-11-21T08:49:35.077000 -CVE-2024-10090,1,1,07ef75d1cf01336c5230d96f22292b24065836f9bc7b16d69c0c4b6664ae4b6a,2025-04-14T12:15:14.533000 +CVE-2024-10090,0,0,07ef75d1cf01336c5230d96f22292b24065836f9bc7b16d69c0c4b6664ae4b6a,2025-04-14T12:15:14.533000 CVE-2024-10091,0,0,6e7587c6e48a4895e0398f4ef5a128ee8ab9d12529d1ec8cebe459ac4ee7d408,2025-01-16T21:48:55.983000 CVE-2024-10092,0,0,3187158205da52d65b1fd5fde676bfb3bfd6fed14de72d76a8aab9b275f77138,2024-10-28T13:58:09.230000 CVE-2024-10093,0,0,0b4f7b1e1ef181948292cdf0451d434c8b0b600a4a601aafca87364e5f264510,2024-11-01T18:07:07.003000 @@ -246415,7 +246415,7 @@ CVE-2024-11912,0,0,0aaa3071f593c52d1aa93372da39c5543ab6e6ea5c65e9bf469d02aec4ea5 CVE-2024-11913,0,0,dd7d1aef6bd9b33c5cbc226bd6c46c9362be3e1f9ee0d5457fc9f3944230baf1,2025-02-04T19:40:29.057000 CVE-2024-11914,0,0,fa4ae25ac8caf18cb116501f16c4447bae56afeb864dc904882202ad6cc9632f,2024-12-12T04:15:06.983000 CVE-2024-11915,0,0,28ea0a161b7eefe74ada087940b67270e2ec51b6fcf1def4945f57e6c8ae681f,2025-01-11T08:15:24.680000 -CVE-2024-11916,0,1,772212fec6b655643f1c957d90058c2fa42ec3e452d3898107b79ded42b35191,2025-04-14T12:27:30.293000 +CVE-2024-11916,0,0,772212fec6b655643f1c957d90058c2fa42ec3e452d3898107b79ded42b35191,2025-04-14T12:27:30.293000 CVE-2024-11918,0,0,f7031582b21494aaa2ccab4dd4ab92d52bf9f67c1445d9fb72b363b717cfc06b,2024-11-28T06:15:08.347000 CVE-2024-1192,0,0,5063d16699b3db058d0f99170ded601d82fcfc6f39ec66d01e8a7cebfd42903d,2025-01-08T14:35:22.633000 CVE-2024-11921,0,0,8d14fd5ac89466ae906ad741ca0367246b772d6837be889940ee25bf6694b61d,2024-12-27T19:15:07.850000 @@ -248074,8 +248074,8 @@ CVE-2024-13593,0,0,fa3fece164aaf9e5bdce4149920be38daaf35514256e02e0d8ee1f95b69ca CVE-2024-13594,0,0,e40694f60357c551d50cfd64c32b62fc5a068d57b870210e0ac9e99e736df254,2025-02-05T17:01:24.577000 CVE-2024-13595,0,0,0af37cc42779bfca530d3961d770211d9305aca9c7ecdc98a5bd6399b4365465,2025-02-21T18:11:08.257000 CVE-2024-13596,0,0,2b347cb4a79836e676774e7c831f562b3de9868f3b716c19ca500dd58b6901ef,2025-01-31T18:16:35.347000 -CVE-2024-13597,1,1,c7afe6c583c5e3f8a439b85611e5f080736bc12b425104080b194b5bf1f63856,2025-04-14T12:15:14.680000 -CVE-2024-13598,1,1,df38164bf11eb46c469bd4a7e7ff141c78e96af8b8009cbd30cbcea543de7a86,2025-04-14T12:15:14.820000 +CVE-2024-13597,0,0,c7afe6c583c5e3f8a439b85611e5f080736bc12b425104080b194b5bf1f63856,2025-04-14T12:15:14.680000 +CVE-2024-13598,0,0,df38164bf11eb46c469bd4a7e7ff141c78e96af8b8009cbd30cbcea543de7a86,2025-04-14T12:15:14.820000 CVE-2024-13599,0,0,03405f2c3d79b505fbb84b1ff3dea79fdc81e050ef9a41f4a5537eddbfaf081d,2025-02-04T18:13:20.930000 CVE-2024-1360,0,0,d34fec545a10bf09bb924f3a0696da0f2401b54143d8aefeb9f97ea01bb8486a,2025-02-05T21:46:19.363000 CVE-2024-13600,0,0,484c9129acb282fae32ab7c653ddfde69cea1c6dd837845606bbf7ace7ea91d5,2025-02-24T15:56:30.290000 @@ -249822,7 +249822,7 @@ CVE-2024-21006,0,0,73a570c2332058f2ba08d00357f100a4f04623cd6f33cd57f864b0294d57e CVE-2024-21007,0,0,19d4839f8c0c4494be18be45f38a468212164a7bf22822a55cd6a6c1093f0744,2024-11-21T08:53:36.427000 CVE-2024-21008,0,0,8a4545d06255aeb1f38036d10f78cd22c760a05cf6c6be0c80410804de7018ae,2025-03-25T20:15:20.990000 CVE-2024-21009,0,0,af812c5e8a84169cfec251c1e067fa25e23db6feadfa3217596d3dc669751ab0,2024-11-27T16:35:46.023000 -CVE-2024-2101,0,1,a358f7168d130974f4190b7da105af65b1ff4dbfb8e39fac60435b5bba0beca7,2025-04-14T13:42:18.963000 +CVE-2024-2101,0,0,a358f7168d130974f4190b7da105af65b1ff4dbfb8e39fac60435b5bba0beca7,2025-04-14T13:42:18.963000 CVE-2024-21010,0,0,4f1bf3e5f2036cd1d144f515ae0f7514a4c2c0d6c398c815cc074467d568ec1d,2025-03-17T15:15:40.073000 CVE-2024-21011,0,0,a46e5658273d6319443d01f0663a109447cc17df5651b379924f885eeb02f952,2024-11-21T21:15:17.520000 CVE-2024-21012,0,0,523d04602536c0847fc672427eb68c0722abf701b6bdd6d27ce8bd72e6d2a964,2024-11-21T08:53:37.010000 @@ -249833,7 +249833,7 @@ CVE-2024-21016,0,0,5808b3cf4e0616bce1a906c6dd1c87833f90a139f4b6ed66e3a1f9a1d2789 CVE-2024-21017,0,0,131bf7f6dcdaf45e79638fd18bc21cd4d8e6d2da854ef4a48ac6c2918cc2b8e3,2024-11-27T16:31:43.653000 CVE-2024-21018,0,0,2add56c9bed955dd9dbe226644a2ccf91080602d335e0becef126ed57d7f9f76,2025-03-28T19:15:18.203000 CVE-2024-21019,0,0,b2175ecd2ee6a3b54aae54fa47e497761b9da4d1466cb5747da93be14886c6fa,2024-11-27T16:31:28.057000 -CVE-2024-2102,0,1,539afff3436d952186a99ba63eb80aacefb0f490b7eaea70803962b563fe50c2,2025-04-14T13:42:32.573000 +CVE-2024-2102,0,0,539afff3436d952186a99ba63eb80aacefb0f490b7eaea70803962b563fe50c2,2025-04-14T13:42:32.573000 CVE-2024-21020,0,0,d2eba680681e2fb7dc0796be2a1eefbc54d49352eb0caaf782f2abaeada58acc,2025-03-28T19:15:18.377000 CVE-2024-21021,0,0,2185d0d9520bd9b965c7a9cb524371ed61832acc89af4ea8ab1712e50d98fd1f,2025-04-10T17:41:30.303000 CVE-2024-21022,0,0,2f78adf409a130aaedfee1e6621bd5e964d4399619a87627dfa8a21677f34e6d,2024-11-27T16:31:22.270000 @@ -252434,7 +252434,7 @@ CVE-2024-24276,0,0,7bffcccdaa3ffe4fc240b27bb8a64ead8af378a61a210ff0bd0560962909d CVE-2024-24278,0,0,62e4079d8511e44535a226dec446bd678ad9a0c3d8dc7ab8542623f0eb72e8b1,2024-11-21T08:59:06.080000 CVE-2024-24279,0,0,3c4f04c26cb85f0333fe6d1f13856ff9faa25dcc02100f20c125ebce26e32793,2024-11-21T08:59:06.313000 CVE-2024-2428,0,0,2471580c23f3bb37c64f9417f5557d913d5acf37363d1d2bcff51f8dd06d13f6,2024-11-21T09:09:44.007000 -CVE-2024-2429,0,0,fee63be4b07f189971f436b1794c1958a2c757baa72dec725e309a968146300f,2024-11-21T09:09:44.177000 +CVE-2024-2429,0,1,a767c64c9199e3b93bb6544b0a221d84a3530a93ca6dacf59a3d5c5e43f266b8,2025-04-14T14:18:25.260000 CVE-2024-24291,0,0,a5675aa0c8613cb299e95ab4766425189a0597594fcb674b552846121823ab0a,2024-11-21T08:59:06.530000 CVE-2024-24292,0,0,24d26482dd4cf28e7909826ec5dd6c0412cd365d7a700db8f9ea37581123b8e1,2025-04-01T20:26:30.593000 CVE-2024-24293,0,0,0014a75b9ac9329b36ec7351b9f343123fc5dc5be6a7d2f346e3b9ab2354f1a6,2024-11-21T08:59:06.687000 @@ -252483,7 +252483,7 @@ CVE-2024-2438,0,0,9df80e59305d069e4c0bafdf7501833f48e0be776a335419dde3462ed16ce9 CVE-2024-24386,0,0,dbf74fd10c547c8cbf3809c05783d8ff93602c40d0c6a081660b110834e3bf8c,2024-11-21T08:59:13.463000 CVE-2024-24388,0,0,6f376eff214f4516d6e0ec88f3f524e9e4f4b0ac369baf5c6f6e0100e4db6ef5,2024-11-21T08:59:13.680000 CVE-2024-24389,0,0,2d7ff37174d9dbb9492b1a442673e426580708c5a1303fb8d0266900f0ba1dba,2025-03-27T21:15:46.297000 -CVE-2024-2439,0,0,d1fad6e7bdf8a2f0da2dd4fdcb6e5b6086efbf3875d2d0046ca8ca2917039251,2025-03-29T00:15:21.110000 +CVE-2024-2439,0,1,0f8039336127c52c54ab5acd7c47352bf568be3c16c9d5d6a53d62d569133673,2025-04-14T14:18:39.200000 CVE-2024-24393,0,0,48dfbe81842a64324199d0bfa1e284aff3b021c9ccffa6b60b0d1cc58917f1d4,2024-11-21T08:59:13.997000 CVE-2024-24396,0,0,3439b8f9d42f52499fc3498a2bdf9d27d33a987106aaad6527a13387ca9dd891,2024-11-21T08:59:14.147000 CVE-2024-24397,0,0,cb53e7a9b47449b4c481b77ea2c6b86ab0c11a3dbaddbbf98946c69ce71d4afa,2024-11-21T08:59:14.393000 @@ -252541,9 +252541,9 @@ CVE-2024-2447,0,0,a9884dd6a7a0a02108d34c15e3351a6cfbd0e02113055c2d6287dc13d51a0d CVE-2024-24470,0,0,47fd1c1a50408c5b0e57e417165d3fbba950a4f36c19cbd6c9271c32d7fee22f,2024-11-21T08:59:18.627000 CVE-2024-24474,0,0,0b1b7e57b878eae5549e8890b07cddd28800c45758a4136358af3f7a6d1df197,2024-11-21T08:59:18.777000 CVE-2024-24475,0,0,cc33da32b8386d85f2716db0b7573f224c2a2466da82581395da702e95a8ad4c,2024-02-21T01:15:07.890000 -CVE-2024-24476,0,1,3b385eac7b9c4531dffdc93c7b892f100e2077f94265cc6cc75529f9b42208a5,2025-04-14T12:55:24.843000 -CVE-2024-24478,0,1,1bf07a9f9f6b719f873ed1d7d680821687592b88aef36726555ad990736ba114,2025-04-14T12:54:51.287000 -CVE-2024-24479,0,1,00c51bc3ef9befb93a7215e0f148b4cec5347e9610f3520719c87b92ca7f2f89,2025-04-14T12:55:40.677000 +CVE-2024-24476,0,0,3b385eac7b9c4531dffdc93c7b892f100e2077f94265cc6cc75529f9b42208a5,2025-04-14T12:55:24.843000 +CVE-2024-24478,0,0,1bf07a9f9f6b719f873ed1d7d680821687592b88aef36726555ad990736ba114,2025-04-14T12:54:51.287000 +CVE-2024-24479,0,0,00c51bc3ef9befb93a7215e0f148b4cec5347e9610f3520719c87b92ca7f2f89,2025-04-14T12:55:40.677000 CVE-2024-2448,0,0,b72152a181016885656f49dc793056e8622b9a5f5c36acbb7ebb4ccedd62c703,2025-02-11T17:39:30.057000 CVE-2024-24482,0,0,12f9ca99fe14b8dda09119e5a9c90e05dba78cd2403be2772decceaf915ffd35,2024-11-21T08:59:19.703000 CVE-2024-24485,0,0,8b3bc69501fdccb37483d3dad8b2008e6c17d56923656298965f794c72758f89,2025-04-10T13:39:04.063000 @@ -253462,7 +253462,7 @@ CVE-2024-25753,0,0,17fbb56dca74222fc44ee3bc557ca03cea205099073dd46e4d1961ebf183d CVE-2024-25756,0,0,a4e3ba187f64c6cbdd53eff409e8c4ecbe41e683f588f15ecc50b2b987226d68,2025-03-13T19:34:21.237000 CVE-2024-2576,0,0,6c1a2c939b028c045e27ea71fa1f8a68daa3087e53e02af70dc23d0d313028ce,2025-02-20T18:09:56.283000 CVE-2024-25760,0,0,c45a46352a5d67e1141c582ed464c0b6537f04649b66b954625542797a253143,2024-02-27T15:15:07.820000 -CVE-2024-25763,0,1,1ee11d14e54b62476cdc4d172bca885caa11763571fa3fafaaf8261ab5f9c182,2025-04-14T12:57:05.680000 +CVE-2024-25763,0,0,1ee11d14e54b62476cdc4d172bca885caa11763571fa3fafaaf8261ab5f9c182,2025-04-14T12:57:05.680000 CVE-2024-25767,0,0,0ca78670771c5475ecaa5b22e5b07acd76b8ce6bcee60635d4c63930e9338774,2024-11-21T09:01:21.100000 CVE-2024-25768,0,0,ca5e5fafb79a5045a2f311eea8b17b095a90d33f4f213631285129e72bbe41c9,2024-11-21T09:01:21.313000 CVE-2024-2577,0,0,286b28f8f74e4fd6c9af808a627bcf8713dd013a7c38abef1161cefa09327595,2025-02-20T18:09:43.090000 @@ -255637,7 +255637,7 @@ CVE-2024-2835,0,0,62bcc62c6906463aa17228ea2ad0a174292add2a197994f5b85bf2a3ea04a2 CVE-2024-28353,0,0,014649d87e048e9f3d29b2d1e799d1333a335df7eaf966d43896aee958c86c12,2025-04-01T16:15:01.273000 CVE-2024-28354,0,0,8bd0dbe46dd1128f9708c199cd618802b592c1ec41f26633748d28c6793b9d49,2025-04-01T16:14:18.653000 CVE-2024-2836,0,0,062ef533be3bd936275761025982286a67d7adfcae19ad377ee383f80dfcc267,2024-11-21T09:10:38.530000 -CVE-2024-2837,0,0,591aee43363ee3867464c83018ed82d17a52d5b4c1c4a90e613f9574376d3859,2024-11-21T09:10:38.710000 +CVE-2024-2837,0,1,11403f6d062517ff97cc2397bf876c6e19fc49f6a0568b6bd343c55e3b183e22,2025-04-14T14:20:24.840000 CVE-2024-2838,0,0,fbefee485c39eaa2b52abb308d5a9c60de9a0582ee5439906156bd58879df732,2024-11-21T09:10:38.880000 CVE-2024-28383,0,0,c7dfc36988e292b8a4e9e108f95f30bfe33c4510737a93b8edb438a7bfd87e65,2025-03-13T19:36:35.840000 CVE-2024-28386,0,0,edeac53a83a8822b50d31d5b403af1a1addf4eb177afa9c4bbe5f0717fd0fe90,2024-11-21T09:06:14.300000 @@ -257437,7 +257437,7 @@ CVE-2024-3081,0,0,a14445c7a979f6aa591ff52890a0fc6ede71ae070aa04ef234776c592367ab CVE-2024-3082,0,0,6ef491da5f61eb445c102687ec9bb9fe7371b1b45e2376383bee2e022b96b566,2024-09-30T15:15:05.573000 CVE-2024-3083,0,0,cccc6733810fbf6686c0ea133ef2ddbccb971e5fd28144f1076f18955c8210b0,2024-09-30T14:15:03.317000 CVE-2024-3084,0,0,78e37833e4018c0451a2e57cecfa2983e7634d83093c960a91a3dd3908a13f09,2025-02-14T19:20:29.973000 -CVE-2024-30840,0,1,9ee285b1e484352f42abefcb7e406f31d8845e45977bb07cce2e854b4d60f4f1,2025-04-14T13:40:27.820000 +CVE-2024-30840,0,0,9ee285b1e484352f42abefcb7e406f31d8845e45977bb07cce2e854b4d60f4f1,2025-04-14T13:40:27.820000 CVE-2024-30845,0,0,f5a78f2b78cc6754305a4cdff00107f918404526649bb47c18c893e60776a029,2024-11-21T09:12:27.307000 CVE-2024-30848,0,0,e40c812aebcde1483034aafc18bd7358a624108bbd12a9c3e98f2c43927251d1,2024-11-21T09:12:27.530000 CVE-2024-30849,0,0,41bab1c02c7222db096edb20488f06d8338703ebeb64fa7e20c9e09b1cc9fc4a,2024-11-21T09:12:27.737000 @@ -258009,11 +258009,11 @@ CVE-2024-31525,0,0,b8d8ab4d6181e02f7a03e856bfebf33fc0b55b912e5b45755f0ccd69b64a7 CVE-2024-3153,0,0,9a2bcb2f051678e95973008adc0d482a6778734c6609a6f1cd9e743db5bc63a2,2024-11-21T09:29:00.963000 CVE-2024-3154,0,0,d0e11e707bf549d7b831b8b7a6558cfd09c514bb54bbe90790f96ca21395d852,2024-11-21T09:29:01.100000 CVE-2024-31544,0,0,9c017e58def3f600944b422d6190d5a13ec0fa5e7033195d3191c8cc1ac1b622,2025-04-11T14:56:38.257000 -CVE-2024-31545,0,1,10a1c7c70df1d52c5db5ddee48f75f62f74424ba01c2f2aa01c99ff126794532,2025-04-14T13:46:09.530000 -CVE-2024-31546,0,1,9d6a0a8376e62b7b1a58f019e3a837970799971d4052f69b3a26c4f5596e88b1,2025-04-14T13:45:18.260000 -CVE-2024-31547,0,1,7281435d931f1eb586053dbcee167fd1f219d7e151acc94c9404bccc80dad584,2025-04-14T13:45:51.980000 +CVE-2024-31545,0,0,10a1c7c70df1d52c5db5ddee48f75f62f74424ba01c2f2aa01c99ff126794532,2025-04-14T13:46:09.530000 +CVE-2024-31546,0,0,9d6a0a8376e62b7b1a58f019e3a837970799971d4052f69b3a26c4f5596e88b1,2025-04-14T13:45:18.260000 +CVE-2024-31547,0,0,7281435d931f1eb586053dbcee167fd1f219d7e151acc94c9404bccc80dad584,2025-04-14T13:45:51.980000 CVE-2024-3155,0,0,530e0855ee264eb0be51ab25d18dbbd4dfbb33e753eaf4b8134cd40d549d8471,2024-11-21T09:29:01.260000 -CVE-2024-31551,0,0,365ab77aab3eb86d7cb403828a3cc3a11b5418ca31493d1055d3df2a4541a0d8,2024-11-21T09:13:41.600000 +CVE-2024-31551,0,1,a3ca56724420d1aa035de907ee1ae2b84dfa606eff6b244543fd4e15932f93a2,2025-04-14T14:20:58.263000 CVE-2024-31552,0,0,914ead9815931e20ff2181154b06c32ef7a3d8a7fa339ea2db19cc8be42d3e29,2024-11-21T09:13:41.820000 CVE-2024-31556,0,0,96444529630c53112af8d950fb6f11b36a11f269e7a01ba1ecf9567edabc9909,2024-11-21T09:13:42.030000 CVE-2024-3156,0,0,407efcecf2ac3b4aa4d040b2e2ca127d98fd5076def79500a939cda11ce1ccf2,2024-11-21T09:29:01.403000 @@ -258431,8 +258431,8 @@ CVE-2024-32151,0,0,6ef8771c34640d7f13180ea9ea6a01f89209f8312db5eeac2c929f2573855 CVE-2024-32152,0,0,17251408a63ed517f0bdd7cd945d039fc818a169725454c1d9b534ef050e436b,2024-11-21T09:14:33.683000 CVE-2024-3216,0,0,1a66c657b2c05dec189fbd499b73aad44096e6f6bac1f349f7d19898fe5882ff,2025-02-11T16:31:21.577000 CVE-2024-32161,0,0,0dc190f3981d5e79cad9fecc2e2149a6a38211e289bd6db07e8bb128e6f7dd9b,2024-11-21T09:14:33.830000 -CVE-2024-32162,0,1,49a1080a66cfb15b07046e1f64a1c5472a37fc77adc083db591cf171e3385c57,2025-04-14T13:43:17.153000 -CVE-2024-32163,0,1,baef0d988f05813168516aac8ab7f415d223ea7551ec61622d6cd5771d4b42ad,2025-04-14T13:43:41.323000 +CVE-2024-32162,0,0,49a1080a66cfb15b07046e1f64a1c5472a37fc77adc083db591cf171e3385c57,2025-04-14T13:43:17.153000 +CVE-2024-32163,0,0,baef0d988f05813168516aac8ab7f415d223ea7551ec61622d6cd5771d4b42ad,2025-04-14T13:43:41.323000 CVE-2024-32166,0,0,30c74ce7f6bd4f849723a2691bcc599fbdb2bfc2e47c9bf3e7bf78a858bb3187,2024-11-21T09:14:34.507000 CVE-2024-32167,0,0,cb4f69058b5157952ca42b4b0dff18755b8866e500c0e1b176d4a09ec44841bc,2024-11-21T09:14:34.797000 CVE-2024-3217,0,0,6489e5216e63df8c00e811264de72ef6159728dccee24b60dc679b123dbf8257,2025-02-27T16:14:24.610000 @@ -258452,7 +258452,7 @@ CVE-2024-32229,0,0,1d4f889ca9079678836d30c226b4e93776fba7e81888461dc8750343cc237 CVE-2024-3223,0,0,8e7acace2f55ce6993a57e9091bfa8f8a1a4cee64bee3cc490425b03226e7528,2025-03-06T16:39:43.707000 CVE-2024-32230,0,0,e28e51470155b6141e18d3206d842725b0ba198262e901f564ec6439f16f995d,2025-03-14T17:15:45.373000 CVE-2024-32231,0,0,d1de02a20304f8a2541a989359910105e9a5fbaf303edcdd97dc7ff7c4722cb9,2024-11-22T21:15:17.970000 -CVE-2024-32236,0,1,0e0598b5c28fcdf80a081e98beb82250e0c5b3a1f0f421761b74e4891679a17a,2025-04-14T13:47:26.123000 +CVE-2024-32236,0,0,0e0598b5c28fcdf80a081e98beb82250e0c5b3a1f0f421761b74e4891679a17a,2025-04-14T13:47:26.123000 CVE-2024-32238,0,0,a12c22dc2403ba80ed1de919c44facc67baef0612fb0b9d0851801fd325df7b0,2024-11-21T09:14:37.450000 CVE-2024-3224,0,0,b2160c1117a02bce2e68c6d5ed1ac462d227650a3af09b0218f06e135ca9a8a2,2025-02-18T17:07:28.527000 CVE-2024-3225,0,0,d2280b4f4397ed919ababb1f8a3bebbaf399d055d788c2b595fbcd9f7f944f67,2025-02-18T17:08:27.630000 @@ -258534,7 +258534,7 @@ CVE-2024-32371,0,0,6dc2cf5c1b2afa9aff0fb85d7eb3862ac7c3c1783d125fc25effbc0b708fc CVE-2024-3238,0,0,d91f327ead14e98bdf51999876e5008a13a8f6f47c4ebaae0fa2e8417954dc74,2024-08-02T12:59:43.990000 CVE-2024-3239,0,0,4ef197b9b888868bb16b5cb0ab5540999094fc32f1c9976a37ebe11b7de77759,2024-11-21T09:29:13.223000 CVE-2024-32391,0,0,6489f4d64502591a2baaef704cc82ba623d6232098a381c36eb60e16633cd304,2024-11-21T09:14:51.507000 -CVE-2024-32392,0,1,330afcb85bc3b2e0ad48bdcfefc0946f06dfd671d9ada4abd359a61c88627b43,2025-04-14T13:49:29.703000 +CVE-2024-32392,0,0,330afcb85bc3b2e0ad48bdcfefc0946f06dfd671d9ada4abd359a61c88627b43,2025-04-14T13:49:29.703000 CVE-2024-32394,0,0,fcd63d75d4da407251404a1d2d08afc172eff51aa3e4e8bae9c2e181b13c6815,2024-11-22T16:15:22.317000 CVE-2024-32399,0,0,451fd8b2233e189ac161bb1115242ec61a34c2ccc4b6f8530cbfaeecf7c2697b,2024-11-21T09:14:52.160000 CVE-2024-3240,0,0,971173d54c1994d6b1cfc2e3e8433d0c58e5901156fde410070d2514a513396a,2024-11-21T09:29:13.397000 @@ -259356,8 +259356,8 @@ CVE-2024-3341,0,0,5476f9386f0a80dd72fe4811f5fbf715bd90901bcb1c4f5b6598a2223afd56 CVE-2024-33410,0,0,6da8183d7c8378ab4f409dd7c3edbbc7504ad43367d8c2822c9163a0a4d9bd97,2025-03-25T17:20:24.067000 CVE-2024-33411,0,0,c7fc1192b43257dbfc37f7736cca436992ae7a2d5081ea49c225022e5edf1bdb,2025-03-25T17:20:15.283000 CVE-2024-3342,0,0,51b07b32a5bf5639acc8a08f36fb2e522194f2844662aa41bd2be4964a3a2feb,2024-11-21T09:29:25.090000 -CVE-2024-33423,0,0,0b2f0b1dab8ebfd304ef987151613ac58f27b6a2a54cb345283e7cfab670b261,2024-11-21T09:16:55.627000 -CVE-2024-33424,0,0,92d91ded981558603bff4fb7c5c155521c3b6eee647488b4a80f62663f789df6,2024-11-21T09:16:55.843000 +CVE-2024-33423,0,1,4e2b43b25b745054d3880078ca00c5148fb128452679683c19b87f5bc6c870a7,2025-04-14T14:22:00.643000 +CVE-2024-33424,0,1,e5980b5086b0a2ca4dfd1becd696f38302dddbe577dd61c08e2905878390ae78,2025-04-14T14:21:50.547000 CVE-2024-33427,0,0,3ccd8abdcff44e7066241deadc22dafc2fa7779b4b42fcdbcfd2d0859fc41b8c,2024-05-26T22:15:08.427000 CVE-2024-33428,0,0,3f4950cf28d3f39f6c213cbde4334043d1d65335b4140746e16c212c3beda309,2024-11-21T09:16:56.100000 CVE-2024-33429,0,0,cd5a865eaf88098f8bc7a391b31e7a1b2be15f6cfa58164426e7581f1e1a5cea,2024-11-21T09:16:56.343000 @@ -260041,7 +260041,7 @@ CVE-2024-34310,0,0,82972b4a7271d7f072b904c774870b602afbf4962a5b24f811801ca0d72ef CVE-2024-34312,0,0,8f4176c7f4d8ad4d83b2238c464790461eb54a022b55d50cdda7a07c2d2107a9,2025-03-25T17:15:56.280000 CVE-2024-34313,0,0,b5500e4fe963557a3d43ad6825a0f75aebadcab488a2fa7d1b2936aa1c688978,2024-11-21T09:18:25.543000 CVE-2024-34314,0,0,6f95c57015c0e4aa6847de08039dd12693874b339496eef219a43e099453f6ba,2025-03-14T01:15:39.480000 -CVE-2024-34315,0,0,b33981540e2f2d3f0d9d86434ef0d546b27902e875fa690f5387a90dcbfa7b25,2024-11-21T09:18:25.930000 +CVE-2024-34315,0,1,0cecc3c22997be8003958e036cc9be5ba487da1cf373429a49723bf984f52d28,2025-04-14T14:21:13.200000 CVE-2024-3432,0,0,2140dfaca241723443a0ece3f45fc71a47abb74b3f0db4742cb68eb380ad14d3,2024-11-21T09:29:35.637000 CVE-2024-34329,0,0,b08a14bdcd4393cd09265974bc037d6200f642e7ed0bc10da069cfb326e7ec91,2025-03-14T16:15:31.587000 CVE-2024-3433,0,0,8279a698c9089eafd1ed585a4ecf150a34fd85ba6af103d97510c24cf13d842b,2024-11-21T09:29:35.767000 @@ -261104,7 +261104,7 @@ CVE-2024-35735,0,0,1581919ff87f10f7f774d2ca7be68e31a59f21a58dca693d1bfff119b775b CVE-2024-35736,0,0,b591265f1b42b45e77b06fb876824adf26c92435ba8064cdb56a9275f4ddf83e,2024-11-21T09:20:46.587000 CVE-2024-35737,0,0,9fd5676b863ed274703e758532e460cac665dea0d9d9542e730b8e9b88d1fe24,2024-11-21T09:20:46.723000 CVE-2024-35738,0,0,1b26c0835d7b4a442853bd758dedfbf9afae0987d86198a125e8aa095590c7b8,2024-11-21T09:20:46.877000 -CVE-2024-35739,0,0,b2c0f23c44dd489fd75d25b0255776c54fb4d01ce2ba480e8a917fb1a718226f,2024-11-21T09:20:47.013000 +CVE-2024-35739,0,1,f9f730707e8d15d6b69ebe686cc60ba817677d949887dd92c1afa703fd90cc42,2025-04-14T14:16:28.413000 CVE-2024-3574,0,0,112396b97ba1b66a34b539d1b13f0207148750766a0b6982e171e8886af35708,2024-11-21T09:29:54.513000 CVE-2024-35740,0,0,e9f83da37b964a9ef2c1833cdf40ecb3cde11b5ace5258868c79dc2fd2a32820,2024-11-21T09:20:47.153000 CVE-2024-35741,0,0,012b498f32178cbd7425eea663783c273f525c2cc9f4a5177c5fe910d6ac2d7b,2024-11-21T09:20:47.293000 @@ -263882,7 +263882,7 @@ CVE-2024-38924,0,0,871e59f17b901ada524d7b7c96fe3f0381755c09a997732b9d1a783220939 CVE-2024-38925,0,0,73ffcfe04cc3235f5e61c15c9bbf972540028c029edcada6b9ecaeac915be23f,2024-12-17T20:28:17.307000 CVE-2024-38926,0,0,e8aa241fa4ef4f40380c778236abf3b2fefa57ccca198f4c3595a57fe341de54,2024-12-17T20:28:03.277000 CVE-2024-38927,0,0,abfe11434474364e77539bf1ef520124ec57a47fc17409062fe7ded067bd7713,2024-12-17T20:27:30.040000 -CVE-2024-3893,0,1,4225b9160ac22c76a6de6ae1a7ec9f1f9e59d407373b20bc18bb62a925a9dc59,2025-04-14T13:50:53.753000 +CVE-2024-3893,0,0,4225b9160ac22c76a6de6ae1a7ec9f1f9e59d407373b20bc18bb62a925a9dc59,2025-04-14T13:50:53.753000 CVE-2024-3894,0,0,b3a2aa3b7941117f799646b94fe80eaf70c3bf0a40df09c6ce1c103c909b6f7c,2024-11-21T09:30:38.890000 CVE-2024-38944,0,0,aea38a4752802a1f34132bcbb575e35233d1954a8780f67f8d4f7cb5965d4f2d,2024-11-21T09:26:59.773000 CVE-2024-38949,0,0,37157e233df90a73366a05c90945fefa68ba5959ff251c7bc601be03a335c73b,2024-11-21T09:27:00.007000 @@ -264070,7 +264070,7 @@ CVE-2024-39308,0,0,5e2a254789b6adf99c0777cff7acf6dd961d09c4b36426a3aeec492e32936 CVE-2024-39309,0,0,05dddb230d488a4715733b5828a558e0d37a47d27fd705c4212d0a536cb382bd,2024-11-21T09:27:25.990000 CVE-2024-3931,0,0,da17b20e582e862546056d14aa128822fb3b0fc4d7319c4f35adbc82010d816c,2024-11-21T09:30:43.577000 CVE-2024-39310,0,0,09dc0d6f8f165690ce5741ca2ed6e9da3275d325f18578ccaad0e38dbe7b8f91,2024-11-21T09:27:26.120000 -CVE-2024-39311,0,0,0a4cacfd3571826c5e1c4bee706f04257866bed286590fb19a9133432e8b81c7,2025-03-28T18:11:40.180000 +CVE-2024-39311,0,1,d39ff933095a123a0802b25f5579fd44de48c1ff05bc7dad8a7dfdadbfc1ad6c,2025-04-14T14:24:49.550000 CVE-2024-39312,0,0,244e5eeda7d77b8f762732664cb450aa8179af57ae55ef58be1fa7ad940fc27b,2025-04-11T14:09:48.327000 CVE-2024-39313,0,0,b115d3b78f35e7dea98a72603bba4219df7032cb204602053744e9732af62a26,2025-03-06T18:04:02.763000 CVE-2024-39314,0,0,e7aff7b8a85ec42f1938bc61b661a77715a4979d21eca4d4fbf4901151758256,2024-11-21T09:27:26.497000 @@ -270476,7 +270476,7 @@ CVE-2024-47819,0,0,1a39bf32e7c6b82a650954a5b0900e95e1d66c96c1e4e5b23991d0f535e5e CVE-2024-4782,0,0,69b6d7a01a2232b7cbf2c7215ed8752a1696f8fe397399bcac0eb145fbd6c00f,2024-08-19T13:00:23.117000 CVE-2024-47820,0,0,bfecf70d13c7a8f68f3c0cf587c2e722ee17961ccd2429ee24d46ee3b305c114,2024-11-19T21:57:56.293000 CVE-2024-47821,0,0,e50f9c3d690660f3fa7d9cd5dae18c439f079356260e5f1a6724ad8cb9f021bb,2025-03-05T15:50:58.480000 -CVE-2024-47822,0,1,6897ef30466caf42926731b6a31f4aa67e8b1848e51659c2c942a5cdafe1cbe8,2025-04-14T12:15:14.970000 +CVE-2024-47822,0,0,6897ef30466caf42926731b6a31f4aa67e8b1848e51659c2c942a5cdafe1cbe8,2025-04-14T12:15:14.970000 CVE-2024-47823,0,0,1f1502b27c7af525eff79f9c30dccf2bd02e9be220676107a53cfd7f6dd38036,2025-03-06T18:06:52.687000 CVE-2024-47824,0,0,a6ed6f23ae40be69a679bf0b38da4a6a4364f56979ee1f794b9647e1e4c37eff,2024-11-21T17:15:17.650000 CVE-2024-47825,0,0,f2c70b114484b175f9d75f5ebb125aac926bd889413c3088b95d536b95e4823b,2024-12-19T15:59:27.760000 @@ -270884,7 +270884,7 @@ CVE-2024-48594,0,0,d5a52e0d152b31106cf7b89cec0f7550cdb6375f901b4c018ce4b1c02e80a CVE-2024-48597,0,0,dbc3f2eb04f06991684cd7c9c46a9fb0207e1947f5c88a8f399960e50271d80d,2024-10-23T15:12:34.673000 CVE-2024-4860,0,0,43edac6988670c251a3268565520d2147fd38eb2c203678751a12426c018f3e3,2025-03-25T17:50:50.723000 CVE-2024-48605,0,0,5cf16ecb0c12b2d510ecd90565f906c729f66381b22aa58921368411648c90af,2024-10-30T21:19:40.027000 -CVE-2024-48615,0,0,1de9726f8c1ee0935470aa1d7bd9789f15c010e787c2b1c50f20e210a88f7436,2025-04-01T14:15:20.253000 +CVE-2024-48615,0,1,f5f9bb8c105d2755748c3e011dfcc315b53b307e54e5fd5b718ebc4985a4437b,2025-04-14T14:36:30.827000 CVE-2024-4862,0,0,453045c210f1e38f678a17fcd64bbd2bd8a94a5f813de99cce0e9769bd3007f0,2025-03-06T15:07:23.547000 CVE-2024-48622,0,0,7b5734fdf710218dd18d04eccbe27f1ea32dc572aaf26b2fbfe91cd5543b9021,2024-10-16T16:38:43.170000 CVE-2024-48623,0,0,5cea775385f6ce5ebba2cd449299789230da6b7f1dc9f4a14dddcec3dde7198b,2024-10-16T16:38:43.170000 @@ -271703,11 +271703,11 @@ CVE-2024-49701,0,0,faa8cd67d7f87e8b700116e3ea01c26a0bace35a674e83df64e802c479757 CVE-2024-49702,0,0,95504b65313eac7b0c032b66b56870b8b510aa5556c8e61dadfd6a9c41944713,2024-11-08T14:32:56.010000 CVE-2024-49703,0,0,773f468dd20b89d6b077ffb05058547737a4c510a41e2a52930200811683b9b8,2024-10-25T12:56:07.750000 CVE-2024-49704,0,0,53e0ddf4c3ec57125f7e163acf7959921e5634e4438faab081bcfc397dd19436,2024-12-10T14:30:44.573000 -CVE-2024-49705,1,1,4b63bbf71d723e8386acbbeced6c584bb01a49b4f6711bd63a40bf53cb1b71cc,2025-04-14T12:15:15.120000 -CVE-2024-49706,1,1,b9d7b1199f661e1e544957a702f0ead9c3d014bfa512cdb3ec3fed6578a6cdaf,2025-04-14T12:15:15.280000 -CVE-2024-49707,1,1,42e984d3988d5be6773e13607caa61237047d2b77519cc418b0c853bde7665ce,2025-04-14T12:15:15.423000 -CVE-2024-49708,1,1,c358d94cec50cde400b14f8c805d047b9375c750b67497d3583c6caf270f1ed7,2025-04-14T12:15:15.567000 -CVE-2024-49709,1,1,035941939d586eec34806d2e8f8f369e1acaf6366b35a1174a77d829c8b78eb6,2025-04-14T12:15:15.707000 +CVE-2024-49705,0,0,4b63bbf71d723e8386acbbeced6c584bb01a49b4f6711bd63a40bf53cb1b71cc,2025-04-14T12:15:15.120000 +CVE-2024-49706,0,0,b9d7b1199f661e1e544957a702f0ead9c3d014bfa512cdb3ec3fed6578a6cdaf,2025-04-14T12:15:15.280000 +CVE-2024-49707,0,0,42e984d3988d5be6773e13607caa61237047d2b77519cc418b0c853bde7665ce,2025-04-14T12:15:15.423000 +CVE-2024-49708,0,0,c358d94cec50cde400b14f8c805d047b9375c750b67497d3583c6caf270f1ed7,2025-04-14T12:15:15.567000 +CVE-2024-49709,0,0,035941939d586eec34806d2e8f8f369e1acaf6366b35a1174a77d829c8b78eb6,2025-04-14T12:15:15.707000 CVE-2024-4971,0,0,17f65e33f654be41e85b2c190603b91b92e7c1a1f8fa7f8e99556cdd76507595,2025-01-08T19:28:26.847000 CVE-2024-4972,0,0,43bdd225cdcbd9a9a4620ce805328bc918966049d5b1be691ed85664aa743f88,2025-02-18T18:38:56.967000 CVE-2024-49724,0,0,9ae8f770760a17b31b8d886f65225c34c4b6c821905cd65185b307a9aeaed466,2025-03-24T18:15:19.873000 @@ -271787,6 +271787,7 @@ CVE-2024-49820,0,0,fe904aab3b1423196226c288487d3e9f35952361c8f61f2d528fcf7833452 CVE-2024-49822,0,0,6694f3da0a0611d56e0827801adf9ea2ee14c80f04d6a4b97c1a71bf68cfbc6e,2025-03-18T15:15:56.283000 CVE-2024-49823,0,0,b9995d30c3d89f300a49ed834da93e73c4c732eba4dbf905de0dceb3a3258543,2025-03-11T01:15:33.583000 CVE-2024-49824,0,0,4072c1a943cc33d63481a74407022b24878ec14cb5f9e9fc6f5cb6ba7f3e8966,2025-01-18T16:15:39.183000 +CVE-2024-49825,1,1,f31f7c31e8d5e4e2cd4d6a13eb582b6949ebf0d91d75c1ab43c5e08551b6ffeb,2025-04-14T15:15:23.627000 CVE-2024-4983,0,0,b82ab4bc704d323c7d9f24e0a3641c93b0503dba6a5392acd5923000e9eef05a,2025-01-29T18:07:43.813000 CVE-2024-49832,0,0,391e39e7c5b3e995146e5c9a1ef83712ccc04ea31043b019d156c859ce3b56e4,2025-02-05T16:01:09.627000 CVE-2024-49833,0,0,329298065bd1bb3d724e94c1deac431743ff5a22858b998a02d9a56030763581,2025-02-05T16:01:01.780000 @@ -274557,10 +274558,10 @@ CVE-2024-5349,0,0,75911b9a04c41ba625bf561a6fda73d6a6249d16eb1736f313b0d58e1202f1 CVE-2024-53490,0,0,229997de596954b948d854ed350eb8461ad79b06939654658f3b483b570ec130,2024-12-11T17:15:19.903000 CVE-2024-5350,0,0,96d11c8e31022561524caa809e0cd78f545854ba6dbf3bb0f9f80968626b9017,2025-03-01T02:41:15.660000 CVE-2024-53502,0,0,877c583ef29b126aadc317fdb70da023ced288d1cc148d9762da8722dde21234,2025-04-04T15:06:43.840000 -CVE-2024-53504,0,0,9961976e4db60fee5588e4482b1cee4f280ff3be8e36208eabef493b516a6955,2024-12-02T17:15:13.047000 -CVE-2024-53505,0,0,7c8f29e95847d5be6e925fd78b818e0d66804d47399809d4e1430536885b2678,2024-12-02T17:15:13.257000 -CVE-2024-53506,0,0,73ac38f9f53b1740c00c2ed8ba8ca4e641f472ddada7eeb543bbf2a9260ca55c,2024-12-02T17:15:13.497000 -CVE-2024-53507,0,0,e35399cb65617a50fe45e57f7e52f9d7f936824660eeb675b03a02887f4088ea,2024-12-02T17:15:13.707000 +CVE-2024-53504,0,1,6bd7a7796662ba3bcdd0d7aba3f2c5a9119d47f6ff2e7d4857eac3b76e7bade3,2025-04-14T14:30:52.157000 +CVE-2024-53505,0,1,9dad16994642bb2e036878e8f233cce5e4ebd529054b5fa9c0222c06ae04876b,2025-04-14T14:57:53.313000 +CVE-2024-53506,0,1,0d04f22ed096a1aac32c01948a8b4fd3f0d444fc4002d2d4462e9475a4b6e0ad,2025-04-14T14:57:37.513000 +CVE-2024-53507,0,1,698ef15dd58162c66eab2a6710ae48d443acf1e2b58fef5cd4de95d852c84b75,2025-04-14T14:57:23.033000 CVE-2024-5351,0,0,e54da7647b2ec568192e76777a6d33133a8359c67f763fe86fa9a09a444d4ab6,2025-03-01T02:43:03.853000 CVE-2024-5352,0,0,3ce8cb21510608b4ca4a9803045f2a7774e40ced6d041e7dbf2be5cc97527508,2025-03-01T02:44:37.920000 CVE-2024-53522,0,0,4cf27771a36f742e1b4b9b4ff1149b39f782c38d11efa74f0ad2b7f1066f5059,2025-01-09T16:16:21.560000 @@ -274896,11 +274897,11 @@ CVE-2024-53963,0,0,051446204e52ba5a494312330ee7e3ab35674dc0b04bf6faecd732baa765e CVE-2024-53964,0,0,8b957f9c6ca1dec43d35dad3b6547f3c315ba420617d586a20a9f871b1db47a0,2025-02-11T16:05:17.890000 CVE-2024-53965,0,0,fe5265ed578fcf02d9c7551665c4d02d94d57b5c2a197155d2f383c80e4623ad,2025-02-11T16:05:25.927000 CVE-2024-53966,0,0,e11c591668a48bce198ebff61b349df8c8683723a99ad711247803fb06f85133,2025-02-11T16:05:33.017000 -CVE-2024-53967,0,0,9703dc45ae795bb12b869f5b22c327be14c1f45789163177033eda10f6e950c2,2025-03-19T17:15:40.313000 -CVE-2024-53968,0,0,ee98a8a260f4ec5c75e76f83ac33f11113e2940a93eb5f3b3a48c0e84bab6e65,2025-03-19T17:15:40.467000 -CVE-2024-53969,0,0,91ee5c8a2376748ccb3bb7f7ff9e4e350b1b45fcfd56aa8cee58aec97a2000cd,2025-03-19T17:15:40.610000 +CVE-2024-53967,0,1,569fd2ddc2f22c67d311db8d2c9febd82a5adcbc34b24875796e39a02ef0eca1,2025-04-14T14:58:05.883000 +CVE-2024-53968,0,1,611811a51ce991bdc0f6a1035358d48c0c87af3e0d1debdc7562dfb326c7aa1b,2025-04-14T14:57:30.890000 +CVE-2024-53969,0,1,3c3c822000aec988f3935dbf7797b14b50fb9236b3a75502b30bfcc3923c1314,2025-04-14T14:56:28.223000 CVE-2024-5397,0,0,e240e353d0c3a2a1734a4b7c92d19485fc4c6abad443fc8646294b9e529895fe,2025-02-10T16:20:41.830000 -CVE-2024-53970,0,0,c819d6f44d7300c0cbf7ea546b0588f4a765538a1183e62b72001d5e23d72b35,2025-03-19T17:15:40.750000 +CVE-2024-53970,0,1,20958d58eb9515921590df62ce8e737c32b8958b1107c3bfc1e974aee7c7d34a,2025-04-14T14:55:33.210000 CVE-2024-53974,0,0,52052a572e52b9dbc089a516bde1b3fe92dc22cc036b47b932527a527df79bc8,2025-03-04T14:04:30.393000 CVE-2024-53975,0,0,1ef4582fd4bc5bf12a2226ef1587e7e199747f5394364a72a9c8e29bbaf92b0b,2025-04-04T16:19:53.597000 CVE-2024-53976,0,0,3c4e290755b1122ca5eef12abc826a22f34cb5f7c1451690e25b02ebe35b73d5,2025-04-04T16:15:43.123000 @@ -275538,15 +275539,15 @@ CVE-2024-54909,0,0,e09df11f9fd23515b803ba3007fd40230638945f3a2c3c6e417f7f2b8d8f4 CVE-2024-5491,0,0,f430fd5a631d3836b39db69c0e7e21d3595a43a4e0a9c7d9dee8bbd76daa2dff,2024-11-21T09:47:47.017000 CVE-2024-54910,0,0,6581157280a10462a6b1d5622c98ff4607d8f7315bb6a89f500333c22a07f58a,2025-01-14T16:15:32.953000 CVE-2024-54916,0,0,c187c44e77f1284caa57fa2c5d09aa5819a1e6e1279a77edd94c2a7b2803ab06,2025-03-18T15:15:57.267000 -CVE-2024-54918,0,0,5817447237a214f9c20f0d1a3b96e161d2b61c5e7a00f7284ad0d087201efff1,2024-12-12T18:15:25.790000 +CVE-2024-54918,0,1,bbc635a298951a4b2b9378949f123dcb9547312658236769bb25e799be293dbe,2025-04-14T15:14:03.093000 CVE-2024-54919,0,0,d240fd7b13ed8b141b8975d3eb4f4e201c9093f582cb0ecbb49a96c5b085f2d9,2024-12-10T18:15:42.770000 CVE-2024-5492,0,0,69e032d7889ecfac9ba9e43b34f5fb521197e5e97d6fe94180bc88bb517b1262,2024-11-21T09:47:47.140000 CVE-2024-54920,0,0,f3d8327726d97fad7afedc7222e977f628a89643e455f1eb4bfd257bb9efc305,2025-03-20T21:15:22.143000 -CVE-2024-54921,0,0,d74607d69eefc3cb9e78e0e4d7008bc64502bc10eccc45e90cc7289716e134a0,2024-12-11T16:15:15.127000 +CVE-2024-54921,0,1,8d9a04e76dc09352548e43aaec4ed08a4b441255d8fbe9c862320cc0c9c5a7d6,2025-04-14T15:15:41.963000 CVE-2024-54922,0,0,58c641310c8984cb82cea1a26551b61bd4b4bfeacfcb7ec670244e86b06ada09,2024-12-12T18:15:26.013000 -CVE-2024-54923,0,0,314259a95b2daff442b06b04dc319a4c8695c28ae9f6dae2e94f7f1930dd5d9d,2024-12-11T16:15:15.347000 -CVE-2024-54924,0,0,1477b70ccf713c1f3408e2801b68a0d25550bb2734c30a71dc3a11668a234c0d,2024-12-11T16:15:15.547000 -CVE-2024-54925,0,0,73e289c309afa9da10c35cff604f21a35fb8189d7d93c808ebbacfaefa442a60,2024-12-12T18:15:26.240000 +CVE-2024-54923,0,1,66074ecf8527058295578446a1e585614a1d6712a6e668d59ff28ead60adc68f,2025-04-14T15:15:34.353000 +CVE-2024-54924,0,1,21a0800fe660139eb39e5a7a8dc4f5bfae7593e0bb87af82edac2c817d82c7db,2025-04-14T15:15:25.957000 +CVE-2024-54925,0,1,f35884f48d535538d240d3820757f7162f46904fad6e532be3d84cea7f9f7e3e,2025-04-14T15:14:31.077000 CVE-2024-54926,0,0,99308ee0c7bdb2555270e9769b907fdbadfdbd27447c982cce941529cd8dbe0a,2024-12-11T17:24:11.403000 CVE-2024-54927,0,0,743cd5f75576f93b89277c4c4bd309f2a9d5d44818b55b3d4433a9a3e5ce11c7,2024-12-11T16:15:16.360000 CVE-2024-54928,0,0,c0b3aee5ee0c3359e1bdf75741044319f3b2ae90c5d6a8fa2f4c6b96dad60fe9,2024-12-11T16:15:16.590000 @@ -280533,7 +280534,7 @@ CVE-2024-9225,0,0,1704719e0ea2e5f5e0606a9d5d2023b553aeaf4205c1ecb8982fb87bfe7ba8 CVE-2024-9226,0,0,737254889761e79043d7b1ce1fabb643ec8682cb3fdbebee93469fa9d609c8b3,2024-11-12T13:56:24.513000 CVE-2024-9228,0,0,f832c4e68b6d914b6db8d0a26923de9ac2d359b666ae353a594a1dbebd259870,2024-10-07T19:01:04.960000 CVE-2024-9229,0,0,8ca2c97a38c4e01347e36dcc5beaf6ee08ed3c0d4d835cdeaff8b3cc58e2c1f0,2025-03-20T10:15:47.603000 -CVE-2024-9230,0,0,422fa7fe91a305a61125adc7bcb4b626a3126bcd0c2b533af236ea66a29399c0,2025-04-14T06:15:15.223000 +CVE-2024-9230,0,1,6107ee4fce4637566c9f5e676ab31f9d730380532827e3cb9e88857494336919,2025-04-14T15:15:23.897000 CVE-2024-9231,0,0,07b78bcf598bdcc4695b3c1cf7651973edb0c6022b910ae480cfe1459ca81ece,2024-10-30T18:56:03.380000 CVE-2024-9232,0,0,c437dd6828a2bb6c2fef4b80c8004716f23c3f046aa60d93e2c14ad1e09f2d4f,2024-10-15T12:58:51.050000 CVE-2024-9234,0,0,c697ca46bb4a35f9e405ad10af95fb57a9d88346748e059f61a0140ee2b3f87b,2024-10-15T12:58:51.050000 @@ -282940,7 +282941,7 @@ CVE-2025-21162,0,0,6d90726fc3556d421d764e82d05572f6298c459c0515652403080fdf9402e CVE-2025-21163,0,0,20b2c3143306a8345eb967634be1acfbad088c1be68181ebcf0b2c9944d91eda,2025-03-03T15:27:42.417000 CVE-2025-21169,0,0,5a3bca32120073e5a1c495e3f019da8a1d88efc75cb769bc6bdae91428f74b23,2025-03-11T17:16:18.423000 CVE-2025-2117,0,0,1059047bb2180240c8be76ee1d3c7badf3b4027738ccdb1fd77f3462c3418c6a,2025-03-09T08:15:10.533000 -CVE-2025-21170,0,0,77b2fb4eac487c5dc8c9982e41ab9b1a3dfa2e41d5b08ee56739cea48b79001e,2025-03-11T21:15:42.150000 +CVE-2025-21170,0,1,3d95261ab68d7ca4b90895fa50ac07c7f00d9a9b51631435ed38025c386bd8f6,2025-04-14T15:10:23.137000 CVE-2025-21171,0,0,5039d30bbad3c7a9ef0d4706f8bc1f73414fca568f5dd18586207d2df517e5d5,2025-02-05T20:07:01.797000 CVE-2025-21172,0,0,bacfb5c7449e528ff37d0b0dc34b744db150f394b1322d255e5475d0135374a7,2025-02-05T20:03:33.053000 CVE-2025-21173,0,0,777122bc11f0afe7d725be5fe0ce160609dbf692b0cdcf18e5e5b49ebf30a0f2,2025-02-05T18:56:08.103000 @@ -283320,6 +283321,7 @@ CVE-2025-21596,0,0,1096071862a1a4b487a7ca6a43c6a80beba27fa305e8350c6fd445c040716 CVE-2025-21597,0,0,1f1adbf7c262e34dba1d8ce031473845273c09baa85b7c10ad9a8a20271caac6,2025-04-11T15:40:10.277000 CVE-2025-21598,0,0,5c3566de5925fc00a103455df088729284ddc356b891286f5a8a7d061a4afc7d,2025-01-09T19:15:20.123000 CVE-2025-21599,0,0,9a870570f5d5bf66cd754c8a1d17f82fd90380fc87a793c8ae36c8199406c321,2025-01-09T17:15:18.770000 +CVE-2025-2160,1,1,beb31ed01e8001e36eaf6d133e70842e4ce78c7d6e673fc456795e7f0c237445,2025-04-14T15:15:24.093000 CVE-2025-21600,0,0,ccb13893e7de17eabc5a694789cec3336df98d94c48128502c18864542035947,2025-01-27T22:15:14.873000 CVE-2025-21601,0,0,734617ed9dba757da2ab38f4b9a66e9ff1aee2c512ff202bd66f0fe463765aae,2025-04-11T15:40:10.277000 CVE-2025-21602,0,0,c19be4b4737359a2e4ed4f02c889d9a8f5b6a59c1e0d49883a4919ec981debf6,2025-01-09T17:15:19.150000 @@ -283329,6 +283331,7 @@ CVE-2025-21606,0,0,a19668b5b8fc9af5d593a5704f1b419f2af7457a16702862aae2b42a335d3 CVE-2025-21607,0,0,853308cc8c471813553ca9ee76112b7a86c43b193b1dff4d3732c3ff8ccdd593,2025-01-15T16:15:34.463000 CVE-2025-21608,0,0,d574978b81bfed48d2606c0950417bee8811351e74bb8d93791061c4e37c7692,2025-02-18T19:15:25.220000 CVE-2025-21609,0,0,a6de42b29fb27af22b2f328a2adb6b55148d54130efdaed884c8fa4d6c4faf6a,2025-01-03T17:15:09.147000 +CVE-2025-2161,1,1,e07b97588c06cd732d745d21e2850009b054ba13784f41708aee2abc1fd9d2e9,2025-04-14T15:15:24.247000 CVE-2025-21610,0,0,7316a86caea5346e233350f085898ca7619157368c1365d30f5c1d1d8901ed25,2025-01-03T17:15:09.290000 CVE-2025-21611,0,0,8e422e5fc6d4af0b6b34d70cc0908397e091aab260ca691c03a0f88c30af7c40,2025-01-06T16:15:31.413000 CVE-2025-21612,0,0,138b1e9798db0ff4693818b692f56ae3cb40db3fdb9ae68afaca02a8383a0a8a,2025-01-06T17:15:46.840000 @@ -283695,18 +283698,18 @@ CVE-2025-21955,0,0,3f92ee40de2655adb46d1b057b00c5dc856955eaad7b904b9917c4750d77f CVE-2025-21956,0,0,4a8984510eb112b1f831009e6931bd3dda5a155c9ec28311bbb8cc79350dd185,2025-04-10T13:15:47.440000 CVE-2025-21957,0,0,f21a97cc998bb02c31536c1d78df27fb68940ec2036675e701c9a77361140386,2025-04-11T17:06:24.197000 CVE-2025-21958,0,0,f1cc25ce6d13bd1e5cc16fdcdb0f90ece0734d1d101629ed0502f1555f7e02b9,2025-04-01T20:26:01.990000 -CVE-2025-21959,0,1,60c1d47ff5932c5b150413183a4299b72d4f7e0dce52d8cbcd7b435e825ebd90,2025-04-14T12:47:37.577000 +CVE-2025-21959,0,0,60c1d47ff5932c5b150413183a4299b72d4f7e0dce52d8cbcd7b435e825ebd90,2025-04-14T12:47:37.577000 CVE-2025-2196,0,0,74397881653af38c2f17ff3ea9a4961f6591ef6907c5859d1077d95e19f6679f,2025-04-10T10:53:23.660000 CVE-2025-21960,0,0,9bef9c369638087f2219c1a6981e05d97ee7985c40316eaab75e0651f0237ebf,2025-04-01T20:26:01.990000 -CVE-2025-21961,0,1,86b20c032b47cbd4a435c5ec4c03d913683d8f9dc34a64a87f3e9cc26f28ca0d,2025-04-14T12:45:14.773000 -CVE-2025-21962,0,1,d82222fbd7dadef945015f850832cbaf28ef6d55adf14f49a5d2116501a3be9a,2025-04-14T12:44:11.260000 -CVE-2025-21963,0,1,648acac188646160c5b5f8204726f395e338917da37afafa1407df1e16703726,2025-04-14T12:41:54.493000 -CVE-2025-21964,0,1,34e9f6135942c2d145ca1c275311b23eaac22cd1c89bf9d8306d42f19382c8bb,2025-04-14T12:40:30.847000 +CVE-2025-21961,0,0,86b20c032b47cbd4a435c5ec4c03d913683d8f9dc34a64a87f3e9cc26f28ca0d,2025-04-14T12:45:14.773000 +CVE-2025-21962,0,0,d82222fbd7dadef945015f850832cbaf28ef6d55adf14f49a5d2116501a3be9a,2025-04-14T12:44:11.260000 +CVE-2025-21963,0,0,648acac188646160c5b5f8204726f395e338917da37afafa1407df1e16703726,2025-04-14T12:41:54.493000 +CVE-2025-21964,0,0,34e9f6135942c2d145ca1c275311b23eaac22cd1c89bf9d8306d42f19382c8bb,2025-04-14T12:40:30.847000 CVE-2025-21965,0,0,e07fca671066f4a4b50d52f56929a677533b71270d577411490bea8c39ec237c,2025-04-01T20:26:01.990000 -CVE-2025-21966,0,1,b8df930f5d34ff67503ed8868ee3b2f23c0716e02ac48ca9a2f2dc6a95c67f02,2025-04-14T12:39:17.060000 -CVE-2025-21967,0,1,e77dd67720d3a1882a8d8d355be5ed5c594139c25f36187934da38c08f3f8e84,2025-04-14T12:38:03.853000 -CVE-2025-21968,0,1,e1386240b8d893b8a76956411feb2ded582ac3442fe1dd38c9a9bf2ea037af2c,2025-04-14T12:37:24.997000 -CVE-2025-21969,0,1,8c616d8228585648ef177a910bcf00802c30348264f19f523b8594bc0b608015,2025-04-14T12:36:32.997000 +CVE-2025-21966,0,0,b8df930f5d34ff67503ed8868ee3b2f23c0716e02ac48ca9a2f2dc6a95c67f02,2025-04-14T12:39:17.060000 +CVE-2025-21967,0,0,e77dd67720d3a1882a8d8d355be5ed5c594139c25f36187934da38c08f3f8e84,2025-04-14T12:38:03.853000 +CVE-2025-21968,0,0,e1386240b8d893b8a76956411feb2ded582ac3442fe1dd38c9a9bf2ea037af2c,2025-04-14T12:37:24.997000 +CVE-2025-21969,0,0,8c616d8228585648ef177a910bcf00802c30348264f19f523b8594bc0b608015,2025-04-14T12:36:32.997000 CVE-2025-21970,0,0,ba7445dc61bccd37c0f7ca1a141461c1c02ebd565257c235441700d71cfad345,2025-04-10T13:15:48.327000 CVE-2025-21971,0,0,b9d234e567e462d15ed318b3bf4dc7551c45c9f6c61850ac7f7a28311b584baf,2025-04-10T13:15:48.453000 CVE-2025-21972,0,0,d85845769d0cd5fe597b1eb7b9c324d06cd06a54a4c2f3e7cb0d6c39aa6a1b43,2025-04-01T20:26:01.990000 @@ -283734,8 +283737,8 @@ CVE-2025-21991,0,0,63b49f43cf2133ca43a412e23175e72c099a14957aef6c2061b912b623048 CVE-2025-21992,0,0,15562f59303a19ec99d0304ad06949423b421a45c8bc31ef39284adf4b1d9575,2025-04-10T13:15:49.053000 CVE-2025-21993,0,0,c7d7a240f7e952f7bb94c66a07e027bda01efc77ec36981187d03cb58fdf6d20,2025-04-10T13:24:10.787000 CVE-2025-21994,0,0,fb9048208441dce66026c77200fbc30f31fbf21a4c08fe3e825028547f121380,2025-04-10T13:15:49.333000 -CVE-2025-21995,0,1,bb7450337da311841a5f09589acec623d298467d1b3a02881059055387ba445c,2025-04-14T12:35:14.330000 -CVE-2025-21996,0,1,7cf09825bf28a7be596002a0d84afb6500538d86a2223fb6dca6ec5d4349e5e3,2025-04-14T12:31:44.620000 +CVE-2025-21995,0,0,bb7450337da311841a5f09589acec623d298467d1b3a02881059055387ba445c,2025-04-14T12:35:14.330000 +CVE-2025-21996,0,0,7cf09825bf28a7be596002a0d84afb6500538d86a2223fb6dca6ec5d4349e5e3,2025-04-14T12:31:44.620000 CVE-2025-21997,0,0,75f2db7346f5e11f441832bc84fd599e6226bd742c17a20daa803e3391a1951a,2025-04-10T16:16:08.107000 CVE-2025-21998,0,0,2132e66f9124475ed72918a493be29e5d88b09b204031de702954c5cff8b4124,2025-04-10T16:15:28.363000 CVE-2025-21999,0,0,6fcd1eb7455ff16437852a0724a81ccfe881c35e5e1b791d3216d65a7ece8d19,2025-04-10T13:15:49.693000 @@ -284087,7 +284090,7 @@ CVE-2025-22586,0,0,16804334a047b2f01340eb62615a8dd9316b9a12b35e95c16e6a136bd06b6 CVE-2025-22587,0,0,2bf5cc749481686a77b87726094a1b5a9d61f7be75b7c5b80afd006567747bd5,2025-01-15T16:15:35.097000 CVE-2025-22588,0,0,3237594a1e0f94efbc9060e1729c2d2e97f5964f4414bc5b9057647a8c2b5034,2025-01-13T14:15:12.660000 CVE-2025-22589,0,0,04766fb247e57bcb66805699f5e7d85615d427973633880479f532a655c1369c,2025-01-07T16:15:55.053000 -CVE-2025-2259,0,0,b40b8c7f39c895d7bb9ac60ca8c39110678c583e50c87a3ee7d7ada36a958dd5,2025-04-07T14:17:50.220000 +CVE-2025-2259,0,1,02e00a01142d00b1642ce6037c161f21e76c7201bb9e19887a3b813520be5556,2025-04-14T15:15:24.383000 CVE-2025-22590,0,0,c88e366f105099929b737c28e4e59657f86cfa9e8944fe204794560a0673da79,2025-01-07T16:15:55.200000 CVE-2025-22591,0,0,9dc7be8606e10b7ca53ae284810d2833be8121f6bd7b217f458b2b42cfb403cb,2025-01-07T16:15:55.337000 CVE-2025-22592,0,0,f03fcd01ef66d026e28f7de006f4752785662917cd91a853528350917c3e1917,2025-01-07T16:15:55.470000 @@ -284098,7 +284101,7 @@ CVE-2025-22596,0,0,0089eaf6dd776003df9c0810cc83a2641f248aa1924c38bc82725a8aadb08 CVE-2025-22597,0,0,e529ae3c51a54e777bb8df04ec550310efc73c5234fb903ae486497eb818691d,2025-04-09T18:27:30.550000 CVE-2025-22598,0,0,86c859ce83ca95a19f341b2836f3010e40b0c9ff1bb46b45cd214b0405da58e6,2025-04-09T18:27:19.160000 CVE-2025-22599,0,0,31b7412bafb4ddec6e2cef9492910070dfe675a6cda8a33c10aa6974c7fea047,2025-04-09T18:27:07.707000 -CVE-2025-2260,0,0,d1978b85ca1901129021ca8f2234b3a1945dde9bd49b1d5c22bbd72a60acf071,2025-04-07T14:17:50.220000 +CVE-2025-2260,0,1,e8bc8bf3dd50b3158f887b0e6aaa414050376bfac2bd9bb4aaaf75fdb9ad7127,2025-04-14T15:15:24.513000 CVE-2025-22600,0,0,0f751874e8dc9a2df5b908eb86ad6c97cf84e81c1cee1fd8e032767709dc8a83,2025-04-09T18:26:47.750000 CVE-2025-22601,0,0,e5a036684b4e6e1204af1b20135d30f3904e4c5af4a80eedecb01794128ea749,2025-02-04T21:15:27.800000 CVE-2025-22602,0,0,c8f7aea9374385130d2049dfea6e2ee228c262f087909008185d3a99dec96d21,2025-02-04T21:15:27.950000 @@ -285392,6 +285395,7 @@ CVE-2025-24236,0,0,6f35aae8e5b2275b2c69183ab7776a716442e803a5454ae85f2994d6ce986 CVE-2025-24237,0,0,27bd8aec1cacbdda457d4c54321da7772780a885b84dc379b0850dfb4a03a57f,2025-04-04T17:11:50.760000 CVE-2025-24238,0,0,eb385efe8cda4bf9f1c35756a77fb4af48f89427c693cc6ce5f1501ae0be4d28,2025-04-04T17:12:14.453000 CVE-2025-24239,0,0,34160c098216745dbddd9ea66458d406055bc4d5f852b3dbd17c24cb8226d924,2025-04-04T17:12:32.720000 +CVE-2025-2424,1,1,cd66352a25ef6cbc835aa663adbe26fe0886002843812104c4995f87e65d3c5f,2025-04-14T15:15:24.630000 CVE-2025-24240,0,0,31e1fbc4a9906522b59d5426cc41c13b0cc9baa11bbcd68e50f13950436aaf0f,2025-04-04T17:12:40.510000 CVE-2025-24241,0,0,a279cf4c641bb9c3ca243836a9cfff64caa6f150180c868bc752ebe35d2580ea,2025-04-04T17:12:47.040000 CVE-2025-24242,0,0,7198a4ff47a69ba0a9fd45b2c507b49c3ac18f25e906b0f7d0919752e8bf374f,2025-04-04T17:13:00.923000 @@ -285771,6 +285775,7 @@ CVE-2025-24744,0,0,bc8bbe894f88fed69b4bb24f69d681e27c01e6147c3768ca6f1adf789040a CVE-2025-24746,0,0,e640d68193c997efe97249e6f1cee0e9ce9f97ddc69dd52467ca15646a5683b0,2025-03-28T19:15:14.553000 CVE-2025-24747,0,0,d8d5879f141d02ac440b19c8b796e44b06e3fcae6bfd445bce644f72bd561c9d,2025-01-27T15:15:17.253000 CVE-2025-24749,0,0,7e56b04f2f502be4c647ffa52a0c1f2e91f2bc25e979a1ff629db670a4b544fb,2025-01-31T09:15:11.760000 +CVE-2025-2475,1,1,6c74de8aab34d745237f4a5edbc2df6fbc2bbd3848ba69750ff7dea65f8837f9,2025-04-14T15:15:24.777000 CVE-2025-24750,0,0,6398f7b1e29d3519e65e0864494e38f2a68b8317a82c560542e0c4814ca79359,2025-01-24T18:15:48.663000 CVE-2025-24751,0,0,d999066b9fc4be710f419f3d363e7444c778eaf47794160a144b74e633cf7720,2025-01-24T18:15:48.810000 CVE-2025-24753,0,0,a2c1331499f1ee93474d032a5492134141c22dfbef3d88782211f0652176fefc,2025-02-07T14:39:27.320000 @@ -286265,7 +286270,7 @@ CVE-2025-2562,0,0,d71b02468cafdbce84509f67bdfaa8893fe73450f99731b0a90af791f6f728 CVE-2025-25620,0,0,2998f203d004ba2c3686a85bfd6e4a9c803d92001b76576bf7ced9c40410ee3c,2025-03-10T19:15:40.393000 CVE-2025-25621,0,0,63a694a2198c853cb02da81979b70cf80909e4f217d0ad14b5c2cf8cdc3ac35a,2025-03-17T18:15:21.593000 CVE-2025-25625,0,0,d35a53456bc87fc30424277ce00ed28d6dd49da4bed527e81b7815b9777704dd,2025-04-03T18:26:47.920000 -CVE-2025-2563,0,0,ea4cb9c6dbf55f0e8cff06bea698a1780980e3670ee9673fce76125454042b52,2025-04-14T06:15:16.333000 +CVE-2025-2563,0,1,52133d9be9d1459cc4a49bda55c08cf875050ff36470fcb1f2903e7a9510d4a7,2025-04-14T15:15:24.927000 CVE-2025-25632,0,0,63a9daf8d062287fb49c86902495e07de54d2264559e40d7c6a1a7888562d43b,2025-04-09T20:56:55.750000 CVE-2025-25634,0,0,d0b51d7c1db69276cd41b2edd1346abe98f6557183fb728a8205e284d548820a,2025-04-10T18:17:11.187000 CVE-2025-25635,0,0,beaccf1b133ae432bcedfcf1b43f20544c4e5ac5d5d33afd3d44ae08bcd8754b,2025-04-03T15:37:36.397000 @@ -287047,10 +287052,10 @@ CVE-2025-27172,0,0,01bf953941621cac77f2041b0421fcceb11552687cbcf857082ae028a23af CVE-2025-27173,0,0,c9e2993309e45fd14ee6be40d8e01bb17a54e6eb4477b5bdf7f506d704ba7a78,2025-03-11T21:15:42.307000 CVE-2025-27174,0,0,7ee5439b80bea2be02d60665a8a6f02e6182e2d8233d20944e112423989b3b1d,2025-03-11T18:15:35.600000 CVE-2025-27175,0,0,2ed420f979005c7cd4792714feaee343d769a86fced5860fd76d1f42eeb6a18f,2025-03-11T18:15:35.743000 -CVE-2025-27176,0,0,d1712a1e0bca0af1abae109951a83cc1173640e77c80ac54d511eb9d80d87103,2025-03-11T18:15:35.897000 -CVE-2025-27177,0,0,15cf059776be9ea8e9e76708f75d13ff1357b63c3eedb7a3f0acc3f5e9a46ff3,2025-03-11T18:15:36.047000 -CVE-2025-27178,0,0,4bc8009459c3f894a5d755c0253f508e64a5069912e1df02303532b791e0c208,2025-03-11T18:15:36.200000 -CVE-2025-27179,0,0,41d17946ed77b2ce4cbbdfb5344570ad40435516e750f79f8794c0c913ccc3f4,2025-03-11T18:15:36.353000 +CVE-2025-27176,0,1,bdc4506f305f9b3659fe00015e17df072b6852ab50cb498258b82edcf4083a64,2025-04-14T15:03:27.653000 +CVE-2025-27177,0,1,4f91d448a89b9c1fac1467ab3dfd127b0557473731fe9e00499895f4d74c232c,2025-04-14T15:04:42.487000 +CVE-2025-27178,0,1,d29f2db6dc1ac256c1e4a080de2aeb418fd675fa7ffe6763fc9e095c359dcf3c,2025-04-14T15:12:39.180000 +CVE-2025-27179,0,1,5e1abcee49714bf023e653efb22c43b0ceb67dc60d9fa65d4412d5d405a5b809,2025-04-14T15:11:35.763000 CVE-2025-27180,0,0,a01617ae3a62f07e2d8732a626240eb9ebf587e5b99b46b7e0e2b79f46184c4c,2025-03-11T21:15:42.463000 CVE-2025-27181,0,0,b8435bb9301d543aa4406b3079b9eb8e218c3a7fdfaba6aa1976d352c0657b66,2025-03-11T21:15:42.613000 CVE-2025-27182,0,0,0f73d4eb979126d966418d5d6edaee3be94fc1205e71b47e2495b3f6cb02e690,2025-04-09T20:03:01.577000 @@ -287700,8 +287705,8 @@ CVE-2025-29070,0,0,01291a5766bf65c1287ee0f6127f3a568879dd8e4b1dbd2e417b1c53e816c CVE-2025-29072,0,0,fd95fded2fd85d3027eac83af76782f039ae97bbb9711a4bf20a00b195ae0993,2025-04-11T17:20:02.963000 CVE-2025-2908,0,0,79924d3ecfe8650096befc9934447812930496f664f45bff66577cd53948d0ef,2025-03-28T18:11:40.180000 CVE-2025-29085,0,0,f3b0229b2dbdb0918b1860c20c86a23a202aa8fd27b32fb25e3773ee78d284c2,2025-04-07T14:18:34.453000 -CVE-2025-29087,0,0,089a9780b1f166bd8c072181912d7d69f969a758f54ce8dafb3cbd6601949045,2025-04-08T18:13:53.347000 -CVE-2025-29088,0,0,7d5dacaf56422a7d5f1eb1761cfdbddb4f62a79eceaaf1e73ee2a7a26416b91d,2025-04-11T20:15:21.553000 +CVE-2025-29087,0,1,153813939aa0a08c279aec2b9626d0a6788022cbca4ce8460ee0b3a9ed1ef62d,2025-04-14T14:15:23.813000 +CVE-2025-29088,0,1,6bf2d825d2a441e202db1527fb1253e0fe9f2003beffc91d908185629b413eaf,2025-04-14T14:15:23.993000 CVE-2025-2909,0,0,42f5781e40cc939d92fe9597195ba6ab452b710720c9766b4ca6896cfde9e954,2025-03-28T18:11:40.180000 CVE-2025-2910,0,0,5af52bdcf7582d7e133344b6a01509f55f8b432f92637557c86a5b2988938918,2025-03-28T18:11:40.180000 CVE-2025-29100,0,0,03e4a9cc3df0d3df440cd5953f31e0b258dcc8840a20f25006f01137c8594a87,2025-04-01T20:06:53.017000 @@ -287715,10 +287720,10 @@ CVE-2025-29135,0,0,500947b54e2f6360bd88908c4e621c7a101c66a93881bfd5d1d8147aa6208 CVE-2025-29137,0,0,6931ace246948745a6b3fe7c0c4f84f92cdbdc6e8e8f8a7f93a7b8720a179a1b,2025-04-01T20:37:02.110000 CVE-2025-2914,0,0,f4da3bf15e0a024148c60f5942d8d165e3d668046cbe893c7644ad7b0d6619e0,2025-03-28T18:11:40.180000 CVE-2025-29149,0,0,2b30e3ef51abdd15292670ac51eb247a8a581b78085e4a43217ece3a22f27ca1,2025-03-27T15:26:02.940000 -CVE-2025-2915,0,0,b9674148271b5d8033b5d0b1e5bb9e0a537801b574c77a65afc34c00e08ad69e,2025-03-28T18:15:17.060000 +CVE-2025-2915,0,1,70cc8be03dfb35b9ef84c0237ac359de350c3b4b4245e9a89d1955b7eff26074,2025-04-14T14:03:21.190000 CVE-2025-29150,0,0,d63dc144134bdd58d64b5a241d38aa93b7976fc0b18bc7b222ca5fad328899e9,2025-04-11T15:39:52.920000 CVE-2025-2916,0,0,a9d32a009c2c479d4d99380c6f5c7dc74ee32d7bcd65aba7c50dbefe66cc315d,2025-03-28T18:11:40.180000 -CVE-2025-2917,0,1,456c071352ee17bf9505ffdef668916785181adeea61153a444057728f3de9f2,2025-04-14T13:53:30.877000 +CVE-2025-2917,0,0,456c071352ee17bf9505ffdef668916785181adeea61153a444057728f3de9f2,2025-04-14T13:53:30.877000 CVE-2025-29189,0,0,8f05af4418320348346691aa7f962df7a836889ea838607875b166fe868cccb7,2025-04-09T20:02:41.860000 CVE-2025-2919,0,0,b96ce7ce0f34936fb136f2b1ffc6459c07bdc587830fdf6a756fc40e2dfb516f,2025-04-01T20:26:39.627000 CVE-2025-2920,0,0,2401864f099a711f30f8b2d38398a72d7195f85541e7f19ba35b8b1ff663c52a,2025-04-01T20:26:39.627000 @@ -288076,8 +288081,8 @@ CVE-2025-30288,0,0,2cd26c4e99eade9fe4bcc24953e47056f07c6d39632d06bceb551cd8d86f7 CVE-2025-30289,0,0,8f48179603b010834692b67823472cb86cc697c14e571abee7ed2cd3dbb4515d,2025-04-09T20:02:41.860000 CVE-2025-3029,0,0,4233f9fe2c15ae070846afc464376435b2c22dc54bb1ae100ef75b468d792887,2025-04-07T13:31:33.743000 CVE-2025-30290,0,0,6f893833437291deb8fbb2322de2982f9eef638dfc164661994353e52e717a27,2025-04-09T20:02:41.860000 -CVE-2025-30291,0,0,be64480373a53935a5c873966693c9a68bd6c296cec2c80b4ad0a637f8d74fb2,2025-04-09T20:02:41.860000 -CVE-2025-30292,0,0,288ee8184606598fa06ab8359d36b9c03496cbe391e0e3db0838b6a31796a766,2025-04-09T20:02:41.860000 +CVE-2025-30291,0,1,0473260a55bcbc254e4050f9189e3db07faeb587413b0e155bd3d64489f7efa3,2025-04-14T15:26:47.470000 +CVE-2025-30292,0,1,3e4f7c22f08308c313ba2352bafd20592d5f6ffab99962cdfee668ba5f921588,2025-04-14T15:57:32.107000 CVE-2025-30293,0,0,db4f2b68590150fc49d9958b7bc828fd4cca7eb0d17ed45c39ceecbe6a2f01b0,2025-04-09T20:02:41.860000 CVE-2025-30294,0,0,ac65318d95205a52bc76cf00ee37c391b744f644d390380fbff4be5d3c011da6,2025-04-09T20:02:41.860000 CVE-2025-30295,0,0,dc143ca0187d672e7c6ff588d91b302f09c8ef01a93f1300ec72037012254c74,2025-04-11T12:49:05.523000 @@ -288131,7 +288136,7 @@ CVE-2025-30369,0,0,7412c62e90d5e3220c161795a9019d5e7bfe5a889eaf1873e87c11a292e41 CVE-2025-3037,0,0,886d48305a6b5a336fe2d42d2ee117171b630af941071b4684c6f67945ecc485,2025-04-01T20:26:11.547000 CVE-2025-30370,0,0,2de42281682fa273e344bf2c04c64567a3dca7296e2e179568bc67f79e5803cc,2025-04-07T14:18:34.453000 CVE-2025-30371,0,0,8ff85bdbf2a4594146d78a4da113723d7e8bf8a5680b38bebfd9011a19854cc9,2025-03-28T18:11:40.180000 -CVE-2025-30372,0,0,32daa4e3d93b30f2b744ee52f4396440a5c163a53bf54c8f5b6ab05c81ad326e,2025-03-28T18:11:40.180000 +CVE-2025-30372,0,1,0cc530d1558400af5dcb04dc0b762af95ce906515836bf4d6ae6cbbb79b00942,2025-04-14T14:49:16.873000 CVE-2025-30373,0,0,9fd9207fa251f338adafa2796470af71155f3a2c3aa1274f47f5a2901265696a,2025-04-08T18:14:17.307000 CVE-2025-3038,0,0,7234e6f6a94363915d71af8eaa721ba5266f9fea3f40b45b2439e5206630faa1,2025-04-01T20:26:11.547000 CVE-2025-3039,0,0,846a42b19421afceedab84a2e86fa6d7400b7dcea08d5d7721ac60a629dd9b39,2025-04-01T20:26:11.547000 @@ -288829,7 +288834,7 @@ CVE-2025-31556,0,0,e22292e80f35bf368682d9d742874f73bcb30f5bd683c56b21ea3c8f54c38 CVE-2025-31557,0,0,e5a6e976d594a292a95a15aef79b8bcf3c73a0902fdc936e7356b8f126cfe70c,2025-04-01T20:26:30.593000 CVE-2025-31558,0,0,4f9ab9df71a01b3edec7c9b6e12175606be553c7c4418449c810ee8495b4c937,2025-04-07T14:18:34.453000 CVE-2025-31559,0,0,41f201b8bcb6b562b908f794250b712a35b1349655dc3d5a536008c2f2bfc83c,2025-04-01T20:26:30.593000 -CVE-2025-31560,0,1,dcb5f77078704835d067a771e33ed7cea5b5725ffe3d37afa7558fa7b23a17a8,2025-04-14T12:41:00.653000 +CVE-2025-31560,0,0,dcb5f77078704835d067a771e33ed7cea5b5725ffe3d37afa7558fa7b23a17a8,2025-04-14T12:41:00.653000 CVE-2025-31561,0,0,3491d1f7344c08c4ef3e0b71025b723d510b39b39ca933a00cd3e46db49b6060,2025-04-02T14:58:07.527000 CVE-2025-31562,0,0,c9f83d50f8736622879eaf2efa4f3a1f520dbddd9f9c99f22d513577500eeba5,2025-04-01T20:26:30.593000 CVE-2025-31563,0,0,9dbeb566529f2bf77ed2ce1cded916c338efc12b79101caea2e49ffdbfd5b0e3,2025-04-02T14:58:07.527000 @@ -289093,7 +289098,7 @@ CVE-2025-31855,0,0,d55c86d3560d96dde7a5179b32a0379cfce78ebdfaf1c7df8d7c3b8e79c8f CVE-2025-31856,0,0,0248194a78eecf2d863abcad99ee94c931b3dcf86c540b294d40102a454fea41,2025-04-01T20:26:01.990000 CVE-2025-31857,0,0,c85e0f3d20c02eebd816fd920d050000778bfbfa60b9a16a7a7c62aca289efce,2025-04-01T20:26:01.990000 CVE-2025-31858,0,0,c5ae3168254e6a4fa34c285f28cb290840c0f513ccc212e6e5acc0e6198fbd69,2025-04-07T14:18:34.453000 -CVE-2025-31859,0,1,fb615c48f5039a344c362386723b91b31c7da467ed603db93c960fda3fc187f5,2025-04-14T12:15:15.967000 +CVE-2025-31859,0,0,fb615c48f5039a344c362386723b91b31c7da467ed603db93c960fda3fc187f5,2025-04-14T12:15:15.967000 CVE-2025-3186,0,0,384e5a16dba57b8a5de30e6ceace74b50b440a544e36ab772c53943186c8f6c2,2025-04-07T14:18:34.453000 CVE-2025-31860,0,0,76a3ba7f83b66ebb55fe84587ab2b108006b732aca8969b4b1620fb6c3c1a61f,2025-04-01T20:26:01.990000 CVE-2025-31861,0,0,73f821b5e49dc31de4be6c94456199eec0b884624798216788a1fead1da33e7f,2025-04-01T20:26:01.990000 @@ -289306,7 +289311,7 @@ CVE-2025-32197,0,0,9015dc09d736c1911f40f670cb788ac3b792bf9f583af13ccfdaef937a5ac CVE-2025-32198,0,0,fcba2ef56fc242c949fe3a7c0d0ba29a1e2804adcfdc1f053d51b90cb7920d5c,2025-04-11T15:39:52.920000 CVE-2025-32199,0,0,db8d5bb5874eb93efde8b717df72a1e646c48e4f06f264cf4f93586678b9afbe,2025-04-11T15:39:52.920000 CVE-2025-3220,0,0,68a1e253763ae83b10f883538d3dc97c4faab92eb133c1d05898610d685699de,2025-04-07T14:18:15.560000 -CVE-2025-32200,0,0,7cf18b7b37d0d27dff4a641eb8bd35d4cb62891dcc5af6db3df627348245c784,2025-04-07T14:18:15.560000 +CVE-2025-32200,0,1,3952d9138f82d877e9368a4e92c1c40c14c507d73f7de3d00eb49b8b5960efb0,2025-04-14T14:15:24.357000 CVE-2025-32201,0,0,c30dde8a770665eecb97510bd235216757d92d8b32e9ebc803312276adc6d8db,2025-04-07T14:18:15.560000 CVE-2025-32202,0,0,0aa97cbd4699dc8f28f3c8de98209daa819726efedffb2baf628d00ae58aa636,2025-04-11T15:39:52.920000 CVE-2025-32203,0,0,ccab89d569b75f5768d43417a599956989a9fbbb3877e27459871c8e919b0be4,2025-04-07T14:18:15.560000 @@ -289378,7 +289383,7 @@ CVE-2025-32271,0,0,9fbd8c287d18a7fdcbecec1f68bf28db33e450ae2930193d3112f73e124b1 CVE-2025-32272,0,0,94cc9160174845bb5d667fcb1fbdea45ff406fc4e1b26142be412d9fc8572fa0,2025-04-07T14:17:50.220000 CVE-2025-32273,0,0,9c22eab1b89ff91a4f3663ce8b356fa4af4b702c1b0085a936338c0c086adbf3,2025-04-07T14:17:50.220000 CVE-2025-32274,0,0,0eca68fbad040b4858c60bf1e368b1919e5128143f7bda40b1bca9fd3149e1ec,2025-04-07T14:17:50.220000 -CVE-2025-32275,0,1,9b03b15b752eb4c24edeb4f25a8d2fee1ab7745106e4b2ae8ef894ee5ab0870c,2025-04-14T12:36:13.380000 +CVE-2025-32275,0,0,9b03b15b752eb4c24edeb4f25a8d2fee1ab7745106e4b2ae8ef894ee5ab0870c,2025-04-14T12:36:13.380000 CVE-2025-32276,0,0,2d58307e46b7067efedf11f095121f96b501a153603912c43d4654278d1c5d86,2025-04-07T14:17:50.220000 CVE-2025-32277,0,0,4c5beb804b84b7552a54d4404f6c409936619f520f5ab7f2060d18f52aa242ee,2025-04-07T14:17:50.220000 CVE-2025-32278,0,0,211d6ed6ada58eb335634d812d6f25038c2a3c7f1bf1fde12b2879747a714849,2025-04-07T14:17:50.220000 @@ -289613,7 +289618,16 @@ CVE-2025-3286,0,0,8139d6e6df664199f354424e68610fbc2f4bc55f3ac9ae6ea11f766fff222a CVE-2025-3287,0,0,506736b5e0376194047aa5beabc2406cc40c6682d560c154acdc11c5838ee81f,2025-04-08T18:13:53.347000 CVE-2025-3288,0,0,f38b6103c86e4b43a603efa2302f1894dd9c86a56576c13140616463a055f77c,2025-04-08T18:13:53.347000 CVE-2025-3289,0,0,2dce3ef8eb88e8d6d3c6bdcdd7b6d448658ce48e819de5faca8e16dde3fc5df6,2025-04-08T18:13:53.347000 +CVE-2025-32906,1,1,fb9d85602ff9a756286f50ce3f118b269750d949eceb55c379ab314e1295c7b6,2025-04-14T14:15:24.433000 +CVE-2025-32907,1,1,e92eef766791cf4cd09dfd2b639044776a677c02ebd7999eb3d4b94e89feb3b3,2025-04-14T14:15:24.580000 +CVE-2025-32908,1,1,03fc3b9f2dd9d68b6123098aab6218bf1c3f03f04edfe9f146fb65fea69f9507,2025-04-14T14:15:24.717000 +CVE-2025-32909,1,1,a3f45d7152edd1ecbc5302539951fb3ef96b82d7df4eb7462d2c241a5e09a729,2025-04-14T15:15:25.140000 +CVE-2025-32910,1,1,38906567602bbe9c89a9589d146a0970e25f993a7eeae2aefe10b37a9c458398,2025-04-14T15:15:25.307000 +CVE-2025-32912,1,1,d33de40cd0f2adfe8bcd4894cbd2f85eba79dd1273db6220e05c79c9309fc9aa,2025-04-14T15:15:25.477000 +CVE-2025-32913,1,1,d57ad36165f59819d303ec9ab2813ff5e3bf6501be5718c19b238e301d12630b,2025-04-14T14:15:24.860000 +CVE-2025-32914,1,1,de999727d5bce94a114462e2bc1bde19e09dd5cdd0f1e24a89bd7f2b18826694,2025-04-14T15:15:25.633000 CVE-2025-3292,0,0,2e1db750cfd1563a06db7ac495c3f640edc42fb0c4158d03489de1beb7a4ae8f,2025-04-12T07:15:27.143000 +CVE-2025-32930,1,1,7aa7721c6427b0edc6ca10f6fa05a98645a2b1c5fcd736b40f97d37f2fbc0637,2025-04-14T15:15:25.787000 CVE-2025-3296,0,0,604544c60030717a0b7298a4216c2cee6c0b09dc746101c73c6d715c2da17326,2025-04-08T16:49:21.037000 CVE-2025-3297,0,0,450f027df383ac012c0d670b8246ab459ec83da0d22f33695d8eb8051ee5200e,2025-04-08T16:49:12.910000 CVE-2025-3298,0,0,289613560130dabe199eea55128a1bdfe9eecd882e62238f3674c43e858ef0bc,2025-04-08T16:49:00.290000 @@ -289666,7 +289680,7 @@ CVE-2025-3351,0,0,75d173e50fe13168cdd19d26c865bf0928f2f75c26c1a14aec760a5844bf68 CVE-2025-3352,0,0,c6cfb3216143a7ec970b5c4f1e54b733e0ef74e4ed2381db01e6f7672b9d3e99,2025-04-07T14:17:50.220000 CVE-2025-3353,0,0,9a3a0526e92697556541e5bcfa649004dd818da06b323f35a5c71a34f78996a7,2025-04-11T12:55:09.550000 CVE-2025-3359,0,0,f3e98ccd04870ba3c6cba92a4ead09c0ba209f3867b79e029c9424afb29b2a1e,2025-04-07T14:17:50.220000 -CVE-2025-3360,0,1,ba2e275701dcb3901d34802acb858c60ad53b7a788bf246a267d6619963301a5,2025-04-14T12:15:16.087000 +CVE-2025-3360,0,0,ba2e275701dcb3901d34802acb858c60ad53b7a788bf246a267d6619963301a5,2025-04-14T12:15:16.087000 CVE-2025-3361,0,0,1fe2ec8a64bc635c81624d6e5c98311c550cae1314a855e35bf93ef979c92b53,2025-04-08T18:13:53.347000 CVE-2025-3362,0,0,f2596ce87f1b2ee767410b87c3d50eab6e0dd63bddff8a5282aeb95847ff2bc3,2025-04-08T18:13:53.347000 CVE-2025-3363,0,0,0bfec75432dde717fba421cd754f82c62be00bc647a979275627a87dda1e3b02,2025-04-08T18:13:53.347000 @@ -289772,8 +289786,12 @@ CVE-2025-3560,0,0,a7cddb2590ad9e4942994b9243c698125e232b09adb6d8d2f79d36ff9da22d CVE-2025-3561,0,0,b6b168f8020aef56b4333eb1773c57250755070a100ae536ac6b140c613aba89,2025-04-14T10:15:14.843000 CVE-2025-3562,0,0,66d9c3c5d1ce7a45b81322b388da73a344af64aa59e999cf442a48e617a93f9b,2025-04-14T11:15:15.293000 CVE-2025-3563,0,0,d57c7920d8bdc7e665e2962f3e91fd4cc7ec38019bc538055bde0c88595a9a1e,2025-04-14T11:15:15.480000 -CVE-2025-3564,1,1,61ab2dac1f2079939373c922bc043da0b05ecff8559635a9ec7f1c4bf9ea3955,2025-04-14T12:15:16.447000 -CVE-2025-3565,1,1,a61a23cff061d7abb2e7e7f59d0adaac2beac785d57c25534ce13641b77ae48c,2025-04-14T12:15:16.627000 -CVE-2025-3566,1,1,66d41c0fefbb9033112dbee7cbb88864d78a3fa5ca54d5466d1b8c7892033182,2025-04-14T13:15:17.247000 -CVE-2025-3567,1,1,68195c2973f4b9308c466a01f36590051dbb6f6f31aac024df9f7bc433a95228,2025-04-14T13:15:17.417000 +CVE-2025-3564,0,0,61ab2dac1f2079939373c922bc043da0b05ecff8559635a9ec7f1c4bf9ea3955,2025-04-14T12:15:16.447000 +CVE-2025-3565,0,0,a61a23cff061d7abb2e7e7f59d0adaac2beac785d57c25534ce13641b77ae48c,2025-04-14T12:15:16.627000 +CVE-2025-3566,0,1,10caafbc38e2e6c3039a8caeb70dd4b0d4ce12120915009170936d12a2ac8f34,2025-04-14T14:15:25.373000 +CVE-2025-3567,0,0,68195c2973f4b9308c466a01f36590051dbb6f6f31aac024df9f7bc433a95228,2025-04-14T13:15:17.417000 +CVE-2025-3568,1,1,a64b7e44716ed68a0ddbfba74311c2092133b41c3642a3b2ba527807193a37b4,2025-04-14T14:15:25.630000 +CVE-2025-3569,1,1,94334ea1a3fe530ff2ae4efa820c42155fe775a22ec3ecf489f5f07a7824990e,2025-04-14T14:15:25.813000 +CVE-2025-3570,1,1,cf9fb78e19d7bef088f008e110fad665be6507ce3e02644cb83c14c976813f4a,2025-04-14T15:15:26.333000 +CVE-2025-3571,1,1,ecbd38f1dd68cd57740a5e744a7de933b00ac8d7568d5c608e813bfbb8b7e530,2025-04-14T15:15:26.523000 CVE-2025-3572,0,0,ce93ec390a9611703e154796a1c8b29e4cb3ba90d0f017a2ea9b391560345b34,2025-04-14T03:15:17