diff --git a/CVE-2018/CVE-2018-130xx/CVE-2018-13065.json b/CVE-2018/CVE-2018-130xx/CVE-2018-13065.json index 8a3d0fe3716..b87b468c189 100644 --- a/CVE-2018/CVE-2018-130xx/CVE-2018-13065.json +++ b/CVE-2018/CVE-2018-130xx/CVE-2018-13065.json @@ -2,7 +2,7 @@ "id": "CVE-2018-13065", "sourceIdentifier": "cve@mitre.org", "published": "2018-07-03T12:29:00.280", - "lastModified": "2024-11-21T03:46:19.947", + "lastModified": "2025-07-03T20:59:18.650", "vulnStatus": "Modified", "cveTags": [ { @@ -92,8 +92,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:trustwave:modsecurity:3.0.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FDF4D909-3D3C-4892-AB0A-4ED0D5892D27" + "criteria": "cpe:2.3:a:owasp:modsecurity:3.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BD24C8F2-171D-4F9B-A330-8C5AB8A0AB8A" } ] } diff --git a/CVE-2019/CVE-2019-198xx/CVE-2019-19886.json b/CVE-2019/CVE-2019-198xx/CVE-2019-19886.json index edea441334d..f917a7e1918 100644 --- a/CVE-2019/CVE-2019-198xx/CVE-2019-19886.json +++ b/CVE-2019/CVE-2019-198xx/CVE-2019-19886.json @@ -2,7 +2,7 @@ "id": "CVE-2019-19886", "sourceIdentifier": "cve@mitre.org", "published": "2020-01-21T22:15:15.667", - "lastModified": "2024-11-21T04:35:35.320", + "lastModified": "2025-07-03T20:59:18.650", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -85,10 +85,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:owasp:modsecurity:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.0.0", "versionEndIncluding": "3.0.3", - "matchCriteriaId": "7055FD9B-AAC8-4DD0-9A8E-F4706D9B9567" + "matchCriteriaId": "BC1A8633-B080-4068-84D1-B78F169C8433" } ] } diff --git a/CVE-2019/CVE-2019-250xx/CVE-2019-25043.json b/CVE-2019/CVE-2019-250xx/CVE-2019-25043.json index f67db751f4e..6068adbc05a 100644 --- a/CVE-2019/CVE-2019-250xx/CVE-2019-25043.json +++ b/CVE-2019/CVE-2019-250xx/CVE-2019-25043.json @@ -2,7 +2,7 @@ "id": "CVE-2019-25043", "sourceIdentifier": "cve@mitre.org", "published": "2021-05-06T17:15:07.870", - "lastModified": "2024-11-21T04:39:48.770", + "lastModified": "2025-07-03T20:59:18.650", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -85,10 +85,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:owasp:modsecurity:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.0.0", "versionEndExcluding": "3.0.4", - "matchCriteriaId": "AD97575A-E930-4326-9DA8-6FED031AAE9E" + "matchCriteriaId": "13225CD3-317E-4091-BD30-C747AD5AD6D3" } ] } diff --git a/CVE-2020/CVE-2020-155xx/CVE-2020-15598.json b/CVE-2020/CVE-2020-155xx/CVE-2020-15598.json index 181b5c6ac9d..b39b99c59a9 100644 --- a/CVE-2020/CVE-2020-155xx/CVE-2020-15598.json +++ b/CVE-2020/CVE-2020-155xx/CVE-2020-15598.json @@ -2,7 +2,7 @@ "id": "CVE-2020-15598", "sourceIdentifier": "cve@mitre.org", "published": "2020-10-06T14:15:12.197", - "lastModified": "2024-11-21T05:05:49.910", + "lastModified": "2025-07-03T20:59:18.650", "vulnStatus": "Modified", "cveTags": [ { @@ -92,10 +92,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:owasp:modsecurity:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.0.0", "versionEndIncluding": "3.0.4", - "matchCriteriaId": "ADACE97D-F823-4A69-B0A3-065D7AFACCB2" + "matchCriteriaId": "11AA43E8-866E-45AD-91B6-06AAC118DECC" } ] } diff --git a/CVE-2021/CVE-2021-204xx/CVE-2021-20455.json b/CVE-2021/CVE-2021-204xx/CVE-2021-20455.json index 27f6fced7f6..dde710aed29 100644 --- a/CVE-2021/CVE-2021-204xx/CVE-2021-20455.json +++ b/CVE-2021/CVE-2021-204xx/CVE-2021-20455.json @@ -2,8 +2,8 @@ "id": "CVE-2021-20455", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-07T16:15:27.430", - "lastModified": "2025-01-07T16:15:27.430", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-03T20:49:27.313", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,49 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cognos_controller:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.0.0", + "versionEndIncluding": "11.0.1", + "matchCriteriaId": "FACCAE0A-7AE8-4E8A-A407-191C260B6F91" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:controller:11.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4DB99931-249F-4650-9612-B96803DEE909" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7179163", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-427xx/CVE-2021-42717.json b/CVE-2021/CVE-2021-427xx/CVE-2021-42717.json index f03e9f66b9e..7929fe65a40 100644 --- a/CVE-2021/CVE-2021-427xx/CVE-2021-42717.json +++ b/CVE-2021/CVE-2021-427xx/CVE-2021-42717.json @@ -2,7 +2,7 @@ "id": "CVE-2021-42717", "sourceIdentifier": "cve@mitre.org", "published": "2021-12-07T22:15:06.950", - "lastModified": "2024-11-21T06:28:01.980", + "lastModified": "2025-07-03T20:59:18.650", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -85,17 +85,17 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*", - "versionStartIncluding": "2.0.0", - "versionEndExcluding": "2.9.5", - "matchCriteriaId": "A7085082-64B3-4129-89D3-DCABF3C627A4" + "criteria": "cpe:2.3:a:owasp:modsecurity:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0.0", + "versionEndExcluding": "3.0.6", + "matchCriteriaId": "989FAEB2-1A84-481E-BB56-793113C4714C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*", - "versionStartIncluding": "3.0.0", - "versionEndExcluding": "3.0.6", - "matchCriteriaId": "8A1F00F0-6D1E-42BC-850E-BFBB7685BE0C" + "versionStartIncluding": "2.0.0", + "versionEndExcluding": "2.9.5", + "matchCriteriaId": "A7085082-64B3-4129-89D3-DCABF3C627A4" } ] } diff --git a/CVE-2022/CVE-2022-223xx/CVE-2022-22363.json b/CVE-2022/CVE-2022-223xx/CVE-2022-22363.json index 11ebec1ce41..b16b09d6f24 100644 --- a/CVE-2022/CVE-2022-223xx/CVE-2022-22363.json +++ b/CVE-2022/CVE-2022-223xx/CVE-2022-22363.json @@ -2,8 +2,8 @@ "id": "CVE-2022-22363", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-07T16:15:28.050", - "lastModified": "2025-01-07T16:15:28.050", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-03T20:49:29.930", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,49 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cognos_controller:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.0.0", + "versionEndIncluding": "11.0.1", + "matchCriteriaId": "FACCAE0A-7AE8-4E8A-A407-191C260B6F91" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:controller:11.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4DB99931-249F-4650-9612-B96803DEE909" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7179163", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-391xx/CVE-2022-39163.json b/CVE-2022/CVE-2022-391xx/CVE-2022-39163.json index cbe1a29670a..eb0437a77cc 100644 --- a/CVE-2022/CVE-2022-391xx/CVE-2022-39163.json +++ b/CVE-2022/CVE-2022-391xx/CVE-2022-39163.json @@ -2,8 +2,8 @@ "id": "CVE-2022-39163", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-03-26T14:15:20.793", - "lastModified": "2025-03-27T16:45:27.850", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-03T20:52:01.790", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,49 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cognos_controller:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.0.0", + "versionEndIncluding": "11.0.1", + "matchCriteriaId": "FACCAE0A-7AE8-4E8A-A407-191C260B6F91" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:controller:11.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4DB99931-249F-4650-9612-B96803DEE909" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7192746", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-482xx/CVE-2022-48279.json b/CVE-2022/CVE-2022-482xx/CVE-2022-48279.json index 87981249758..d5362b874cf 100644 --- a/CVE-2022/CVE-2022-482xx/CVE-2022-48279.json +++ b/CVE-2022/CVE-2022-482xx/CVE-2022-48279.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48279", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-20T19:15:17.783", - "lastModified": "2025-04-03T19:15:38.917", + "lastModified": "2025-07-03T20:59:18.650", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -90,16 +90,16 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*", - "versionEndExcluding": "2.9.6", - "matchCriteriaId": "54497FC8-5BF6-4E81-9C7E-F01AEBCB2AD1" + "criteria": "cpe:2.3:a:owasp:modsecurity:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0.0", + "versionEndExcluding": "3.0.8", + "matchCriteriaId": "69019657-283B-4BA6-8983-57318F8736EE" }, { "vulnerable": true, "criteria": "cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*", - "versionStartIncluding": "3.0.0", - "versionEndExcluding": "3.0.8", - "matchCriteriaId": "D3B974C9-92E4-4493-9C5F-8CF1F8A74068" + "versionEndExcluding": "2.9.6", + "matchCriteriaId": "54497FC8-5BF6-4E81-9C7E-F01AEBCB2AD1" } ] } diff --git a/CVE-2023/CVE-2023-288xx/CVE-2023-28882.json b/CVE-2023/CVE-2023-288xx/CVE-2023-28882.json index 39c53f8e016..075fedad08d 100644 --- a/CVE-2023/CVE-2023-288xx/CVE-2023-28882.json +++ b/CVE-2023/CVE-2023-288xx/CVE-2023-28882.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28882", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-28T04:15:38.017", - "lastModified": "2025-01-30T21:15:10.640", + "lastModified": "2025-07-03T20:59:18.650", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -86,10 +86,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:owasp:modsecurity:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.0.5", "versionEndExcluding": "3.0.9", - "matchCriteriaId": "E45908C1-75D7-49A7-86EE-07B4305BDA04" + "matchCriteriaId": "F57A821A-277E-4B3D-BC5D-395812BF62A1" } ] } diff --git a/CVE-2023/CVE-2023-382xx/CVE-2023-38285.json b/CVE-2023/CVE-2023-382xx/CVE-2023-38285.json index 0b95df44cc4..5f0821ffa2e 100644 --- a/CVE-2023/CVE-2023-382xx/CVE-2023-38285.json +++ b/CVE-2023/CVE-2023-382xx/CVE-2023-38285.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38285", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-26T21:15:10.207", - "lastModified": "2024-11-21T08:13:13.803", + "lastModified": "2025-07-03T20:59:18.650", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -56,10 +56,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:owasp:modsecurity:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.0.0", "versionEndExcluding": "3.0.10", - "matchCriteriaId": "314D5544-E20D-482F-9F39-DE5AA72B1972" + "matchCriteriaId": "792A16CE-6CB0-40F7-AC60-157D78EF3B6E" } ] } diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1019.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1019.json index e1c572594f5..ff4e2c9156b 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1019.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1019.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1019", "sourceIdentifier": "vulnerability@ncsc.ch", "published": "2024-01-30T16:15:47.123", - "lastModified": "2025-02-13T18:16:18.837", + "lastModified": "2025-07-03T20:59:18.650", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -90,10 +90,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:owasp:modsecurity:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.0.0", "versionEndExcluding": "3.0.12", - "matchCriteriaId": "52EBFAFE-523F-46B7-9631-4FA866ABC2D0" + "matchCriteriaId": "2DEAC2CF-18AC-4EE6-960B-D07FD3ABBCA5" } ] } diff --git a/CVE-2024/CVE-2024-250xx/CVE-2024-25037.json b/CVE-2024/CVE-2024-250xx/CVE-2024-25037.json index e9b54a30d9c..67fb0137c51 100644 --- a/CVE-2024/CVE-2024-250xx/CVE-2024-25037.json +++ b/CVE-2024/CVE-2024-250xx/CVE-2024-25037.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25037", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-07T16:15:32.937", - "lastModified": "2025-01-07T16:15:32.937", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-03T20:49:32.580", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,49 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cognos_controller:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.0.0", + "versionEndIncluding": "11.0.1", + "matchCriteriaId": "FACCAE0A-7AE8-4E8A-A407-191C260B6F91" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:controller:11.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4DB99931-249F-4650-9612-B96803DEE909" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7179163", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-250xx/CVE-2024-25048.json b/CVE-2024/CVE-2024-250xx/CVE-2024-25048.json index f95e6d3d02c..7643c443b64 100644 --- a/CVE-2024/CVE-2024-250xx/CVE-2024-25048.json +++ b/CVE-2024/CVE-2024-250xx/CVE-2024-25048.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25048", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-04-27T12:15:10.517", - "lastModified": "2024-11-21T09:00:09.860", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-03T20:45:20.627", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,60 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:mq_appliance:*:*:*:*:lts:*:*:*", + "versionStartIncluding": "9.3.0.0", + "versionEndExcluding": "9.3.0.17", + "matchCriteriaId": "82C3FB30-0B59-4831-A99E-542B8EA1A39D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:mq_appliance:*:*:*:*:continuous_delivery:*:*:*", + "versionStartIncluding": "9.3.0.0", + "versionEndExcluding": "9.3.5", + "matchCriteriaId": "FC53A9D0-EC7C-4576-9D95-59BDE4DFCA99" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/283137", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7149481", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/283137", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7149481", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28778.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28778.json index b8de9662150..73096834269 100644 --- a/CVE-2024/CVE-2024-287xx/CVE-2024-28778.json +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28778.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28778", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-07T16:15:33.113", - "lastModified": "2025-01-07T16:15:33.113", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-03T20:49:35.697", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,49 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cognos_controller:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.0.0", + "versionEndIncluding": "11.0.1", + "matchCriteriaId": "FACCAE0A-7AE8-4E8A-A407-191C260B6F91" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:controller:11.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4DB99931-249F-4650-9612-B96803DEE909" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7179163", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31879.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31879.json index 17220bce05c..6212fdbed6e 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31879.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31879.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31879", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-05-18T16:15:47.253", - "lastModified": "2024-11-21T09:14:04.690", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-03T20:54:15.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,73 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:i:7.2:*:*:*:*:*:*:*", + "matchCriteriaId": "5E41BD05-37B8-4494-9344-506D4BCF43C2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:i:7.3:*:*:*:*:*:*:*", + "matchCriteriaId": "DD4F4919-D935-4B81-B4E8-0E0F2DAC09B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:i:7.4:*:*:*:*:*:*:*", + "matchCriteriaId": "AE2B298C-E1F6-43BD-A5EF-83964C6669CE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C684FC45-C9BA-4EF0-BD06-BB289450DD21" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/287539", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7154380", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/287539", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7154380", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-351xx/CVE-2024-35122.json b/CVE-2024/CVE-2024-351xx/CVE-2024-35122.json index 2559f6907fa..a72dd6b4ca7 100644 --- a/CVE-2024/CVE-2024-351xx/CVE-2024-35122.json +++ b/CVE-2024/CVE-2024-351xx/CVE-2024-35122.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35122", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-24T18:15:31.680", - "lastModified": "2025-01-24T18:15:31.680", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-03T20:54:09.190", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,69 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:i:7.2:*:*:*:*:*:*:*", + "matchCriteriaId": "5E41BD05-37B8-4494-9344-506D4BCF43C2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:i:7.3:*:*:*:*:*:*:*", + "matchCriteriaId": "DD4F4919-D935-4B81-B4E8-0E0F2DAC09B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:i:7.4:*:*:*:*:*:*:*", + "matchCriteriaId": "AE2B298C-E1F6-43BD-A5EF-83964C6669CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:i:7.5:*:*:*:*:*:*:*", + "matchCriteriaId": "88B74622-BDB2-43AE-A91F-FADEC4B64B4F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C684FC45-C9BA-4EF0-BD06-BB289450DD21" + } + ] + } + ] } ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7178317", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40702.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40702.json index 3a6ae743beb..0cecf51fea1 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40702.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40702.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40702", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-07T16:15:33.463", - "lastModified": "2025-01-07T16:15:33.463", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-03T20:49:39.400", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,49 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cognos_controller:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.0.0", + "versionEndIncluding": "11.0.1", + "matchCriteriaId": "FACCAE0A-7AE8-4E8A-A407-191C260B6F91" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:controller:11.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4DB99931-249F-4650-9612-B96803DEE909" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7179163", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47104.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47104.json index 39e72c7d3db..0a4e7276d3f 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47104.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47104.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47104", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-12-18T11:15:05.763", - "lastModified": "2024-12-18T11:15:05.763", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-03T20:54:13.533", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,47 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:i:7.4:*:*:*:*:*:*:*", + "matchCriteriaId": "AE2B298C-E1F6-43BD-A5EF-83964C6669CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:i:7.5:*:*:*:*:*:*:*", + "matchCriteriaId": "88B74622-BDB2-43AE-A91F-FADEC4B64B4F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C684FC45-C9BA-4EF0-BD06-BB289450DD21" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7179158", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51463.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51463.json index b0d6a1d49d1..a82e9d27ef8 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51463.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51463.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51463", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-12-21T14:15:21.453", - "lastModified": "2024-12-21T14:15:21.453", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-03T20:54:12.200", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,52 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:i:7.3:*:*:*:*:*:*:*", + "matchCriteriaId": "DD4F4919-D935-4B81-B4E8-0E0F2DAC09B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:i:7.4:*:*:*:*:*:*:*", + "matchCriteriaId": "AE2B298C-E1F6-43BD-A5EF-83964C6669CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:i:7.5:*:*:*:*:*:*:*", + "matchCriteriaId": "88B74622-BDB2-43AE-A91F-FADEC4B64B4F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C684FC45-C9BA-4EF0-BD06-BB289450DD21" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7179509", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51464.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51464.json index 38187f0590d..01593d93ffd 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51464.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51464.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51464", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-12-21T14:15:21.627", - "lastModified": "2024-12-31T07:15:11.307", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-03T20:54:10.780", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,59 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:i:7.3:*:*:*:*:*:*:*", + "matchCriteriaId": "DD4F4919-D935-4B81-B4E8-0E0F2DAC09B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:i:7.4:*:*:*:*:*:*:*", + "matchCriteriaId": "AE2B298C-E1F6-43BD-A5EF-83964C6669CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:i:7.5:*:*:*:*:*:*:*", + "matchCriteriaId": "88B74622-BDB2-43AE-A91F-FADEC4B64B4F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C684FC45-C9BA-4EF0-BD06-BB289450DD21" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7179509", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Dec/20", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51471.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51471.json index 0fc52fd138c..e4bb9dd50f8 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51471.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51471.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51471", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-12-19T18:15:23.153", - "lastModified": "2024-12-19T18:15:23.153", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-03T20:23:41.563", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:mq_appliance:*:*:*:*:lts:*:*:*", + "versionStartIncluding": "9.3.0.0", + "versionEndIncluding": "9.3.0.26", + "matchCriteriaId": "EA509E6E-9C3B-4468-AD5B-58132A4E181F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:mq_appliance:*:*:*:*:continuous_delivery:*:*:*", + "versionStartIncluding": "9.3.0.0", + "versionEndIncluding": "9.4.0.7", + "matchCriteriaId": "EF207429-0AA6-4061-83E8-3DE1DC9C38BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:mq_appliance:*:*:*:*:lts:*:*:*", + "versionStartIncluding": "9.4.0.0", + "versionEndIncluding": "9.4.0.7", + "matchCriteriaId": "F6E0C4F1-A99A-4529-B112-E09801488CC6" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7178243", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-528xx/CVE-2024-52895.json b/CVE-2024/CVE-2024-528xx/CVE-2024-52895.json index b2d3682e1d5..9d4a5c3ab25 100644 --- a/CVE-2024/CVE-2024-528xx/CVE-2024-52895.json +++ b/CVE-2024/CVE-2024-528xx/CVE-2024-52895.json @@ -2,8 +2,8 @@ "id": "CVE-2024-52895", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-14T15:15:09.210", - "lastModified": "2025-02-14T15:15:09.210", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-03T20:54:07.270", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,52 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:i:7.4:*:*:*:*:*:*:*", + "matchCriteriaId": "AE2B298C-E1F6-43BD-A5EF-83964C6669CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:i:7.5:*:*:*:*:*:*:*", + "matchCriteriaId": "88B74622-BDB2-43AE-A91F-FADEC4B64B4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:i:7.6:*:*:*:*:*:*:*", + "matchCriteriaId": "8C189EC3-7D9F-4303-BB5C-1013FAE59B1E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C684FC45-C9BA-4EF0-BD06-BB289450DD21" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7183052", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-528xx/CVE-2024-52898.json b/CVE-2024/CVE-2024-528xx/CVE-2024-52898.json index 4dfad7f7fae..98daa0ee21e 100644 --- a/CVE-2024/CVE-2024-528xx/CVE-2024-52898.json +++ b/CVE-2024/CVE-2024-528xx/CVE-2024-52898.json @@ -2,8 +2,8 @@ "id": "CVE-2024-52898", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-14T17:15:17.513", - "lastModified": "2025-01-14T17:15:17.513", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-03T20:10:10.747", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,68 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:mq:*:*:*:*:continuous_delivery:*:*:*", + "versionStartIncluding": "9.3.0", + "versionEndIncluding": "9.4.1.1", + "matchCriteriaId": "28ABEF51-4E90-4FBB-860F-90B998AA1566" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:mq:*:*:*:*:lts:*:*:*", + "versionStartIncluding": "9.3.0.0", + "versionEndIncluding": "9.3.0.26", + "matchCriteriaId": "13020BB1-FE49-496E-A07B-C0A9FA3C90B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:mq:*:*:*:*:lts:*:*:*", + "versionStartIncluding": "9.4.0.0", + "versionEndIncluding": "9.4.0.7", + "matchCriteriaId": "EDBDC0CD-0CDB-45F2-92F6-23FB06DC4C69" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:ibm:linux_on_ibm_z:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B955E472-47E3-4C32-847B-F6BB05594BA3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7179150", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-541xx/CVE-2024-54173.json b/CVE-2024/CVE-2024-541xx/CVE-2024-54173.json index 9e5321cafb8..b403dec600c 100644 --- a/CVE-2024/CVE-2024-541xx/CVE-2024-54173.json +++ b/CVE-2024/CVE-2024-541xx/CVE-2024-54173.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54173", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-28T03:15:09.357", - "lastModified": "2025-02-28T03:15:09.357", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-03T20:44:08.330", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:mq_appliance:*:*:*:*:continuous_delivery:*:*:*", + "versionEndExcluding": "9.4.2", + "matchCriteriaId": "55660FDA-F75A-4E16-B669-460A7AE0257D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:mq_appliance:*:*:*:*:lts:*:*:*", + "versionStartIncluding": "9.3.0.0", + "versionEndExcluding": "9.3.0.27", + "matchCriteriaId": "ADBA5611-3469-4892-9634-CDF2B50C07A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:mq_appliance:*:*:*:*:lts:*:*:*", + "versionStartIncluding": "9.4.0.0", + "versionEndExcluding": "9.4.0.10", + "matchCriteriaId": "83CB7333-6E78-431C-AEE1-AB60FEB0425F" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7183370", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-558xx/CVE-2024-55898.json b/CVE-2024/CVE-2024-558xx/CVE-2024-55898.json index d6e334fb283..646edad34a9 100644 --- a/CVE-2024/CVE-2024-558xx/CVE-2024-55898.json +++ b/CVE-2024/CVE-2024-558xx/CVE-2024-55898.json @@ -2,8 +2,8 @@ "id": "CVE-2024-55898", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-24T02:15:31.940", - "lastModified": "2025-02-24T02:15:31.940", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-03T20:52:55.190", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,57 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:i:7.2:*:*:*:*:*:*:*", + "matchCriteriaId": "5E41BD05-37B8-4494-9344-506D4BCF43C2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:i:7.3:*:*:*:*:*:*:*", + "matchCriteriaId": "DD4F4919-D935-4B81-B4E8-0E0F2DAC09B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:i:7.4:*:*:*:*:*:*:*", + "matchCriteriaId": "AE2B298C-E1F6-43BD-A5EF-83964C6669CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:i:7.5:*:*:*:*:*:*:*", + "matchCriteriaId": "88B74622-BDB2-43AE-A91F-FADEC4B64B4F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C684FC45-C9BA-4EF0-BD06-BB289450DD21" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7183835", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-09xx/CVE-2025-0975.json b/CVE-2025/CVE-2025-09xx/CVE-2025-0975.json index 3de7a7647b5..3294a795b41 100644 --- a/CVE-2025/CVE-2025-09xx/CVE-2025-0975.json +++ b/CVE-2025/CVE-2025-09xx/CVE-2025-0975.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0975", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-28T03:15:10.653", - "lastModified": "2025-02-28T03:15:10.653", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-03T20:41:35.323", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:mq_appliance:*:*:*:*:continuous_delivery:*:*:*", + "versionStartIncluding": "9.3.0", + "versionEndIncluding": "9.4.2", + "matchCriteriaId": "F690720D-CBF3-4021-8CBC-8B208C438A6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:mq_appliance:*:*:*:*:lts:*:*:*", + "versionStartIncluding": "9.3.0.0", + "versionEndIncluding": "9.3.0.27", + "matchCriteriaId": "4612ED09-CAC4-44A2-A638-C7D41DB68D79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:mq_appliance:*:*:*:*:lts:*:*:*", + "versionStartIncluding": "9.4.0.0", + "versionEndIncluding": "9.4.0.10", + "matchCriteriaId": "88ABC52C-FBCA-4647-AE56-0969138712CA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7183467", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-232xx/CVE-2025-23225.json b/CVE-2025/CVE-2025-232xx/CVE-2025-23225.json index abc76f439b0..473df1886f8 100644 --- a/CVE-2025/CVE-2025-232xx/CVE-2025-23225.json +++ b/CVE-2025/CVE-2025-232xx/CVE-2025-23225.json @@ -2,8 +2,8 @@ "id": "CVE-2025-23225", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-28T03:15:10.807", - "lastModified": "2025-02-28T03:15:10.807", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-03T20:25:35.343", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:mq_appliance:*:*:*:*:continuous_delivery:*:*:*", + "versionEndIncluding": "9.4.2", + "matchCriteriaId": "0938AD98-E093-4E0E-B0FB-2257E9DF2159" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:mq_appliance:*:*:*:*:lts:*:*:*", + "versionStartIncluding": "9.3.0.0", + "versionEndIncluding": "9.3.0.27", + "matchCriteriaId": "4612ED09-CAC4-44A2-A638-C7D41DB68D79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:mq_appliance:*:*:*:*:lts:*:*:*", + "versionStartIncluding": "9.4.0.0", + "versionEndIncluding": "9.4.0.10", + "matchCriteriaId": "88ABC52C-FBCA-4647-AE56-0969138712CA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7183372", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2866.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2866.json index 0eeed647f58..49e6ff89ebd 100644 --- a/CVE-2025/CVE-2025-28xx/CVE-2025-2866.json +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2866.json @@ -2,7 +2,7 @@ "id": "CVE-2025-2866", "sourceIdentifier": "security@documentfoundation.org", "published": "2025-04-27T19:15:15.137", - "lastModified": "2025-05-12T19:05:52.590", + "lastModified": "2025-07-03T21:26:26.980", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -66,20 +66,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 9.8, - "baseSeverity": "CRITICAL", - "attackVector": "NETWORK", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", - "userInteraction": "NONE", + "userInteraction": "REQUIRED", "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", + "confidentialityImpact": "NONE", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" + "availabilityImpact": "NONE" }, - "exploitabilityScore": 3.9, - "impactScore": 5.9 + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2950.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2950.json index 98497b061f9..a1435fc86bc 100644 --- a/CVE-2025/CVE-2025-29xx/CVE-2025-2950.json +++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2950.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2950", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-04-18T15:15:58.937", - "lastModified": "2025-04-21T14:23:45.950", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-03T20:53:15.263", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,57 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:i:7.3:*:*:*:*:*:*:*", + "matchCriteriaId": "DD4F4919-D935-4B81-B4E8-0E0F2DAC09B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:i:7.4:*:*:*:*:*:*:*", + "matchCriteriaId": "AE2B298C-E1F6-43BD-A5EF-83964C6669CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:i:7.5:*:*:*:*:*:*:*", + "matchCriteriaId": "88B74622-BDB2-43AE-A91F-FADEC4B64B4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:i:7.6:*:*:*:*:*:*:*", + "matchCriteriaId": "8C189EC3-7D9F-4303-BB5C-1013FAE59B1E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C684FC45-C9BA-4EF0-BD06-BB289450DD21" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7231320", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-32xx/CVE-2025-3218.json b/CVE-2025/CVE-2025-32xx/CVE-2025-3218.json index 25a67e72523..abfc5eb07e0 100644 --- a/CVE-2025/CVE-2025-32xx/CVE-2025-3218.json +++ b/CVE-2025/CVE-2025-32xx/CVE-2025-3218.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3218", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-05-07T02:15:31.860", - "lastModified": "2025-05-07T14:13:20.483", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-03T20:53:29.017", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,62 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:i:7.2:*:*:*:*:*:*:*", + "matchCriteriaId": "5E41BD05-37B8-4494-9344-506D4BCF43C2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:i:7.3:*:*:*:*:*:*:*", + "matchCriteriaId": "DD4F4919-D935-4B81-B4E8-0E0F2DAC09B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:i:7.4:*:*:*:*:*:*:*", + "matchCriteriaId": "AE2B298C-E1F6-43BD-A5EF-83964C6669CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:i:7.5:*:*:*:*:*:*:*", + "matchCriteriaId": "88B74622-BDB2-43AE-A91F-FADEC4B64B4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:i:7.6:*:*:*:*:*:*:*", + "matchCriteriaId": "8C189EC3-7D9F-4303-BB5C-1013FAE59B1E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C684FC45-C9BA-4EF0-BD06-BB289450DD21" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7232750", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-331xx/CVE-2025-33122.json b/CVE-2025/CVE-2025-331xx/CVE-2025-33122.json index b3e821e6a5d..928d437cb90 100644 --- a/CVE-2025/CVE-2025-331xx/CVE-2025-33122.json +++ b/CVE-2025/CVE-2025-331xx/CVE-2025-33122.json @@ -2,13 +2,17 @@ "id": "CVE-2025-33122", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-06-17T18:15:25.580", - "lastModified": "2025-06-17T20:50:23.507", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-03T20:53:32.687", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM i 7.2, 7.3, 7.4, 7.5, and 7.6 could allow a user to gain elevated privileges due to an unqualified library call in IBM Advanced Job Scheduler for i. A malicious actor could cause user-controlled code to run with administrator privilege." + }, + { + "lang": "es", + "value": "IBM i 7.2, 7.3, 7.4, 7.5 y 7.6 podr\u00eda permitir que un usuario obtenga privilegios elevados debido a una llamada de librer\u00eda no cualificada en IBM Advanced Job Scheduler para i. Un agente malicioso podr\u00eda provocar que c\u00f3digo controlado por el usuario se ejecute con privilegios de administrador." } ], "metrics": { @@ -47,10 +51,62 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:i:7.2:*:*:*:*:*:*:*", + "matchCriteriaId": "5E41BD05-37B8-4494-9344-506D4BCF43C2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:i:7.3:*:*:*:*:*:*:*", + "matchCriteriaId": "DD4F4919-D935-4B81-B4E8-0E0F2DAC09B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:i:7.4:*:*:*:*:*:*:*", + "matchCriteriaId": "AE2B298C-E1F6-43BD-A5EF-83964C6669CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:i:7.5:*:*:*:*:*:*:*", + "matchCriteriaId": "88B74622-BDB2-43AE-A91F-FADEC4B64B4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:i:7.6:*:*:*:*:*:*:*", + "matchCriteriaId": "8C189EC3-7D9F-4303-BB5C-1013FAE59B1E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C684FC45-C9BA-4EF0-BD06-BB289450DD21" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7237040", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-340xx/CVE-2025-34061.json b/CVE-2025/CVE-2025-340xx/CVE-2025-34061.json new file mode 100644 index 00000000000..8b8c6715212 --- /dev/null +++ b/CVE-2025/CVE-2025-340xx/CVE-2025-34061.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-34061", + "sourceIdentifier": "disclosure@vulncheck.com", + "published": "2025-07-03T20:15:21.570", + "lastModified": "2025-07-03T20:15:21.570", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A backdoor in PHPStudy versions 2016 through 2018 allows unauthenticated remote attackers to execute arbitrary PHP code on affected installations. The backdoor listens for base64-encoded PHP payloads in the Accept-Charset HTTP header of incoming requests, decodes and executes the payload without proper validation. This leads to remote code execution as the web server user, compromising the affected system." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/phpstudy_backdoor_rce.rb", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://www.xp.cn/phpstudy", + "source": "disclosure@vulncheck.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-340xx/CVE-2025-34082.json b/CVE-2025/CVE-2025-340xx/CVE-2025-34082.json new file mode 100644 index 00000000000..9d7f547bcd2 --- /dev/null +++ b/CVE-2025/CVE-2025-340xx/CVE-2025-34082.json @@ -0,0 +1,90 @@ +{ + "id": "CVE-2025-34082", + "sourceIdentifier": "disclosure@vulncheck.com", + "published": "2025-07-03T20:15:22.540", + "lastModified": "2025-07-03T20:15:22.540", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A command injection vulnerability exists in IGEL OS versions prior to 11.04.270 within the Secure Terminal and Secure Shadow services. The flaw arises due to improper input sanitization in the handling of specially crafted PROXYCMD commands on TCP ports 30022 and 5900. An unauthenticated attacker with network access to a vulnerable device can inject arbitrary commands, leading to remote code execution with elevated privileges.\n\nNOTE: IGEL OS v10.x has reached end-of-life (EOL) status." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://kb.igel.com/security-safety/current/isn-2021-01-igel-os-remote-command-execution-vulne", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/misc/igel_command_injection.rb", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://vulncheck.com/advisories/igel-os-secure-terminal-shadow-rce", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://www.igel.com/wp-content/uploads/2021/02/lxos_11.04.270.txt", + "source": "disclosure@vulncheck.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-340xx/CVE-2025-34086.json b/CVE-2025/CVE-2025-340xx/CVE-2025-34086.json new file mode 100644 index 00000000000..58af1fc5065 --- /dev/null +++ b/CVE-2025/CVE-2025-340xx/CVE-2025-34086.json @@ -0,0 +1,102 @@ +{ + "id": "CVE-2025-34086", + "sourceIdentifier": "disclosure@vulncheck.com", + "published": "2025-07-03T20:15:22.683", + "lastModified": "2025-07-03T20:15:22.683", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Bolt CMS versions 3.7.0 and earlier contain a chain of vulnerabilities that together allow an authenticated user to achieve remote code execution. A user with valid credentials can inject arbitrary PHP code into the displayname field of the user profile, which is rendered unsanitized in backend templates. The attacker can then list and rename cached session files via the /async/browse/cache/.sessions and /async/folder/rename endpoints. By renaming a .session file to a path under the publicly accessible /files/ directory with a .php extension, the attacker can turn the injected code into an executable web shell. Finally, the attacker triggers the payload via a crafted HTTP GET request to the rogue file.\n\nNOTE: The vendor announced that Bolt 3 reached end-of-life after 31 December 2021." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + }, + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://boltcms.io/newsitem/major-announcements-bolt-3-eol-bolt-4-2-5-0-releases", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://github.com/bolt/bolt", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://github.com/bolt/bolt/releases/tag/3.7.1", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/bolt_authenticated_rce.rb", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://www.exploit-db.com/exploits/48296", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://www.rapid7.com/db/modules/exploit/unix/webapp/bolt_authenticated_rce/", + "source": "disclosure@vulncheck.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-340xx/CVE-2025-34087.json b/CVE-2025/CVE-2025-340xx/CVE-2025-34087.json new file mode 100644 index 00000000000..8a10d2995b0 --- /dev/null +++ b/CVE-2025/CVE-2025-340xx/CVE-2025-34087.json @@ -0,0 +1,94 @@ +{ + "id": "CVE-2025-34087", + "sourceIdentifier": "disclosure@vulncheck.com", + "published": "2025-07-03T20:15:22.843", + "lastModified": "2025-07-03T20:15:22.843", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An authenticated command injection vulnerability exists in Pi-hole versions up to 3.3. When adding a domain to the allowlist via the web interface, the domain parameter is not properly sanitized, allowing an attacker to append OS commands to the domain string. These commands are executed on the underlying operating system with the privileges of the Pi-hole service user.\n\n\n\n\nThis behavior was present in the legacy AdminLTE interface and has since been patched in later versions." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/pi-hole/web/releases/tag/v4.0", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://pi-hole.net/", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://pulsesecurity.co.nz/advisories/pihole-v3.3-vulns", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/http/pihole_whitelist_exec.rb", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://vulncheck.com/advisories/pihole-adminlte-whitelist-rce", + "source": "disclosure@vulncheck.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-340xx/CVE-2025-34088.json b/CVE-2025/CVE-2025-340xx/CVE-2025-34088.json new file mode 100644 index 00000000000..2ca1a3339a0 --- /dev/null +++ b/CVE-2025/CVE-2025-340xx/CVE-2025-34088.json @@ -0,0 +1,94 @@ +{ + "id": "CVE-2025-34088", + "sourceIdentifier": "disclosure@vulncheck.com", + "published": "2025-07-03T20:15:23.007", + "lastModified": "2025-07-03T20:15:23.007", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An authenticated remote code execution vulnerability exists in Pandora FMS version 7.0NG and earlier. The net_tools.php functionality allows authenticated users to execute arbitrary OS commands via the select_ips parameter when performing network tools operations, such as pinging. This occurs because user input is not properly sanitized before being passed to system commands, enabling command injection." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/pandorafms/pandorafms", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/pandora_ping_cmd_exec.rb", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://vulncheck.com/advisories/pandora-fms-rce-via-ping", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://www.exploit-db.com/exploits/48334", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://www.rapid7.com/db/modules/exploit/linux/http/pandora_ping_cmd_exec/", + "source": "disclosure@vulncheck.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-340xx/CVE-2025-34089.json b/CVE-2025/CVE-2025-340xx/CVE-2025-34089.json new file mode 100644 index 00000000000..b6391ce9429 --- /dev/null +++ b/CVE-2025/CVE-2025-340xx/CVE-2025-34089.json @@ -0,0 +1,98 @@ +{ + "id": "CVE-2025-34089", + "sourceIdentifier": "disclosure@vulncheck.com", + "published": "2025-07-03T20:15:23.157", + "lastModified": "2025-07-03T20:15:23.157", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An unauthenticated remote code execution vulnerability exists in Remote for Mac, a macOS remote control utility developed by Aexol Studio, in versions up to and including 2025.7. When the application is configured with authentication disabled (i.e., the \"Allow unknown devices\" option is enabled), the /api/executeScript endpoint is exposed without access control. This allows unauthenticated remote attackers to inject arbitrary AppleScript payloads via the X-Script HTTP header, resulting in code execution using do shell script. Successful exploitation grants attackers the ability to run arbitrary commands on the macOS host with the privileges of the Remote for Mac background process." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + }, + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "references": [ + { + "url": "https://apps.apple.com/us/app/remote-for-mac/id1086962925", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://packetstorm.news/files/id/195347", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/osx/http/remote_for_mac_rce.rb", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://vulncheck.com/advisories/remote-for-mac-rce", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://www.rapid7.com/db/modules/exploit/osx/http/remote_for_mac_rce/", + "source": "disclosure@vulncheck.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-360xx/CVE-2025-36004.json b/CVE-2025/CVE-2025-360xx/CVE-2025-36004.json index c5c18a24c74..d44ce061b5d 100644 --- a/CVE-2025/CVE-2025-360xx/CVE-2025-36004.json +++ b/CVE-2025/CVE-2025-360xx/CVE-2025-36004.json @@ -2,8 +2,8 @@ "id": "CVE-2025-36004", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-06-25T03:15:27.687", - "lastModified": "2025-06-26T18:58:14.280", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-03T20:53:35.667", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,57 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:i:7.2:*:*:*:*:*:*:*", + "matchCriteriaId": "5E41BD05-37B8-4494-9344-506D4BCF43C2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:i:7.3:*:*:*:*:*:*:*", + "matchCriteriaId": "DD4F4919-D935-4B81-B4E8-0E0F2DAC09B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:i:7.4:*:*:*:*:*:*:*", + "matchCriteriaId": "AE2B298C-E1F6-43BD-A5EF-83964C6669CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:i:7.5:*:*:*:*:*:*:*", + "matchCriteriaId": "88B74622-BDB2-43AE-A91F-FADEC4B64B4F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C684FC45-C9BA-4EF0-BD06-BB289450DD21" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7237732", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-490xx/CVE-2025-49005.json b/CVE-2025/CVE-2025-490xx/CVE-2025-49005.json new file mode 100644 index 00000000000..4b953fe057c --- /dev/null +++ b/CVE-2025/CVE-2025-490xx/CVE-2025-49005.json @@ -0,0 +1,72 @@ +{ + "id": "CVE-2025-49005", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-07-03T21:15:26.787", + "lastModified": "2025-07-03T21:15:26.787", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Next.js is a React framework for building full-stack web applications. In Next.js App Router from 15.3.0 to before 15.3.3 and Vercel CLI from 41.4.1 to 42.2.0, a cache poisoning vulnerability was found. The issue allowed page requests for HTML content to return a React Server Component (RSC) payload instead under certain conditions. When deployed to Vercel, this would only impact the browser cache, and would not lead to the CDN being poisoned. When self-hosted and deployed externally, this could lead to cache poisoning if the CDN does not properly distinguish between RSC / HTML in the cache keys. This issue has been resolved in Next.js 15.3.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 3.7, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-444" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/vercel/next.js/commit/ec202eccf05820b60c6126d6411fe16766ecc066", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/vercel/next.js/issues/79346", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/vercel/next.js/releases/tag/v15.3.3", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/vercel/next.js/security/advisories/GHSA-r2fc-ccr8-96c4", + "source": "security-advisories@github.com" + }, + { + "url": "https://vercel.com/changelog/cve-2025-49005", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-498xx/CVE-2025-49826.json b/CVE-2025/CVE-2025-498xx/CVE-2025-49826.json new file mode 100644 index 00000000000..753744745d4 --- /dev/null +++ b/CVE-2025/CVE-2025-498xx/CVE-2025-49826.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2025-49826", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-07-03T21:15:27.287", + "lastModified": "2025-07-03T21:15:27.287", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Next.js is a React framework for building full-stack web applications. From versions 15.1.0 to before 15.1.8, a cache poisoning bug leading to a Denial of Service (DoS) condition was found in Next.js. This issue does not impact customers hosted on Vercel. Under certain conditions, this issue may allow a HTTP 204 response to be cached for static pages, leading to the 204 response being served to all users attempting to access the page. This issue has been addressed in version 15.1.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-444" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/vercel/next.js/commit/a15b974ed707d63ad4da5b74c1441f5b7b120e93", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/vercel/next.js/releases/tag/v15.1.8", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/vercel/next.js/security/advisories/GHSA-67rr-84xm-4c7r", + "source": "security-advisories@github.com" + }, + { + "url": "https://vercel.com/changelog/cve-2025-49826", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-525xx/CVE-2025-52554.json b/CVE-2025/CVE-2025-525xx/CVE-2025-52554.json new file mode 100644 index 00000000000..335352cec25 --- /dev/null +++ b/CVE-2025/CVE-2025-525xx/CVE-2025-52554.json @@ -0,0 +1,90 @@ +{ + "id": "CVE-2025-52554", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-07-03T20:15:23.423", + "lastModified": "2025-07-03T20:15:23.423", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "n8n is a workflow automation platform. Prior to version 1.99.1, an authorization vulnerability was discovered in the /rest/executions/:id/stop endpoint of n8n. An authenticated user can stop workflow executions that they do not own or that have not been shared with them, leading to potential business disruption. This issue has been patched in version 1.99.1. A workaround involves restricting access to the /rest/executions/:id/stop endpoint via reverse proxy or API gateway." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/dudanogueira/n8n/commit/ca2f90c7fbaa1d661ade2f45d587d9469bc287e1", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/n8n-io/n8n/commit/e5edc60e344924230baafb11fa1f0af788e9ca9a", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/n8n-io/n8n/pull/16405", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/n8n-io/n8n/security/advisories/GHSA-gq57-v332-7666", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-533xx/CVE-2025-53367.json b/CVE-2025/CVE-2025-533xx/CVE-2025-53367.json new file mode 100644 index 00000000000..a8e459f389d --- /dev/null +++ b/CVE-2025/CVE-2025-533xx/CVE-2025-53367.json @@ -0,0 +1,90 @@ +{ + "id": "CVE-2025-53367", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-07-03T21:15:27.493", + "lastModified": "2025-07-03T21:15:27.493", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "DjVuLibre is a GPL implementation of DjVu, a web-centric format for distributing documents and images. Prior to version 3.5.29, the MMRDecoder::scanruns method is affected by an OOB-write vulnerability, because it does not check that the xr pointer stays within the bounds of the allocated buffer. This can lead to writes beyond the allocated memory, resulting in a heap corruption condition. An out-of-bounds read with pr is also possible for the same reason. This issue has been patched in version 3.5.29." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "ACTIVE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + }, + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://github.blog/security/vulnerability-research/cve-2025-53367-an-exploitable-out-of-bounds-write-in-djvulibre/", + "source": "security-advisories@github.com" + }, + { + "url": "https://sourceforge.net/p/djvu/djvulibre-git/ci/33f645196593d70bd5e37f55b63886c31c82c3da", + "source": "security-advisories@github.com" + }, + { + "url": "https://www.openwall.com/lists/oss-security/2025/07/03/1", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-533xx/CVE-2025-53368.json b/CVE-2025/CVE-2025-533xx/CVE-2025-53368.json new file mode 100644 index 00000000000..e12b45ebf5c --- /dev/null +++ b/CVE-2025/CVE-2025-533xx/CVE-2025-53368.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-53368", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-07-03T20:15:23.577", + "lastModified": "2025-07-03T20:15:23.577", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Citizen is a MediaWiki skin that makes extensions part of the cohesive experience. From versions 1.9.4 to before 3.4.0, page descriptions are inserted into raw HTML without proper sanitization by the Citizen skin when using the old search bar. Any user with page editing privileges can insert cross-site scripting (XSS) payloads into the DOM for other users who are searching for specific pages. This issue has been patched in version 3.4.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/StarCitizenTools/mediawiki-skins-Citizen/commit/aedbceb3380bb48db6b59e272fc187529c71c8ca", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/StarCitizenTools/mediawiki-skins-Citizen/releases/tag/v3.4.0", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/StarCitizenTools/mediawiki-skins-Citizen/security/advisories/GHSA-rq6g-6g94-jfr4", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-533xx/CVE-2025-53369.json b/CVE-2025/CVE-2025-533xx/CVE-2025-53369.json new file mode 100644 index 00000000000..b9a24934bc8 --- /dev/null +++ b/CVE-2025/CVE-2025-533xx/CVE-2025-53369.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-53369", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-07-03T20:15:23.737", + "lastModified": "2025-07-03T20:15:23.737", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Short Description is a MediaWiki extension that provides local short description support. In version 4.0.0, short descriptions are not properly sanitized before being inserted as HTML using mw.util.addSubtitle, allowing any user to insert arbitrary HTML into the DOM by editing a page. This issue has been patched in version 4.0.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/StarCitizenTools/mediawiki-extensions-ShortDescription/commit/bc4fdbaeb1dff127fb6d08c0d385b64aa128c8f8", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/StarCitizenTools/mediawiki-extensions-ShortDescription/security/advisories/GHSA-p85q-mww9-gwqf", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-533xx/CVE-2025-53370.json b/CVE-2025/CVE-2025-533xx/CVE-2025-53370.json new file mode 100644 index 00000000000..75f5fa22e1a --- /dev/null +++ b/CVE-2025/CVE-2025-533xx/CVE-2025-53370.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-53370", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-07-03T20:15:23.893", + "lastModified": "2025-07-03T20:15:23.893", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Citizen is a MediaWiki skin that makes extensions part of the cohesive experience. From versions 1.9.4 to before 3.4.0, short descriptions set via the ShortDescription extension are inserted as raw HTML by the Citizen skin, allowing any user to insert arbitrary HTML into the DOM by editing a page. This issue has been patched in version 3.4.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/StarCitizenTools/mediawiki-skins-Citizen/commit/c85a40bddc8651fff66df83a72debddcb34f0521", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/StarCitizenTools/mediawiki-skins-Citizen/releases/tag/v3.4.0", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/StarCitizenTools/mediawiki-skins-Citizen/security/advisories/GHSA-prmv-7r8c-794g", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 705b209b290..edf62ffe1a4 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-07-03T20:00:10.776070+00:00 +2025-07-03T22:00:12.312723+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-07-03T19:55:16.553000+00:00 +2025-07-03T21:26:26.980000+00:00 ``` ### Last Data Feed Release @@ -33,33 +33,57 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -300236 +300249 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `13` -- [CVE-2025-23968](CVE-2025/CVE-2025-239xx/CVE-2025-23968.json) (`2025-07-03T19:15:23.043`) -- [CVE-2025-45809](CVE-2025/CVE-2025-458xx/CVE-2025-45809.json) (`2025-07-03T19:15:24.027`) +- [CVE-2025-34061](CVE-2025/CVE-2025-340xx/CVE-2025-34061.json) (`2025-07-03T20:15:21.570`) +- [CVE-2025-34082](CVE-2025/CVE-2025-340xx/CVE-2025-34082.json) (`2025-07-03T20:15:22.540`) +- [CVE-2025-34086](CVE-2025/CVE-2025-340xx/CVE-2025-34086.json) (`2025-07-03T20:15:22.683`) +- [CVE-2025-34087](CVE-2025/CVE-2025-340xx/CVE-2025-34087.json) (`2025-07-03T20:15:22.843`) +- [CVE-2025-34088](CVE-2025/CVE-2025-340xx/CVE-2025-34088.json) (`2025-07-03T20:15:23.007`) +- [CVE-2025-34089](CVE-2025/CVE-2025-340xx/CVE-2025-34089.json) (`2025-07-03T20:15:23.157`) +- [CVE-2025-49005](CVE-2025/CVE-2025-490xx/CVE-2025-49005.json) (`2025-07-03T21:15:26.787`) +- [CVE-2025-49826](CVE-2025/CVE-2025-498xx/CVE-2025-49826.json) (`2025-07-03T21:15:27.287`) +- [CVE-2025-52554](CVE-2025/CVE-2025-525xx/CVE-2025-52554.json) (`2025-07-03T20:15:23.423`) +- [CVE-2025-53367](CVE-2025/CVE-2025-533xx/CVE-2025-53367.json) (`2025-07-03T21:15:27.493`) +- [CVE-2025-53368](CVE-2025/CVE-2025-533xx/CVE-2025-53368.json) (`2025-07-03T20:15:23.577`) +- [CVE-2025-53369](CVE-2025/CVE-2025-533xx/CVE-2025-53369.json) (`2025-07-03T20:15:23.737`) +- [CVE-2025-53370](CVE-2025/CVE-2025-533xx/CVE-2025-53370.json) (`2025-07-03T20:15:23.893`) ### CVEs modified in the last Commit -Recently modified CVEs: `12` +Recently modified CVEs: `33` -- [CVE-2023-45177](CVE-2023/CVE-2023-451xx/CVE-2023-45177.json) (`2025-07-03T19:37:40.087`) -- [CVE-2024-10013](CVE-2024/CVE-2024-100xx/CVE-2024-10013.json) (`2025-07-03T18:30:06.820`) -- [CVE-2024-3892](CVE-2024/CVE-2024-38xx/CVE-2024-3892.json) (`2025-07-03T18:30:06.820`) -- [CVE-2024-52896](CVE-2024/CVE-2024-528xx/CVE-2024-52896.json) (`2025-07-03T19:52:42.310`) -- [CVE-2024-52897](CVE-2024/CVE-2024-528xx/CVE-2024-52897.json) (`2025-07-03T19:55:16.553`) -- [CVE-2025-0332](CVE-2025/CVE-2025-03xx/CVE-2025-0332.json) (`2025-07-03T18:30:06.820`) -- [CVE-2025-53489](CVE-2025/CVE-2025-534xx/CVE-2025-53489.json) (`2025-07-03T18:15:21.710`) -- [CVE-2025-53490](CVE-2025/CVE-2025-534xx/CVE-2025-53490.json) (`2025-07-03T18:15:22.000`) -- [CVE-2025-53500](CVE-2025/CVE-2025-535xx/CVE-2025-53500.json) (`2025-07-03T18:15:22.140`) -- [CVE-2025-53501](CVE-2025/CVE-2025-535xx/CVE-2025-53501.json) (`2025-07-03T18:15:22.300`) -- [CVE-2025-53502](CVE-2025/CVE-2025-535xx/CVE-2025-53502.json) (`2025-07-03T18:15:22.530`) -- [CVE-2025-6926](CVE-2025/CVE-2025-69xx/CVE-2025-6926.json) (`2025-07-03T18:15:22.797`) +- [CVE-2022-48279](CVE-2022/CVE-2022-482xx/CVE-2022-48279.json) (`2025-07-03T20:59:18.650`) +- [CVE-2023-28882](CVE-2023/CVE-2023-288xx/CVE-2023-28882.json) (`2025-07-03T20:59:18.650`) +- [CVE-2023-38285](CVE-2023/CVE-2023-382xx/CVE-2023-38285.json) (`2025-07-03T20:59:18.650`) +- [CVE-2024-1019](CVE-2024/CVE-2024-10xx/CVE-2024-1019.json) (`2025-07-03T20:59:18.650`) +- [CVE-2024-25037](CVE-2024/CVE-2024-250xx/CVE-2024-25037.json) (`2025-07-03T20:49:32.580`) +- [CVE-2024-25048](CVE-2024/CVE-2024-250xx/CVE-2024-25048.json) (`2025-07-03T20:45:20.627`) +- [CVE-2024-28778](CVE-2024/CVE-2024-287xx/CVE-2024-28778.json) (`2025-07-03T20:49:35.697`) +- [CVE-2024-31879](CVE-2024/CVE-2024-318xx/CVE-2024-31879.json) (`2025-07-03T20:54:15.167`) +- [CVE-2024-35122](CVE-2024/CVE-2024-351xx/CVE-2024-35122.json) (`2025-07-03T20:54:09.190`) +- [CVE-2024-40702](CVE-2024/CVE-2024-407xx/CVE-2024-40702.json) (`2025-07-03T20:49:39.400`) +- [CVE-2024-47104](CVE-2024/CVE-2024-471xx/CVE-2024-47104.json) (`2025-07-03T20:54:13.533`) +- [CVE-2024-51463](CVE-2024/CVE-2024-514xx/CVE-2024-51463.json) (`2025-07-03T20:54:12.200`) +- [CVE-2024-51464](CVE-2024/CVE-2024-514xx/CVE-2024-51464.json) (`2025-07-03T20:54:10.780`) +- [CVE-2024-51471](CVE-2024/CVE-2024-514xx/CVE-2024-51471.json) (`2025-07-03T20:23:41.563`) +- [CVE-2024-52895](CVE-2024/CVE-2024-528xx/CVE-2024-52895.json) (`2025-07-03T20:54:07.270`) +- [CVE-2024-52898](CVE-2024/CVE-2024-528xx/CVE-2024-52898.json) (`2025-07-03T20:10:10.747`) +- [CVE-2024-54173](CVE-2024/CVE-2024-541xx/CVE-2024-54173.json) (`2025-07-03T20:44:08.330`) +- [CVE-2024-55898](CVE-2024/CVE-2024-558xx/CVE-2024-55898.json) (`2025-07-03T20:52:55.190`) +- [CVE-2025-0975](CVE-2025/CVE-2025-09xx/CVE-2025-0975.json) (`2025-07-03T20:41:35.323`) +- [CVE-2025-23225](CVE-2025/CVE-2025-232xx/CVE-2025-23225.json) (`2025-07-03T20:25:35.343`) +- [CVE-2025-2866](CVE-2025/CVE-2025-28xx/CVE-2025-2866.json) (`2025-07-03T21:26:26.980`) +- [CVE-2025-2950](CVE-2025/CVE-2025-29xx/CVE-2025-2950.json) (`2025-07-03T20:53:15.263`) +- [CVE-2025-3218](CVE-2025/CVE-2025-32xx/CVE-2025-3218.json) (`2025-07-03T20:53:29.017`) +- [CVE-2025-33122](CVE-2025/CVE-2025-331xx/CVE-2025-33122.json) (`2025-07-03T20:53:32.687`) +- [CVE-2025-36004](CVE-2025/CVE-2025-360xx/CVE-2025-36004.json) (`2025-07-03T20:53:35.667`) ## Download and Usage diff --git a/_state.csv b/_state.csv index b885f0eec9f..b8e2204c6dd 100644 --- a/_state.csv +++ b/_state.csv @@ -113985,7 +113985,7 @@ CVE-2018-13056,0,0,0fe23317749ed9e00eea9e1415167bad25a33fd9014ba67553969854f4d8b CVE-2018-1306,0,0,bea8d94d1ff00097ede200bb8253961481c96dc48f2e4a96aa7d101d8debe63d,2024-11-21T03:59:35.460000 CVE-2018-13060,0,0,c522cb37a1f3774c83ab34cbb6e27000ebbe2b8a156b8f52bc6d7459a79e68e6,2024-11-21T03:46:19.630000 CVE-2018-13063,0,0,0e11be1d5aad4df7e337ae005766a3afa8674f066434f6214dfd250748990d16,2024-11-21T03:46:19.790000 -CVE-2018-13065,0,0,89b481bec61119cddb3f2f4240656749684025cf7a76df7dab011e086f4cac3b,2024-11-21T03:46:19.947000 +CVE-2018-13065,0,1,0502a4f1dc05687fba6123886f42924f613161909d0df4c42d77434c8982f0be,2025-07-03T20:59:18.650000 CVE-2018-13066,0,0,21e20efd85d39a57bc9b5ebebbaaf4771027b0bf7ca80559a34b9ceaea6c7336,2024-11-21T03:46:20.107000 CVE-2018-13067,0,0,d5036c38c930e399d7060991deafcb053fe598803de1a2ac57a8fd2d6a706507,2024-11-21T03:46:20.270000 CVE-2018-13068,0,0,01deaf6eb236af2a55573c44ce70976cf2524087499819ace8814b9b0594b0bf,2024-11-21T03:46:20.417000 @@ -137056,7 +137056,7 @@ CVE-2019-1988,0,0,f100b83ccfaba7ac4700c888f14bea035bc1262d0feb6bef34125e141a251c CVE-2019-19880,0,0,56961bcc385f69fbb5b57ddd5e17bff3bd73630c6cf0ad3907bfb47c76c37e44,2024-11-21T04:35:34.813000 CVE-2019-19882,0,0,4767c9ebb7c6699e7c88b9cc474d234bb2e31557fb910057b1d1e699a05a78fb,2024-11-21T04:35:35.013000 CVE-2019-19885,0,0,24a089eab974adab3f76ba1ba829d2c87ff36861d9794773b609c3774166fe93,2024-11-21T04:35:35.163000 -CVE-2019-19886,0,0,24b939b844b1ec4c29e868c80db6d58fbf4f3a7328df89f3158a45c93938e229,2024-11-21T04:35:35.320000 +CVE-2019-19886,0,1,b626cf3a74ad36a01562907f0eb3c1efb7422f7ea3f351dcb7f8cde84dccbe76,2025-07-03T20:59:18.650000 CVE-2019-19887,0,0,1b4c27ab499ac3f3ccb18644603feffef958a61c4c45a5d42a0ace21858142e8,2024-11-21T04:35:35.500000 CVE-2019-19888,0,0,fad83f1b8af6cd0f8e3831ff707d49102c570b14945cb23e87498fde8917270e,2024-11-21T04:35:35.640000 CVE-2019-19889,0,0,59fc9e68439967ccb5d76d16a64c226308cc1e55167f61cb61edc60a919db7a9,2024-11-21T04:35:35.787000 @@ -138508,7 +138508,7 @@ CVE-2019-2504,0,0,828265ff26ba1344fe2e1e504631d1632cc3a3fe08704ef346e38654e8527e CVE-2019-25040,0,0,1c39a614425d0a185dfd14341e0b8c22fffc999d43ec160f83c6474149a5c19c,2024-11-21T04:39:48.307000 CVE-2019-25041,0,0,0d0ea1d986f3a7461a6d93c1215cf294d8802d79216324a1c0c7cb0b80e19ce4,2024-11-21T04:39:48.453000 CVE-2019-25042,0,0,83afcef9d75ed34828028c7484fd7556082f7fb32f3d7e7a8ad987926566d468,2024-11-21T04:39:48.607000 -CVE-2019-25043,0,0,cc51ab83eabde837ae10afbfa927618df243a08eeaaa2df38bb7d0973a893f0d,2024-11-21T04:39:48.770000 +CVE-2019-25043,0,1,1b8a0ecc3020f888e8116775c6819123ebc62ab8b1a128990183a193879a2c50,2025-07-03T20:59:18.650000 CVE-2019-25044,0,0,61810aeb3c5910554b2d4bc8386d706023333efbd359f8c2d7c953b44c453ec1,2024-11-21T04:39:48.930000 CVE-2019-25045,0,0,09cabcaeef9138cb6329bdd81653131ddf30e9cd9e30914fbfb5e875a6393b90,2024-11-21T04:39:49.103000 CVE-2019-25046,0,0,3228c054ae15690663d91427ed8cd669122e632af2a8a2c645da7ff9f8046730,2024-11-21T04:39:49.297000 @@ -150574,7 +150574,7 @@ CVE-2020-15594,0,0,be4e813712be0c93c32425fede324d29afa166740217fabb21cb1f62dc5d3 CVE-2020-15595,0,0,8d9f887128952abfb7f74b9a19177926670ce837d312ed86cf29d1545ff624cb,2025-05-30T16:15:25.327000 CVE-2020-15596,0,0,5d9ab39ec3b111e8938db8208890e181a90bde06b1b2a36366757c162e681123,2024-11-21T05:05:49.603000 CVE-2020-15597,0,0,d5b4e5f41d3f76ac8685edcd9a62e7527d62e39b918aad59a53ee5a5f346da35,2024-11-21T05:05:49.757000 -CVE-2020-15598,0,0,29c4cf6a206458a549a864bb573a7abc87e995b8609723825d1a72deba575b91,2024-11-21T05:05:49.910000 +CVE-2020-15598,0,1,045b3e91055f09b47a6144205af5e53d82229ab01aa5d376c7dcf4714fc8bebf,2025-07-03T20:59:18.650000 CVE-2020-15599,0,0,4a9d09c4825dd24a93936708ad5e98cdc3b59f170d446b04fe6fecb5c9c2b10d,2024-11-21T05:05:50.060000 CVE-2020-1560,0,0,a8c70000015369f2d5cdfb750b25fa728bd280d91bb589c67133201d988a8b3d,2024-11-21T05:10:50.673000 CVE-2020-15600,0,0,b237b8b11dc3a5a6dc73908b11ddd5f11fbb129c4743fe1e8b243a02778edc88,2024-11-21T05:05:50.203000 @@ -167143,7 +167143,7 @@ CVE-2021-20450,0,0,0f5b27cc615135d792da5b34d212ed5f0166f47e7783a945ae6abd057d407 CVE-2021-20451,0,0,9dc775fdb57d0d30485c9dab41a5d5be1763fda2e61b939d002a71ad3f1c3e6d,2025-01-07T19:25:37.353000 CVE-2021-20453,0,0,69cac692ccb994b91ee56611307326b4371e627412e63b371dd093ede4578a39,2024-11-21T05:46:37.100000 CVE-2021-20454,0,0,b5a9b823983a12936ec287dc3098e2bed23b7aa3e8189b7deea101639225c258,2024-11-21T05:46:37.220000 -CVE-2021-20455,0,0,9579d97eb104245cf663ed351f720c9d41cda049c2ac8a45b98c17103813e9a9,2025-01-07T16:15:27.430000 +CVE-2021-20455,0,1,6533c862372ca8a160431b3595ab5e17630d090ffd4a6d5df03a586b43449f2b,2025-07-03T20:49:27.313000 CVE-2021-2046,0,0,ad9de75bfb455d28bedfc8d0200a0362300a00bb9087c78e5ba220afb8420fbc,2024-11-21T06:02:15.540000 CVE-2021-20461,0,0,32bb741266cc653229bac24a9612d59bf6c19ecf87f4dbca4826c2185db1cdaf,2024-11-21T05:46:37.343000 CVE-2021-20464,0,0,47ae6cb8b812d3b3a5c9f84cd7749fc1250c97a6b5585c32f4656f620f51f5cf,2024-11-21T05:46:37.480000 @@ -184347,7 +184347,7 @@ CVE-2021-42713,0,0,783571f521cb4c14c813efc36beb03a31d0b9369881123ae5eda01358e608 CVE-2021-42714,0,0,140a3cd5e613fc165c37326bf38fb922982c9fd894685b7a4d43fefb24c5cd29,2024-11-21T06:28:01.450000 CVE-2021-42715,0,0,c8bde02f0ab72afb9d2fb48b644a9a783de2cde5ac488a27334e06356251e70d,2024-11-21T06:28:01.600000 CVE-2021-42716,0,0,e8b94a98a1f8c8c4ace912bdc692f2844b824dcc8731c978eb1cf416bf562dab,2024-11-21T06:28:01.797000 -CVE-2021-42717,0,0,e0cf32cf401f390ee5050d72c9219b1b18cae5d87b497dbc59e68726d57c7a54,2024-11-21T06:28:01.980000 +CVE-2021-42717,0,1,ea16797cfdb005a2e3512f7c7575a272a18fbb601f7e772ba9df74fb015d5c99,2025-07-03T20:59:18.650000 CVE-2021-42718,0,0,f953d3282057f93e0ecf49380a977e688d87af4fa7b770ecfb8f3d28fe970821,2025-01-24T15:15:08.273000 CVE-2021-42719,0,0,232b901bd7344df0e76a38bf0733064f0ffc60bd5a3326d6e3679ce2d8d049d8,2024-11-21T06:28:02.177000 CVE-2021-4272,0,0,006f9c0c258b6542fa695fbce9f3e6480d068f1e6d826347b4056504eefe3da7,2024-11-21T06:37:17.187000 @@ -192230,7 +192230,7 @@ CVE-2022-22358,0,0,84767261124809a9d1ed519f9f64155fc6ba5ec9fdf71fddbcd7410488522 CVE-2022-22359,0,0,2bf01eb540622dca847eaacee6236e255186c1277196c7cc79e981387a737156,2024-11-21T06:46:41.857000 CVE-2022-22360,0,0,565952d652a3bdb7d639feb074a1b0e26498767df3453bcf21d65b3148621e6f,2024-11-21T06:46:41.973000 CVE-2022-22361,0,0,10b0f271693e25631ef1989315b59440c197a948d70ee3735bfc385e81ac916f,2024-11-21T06:46:42.090000 -CVE-2022-22363,0,0,2b202a27d134c656ca3512bf7b46a7d1186447ca8d907c5ddc1cf75f17241bc9,2025-01-07T16:15:28.050000 +CVE-2022-22363,0,1,7f77ac2626643aa5ab0760205911c6adc830daa1b8e544a902015cd36275489f,2025-07-03T20:49:29.930000 CVE-2022-22364,0,0,699859f56e67a1509bb3bd386cabe5337a40af606a12e422bc971d532159bce0,2025-01-07T20:16:36.033000 CVE-2022-22365,0,0,93b131a9b6677b900794e8bfb444f14fa30b748b1163134645f09fea46b11764,2024-11-21T06:46:42.330000 CVE-2022-22366,0,0,09a7cac2af7c3326b1c4db129ec697d7b77dfaf6bb69f773673a6a77e39cac91,2024-11-21T06:46:42.450000 @@ -206105,7 +206105,7 @@ CVE-2022-39159,0,0,9bab48ae0c7ec6d829fcebbd383c88265471d1b8930e73570a0438b68d4ee CVE-2022-3916,0,0,4aca84e566526af675a57765ef3d1d206a38f133fdf84532ec163834cff42294,2024-11-21T07:20:31.480000 CVE-2022-39160,0,0,e1c05f7218e8e8c347b91de7f55a473fd143199ecd24c9add0e4d0df07948ae7,2024-11-21T07:17:41.700000 CVE-2022-39161,0,0,374db153ea4a7818f93713bd5ddf1964b7dab3b6fb9e2bcd84c5b50b129436ed,2024-11-21T07:17:41.823000 -CVE-2022-39163,0,0,ffd0bbf2a05437ed15c90e539db34f6a36d44e1bf852ec0272b57d1c453312c7,2025-03-27T16:45:27.850000 +CVE-2022-39163,0,1,d6696a680484cb84b1cf221cfc56ef4602bd37d0ed911e185893320a8d1fb2e8,2025-07-03T20:52:01.790000 CVE-2022-39164,0,0,910c2790ec8cc2e31e30c18869d1a9b96cc73805e1c939b688a6b0f694e0332b,2024-11-21T07:17:41.963000 CVE-2022-39165,0,0,eb42fbb702d7c8841cd5ed9b6b61d837644be9416d74e6640b40197ec0d8edd5,2024-11-21T07:17:42.097000 CVE-2022-39166,0,0,c00a1e6b7adee19072cf36acc9786c3a6960ebaac27b755287ac7dc95805c61a,2024-11-21T07:17:42.233000 @@ -212711,7 +212711,7 @@ CVE-2022-4826,0,0,014fbd0a7a06eb9a1efd2ae2475857eaa8bde551368d94326a82d9f9341786 CVE-2022-48260,0,0,e7e60af9c858f5b5288b0031686d03e5e613b16cb37780d86f8482f3a30603dc,2025-03-11T18:15:27.073000 CVE-2022-48261,0,0,8fec913aab803791099630bb3b4add731b2952c5677136c8ab14d8481622c16b,2025-03-11T18:15:27.267000 CVE-2022-4827,0,0,5ac498be8b6ac9b553ca8c1e0b150917682d7d16bb58dc61446603771084fd8a,2025-04-23T17:16:23.617000 -CVE-2022-48279,0,0,01836a4da1b7ce33e84695b35b552ef61727c50cbe51395ee9a861662f5c5378,2025-04-03T19:15:38.917000 +CVE-2022-48279,0,1,930583aa07aa185824fc8b5024f19681066ccdc3a4efd197e8d6aa831ebd19b8,2025-07-03T20:59:18.650000 CVE-2022-4828,0,0,f9377bb9daa067b01cffcf1f42848ce8342ba75803a1ce5ee33b3c860a178da6,2025-03-27T21:15:41.490000 CVE-2022-48281,0,0,2931678421d6077742f37a8731a53914432b8c85d40568b108e6c860c0111b9e,2025-04-03T14:15:23.037000 CVE-2022-48282,0,0,faac8c954d78b5ceb7c5ce11efc8ecb3c4678623d448b6402cf0eab59411b9fa,2024-11-21T07:33:04.807000 @@ -224143,7 +224143,7 @@ CVE-2023-28876,0,0,c1806b7567a07b6cd5bad89db8f8e663f0abfbc4dc05ab4f0a81a9cd8dd1c CVE-2023-28877,0,0,e59a97403cb2ba7ba7084f8cef40e5ea548a51e665c965485b0b5cdf23b925a8,2025-02-14T20:15:33.210000 CVE-2023-28879,0,0,642e2788c974b60f2db4909bf76b55c9019d3ebeace195e897c8809c61b362e1,2025-02-14T20:15:33.373000 CVE-2023-2888,0,0,733c180cbb32ecf6bf022f0642b31e69e75e65e424d1dfab8b5653572373f8cd,2024-11-21T07:59:30.160000 -CVE-2023-28882,0,0,bc3618c2bba907bca3f9aa9f8805ff257885286929515e723c141b37d4fc5cf0,2025-01-30T21:15:10.640000 +CVE-2023-28882,0,1,b38b7b5b1152561383f3a10a2ec26e2428c241f5236e91874ab6fbba12e3ef24,2025-07-03T20:59:18.650000 CVE-2023-28883,0,0,c0783168b291b29018ec24adbce6f8c48381e8da25a234ae37ceb4b4c668cda1,2025-02-19T17:15:13.590000 CVE-2023-28884,0,0,4f01d869cc02df48ff436a2fda2a2686d4bd4e20ae90aed5def51856ad72acc5,2024-11-21T07:56:13.503000 CVE-2023-28885,0,0,635855f321f101263fbcb2e9276aa47098826711d6bc3fcc28c5b70da3ffb2db,2025-02-19T17:15:13.793000 @@ -231358,7 +231358,7 @@ CVE-2023-38276,0,0,ba9fab32a121dc0ef42130086f4b44807496059dba59bbea2f2970476887b CVE-2023-3828,0,0,d9a69961c7e52c406634fa1bb313f20f14ba2e56402fe2ed2036a17d4012d956,2024-11-21T08:18:09.677000 CVE-2023-38280,0,0,13ce1c3aab6ff4856bdf7e3dd50986942fbf0c0d949ac6c9de6fa3bc10d69b4c,2024-11-21T08:13:13.490000 CVE-2023-38283,0,0,b0b9e30c65f4e0290339c964c9b5f85a6289c436d14867fe2ee4e5cb1d122753,2024-11-21T08:13:13.623000 -CVE-2023-38285,0,0,da2582a0480178b31e05ee6a7f3183d4ab37b3ffa572c3a62ae78b08a04a99ff,2024-11-21T08:13:13.803000 +CVE-2023-38285,0,1,be61181598184d6c61a4d09916902df2a8a290bf4f8cdc904517d784094179ea,2025-07-03T20:59:18.650000 CVE-2023-38286,0,0,83ef3a91737412b90009913e8ebff4ab764f5945a5ae33dca40d59f89c0c473b,2024-11-21T08:13:13.970000 CVE-2023-38288,0,0,42c04372f9c2c296311a892fdbf8f35822187c00273983f0c4b682148291e84e,2023-11-07T04:17:14.293000 CVE-2023-38289,0,0,c8755455b071e1ec7b67b9a4bd95e1294de3beff6892cce5c0504ddaeac21ce7,2023-11-07T04:17:14.330000 @@ -236517,7 +236517,7 @@ CVE-2023-45173,0,0,ffc716553fc8735b94a901938d8197347ed303ddb90fe6dbdb91daa629d19 CVE-2023-45174,0,0,d6ae1170ae2c49c643c98705c7fcf42aed789ae182e7f2b21d1825a4cffe6ae1,2024-11-21T08:26:29.337000 CVE-2023-45175,0,0,e9d9dc1b8b95108a0e1028f29977b9916a775f3be496d71ef4dd38838b079bc5,2024-11-21T08:26:29.457000 CVE-2023-45176,0,0,7178f1a37d445800432754a582331c7315b084328b371f787f4982876607744e,2024-11-21T08:26:29.583000 -CVE-2023-45177,0,1,051509b012e93a33d01bb6006afc4c995176bdcf53452d68b6d4a85f1d62941e,2025-07-03T19:37:40.087000 +CVE-2023-45177,0,0,051509b012e93a33d01bb6006afc4c995176bdcf53452d68b6d4a85f1d62941e,2025-07-03T19:37:40.087000 CVE-2023-45178,0,0,48388e75ddb993ec5586822f1d414e30860b1c6dcdaa07936969263e3fcf2e1e,2024-11-21T08:26:29.833000 CVE-2023-4518,0,0,fbb75b273529deda855092a1cb67f347a0b773f2071130e9f10d7bdcaab77a98,2024-11-21T08:35:20.213000 CVE-2023-45181,0,0,13982b18a025246bb7ecf9ae43875f8b1c8b9fd7529debd7010d36d0494c7c4b,2025-01-14T19:46:20.940000 @@ -245429,7 +245429,7 @@ CVE-2024-1001,0,0,140fc173e33ae8fa7b986d187129f7b01af76bf1cd74c6ed57f4103bfb5a0f CVE-2024-10010,0,0,1371437a2294aadc15143f54d1c01735af263ef48293853d7cb88175f4d2421b,2025-05-07T13:28:46.577000 CVE-2024-10011,0,0,37a7a2add316aa62fc644e677a8222291d1b4d2f7d89a6ec187d4cc2ee2d4a93,2024-11-06T16:01:39.573000 CVE-2024-10012,0,0,413f959de4d29d2f4e53fa8b9bc452a97984c8f8ba413b5fa50db942e716664a,2025-01-07T15:59:23.043000 -CVE-2024-10013,0,1,a8bb9a370fd465c66ff161b98297d78ae5858d463ee55adf8fe2484bcb94bec1,2025-07-03T18:30:06.820000 +CVE-2024-10013,0,0,a8bb9a370fd465c66ff161b98297d78ae5858d463ee55adf8fe2484bcb94bec1,2025-07-03T18:30:06.820000 CVE-2024-10014,0,0,50214c84cef4e2fd21abb109362711999bfa6a60090d35936fd0e9cba0811d5b,2024-10-29T16:58:48.127000 CVE-2024-10015,0,0,217a292c789a9f8ea3b1717a9a4b42a5c13589b9293af6ac699c09a1f0997322,2024-11-18T17:11:17.393000 CVE-2024-10016,0,0,f77f52c803ffaca4f851d3ea7a048b10f89ed8d8abf952ae01a553fb73da8ac4,2024-10-25T12:56:07.750000 @@ -245602,7 +245602,7 @@ CVE-2024-10186,0,0,deebe816c0e4f08a12b999c50b1e61e2e73183dc813c2bde7d36107ba44b3 CVE-2024-10187,0,0,a05dc95bdb255244bd9cd3e7f7c3dbb2a64f03bc15ef2f7a3415c834e22630e5,2024-11-13T20:31:08.157000 CVE-2024-10188,0,0,c61f687671a4edea114714cc7533a2f1c32c140ba4fc49445959f7719db461e3,2025-03-20T10:15:14.993000 CVE-2024-10189,0,0,1a400dd56ae1b7b1d718254797ad2f77484ada3a81ab72653060886e14ceca61,2024-10-29T15:27:55.550000 -CVE-2024-1019,0,0,1d5868235f9b69470d2bff7bf38b7f5b3053179444fd5cce0cf4654caf1e5802,2025-02-13T18:16:18.837000 +CVE-2024-1019,0,1,3dbcc1303d05cdc8631d4dc3a224a6115ad2ae02d69b8efb76d46b873a91082a,2025-07-03T20:59:18.650000 CVE-2024-10190,0,0,08abe739589f974d34204d886ba2ba057303723bf0c1d7e7227eac9b798cba5e,2025-03-20T10:15:15.117000 CVE-2024-10191,0,0,61621cf6b67194bdcbf07d4a6dcee79a415e1ad518641f80cacab0f808ca6b2e,2024-10-22T14:33:12.313000 CVE-2024-10192,0,0,2c299aa344138878b9ae6bbdfd084cd35f4786dba4f095300fa5d40e9fa506cb,2024-10-22T15:09:16.517000 @@ -254092,13 +254092,13 @@ CVE-2024-25031,0,0,336ae1209bec97edf2f576f0dbcab4e5fecb1cf28a1e1d867216b37694f08 CVE-2024-25034,0,0,e9b1d3dd19b3d9085249eaa87289ff98427e36dc25cae58e678d863839e43374,2025-03-05T16:01:58.133000 CVE-2024-25035,0,0,b7214df75690f8a2c0cde375218fa064c6af31099cab5de418b369cfbfb53d96,2024-12-11T03:36:11.700000 CVE-2024-25036,0,0,a0130984c78d987e616d5d6732535de3078a91e4d686daa4bfe8d88a169b88cd,2024-12-11T03:35:51.663000 -CVE-2024-25037,0,0,406a4670a9668946e91205c5e64e1ad1fa02a4e9c65ab719dde554f47a137fd7,2025-01-07T16:15:32.937000 +CVE-2024-25037,0,1,693a224fa9cc33ca3eaa1e9222b26e6d08a7a7512e2e1e2803794e3f155c3188,2025-07-03T20:49:32.580000 CVE-2024-2504,0,0,627d67f7b2aef584579966e521c1bbe6f2f5dd132eca6ffd2bb0ce28b95c0aa0,2025-02-27T15:09:59.800000 CVE-2024-25041,0,0,c2ef0b11a47c5fcb85869011d777be135ff05637ba0b82b517f0e1a3d01142a3,2024-11-21T09:00:09.433000 CVE-2024-25042,0,0,e80197f616e9fc7028a38b26e43b05d859fe7534b854846d6b61625c0e95d8c2,2025-01-10T19:31:43.540000 CVE-2024-25046,0,0,6d8e792cef5c8fede291cc9590b8ac4d68cf095d20735d2e477f72f779be0432,2025-01-31T17:52:39.340000 CVE-2024-25047,0,0,343df0aa34a2277d182830d3c20824917058fcf8f5e38af715146355ffc2bf9f,2025-07-02T15:41:45.863000 -CVE-2024-25048,0,0,fcc137b6f9efc3b0ed3d7c907f7c740493e10a50797f026d50e6e36a054b2c38,2024-11-21T09:00:09.860000 +CVE-2024-25048,0,1,db78eeef9b02f6cdfc72464414e0a77695520f1116df726e96121c1cb732e8e9,2025-07-03T20:45:20.627000 CVE-2024-2505,0,0,a8b70d12eef18da213620a09faff6413a81044ca87b033ce08a31a9bd95ca2e1,2025-05-08T18:24:45.817000 CVE-2024-25050,0,0,ee2886e2c70d5cd7c3164455e75aa374ff627d446d4a73168310c81dc4d1f42d,2024-11-21T09:00:10.010000 CVE-2024-25051,0,0,77d07f07b5cec1ab3016e0be0efacec83d139c6a39d019cb400288b3180b83ed,2025-04-07T14:18:49.830000 @@ -256971,7 +256971,7 @@ CVE-2024-28772,0,0,78e1b65ccd01d2b2cb5151ac2638f146b229ea64b2c3771ff8b54d177679e CVE-2024-28775,0,0,48c24c963c3e0dc8c46f3ff427e4b5da1fb0e2f7af209370007a02ed2f945218,2025-04-11T14:09:38.493000 CVE-2024-28776,0,0,c37ad1b4bcd037947f008aab1cf6e8a8743a02c8497909c23a1d3fa75f493c32,2025-02-19T16:15:38.870000 CVE-2024-28777,0,0,27c5e3ffaadd4e49f8dfbbc74625f52a6acf48cb042bb3697feff05585a742a7,2025-02-19T16:15:39.363000 -CVE-2024-28778,0,0,ec5802dfee3b138bf2f66b9c23844fcaeb53806b2668ca7c9490ad6fae2b4a1f,2025-01-07T16:15:33.113000 +CVE-2024-28778,0,1,d547882bf17f722197b5c52bac5400254420c54ab88fe8ea636f1ea3d135291c,2025-07-03T20:49:35.697000 CVE-2024-2878,0,0,b3b25e9c748a349ffeda379f2bd7a905843c474a769aa05853c935e7ae823531,2025-02-05T20:15:44.637000 CVE-2024-28780,0,0,a45f8990f216243f42066ef01e1828e72f29ab69751d99d31d3cd7fb3b73695c,2025-02-19T16:15:39.510000 CVE-2024-28781,0,0,ae474e03d5676937911aeaacf31d3abd594523c107a9f5f41f2af0a6977c4689,2025-01-27T18:31:09.747000 @@ -259331,7 +259331,7 @@ CVE-2024-31872,0,0,6a025a79f1912bff173929833a33ebaa07e5ebecd167df86154090852134e CVE-2024-31873,0,0,15c94cc3fd11f0c8c1d9b72b533e2e14debd87b07493c30645b670b791c1dfaf,2025-01-28T21:13:10.063000 CVE-2024-31874,0,0,08d97743873b504cf45e78bca1a14f05191c21552dceacefeba0a8daf5d6fcb2,2025-01-28T17:31:15.617000 CVE-2024-31878,0,0,2cdf4c028654e8fbf3c35b620eb5619fea9f488afd53ab3b9767908578e7f92c,2024-11-21T09:14:04.550000 -CVE-2024-31879,0,0,daa01d9448ebcd5d37ce13841b8ea893e99fc319219124230413ac967ea6f1d6,2024-11-21T09:14:04.690000 +CVE-2024-31879,0,1,2c95bd49164b8d708bae7214defb4602e42b21e479fd465970d0453e45f7af39,2025-07-03T20:54:15.167000 CVE-2024-3188,0,0,a1e19cbfd3c67a64e51d824fb2d7e6139fba2de5517a694aee51a6a0f5915063,2025-05-14T17:31:10.813000 CVE-2024-31880,0,0,f941979502e23b306c091a056d19219b757e25a95ffe27e8cec0411fdb511500,2024-11-06T20:39:55.200000 CVE-2024-31881,0,0,e09f1658aa69d8655212ad42dabc043e14e33323dbef71ee6054873933c3493c,2024-11-21T09:14:04.890000 @@ -261816,7 +261816,7 @@ CVE-2024-35117,0,0,f66294b4c69565a3ee8ba95a79f2f950741471afdd1e911de20d556fafc67 CVE-2024-35118,0,0,4324926efe207392a4ed876fb67f7b1d20226a5f3a177cb56ee4d7f8d8101687,2024-09-19T15:53:25.123000 CVE-2024-35119,0,0,d30b5118f01127b72a967e41cbcd9127e0dc9e2965ef5097a86f08236d88d108,2024-11-21T09:19:48.800000 CVE-2024-3512,0,0,d94170bf3eeacc29f71f3655c6497a6a8a80969c9ad074c1a71bef4e5d51d46d,2024-04-25T13:15:51.663000 -CVE-2024-35122,0,0,493d1491bd5ae7a5e59b43805ddb7588eafbd0d87c32f52529417f281085d342,2025-01-24T18:15:31.680000 +CVE-2024-35122,0,1,4e3dd883b82c03bae612318c6dad1e0a37d657bc830b145e93ba6b287a2b8c25,2025-07-03T20:54:09.190000 CVE-2024-35124,0,0,a922d1c3a3958629dbb0cd51b2de664bb7e7c9433c590d1267fd4128399d23a0,2024-08-22T13:31:16.353000 CVE-2024-3513,0,0,f3b60a2341228082c6b2c058a60950acb3fa7e0ac56c3c9b7f478ff2d11ae041,2024-11-21T09:29:45.410000 CVE-2024-35133,0,0,c27bb2f028f480c71f80a658c5187f1d60bf9d11ef3f138f496564d01c9e391f,2024-09-21T10:15:05.527000 @@ -265056,7 +265056,7 @@ CVE-2024-38903,0,0,bb8eb3b19953647f1fa790b248a4aaef61b725deca797759dfe3998f4fd40 CVE-2024-38909,0,0,e855d3e4bcc6debe8825dcac1f84960c0ea9fdd610320e92597c28f7d4585441,2025-04-28T14:35:52.783000 CVE-2024-3891,0,0,4d72bc4ea7906c74fa96e7962b045759b217e44e525621a88b5a5a6135790d8b,2025-01-07T18:11:13.230000 CVE-2024-38910,0,0,d2dff3af8a966f6c22ba1ee4e9572a11e68c5f4930901faf724b461844929ff4,2024-12-06T20:15:26.337000 -CVE-2024-3892,0,1,45d9dfdcfc78a4f7e641d089494af68d7a7315ac3a6524e43641e7d01774370b,2025-07-03T18:30:06.820000 +CVE-2024-3892,0,0,45d9dfdcfc78a4f7e641d089494af68d7a7315ac3a6524e43641e7d01774370b,2025-07-03T18:30:06.820000 CVE-2024-38920,0,0,b3f18b36d081bdf4f139117e79ad8be02343cb455f4901876d3fc1cdb41ab339,2024-12-06T19:15:11.923000 CVE-2024-38921,0,0,e5a7581e9bd5abc0fb31d345eb112f5a09c1a2670be9a4d75822f554e0cba56c,2024-12-17T20:29:13.017000 CVE-2024-38922,0,0,1cb7de42e969a5471961ae5661769bd0d87aee5b0c1bc49312ac353ff58554e4,2024-12-17T20:29:01.117000 @@ -266196,7 +266196,7 @@ CVE-2024-40696,0,0,3dc472795bb4f5dee7e2998290829b14be08b72462d89040ef95045aa3c7b CVE-2024-40697,0,0,9675ffc87015078088b6658ddad78e8bbe317856a9033b7e633b65273e34d419,2024-08-22T13:27:20.743000 CVE-2024-4070,0,0,dcefff140a08880697e00447eb5b9d3cf4e8bc626b549ead85b0012e24179a9f,2025-02-27T17:51:08.270000 CVE-2024-40700,0,0,2d9c229abc1faaac1cc418f4ae90c891c929abab0867d534c439a3cc25c44edd,2025-02-04T21:15:26.380000 -CVE-2024-40702,0,0,0010d40778f1fffdc1b0664781c513393e67c7620d1ff605f896e7ca8cbe8a85,2025-01-07T16:15:33.463000 +CVE-2024-40702,0,1,b61c21ac8adb150709ee8aff5de31157a598177c97cc57db17322512c4a11170,2025-07-03T20:49:39.400000 CVE-2024-40703,0,0,e703b61d3f8dfe06de226d6f2873ad12453588e6ae0585ecf895673088efbbbb,2024-09-27T16:49:46.177000 CVE-2024-40704,0,0,f1eefecca06d931cc6fa5c315f3cff483d4ea73258582e293da29f36971e3c43,2024-08-15T20:03:13.530000 CVE-2024-40705,0,0,498d1b36f9941cc45abf0a56c450cafece4560bbcc29015fb60565ec3b88fad7,2024-08-15T19:57:34.780000 @@ -271107,7 +271107,7 @@ CVE-2024-4710,0,0,9c507813f9fc80a7b0290c71ebb56c5cafbe3613f57bf93e1120a9c56f5290 CVE-2024-47100,0,0,bc33fc5a76be564a723b9fb2ec38b7be22b37ba75ce50545dbf45808d11df9cc,2025-01-14T11:15:16.573000 CVE-2024-47102,0,0,0864a20740f0de5ffc38497db2f0d4f8389b304278d9ae91ba201d1cd5b77740,2024-12-25T15:15:06.583000 CVE-2024-47103,0,0,f2d938e35b4cd88b650fd9ebaf68a8a9213474b354e226db1e4a7eca8a26d434,2025-03-05T18:25:14.727000 -CVE-2024-47104,0,0,9f2e725614bb591f1dee85b094aedf7e5ce884d4ec064c7905e6916502af1c82,2024-12-18T11:15:05.763000 +CVE-2024-47104,0,1,026a8809af30dacccbc64737eb70987e43cd6e62a5365c6f0054001c1f3d6d78,2025-07-03T20:54:13.533000 CVE-2024-47106,0,0,5ade2f3c5d39fefc0f00abff980ec9cc063f3a12c8a4e05c1472820e919f3997,2025-01-18T16:15:37.883000 CVE-2024-47107,0,0,83a68ca10aff101a96de3250c1131824959ac1049e7605a6db7f1c75f87fa7cd,2024-12-07T15:15:04.123000 CVE-2024-47109,0,0,3df70960f3fd8a2d18b204a885afcd8f024202ba7b8dc307176911f567b1bbe1,2025-03-10T16:15:12.703000 @@ -274350,13 +274350,13 @@ CVE-2024-5146,0,0,5b449c1c90a12e7a7e9baafe2349df6bbeba71c937f98b023ebea1c53ce310 CVE-2024-51460,0,0,df7bada56a61ae8e12a2e4d5be2899c3081302373c6923b3ae2a7f5e2e034bd4,2025-01-14T19:40:36.670000 CVE-2024-51461,0,0,4876f12da7901555341c0b584ea1abd3abac7ec3d8f7f415a970047d9bfbda24,2025-04-11T15:39:52.920000 CVE-2024-51462,0,0,e409bb58b33b455caed173bb21388906f853ca63445a80f0344bbaf4e996dab1,2025-01-17T03:15:07.527000 -CVE-2024-51463,0,0,c0364c05afe1e0b2d0890e7f96c1b512b7afe4d3c2862d4a930e0585099ce1e6,2024-12-21T14:15:21.453000 -CVE-2024-51464,0,0,1b2031370218977af474f39ea7b9c6eb15448100f9427860fc8d10cdd981ce8b,2024-12-31T07:15:11.307000 +CVE-2024-51463,0,1,087d0cc54c059cce6e0a62215ea81fc0f4886c162872024ffd7cd1a929dda70a,2025-07-03T20:54:12.200000 +CVE-2024-51464,0,1,ad9faf77a7bb18211133ce4e655e4499a0a5f1cbe82f262708e86a575ec1837c,2025-07-03T20:54:10.780000 CVE-2024-51465,0,0,b984a1f47331a027471db6ecd22c9db67a7b4679236a111706732d4e42cb3082,2024-12-04T14:15:20.223000 CVE-2024-51466,0,0,8dbff8e38d974242f854fc216ba0ae34b3549115af35c681b8d8f30eb338719e,2025-07-02T15:58:56.447000 CVE-2024-5147,0,0,ab91f72de430745aa06435c0b83e5065e058ec932697e33cc7f6207ac6142bf9,2025-02-05T14:52:39.890000 CVE-2024-51470,0,0,e89d5ef183a7d29ac11af41a2499db74df261ac8afb07d8bd5315410d8114abd,2024-12-18T20:15:23.233000 -CVE-2024-51471,0,0,124b7b8875d261820d9fc9a3eefcc2e273bec0e6de9ec2bd5f9981a02008418a,2024-12-19T18:15:23.153000 +CVE-2024-51471,0,1,d1fabbd389ed07f88438083abab4daf0fc4c0b3ce9d11260a2ff188a030a15db,2025-07-03T20:23:41.563000 CVE-2024-51472,0,0,5a04f10a5b66fac72ae0a16c46c0e3a3ed989854125dc73bcc8f365a713b587f,2025-01-06T17:15:38.517000 CVE-2024-51475,0,0,0d2172b69a6bc7db542afd1e2958e9264f2599ff4e6bf7e2f043416bbf357c7b,2025-06-04T20:02:45.390000 CVE-2024-51476,0,0,60d94814215175c301437be50b363df906a0a0e446e91badb985325a9fb5b1b8,2025-03-06T17:15:19.763000 @@ -275483,10 +275483,10 @@ CVE-2024-5289,0,0,45ad6e1c3a8134226122bea6b70bcd4aeb55721ddc7a695e24fb24c5dc173e CVE-2024-52891,0,0,19cf1f0011549768783225ac0d2a7012d880fe1910f8d0f6b1608f8ed0254a59,2025-03-04T20:04:21.467000 CVE-2024-52892,0,0,9eba69a4b423ab3b0faed8136763965b521ef23cc8c0984c63b5b975c522a8cc,2025-02-06T20:15:39.763000 CVE-2024-52893,0,0,bccb93e15c9c9d6c11e2a27d5bd916177aef96d8789ceb265a7ba2b1644d0c16,2025-03-04T20:02:14.490000 -CVE-2024-52895,0,0,776381c39f26d27f642d71ec1be88368d50de1a99de3a3998fc1acb8e968c6e5,2025-02-14T15:15:09.210000 -CVE-2024-52896,0,1,1c400ceb5bfc9b44b9e4519b4e35925648aa72a3bd9075d5c6df817d0e414b72,2025-07-03T19:52:42.310000 -CVE-2024-52897,0,1,ed26699dc7689dfe23bbdef47680c93078bbc0b5ec70e7e94f15777c74df9904,2025-07-03T19:55:16.553000 -CVE-2024-52898,0,0,d7b7f6b11bb044b80bea87d96314b701a1a2f838c26b331c4312588e6e64f889,2025-01-14T17:15:17.513000 +CVE-2024-52895,0,1,fe099d7f6eafe1018d4b77d98297c83649163133debc7615bac574428c6668fb,2025-07-03T20:54:07.270000 +CVE-2024-52896,0,0,1c400ceb5bfc9b44b9e4519b4e35925648aa72a3bd9075d5c6df817d0e414b72,2025-07-03T19:52:42.310000 +CVE-2024-52897,0,0,ed26699dc7689dfe23bbdef47680c93078bbc0b5ec70e7e94f15777c74df9904,2025-07-03T19:55:16.553000 +CVE-2024-52898,0,1,87db9d39a9720e5bdd81ebc81e0e62681f07f034f96292698b31c775dd6825c3,2025-07-03T20:10:10.747000 CVE-2024-52899,0,0,fd381e4ffbd82c5c3ae3119791a451a008b2780104bd8e38b6962694cf0bd562,2024-11-26T01:15:07.153000 CVE-2024-5290,0,0,63b2ebbbc89fe3009e69f8f9e716432542a09cc7bbb7656b9181d2882b05d010,2024-09-17T13:09:13.683000 CVE-2024-52900,0,0,eb5792f5cbf6bef0b7f202086fd8227cab024e3d455878961eaf67a9379ec510,2025-07-01T18:07:20.727000 @@ -276471,7 +276471,7 @@ CVE-2024-5417,0,0,2c092c55b8a1a8c8890a1e4546beb75d8fbd37f20d02cbd8444692608bc255 CVE-2024-54170,0,0,42dce6648e1132820da06b0e9c69e1655ebe361e65ea7d3b232a8af6a5ebbee4,2025-02-27T15:15:39.240000 CVE-2024-54171,0,0,76fdd9d793c7b352d23e0d64a823cd883e5b81bbb06d5f2cffeb90d9ca7786b4,2025-02-06T21:15:21.453000 CVE-2024-54172,0,0,89b8cf2473aa1d00b65e0aad499d5269d148da59212888517d4b625d48cc59f2,2025-06-23T20:16:59.783000 -CVE-2024-54173,0,0,9626ebf00dbcb8d683d602e32e68262d1ef27b7e0ae499ee14c2f9df981917bf,2025-02-28T03:15:09.357000 +CVE-2024-54173,0,1,aeb4bf587211b71aeccc6b5cd1518dde81918890bfbe72f41ce8080bb57e6159,2025-07-03T20:44:08.330000 CVE-2024-54175,0,0,ac0e271a7a86253c9d856e43e336a7196fed14605337f3e646841823ba1fb5bc,2025-06-20T15:32:46.470000 CVE-2024-54176,0,0,5463f590e796ae65427debb4e96d6df8b03f447d67021c1f3c7471918becbe24,2025-02-08T17:15:21.643000 CVE-2024-54179,0,0,cc40342456ec0e93880ba1ff6de6912ca898fe0485f93a482cde3b645de39dc5,2025-03-03T14:15:33.960000 @@ -277291,7 +277291,7 @@ CVE-2024-55894,0,0,6bc1464368d973e1c6c827bc429d51ce1a3c9546ee8e3c46e48ea85daab94 CVE-2024-55895,0,0,9535eec07671a5cc5686d5a56d310d295b3f57a3a5c97ada2ccb31411af81b64,2025-04-01T20:26:30.593000 CVE-2024-55896,0,0,d7dd07510a57c238a16c0fe0788b36dab26d7ddf0b08fae01a783db92ce18bc7,2025-01-03T23:15:08.437000 CVE-2024-55897,0,0,e14dae99444da602a8cbcded6e75f3a296335e8970296d8e95d83228933505c5,2025-03-13T16:15:25.453000 -CVE-2024-55898,0,0,adcc5d516d89a41277ae34a6de418cf17da58482170efe79dea1e265741329cc,2025-02-24T02:15:31.940000 +CVE-2024-55898,0,1,ded8754e2961bc9ea3e7980cff04a20ee5fb7e167416f260c041b987f5dfd3a3,2025-07-03T20:52:55.190000 CVE-2024-5590,0,0,a9d8f7434d1cfc7abf37860d9a247732a7fac6c4e092fe54bdbe5eeebe8c2afb,2025-02-07T15:10:57.540000 CVE-2024-55904,0,0,985e264a3f8f59b658a98ed276a5675a14d822dac410c29893607d517450a9ef,2025-02-14T04:15:08.753000 CVE-2024-55907,0,0,4c1e415bdf8f7641a1b178418bde0f344146cbdd158b634787f9c31634de79bd,2025-03-02T16:15:34.577000 @@ -283057,7 +283057,7 @@ CVE-2025-0328,0,0,25c0760d244498984cda91678b883cf89d3e8fcbb9c37fd0d45c67359c7184 CVE-2025-0329,0,0,03b8cf30421e1ae0f8fd0e493ceb87146261c231c81ab91ad0614180095edb90,2025-06-12T16:35:31.733000 CVE-2025-0330,0,0,79cf8fdee51afbda4105bc5823be00a341e7d6a4bdcc3c5735bb642d735615ae,2025-03-20T10:15:52.763000 CVE-2025-0331,0,0,afe60233c7b6cdef8297092a16561204e8a753655f7ac938d1ebdf4ff4457d4f,2025-01-09T17:15:17.933000 -CVE-2025-0332,0,1,d0def84faa8b12076ff1e558a0ac55eb8953dfc2704b434c753c7e4d2ff98363,2025-07-03T18:30:06.820000 +CVE-2025-0332,0,0,d0def84faa8b12076ff1e558a0ac55eb8953dfc2704b434c753c7e4d2ff98363,2025-07-03T18:30:06.820000 CVE-2025-0333,0,0,81e4cc439859af53c1b986765c85b9db6681ddfd15355f617bb0f4d13181d40e,2025-01-09T17:15:18.077000 CVE-2025-0334,0,0,a2752894f0956fdde9f25172948b20b0ef85e697939129012141ceedb1b495bc,2025-01-09T06:15:15.610000 CVE-2025-0335,0,0,12528d0865cacb7295fe5a0c5bf2a492f9357b1638988dc28820f4aad345e47c,2025-02-26T22:08:38.937000 @@ -283581,7 +283581,7 @@ CVE-2025-0971,0,0,5b8e3a772e26bf816abefc74071cc81ffef57f2dca25d3ca940637bd90f99d CVE-2025-0972,0,0,e5956f37d0d2c05528deb236852ccd083e64a88ec4620fb922e8c6291dff82ac,2025-02-03T00:15:28.007000 CVE-2025-0973,0,0,c5f9ce06d2802593a7f76334f1b83941107fa5a0a0fa48c68dc58147471b9a7a,2025-02-28T22:33:55.367000 CVE-2025-0974,0,0,d5c477dc78b0d3fe8557a020be3504381bf16f4fc509c0d46fe50fb97cb7b86b,2025-02-03T02:15:26.433000 -CVE-2025-0975,0,0,66ea3569903c32b0f1028941b4e2b9b642924beee794715a495485e8fe53b539,2025-02-28T03:15:10.653000 +CVE-2025-0975,0,1,02dd45c6bbfc82af5cbb5c0c31b7d0e315ef08d4af0e0fdefd618452673c8579,2025-07-03T20:41:35.323000 CVE-2025-0981,0,0,c89c9554a0a46e5bb181583fd08bedc64f240c126360b9216686d47b4afcea4a,2025-02-21T15:23:43.717000 CVE-2025-0982,0,0,521fffa92ca7a4349f9839f1725ef4c0f2728323e40055a01784086e989d43e4,2025-02-06T12:15:27.267000 CVE-2025-0984,0,0,92704a0a035030fb5061e4659d37ae85bc1b4e3f45305a9920fa63c1ad964976,2025-05-07T14:13:20.483000 @@ -286901,7 +286901,7 @@ CVE-2025-2322,0,0,78ab742f31174d7df93575224a83318d524a8c032820e93e629a06208bce3a CVE-2025-23220,0,0,7c8179759fa74d6aae16fc3306b1fc79ab502a5b9e56a156b81b01f528524ae2,2025-02-28T19:22:56.600000 CVE-2025-23221,0,0,66ab94f1e6d3ea457770d55c62f0e0360d1ef2f8abc298fcd5936362cd0cc294,2025-01-20T17:15:07.987000 CVE-2025-23222,0,0,18aa2a1e2bf6061bb8eb2028cc63aa7a30f3ae667c4d6d42b09c703374489ff5,2025-01-24T17:15:15.730000 -CVE-2025-23225,0,0,e7172a29691256f5cd7802e83d2f56fad7175879b765e935ded8f42967016101,2025-02-28T03:15:10.807000 +CVE-2025-23225,0,1,cd0fe8dc7e7b130240b30e150cacd03b434741e27183450c53f033f6397dd305,2025-07-03T20:25:35.343000 CVE-2025-23227,0,0,f9f92843c2672f819b4e02923b915715941f2a484ada128843c5fed7ba6fe29c,2025-01-23T18:15:33.440000 CVE-2025-2323,0,0,38dc6c42b7b635e3caddc5b01ae9aa4a1f84282e9ca11a611a0d7850c76ef099,2025-03-15T17:15:36.610000 CVE-2025-23233,0,0,9d0894e8f043e8d2e3d9f99b4c5bfc27819eaf2a631a882e6cbd474030b88962,2025-05-16T14:43:56.797000 @@ -287583,7 +287583,7 @@ CVE-2025-23964,0,0,5329b05c42aea8add2b00e40cec17b27a1ae63702685a3839a52b5da9454e CVE-2025-23965,0,0,53fb1e10aaa7ebd57bd7f00633a90cd803f03e00b4bc8c44e50c428b42627500,2025-01-16T21:15:38.023000 CVE-2025-23966,0,0,7be907c83ff5fc724c156b1fa35d79f9d45ca14741abf1d0664a82e4e926bedb,2025-01-22T15:15:26.950000 CVE-2025-23967,0,0,7fc0380a265ec940f2b60470b1cf9713d9094d8329ba8cde3022afd9bd781bb0,2025-06-30T18:38:48.477000 -CVE-2025-23968,1,1,955f5380954e813c7e88fece29af528205d4507019306da5a36ed360685211a7,2025-07-03T19:15:23.043000 +CVE-2025-23968,0,0,955f5380954e813c7e88fece29af528205d4507019306da5a36ed360685211a7,2025-07-03T19:15:23.043000 CVE-2025-23969,0,0,487de04033365abaa60e5ffa75aa91d7c86b6db89eb8475ac28535f85fa6cbae,2025-06-06T14:06:58.193000 CVE-2025-2397,0,0,1d9d522b7da574d99450a0c926cba6b95d7f81a170fb089caa03fceac1350b83,2025-03-18T15:16:01.257000 CVE-2025-23971,0,0,b92b26502e7bf23962c464265b1f8680f1f27660b2e187da01a8acb71a6d5407,2025-06-06T14:06:58.193000 @@ -290564,7 +290564,7 @@ CVE-2025-2862,0,0,d42da37ae120383972bca9b3c34491a1998bf94496751edff9d3b8653ccd4e CVE-2025-2863,0,0,89f439925468e699ad113743583fdeda2696a66656c397c031b5ea7d3d0ecb34,2025-03-28T18:11:40.180000 CVE-2025-2864,0,0,1f66654aa924832c01c946b8c047f8723266750dca2c13c7a67536d81d107cad,2025-03-28T18:11:40.180000 CVE-2025-2865,0,0,ec0c359364e90a26d27d62ffa0653d855c3daf1b4b8f1b737e51327fd1068f74,2025-03-28T18:11:40.180000 -CVE-2025-2866,0,0,ef04e1a1e0041aba9fde40dc98be2e2b7c8bb136a3622c61e4c49c0fd00132d4,2025-05-12T19:05:52.590000 +CVE-2025-2866,0,1,3428fe3ce7007027a58cd386cbee1cc3a467ae571e343e8aadf4b3a4c255f1bd,2025-07-03T21:26:26.980000 CVE-2025-2867,0,0,64215baabccd6fdf04d8b048452d95e3b2ff4d5237bc2e15b566982b293865f3,2025-03-27T16:45:12.210000 CVE-2025-2868,0,0,8956298391ba0923e590541b3fae1d38dc061830ea826ef81d09ab51842ff44b,2025-03-28T18:11:40.180000 CVE-2025-2869,0,0,c096e0a3f8c1567897f984075f9b7eae7e0b2ff1c1febfd4a8d8f0861bac0208,2025-03-28T18:11:40.180000 @@ -290898,7 +290898,7 @@ CVE-2025-29493,0,0,ce433e12ff6f67070d20d51618679346fee9463a5376a363b288e013cda07 CVE-2025-29494,0,0,37dc6ae3cff76e33477c0d21d9e70a2e17e406dc0fef9f8cf0d74528f1edd9be,2025-04-01T15:46:09.550000 CVE-2025-29496,0,0,1ab18872c422fd3ad83b844719caba98a63d63be68d84ae73e73abccf7b846be,2025-04-01T15:46:19.427000 CVE-2025-29497,0,0,f8eaaaad66a08f36734d69d9f1541fb908a272f91f31ad8a75e2ab1b4e1231c2,2025-04-01T15:45:58.123000 -CVE-2025-2950,0,0,3b933802cf00212e8d12e44372cb1acb183887c45922a207791d57e7adc54e1a,2025-04-21T14:23:45.950000 +CVE-2025-2950,0,1,7a7b79d92bcd3fc1d6e12e77c95f84880785d2919929e3b4dc42854292e0cc3c,2025-07-03T20:53:15.263000 CVE-2025-29504,0,0,509d78872cdb4e1135eb7746b776c8eb568355cb805a55a3297f7c964bf210eb,2025-04-07T14:18:34.453000 CVE-2025-29509,0,0,095f2bddd5b7ebbce275436f36ff3580aad46e0210f9776b5d03d79fa13631fc,2025-05-12T17:32:32.760000 CVE-2025-2951,0,0,6a15654c1eca83ff82a596d5e3e3899275c59561438cb927263c33c03b7a3c34,2025-04-15T17:07:45.753000 @@ -292957,7 +292957,7 @@ CVE-2025-32176,0,0,6159199ced4d1cc4cc3fc0a4b90bac4e5cc8fe8b49b458ef45302e363899f CVE-2025-32177,0,0,5421d91f07d2d127d019747a3f9da6a81b9de3ec00f222f0047063dbcd68001b,2025-04-07T14:18:15.560000 CVE-2025-32178,0,0,f4356b18673933a5717ebcb4f61fc7f6619aff8d61f40c6a6d6d698282497ddf,2025-04-07T14:18:15.560000 CVE-2025-32179,0,0,69ff8c557b664411b6521be65ad34b2b830276fe6b94886ffd74ded06aafb4ed,2025-04-07T14:18:15.560000 -CVE-2025-3218,0,0,e603beba6e7b5090391d82ad2d9fd742d9df060a981975da316ab7140117d86a,2025-05-07T14:13:20.483000 +CVE-2025-3218,0,1,b8d3f1a18757671501e9731ba5b9843e9f9d5dc81949aaf6b4a803d34d3bd667,2025-07-03T20:53:29.017000 CVE-2025-32180,0,0,a409b84ad0fee336d39330cd0990e4e1a933b45ae7f9c8d16a8202c2417aeef4,2025-05-19T13:35:50.497000 CVE-2025-32181,0,0,2a12ab8650c9715ea1bfc7baa58bd93bf89537d12ec9678a79f27189aa5acd2d,2025-04-07T14:18:15.560000 CVE-2025-32182,0,0,84b7180d6f1c0263bfb88570f76edf08f572fc8320cfdd5c0eb29ab9580520de,2025-04-07T14:18:15.560000 @@ -293743,7 +293743,7 @@ CVE-2025-33112,0,0,fbe29f1f149f7078871a044a5ed14a43938b4d758348625746eeccccfd89d CVE-2025-33117,0,0,de9e738b8198492bbddc214157b0f962656ea2e6b12c9d53170d48d5dfe82538,2025-06-23T20:16:59.783000 CVE-2025-3312,0,0,d314cd0e3d98597c32289b5f3f4209f174e16c52e8e6ba2862a75de1162b07d0,2025-05-07T16:45:29.103000 CVE-2025-33121,0,0,28ac3ca3ae4da8b87a7363c4e87e84438fcfac10cceb19732260209ba8ef9596,2025-06-23T20:16:40.143000 -CVE-2025-33122,0,0,8bf405156970be92dc185289ab40adc88619763aed68fcabb2d93a6d0c25beb5,2025-06-17T20:50:23.507000 +CVE-2025-33122,0,1,ddb2854c5b32b139f034678d802f29870b729be2b69f125a8d51de9fcfdf68ee,2025-07-03T20:53:32.687000 CVE-2025-3313,0,0,8c3e746212b0f7e34691b425d570770595ed2ddcf9c85476d8c05485bbf5b80a,2025-05-07T16:45:47.623000 CVE-2025-33136,0,0,27a78f34bfe266c2ec4d98dca65066403e26999ef14696ceea2068909ce50e9f,2025-05-30T01:19:40.167000 CVE-2025-33137,0,0,7682521c272fc983898f262d7a26ae95a5457c4ccfa28cf239219cc364559be5,2025-05-30T01:19:24.883000 @@ -293873,6 +293873,7 @@ CVE-2025-34058,0,0,fd1d6135cbcb5a939cf5a00698e2051104b6bd46ef2e608640ce59a67cf5e CVE-2025-34059,0,0,45a6f5a690de4057ca2d091f2ebd0e7868dff26548a7187ca235baafdf4d8729,2025-07-03T15:14:12.767000 CVE-2025-3406,0,0,7ba1ebe9a4174ed6e20c2f4fe1e75a4864d330055141a3dcb596eb92ec7fbc3a,2025-04-08T18:13:53.347000 CVE-2025-34060,0,0,c9e66c79fa3e22979f6d536300a3a69b4248f557ef4ce60fb59bc75630daece1,2025-07-03T15:14:12.767000 +CVE-2025-34061,1,1,85dfe74227cfb8d6fb527f09d52021638f8c7d3658a36d67197b197c95332243,2025-07-03T20:15:21.570000 CVE-2025-34062,0,0,b716d5649a0b2ab449b7a4e5deda5a7ed68b48d3e9d485331bef321a595836de,2025-07-03T15:14:12.767000 CVE-2025-34063,0,0,fbf50ba1666892a680b7e726cc84b450cde981ed5af9e60f07742062b62bf6a1,2025-07-03T15:14:12.767000 CVE-2025-34064,0,0,eb471144a9811114d1d1834fe8327f3c07a293fa4bbcfab9e78da16542b662d1,2025-07-03T15:14:12.767000 @@ -293893,6 +293894,11 @@ CVE-2025-34079,0,0,e6d733d75639f74da638a863b1673b04916d219d5fe2f30c247d053c7c8a4 CVE-2025-3408,0,0,a88be7d5c921572f767d8ba3e6ebc652be3930b6ee80cf6e4b3b3197df125283,2025-04-08T18:13:53.347000 CVE-2025-34080,0,0,7facaa51cd8a6d5555f1a7d11ff6b11423d2fee5e31c80ebe182ad59860e92d0,2025-07-03T15:14:12.767000 CVE-2025-34081,0,0,ad8db7fe69d8caab8acca643e7b73c50072fd91c7954d3079104dc722a9fd721,2025-07-03T15:14:12.767000 +CVE-2025-34082,1,1,68a6b8d6d0b0897ed20277aae825943a68a01da0e3acaff885e71579942468db,2025-07-03T20:15:22.540000 +CVE-2025-34086,1,1,ca489dad657f1ad721cbdf0ea69a6597ded3f4016d530d86e9bb427a861153d9,2025-07-03T20:15:22.683000 +CVE-2025-34087,1,1,f301a7c0eca035635293ee08170a251d82a0cd91ae05482ba7360abebf568d92,2025-07-03T20:15:22.843000 +CVE-2025-34088,1,1,4616bd76fa51987210408713378568b6429093ff5258f16bf1870e7a67ded677,2025-07-03T20:15:23.007000 +CVE-2025-34089,1,1,9d131e63568006f8f73ec5e6a9d6fb3a0b725a4a942bd750ce78d19c0d87a2e7,2025-07-03T20:15:23.157000 CVE-2025-3409,0,0,f59095d51838a53941b8bd9796d34dc98a766466b963796da5b26614478f737a,2025-04-08T18:13:53.347000 CVE-2025-34090,0,0,99b025483d49e908b46ca3c0b6df1bcd3eb9785bb16ccf0a289b98bcd9ea5094,2025-07-03T15:13:53.147000 CVE-2025-34091,0,0,80903fb8a73bb14ecdbce066930269d024e03e7b850e9a6f8bfa9891a350a26e,2025-07-03T15:13:53.147000 @@ -294084,7 +294090,7 @@ CVE-2025-3599,0,0,50511407f557708506d42c82ca157e4b27ffcaf91e7ac0f0029a3b3d58f00d CVE-2025-35995,0,0,a590f4d82a5b6a6ddf49e3e9ff3fcb9f7ad4db6e56f789349ace8583f960ea2e,2025-05-08T14:39:09.683000 CVE-2025-35996,0,0,a68f8bf3039aca0fabffa5365ae47dde1016d171f7f66e0132baceb8c4b864b9,2025-05-02T13:52:51.693000 CVE-2025-3600,0,0,7cb206206065fd210a153f067dfc260287fb233b025f8a59e4c30ab1efc7f613,2025-05-16T14:43:56.797000 -CVE-2025-36004,0,0,0a01f92ec8ed981f105aaa2da46bf8f144b50e5b88bce227ac7752c1ea333d5a,2025-06-26T18:58:14.280000 +CVE-2025-36004,0,1,a7606dc7f0db1d2572a7485d0d3bb38993c9f09ef8a130e8809723820465f823,2025-07-03T20:53:35.667000 CVE-2025-36016,0,0,af37919821fdd574b942ee9d20d1ecfb430b58097892e9a643523ecf7010f2dd,2025-06-23T20:16:21.633000 CVE-2025-3602,0,0,9dae34871a5aa21ddbebfa01b8417ba4c26394066febdada550c394e6505596c,2025-06-17T20:50:23.507000 CVE-2025-36026,0,0,af5d1cd39202bd9c522b391511525b9286e9d9645df4651893a8424afeeff6cc,2025-07-01T14:22:26.260000 @@ -296209,7 +296215,7 @@ CVE-2025-45797,0,0,9ceb633e87e0ccdd08b067f487627f7a3614f4d7f4f938b0faf7b483b05c0 CVE-2025-45798,0,0,1e256e91813f740bb0ddebf5c159b4041ec84583a75a9898cffd38b365095dd3,2025-05-19T15:08:18.653000 CVE-2025-4580,0,0,2c434f3aced55b1225815c7de47b3cc229863447aaf3ca455a84427f71dfeaeb,2025-06-04T20:04:21.700000 CVE-2025-45800,0,0,2adeb4a59c132c5d4a56fe8afda223e1c5b86658a949bac17c9d9bc540ba8292,2025-06-04T17:26:02.743000 -CVE-2025-45809,1,1,761c39099d492fdb34e718803ab4d94f39f05bc4978719e2f84573e3b170d1ca,2025-07-03T19:15:24.027000 +CVE-2025-45809,0,0,761c39099d492fdb34e718803ab4d94f39f05bc4978719e2f84573e3b170d1ca,2025-07-03T19:15:24.027000 CVE-2025-45813,0,0,1cdb35349454355ea90284f73a3a629e371e03fd1917b24cadfbc183cc8f1c12,2025-07-03T15:13:53.147000 CVE-2025-45814,0,0,8e500fbe650a74a0fb125601ba4882cc600d6293d2674f68472c4b342456b8fe,2025-07-03T15:13:53.147000 CVE-2025-45818,0,0,9a72de08da5294536bea0753f94263b2b855db9b94abd12b9c3b0d1fd37d9e3b,2025-06-17T19:42:01.770000 @@ -297985,6 +297991,7 @@ CVE-2025-49001,0,0,8dc4548fe390fc22a5faf69cde327e5fe5b96046e91fdc466cb08c1aca094 CVE-2025-49002,0,0,216cade8987f40e7e1bae00fef99c6cc70caf989f13acf7e248d90eb2faa16c6,2025-06-05T14:07:36.847000 CVE-2025-49003,0,0,fba2fa2a264a5c8271213cb9de26bd128e1b1ae572a3e285db1d3ea73352c4b7,2025-06-26T18:57:43.670000 CVE-2025-49004,0,0,89d47ac006a07f0278b924493f5a5a2553c688202c5da141c2c812c60b3a1cb1,2025-06-12T16:06:47.857000 +CVE-2025-49005,1,1,f5da460018e782ea866a592b7801484459ecd48c23166d1ec275b3a62e9024d1,2025-07-03T21:15:26.787000 CVE-2025-49006,0,0,69cfb489d390e5afe2e42023086b2832eeed6d765863e99bd3de00a5d46a4fa7,2025-06-12T16:06:47.857000 CVE-2025-49007,0,0,d1c6d78f4ed2af74dee6497de444888fe48e0c945fb3e3b2be2f74b557cd31b9,2025-06-05T20:12:23.777000 CVE-2025-49008,0,0,5906f158b4998a3ea295f4b31b7f6d29c67e9e9abb77b31bc6681c8bf5f684d0,2025-06-05T20:12:23.777000 @@ -298360,6 +298367,7 @@ CVE-2025-49822,0,0,de49443b576bc1f584b5a6900459b73ba17d0494708f2396f6ea98c8b4c73 CVE-2025-49823,0,0,552cd4fad516f02486ff3428bf048ea275d9b1dd6acc2c30a167deddc98bdc84,2025-06-17T20:50:23.507000 CVE-2025-49824,0,0,974ad385597c7ebe1657b4c04293530cc71abe0711af75ee866eb4ab4d2dd957,2025-06-18T13:46:52.973000 CVE-2025-49825,0,0,f444b584006d5aede2c38e3ee10f0e113cb3d3f832999c3a3531ef94f625084b,2025-06-18T13:46:52.973000 +CVE-2025-49826,1,1,bdcff8f3ca585f0644a6ec8691cba9051d6c219e38e7afe53977ef4fd356b423,2025-07-03T21:15:27.287000 CVE-2025-4983,0,0,8b53f9fcac717498609c6596ba194e3872474340efe5891a55ff7cfbe70e31d1,2025-05-30T16:31:03.107000 CVE-2025-4984,0,0,8011ca13e469a81f6afb4511e42cccafc7f5c3edf7ae8617debc1cb5fd406589,2025-05-30T16:31:03.107000 CVE-2025-49842,0,0,25f68be05f1cee4c74ac248773f32070b2173a4b15896e09f4b989979b7acc44,2025-06-17T20:50:23.507000 @@ -298757,6 +298765,7 @@ CVE-2025-52542,0,0,6a356dbb016e8c78bba3561542110106778fbb5f08761ae704acc7dfbd8bd CVE-2025-5255,0,0,b023caeeba2421cb86c7482514e264205e254122220d82c6bc67ef741a68d935,2025-06-23T20:16:40.143000 CVE-2025-52552,0,0,355ff6e466a39f4325662bbaa49db2816c79c0533f84f99cc3e34c03831df356,2025-06-23T20:16:21.633000 CVE-2025-52553,0,0,a39f718ab824da2cdd9dc21d65a0414d2ad7d6b511be6b992312d854e52baa0a,2025-06-30T18:38:23.493000 +CVE-2025-52554,1,1,b1acdad6caf49f3b451c50125dfcbd7aca94dab5d45e04b2d092965e656df2fa,2025-07-03T20:15:23.423000 CVE-2025-52555,0,0,6a75b391ee3c8272fca348930578b6893d5d810e2019dea636affd2993361902,2025-06-30T18:38:48.477000 CVE-2025-52556,0,0,01d14cdcd651409b8ec6f2a117321e576266f60affdb5d61d3b6cf66da0be9ba,2025-06-23T20:16:21.633000 CVE-2025-52557,0,0,d6ac46828bdd4bd5689e0ed9e6db622a0cd2c5e50b4932c5603e932a5d57d26a,2025-06-23T20:16:21.633000 @@ -299070,7 +299079,11 @@ CVE-2025-5335,0,0,5abfb5e74bc6ec2f8ed9b95f56ffcbd4f93dcd183997df85e24502ad959346 CVE-2025-53358,0,0,3d97a4954e653a509d4005c71cf64fbb269b7293bb5ffaddd5ae485b7c74944b,2025-07-03T15:13:53.147000 CVE-2025-53359,0,0,45ed40db77640f47ba583ca32d5c60d80ffbacd98c4463b392cad98fdcfa3117,2025-07-03T15:13:53.147000 CVE-2025-5336,0,0,51ebbfc8a6c001d043ad92fbb70974a3ccedacbc8290bd5643cc8faeb9732c02,2025-06-16T12:32:18.840000 +CVE-2025-53367,1,1,98ccbfda09d8ace8af64393016345c61888d50f9c101c3aa87422d100c99dc24,2025-07-03T21:15:27.493000 +CVE-2025-53368,1,1,be3c0a7f58e2bbd4e68679c536da2e841620327ebe3522ae8a918c23f429e2ff,2025-07-03T20:15:23.577000 +CVE-2025-53369,1,1,935c1344485ff5b914be62cc3781976d8c660c47c3bc47debabf78b9f979ea5a,2025-07-03T20:15:23.737000 CVE-2025-5337,0,0,f5b214301a56cadaeebc0b9a86ddeaf885fbd4e9b8e681558e7ccfb718bae2b0,2025-06-16T12:32:18.840000 +CVE-2025-53370,1,1,ab22dbf75672a7a4f2267e5b00d1bde032c4143aa87d40c57e89361f247504be,2025-07-03T20:15:23.893000 CVE-2025-5338,0,0,7d03b6675327abe3166794a3aea1334fe78b5ed9861d33098569022851345f63,2025-06-26T18:57:43.670000 CVE-2025-53380,0,0,778a4ed3b4b51402648379b0a66e0653fc3388939d52b44cfb536c593d391f6d,2025-06-28T03:15:24.373000 CVE-2025-53381,0,0,5bca2379c91be4fadf0c25a7392b9c1b3f109e154b7525c42492575516c349ca,2025-06-28T03:15:25.393000 @@ -299089,15 +299102,15 @@ CVE-2025-5340,0,0,9b48da383be5dfbe2bc488480a2be183877451ec75241964210e2e3aad9a2c CVE-2025-5341,0,0,2f7555dddd47395f556aef803e272926d99b2be1a7b798f5f5a29577ec1f1191,2025-06-05T20:12:23.777000 CVE-2025-53415,0,0,a69e8e91492110c4dbcf675778ea91b79a25d896361aa62120c18b659d9f38c5,2025-07-01T08:15:24.610000 CVE-2025-53416,0,0,5766bb5741c2eb8f5d7acde7664083885dadd438f2f420d57a6193893c29ac92,2025-06-30T10:15:26.127000 -CVE-2025-53489,0,1,6769a7875609bf94b88a0e114ee9f59c80c8131a1c840fb5a9a3308771e635ea,2025-07-03T18:15:21.710000 +CVE-2025-53489,0,0,6769a7875609bf94b88a0e114ee9f59c80c8131a1c840fb5a9a3308771e635ea,2025-07-03T18:15:21.710000 CVE-2025-5349,0,0,c3dba6df59d2293dc5933fab4b44180a83c69961191d6e1c8668a3b028af5d72,2025-06-17T20:50:23.507000 -CVE-2025-53490,0,1,e9251db1fea5e6093c2fe7b28bed6cbf3c105295c53f6dbe7693f6d5d13423ff,2025-07-03T18:15:22 +CVE-2025-53490,0,0,e9251db1fea5e6093c2fe7b28bed6cbf3c105295c53f6dbe7693f6d5d13423ff,2025-07-03T18:15:22 CVE-2025-53492,0,0,07f001f0a2f7c95ac8b92c2b5a1246aeb8bc752b3d49fd1f7521c3a7a3a64667,2025-07-03T16:15:23.957000 CVE-2025-53493,0,0,8ff8929aef43b08923f020bb2cb71110d90a8f67f30ed1d7a0b2012c8c2477af,2025-07-03T16:15:24.123000 CVE-2025-53494,0,0,208fc72eecce6b5a15d2bab2c5d282523f9dc3860f6acdfd211e204b9a94e60e,2025-07-03T15:13:53.147000 -CVE-2025-53500,0,1,4e600160e0338af8f29e334cc4de18af82b5375f94d3896f9cbf3cc874d5159e,2025-07-03T18:15:22.140000 -CVE-2025-53501,0,1,21c335a8cee7517960e84f19187025efcea385227ba1fb22ef8cc3a8c10a8e56,2025-07-03T18:15:22.300000 -CVE-2025-53502,0,1,8620e1fa54158c5ea47ec511c9a4e70659635a1ba5079b6185bdce67f385eae0,2025-07-03T18:15:22.530000 +CVE-2025-53500,0,0,4e600160e0338af8f29e334cc4de18af82b5375f94d3896f9cbf3cc874d5159e,2025-07-03T18:15:22.140000 +CVE-2025-53501,0,0,21c335a8cee7517960e84f19187025efcea385227ba1fb22ef8cc3a8c10a8e56,2025-07-03T18:15:22.300000 +CVE-2025-53502,0,0,8620e1fa54158c5ea47ec511c9a4e70659635a1ba5079b6185bdce67f385eae0,2025-07-03T18:15:22.530000 CVE-2025-5353,0,0,a9d9e9f405a59eeaccd7ee5466c700cdd9eae2ba20f2bc9c98c5c42953abdf75,2025-06-12T16:06:39.330000 CVE-2025-5356,0,0,230423e916dccb3eed4f4eea6b8b3a9d8afef34a102c6f9d5aed25dc46913046,2025-06-24T15:20:27.113000 CVE-2025-5357,0,0,907468d4a23bb292098ec30159d44f17f5a58704c8b53f5a961af7ce379d277f,2025-06-16T16:26:46.080000 @@ -300208,7 +300221,7 @@ CVE-2025-6916,0,0,524850ebae15b52ae083b8140e4ab97ad9b5dd7a5e34956ff208001c526a5f CVE-2025-6917,0,0,129e7ed7538995bd47122ea1abcbbb313d42d5948a17ca0bbad09769943187c8,2025-06-30T18:38:23.493000 CVE-2025-6920,0,0,92f153f201754cb01ae808c528460cedb35114cf4759cf0d03fac580d4198aee,2025-07-03T15:14:12.767000 CVE-2025-6925,0,0,9b6fc4858861f5dc5e36531cf5cf597ec00fe77481d8d8c4445a1b8259bb2b27,2025-06-30T19:15:25.920000 -CVE-2025-6926,0,1,7fab1723fdac5be2c9c2a2d693667480fa6a04b2dd5cc589a2b96bc15ab8525f,2025-07-03T18:15:22.797000 +CVE-2025-6926,0,0,7fab1723fdac5be2c9c2a2d693667480fa6a04b2dd5cc589a2b96bc15ab8525f,2025-07-03T18:15:22.797000 CVE-2025-6929,0,0,06dc8ff62d3e6d602a7ed0d7b089f7cc33d58dd53c0466cf2fa3f70110505908,2025-07-03T15:14:12.767000 CVE-2025-6930,0,0,5fa54aec3bce753c0cb7b9bc216390a901032fb371a178f32c2e5f88307f3800,2025-07-03T15:14:12.767000 CVE-2025-6931,0,0,ea2ff5a0469a3df9ef65d87bf71684c0690aa2650e532d6b10eadd6580773a20,2025-07-03T15:14:12.767000