diff --git a/CVE-2006/CVE-2006-51xx/CVE-2006-5175.json b/CVE-2006/CVE-2006-51xx/CVE-2006-5175.json index 3df7c32ed53..6f8c653a2b5 100644 --- a/CVE-2006/CVE-2006-51xx/CVE-2006-5175.json +++ b/CVE-2006/CVE-2006-51xx/CVE-2006-5175.json @@ -2,8 +2,8 @@ "id": "CVE-2006-5175", "sourceIdentifier": "cve@mitre.org", "published": "2006-10-10T04:06:00.000", - "lastModified": "2025-04-09T00:30:58.490", - "vulnStatus": "Deferred", + "lastModified": "2025-05-01T19:57:49.380", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-354xx/CVE-2020-35473.json b/CVE-2020/CVE-2020-354xx/CVE-2020-35473.json index 7dbb232e569..171a55f36ed 100644 --- a/CVE-2020/CVE-2020-354xx/CVE-2020-35473.json +++ b/CVE-2020/CVE-2020-354xx/CVE-2020-35473.json @@ -2,7 +2,7 @@ "id": "CVE-2020-35473", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-08T06:15:09.403", - "lastModified": "2024-11-21T05:27:21.667", + "lastModified": "2025-05-01T18:15:46.260", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -53,6 +73,16 @@ "value": "CWE-294" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-294" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-359xx/CVE-2021-35942.json b/CVE-2021/CVE-2021-359xx/CVE-2021-35942.json index c55ffea4634..edb20e75b08 100644 --- a/CVE-2021/CVE-2021-359xx/CVE-2021-35942.json +++ b/CVE-2021/CVE-2021-359xx/CVE-2021-35942.json @@ -2,8 +2,8 @@ "id": "CVE-2021-35942", "sourceIdentifier": "cve@mitre.org", "published": "2021-07-22T18:15:23.287", - "lastModified": "2024-11-21T06:12:47.913", - "vulnStatus": "Modified", + "lastModified": "2025-05-01T18:10:02.587", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -86,8 +86,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", - "versionEndExcluding": "2.32", - "matchCriteriaId": "5980E6E8-3F3B-4A37-8F70-D0BC09008230" + "versionEndExcluding": "2.31", + "matchCriteriaId": "580654C1-5047-40F4-9518-2AACF59AC357" } ] } @@ -179,13 +179,16 @@ }, { "url": "https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=5adda61f62b77384718b4c0d8336ade8f2b4b35c", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://sourceware.org/glibc/wiki/Security%20Exceptions", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Not Applicable" ] }, { @@ -220,13 +223,16 @@ }, { "url": "https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=5adda61f62b77384718b4c0d8336ade8f2b4b35c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://sourceware.org/glibc/wiki/Security%20Exceptions", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Vendor Advisory" + "Not Applicable" ] } ] diff --git a/CVE-2021/CVE-2021-402xx/CVE-2021-40226.json b/CVE-2021/CVE-2021-402xx/CVE-2021-40226.json index 656ba919e15..fe6c9cbd62e 100644 --- a/CVE-2021/CVE-2021-402xx/CVE-2021-40226.json +++ b/CVE-2021/CVE-2021-402xx/CVE-2021-40226.json @@ -2,7 +2,7 @@ "id": "CVE-2021-40226", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-10T18:15:10.397", - "lastModified": "2024-11-21T06:23:46.377", + "lastModified": "2025-05-01T18:15:46.503", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-402xx/CVE-2021-40289.json b/CVE-2021/CVE-2021-402xx/CVE-2021-40289.json index da05720f023..c70d2cebf54 100644 --- a/CVE-2021/CVE-2021-402xx/CVE-2021-40289.json +++ b/CVE-2021/CVE-2021-402xx/CVE-2021-40289.json @@ -2,7 +2,7 @@ "id": "CVE-2021-40289", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-10T18:15:10.497", - "lastModified": "2024-11-21T06:23:50.007", + "lastModified": "2025-05-01T18:15:46.703", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-468xx/CVE-2021-46851.json b/CVE-2021/CVE-2021-468xx/CVE-2021-46851.json index 2a9ea62b133..f9ecc91e0b2 100644 --- a/CVE-2021/CVE-2021-468xx/CVE-2021-46851.json +++ b/CVE-2021/CVE-2021-468xx/CVE-2021-46851.json @@ -2,7 +2,7 @@ "id": "CVE-2021-46851", "sourceIdentifier": "psirt@huawei.com", "published": "2022-11-09T21:15:12.877", - "lastModified": "2024-11-21T06:34:48.460", + "lastModified": "2025-05-01T18:15:46.887", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-468xx/CVE-2021-46852.json b/CVE-2021/CVE-2021-468xx/CVE-2021-46852.json index 59e03bf11b6..37fb8a064e2 100644 --- a/CVE-2021/CVE-2021-468xx/CVE-2021-46852.json +++ b/CVE-2021/CVE-2021-468xx/CVE-2021-46852.json @@ -2,7 +2,7 @@ "id": "CVE-2021-46852", "sourceIdentifier": "psirt@huawei.com", "published": "2022-11-09T21:15:13.230", - "lastModified": "2024-11-21T06:34:48.583", + "lastModified": "2025-05-01T18:15:47.070", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-306" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-204xx/CVE-2022-20445.json b/CVE-2022/CVE-2022-204xx/CVE-2022-20445.json index 0ee04a73fcb..52a8d448f53 100644 --- a/CVE-2022/CVE-2022-204xx/CVE-2022-20445.json +++ b/CVE-2022/CVE-2022-204xx/CVE-2022-20445.json @@ -2,7 +2,7 @@ "id": "CVE-2022-20445", "sourceIdentifier": "security@android.com", "published": "2022-11-08T22:15:11.207", - "lastModified": "2024-11-21T06:42:49.507", + "lastModified": "2025-05-01T20:15:31.057", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-1284" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1284" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-204xx/CVE-2022-20446.json b/CVE-2022/CVE-2022-204xx/CVE-2022-20446.json index 76d3516ecc2..5a4b6219c1a 100644 --- a/CVE-2022/CVE-2022-204xx/CVE-2022-20446.json +++ b/CVE-2022/CVE-2022-204xx/CVE-2022-20446.json @@ -2,7 +2,7 @@ "id": "CVE-2022-20446", "sourceIdentifier": "security@android.com", "published": "2022-11-08T22:15:11.260", - "lastModified": "2024-11-21T06:42:49.620", + "lastModified": "2025-05-01T20:15:31.257", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-217xx/CVE-2022-21778.json b/CVE-2022/CVE-2022-217xx/CVE-2022-21778.json index c715fe74431..f6a69eb295e 100644 --- a/CVE-2022/CVE-2022-217xx/CVE-2022-21778.json +++ b/CVE-2022/CVE-2022-217xx/CVE-2022-21778.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21778", "sourceIdentifier": "security@mediatek.com", "published": "2022-11-08T21:15:09.950", - "lastModified": "2024-11-21T06:45:25.183", + "lastModified": "2025-05-01T20:15:31.420", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-232xx/CVE-2022-23218.json b/CVE-2022/CVE-2022-232xx/CVE-2022-23218.json index db19223840c..fb015ab06c3 100644 --- a/CVE-2022/CVE-2022-232xx/CVE-2022-23218.json +++ b/CVE-2022/CVE-2022-232xx/CVE-2022-23218.json @@ -2,8 +2,8 @@ "id": "CVE-2022-23218", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-14T07:15:08.800", - "lastModified": "2024-11-21T06:48:12.677", - "vulnStatus": "Modified", + "lastModified": "2025-05-01T18:10:07.273", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -86,8 +86,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", - "versionEndIncluding": "2.34", - "matchCriteriaId": "ED46EB04-73DF-41D7-9E54-A50570DF766B" + "versionEndExcluding": "2.31", + "matchCriteriaId": "580654C1-5047-40F4-9518-2AACF59AC357" } ] } diff --git a/CVE-2022/CVE-2022-232xx/CVE-2022-23219.json b/CVE-2022/CVE-2022-232xx/CVE-2022-23219.json index 68d2b856044..1b548a3bd08 100644 --- a/CVE-2022/CVE-2022-232xx/CVE-2022-23219.json +++ b/CVE-2022/CVE-2022-232xx/CVE-2022-23219.json @@ -2,8 +2,8 @@ "id": "CVE-2022-23219", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-14T07:15:08.867", - "lastModified": "2024-11-21T06:48:12.863", - "vulnStatus": "Modified", + "lastModified": "2025-05-01T18:10:11.247", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -86,8 +86,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", - "versionEndIncluding": "2.34", - "matchCriteriaId": "ED46EB04-73DF-41D7-9E54-A50570DF766B" + "versionEndExcluding": "2.31", + "matchCriteriaId": "580654C1-5047-40F4-9518-2AACF59AC357" } ] } diff --git a/CVE-2022/CVE-2022-264xx/CVE-2022-26446.json b/CVE-2022/CVE-2022-264xx/CVE-2022-26446.json index edf5b18a288..ae517908564 100644 --- a/CVE-2022/CVE-2022-264xx/CVE-2022-26446.json +++ b/CVE-2022/CVE-2022-264xx/CVE-2022-26446.json @@ -2,7 +2,7 @@ "id": "CVE-2022-26446", "sourceIdentifier": "security@mediatek.com", "published": "2022-11-08T21:15:11.423", - "lastModified": "2024-11-21T06:53:57.873", + "lastModified": "2025-05-01T19:15:49.940", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-617" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-305xx/CVE-2022-30515.json b/CVE-2022/CVE-2022-305xx/CVE-2022-30515.json index 597ebd95555..667883295b5 100644 --- a/CVE-2022/CVE-2022-305xx/CVE-2022-30515.json +++ b/CVE-2022/CVE-2022-305xx/CVE-2022-30515.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30515", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-08T23:15:09.630", - "lastModified": "2024-11-21T07:02:51.570", + "lastModified": "2025-05-01T19:15:50.170", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-306" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-316xx/CVE-2022-31685.json b/CVE-2022/CVE-2022-316xx/CVE-2022-31685.json index 704b7f42d10..dda50227663 100644 --- a/CVE-2022/CVE-2022-316xx/CVE-2022-31685.json +++ b/CVE-2022/CVE-2022-316xx/CVE-2022-31685.json @@ -2,7 +2,7 @@ "id": "CVE-2022-31685", "sourceIdentifier": "security@vmware.com", "published": "2022-11-09T21:15:15.293", - "lastModified": "2024-11-21T07:05:07.640", + "lastModified": "2025-05-01T18:15:47.460", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-316xx/CVE-2022-31686.json b/CVE-2022/CVE-2022-316xx/CVE-2022-31686.json index 9a02f31b4e3..e3693ae7010 100644 --- a/CVE-2022/CVE-2022-316xx/CVE-2022-31686.json +++ b/CVE-2022/CVE-2022-316xx/CVE-2022-31686.json @@ -2,7 +2,7 @@ "id": "CVE-2022-31686", "sourceIdentifier": "security@vmware.com", "published": "2022-11-09T21:15:15.390", - "lastModified": "2024-11-21T07:05:07.770", + "lastModified": "2025-05-01T18:15:48.023", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-326xx/CVE-2022-32601.json b/CVE-2022/CVE-2022-326xx/CVE-2022-32601.json index 604cc90bcd1..c77116c2f90 100644 --- a/CVE-2022/CVE-2022-326xx/CVE-2022-32601.json +++ b/CVE-2022/CVE-2022-326xx/CVE-2022-32601.json @@ -2,7 +2,7 @@ "id": "CVE-2022-32601", "sourceIdentifier": "security@mediatek.com", "published": "2022-11-08T21:15:11.687", - "lastModified": "2024-11-21T07:06:42.913", + "lastModified": "2025-05-01T19:15:50.363", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-502" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-326xx/CVE-2022-32602.json b/CVE-2022/CVE-2022-326xx/CVE-2022-32602.json index 52bd6494993..9fbdfc8f2f0 100644 --- a/CVE-2022/CVE-2022-326xx/CVE-2022-32602.json +++ b/CVE-2022/CVE-2022-326xx/CVE-2022-32602.json @@ -2,7 +2,7 @@ "id": "CVE-2022-32602", "sourceIdentifier": "security@mediatek.com", "published": "2022-11-08T21:15:11.810", - "lastModified": "2024-11-21T07:06:43.043", + "lastModified": "2025-05-01T19:15:50.547", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-326xx/CVE-2022-32610.json b/CVE-2022/CVE-2022-326xx/CVE-2022-32610.json index 873c65bb6ac..eafb8d27418 100644 --- a/CVE-2022/CVE-2022-326xx/CVE-2022-32610.json +++ b/CVE-2022/CVE-2022-326xx/CVE-2022-32610.json @@ -2,7 +2,7 @@ "id": "CVE-2022-32610", "sourceIdentifier": "security@mediatek.com", "published": "2022-11-08T21:15:13.360", - "lastModified": "2024-11-21T07:06:43.787", + "lastModified": "2025-05-01T20:15:31.787", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.5, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.5, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-662" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-662" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-326xx/CVE-2022-32611.json b/CVE-2022/CVE-2022-326xx/CVE-2022-32611.json index 42d85952549..19a725d9ca4 100644 --- a/CVE-2022/CVE-2022-326xx/CVE-2022-32611.json +++ b/CVE-2022/CVE-2022-326xx/CVE-2022-32611.json @@ -2,7 +2,7 @@ "id": "CVE-2022-32611", "sourceIdentifier": "security@mediatek.com", "published": "2022-11-08T21:15:13.930", - "lastModified": "2024-11-21T07:06:43.913", + "lastModified": "2025-05-01T20:15:31.950", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-326xx/CVE-2022-32612.json b/CVE-2022/CVE-2022-326xx/CVE-2022-32612.json index 2b7ab17e5ae..402e188adeb 100644 --- a/CVE-2022/CVE-2022-326xx/CVE-2022-32612.json +++ b/CVE-2022/CVE-2022-326xx/CVE-2022-32612.json @@ -2,7 +2,7 @@ "id": "CVE-2022-32612", "sourceIdentifier": "security@mediatek.com", "published": "2022-11-08T21:15:14.133", - "lastModified": "2024-11-21T07:06:44.023", + "lastModified": "2025-05-01T19:15:50.710", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.5, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.5, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-362" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-326xx/CVE-2022-32613.json b/CVE-2022/CVE-2022-326xx/CVE-2022-32613.json index 19326eab411..d6fb652c12f 100644 --- a/CVE-2022/CVE-2022-326xx/CVE-2022-32613.json +++ b/CVE-2022/CVE-2022-326xx/CVE-2022-32613.json @@ -2,7 +2,7 @@ "id": "CVE-2022-32613", "sourceIdentifier": "security@mediatek.com", "published": "2022-11-08T21:15:14.387", - "lastModified": "2024-11-21T07:06:44.147", + "lastModified": "2025-05-01T19:15:50.883", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.5, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.5, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-362" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-326xx/CVE-2022-32614.json b/CVE-2022/CVE-2022-326xx/CVE-2022-32614.json index 2fa15435e54..25898300c8f 100644 --- a/CVE-2022/CVE-2022-326xx/CVE-2022-32614.json +++ b/CVE-2022/CVE-2022-326xx/CVE-2022-32614.json @@ -2,7 +2,7 @@ "id": "CVE-2022-32614", "sourceIdentifier": "security@mediatek.com", "published": "2022-11-08T21:15:14.780", - "lastModified": "2024-11-21T07:06:44.277", + "lastModified": "2025-05-01T19:15:51.050", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-415" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-326xx/CVE-2022-32615.json b/CVE-2022/CVE-2022-326xx/CVE-2022-32615.json index a52b72a3721..bfa741c401c 100644 --- a/CVE-2022/CVE-2022-326xx/CVE-2022-32615.json +++ b/CVE-2022/CVE-2022-326xx/CVE-2022-32615.json @@ -2,7 +2,7 @@ "id": "CVE-2022-32615", "sourceIdentifier": "security@mediatek.com", "published": "2022-11-08T21:15:15.110", - "lastModified": "2024-11-21T07:06:44.397", + "lastModified": "2025-05-01T19:15:51.207", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-908" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-326xx/CVE-2022-32616.json b/CVE-2022/CVE-2022-326xx/CVE-2022-32616.json index 3fbf375deca..a0b4d8f7fc6 100644 --- a/CVE-2022/CVE-2022-326xx/CVE-2022-32616.json +++ b/CVE-2022/CVE-2022-326xx/CVE-2022-32616.json @@ -2,7 +2,7 @@ "id": "CVE-2022-32616", "sourceIdentifier": "security@mediatek.com", "published": "2022-11-08T21:15:15.387", - "lastModified": "2024-11-21T07:06:44.520", + "lastModified": "2025-05-01T19:15:51.363", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-908" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-326xx/CVE-2022-32617.json b/CVE-2022/CVE-2022-326xx/CVE-2022-32617.json index 2f3cc607910..4cfa8db2b4b 100644 --- a/CVE-2022/CVE-2022-326xx/CVE-2022-32617.json +++ b/CVE-2022/CVE-2022-326xx/CVE-2022-32617.json @@ -2,7 +2,7 @@ "id": "CVE-2022-32617", "sourceIdentifier": "security@mediatek.com", "published": "2022-11-08T21:15:15.513", - "lastModified": "2024-11-21T07:06:44.647", + "lastModified": "2025-05-01T19:15:51.520", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-131" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-131" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-326xx/CVE-2022-32618.json b/CVE-2022/CVE-2022-326xx/CVE-2022-32618.json index 7b03e66edf3..fbaa8528e42 100644 --- a/CVE-2022/CVE-2022-326xx/CVE-2022-32618.json +++ b/CVE-2022/CVE-2022-326xx/CVE-2022-32618.json @@ -2,7 +2,7 @@ "id": "CVE-2022-32618", "sourceIdentifier": "security@mediatek.com", "published": "2022-11-08T21:15:15.660", - "lastModified": "2024-11-21T07:06:44.767", + "lastModified": "2025-05-01T19:15:51.673", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-131" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-131" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-32xx/CVE-2022-3265.json b/CVE-2022/CVE-2022-32xx/CVE-2022-3265.json index cd3da62eae8..59655d4d2e8 100644 --- a/CVE-2022/CVE-2022-32xx/CVE-2022-3265.json +++ b/CVE-2022/CVE-2022-32xx/CVE-2022-3265.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3265", "sourceIdentifier": "cve@gitlab.com", "published": "2022-11-09T23:15:13.187", - "lastModified": "2024-11-21T07:19:10.430", + "lastModified": "2025-05-01T20:15:32.687", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-32xx/CVE-2022-3280.json b/CVE-2022/CVE-2022-32xx/CVE-2022-3280.json index e564a0fdc5a..90b1a996696 100644 --- a/CVE-2022/CVE-2022-32xx/CVE-2022-3280.json +++ b/CVE-2022/CVE-2022-32xx/CVE-2022-3280.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3280", "sourceIdentifier": "cve@gitlab.com", "published": "2022-11-09T23:15:13.613", - "lastModified": "2024-11-21T07:19:12.390", + "lastModified": "2025-05-01T20:15:32.830", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-601" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-333xx/CVE-2022-33321.json b/CVE-2022/CVE-2022-333xx/CVE-2022-33321.json index 7a0339a4e9e..892a3bf9a92 100644 --- a/CVE-2022/CVE-2022-333xx/CVE-2022-33321.json +++ b/CVE-2022/CVE-2022-333xx/CVE-2022-33321.json @@ -2,7 +2,7 @@ "id": "CVE-2022-33321", "sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", "published": "2022-11-08T20:15:10.080", - "lastModified": "2024-11-21T07:08:10.610", + "lastModified": "2025-05-01T19:15:51.833", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2022/CVE-2022-348xx/CVE-2022-34824.json b/CVE-2022/CVE-2022-348xx/CVE-2022-34824.json index 20c40b20bb8..d52dc92008d 100644 --- a/CVE-2022/CVE-2022-348xx/CVE-2022-34824.json +++ b/CVE-2022/CVE-2022-348xx/CVE-2022-34824.json @@ -2,7 +2,7 @@ "id": "CVE-2022-34824", "sourceIdentifier": "psirt-info@cyber.jp.nec.com", "published": "2022-11-08T22:15:14.353", - "lastModified": "2024-11-21T07:10:15.670", + "lastModified": "2025-05-01T19:15:52.263", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-276" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-348xx/CVE-2022-34825.json b/CVE-2022/CVE-2022-348xx/CVE-2022-34825.json index 4084c494954..376bc28ca39 100644 --- a/CVE-2022/CVE-2022-348xx/CVE-2022-34825.json +++ b/CVE-2022/CVE-2022-348xx/CVE-2022-34825.json @@ -2,7 +2,7 @@ "id": "CVE-2022-34825", "sourceIdentifier": "psirt-info@cyber.jp.nec.com", "published": "2022-11-08T22:15:14.483", - "lastModified": "2024-11-21T07:10:15.773", + "lastModified": "2025-05-01T19:15:52.433", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-427" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-34xx/CVE-2022-3418.json b/CVE-2022/CVE-2022-34xx/CVE-2022-3418.json index 4df22534197..03b226ca7e7 100644 --- a/CVE-2022/CVE-2022-34xx/CVE-2022-3418.json +++ b/CVE-2022/CVE-2022-34xx/CVE-2022-3418.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3418", "sourceIdentifier": "contact@wpscan.com", "published": "2022-11-07T10:15:11.647", - "lastModified": "2024-11-21T07:19:28.477", + "lastModified": "2025-05-01T21:15:50.940", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-94" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-34xx/CVE-2022-3451.json b/CVE-2022/CVE-2022-34xx/CVE-2022-3451.json index dc283fcc2ec..8071741b1f4 100644 --- a/CVE-2022/CVE-2022-34xx/CVE-2022-3451.json +++ b/CVE-2022/CVE-2022-34xx/CVE-2022-3451.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3451", "sourceIdentifier": "contact@wpscan.com", "published": "2022-11-07T10:15:11.710", - "lastModified": "2024-11-21T07:19:33.237", + "lastModified": "2025-05-01T21:15:51.120", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, diff --git a/CVE-2022/CVE-2022-34xx/CVE-2022-3462.json b/CVE-2022/CVE-2022-34xx/CVE-2022-3462.json index 90081485a55..24afb8c3478 100644 --- a/CVE-2022/CVE-2022-34xx/CVE-2022-3462.json +++ b/CVE-2022/CVE-2022-34xx/CVE-2022-3462.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3462", "sourceIdentifier": "contact@wpscan.com", "published": "2022-11-07T10:15:11.780", - "lastModified": "2024-11-21T07:19:34.470", + "lastModified": "2025-05-01T21:15:51.297", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-34xx/CVE-2022-3463.json b/CVE-2022/CVE-2022-34xx/CVE-2022-3463.json index a01b3e04373..cd74b78dfe6 100644 --- a/CVE-2022/CVE-2022-34xx/CVE-2022-3463.json +++ b/CVE-2022/CVE-2022-34xx/CVE-2022-3463.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3463", "sourceIdentifier": "contact@wpscan.com", "published": "2022-11-07T10:15:11.843", - "lastModified": "2024-11-21T07:19:34.590", + "lastModified": "2025-05-01T21:15:51.500", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,13 +36,33 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "contact@wpscan.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-34xx/CVE-2022-3481.json b/CVE-2022/CVE-2022-34xx/CVE-2022-3481.json index 01505a89590..cba221afc96 100644 --- a/CVE-2022/CVE-2022-34xx/CVE-2022-3481.json +++ b/CVE-2022/CVE-2022-34xx/CVE-2022-3481.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3481", "sourceIdentifier": "contact@wpscan.com", "published": "2022-11-07T10:15:11.903", - "lastModified": "2024-11-21T07:19:37.440", + "lastModified": "2025-05-01T20:15:33.057", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-34xx/CVE-2022-3486.json b/CVE-2022/CVE-2022-34xx/CVE-2022-3486.json index d584be83429..1ba2701ffe1 100644 --- a/CVE-2022/CVE-2022-34xx/CVE-2022-3486.json +++ b/CVE-2022/CVE-2022-34xx/CVE-2022-3486.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3486", "sourceIdentifier": "cve@gitlab.com", "published": "2022-11-09T23:15:14.973", - "lastModified": "2024-11-21T07:19:38.060", + "lastModified": "2025-05-01T20:15:33.323", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-601" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-34xx/CVE-2022-3489.json b/CVE-2022/CVE-2022-34xx/CVE-2022-3489.json index 203471ceec5..8ce66098fce 100644 --- a/CVE-2022/CVE-2022-34xx/CVE-2022-3489.json +++ b/CVE-2022/CVE-2022-34xx/CVE-2022-3489.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3489", "sourceIdentifier": "contact@wpscan.com", "published": "2022-11-07T10:15:11.967", - "lastModified": "2024-11-21T07:19:38.323", + "lastModified": "2025-05-01T20:15:33.460", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, diff --git a/CVE-2022/CVE-2022-34xx/CVE-2022-3494.json b/CVE-2022/CVE-2022-34xx/CVE-2022-3494.json index c5808721acc..0d1ba164d38 100644 --- a/CVE-2022/CVE-2022-34xx/CVE-2022-3494.json +++ b/CVE-2022/CVE-2022-34xx/CVE-2022-3494.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3494", "sourceIdentifier": "contact@wpscan.com", "published": "2022-11-07T10:15:12.030", - "lastModified": "2024-11-21T07:19:39.003", + "lastModified": "2025-05-01T20:15:33.697", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,13 +36,33 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "contact@wpscan.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-35xx/CVE-2022-3536.json b/CVE-2022/CVE-2022-35xx/CVE-2022-3536.json index 4a8026cc4a4..7dfb7d5627c 100644 --- a/CVE-2022/CVE-2022-35xx/CVE-2022-3536.json +++ b/CVE-2022/CVE-2022-35xx/CVE-2022-3536.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3536", "sourceIdentifier": "contact@wpscan.com", "published": "2022-11-07T10:15:12.093", - "lastModified": "2024-11-21T07:19:43.240", + "lastModified": "2025-05-01T20:15:33.907", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,13 +36,33 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "contact@wpscan.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-35xx/CVE-2022-3537.json b/CVE-2022/CVE-2022-35xx/CVE-2022-3537.json index 92ee12a5856..d3fc8bc5af4 100644 --- a/CVE-2022/CVE-2022-35xx/CVE-2022-3537.json +++ b/CVE-2022/CVE-2022-35xx/CVE-2022-3537.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3537", "sourceIdentifier": "contact@wpscan.com", "published": "2022-11-07T10:15:12.160", - "lastModified": "2024-11-21T07:19:43.370", + "lastModified": "2025-05-01T20:15:34.087", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,13 +36,33 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "contact@wpscan.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-35xx/CVE-2022-3558.json b/CVE-2022/CVE-2022-35xx/CVE-2022-3558.json index 4c81c48ce83..46ae573c0bd 100644 --- a/CVE-2022/CVE-2022-35xx/CVE-2022-3558.json +++ b/CVE-2022/CVE-2022-35xx/CVE-2022-3558.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3558", "sourceIdentifier": "contact@wpscan.com", "published": "2022-11-07T10:15:12.227", - "lastModified": "2024-11-21T07:19:45.827", + "lastModified": "2025-05-01T20:15:34.310", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,13 +36,33 @@ }, "exploitabilityScore": 2.1, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.0, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "contact@wpscan.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-370xx/CVE-2022-37015.json b/CVE-2022/CVE-2022-370xx/CVE-2022-37015.json index 456d5c44f04..cd8bc795efe 100644 --- a/CVE-2022/CVE-2022-370xx/CVE-2022-37015.json +++ b/CVE-2022/CVE-2022-370xx/CVE-2022-37015.json @@ -2,7 +2,7 @@ "id": "CVE-2022-37015", "sourceIdentifier": "secure@symantec.com", "published": "2022-11-08T22:15:14.667", - "lastModified": "2024-11-21T07:14:17.203", + "lastModified": "2025-05-01T19:15:52.583", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-371xx/CVE-2022-37109.json b/CVE-2022/CVE-2022-371xx/CVE-2022-37109.json index 679b0c544d3..99532eaff63 100644 --- a/CVE-2022/CVE-2022-371xx/CVE-2022-37109.json +++ b/CVE-2022/CVE-2022-371xx/CVE-2022-37109.json @@ -2,7 +2,7 @@ "id": "CVE-2022-37109", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-14T21:15:13.920", - "lastModified": "2024-11-21T07:14:28.367", + "lastModified": "2025-05-01T19:15:52.750", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-522" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-378xx/CVE-2022-37866.json b/CVE-2022/CVE-2022-378xx/CVE-2022-37866.json index e68bba770b7..64554695a10 100644 --- a/CVE-2022/CVE-2022-378xx/CVE-2022-37866.json +++ b/CVE-2022/CVE-2022-378xx/CVE-2022-37866.json @@ -2,7 +2,7 @@ "id": "CVE-2022-37866", "sourceIdentifier": "security@apache.org", "published": "2022-11-07T14:15:12.357", - "lastModified": "2024-11-21T07:15:17.407", + "lastModified": "2025-05-01T21:15:50.343", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,13 +36,33 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, "weaknesses": [ { "source": "security@apache.org", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-38xx/CVE-2022-3818.json b/CVE-2022/CVE-2022-38xx/CVE-2022-3818.json index 3da9319021e..49863e8c966 100644 --- a/CVE-2022/CVE-2022-38xx/CVE-2022-3818.json +++ b/CVE-2022/CVE-2022-38xx/CVE-2022-3818.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3818", "sourceIdentifier": "cve@gitlab.com", "published": "2022-11-10T00:15:22.620", - "lastModified": "2024-11-21T07:20:17.820", + "lastModified": "2025-05-01T20:15:34.673", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-400" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-38xx/CVE-2022-3819.json b/CVE-2022/CVE-2022-38xx/CVE-2022-3819.json index 7d136c137c9..804eacbc754 100644 --- a/CVE-2022/CVE-2022-38xx/CVE-2022-3819.json +++ b/CVE-2022/CVE-2022-38xx/CVE-2022-3819.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3819", "sourceIdentifier": "cve@gitlab.com", "published": "2022-11-10T00:15:22.710", - "lastModified": "2024-11-21T07:20:17.953", + "lastModified": "2025-05-01T20:15:34.800", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-863" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-414xx/CVE-2022-41432.json b/CVE-2022/CVE-2022-414xx/CVE-2022-41432.json index 2bfabe5fbab..cea2d4bf3c1 100644 --- a/CVE-2022/CVE-2022-414xx/CVE-2022-41432.json +++ b/CVE-2022/CVE-2022-414xx/CVE-2022-41432.json @@ -2,7 +2,7 @@ "id": "CVE-2022-41432", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-08T01:15:09.840", - "lastModified": "2024-11-21T07:23:13.230", + "lastModified": "2025-05-01T19:15:53.433", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-414xx/CVE-2022-41433.json b/CVE-2022/CVE-2022-414xx/CVE-2022-41433.json index 78e9d1b3d9e..ef5910a6edf 100644 --- a/CVE-2022/CVE-2022-414xx/CVE-2022-41433.json +++ b/CVE-2022/CVE-2022-414xx/CVE-2022-41433.json @@ -2,7 +2,7 @@ "id": "CVE-2022-41433", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-08T01:15:09.900", - "lastModified": "2024-11-21T07:23:13.370", + "lastModified": "2025-05-01T19:15:53.613", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-414xx/CVE-2022-41434.json b/CVE-2022/CVE-2022-414xx/CVE-2022-41434.json index ef9e9d32d81..058789bc67f 100644 --- a/CVE-2022/CVE-2022-414xx/CVE-2022-41434.json +++ b/CVE-2022/CVE-2022-414xx/CVE-2022-41434.json @@ -2,7 +2,7 @@ "id": "CVE-2022-41434", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-08T01:15:09.960", - "lastModified": "2024-11-21T07:23:13.500", + "lastModified": "2025-05-01T19:15:53.790", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-417xx/CVE-2022-41757.json b/CVE-2022/CVE-2022-417xx/CVE-2022-41757.json index e0e9fadedda..bc9b191597b 100644 --- a/CVE-2022/CVE-2022-417xx/CVE-2022-41757.json +++ b/CVE-2022/CVE-2022-417xx/CVE-2022-41757.json @@ -2,7 +2,7 @@ "id": "CVE-2022-41757", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-08T15:15:11.073", - "lastModified": "2024-11-21T07:23:47.513", + "lastModified": "2025-05-01T19:15:54.017", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-123" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-431xx/CVE-2022-43144.json b/CVE-2022/CVE-2022-431xx/CVE-2022-43144.json index 42fbab39710..0e87e662093 100644 --- a/CVE-2022/CVE-2022-431xx/CVE-2022-43144.json +++ b/CVE-2022/CVE-2022-431xx/CVE-2022-43144.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43144", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-08T23:15:12.910", - "lastModified": "2024-11-21T07:25:59.257", + "lastModified": "2025-05-01T19:15:54.393", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-433xx/CVE-2022-43343.json b/CVE-2022/CVE-2022-433xx/CVE-2022-43343.json index 18bc8c43a0f..90c25333383 100644 --- a/CVE-2022/CVE-2022-433xx/CVE-2022-43343.json +++ b/CVE-2022/CVE-2022-433xx/CVE-2022-43343.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43343", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-08T15:15:11.207", - "lastModified": "2024-11-21T07:26:18.627", + "lastModified": "2025-05-01T19:15:54.587", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-439xx/CVE-2022-43945.json b/CVE-2022/CVE-2022-439xx/CVE-2022-43945.json index 67db1d4e3c3..10fd7605b69 100644 --- a/CVE-2022/CVE-2022-439xx/CVE-2022-43945.json +++ b/CVE-2022/CVE-2022-439xx/CVE-2022-43945.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43945", "sourceIdentifier": "disclosure@synopsys.com", "published": "2022-11-04T19:15:11.180", - "lastModified": "2024-11-21T07:27:23.453", + "lastModified": "2025-05-01T19:15:55.283", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-440xx/CVE-2022-44054.json b/CVE-2022/CVE-2022-440xx/CVE-2022-44054.json index 777c628c6cc..684f2457dd1 100644 --- a/CVE-2022/CVE-2022-440xx/CVE-2022-44054.json +++ b/CVE-2022/CVE-2022-440xx/CVE-2022-44054.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44054", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-07T15:15:11.687", - "lastModified": "2024-11-21T07:27:36.567", + "lastModified": "2025-05-01T18:15:48.503", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-442xx/CVE-2022-44244.json b/CVE-2022/CVE-2022-442xx/CVE-2022-44244.json index 6698d845029..76964a26bf9 100644 --- a/CVE-2022/CVE-2022-442xx/CVE-2022-44244.json +++ b/CVE-2022/CVE-2022-442xx/CVE-2022-44244.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44244", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-09T22:15:25.593", - "lastModified": "2024-11-21T07:27:46.447", + "lastModified": "2025-05-01T18:15:48.710", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.7, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.6, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.7, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-287" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-443xx/CVE-2022-44311.json b/CVE-2022/CVE-2022-443xx/CVE-2022-44311.json index dd14920c9ed..693963c57a2 100644 --- a/CVE-2022/CVE-2022-443xx/CVE-2022-44311.json +++ b/CVE-2022/CVE-2022-443xx/CVE-2022-44311.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44311", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-08T15:15:11.263", - "lastModified": "2024-11-21T07:27:52.043", + "lastModified": "2025-05-01T19:15:55.473", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-443xx/CVE-2022-44312.json b/CVE-2022/CVE-2022-443xx/CVE-2022-44312.json index 8266306af38..d8cd350a99c 100644 --- a/CVE-2022/CVE-2022-443xx/CVE-2022-44312.json +++ b/CVE-2022/CVE-2022-443xx/CVE-2022-44312.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44312", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-08T15:15:11.327", - "lastModified": "2024-11-21T07:27:52.190", + "lastModified": "2025-05-01T19:15:55.657", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-443xx/CVE-2022-44313.json b/CVE-2022/CVE-2022-443xx/CVE-2022-44313.json index 3c15c6294c2..ae491489bf8 100644 --- a/CVE-2022/CVE-2022-443xx/CVE-2022-44313.json +++ b/CVE-2022/CVE-2022-443xx/CVE-2022-44313.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44313", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-08T15:15:11.387", - "lastModified": "2024-11-21T07:27:52.367", + "lastModified": "2025-05-01T18:15:48.907", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-443xx/CVE-2022-44314.json b/CVE-2022/CVE-2022-443xx/CVE-2022-44314.json index 6faf82bcbd0..bd8ecabb6a5 100644 --- a/CVE-2022/CVE-2022-443xx/CVE-2022-44314.json +++ b/CVE-2022/CVE-2022-443xx/CVE-2022-44314.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44314", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-08T15:15:11.637", - "lastModified": "2024-11-21T07:27:52.510", + "lastModified": "2025-05-01T18:15:49.107", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-443xx/CVE-2022-44315.json b/CVE-2022/CVE-2022-443xx/CVE-2022-44315.json index 338472d1e7a..6bf408d596f 100644 --- a/CVE-2022/CVE-2022-443xx/CVE-2022-44315.json +++ b/CVE-2022/CVE-2022-443xx/CVE-2022-44315.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44315", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-08T15:15:11.850", - "lastModified": "2024-11-21T07:27:52.653", + "lastModified": "2025-05-01T18:15:49.303", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-443xx/CVE-2022-44316.json b/CVE-2022/CVE-2022-443xx/CVE-2022-44316.json index 8c8f22a7f99..39855d1eb4d 100644 --- a/CVE-2022/CVE-2022-443xx/CVE-2022-44316.json +++ b/CVE-2022/CVE-2022-443xx/CVE-2022-44316.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44316", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-08T15:15:12.073", - "lastModified": "2024-11-21T07:27:52.803", + "lastModified": "2025-05-01T18:15:49.490", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-443xx/CVE-2022-44319.json b/CVE-2022/CVE-2022-443xx/CVE-2022-44319.json index 831fada90ee..f29ab361f93 100644 --- a/CVE-2022/CVE-2022-443xx/CVE-2022-44319.json +++ b/CVE-2022/CVE-2022-443xx/CVE-2022-44319.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44319", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-08T15:15:12.470", - "lastModified": "2024-11-21T07:27:53.290", + "lastModified": "2025-05-01T19:15:55.897", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-443xx/CVE-2022-44320.json b/CVE-2022/CVE-2022-443xx/CVE-2022-44320.json index c3cf188d52b..223d307f533 100644 --- a/CVE-2022/CVE-2022-443xx/CVE-2022-44320.json +++ b/CVE-2022/CVE-2022-443xx/CVE-2022-44320.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44320", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-08T15:15:12.590", - "lastModified": "2024-11-21T07:27:53.450", + "lastModified": "2025-05-01T18:15:49.690", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-443xx/CVE-2022-44321.json b/CVE-2022/CVE-2022-443xx/CVE-2022-44321.json index 7cbc11f3043..7b1851acc7d 100644 --- a/CVE-2022/CVE-2022-443xx/CVE-2022-44321.json +++ b/CVE-2022/CVE-2022-443xx/CVE-2022-44321.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44321", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-08T15:15:12.727", - "lastModified": "2024-11-21T07:27:53.590", + "lastModified": "2025-05-01T18:15:49.877", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-444xx/CVE-2022-44457.json b/CVE-2022/CVE-2022-444xx/CVE-2022-44457.json index b5b9b4f883d..9772b2b82fa 100644 --- a/CVE-2022/CVE-2022-444xx/CVE-2022-44457.json +++ b/CVE-2022/CVE-2022-444xx/CVE-2022-44457.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44457", "sourceIdentifier": "productcert@siemens.com", "published": "2022-11-08T11:15:12.257", - "lastModified": "2024-11-21T07:28:03.203", + "lastModified": "2025-05-01T18:15:50.063", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2022/CVE-2022-445xx/CVE-2022-44546.json b/CVE-2022/CVE-2022-445xx/CVE-2022-44546.json index 6c9d9148634..3077c70cff0 100644 --- a/CVE-2022/CVE-2022-445xx/CVE-2022-44546.json +++ b/CVE-2022/CVE-2022-445xx/CVE-2022-44546.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44546", "sourceIdentifier": "psirt@huawei.com", "published": "2022-11-09T21:15:17.930", - "lastModified": "2024-11-21T07:28:06.330", + "lastModified": "2025-05-01T18:15:50.247", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-459" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-445xx/CVE-2022-44556.json b/CVE-2022/CVE-2022-445xx/CVE-2022-44556.json index 3788bee98d7..8afc8c4a376 100644 --- a/CVE-2022/CVE-2022-445xx/CVE-2022-44556.json +++ b/CVE-2022/CVE-2022-445xx/CVE-2022-44556.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44556", "sourceIdentifier": "psirt@huawei.com", "published": "2022-11-08T18:15:11.483", - "lastModified": "2024-11-21T07:28:07.440", + "lastModified": "2025-05-01T18:15:50.437", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-447xx/CVE-2022-44794.json b/CVE-2022/CVE-2022-447xx/CVE-2022-44794.json index f59f399d4a8..0282b4ac254 100644 --- a/CVE-2022/CVE-2022-447xx/CVE-2022-44794.json +++ b/CVE-2022/CVE-2022-447xx/CVE-2022-44794.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44794", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-07T04:15:09.493", - "lastModified": "2024-11-21T07:28:27.963", + "lastModified": "2025-05-01T18:15:50.807", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-447xx/CVE-2022-44795.json b/CVE-2022/CVE-2022-447xx/CVE-2022-44795.json index a7b092b8de5..46a9a80a5bb 100644 --- a/CVE-2022/CVE-2022-447xx/CVE-2022-44795.json +++ b/CVE-2022/CVE-2022-447xx/CVE-2022-44795.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44795", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-07T04:15:09.547", - "lastModified": "2024-11-21T07:28:28.097", + "lastModified": "2025-05-01T18:15:51.010", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-330" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-330" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-447xx/CVE-2022-44796.json b/CVE-2022/CVE-2022-447xx/CVE-2022-44796.json index 771f7b900dd..9f5136490cf 100644 --- a/CVE-2022/CVE-2022-447xx/CVE-2022-44796.json +++ b/CVE-2022/CVE-2022-447xx/CVE-2022-44796.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44796", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-07T04:15:09.600", - "lastModified": "2024-11-21T07:28:28.227", + "lastModified": "2025-05-01T18:15:51.210", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-338" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-338" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-447xx/CVE-2022-44797.json b/CVE-2022/CVE-2022-447xx/CVE-2022-44797.json index 0d34d28dd3a..970e2925fb3 100644 --- a/CVE-2022/CVE-2022-447xx/CVE-2022-44797.json +++ b/CVE-2022/CVE-2022-447xx/CVE-2022-44797.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44797", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-07T04:15:09.650", - "lastModified": "2024-11-21T07:28:28.360", + "lastModified": "2025-05-01T18:15:51.430", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2022/CVE-2022-451xx/CVE-2022-45196.json b/CVE-2022/CVE-2022-451xx/CVE-2022-45196.json index 9aec2d6d3e2..4a1d075bee6 100644 --- a/CVE-2022/CVE-2022-451xx/CVE-2022-45196.json +++ b/CVE-2022/CVE-2022-451xx/CVE-2022-45196.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45196", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-12T20:15:09.823", - "lastModified": "2024-11-21T07:28:56.687", + "lastModified": "2025-05-01T19:15:56.127", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-670" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-670" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-212xx/CVE-2023-21244.json b/CVE-2023/CVE-2023-212xx/CVE-2023-21244.json index e84f6943903..18e8ef67fe0 100644 --- a/CVE-2023/CVE-2023-212xx/CVE-2023-21244.json +++ b/CVE-2023/CVE-2023-212xx/CVE-2023-21244.json @@ -2,7 +2,7 @@ "id": "CVE-2023-21244", "sourceIdentifier": "security@android.com", "published": "2023-10-06T19:15:12.667", - "lastModified": "2024-11-21T07:42:28.877", + "lastModified": "2025-05-01T20:15:35.350", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28209.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28209.json index 83b7fc41298..30bda83e8dd 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28209.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28209.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28209", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-06T02:15:08.550", - "lastModified": "2024-11-21T07:54:36.330", + "lastModified": "2025-05-01T19:15:56.320", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28210.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28210.json index fb5eeed7709..8a4ffc36e6d 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28210.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28210.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28210", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-06T02:15:08.600", - "lastModified": "2024-11-21T07:54:36.460", + "lastModified": "2025-05-01T20:15:35.557", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28215.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28215.json index c13087305c5..c2628b2117b 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28215.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28215.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28215", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-06T02:15:08.857", - "lastModified": "2024-11-21T07:54:37.080", + "lastModified": "2025-05-01T19:15:56.570", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-323xx/CVE-2023-32356.json b/CVE-2023/CVE-2023-323xx/CVE-2023-32356.json index d8060d1733c..7a54f355d6f 100644 --- a/CVE-2023/CVE-2023-323xx/CVE-2023-32356.json +++ b/CVE-2023/CVE-2023-323xx/CVE-2023-32356.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32356", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-06T02:15:08.967", - "lastModified": "2024-11-21T08:03:10.650", + "lastModified": "2025-05-01T19:15:56.733", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-432xx/CVE-2023-43261.json b/CVE-2023/CVE-2023-432xx/CVE-2023-43261.json index b2e70a85bc0..7e7c62dd658 100644 --- a/CVE-2023/CVE-2023-432xx/CVE-2023-43261.json +++ b/CVE-2023/CVE-2023-432xx/CVE-2023-43261.json @@ -2,7 +2,7 @@ "id": "CVE-2023-43261", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-04T12:15:10.627", - "lastModified": "2024-11-21T08:23:54.307", + "lastModified": "2025-05-01T18:15:51.780", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-532" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5168.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5168.json index e8e7b9a2148..cada215b706 100644 --- a/CVE-2023/CVE-2023-51xx/CVE-2023-5168.json +++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5168.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5168", "sourceIdentifier": "security@mozilla.org", "published": "2023-09-27T15:19:42.067", - "lastModified": "2024-11-21T08:41:13.283", + "lastModified": "2025-05-01T21:15:51.850", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5172.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5172.json index 30fd14bd774..c1796b99987 100644 --- a/CVE-2023/CVE-2023-51xx/CVE-2023-5172.json +++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5172.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5172", "sourceIdentifier": "security@mozilla.org", "published": "2023-09-27T15:19:42.283", - "lastModified": "2024-11-21T08:41:13.800", + "lastModified": "2025-05-01T18:15:52.133", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5175.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5175.json index ed3974192a5..657ea19fb13 100644 --- a/CVE-2023/CVE-2023-51xx/CVE-2023-5175.json +++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5175.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5175", "sourceIdentifier": "security@mozilla.org", "published": "2023-09-27T15:19:42.630", - "lastModified": "2024-11-21T08:41:14.140", + "lastModified": "2025-05-01T20:15:35.723", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5176.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5176.json index 92a637776fe..14e0d050b4a 100644 --- a/CVE-2023/CVE-2023-51xx/CVE-2023-5176.json +++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5176.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5176", "sourceIdentifier": "security@mozilla.org", "published": "2023-09-27T15:19:42.767", - "lastModified": "2024-11-21T08:41:14.250", + "lastModified": "2025-05-01T18:15:52.350", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-53xx/CVE-2023-5346.json b/CVE-2023/CVE-2023-53xx/CVE-2023-5346.json index 4fdfa07188b..c20b5e7255b 100644 --- a/CVE-2023/CVE-2023-53xx/CVE-2023-5346.json +++ b/CVE-2023/CVE-2023-53xx/CVE-2023-5346.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5346", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-10-05T18:15:13.270", - "lastModified": "2024-11-21T08:41:34.830", + "lastModified": "2025-05-01T20:15:35.880", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-843" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-54xx/CVE-2023-5472.json b/CVE-2023/CVE-2023-54xx/CVE-2023-5472.json index 81cb1bc18c8..4058fee5f05 100644 --- a/CVE-2023/CVE-2023-54xx/CVE-2023-5472.json +++ b/CVE-2023/CVE-2023-54xx/CVE-2023-5472.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5472", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-10-25T18:17:43.667", - "lastModified": "2024-11-21T08:41:50.380", + "lastModified": "2025-05-01T19:15:56.893", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-54xx/CVE-2023-5474.json b/CVE-2023/CVE-2023-54xx/CVE-2023-5474.json index 201806ec335..18ff2710a4a 100644 --- a/CVE-2023/CVE-2023-54xx/CVE-2023-5474.json +++ b/CVE-2023/CVE-2023-54xx/CVE-2023-5474.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5474", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-10-11T23:15:10.557", - "lastModified": "2024-11-21T08:41:50.640", + "lastModified": "2025-05-01T18:15:52.563", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-54xx/CVE-2023-5476.json b/CVE-2023/CVE-2023-54xx/CVE-2023-5476.json index 6c319d07d42..3349d4f1a6f 100644 --- a/CVE-2023/CVE-2023-54xx/CVE-2023-5476.json +++ b/CVE-2023/CVE-2023-54xx/CVE-2023-5476.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5476", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-10-11T23:15:10.650", - "lastModified": "2024-11-21T08:41:50.917", + "lastModified": "2025-05-01T18:15:52.957", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13381.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13381.json index e94461a7251..276b4774309 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13381.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13381.json @@ -2,7 +2,7 @@ "id": "CVE-2024-13381", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-01T06:15:33.553", - "lastModified": "2025-05-01T06:15:33.553", + "lastModified": "2025-05-01T18:15:53.797", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "The Calculated Fields Form WordPress plugin before 5.2.62 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 2.5 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/da099e52-7f7b-4d76-a0bc-a46315510e0a/", diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27906.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27906.json index c8c2f7aead8..37a0a181c88 100644 --- a/CVE-2024/CVE-2024-279xx/CVE-2024-27906.json +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27906.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27906", "sourceIdentifier": "security@apache.org", "published": "2024-02-29T11:15:08.920", - "lastModified": "2025-02-13T18:17:46.247", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-01T19:13:54.827", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,40 +49,94 @@ "value": "CWE-668" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.8.2", + "matchCriteriaId": "E2DE39E5-BE9D-45F4-92C2-C99C000F6536" + } + ] + } + ] } ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/02/29/1", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://github.com/apache/airflow/pull/37290", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://github.com/apache/airflow/pull/37468", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://lists.apache.org/thread/on4f7t5sqr3vfgp1pvkck79wv7mq9st5", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/02/29/1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://github.com/apache/airflow/pull/37290", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://github.com/apache/airflow/pull/37468", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://lists.apache.org/thread/on4f7t5sqr3vfgp1pvkck79wv7mq9st5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-291xx/CVE-2024-29131.json b/CVE-2024/CVE-2024-291xx/CVE-2024-29131.json index 9a204abd1a4..cec01d757db 100644 --- a/CVE-2024/CVE-2024-291xx/CVE-2024-29131.json +++ b/CVE-2024/CVE-2024-291xx/CVE-2024-29131.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29131", "sourceIdentifier": "security@apache.org", "published": "2024-03-21T09:15:07.807", - "lastModified": "2025-02-13T18:17:49.693", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-01T19:13:04.290", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,42 +51,132 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:commons_configuration:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.0", + "versionEndExcluding": "2.10.1", + "matchCriteriaId": "73FC9C7B-3EF7-4229-AC45-F142EBA294D1" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", + "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:ontap_tools:10:*:*:*:*:vmware_vsphere:*:*", + "matchCriteriaId": "5333B745-F7A3-46CB-8437-8668DB08CD6F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BDFB1169-41A0-4A86-8E4F-FDA9730B1E94" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/03/20/4", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread/03nzzzjn4oknyw5y0871tw7ltj0t3r37", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNKDKEEKZNL5FGCTZKJ6CFXFVWFL5FJ7/", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YD4AFTIIQW662LUAQRMWS6BBKYSZG3YS/", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/03/20/4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread/03nzzzjn4oknyw5y0871tw7ltj0t3r37", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNKDKEEKZNL5FGCTZKJ6CFXFVWFL5FJ7/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YD4AFTIIQW662LUAQRMWS6BBKYSZG3YS/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20241213-0001/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-291xx/CVE-2024-29133.json b/CVE-2024/CVE-2024-291xx/CVE-2024-29133.json index e1ceecd5b50..97f1605d2e5 100644 --- a/CVE-2024/CVE-2024-291xx/CVE-2024-29133.json +++ b/CVE-2024/CVE-2024-291xx/CVE-2024-29133.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29133", "sourceIdentifier": "security@apache.org", "published": "2024-03-21T09:15:07.943", - "lastModified": "2025-02-13T18:17:49.867", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-01T19:12:24.250", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,38 +61,105 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:commons_configuration:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.0", + "versionEndExcluding": "2.10.1", + "matchCriteriaId": "73FC9C7B-3EF7-4229-AC45-F142EBA294D1" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", + "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/03/20/3", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread/ccb9w15bscznh6tnp3wsvrrj9crbszh2", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNKDKEEKZNL5FGCTZKJ6CFXFVWFL5FJ7/", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YD4AFTIIQW662LUAQRMWS6BBKYSZG3YS/", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/03/20/3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread/ccb9w15bscznh6tnp3wsvrrj9crbszh2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNKDKEEKZNL5FGCTZKJ6CFXFVWFL5FJ7/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YD4AFTIIQW662LUAQRMWS6BBKYSZG3YS/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34782.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34782.json index 370ed1b7b34..06238eaa2f3 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34782.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34782.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34782", "sourceIdentifier": "support@hackerone.com", "published": "2024-11-13T02:15:17.367", - "lastModified": "2024-11-13T17:01:16.850", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-01T18:01:32.403", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "support@hackerone.com", @@ -51,10 +73,66 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2022", + "matchCriteriaId": "B1F6549B-CF5D-4607-B67D-5489905A1705" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*", + "matchCriteriaId": "46580865-5177-4E55-BDAC-73DA4B472B35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*", + "matchCriteriaId": "E57E12B5-B789-450C-9476-6C4C151E6993" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*", + "matchCriteriaId": "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*", + "matchCriteriaId": "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*", + "matchCriteriaId": "1877FB55-76BA-4714-ABB8-47258132F537" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:*", + "matchCriteriaId": "4F9E8D45-5F12-4D45-A74E-C314FA3618A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:endpoint_manager:2024:-:*:*:*:*:*:*", + "matchCriteriaId": "6C7283FE-C10A-4E37-B004-15FB0CAC49A5" + } + ] + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Security-Advisory-EPM-November-2024-for-EPM-2024-and-EPM-2022", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34784.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34784.json index de69af5dd7c..edf8b4a036e 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34784.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34784.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34784", "sourceIdentifier": "support@hackerone.com", "published": "2024-11-13T02:15:17.527", - "lastModified": "2024-11-13T17:01:16.850", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-01T18:01:40.537", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "support@hackerone.com", @@ -51,10 +73,66 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2022", + "matchCriteriaId": "B1F6549B-CF5D-4607-B67D-5489905A1705" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*", + "matchCriteriaId": "46580865-5177-4E55-BDAC-73DA4B472B35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*", + "matchCriteriaId": "E57E12B5-B789-450C-9476-6C4C151E6993" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*", + "matchCriteriaId": "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*", + "matchCriteriaId": "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*", + "matchCriteriaId": "1877FB55-76BA-4714-ABB8-47258132F537" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:*", + "matchCriteriaId": "4F9E8D45-5F12-4D45-A74E-C314FA3618A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:endpoint_manager:2024:-:*:*:*:*:*:*", + "matchCriteriaId": "6C7283FE-C10A-4E37-B004-15FB0CAC49A5" + } + ] + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Security-Advisory-EPM-November-2024-for-EPM-2024-and-EPM-2022", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34787.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34787.json index 543e74f1cf8..0fa6e26726f 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34787.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34787.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34787", "sourceIdentifier": "support@hackerone.com", "published": "2024-11-13T02:15:17.687", - "lastModified": "2024-11-13T17:01:16.850", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-01T18:01:43.600", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "support@hackerone.com", @@ -51,10 +73,66 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2022", + "matchCriteriaId": "B1F6549B-CF5D-4607-B67D-5489905A1705" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*", + "matchCriteriaId": "46580865-5177-4E55-BDAC-73DA4B472B35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*", + "matchCriteriaId": "E57E12B5-B789-450C-9476-6C4C151E6993" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*", + "matchCriteriaId": "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*", + "matchCriteriaId": "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*", + "matchCriteriaId": "1877FB55-76BA-4714-ABB8-47258132F537" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:*", + "matchCriteriaId": "4F9E8D45-5F12-4D45-A74E-C314FA3618A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:endpoint_manager:2024:-:*:*:*:*:*:*", + "matchCriteriaId": "6C7283FE-C10A-4E37-B004-15FB0CAC49A5" + } + ] + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Security-Advisory-EPM-November-2024-for-EPM-2024-and-EPM-2022", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-367xx/CVE-2024-36740.json b/CVE-2024/CVE-2024-367xx/CVE-2024-36740.json index c26da384be0..058beae30df 100644 --- a/CVE-2024/CVE-2024-367xx/CVE-2024-36740.json +++ b/CVE-2024/CVE-2024-367xx/CVE-2024-36740.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36740", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-06T19:15:58.217", - "lastModified": "2024-11-21T09:22:35.070", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-05-01T19:51:29.793", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +61,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oneflow:oneflow:0.9.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E8058A82-101A-4B97-9169-0EEFDB712EA8" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Redmept1on/070f5b8b752079c6b761f00f3cab7103", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://gist.github.com/Redmept1on/070f5b8b752079c6b761f00f3cab7103", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37376.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37376.json index 29dee9b36b3..97a2cc85b5c 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37376.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37376.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37376", "sourceIdentifier": "support@hackerone.com", "published": "2024-11-13T02:15:17.850", - "lastModified": "2024-11-13T17:01:16.850", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-01T18:01:46.330", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "support@hackerone.com", @@ -51,10 +73,66 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2022", + "matchCriteriaId": "B1F6549B-CF5D-4607-B67D-5489905A1705" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*", + "matchCriteriaId": "46580865-5177-4E55-BDAC-73DA4B472B35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*", + "matchCriteriaId": "E57E12B5-B789-450C-9476-6C4C151E6993" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*", + "matchCriteriaId": "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*", + "matchCriteriaId": "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*", + "matchCriteriaId": "1877FB55-76BA-4714-ABB8-47258132F537" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:*", + "matchCriteriaId": "4F9E8D45-5F12-4D45-A74E-C314FA3618A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:endpoint_manager:2024:-:*:*:*:*:*:*", + "matchCriteriaId": "6C7283FE-C10A-4E37-B004-15FB0CAC49A5" + } + ] + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Security-Advisory-EPM-November-2024-for-EPM-2024-and-EPM-2022", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37384.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37384.json index a4a9da1225d..58ce0cd13c8 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37384.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37384.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37384", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-07T04:15:30.597", - "lastModified": "2024-11-21T09:23:44.963", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-05-01T19:51:01.563", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,38 +51,102 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.5.7", + "matchCriteriaId": "018530A6-4785-49CC-8868-90824E79CA82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.6.0", + "versionEndExcluding": "1.6.7", + "matchCriteriaId": "1964E474-BED1-4806-A9D0-848BC3D93C0E" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/roundcube/roundcubemail/commit/cde4522c5c95f13c6aeeb1600ab17e5067a536f7", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/roundcube/roundcubemail/releases/tag/1.5.7", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/roundcube/roundcubemail/releases/tag/1.6.7", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00008.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://github.com/roundcube/roundcubemail/commit/cde4522c5c95f13c6aeeb1600ab17e5067a536f7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/roundcube/roundcubemail/releases/tag/1.5.7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/roundcube/roundcubemail/releases/tag/1.6.7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00008.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37385.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37385.json index a1d79d1e594..1cbccf3469c 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37385.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37385.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37385", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-07T04:15:30.720", - "lastModified": "2024-11-21T09:23:45.193", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-05-01T19:49:21.887", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,30 +51,73 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:roundcube:webmail:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "1.5.7", + "matchCriteriaId": "4820F26A-3B57-4AAD-9D64-01DAF1C8DB5F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:roundcube:webmail:*:*:*:*:*:windows:*:*", + "versionStartIncluding": "1.6.0", + "versionEndExcluding": "1.6.7", + "matchCriteriaId": "8F3B4C00-0771-426B-8D5A-ABDD9C0BFD3F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/roundcube/roundcubemail/commit/5ea9f37ce39374b6124586c0590fec7015d35d7f", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/roundcube/roundcubemail/releases/tag/1.5.7", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/roundcube/roundcubemail/releases/tag/1.6.7", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/roundcube/roundcubemail/commit/5ea9f37ce39374b6124586c0590fec7015d35d7f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/roundcube/roundcubemail/releases/tag/1.5.7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/roundcube/roundcubemail/releases/tag/1.6.7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-377xx/CVE-2024-37734.json b/CVE-2024/CVE-2024-377xx/CVE-2024-37734.json index 5d12fe75388..6bbe68cd93a 100644 --- a/CVE-2024/CVE-2024-377xx/CVE-2024-37734.json +++ b/CVE-2024/CVE-2024-377xx/CVE-2024-37734.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37734", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-26T22:15:10.533", - "lastModified": "2024-11-21T09:24:15.913", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-05-01T19:38:20.270", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-emr:openemr:7.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "D1544016-ACCB-4CC7-A241-1D07A8661B06" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/A3h1nt/CVEs/tree/main/OpenEMR", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/openemr/openemr/pull/7435#event-12872646667", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://github.com/A3h1nt/CVEs/tree/main/OpenEMR", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/openemr/openemr/pull/7435#event-12872646667", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38440.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38440.json index 8ba11d20ac3..2d352c3e115 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38440.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38440.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38440", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-16T13:15:53.147", - "lastModified": "2024-11-21T09:25:52.217", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-05-01T19:44:52.170", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,38 +51,95 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netatalk:netatalk:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.0.0", + "versionEndExcluding": "2.4.1", + "matchCriteriaId": "C3F4245E-9F2F-485B-BF45-D12C4880C133" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netatalk:netatalk:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0", + "versionEndExcluding": "3.1.19", + "matchCriteriaId": "BC79D241-5B4D-4430-9F44-5F138836EBD6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netatalk:netatalk:3.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "252F610A-8297-4142-BD3C-45BEF57E33AB" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Netatalk/netatalk/blob/90d91a9ac9a7d6132ab7620d31c8c23400949206/etc/uams/uams_dhx_pam.c#L199-L200", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/Netatalk/netatalk/issues/1097", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Not Applicable" + ] }, { "url": "https://github.com/Netatalk/netatalk/security/advisories/GHSA-mxx4-9fhm-r3w5", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://netatalk.io/security/CVE-2024-38440", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/Netatalk/netatalk/blob/90d91a9ac9a7d6132ab7620d31c8c23400949206/etc/uams/uams_dhx_pam.c#L199-L200", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://github.com/Netatalk/netatalk/issues/1097", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] }, { "url": "https://github.com/Netatalk/netatalk/security/advisories/GHSA-mxx4-9fhm-r3w5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://netatalk.io/security/CVE-2024-38440", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38441.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38441.json index c051cfdb714..4052fd959f6 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38441.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38441.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38441", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-16T13:15:53.230", - "lastModified": "2024-11-21T09:25:52.753", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-05-01T19:42:41.313", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,38 +51,95 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netatalk:netatalk:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.0.0", + "versionEndExcluding": "2.4.1", + "matchCriteriaId": "C3F4245E-9F2F-485B-BF45-D12C4880C133" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netatalk:netatalk:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0", + "versionEndExcluding": "3.1.19", + "matchCriteriaId": "BC79D241-5B4D-4430-9F44-5F138836EBD6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netatalk:netatalk:3.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "252F610A-8297-4142-BD3C-45BEF57E33AB" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Netatalk/netatalk/blob/90d91a9ac9a7d6132ab7620d31c8c23400949206/etc/afpd/directory.c#L2333", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/Netatalk/netatalk/issues/1098", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Not Applicable" + ] }, { "url": "https://github.com/Netatalk/netatalk/security/advisories/GHSA-mj6v-cr68-mj9q", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://netatalk.io/security/CVE-2024-38441", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/Netatalk/netatalk/blob/90d91a9ac9a7d6132ab7620d31c8c23400949206/etc/afpd/directory.c#L2333", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://github.com/Netatalk/netatalk/issues/1098", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] }, { "url": "https://github.com/Netatalk/netatalk/security/advisories/GHSA-mj6v-cr68-mj9q", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://netatalk.io/security/CVE-2024-38441", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40710.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40710.json index ef64f5557f1..5773d61977e 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40710.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40710.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40710", "sourceIdentifier": "support@hackerone.com", "published": "2024-09-07T17:15:13.110", - "lastModified": "2024-09-09T17:35:04.207", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-01T18:13:16.443", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "support@hackerone.com", @@ -51,10 +73,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:veeam:veeam_backup_\\&_replication:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.2.0.334", + "matchCriteriaId": "558CF39E-DE64-41D4-A99E-74BCA1490CDB" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.veeam.com/kb4649", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40712.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40712.json index 7ebc78104cc..b9905df4f90 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40712.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40712.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40712", "sourceIdentifier": "support@hackerone.com", "published": "2024-09-07T17:15:13.410", - "lastModified": "2024-09-09T16:35:06.673", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-01T18:17:14.087", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "support@hackerone.com", @@ -51,10 +73,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:veeam:veeam_backup_\\&_replication:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.2.0.334", + "matchCriteriaId": "558CF39E-DE64-41D4-A99E-74BCA1490CDB" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.veeam.com/kb4649", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40713.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40713.json index 8f06657ceee..16a4338c19c 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40713.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40713.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40713", "sourceIdentifier": "support@hackerone.com", "published": "2024-09-07T17:15:13.550", - "lastModified": "2024-09-09T15:35:08.970", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-01T18:17:17.203", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "support@hackerone.com", @@ -51,10 +73,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:veeam:veeam_backup_\\&_replication:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.2.0.334", + "matchCriteriaId": "558CF39E-DE64-41D4-A99E-74BCA1490CDB" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.veeam.com/kb4649", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40714.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40714.json index f78f18335f8..22bee28326c 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40714.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40714.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40714", "sourceIdentifier": "support@hackerone.com", "published": "2024-09-07T17:15:13.690", - "lastModified": "2024-09-09T14:35:02.980", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-01T18:17:19.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 8.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 6.0 + } + ], "cvssMetricV30": [ { "source": "support@hackerone.com", @@ -51,10 +73,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:veeam:veeam_backup_\\&_replication:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.2.0.334", + "matchCriteriaId": "558CF39E-DE64-41D4-A99E-74BCA1490CDB" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.veeam.com/kb4649", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-420xx/CVE-2024-42019.json b/CVE-2024/CVE-2024-420xx/CVE-2024-42019.json index be57651618a..1d2c2ab9f49 100644 --- a/CVE-2024/CVE-2024-420xx/CVE-2024-42019.json +++ b/CVE-2024/CVE-2024-420xx/CVE-2024-42019.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42019", "sourceIdentifier": "support@hackerone.com", "published": "2024-09-07T17:15:13.980", - "lastModified": "2024-09-09T17:35:05.247", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-01T18:19:46.747", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.0, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "support@hackerone.com", @@ -51,10 +73,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:veeam:one:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.2.0.4093", + "matchCriteriaId": "E27A57EE-8965-45EE-AA48-8F7A8713BD71" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.veeam.com/kb4649", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4620.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4620.json index 80e5ea972ab..cd65a08301a 100644 --- a/CVE-2024/CVE-2024-46xx/CVE-2024-4620.json +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4620.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4620", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-07T06:15:11.763", - "lastModified": "2024-11-21T09:43:13.923", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-05-01T19:47:03.910", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:reputeinfosystems:arforms:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "6.6", + "matchCriteriaId": "A2CA59E9-3C37-4F74-B8D5-184DB4C1D413" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/dc34dc2d-d5a1-4e28-8507-33f659ead647/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/dc34dc2d-d5a1-4e28-8507-33f659ead647/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4621.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4621.json index 21867a9c9f2..a9c879d6ae8 100644 --- a/CVE-2024/CVE-2024-46xx/CVE-2024-4621.json +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4621.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4621", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-07T06:15:11.840", - "lastModified": "2024-11-21T09:43:14.093", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-05-01T19:46:27.260", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:reputeinfosystems:arforms:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "6.6", + "matchCriteriaId": "A2CA59E9-3C37-4F74-B8D5-184DB4C1D413" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/33a366d9-6c81-4957-a101-768487aae735/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/33a366d9-6c81-4957-a101-768487aae735/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48905.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48905.json new file mode 100644 index 00000000000..e54bac147b5 --- /dev/null +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48905.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48905", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-05-01T21:15:52.033", + "lastModified": "2025-05-01T21:15:52.033", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Sematell ReplyOne 7.4.3.0 has Insecure Permissions for the /rest/sessions endpoint." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-082.txt", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48906.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48906.json new file mode 100644 index 00000000000..1ea6d8dd626 --- /dev/null +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48906.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48906", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-05-01T21:15:52.160", + "lastModified": "2025-05-01T21:15:52.160", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Sematell ReplyOne 7.4.3.0 allows XSS via a ReplyDesk e-mail attachment name." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-081.txt", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48907.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48907.json new file mode 100644 index 00000000000..3d6f7e69b30 --- /dev/null +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48907.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48907", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-05-01T21:15:52.270", + "lastModified": "2025-05-01T21:15:52.270", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Sematell ReplyOne 7.4.3.0 allows SSRF via the application server API." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-083.txt", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4934.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4934.json index 661c213bbd9..df5203c36af 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4934.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4934.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4934", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-01T06:15:23.847", - "lastModified": "2024-11-21T09:43:54.343", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-05-01T19:37:29.113", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:expresstech:quiz_and_survey_master:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "9.0.2", + "matchCriteriaId": "57725447-AB0A-4B25-BB23-9292AFA5FB01" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/a2270ee1-3211-4b16-b3d7-6cdd732f7155/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/a2270ee1-3211-4b16-b3d7-6cdd732f7155/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-509xx/CVE-2024-50997.json b/CVE-2024/CVE-2024-509xx/CVE-2024-50997.json index 9103919d14a..7a7e84b7ed7 100644 --- a/CVE-2024/CVE-2024-509xx/CVE-2024-50997.json +++ b/CVE-2024/CVE-2024-509xx/CVE-2024-50997.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50997", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-05T15:15:23.783", - "lastModified": "2024-11-05T17:35:22.727", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-01T18:22:26.830", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,130 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netgear:r8500_firmware:1.0.2.160:*:*:*:*:*:*:*", + "matchCriteriaId": "C6D9B3EF-5A5F-4EA3-AE90-583119B1B916" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netgear:r8500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "63500DE4-BDBD-4F86-AB99-7DB084D0B912" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netgear:xr300_firmware:1.0.3.78:*:*:*:*:*:*:*", + "matchCriteriaId": "3E35B900-99B9-4937-B3F5-04212913F6DC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netgear:xr300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5590CF28-B88A-4755-904B-1BC1778FBEDD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netgear:r7000p_firmware:1.3.3.154:*:*:*:*:*:*:*", + "matchCriteriaId": "9D40A1E4-7E59-4035-881D-27AEF89152F4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DFE55F4D-E98B-46D3-B870-041141934CD1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netgear:r6400v2_firmware:1.0.4.128:*:*:*:*:*:*:*", + "matchCriteriaId": "ECF56F5E-A815-4CBE-ABDD-19A2133BDEB0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netgear:r6400v2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AFE6B3A8-0601-44EA-AD9B-3BDDE6654FDF" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/wudipjq/my_vuln/blob/main/Netgear4/vuln_43/43.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.netgear.com/about/security/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52903.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52903.json new file mode 100644 index 00000000000..80c2b58f6da --- /dev/null +++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52903.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-52903", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-05-01T23:15:50.317", + "lastModified": "2025-05-01T23:15:50.317", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Db2 for Linux, UNIX and Windows 12.1.0 and 12.1.1 is vulnerable to a denial of service as the server may crash under certain conditions with a specially crafted query." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7232336", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6130.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6130.json index 070b77041ce..c212727fd1e 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6130.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6130.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6130", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-01T06:15:23.957", - "lastModified": "2024-11-21T09:49:01.660", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-05-01T19:35:44.337", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:10web:form_maker:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.15.26", + "matchCriteriaId": "FDEB0D5C-0103-41A9-B061-9AC5B0418878" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/bbed2968-4bd6-49ae-bd61-8a1f751e7041/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/bbed2968-4bd6-49ae-bd61-8a1f751e7041/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1217.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1217.json index 6446b4cf523..1a1d77b08db 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1217.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1217.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1217", "sourceIdentifier": "security@php.net", "published": "2025-03-29T06:15:36.557", - "lastModified": "2025-04-01T20:26:30.593", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-01T19:29:33.903", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 3.1, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 + } ] }, "weaknesses": [ @@ -71,16 +93,74 @@ "value": "CWE-20" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-436" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.1.0", + "versionEndExcluding": "8.1.32", + "matchCriteriaId": "240B9DA6-4FE3-42D1-931A-9F4C62EC0ABA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.2.0", + "versionEndExcluding": "8.2.28", + "matchCriteriaId": "3C01313A-447A-4190-B275-3A6394EEFD96" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.3.0", + "versionEndExcluding": "8.3.19", + "matchCriteriaId": "A525415D-4C9F-4884-9F85-94989608D805" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.4.0", + "versionEndExcluding": "8.4.5", + "matchCriteriaId": "AC94B1EC-530A-4A25-9BCD-DAC5F52F6813" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/php/php-src/security/advisories/GHSA-v8xr-gpvj-cx9g", - "source": "security@php.net" + "source": "security@php.net", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/php/php-src/security/advisories/GHSA-v8xr-gpvj-cx9g", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1333.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1333.json new file mode 100644 index 00000000000..48329d135e2 --- /dev/null +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1333.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-1333", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-05-01T22:15:16.657", + "lastModified": "2025-05-01T22:15:16.657", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM MQ Container when used with the IBM MQ Operator LTS 2.0.0 through 2.0.29, MQ Operator CD 3.0.0, 3.0.1, 3.1.0 through 3.1.3, 3.3.0, 3.4.0, 3.4.1, 3.5.0, 3.5.1, and MQ Operator SC2 3.2.0 through 3.2.10 and configured with Cloud Pak for Integration Keycloak could disclose sensitive information to a privileged user." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", + "baseScore": 6.0, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.5, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-214" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7232272", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22868.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22868.json index 82861c94560..c3f4229ae0a 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22868.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22868.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22868", "sourceIdentifier": "security@golang.org", "published": "2025-02-26T08:14:24.897", - "lastModified": "2025-02-26T15:15:24.993", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-01T19:27:10.430", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:go:jws:*:*:*:*:*:go:*:*", + "versionEndExcluding": "0.27.0", + "matchCriteriaId": "F28A0D5F-0E79-4646-9A95-3139A525D7AC" + } + ] + } + ] + } + ], "references": [ { "url": "https://go.dev/cl/652155", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Patch" + ] }, { "url": "https://go.dev/issue/71490", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://pkg.go.dev/vuln/GO-2025-3488", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22869.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22869.json index 45a34a62cb8..4d6a4817d17 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22869.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22869.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22869", "sourceIdentifier": "security@golang.org", "published": "2025-02-26T08:14:24.997", - "lastModified": "2025-04-11T22:15:29.837", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-01T19:28:20.740", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:go:ssh:*:*:*:*:*:go:*:*", + "versionEndExcluding": "0.35.0", + "matchCriteriaId": "311D718D-7E78-4EFC-A3B6-0D20C28956C9" + } + ] + } + ] + } + ], "references": [ { "url": "https://go.dev/cl/652135", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Patch" + ] }, { "url": "https://go.dev/issue/71931", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://pkg.go.dev/vuln/GO-2025-3487", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20250411-0010/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24522.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24522.json new file mode 100644 index 00000000000..236f06de25f --- /dev/null +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24522.json @@ -0,0 +1,104 @@ +{ + "id": "CVE-2025-24522", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2025-05-01T19:15:57.097", + "lastModified": "2025-05-01T19:15:57.097", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "KUNBUS Revolution Pi OS Bookworm 01/2025 is vulnerable because authentication is not configured by default for the Node-RED server. This can give an unauthenticated remote attacker full access to the Node-RED server where they can run arbitrary commands on the underlying operating system." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 10.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-305" + } + ] + } + ], + "references": [ + { + "url": "http://packages.revolutionpi.de/pool/main/p/pictory/", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-121-01", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27188.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27188.json index f3471a9db33..5fb7c25bf14 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27188.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27188.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27188", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T21:15:50.393", - "lastModified": "2025-05-01T16:15:26.760", - "vulnStatus": "Modified", + "lastModified": "2025-05-01T20:00:44.443", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27365.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27365.json new file mode 100644 index 00000000000..6b0d1848ea4 --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27365.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27365", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-05-01T22:15:17.500", + "lastModified": "2025-05-01T22:15:17.500", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM MQ Operator LTS 2.0.0 through 2.0.29, MQ Operator CD 3.0.0, 3.0.1, 3.1.0 through 3.1.3, 3.3.0, 3.4.0, 3.4.1, 3.5.0, 3.5.1, and MQ Operator SC2 3.2.0 through 3.2.10\u00a0\n\nClient connecting to a MQ Queue Manager can cause a SIGSEGV in the AMQRMPPA channel process terminating it." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7232272", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2857.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2857.json index f834472d308..b07c7c31de5 100644 --- a/CVE-2025/CVE-2025-28xx/CVE-2025-2857.json +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2857.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2857", "sourceIdentifier": "security@mozilla.org", "published": "2025-03-27T14:15:55.720", - "lastModified": "2025-03-28T16:15:30.180", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-01T19:31:14.930", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,87 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*", + "versionEndExcluding": "136.0.4", + "matchCriteriaId": "8D63728B-F6A1-4AE4-8E2A-06279158154D" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionEndExcluding": "115.21.1", + "matchCriteriaId": "49918C23-8656-4D5F-B626-1B7ED8E45F8F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionStartIncluding": "128.1.0", + "versionEndExcluding": "128.8.1", + "matchCriteriaId": "D508F954-1ED2-4185-96B1-571172C5897D" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1956398", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Permissions Required" + ] }, { "url": "https://issues.chromium.org/issues/405143032", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Permissions Required" + ] }, { "url": "https://www.cve.org/CVERecord?id=CVE-2025-2783", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-19/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-290xx/CVE-2025-29040.json b/CVE-2025/CVE-2025-290xx/CVE-2025-29040.json index adca7996994..e86f42ab27d 100644 --- a/CVE-2025/CVE-2025-290xx/CVE-2025-29040.json +++ b/CVE-2025/CVE-2025-290xx/CVE-2025-29040.json @@ -2,13 +2,13 @@ "id": "CVE-2025-29040", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-17T15:15:54.387", - "lastModified": "2025-04-25T18:34:37.217", - "vulnStatus": "Analyzed", + "lastModified": "2025-05-01T18:15:54.197", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "An issue in dlink DIR 832x 240802 allows a remote attacker to execute arbitrary code via the target_addr key value and the function 0x41737c" + "value": "An issue in dlink DIR 823x 240802 allows a remote attacker to execute arbitrary code via the target_addr key value and the function 0x41737c" }, { "lang": "es", diff --git a/CVE-2025/CVE-2025-290xx/CVE-2025-29041.json b/CVE-2025/CVE-2025-290xx/CVE-2025-29041.json index 12986e8d504..a610cf40304 100644 --- a/CVE-2025/CVE-2025-290xx/CVE-2025-29041.json +++ b/CVE-2025/CVE-2025-290xx/CVE-2025-29041.json @@ -2,13 +2,13 @@ "id": "CVE-2025-29041", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-17T15:15:54.520", - "lastModified": "2025-04-25T18:28:55.070", - "vulnStatus": "Analyzed", + "lastModified": "2025-05-01T18:15:54.737", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "An issue in dlink DIR 832x 240802 allows a remote attacker to execute arbitrary code via the target_addr key value and the function 0x41710c" + "value": "An issue in dlink DIR 823x 240802 allows a remote attacker to execute arbitrary code via the target_addr key value and the function 0x41710c" }, { "lang": "es", diff --git a/CVE-2025/CVE-2025-297xx/CVE-2025-29763.json b/CVE-2025/CVE-2025-297xx/CVE-2025-29763.json new file mode 100644 index 00000000000..a07c3de0646 --- /dev/null +++ b/CVE-2025/CVE-2025-297xx/CVE-2025-29763.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2025-29763", + "sourceIdentifier": "psirt@esri.com", + "published": "2025-05-01T20:15:36.110", + "lastModified": "2025-05-01T20:15:36.110", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: \u201cThis CVE ID is Rejected and will not be used. The issue was determined to not be a vulnerability.\u201d" + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-313xx/CVE-2025-31324.json b/CVE-2025/CVE-2025-313xx/CVE-2025-31324.json index fa5cf101d97..125a03c60c7 100644 --- a/CVE-2025/CVE-2025-313xx/CVE-2025-31324.json +++ b/CVE-2025/CVE-2025-313xx/CVE-2025-31324.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31324", "sourceIdentifier": "cna@sap.com", "published": "2025-04-24T17:15:35.913", - "lastModified": "2025-04-30T01:00:02.383", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-05-01T20:15:36.200", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -71,6 +71,10 @@ { "url": "https://www.theregister.com/2025/04/25/sap_netweaver_patch/", "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://onapsis.com/blog/active-exploitation-of-sap-vulnerability-cve-2025-31324/", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-320xx/CVE-2025-32011.json b/CVE-2025/CVE-2025-320xx/CVE-2025-32011.json new file mode 100644 index 00000000000..1a149759189 --- /dev/null +++ b/CVE-2025/CVE-2025-320xx/CVE-2025-32011.json @@ -0,0 +1,104 @@ +{ + "id": "CVE-2025-32011", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2025-05-01T19:15:57.357", + "lastModified": "2025-05-01T19:15:57.357", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "KUNBUS PiCtory versions 2.5.0 through 2.11.1 have an authentication bypass vulnerability where a remote attacker can bypass authentication to get access due to a path traversal." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-305" + } + ] + } + ], + "references": [ + { + "url": "http://packages.revolutionpi.de/pool/main/p/pictory/", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-121-01", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-327xx/CVE-2025-32755.json b/CVE-2025/CVE-2025-327xx/CVE-2025-32755.json index b58c9725cef..6c20d4b76f4 100644 --- a/CVE-2025/CVE-2025-327xx/CVE-2025-32755.json +++ b/CVE-2025/CVE-2025-327xx/CVE-2025-32755.json @@ -2,7 +2,7 @@ "id": "CVE-2025-32755", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2025-04-10T12:15:16.547", - "lastModified": "2025-04-11T15:39:52.920", + "lastModified": "2025-05-01T19:05:44.990", "vulnStatus": "Undergoing Analysis", "cveTags": [ { @@ -58,10 +58,36 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jenkins:ssh-agent:*:*:*:*:*:docker:*:*", + "versionEndExcluding": "6.11.2", + "matchCriteriaId": "D635AFF6-449C-4436-9E85-BC40D217DB7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jenkins:ssh-slave:*:*:*:*:*:docker:*:*", + "matchCriteriaId": "24F38969-90C4-44D5-86BB-BA9E5884CC48" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.jenkins.io/security/advisory/2025-04-10/#SECURITY-3565", - "source": "jenkinsci-cert@googlegroups.com" + "source": "jenkinsci-cert@googlegroups.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-328xx/CVE-2025-32881.json b/CVE-2025/CVE-2025-328xx/CVE-2025-32881.json new file mode 100644 index 00000000000..7d51da3ee4c --- /dev/null +++ b/CVE-2025/CVE-2025-328xx/CVE-2025-32881.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-32881", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-05-01T18:15:54.970", + "lastModified": "2025-05-01T20:15:36.350", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered on goTenna v1 devices with app 5.5.3 and firmware 0.25.5. By default, the GID is the user's phone number unless they specifically opt out. A phone number is very sensitive information because it can be tied back to individuals. The app does not encrypt the GID in messages." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-319" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Dollarhyde/goTenna_v1_and_Mesh_vulnerabilities", + "source": "cve@mitre.org" + }, + { + "url": "https://gotenna.com", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-328xx/CVE-2025-32882.json b/CVE-2025/CVE-2025-328xx/CVE-2025-32882.json new file mode 100644 index 00000000000..6e8e96c3c19 --- /dev/null +++ b/CVE-2025/CVE-2025-328xx/CVE-2025-32882.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-32882", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-05-01T18:15:55.127", + "lastModified": "2025-05-01T20:15:36.530", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered on goTenna v1 devices with app 5.5.3 and firmware 0.25.5. The app uses a custom implementation of encryption without any additional integrity checking mechanisms. This leaves messages malleable to an attacker that can access the message." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-353" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Dollarhyde/goTenna_v1_and_Mesh_vulnerabilities", + "source": "cve@mitre.org" + }, + { + "url": "https://gotenna.com", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-328xx/CVE-2025-32883.json b/CVE-2025/CVE-2025-328xx/CVE-2025-32883.json new file mode 100644 index 00000000000..840657a0a19 --- /dev/null +++ b/CVE-2025/CVE-2025-328xx/CVE-2025-32883.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-32883", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-05-01T18:15:55.280", + "lastModified": "2025-05-01T20:15:36.820", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered on goTenna Mesh devices with app 5.5.3 and firmware 1.1.12. The app there makes it possible to inject any custom message (into existing mesh networks) with any GID and Callsign via a software defined radio. This can be exploited if the device is being used in an unencrypted environment or if the cryptography has already been compromised." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1390" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Dollarhyde/goTenna_v1_and_Mesh_vulnerabilities", + "source": "cve@mitre.org" + }, + { + "url": "https://gotenna.com", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-328xx/CVE-2025-32884.json b/CVE-2025/CVE-2025-328xx/CVE-2025-32884.json new file mode 100644 index 00000000000..6b3f16581fc --- /dev/null +++ b/CVE-2025/CVE-2025-328xx/CVE-2025-32884.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-32884", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-05-01T18:15:55.427", + "lastModified": "2025-05-01T20:15:36.977", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered on goTenna Mesh devices with app 5.5.3 and firmware 1.1.12. By default, a GID is the user's phone number unless they specifically opt out. A phone number is very sensitive information because it can be tied back to individuals. The app does not encrypt the GID in messages." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-319" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Dollarhyde/goTenna_v1_and_Mesh_vulnerabilities", + "source": "cve@mitre.org" + }, + { + "url": "https://gotenna.com", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-328xx/CVE-2025-32885.json b/CVE-2025/CVE-2025-328xx/CVE-2025-32885.json new file mode 100644 index 00000000000..5f1efa4f005 --- /dev/null +++ b/CVE-2025/CVE-2025-328xx/CVE-2025-32885.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-32885", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-05-01T18:15:55.593", + "lastModified": "2025-05-01T20:15:37.150", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered on goTenna v1 devices with app 5.5.3 and firmware 0.25.5. The app there makes it possible to inject any custom message (into existing v1 networks) with any GID and Callsign via a software defined radio. This can be exploited if the device is being used in an unencrypted environment or if the cryptography has already been compromised." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1390" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Dollarhyde/goTenna_v1_and_Mesh_vulnerabilities", + "source": "cve@mitre.org" + }, + { + "url": "https://gotenna.com", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-328xx/CVE-2025-32886.json b/CVE-2025/CVE-2025-328xx/CVE-2025-32886.json new file mode 100644 index 00000000000..9bb53814757 --- /dev/null +++ b/CVE-2025/CVE-2025-328xx/CVE-2025-32886.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-32886", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-05-01T18:15:55.800", + "lastModified": "2025-05-01T20:15:37.360", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered on goTenna v1 devices with app 5.5.3 and firmware 0.25.5. All packets sent over RF are also sent over UART with USB Shell, allowing someone with local access to gain information about the protocol and intercept sensitive data." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.0, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.5, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-923" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Dollarhyde/goTenna_v1_and_Mesh_vulnerabilities", + "source": "cve@mitre.org" + }, + { + "url": "https://gotenna.com", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-328xx/CVE-2025-32887.json b/CVE-2025/CVE-2025-328xx/CVE-2025-32887.json new file mode 100644 index 00000000000..3fe506556a2 --- /dev/null +++ b/CVE-2025/CVE-2025-328xx/CVE-2025-32887.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-32887", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-05-01T18:15:55.957", + "lastModified": "2025-05-01T20:15:37.537", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered on goTenna v1 devices with app 5.5.3 and firmware 0.25.5. A command channel includes the next hop. which can be intercepted and used to break frequency hopping." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-319" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Dollarhyde/goTenna_v1_and_Mesh_vulnerabilities", + "source": "cve@mitre.org" + }, + { + "url": "https://gotenna.com", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-328xx/CVE-2025-32888.json b/CVE-2025/CVE-2025-328xx/CVE-2025-32888.json new file mode 100644 index 00000000000..40ade087071 --- /dev/null +++ b/CVE-2025/CVE-2025-328xx/CVE-2025-32888.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-32888", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-05-01T18:15:56.107", + "lastModified": "2025-05-01T20:15:37.710", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered on goTenna Mesh devices with app 5.5.3 and firmware 1.1.12. The verification token used for sending SMS through a goTenna server is hardcoded in the app." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Dollarhyde/goTenna_v1_and_Mesh_vulnerabilities", + "source": "cve@mitre.org" + }, + { + "url": "https://gotenna.com", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-328xx/CVE-2025-32889.json b/CVE-2025/CVE-2025-328xx/CVE-2025-32889.json new file mode 100644 index 00000000000..18926229e65 --- /dev/null +++ b/CVE-2025/CVE-2025-328xx/CVE-2025-32889.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-32889", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-05-01T18:15:56.247", + "lastModified": "2025-05-01T19:15:57.583", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered on goTenna v1 devices with app 5.5.3 and firmware 0.25.5. The verification token used for sending SMS through a goTenna server is hardcoded in the app." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Dollarhyde/goTenna_v1_and_Mesh_vulnerabilities", + "source": "cve@mitre.org" + }, + { + "url": "https://gotenna.com", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-328xx/CVE-2025-32890.json b/CVE-2025/CVE-2025-328xx/CVE-2025-32890.json new file mode 100644 index 00000000000..030db88fe4d --- /dev/null +++ b/CVE-2025/CVE-2025-328xx/CVE-2025-32890.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-32890", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-05-01T18:15:56.390", + "lastModified": "2025-05-01T19:15:57.750", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered on goTenna Mesh devices with app 5.5.3 and firmware 1.1.12. It uses a custom implementation of encryption without any additional integrity checking mechanisms. This leaves messages malleable to an attacker that can access the message." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-353" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Dollarhyde/goTenna_v1_and_Mesh_vulnerabilities", + "source": "cve@mitre.org" + }, + { + "url": "https://gotenna.com", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-359xx/CVE-2025-35975.json b/CVE-2025/CVE-2025-359xx/CVE-2025-35975.json new file mode 100644 index 00000000000..e38de0a403d --- /dev/null +++ b/CVE-2025/CVE-2025-359xx/CVE-2025-35975.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-35975", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2025-05-01T19:15:57.887", + "lastModified": "2025-05-01T19:15:57.887", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "MicroDicom DICOM Viewer is vulnerable to an out-of-bounds write which may allow an attacker to execute arbitrary code. The user must open a malicious DCM file for exploitation." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "ACTIVE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-121-01", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-359xx/CVE-2025-35996.json b/CVE-2025/CVE-2025-359xx/CVE-2025-35996.json new file mode 100644 index 00000000000..93a562a70a0 --- /dev/null +++ b/CVE-2025/CVE-2025-359xx/CVE-2025-35996.json @@ -0,0 +1,104 @@ +{ + "id": "CVE-2025-35996", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2025-05-01T19:15:58.047", + "lastModified": "2025-05-01T19:15:58.047", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "KUNBUS PiCtory version 2.11.1 and earlier are vulnerable when an authenticated remote attacker crafts a special filename that can be stored by API endpoints. That filename is later transmitted to the client in order to show a list of configuration files. Due to a missing escape or sanitization, the filename could be executed as HTML script tag resulting in a cross-site-scripting attack." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "ACTIVE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 9.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-97" + } + ] + } + ], + "references": [ + { + "url": "http://packages.revolutionpi.de/pool/main/p/pictory/", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-121-01", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-35xx/CVE-2025-3517.json b/CVE-2025/CVE-2025-35xx/CVE-2025-3517.json new file mode 100644 index 00000000000..bf7a40dbdfa --- /dev/null +++ b/CVE-2025/CVE-2025-35xx/CVE-2025-3517.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-3517", + "sourceIdentifier": "security@devolutions.net", + "published": "2025-05-01T19:15:58.517", + "lastModified": "2025-05-01T19:15:58.517", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Privilege context switching error in PAM JIT feature in Devolutions Server 2025.1.5.0 and earlier allows a PAM JIT account password to be improperly reset after usage via specific actions such as editing the username." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@devolutions.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-270" + } + ] + } + ], + "references": [ + { + "url": "https://devolutions.net/security/advisories/DEVO-2025-0006/", + "source": "security@devolutions.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-365xx/CVE-2025-36521.json b/CVE-2025/CVE-2025-365xx/CVE-2025-36521.json new file mode 100644 index 00000000000..684cb61ba9a --- /dev/null +++ b/CVE-2025/CVE-2025-365xx/CVE-2025-36521.json @@ -0,0 +1,104 @@ +{ + "id": "CVE-2025-36521", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2025-05-01T19:15:58.203", + "lastModified": "2025-05-01T19:15:58.203", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "MicroDicom DICOM Viewer is vulnerable to an out-of-bounds read which may allow an attacker to cause memory corruption within the application. The user must open a malicious DCM file for exploitation." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "ACTIVE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-121-01", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://www.microdicom.com/downloads.html", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-365xx/CVE-2025-36558.json b/CVE-2025/CVE-2025-365xx/CVE-2025-36558.json new file mode 100644 index 00000000000..a3fc42e3ea7 --- /dev/null +++ b/CVE-2025/CVE-2025-365xx/CVE-2025-36558.json @@ -0,0 +1,104 @@ +{ + "id": "CVE-2025-36558", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2025-05-01T19:15:58.367", + "lastModified": "2025-05-01T19:15:58.367", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "KUNBUS PiCtory version 2.11.1 and earlier are vulnerable to a cross-site-scripting attack via the sso_token used for authentication. If an attacker provides the user with a PiCtory URL containing an HTML script as an sso_token, that script will reply to the user and be executed." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "ACTIVE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-97" + } + ] + } + ], + "references": [ + { + "url": "http://packages.revolutionpi.de/pool/main/p/pictory/", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-121-01", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-370xx/CVE-2025-37087.json b/CVE-2025/CVE-2025-370xx/CVE-2025-37087.json index 062695c995f..9bb43bb7235 100644 --- a/CVE-2025/CVE-2025-370xx/CVE-2025-37087.json +++ b/CVE-2025/CVE-2025-370xx/CVE-2025-37087.json @@ -2,7 +2,7 @@ "id": "CVE-2025-37087", "sourceIdentifier": "security-alert@hpe.com", "published": "2025-04-22T21:15:45.650", - "lastModified": "2025-04-23T14:15:29.167", + "lastModified": "2025-05-01T22:15:17.647", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -53,7 +53,7 @@ ], "references": [ { - "url": "https://support.hpe.com/hpesc/docDisplay?docLocale=en_US&docId=a00146087en_us", + "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbcr04840en_us&docLocale=en_US", "source": "security-alert@hpe.com" } ] diff --git a/CVE-2025/CVE-2025-41xx/CVE-2025-4174.json b/CVE-2025/CVE-2025-41xx/CVE-2025-4174.json new file mode 100644 index 00000000000..957eedbca11 --- /dev/null +++ b/CVE-2025/CVE-2025-41xx/CVE-2025-4174.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-4174", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-05-01T19:15:59.333", + "lastModified": "2025-05-01T19:15:59.333", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in PHPGurukul COVID19 Testing Management System 1.0. Affected by this issue is some unknown functionality of the file /login.php. The manipulation of the argument Username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/FLYFISH567/CVE/issues/1", + "source": "cna@vuldb.com" + }, + { + "url": "https://phpgurukul.com/", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.306794", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.306794", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.561746", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-41xx/CVE-2025-4175.json b/CVE-2025/CVE-2025-41xx/CVE-2025-4175.json new file mode 100644 index 00000000000..1f27a08ba52 --- /dev/null +++ b/CVE-2025/CVE-2025-41xx/CVE-2025-4175.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2025-4175", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-05-01T21:15:54.687", + "lastModified": "2025-05-01T21:15:54.687", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in AlanBinu007 Spring-Boot-Advanced-Projects up to 3.1.3. This affects the function uploadUserProfileImage of the file /Spring-Boot-Advanced-Projects-main/Project-4.SpringBoot-AWS-S3/backend/src/main/java/com/urunov/profile/UserProfileController.jav of the component Upload Profile API Endpoint. The manipulation of the argument File leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250418-01.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.306795", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.306795", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.561760", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-41xx/CVE-2025-4176.json b/CVE-2025/CVE-2025-41xx/CVE-2025-4176.json new file mode 100644 index 00000000000..9d7c43bc7e4 --- /dev/null +++ b/CVE-2025/CVE-2025-41xx/CVE-2025-4176.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-4176", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-05-01T22:15:17.950", + "lastModified": "2025-05-01T22:15:17.950", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in PHPGurukul Blood Bank & Donor Management System 2.4 and classified as critical. This vulnerability affects unknown code of the file /admin/request-received-bydonar.php. The manipulation of the argument searchdata leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/bluechips-zhao/myCVE/issues/5", + "source": "cna@vuldb.com" + }, + { + "url": "https://phpgurukul.com/", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.306796", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.306796", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.561764", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-41xx/CVE-2025-4178.json b/CVE-2025/CVE-2025-41xx/CVE-2025-4178.json new file mode 100644 index 00000000000..d0a1dcffafd --- /dev/null +++ b/CVE-2025/CVE-2025-41xx/CVE-2025-4178.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2025-4178", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-05-01T22:15:18.140", + "lastModified": "2025-05-01T22:15:18.140", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in xiaowei1118 java_server up to 11a5bac8f4ba1c17e4bc1b27cad6d24868500e3a on Windows and classified as critical. This issue affects some unknown processing of the file /src/main/java/com/changyu/foryou/controller/FoodController.java of the component File Upload API. The manipulation leads to path traversal. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", + "baseScore": 5.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 4.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250418-02.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.306797", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.306797", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.561794", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-41xx/CVE-2025-4180.json b/CVE-2025/CVE-2025-41xx/CVE-2025-4180.json new file mode 100644 index 00000000000..ba5b10e5661 --- /dev/null +++ b/CVE-2025/CVE-2025-41xx/CVE-2025-4180.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-4180", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-05-01T22:15:18.313", + "lastModified": "2025-05-01T22:15:18.313", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in PCMan FTP Server 2.0.7. It has been classified as critical. Affected is an unknown function of the component TRACE Command Handler. The manipulation leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://fitoxs.com/exploit/exploit-25d55ad283aa400af464c76d713c07ad.txt", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.306798", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.306798", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.561035", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-41xx/CVE-2025-4181.json b/CVE-2025/CVE-2025-41xx/CVE-2025-4181.json new file mode 100644 index 00000000000..cbab0bb9be5 --- /dev/null +++ b/CVE-2025/CVE-2025-41xx/CVE-2025-4181.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-4181", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-05-01T23:15:50.833", + "lastModified": "2025-05-01T23:15:50.833", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in PCMan FTP Server 2.0.7. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component SEND Command Handler. The manipulation leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://fitoxs.com/exploit/exploit-202cb962ac59075b964b07152d234b70.txt", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.306799", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.306799", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.561139", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-41xx/CVE-2025-4182.json b/CVE-2025/CVE-2025-41xx/CVE-2025-4182.json new file mode 100644 index 00000000000..2af6798139d --- /dev/null +++ b/CVE-2025/CVE-2025-41xx/CVE-2025-4182.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-4182", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-05-01T23:15:51.023", + "lastModified": "2025-05-01T23:15:51.023", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in PCMan FTP Server 2.0.7. It has been rated as critical. Affected by this issue is some unknown functionality of the component BELL Command Handler. The manipulation leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://fitoxs.com/exploit/exploit-e99a18c428cb38d5f260853678922e03.txt", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.306800", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.306800", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.561141", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-41xx/CVE-2025-4183.json b/CVE-2025/CVE-2025-41xx/CVE-2025-4183.json new file mode 100644 index 00000000000..41d70b2bd01 --- /dev/null +++ b/CVE-2025/CVE-2025-41xx/CVE-2025-4183.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-4183", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-05-01T23:15:51.197", + "lastModified": "2025-05-01T23:15:51.197", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in PCMan FTP Server 2.0.7. This affects an unknown part of the component RECV Command Handler. The manipulation leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://fitoxs.com/exploit/exploit-d8578edf8458ce06fbc5bb76a58c5ca4.txt", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.306801", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.306801", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.561144", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-435xx/CVE-2025-43595.json b/CVE-2025/CVE-2025-435xx/CVE-2025-43595.json new file mode 100644 index 00000000000..8a61b1d5880 --- /dev/null +++ b/CVE-2025/CVE-2025-435xx/CVE-2025-43595.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-43595", + "sourceIdentifier": "9119a7d8-5eab-497f-8521-727c672e3725", + "published": "2025-05-01T22:15:17.800", + "lastModified": "2025-05-01T22:15:17.800", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An insecure file system permissions vulnerability in MSP360 Backup 4.3.1.115 allows a lower privileged user to execute commands with root level privileges in the 'Online Backup' folder. Users are recommended to upgrade to MSP360 Backup 4.4 (released on 2025-04-22)." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "9119a7d8-5eab-497f-8521-727c672e3725", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "9119a7d8-5eab-497f-8521-727c672e3725", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "9119a7d8-5eab-497f-8521-727c672e3725", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "references": [ + { + "url": "https://help.msp360.com/cloudberry-backup-mac-linux/whats-new", + "source": "9119a7d8-5eab-497f-8521-727c672e3725" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-441xx/CVE-2025-44193.json b/CVE-2025/CVE-2025-441xx/CVE-2025-44193.json index 481669681e3..af71df6aec9 100644 --- a/CVE-2025/CVE-2025-441xx/CVE-2025-44193.json +++ b/CVE-2025/CVE-2025-441xx/CVE-2025-44193.json @@ -2,7 +2,7 @@ "id": "CVE-2025-44193", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-30T18:15:47.707", - "lastModified": "2025-04-30T18:15:47.707", + "lastModified": "2025-05-01T19:15:58.680", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "SourceCodester Simple Barangay Management System v1.0 has a SQL injection vulnerability in /barangay_management/admin/?page=view_complaint." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/red-team00/bug_report/blob/main/simple-barangay-management-system/SQLi-2.md", diff --git a/CVE-2025/CVE-2025-441xx/CVE-2025-44194.json b/CVE-2025/CVE-2025-441xx/CVE-2025-44194.json index 8f5e7ca95c1..c1e511c0def 100644 --- a/CVE-2025/CVE-2025-441xx/CVE-2025-44194.json +++ b/CVE-2025/CVE-2025-441xx/CVE-2025-44194.json @@ -2,7 +2,7 @@ "id": "CVE-2025-44194", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-30T18:15:47.823", - "lastModified": "2025-04-30T18:15:47.823", + "lastModified": "2025-05-01T19:15:58.820", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "SourceCodester Simple Barangay Management System v1.0 has a SQL injection vulnerability in /barangay_management/admin/?page=view_household." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/red-team00/bug_report/blob/main/simple-barangay-management-system/SQLi-3.md", diff --git a/CVE-2025/CVE-2025-448xx/CVE-2025-44835.json b/CVE-2025/CVE-2025-448xx/CVE-2025-44835.json index c31a1010c4d..b8190e62bed 100644 --- a/CVE-2025/CVE-2025-448xx/CVE-2025-44835.json +++ b/CVE-2025/CVE-2025-448xx/CVE-2025-44835.json @@ -2,7 +2,7 @@ "id": "CVE-2025-44835", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-01T14:15:45.473", - "lastModified": "2025-05-01T14:15:45.473", + "lastModified": "2025-05-01T21:15:52.447", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "D-Link DIR-816 A2V1.1.0B05 was found to contain a command injection in iptablesWebsFilterRun, which allows remote attackers to execute arbitrary commands via shell." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/n0wstr/IOTVuln/tree/main/DIR-816/IptablesWebsFilterRun", diff --git a/CVE-2025/CVE-2025-448xx/CVE-2025-44836.json b/CVE-2025/CVE-2025-448xx/CVE-2025-44836.json index 19d7f5fbffa..de9a37213ea 100644 --- a/CVE-2025/CVE-2025-448xx/CVE-2025-44836.json +++ b/CVE-2025/CVE-2025-448xx/CVE-2025-44836.json @@ -2,7 +2,7 @@ "id": "CVE-2025-44836", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-01T15:16:20.723", - "lastModified": "2025-05-01T15:16:20.723", + "lastModified": "2025-05-01T21:15:52.607", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "TOTOLINK CPE CP900 V6.3c.1144_B20190715 was discovered to contain a command injection vulnerability in the setApRebootScheCfg function via the hour or minute parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/n0wstr/IOTVuln/tree/main/CP900/setApRebootScheCfg", diff --git a/CVE-2025/CVE-2025-448xx/CVE-2025-44837.json b/CVE-2025/CVE-2025-448xx/CVE-2025-44837.json index 6cc6e71b122..d68a4dbada4 100644 --- a/CVE-2025/CVE-2025-448xx/CVE-2025-44837.json +++ b/CVE-2025/CVE-2025-448xx/CVE-2025-44837.json @@ -2,7 +2,7 @@ "id": "CVE-2025-44837", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-01T15:16:20.837", - "lastModified": "2025-05-01T15:16:20.837", + "lastModified": "2025-05-01T21:15:52.757", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "TOTOLINK CPE CP900 V6.3c.1144_B20190715 was discovered to contain a command injection vulnerability in the CloudSrvUserdataVersionCheck function via the url or magicid parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/n0wstr/IOTVuln/tree/main/CP900/CloudSrvUserdataVersionCheck", diff --git a/CVE-2025/CVE-2025-448xx/CVE-2025-44838.json b/CVE-2025/CVE-2025-448xx/CVE-2025-44838.json index dddb99b35c2..1cb3b0b41a7 100644 --- a/CVE-2025/CVE-2025-448xx/CVE-2025-44838.json +++ b/CVE-2025/CVE-2025-448xx/CVE-2025-44838.json @@ -2,7 +2,7 @@ "id": "CVE-2025-44838", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-01T15:16:20.950", - "lastModified": "2025-05-01T15:16:20.950", + "lastModified": "2025-05-01T21:15:52.907", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "TOTOLINK CPE CP900 V6.3c.1144_B20190715 was discovered to contain a command injection vulnerability in the setUploadUserData function via the FileName parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/n0wstr/IOTVuln/tree/main/CP900/setUploadUserData", diff --git a/CVE-2025/CVE-2025-448xx/CVE-2025-44846.json b/CVE-2025/CVE-2025-448xx/CVE-2025-44846.json index b00d2b7c431..d5158e74eab 100644 --- a/CVE-2025/CVE-2025-448xx/CVE-2025-44846.json +++ b/CVE-2025/CVE-2025-448xx/CVE-2025-44846.json @@ -2,7 +2,7 @@ "id": "CVE-2025-44846", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-01T17:15:50.917", - "lastModified": "2025-05-01T17:15:50.917", + "lastModified": "2025-05-01T21:15:53.053", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "TOTOLINK CA600-PoE V5.3c.6665_B20180820 was found to contain a command injection vulnerability in the recvUpgradeNewFw function via the fwUrl parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/Summermu/VulnForIoT/tree/main/Totolink_CA600-PoE/recvUpgradeNewFw/readme.md", diff --git a/CVE-2025/CVE-2025-448xx/CVE-2025-44847.json b/CVE-2025/CVE-2025-448xx/CVE-2025-44847.json index 9d4c0eff1b3..1c0f8b7e9a9 100644 --- a/CVE-2025/CVE-2025-448xx/CVE-2025-44847.json +++ b/CVE-2025/CVE-2025-448xx/CVE-2025-44847.json @@ -2,7 +2,7 @@ "id": "CVE-2025-44847", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-01T17:15:51.037", - "lastModified": "2025-05-01T17:15:51.037", + "lastModified": "2025-05-01T21:15:53.213", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "TOTOLINK CA600-PoE V5.3c.6665_B20180820 was found to contain a command injection vulnerability in the setWebWlanIdx function via the webWlanIdx parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/Summermu/VulnForIoT/tree/main/Totolink_CA600-PoE/setWebWlanIdx/readme.md", diff --git a/CVE-2025/CVE-2025-448xx/CVE-2025-44854.json b/CVE-2025/CVE-2025-448xx/CVE-2025-44854.json index dc7207fd84d..6f46020e265 100644 --- a/CVE-2025/CVE-2025-448xx/CVE-2025-44854.json +++ b/CVE-2025/CVE-2025-448xx/CVE-2025-44854.json @@ -2,16 +2,51 @@ "id": "CVE-2025-44854", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-01T14:15:45.593", - "lastModified": "2025-05-01T14:15:45.593", + "lastModified": "2025-05-01T21:15:53.367", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Totolink CP900 V6.3c.1144_B20190715 was found to contain a command injection vulnerability in the setUpgradeUboot function via the FileName parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request." + "value": "TOTOLINK CP900 V6.3c.1144_B20190715 was found to contain a command injection vulnerability in the setUpgradeUboot function via the FileName parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/Summermu/VulnForIoT/tree/main/Totolink_CP900/setUpgradeUboot/readme.md", diff --git a/CVE-2025/CVE-2025-448xx/CVE-2025-44860.json b/CVE-2025/CVE-2025-448xx/CVE-2025-44860.json new file mode 100644 index 00000000000..634ca329b06 --- /dev/null +++ b/CVE-2025/CVE-2025-448xx/CVE-2025-44860.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-44860", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-05-01T18:15:56.537", + "lastModified": "2025-05-01T18:15:56.537", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "TOTOLINK CA300-POE V6.2c.884_B20180522 was found to contain a command injection vulnerability in the msg_process function via the Port parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Summermu/VulnForIoT/tree/main/Totolink_CA300-POE/msg_process_Port/readme.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-448xx/CVE-2025-44861.json b/CVE-2025/CVE-2025-448xx/CVE-2025-44861.json new file mode 100644 index 00000000000..47571d891b1 --- /dev/null +++ b/CVE-2025/CVE-2025-448xx/CVE-2025-44861.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-44861", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-05-01T18:15:56.647", + "lastModified": "2025-05-01T21:15:53.530", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "TOTOLINK CA300-POE V6.2c.884_B20180522 was found to contain a command injection vulnerability in the CloudSrvUserdataVersionCheck function via the url parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Summermu/VulnForIoT/tree/main/Totolink_CA300-POE/CloudSrvUserdataVersionCheck/readme.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-448xx/CVE-2025-44862.json b/CVE-2025/CVE-2025-448xx/CVE-2025-44862.json new file mode 100644 index 00000000000..02c72ed1cff --- /dev/null +++ b/CVE-2025/CVE-2025-448xx/CVE-2025-44862.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-44862", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-05-01T18:15:56.753", + "lastModified": "2025-05-01T21:15:53.677", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "TOTOLINK CA300-POE V6.2c.884_B20180522 was found to contain a command injection vulnerability in the recvUpgradeNewFw function via the fwUrl parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Summermu/VulnForIoT/tree/main/Totolink_CA300-POE/recvUpgradeNewFw/readme.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-448xx/CVE-2025-44863.json b/CVE-2025/CVE-2025-448xx/CVE-2025-44863.json new file mode 100644 index 00000000000..97288f52b46 --- /dev/null +++ b/CVE-2025/CVE-2025-448xx/CVE-2025-44863.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-44863", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-05-01T18:15:56.873", + "lastModified": "2025-05-01T18:15:56.873", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "TOTOLINK CA300-POE V6.2c.884_B20180522 was found to contain a command injection vulnerability in the msg_process function via the Url parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Summermu/VulnForIoT/tree/main/Totolink_CA300-POE/msg_process_Url/readme.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-448xx/CVE-2025-44864.json b/CVE-2025/CVE-2025-448xx/CVE-2025-44864.json new file mode 100644 index 00000000000..fedbe954996 --- /dev/null +++ b/CVE-2025/CVE-2025-448xx/CVE-2025-44864.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-44864", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-05-01T18:15:56.987", + "lastModified": "2025-05-01T21:15:53.840", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tenda W20E V15.11.0.6 was found to contain a command injection vulnerability in the formSetDebugCfg function via the module parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Summermu/VulnForIoT/tree/main/Tenda_W20E/formSetDebugCfg_module/readme.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-448xx/CVE-2025-44865.json b/CVE-2025/CVE-2025-448xx/CVE-2025-44865.json new file mode 100644 index 00000000000..428ae55c523 --- /dev/null +++ b/CVE-2025/CVE-2025-448xx/CVE-2025-44865.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-44865", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-05-01T18:15:57.100", + "lastModified": "2025-05-01T21:15:54.020", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tenda W20E V15.11.0.6 was found to contain a command injection vulnerability in the formSetDebugCfg function via the enable parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Summermu/VulnForIoT/tree/main/Tenda_W20E/formSetDebugCfg_enable/readme.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-448xx/CVE-2025-44866.json b/CVE-2025/CVE-2025-448xx/CVE-2025-44866.json new file mode 100644 index 00000000000..403e45f36ab --- /dev/null +++ b/CVE-2025/CVE-2025-448xx/CVE-2025-44866.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-44866", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-05-01T18:15:57.200", + "lastModified": "2025-05-01T21:15:54.190", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tenda W20E V15.11.0.6 was found to contain a command injection vulnerability in the formSetDebugCfg function via the level parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Summermu/VulnForIoT/tree/main/Tenda_W20E/formSetDebugCfg_level/readme.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-448xx/CVE-2025-44867.json b/CVE-2025/CVE-2025-448xx/CVE-2025-44867.json new file mode 100644 index 00000000000..5b75be5c38d --- /dev/null +++ b/CVE-2025/CVE-2025-448xx/CVE-2025-44867.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-44867", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-05-01T18:15:57.353", + "lastModified": "2025-05-01T21:15:54.343", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tenda W20E V15.11.0.6 was found to contain a command injection vulnerability in the formSetNetCheckTools function via the hostName parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Summermu/VulnForIoT/tree/main/Tenda_W20E/formSetNetCheckTools/readme.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-463xx/CVE-2025-46337.json b/CVE-2025/CVE-2025-463xx/CVE-2025-46337.json new file mode 100644 index 00000000000..f26d927af85 --- /dev/null +++ b/CVE-2025/CVE-2025-463xx/CVE-2025-46337.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-46337", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-05-01T18:15:57.510", + "lastModified": "2025-05-01T18:15:57.510", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "ADOdb is a PHP database class library that provides abstractions for performing queries and managing databases. Prior to version 5.22.9, improper escaping of a query parameter may allow an attacker to execute arbitrary SQL statements when the code using ADOdb connects to a PostgreSQL database and calls pg_insert_id() with user-supplied data. This issue has been patched in version 5.22.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L", + "baseScore": 10.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/ADOdb/ADOdb/commit/11107d6d6e5160b62e05dff8a3a2678cf0e3a426", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/ADOdb/ADOdb/issues/1070", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/ADOdb/ADOdb/security/advisories/GHSA-8x27-jwjr-8545", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-463xx/CVE-2025-46345.json b/CVE-2025/CVE-2025-463xx/CVE-2025-46345.json new file mode 100644 index 00000000000..dee2827c8c7 --- /dev/null +++ b/CVE-2025/CVE-2025-463xx/CVE-2025-46345.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-46345", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-05-01T18:15:57.657", + "lastModified": "2025-05-01T18:15:57.657", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Auth0 Account Link Extension is an extension aimed to help link accounts easily. Versions 2.3.4 to 2.6.6 do not verify the signature of the provided JWT. This allows the user the ability to supply a forged token and the potential to access user information without proper authorization. This issue has been patched in versions 2.6.7, 2.7.0, and 3.0.0. It is recommended to upgrade to version 3.0.0 or greater." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/auth0-extensions/auth0-account-link-extension/pull/187", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/auth0-extensions/auth0-account-link-extension/security/advisories/GHSA-j2jh-rqff-7vmg", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-465xx/CVE-2025-46565.json b/CVE-2025/CVE-2025-465xx/CVE-2025-46565.json new file mode 100644 index 00000000000..f2e0de3f9e4 --- /dev/null +++ b/CVE-2025/CVE-2025-465xx/CVE-2025-46565.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-46565", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-05-01T18:15:57.797", + "lastModified": "2025-05-01T18:15:57.797", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vite is a frontend tooling framework for javascript. Prior to versions 6.3.4, 6.2.7, 6.1.6, 5.4.19, and 4.5.14, the contents of files in the project root that are denied by a file matching pattern can be returned to the browser. Only apps explicitly exposing the Vite dev server to the network (using --host or server.host config option) are affected. Only files that are under project root and are denied by a file matching pattern can be bypassed. `server.fs.deny` can contain patterns matching against files (by default it includes .env, .env.*, *.{crt,pem} as such patterns). These patterns were able to bypass for files under `root` by using a combination of slash and dot (/.). This issue has been patched in versions 6.3.4, 6.2.7, 6.1.6, 5.4.19, and 4.5.14." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.0, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/vitejs/vite/commit/c22c43de612eebb6c182dd67850c24e4fab8cacb", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/vitejs/vite/security/advisories/GHSA-859w-5945-r5v3", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-465xx/CVE-2025-46566.json b/CVE-2025/CVE-2025-465xx/CVE-2025-46566.json new file mode 100644 index 00000000000..92afd3d5754 --- /dev/null +++ b/CVE-2025/CVE-2025-465xx/CVE-2025-46566.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-46566", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-05-01T18:15:57.940", + "lastModified": "2025-05-01T18:15:57.940", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "DataEase is an open-source BI tool alternative to Tableau. Prior to version 2.10.9, authenticated users can complete RCE through the backend JDBC link. This issue has been patched in version 2.10.9." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + }, + { + "lang": "en", + "value": "CWE-923" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/dataease/dataease/security/advisories/GHSA-hxw4-vpfp-frgv", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-465xx/CVE-2025-46567.json b/CVE-2025/CVE-2025-465xx/CVE-2025-46567.json new file mode 100644 index 00000000000..d17442e87ec --- /dev/null +++ b/CVE-2025/CVE-2025-465xx/CVE-2025-46567.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-46567", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-05-01T18:15:58.117", + "lastModified": "2025-05-01T18:15:58.117", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "LLama Factory enables fine-tuning of large language models. Prior to version 1.0.0, a critical vulnerability exists in the `llamafy_baichuan2.py` script of the LLaMA-Factory project. The script performs insecure deserialization using `torch.load()` on user-supplied `.bin` files from an input directory. An attacker can exploit this behavior by crafting a malicious `.bin` file that executes arbitrary commands during deserialization. This issue has been patched in version 1.0.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.3, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/hiyouga/LLaMA-Factory/commit/2989d39239d2f46e584c1e1180ba46b9768afb2a", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/hiyouga/LLaMA-Factory/security/advisories/GHSA-f2f7-gj54-6vpv", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-465xx/CVE-2025-46568.json b/CVE-2025/CVE-2025-465xx/CVE-2025-46568.json new file mode 100644 index 00000000000..63beb3d0edf --- /dev/null +++ b/CVE-2025/CVE-2025-465xx/CVE-2025-46568.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-46568", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-05-01T18:15:58.263", + "lastModified": "2025-05-01T18:15:58.263", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Stirling-PDF is a locally hosted web application that allows you to perform various operations on PDF files. Prior to version 0.45.0, Stirling-PDF is vulnerable to SSRF-induced arbitrary file read. WeasyPrint redefines a set of HTML tags, including img, embed, object, and others. The references to several files inside, allow the attachment of content from any webpage or local file to a PDF. This allows the attacker to read any file on the server, including sensitive files and configuration files. All users utilizing this feature will be affected. This issue has been patched in version 0.45.0." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Stirling-Tools/Stirling-PDF/security/advisories/GHSA-998c-x8hx-737r", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-465xx/CVE-2025-46569.json b/CVE-2025/CVE-2025-465xx/CVE-2025-46569.json new file mode 100644 index 00000000000..9126c9c27ba --- /dev/null +++ b/CVE-2025/CVE-2025-465xx/CVE-2025-46569.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2025-46569", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-05-01T20:15:37.887", + "lastModified": "2025-05-01T20:15:37.887", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Open Policy Agent (OPA) is an open source, general-purpose policy engine. Prior to version 1.4.0, when run as a server, OPA exposes an HTTP Data API for reading and writing documents. Requesting a virtual document through the Data API entails policy evaluation, where a Rego query containing a single data document reference is constructed from the requested path. This query is then used for policy evaluation. A HTTP request path can be crafted in a way that injects Rego code into the constructed query. The evaluation result cannot be made to return any other data than what is generated by the requested path, but this path can be misdirected, and the injected Rego code can be crafted to make the query succeed or fail; opening up for oracle attacks or, given the right circumstances, erroneous policy decision results. Furthermore, the injected code can be crafted to be computationally expensive, resulting in a Denial Of Service (DoS) attack. This issue has been patched in version 1.4.0. A workaround involves having network access to OPA\u2019s RESTful APIs being limited to `localhost` and/or trusted networks, unless necessary for production reasons." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + }, + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/open-policy-agent/opa/commit/ad2063247a14711882f18c387a511fc8094aa79c", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/open-policy-agent/opa/security/advisories/GHSA-6m8w-jc87-6cr7", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-466xx/CVE-2025-46619.json b/CVE-2025/CVE-2025-466xx/CVE-2025-46619.json index ff41a9ff681..516a8c90f71 100644 --- a/CVE-2025/CVE-2025-466xx/CVE-2025-46619.json +++ b/CVE-2025/CVE-2025-466xx/CVE-2025-46619.json @@ -2,7 +2,7 @@ "id": "CVE-2025-46619", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-30T18:15:48.220", - "lastModified": "2025-04-30T18:15:48.220", + "lastModified": "2025-05-01T19:15:59.040", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A security issue has been discovered in Couchbase Server before 7.6.4 and fixed in v.7.6.4 and v.7.2.7 for Windows that could allow unauthorized access to sensitive files. Depending on the level of privileges, this vulnerability may grant access to files such as /etc/passwd or /etc/shadow." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://docs.couchbase.com/server/current/release-notes/relnotes.html", diff --git a/CVE-2025/CVE-2025-466xx/CVE-2025-46625.json b/CVE-2025/CVE-2025-466xx/CVE-2025-46625.json new file mode 100644 index 00000000000..24384baa640 --- /dev/null +++ b/CVE-2025/CVE-2025-466xx/CVE-2025-46625.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-46625", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-05-01T20:15:38.037", + "lastModified": "2025-05-01T21:15:54.527", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Lack of input validation/sanitization in the 'setLanCfg' API endpoint in httpd in the Tenda RX2 Pro 16.03.30.14 allows a remote attacker that is authorized to the web management portal to gain root shell access to the device by sending a crafted web request. This is persistent because the command injection is saved in the configuration of the device." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://blog.uturn.dev/#/writeups/iot-village/tenda-rx2pro/README?id=cve-2025-46625-command-injection-through-setlancfg-in-httpd", + "source": "cve@mitre.org" + }, + { + "url": "https://www.tendacn.com/us/default.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-466xx/CVE-2025-46626.json b/CVE-2025/CVE-2025-466xx/CVE-2025-46626.json new file mode 100644 index 00000000000..e4303a6fa58 --- /dev/null +++ b/CVE-2025/CVE-2025-466xx/CVE-2025-46626.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-46626", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-05-01T20:15:38.190", + "lastModified": "2025-05-01T20:15:38.190", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Reuse of a static AES key and initialization vector for encrypted traffic to the 'ate' management service of the Tenda RX2 Pro 16.03.30.14 allows an attacker to decrypt, replay, and/or forge traffic to the service." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://blog.uturn.dev/#/writeups/iot-village/tenda-rx2pro/README?id=cve-2025-46625-command-injection-through-setlancfg-in-httpd", + "source": "cve@mitre.org" + }, + { + "url": "https://www.tendacn.com/us/default.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-466xx/CVE-2025-46627.json b/CVE-2025/CVE-2025-466xx/CVE-2025-46627.json new file mode 100644 index 00000000000..94b635cecd2 --- /dev/null +++ b/CVE-2025/CVE-2025-466xx/CVE-2025-46627.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-46627", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-05-01T20:15:38.350", + "lastModified": "2025-05-01T20:15:38.350", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use of weak credentials in the Tenda RX2 Pro 16.03.30.14 allows an unauthenticated attacker to authenticate to the telnet service by calculating the root password based on easily-obtained device information. The password is based on the last two digits/octets of the MAC address." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://blog.uturn.dev/#/writeups/iot-village/tenda-rx2pro/README?id=cve-2025-46627-calculated-os-root-password", + "source": "cve@mitre.org" + }, + { + "url": "https://www.tendacn.com/us/default.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-466xx/CVE-2025-46628.json b/CVE-2025/CVE-2025-466xx/CVE-2025-46628.json new file mode 100644 index 00000000000..3975a6df608 --- /dev/null +++ b/CVE-2025/CVE-2025-466xx/CVE-2025-46628.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-46628", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-05-01T20:15:38.510", + "lastModified": "2025-05-01T20:15:38.510", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Lack of input validation/sanitization in the 'ate' management service in the Tenda RX2 Pro 16.03.30.14 allows an unauthorized remote attacker to gain root shell access to the device by sending a crafted UDP packet to the 'ate' service when it is enabled. Authentication is not needed." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://blog.uturn.dev/#/writeups/iot-village/tenda-rx2pro/README?id=cve-2025-46628-command-injection-through-ifconfig-command-in-ate", + "source": "cve@mitre.org" + }, + { + "url": "https://www.tendacn.com/us/default.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-466xx/CVE-2025-46629.json b/CVE-2025/CVE-2025-466xx/CVE-2025-46629.json new file mode 100644 index 00000000000..ce1606f694f --- /dev/null +++ b/CVE-2025/CVE-2025-466xx/CVE-2025-46629.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-46629", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-05-01T20:15:38.660", + "lastModified": "2025-05-01T20:15:38.660", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Lack of access controls in the 'ate' management binary of the Tenda RX2 Pro 16.03.30.14 allows an unauthenticated remote attacker to perform unauthorized configuration changes for any router where 'ate' has been enabled by sending a crafted UDP packet" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://blog.uturn.dev/#/writeups/iot-village/tenda-rx2pro/README?id=cve-2025-46629-lack-of-authentication-in-ate", + "source": "cve@mitre.org" + }, + { + "url": "https://www.tendacn.com/us/default.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-466xx/CVE-2025-46630.json b/CVE-2025/CVE-2025-466xx/CVE-2025-46630.json new file mode 100644 index 00000000000..62e6ae14748 --- /dev/null +++ b/CVE-2025/CVE-2025-466xx/CVE-2025-46630.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-46630", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-05-01T20:15:38.803", + "lastModified": "2025-05-01T20:15:38.803", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper access controls in the web management portal of the Tenda RX2 Pro 16.03.30.14 allows an unauthenticated remote attacker to enable 'ate' (a remote system management binary) by sending a /goform/ate web request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://blog.uturn.dev/#/writeups/iot-village/tenda-rx2pro/README?id=cve-2025-46630-enable-ate-unauthenticated-through-httpd", + "source": "cve@mitre.org" + }, + { + "url": "https://www.tendacn.com/us/default.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-466xx/CVE-2025-46631.json b/CVE-2025/CVE-2025-466xx/CVE-2025-46631.json new file mode 100644 index 00000000000..cb32a900ff8 --- /dev/null +++ b/CVE-2025/CVE-2025-466xx/CVE-2025-46631.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-46631", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-05-01T20:15:39.010", + "lastModified": "2025-05-01T20:15:39.010", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper access controls in the web management portal of the Tenda RX2 Pro 16.03.30.14 allows an unauthenticated remote attacker to enable telnet access to the router's OS by sending a /goform/telnet web request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://blog.uturn.dev/#/writeups/iot-village/tenda-rx2pro/README?id=cve-2025-46631-enable-telnet-unauthenticated-through-httpd", + "source": "cve@mitre.org" + }, + { + "url": "https://www.tendacn.com/us/default.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-466xx/CVE-2025-46632.json b/CVE-2025/CVE-2025-466xx/CVE-2025-46632.json new file mode 100644 index 00000000000..798585e2d85 --- /dev/null +++ b/CVE-2025/CVE-2025-466xx/CVE-2025-46632.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-46632", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-05-01T20:15:39.167", + "lastModified": "2025-05-01T20:15:39.167", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Initialization vector (IV) reuse in the web management portal of the Tenda RX2 Pro 16.03.30.14 may allow an attacker to discern information about or more easily decrypt encrypted messages between client and server." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://blog.uturn.dev/#/writeups/iot-village/tenda-rx2pro/README?id=cve-2025-46632-static-iv-use-in-httpd", + "source": "cve@mitre.org" + }, + { + "url": "https://www.tendacn.com/us/default.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-466xx/CVE-2025-46633.json b/CVE-2025/CVE-2025-466xx/CVE-2025-46633.json new file mode 100644 index 00000000000..70d11c9966a --- /dev/null +++ b/CVE-2025/CVE-2025-466xx/CVE-2025-46633.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-46633", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-05-01T20:15:39.310", + "lastModified": "2025-05-01T20:15:39.310", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cleartext transmission of sensitive information in the web management portal of the Tenda RX2 Pro 16.03.30.14 allows an attacker to decrypt traffic between the client and server by collecting the symmetric AES key from collected and/or observed traffic. The AES key in sent in cleartext in response to successful authentication. The IV is always EU5H62G9ICGRNI43." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://blog.uturn.dev/#/writeups/iot-village/tenda-rx2pro/README?id=cve-2025-46633-transmission-of-plaintext-symmetric-key-in-httpd", + "source": "cve@mitre.org" + }, + { + "url": "https://www.tendacn.com/us/default.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-466xx/CVE-2025-46634.json b/CVE-2025/CVE-2025-466xx/CVE-2025-46634.json new file mode 100644 index 00000000000..0325fa81d9a --- /dev/null +++ b/CVE-2025/CVE-2025-466xx/CVE-2025-46634.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-46634", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-05-01T20:15:39.460", + "lastModified": "2025-05-01T20:15:39.460", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cleartext transmission of sensitive information in the web management portal of the Tenda RX2 Pro 16.03.30.14 may allow an unauthenticated attacker to authenticate to the web management portal by collecting credentials from observed/collected traffic. It implements encryption, but not until after the user has transmitted the hash of their password in cleartext. The hash can be replayed to authenticate." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://blog.uturn.dev/#/writeups/iot-village/tenda-rx2pro/README?id=cve-2025-46634-transmission-of-plaintext-credentials-in-httpd", + "source": "cve@mitre.org" + }, + { + "url": "https://www.tendacn.com/us/default.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-466xx/CVE-2025-46635.json b/CVE-2025/CVE-2025-466xx/CVE-2025-46635.json new file mode 100644 index 00000000000..412db963739 --- /dev/null +++ b/CVE-2025/CVE-2025-466xx/CVE-2025-46635.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-46635", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-05-01T20:15:39.600", + "lastModified": "2025-05-01T20:15:39.600", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered on Tenda RX2 Pro 16.03.30.14 devices. Improper network isolation between the guest Wi-Fi network and other network interfaces on the router allows an attacker (who is authenticated to the guest Wi-Fi) to access resources on the router and/or resources and devices on other networks hosted by the router by configuring a static IP address (within the non-guest subnet) on their host." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://blog.uturn.dev/#/writeups/iot-village/tenda-w18e/README?id=cve-2024-46435-delfacebookpic-stack-overflow", + "source": "cve@mitre.org" + }, + { + "url": "https://www.tendacn.com/us/default.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47153.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47153.json index f3ed3c35c94..37b204f8f97 100644 --- a/CVE-2025/CVE-2025-471xx/CVE-2025-47153.json +++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47153.json @@ -2,13 +2,13 @@ "id": "CVE-2025-47153", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-01T07:15:58.520", - "lastModified": "2025-05-01T08:15:17.807", + "lastModified": "2025-05-01T18:15:58.410", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Certain build processes for libuv and Node.js for 32-bit systems, such as for the nodejs binary package through nodejs_20.19.0+dfsg-1_i386.deb for Debian GNU/Linux, have an inconsistent off_t size (e.g., building on i386 Debian always uses _FILE_OFFSET_BITS=64 for the libuv dynamic library, but uses the _FILE_OFFSET_BITS global system default of 32 for nodejs), leading to out-of-bounds access. NOTE: this is not a problem in the Node.js software itself. In particular, the Node.js website's download page does not offer prebuilt Node.js for Linux on i386." + "value": "Certain build processes for libuv and Node.js for 32-bit systems, such as for the nodejs binary package through nodejs_20.19.0+dfsg-2_i386.deb for Debian GNU/Linux, have an inconsistent off_t size (e.g., building on i386 Debian always uses _FILE_OFFSET_BITS=64 for the libuv dynamic library, but uses the _FILE_OFFSET_BITS global system default of 32 for nodejs), leading to out-of-bounds access. NOTE: this is not a problem in the Node.js software itself. In particular, the Node.js website's download page does not offer prebuilt Node.js for Linux on i386." } ], "metrics": { diff --git a/README.md b/README.md index 0805adb3361..26b56cdb36e 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-05-01T20:00:19.898971+00:00 +2025-05-01T23:55:20.510820+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-05-01T18:01:17.703000+00:00 +2025-05-01T23:15:51.197000+00:00 ``` ### Last Data Feed Release @@ -33,20 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -292181 +292240 ``` ### CVEs added in the last Commit -Recently added CVEs: `0` +Recently added CVEs: `59` +- [CVE-2025-44861](CVE-2025/CVE-2025-448xx/CVE-2025-44861.json) (`2025-05-01T18:15:56.647`) +- [CVE-2025-44862](CVE-2025/CVE-2025-448xx/CVE-2025-44862.json) (`2025-05-01T18:15:56.753`) +- [CVE-2025-44863](CVE-2025/CVE-2025-448xx/CVE-2025-44863.json) (`2025-05-01T18:15:56.873`) +- [CVE-2025-44864](CVE-2025/CVE-2025-448xx/CVE-2025-44864.json) (`2025-05-01T18:15:56.987`) +- [CVE-2025-44865](CVE-2025/CVE-2025-448xx/CVE-2025-44865.json) (`2025-05-01T18:15:57.100`) +- [CVE-2025-44866](CVE-2025/CVE-2025-448xx/CVE-2025-44866.json) (`2025-05-01T18:15:57.200`) +- [CVE-2025-44867](CVE-2025/CVE-2025-448xx/CVE-2025-44867.json) (`2025-05-01T18:15:57.353`) +- [CVE-2025-46337](CVE-2025/CVE-2025-463xx/CVE-2025-46337.json) (`2025-05-01T18:15:57.510`) +- [CVE-2025-46345](CVE-2025/CVE-2025-463xx/CVE-2025-46345.json) (`2025-05-01T18:15:57.657`) +- [CVE-2025-46565](CVE-2025/CVE-2025-465xx/CVE-2025-46565.json) (`2025-05-01T18:15:57.797`) +- [CVE-2025-46566](CVE-2025/CVE-2025-465xx/CVE-2025-46566.json) (`2025-05-01T18:15:57.940`) +- [CVE-2025-46567](CVE-2025/CVE-2025-465xx/CVE-2025-46567.json) (`2025-05-01T18:15:58.117`) +- [CVE-2025-46568](CVE-2025/CVE-2025-465xx/CVE-2025-46568.json) (`2025-05-01T18:15:58.263`) +- [CVE-2025-46569](CVE-2025/CVE-2025-465xx/CVE-2025-46569.json) (`2025-05-01T20:15:37.887`) +- [CVE-2025-46625](CVE-2025/CVE-2025-466xx/CVE-2025-46625.json) (`2025-05-01T20:15:38.037`) +- [CVE-2025-46626](CVE-2025/CVE-2025-466xx/CVE-2025-46626.json) (`2025-05-01T20:15:38.190`) +- [CVE-2025-46627](CVE-2025/CVE-2025-466xx/CVE-2025-46627.json) (`2025-05-01T20:15:38.350`) +- [CVE-2025-46628](CVE-2025/CVE-2025-466xx/CVE-2025-46628.json) (`2025-05-01T20:15:38.510`) +- [CVE-2025-46629](CVE-2025/CVE-2025-466xx/CVE-2025-46629.json) (`2025-05-01T20:15:38.660`) +- [CVE-2025-46630](CVE-2025/CVE-2025-466xx/CVE-2025-46630.json) (`2025-05-01T20:15:38.803`) +- [CVE-2025-46631](CVE-2025/CVE-2025-466xx/CVE-2025-46631.json) (`2025-05-01T20:15:39.010`) +- [CVE-2025-46632](CVE-2025/CVE-2025-466xx/CVE-2025-46632.json) (`2025-05-01T20:15:39.167`) +- [CVE-2025-46633](CVE-2025/CVE-2025-466xx/CVE-2025-46633.json) (`2025-05-01T20:15:39.310`) +- [CVE-2025-46634](CVE-2025/CVE-2025-466xx/CVE-2025-46634.json) (`2025-05-01T20:15:39.460`) +- [CVE-2025-46635](CVE-2025/CVE-2025-466xx/CVE-2025-46635.json) (`2025-05-01T20:15:39.600`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `133` -- [CVE-2024-34781](CVE-2024/CVE-2024-347xx/CVE-2024-34781.json) (`2025-05-01T18:01:17.703`) +- [CVE-2024-4621](CVE-2024/CVE-2024-46xx/CVE-2024-4621.json) (`2025-05-01T19:46:27.260`) +- [CVE-2024-4934](CVE-2024/CVE-2024-49xx/CVE-2024-4934.json) (`2025-05-01T19:37:29.113`) +- [CVE-2024-50997](CVE-2024/CVE-2024-509xx/CVE-2024-50997.json) (`2025-05-01T18:22:26.830`) +- [CVE-2024-6130](CVE-2024/CVE-2024-61xx/CVE-2024-6130.json) (`2025-05-01T19:35:44.337`) +- [CVE-2025-1217](CVE-2025/CVE-2025-12xx/CVE-2025-1217.json) (`2025-05-01T19:29:33.903`) +- [CVE-2025-22868](CVE-2025/CVE-2025-228xx/CVE-2025-22868.json) (`2025-05-01T19:27:10.430`) +- [CVE-2025-22869](CVE-2025/CVE-2025-228xx/CVE-2025-22869.json) (`2025-05-01T19:28:20.740`) +- [CVE-2025-27188](CVE-2025/CVE-2025-271xx/CVE-2025-27188.json) (`2025-05-01T20:00:44.443`) +- [CVE-2025-2857](CVE-2025/CVE-2025-28xx/CVE-2025-2857.json) (`2025-05-01T19:31:14.930`) +- [CVE-2025-29040](CVE-2025/CVE-2025-290xx/CVE-2025-29040.json) (`2025-05-01T18:15:54.197`) +- [CVE-2025-29041](CVE-2025/CVE-2025-290xx/CVE-2025-29041.json) (`2025-05-01T18:15:54.737`) +- [CVE-2025-31324](CVE-2025/CVE-2025-313xx/CVE-2025-31324.json) (`2025-05-01T20:15:36.200`) +- [CVE-2025-32755](CVE-2025/CVE-2025-327xx/CVE-2025-32755.json) (`2025-05-01T19:05:44.990`) +- [CVE-2025-37087](CVE-2025/CVE-2025-370xx/CVE-2025-37087.json) (`2025-05-01T22:15:17.647`) +- [CVE-2025-44193](CVE-2025/CVE-2025-441xx/CVE-2025-44193.json) (`2025-05-01T19:15:58.680`) +- [CVE-2025-44194](CVE-2025/CVE-2025-441xx/CVE-2025-44194.json) (`2025-05-01T19:15:58.820`) +- [CVE-2025-44835](CVE-2025/CVE-2025-448xx/CVE-2025-44835.json) (`2025-05-01T21:15:52.447`) +- [CVE-2025-44836](CVE-2025/CVE-2025-448xx/CVE-2025-44836.json) (`2025-05-01T21:15:52.607`) +- [CVE-2025-44837](CVE-2025/CVE-2025-448xx/CVE-2025-44837.json) (`2025-05-01T21:15:52.757`) +- [CVE-2025-44838](CVE-2025/CVE-2025-448xx/CVE-2025-44838.json) (`2025-05-01T21:15:52.907`) +- [CVE-2025-44846](CVE-2025/CVE-2025-448xx/CVE-2025-44846.json) (`2025-05-01T21:15:53.053`) +- [CVE-2025-44847](CVE-2025/CVE-2025-448xx/CVE-2025-44847.json) (`2025-05-01T21:15:53.213`) +- [CVE-2025-44854](CVE-2025/CVE-2025-448xx/CVE-2025-44854.json) (`2025-05-01T21:15:53.367`) +- [CVE-2025-46619](CVE-2025/CVE-2025-466xx/CVE-2025-46619.json) (`2025-05-01T19:15:59.040`) +- [CVE-2025-47153](CVE-2025/CVE-2025-471xx/CVE-2025-47153.json) (`2025-05-01T18:15:58.410`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 7ad9324df6b..6e4192897d2 100644 --- a/_state.csv +++ b/_state.csv @@ -20882,7 +20882,7 @@ CVE-2006-5171,0,0,32c9e334c9497e380b0b9b4c5dd5f18bee25e5a7fe19dad673edb36deb1351 CVE-2006-5172,0,0,44f4e79ec6a645b3c4efed99571e4a9a34615246d48aa3376310fce221c6b2fa,2025-04-09T00:30:58.490000 CVE-2006-5173,0,0,371f750f5b8266482736fbcf55e2079aa6f88ebf6049a9b535bd97058667ade1,2025-04-09T00:30:58.490000 CVE-2006-5174,0,0,c3644edcccb2d08b08a22056c0c70f90bca69c7e5aa26a07fc0934ed1bc11fe5,2025-04-09T00:30:58.490000 -CVE-2006-5175,0,0,b0d723c2dc74ed3e636d9320fd104123653f42e386ffbb51eb57fe49f9d76c03,2025-04-09T00:30:58.490000 +CVE-2006-5175,0,1,838066e7068a6686e25a65e6f5f340f2ab51a0735e7ef0be7a31ccd658549aeb,2025-05-01T19:57:49.380000 CVE-2006-5176,0,0,97d771c28448d53a49c3ce7a72f14acd868c99a2bd7352be1ea90181d611dedb,2025-04-09T00:30:58.490000 CVE-2006-5177,0,0,eb5047b7cf4e67ad5cb88c1aa704f55f844bde61f7b529ea7367694f3ed77948,2025-04-09T00:30:58.490000 CVE-2006-5178,0,0,5227445ebb77ef29bbd596b895f53f862f25a11a592191b727c54a00d2e90035,2025-04-09T00:30:58.490000 @@ -158476,7 +158476,7 @@ CVE-2020-35469,0,0,93f77a408df257cca9f918ec477f288766f16ff5cadfa6706f39dd968ff58 CVE-2020-3547,0,0,8ef306bb3eab8d897bf7e8da0800724d0bd158c4f6a961aa4950edf10e08cdce,2024-11-21T05:31:17.363000 CVE-2020-35470,0,0,81129943ada8d7b6da46d974332d45ee7e06dd536590da90d30976372e1db1ba,2024-11-21T05:27:21.310000 CVE-2020-35471,0,0,4ead96e9d8d3a8719f2bd9d4c90c699dcb957e13934fa97422d5f474a36edb28,2024-11-21T05:27:21.490000 -CVE-2020-35473,0,0,9fc6e8fa03c4d210ba2a3d089f075bd0d3161e56723606af5bf2a82f134d79d7,2024-11-21T05:27:21.667000 +CVE-2020-35473,0,1,8e05a8b6a118c5ecd8adfafcf36676ba0ba202e07c0338dcde1b6d7167403830,2025-05-01T18:15:46.260000 CVE-2020-35474,0,0,864d5ec3862049bcd1eae7962b9b48d88ac9bdc8790d52aef6553be7bac68199,2024-11-21T05:27:21.877000 CVE-2020-35475,0,0,efd9a7a95ca863d51917bfef9213197ecd0485e47b29112518d65260bdd5dc7f,2024-11-21T05:27:22.060000 CVE-2020-35476,0,0,8c9a815e9ae47a9757f101cda8603279b34051e1d17d0614b8e198ab3323b5f1,2024-11-21T05:27:22.250000 @@ -179078,7 +179078,7 @@ CVE-2021-35939,0,0,91796c93a968dcc037a5cb7d8a38aadb1cdbba83a7f3e2f3b71b68cf2f079 CVE-2021-3594,0,0,7963486cff1d68b36bccf37eed7828580aad160fc9355300f4a44feacdc9143d,2024-11-21T06:21:55.620000 CVE-2021-35940,0,0,c481afe8a02cd042fb0f826c9e882e7f939ad50499b9805f9abdad566079f19e,2024-11-21T06:12:47.590000 CVE-2021-35941,0,0,56a96a156a14e8daa7c9cc06a218815928af813049428c4d78923e3b945a1d03,2024-11-21T06:12:47.760000 -CVE-2021-35942,0,0,35d47ce691813d04bed300f9daa9f82e28caf1d68cc2d9e436bea3f2e4d79635,2024-11-21T06:12:47.913000 +CVE-2021-35942,0,1,2f4e7dc23e05aeeb58cd299af940d6416e968aa2fc7b2c5decd050d97fa11cf1,2025-05-01T18:10:02.587000 CVE-2021-35943,0,0,0958ed1020d10d1613d35f740978975373b370d4eb805c7ff7a0fe0c94690a4e,2024-11-21T06:12:48.070000 CVE-2021-35944,0,0,42f9dcdcbdf30f4e6d68266d77b8ffd6108c9c30a8862866dbcb37736f42325b,2024-11-21T06:12:48.220000 CVE-2021-35945,0,0,3f282f6a421e04bf391533c680c7ed4476f7de409f3f34a209d4088c94b89b04,2024-11-21T06:12:48.367000 @@ -182491,7 +182491,7 @@ CVE-2021-40219,0,0,e6c63a5244a5f158bf01a663ae53626cd438fabcf2b04a65b29923562db4c CVE-2021-4022,0,0,cff2c6c168d07725fbd27da02e27e452287604eaf9880e64bc6365aa79118e24,2024-11-21T06:36:44.573000 CVE-2021-40222,0,0,69555bdac99cd04bb8c4e3fa0bb857cc6a5e67cf5cde7dd95d6f0f916b239e47,2024-11-21T06:23:46.050000 CVE-2021-40223,0,0,33c1a87dec10ef6273a8c1f29ec4a20b4f4a14307bda012eda09620f74b15a9c,2024-11-21T06:23:46.217000 -CVE-2021-40226,0,0,b5ade9c4cb5973a48586c5843eeb14889b2f4a274cc30fe5099bdafb1446a154,2024-11-21T06:23:46.377000 +CVE-2021-40226,0,1,8ce06d3a60e24a237dab10d12f7f970aa9c7507c08184651656f4af0018879b9,2025-05-01T18:15:46.503000 CVE-2021-4023,0,0,6d856e58b057a75a6629d09f49756d0ffddd81c99ed82d8c19df8dade293f57c,2024-11-21T06:36:44.683000 CVE-2021-40238,0,0,799e703fddb049fadde5820816114fe058889141cf50bcb45e1043aeacdd0c38,2024-11-21T06:23:46.560000 CVE-2021-40239,0,0,2e71168b2815eda8faccdc56fe02c296dbf74d0dc6a4c5b0a56b81cd7560a609,2024-11-21T06:23:46.737000 @@ -182515,7 +182515,7 @@ CVE-2021-40282,0,0,cafa7e358f679391a90736ccd3fd71308874e60c9cd2a5336e43aeaccd8af CVE-2021-40284,0,0,6468c314697094260ac9f0449bd64ac5087af52bcff4491f4d326f83dac61e60,2024-11-21T06:23:49.410000 CVE-2021-40285,0,0,4a7157cdd71556dca6c9339394b6dd23edd76ed1a280e0ab7e3d322e8b6d0864,2024-11-21T06:23:49.637000 CVE-2021-40288,0,0,b98cb145124382133575e2c634e018ab92a08685464f3c76d52022a8ca29959b,2024-11-21T06:23:49.823000 -CVE-2021-40289,0,0,eb1d6c0c0a9e59e93e2f2fd02133a31d8a6658e4af316c597699351d0e16130e,2024-11-21T06:23:50.007000 +CVE-2021-40289,0,1,509f18fa3b4378f95ad95b5f9119d740b8b34d4241659a37402f8e7b516184a4,2025-05-01T18:15:46.703000 CVE-2021-4029,0,0,d7490dbe7881563291ac991da85da287b52ff33d40694e489e1df410d49a6a71,2024-11-21T06:36:45.207000 CVE-2021-40292,0,0,73ae4ca1a35aa3f72ee655175236e3bb3552add7221ffedc70ad22dac62e3293,2024-11-21T06:23:50.307000 CVE-2021-4030,0,0,a4b397b35e3557e5b7515303f43bb92ff93b3ecf849625612a66c1c83e05d882,2024-11-21T06:36:45.350000 @@ -187179,8 +187179,8 @@ CVE-2021-46846,0,0,a017ac962794fd30b2a4a7d7a89374785882694170be4ba6d4db1a841ac7f CVE-2021-46848,0,0,55745e80e85cd6a62bec167a4c8da4f832ee6c33fc5012602a36cf6f36827684,2024-11-21T06:34:48.140000 CVE-2021-46849,0,0,a97d57b4204bee81571b4ff511b6cf0635636682ed66ca0aaf655b45e96971b9,2023-11-07T03:40:05.343000 CVE-2021-46850,0,0,339e2218d9385bb8f484d75e92ee069238e5447c4fd66213965f33441c51461c,2024-11-21T06:34:48.320000 -CVE-2021-46851,0,0,6cecbe8acc29fc82a6081f1633d57d9cbe591d771645daf1889daaa3ef31f899,2024-11-21T06:34:48.460000 -CVE-2021-46852,0,0,8ccf025953a95b95cf17f544db7ea1b0c6370df1a164132f011f691db3776fd0,2024-11-21T06:34:48.583000 +CVE-2021-46851,0,1,db93105c2abc96ff46e7b2433c702319424ab2184b1c8dbd38856e1bb3e4c421,2025-05-01T18:15:46.887000 +CVE-2021-46852,0,1,1b557e2f1ba4a1ee740097cc858f101ff808404ffce2b7b1ddfbfe2fc6d631f7,2025-05-01T18:15:47.070000 CVE-2021-46853,0,0,584321f4125de6f26f178a9a570f2fec5891c881a8434007af451daed8523276,2024-11-21T06:34:48.690000 CVE-2021-46854,0,0,9d0a49c1cc48ed7831e6513caf4aece9da7dca8fd5735fbe0dbb67ccd6c9d4f3,2025-04-28T21:15:55.927000 CVE-2021-46856,0,0,c343aae2884d63668d219012a270463847beb43cfdd8c1d8b51289c303bc1723,2025-04-17T14:15:19.187000 @@ -190328,8 +190328,8 @@ CVE-2022-20441,0,0,20df805dc2911ade16203738f6a2a0e2b8a96087cbcd1f852691b79099225 CVE-2022-20442,0,0,58c1328c83c69b6703ca40fa501f6f9edd31a10b2410dcce6bf007f2a83eb4db,2025-04-22T20:15:20.020000 CVE-2022-20443,0,0,87b9c525e882beb8a402d178b882803c8fda1b00ced8015b167a482402a094ee,2024-11-21T06:42:49.353000 CVE-2022-20444,0,0,7d36fbb59153ec6f42231c610f1c323c5ceac50d9b8309fb0fc750c8bf8083d4,2023-11-07T03:42:26.580000 -CVE-2022-20445,0,0,5878ce1af2db5b947bbe17f3e8adf30c9ab0ffa0428ed2812284e21c61d21d7e,2024-11-21T06:42:49.507000 -CVE-2022-20446,0,0,ea1c163204c9466cf2620ca19ddac7eed7be14cc0b0ca8631055e03a79ddd865,2024-11-21T06:42:49.620000 +CVE-2022-20445,0,1,f6e773ce6de202309ad771a3aa6f7852eaea2d2137cc0337571a13be12c1c7fc,2025-05-01T20:15:31.057000 +CVE-2022-20446,0,1,302d6944669c4d52d61f7c5b684bbb9733dfc77c9f26dd9d77d81e67a82f74e7,2025-05-01T20:15:31.257000 CVE-2022-20447,0,0,026cbe14ecf546787442ff5e438f5525fd816a50f0cb0118e2c68b6bf4700607,2025-05-01T16:15:20.760000 CVE-2022-20448,0,0,1f252eed1f74ba42e5c1681c1db294629e612d22393ae9abd05509f0cb555ace,2025-05-01T16:15:20.910000 CVE-2022-20449,0,0,64fe09924204bbc19799d95784c6105a9284ac7286c5dea47bc8b8f328ac0f31,2025-04-22T15:15:57.563000 @@ -191597,7 +191597,7 @@ CVE-2022-21774,0,0,1063e67898639bec0864b9c66f8daa9053b0c4fc74c270c2f2b9607b4c698 CVE-2022-21775,0,0,070ea89a699d2b0595d889fce4d1148cc414c7e0e3b1bfabe2b255765ccf7aa5,2024-11-21T06:45:24.827000 CVE-2022-21776,0,0,50a813f25b49d5e23d65d7a7f039aaad3c6908dc2e56c5e7a9a32ef6cc91c9f3,2024-11-21T06:45:24.947000 CVE-2022-21777,0,0,05ce8ebdfbd51f3777789404d8d74788d0744e02c9dade40cb38161a25c86452,2024-11-21T06:45:25.063000 -CVE-2022-21778,0,0,78fb2b60caeab5037b6beb62791698ef39268e550a3f02ab68d21f5178091135,2024-11-21T06:45:25.183000 +CVE-2022-21778,0,1,e3ffb16836a0cb4f50db443d3e111a487e1338aff79c2a0b9137a6758deb24f9,2025-05-01T20:15:31.420000 CVE-2022-21779,0,0,72f3791ead5a6172d77cb85f7619aa3d59613d3aaa72f1e83747e3e4a1fd44a9,2024-11-21T06:45:25.320000 CVE-2022-2178,0,0,cb001e8c6ce413d7ee4e49cb1c0d8c0bee671611369c514c8395bde0b30d644d,2024-11-21T07:00:29.080000 CVE-2022-21780,0,0,944e526590503725c0c82297f2c3da935ac55d37b92ed517a369c06cebe2f1ba,2024-11-21T06:45:25.440000 @@ -192951,8 +192951,8 @@ CVE-2022-23204,0,0,abd3309892d269a1020430eecc975a3d21e1781dad339b7099425b681dcbd CVE-2022-23205,0,0,5e627b18b03b32e9cf84b9eea4f985c22e0ba5420775ae778e85c1cb7066730a,2024-11-21T06:48:12.427000 CVE-2022-23206,0,0,6d44e336044e9fa420ca43822fd643d47a572e69caeccfe443024c8dc5a81dfe,2024-11-21T06:48:12.553000 CVE-2022-2321,0,0,bc38f0622afd521086de53c87450ebc44efd42dd0d8c9ef458d9ec6af95277d5,2024-11-21T07:00:45.980000 -CVE-2022-23218,0,0,937a5b49fedb6fd4c199c00b67b17c6dc65dd6288d2e7713723da946b84d9e36,2024-11-21T06:48:12.677000 -CVE-2022-23219,0,0,90d5098a9952a45fe354180768829b4305d9376fe30620b20ff8d930e8c7c8bb,2024-11-21T06:48:12.863000 +CVE-2022-23218,0,1,de868270ae5ca6bb6bb590d0002ef1489176fe7c6292688a88591145ea3a4f39,2025-05-01T18:10:07.273000 +CVE-2022-23219,0,1,65db7d45fdfbba0772bf3dcf05394ea59b65c75b6e79ea45352020e01acc90ec,2025-05-01T18:10:11.247000 CVE-2022-23220,0,0,587bdddc175569ce15f6940da02ed26c837c2a2634f31dc1b11143496f1efaef,2024-11-21T06:48:13.047000 CVE-2022-23221,0,0,5d57b4180b48987f7f4bfea9bdf7f6d1d256fcf67bfadd1791154e8dad339a61,2024-11-21T06:48:13.213000 CVE-2022-23222,0,0,fbcfcb02bfa7b24347fade63f729949c1d8bf5ab948cbe460e536a4e6f01d068,2024-11-21T06:48:13.447000 @@ -195728,7 +195728,7 @@ CVE-2022-26442,0,0,ad643f80693ad7101178ef8d6705d5380f72f472ba6d57ba0169d3764a126 CVE-2022-26443,0,0,1ef16207e52a27b49c3d2ad7055b44bbd0562ec3fd53c9f60309c9c29ee2b90a,2024-11-21T06:53:57.493000 CVE-2022-26444,0,0,9416cd0c133e409bde407cda5d947c246a0d47e5a3d3b6b350e2f94ac373a7dd,2024-11-21T06:53:57.617000 CVE-2022-26445,0,0,50de5085f3dd132d2a6c3d4dbac17f0a863d14b3a0cc08fcba4fe0546e16b5ce,2024-11-21T06:53:57.747000 -CVE-2022-26446,0,0,a77a327ded1530f4d9bdf1dbe3f24de9a02e3e87f7490b552f6a3faaefc2ec3a,2024-11-21T06:53:57.873000 +CVE-2022-26446,0,1,47a7261393c9a799befed600bf52f562e021ae5d0a1a2bc9542f034135ac6463,2025-05-01T19:15:49.940000 CVE-2022-26447,0,0,3d7c124b52c5606bfa6103cef39a2e0ee8efdbee503ae0734617e33efb1d0b45,2024-11-21T06:53:58.003000 CVE-2022-26448,0,0,8542fda3d55db5a1dc2a18a6c690a17a870f359cb143247ebdcac67336034169,2024-11-21T06:53:58.137000 CVE-2022-26449,0,0,3c5ff0be274b5cdfa8b92fbe96b6ae7b66adf3c7800378d05728d7ef28f0300e,2024-11-21T06:53:58.257000 @@ -199018,7 +199018,7 @@ CVE-2022-30511,0,0,8756f7692901f77503d7b9d063b52b4134eaf68d6347a84bfc742e5116a24 CVE-2022-30512,0,0,ead1f35edb1f685d19362d65227b924b938883d50523f4997ec6ea42c6e4dc17,2024-11-21T07:02:51.180000 CVE-2022-30513,0,0,f654c5fa896a1151aff2b22bf518c1cd325eee803c30f8af842c38cbe804c31c,2024-11-21T07:02:51.310000 CVE-2022-30514,0,0,583ff09f1493e0b97e2af7e0902b696098c6bd7ef9015729c3e530f5f2b7276a,2024-11-21T07:02:51.440000 -CVE-2022-30515,0,0,d4d5170179da589ce23ec54625e8ef2c6b889347eaf343f566feec89b275d8c1,2024-11-21T07:02:51.570000 +CVE-2022-30515,0,1,c89bf7daf1f2ab521ff3509998e0d01b02b3d5fded4d88bb8a12e5a6febfd360,2025-05-01T19:15:50.170000 CVE-2022-30516,0,0,fdcd6dacce3d8cb56b7c353842bf20487c5acc63eeadf873bf37ec9b13b5ee9f,2024-11-21T07:02:51.700000 CVE-2022-30517,0,0,f2af9109945da647fcb46f4a30856a3315c39cbed6ae09ea516be051d7ce6c08,2024-11-21T07:02:51.823000 CVE-2022-30518,0,0,319958968750d099b30a162b3199a9841335b6d81c1e49015cbd12afe6503bad,2024-11-21T07:02:51.943000 @@ -200068,8 +200068,8 @@ CVE-2022-31681,0,0,e81940e75d0f825a63436821c7622dc41ca1d332eb6e5c0564ba2258019c3 CVE-2022-31682,0,0,4221956aee19a19242e76f1b1abab4773ecbfa158a8bd2c8121fe4780cdf15cb,2024-11-21T07:05:07.193000 CVE-2022-31683,0,0,075f938a4c900bc81709df531113aeb25a7e27ea0f49aadfae42613dead9d741,2025-04-16T14:15:21.257000 CVE-2022-31684,0,0,51fcf28187c0ccae056e8b5d9aab5a47f06fc5e5f85f47b3a3ed7bd1bc62d02b,2024-11-21T07:05:07.500000 -CVE-2022-31685,0,0,f1a2060acfa30a91a9da2e3baacc700e8b8bae0e50d1d6cd9d469153db249291,2024-11-21T07:05:07.640000 -CVE-2022-31686,0,0,5082af7ff85d7ee9a446a573f09c942e3926e57aeab0417a754b6c07b3300f1f,2024-11-21T07:05:07.770000 +CVE-2022-31685,0,1,2cb4ac89ded01282d78dfdd8e5c87fcbb344c278b86b51b6cd2326cf5b272c34,2025-05-01T18:15:47.460000 +CVE-2022-31686,0,1,b263449e6fdb4580c6557a463a14419268aa5eaa41cc3f20ce21fa25322237ba,2025-05-01T18:15:48.023000 CVE-2022-31687,0,0,d8203ed42288c5226fe98fb98c57feee8058c50a02f70a8d4a0861e5d3ced382,2025-05-01T16:15:22.303000 CVE-2022-31688,0,0,2b60ea85bb2d0638d97441debd3f16544cdd4020696f128aa2341166b639b98f,2025-05-01T16:15:22.467000 CVE-2022-31689,0,0,987de4e28cc6c0db5d52c78cc1c6cdb6e47b51a9b7a6de0e66fd83a96e0f53a2,2025-05-01T16:15:22.620000 @@ -200783,23 +200783,23 @@ CVE-2022-32597,0,0,59ac66a5fd7a1d078963082be69cb8097ce18dbc6d7a70c1c02efdb43cfa5 CVE-2022-32598,0,0,a7a5e163d8f7988098fe8c75f9e9af8f599fbf647547ef8dc9fb23da20bd14c4,2025-04-24T15:15:45.087000 CVE-2022-32599,0,0,1f9ca761050cbfae01bd6b6ede1956b8629014f8c21d8160af6f67be08dfa23c,2025-02-12T16:15:33.257000 CVE-2022-3260,0,0,99e1a114fe1c3ec01e9160fbae4e97454257d1cd684a0c2b84782c8ccd2ce476,2025-04-23T16:15:24.317000 -CVE-2022-32601,0,0,a4d37317c0c125cd86271f6dc54b76b52ab410d0f09116b183eab8e03c79de8c,2024-11-21T07:06:42.913000 -CVE-2022-32602,0,0,3d05011bf9f097860d6399278b4268095363d044909efd60f2c47e4265dbfbd5,2024-11-21T07:06:43.043000 +CVE-2022-32601,0,1,05dde824dde9de50592e2f66ff3c565d929d9782b5eb5b8a2e36a1defb36e133,2025-05-01T19:15:50.363000 +CVE-2022-32602,0,1,0bbf6c2413a248cb3d0abb2feb27ddb2a77952fec22ae88d58f03921b6ac2e2b,2025-05-01T19:15:50.547000 CVE-2022-32603,0,0,3ec7709e3b987da0dc7ba364b943b811a649c5124db826392869c9cb138f41c5,2024-11-21T07:06:43.170000 CVE-2022-32605,0,0,2827ed388b4dcd0fc01bd2feb6dfa5eb50f6c121b666767436086add03ae957d,2024-11-21T07:06:43.290000 CVE-2022-32607,0,0,576fbd3bd2dc62e1b9e1e8bbad51dcd12882340dbbef8bcbaa3c8d693907c0c2,2024-11-21T07:06:43.430000 CVE-2022-32608,0,0,fa483f946aaa9903a957a65902541e6263ebb4403bc74c5a805857c22fc06320,2024-11-21T07:06:43.550000 CVE-2022-32609,0,0,6edbd183574160f966462dd18b91e8c17eab1ed2e65c445ef3feba4e03c49dc0,2024-11-21T07:06:43.663000 CVE-2022-3261,0,0,8cd3903fedf8d01eb605f6a10992e6b97d57565921ccb7c3e57a32d37cd23432,2024-11-21T07:19:10.023000 -CVE-2022-32610,0,0,84d2b87dbb88bf48e3e0d15fdaa6c2ac2d026a21ba7418215e5d3130668a55fb,2024-11-21T07:06:43.787000 -CVE-2022-32611,0,0,bff982cffc6c2fe246cfda935f42801e58f69a289c416d0148c84015c93249ab,2024-11-21T07:06:43.913000 -CVE-2022-32612,0,0,f60a5140f0576f279ad947091bb529f7a3171f9fdc9bd0905ec6f2989b67c2b0,2024-11-21T07:06:44.023000 -CVE-2022-32613,0,0,f954997074d8ee70d236ce1416e4cf85c095c34011d8f5df914800aa335100b4,2024-11-21T07:06:44.147000 -CVE-2022-32614,0,0,70bcfd309adcda575f2da77fab422d1b7a592985306a67010101054d75a72db2,2024-11-21T07:06:44.277000 -CVE-2022-32615,0,0,25c595637c09709da94dce9468bbcf5acb39615a702a361e603f5d1188852216,2024-11-21T07:06:44.397000 -CVE-2022-32616,0,0,f62daeea588aa9b3cc3852053d4560b181d25a1850335d40930f204aaf50a725,2024-11-21T07:06:44.520000 -CVE-2022-32617,0,0,0ab74bbef884e7e4b4bf58b2578fb0b04af53a8020e4835fdb4da1065af20464,2024-11-21T07:06:44.647000 -CVE-2022-32618,0,0,e7b8075d63eb65d6609e7398fd0a31fdb40e062ed56eab851d906fc0088dae75,2024-11-21T07:06:44.767000 +CVE-2022-32610,0,1,3752e065c497adf04a5a59be25fbe67b72e924819f033028a99326913d56fe28,2025-05-01T20:15:31.787000 +CVE-2022-32611,0,1,8169d30a2e6631a77d5d04524a576a35a55bc976d6ce25d619811aa8cfce8d18,2025-05-01T20:15:31.950000 +CVE-2022-32612,0,1,11961271b9547a3c0f6d0ed691a96525de081a37b2555e3ea456fb321b53c9fb,2025-05-01T19:15:50.710000 +CVE-2022-32613,0,1,cd001308fa471146123eddc195bd72e0a5a04ab6a9be908cf82a00747af61f12,2025-05-01T19:15:50.883000 +CVE-2022-32614,0,1,4d733a15e3f9fc77cf67f01db234fc8ccfc53d902fb2cd4324b06d9392cf7afb,2025-05-01T19:15:51.050000 +CVE-2022-32615,0,1,55a0efab5d99eeb159eefd94f0f66d69122ebef04beeff268c85014ed3c958cb,2025-05-01T19:15:51.207000 +CVE-2022-32616,0,1,dd0c877d565ebd3ea032a94f372d559d2620f76a07964d195cc015459a2ffd34,2025-05-01T19:15:51.363000 +CVE-2022-32617,0,1,0096ffd080402c3b9e5a6357ba084252e067b17634cedc55e6b6125eb52a6558,2025-05-01T19:15:51.520000 +CVE-2022-32618,0,1,b9375341d4440fb359ead244831ca4079ae82bb8290198138aaff8e119e8f425,2025-05-01T19:15:51.673000 CVE-2022-32619,0,0,9ac7fa9e754a5400023bbd051a096dac534a6943748ee0b9fce44c9663f3c1fb,2025-04-24T15:15:45.257000 CVE-2022-3262,0,0,460ba5aa0ebf487fe9e7b82edca8a1b850954cc9aa9bbcf78afc1fee8abad653,2025-04-23T16:15:24.557000 CVE-2022-32620,0,0,bb1babb2c7017fce7caf3ce2ef9e5501034e9751d4c827b95066d85b2a15f9d5,2025-04-24T15:15:45.440000 @@ -200832,7 +200832,7 @@ CVE-2022-32646,0,0,de3d9627a10042f44d85260ccd74a07e1fa072c21fb54ae44a93f4b781284 CVE-2022-32647,0,0,96e1d9a3d3b6357511aa613e3f0ae3f153cb9cab783a1da8d69b2381dce0f397,2025-04-10T16:15:19.193000 CVE-2022-32648,0,0,29ae244a1cb11c0b38fb5f14ac06fd844c339aaefa486b180c7d6626ad52c348,2025-04-10T19:15:47.057000 CVE-2022-32649,0,0,a605a8e478f91b08cee78e69861261719a2f639e6b9fa6d6b061301d32c10c11,2025-04-10T19:15:47.217000 -CVE-2022-3265,0,0,b36e964a6faaa365f8bea9a398e442ac01a5425c80d7aea91786adfef5088c7b,2024-11-21T07:19:10.430000 +CVE-2022-3265,0,1,27372829a95acd870b04e696f04e110cd4b9b5de92046c95bdba6398606ee025,2025-05-01T20:15:32.687000 CVE-2022-32650,0,0,9de951b3711a91a30ca4ae2b14bd4ac673d2c4bcb070676eb8753547fce737cc,2025-04-10T18:15:42.543000 CVE-2022-32651,0,0,dd1204d1faf1a010b2fa1c40156e8121b5a90d5b2a9ed23b494399d1ae94400a,2025-04-10T18:15:43.507000 CVE-2022-32652,0,0,df616fce779d16ccfc3c61d1c4f0a14fd35a291b5f23029f5f1ee575bf5d97b6,2025-04-10T18:15:43.723000 @@ -200989,7 +200989,7 @@ CVE-2022-32796,0,0,a83341eecf5594d427ae6a3e2abcc47b6952142e4891741557489ac5557ff CVE-2022-32797,0,0,7efe7f850cad08a1b867e3df0b6c0f26848ed79d6d456717f7ac747ac637fe30,2024-11-21T07:06:58.807000 CVE-2022-32798,0,0,bc72588b75a7f8811884a57a6a7c14f966f4599742a0fe348bfc26e29d8acc7a,2024-11-21T07:06:58.947000 CVE-2022-32799,0,0,c450cf214f148d7fc87eb0446b6b24e809c6f3f43412a0dc2047e29b39856cea,2024-11-21T07:06:59.057000 -CVE-2022-3280,0,0,e1119164874fcde5b529fdf46f5fda7da85370ccfa18c984cd7dec1a21045ac1,2024-11-21T07:19:12.390000 +CVE-2022-3280,0,1,b39684e0861665471793b6b971a1975425076e6b6c894d18c3d1eb526939d834,2025-05-01T20:15:32.830000 CVE-2022-32800,0,0,6569152645aae514af9c1ad1bb093e58ccdad2567e108b327c2f820605fd9110,2024-11-21T07:06:59.203000 CVE-2022-32801,0,0,548b10d541145d031c6ac79bc39b1a603154c416c32c562a1cbc728499f5dec5,2024-11-21T07:06:59.333000 CVE-2022-32802,0,0,46c372a129272d427704b2f0ad51705e3425ae4fb8cb19c51f829467c81b5cb8,2024-11-21T07:06:59.440000 @@ -201459,7 +201459,7 @@ CVE-2022-33318,0,0,34f2a98b30d22dc868502ae83389d7723a19251f35cad9b751854f4be0113 CVE-2022-33319,0,0,6c04e18539c756759fdac717802a78fb54ee060510bebcfaffe91d601679e5ef,2024-11-21T07:08:10.377000 CVE-2022-3332,0,0,94ae59ac6239d0d932e0489af4465953290504c14c158e9670b84c6d3edae0f5,2024-11-21T07:19:18.820000 CVE-2022-33320,0,0,00922e45abf022953ac3cd8fdbd8a78132da61b01d208bffb5ece3e18a8a5e97,2024-11-21T07:08:10.487000 -CVE-2022-33321,0,0,44549f37fa4e1361fc728455ca204858048fe9b84d9cce9304bb56d0c6f89ce4,2024-11-21T07:08:10.610000 +CVE-2022-33321,0,1,94ef6a4c09f0816023a1ff28342fa80448815d9da95ed5a91cb02c2a8ec4128f,2025-05-01T19:15:51.833000 CVE-2022-33322,0,0,49035e994c28534783c200e7cf3e1b88faba6fa27f2ddee1c2bfb830476bbe96,2025-05-01T15:15:55.120000 CVE-2022-33323,0,0,3afe2ea92e9ec367e358034417fc1ca53c1f60423f6ea7e73f255d83a22b2bf5,2024-11-21T07:08:11.440000 CVE-2022-33324,0,0,84360118a412c6d842d82ee8d9bf86ae4c752c33b24d7656d0bd333a935a7756,2024-11-21T07:08:11.880000 @@ -201894,7 +201894,7 @@ CVE-2022-34176,0,0,1ab6d130b3028fdce0237058c05ce93c79be1b5e8db91221ad5593f00ad0a CVE-2022-34177,0,0,4efedfa73117eeaccdee922181c4b78460631d93b115205422a904980dc4f7df,2024-11-21T07:09:00.547000 CVE-2022-34178,0,0,8fdd510236fdeed00c6885f3e9514699f225ae2007a23e508430992e44bc3633,2024-11-21T07:09:00.653000 CVE-2022-34179,0,0,320be2e1c57d54e480cd037e82d4de08da8b5d15786707e5ab8cc2d1b0a7c20d,2024-11-21T07:09:00.757000 -CVE-2022-3418,0,0,23959f43ff0a3259dfc2ada8d10075b44608b2e55c826993bb3f9189089ea818,2024-11-21T07:19:28.477000 +CVE-2022-3418,0,1,1bbb2ce3974aa953edb2d1bf8c72d6a582b2d650ba236c072ca9644494ec70be,2025-05-01T21:15:50.940000 CVE-2022-34180,0,0,e6891b27c4018c611e2f8876fa06658108b30bd52cb89d71037da58b59918ab1,2024-11-21T07:09:00.857000 CVE-2022-34181,0,0,812576d692967ad66735d5e65d70f5981966a495185ac693b903c663d67afe46,2024-11-21T07:09:00.953000 CVE-2022-34182,0,0,bc1d5f5ac993f1551a03254e90f4c28bb47e804983251323a964cbbb03badc4a,2024-11-21T07:09:01.053000 @@ -202225,7 +202225,7 @@ CVE-2022-34501,0,0,7d67db4ce9291db18d970904be25fe1aa1628b26b3f82d59ee785453719b1 CVE-2022-34502,0,0,8cbbae60749603425afb9ad4958d66275084d38ad9ec152cd49bdab06b7f7769,2024-11-21T07:09:41.457000 CVE-2022-34503,0,0,bf2cfa852dd4bff36a25d9bf6c70bd062055e11176cc85f21d624dceb92e93f2,2024-11-21T07:09:41.600000 CVE-2022-34509,0,0,73de1abdcffae71fb8cc1947fd666fc3c421b9b7e052890d1eb1dae677699bf5,2024-11-21T07:09:41.757000 -CVE-2022-3451,0,0,2c03afd1f761a2083ef6e4a0733e17e4f8f6b9c4d345116d3f666e50ed60ca57,2024-11-21T07:19:33.237000 +CVE-2022-3451,0,1,a778daaa13e3fd3c0eb85d4d8eff62655603333fa275187606c804fff705b964,2025-05-01T21:15:51.120000 CVE-2022-3452,0,0,1036e63c2693f464de802b55af4a00b68b83646933f6719ab56bb16b659e6bf0,2024-11-21T07:19:33.367000 CVE-2022-34520,0,0,f340e22a167dd8afc3061ce59198b6edde9ef23426ae53babc706bcbde9cda58,2024-11-21T07:09:41.927000 CVE-2022-34526,0,0,13e5badf340873286d0a706643b8cf04e757149c5f1588d8dee048ce486ef1a2,2024-11-21T07:09:42.100000 @@ -202298,12 +202298,12 @@ CVE-2022-34613,0,0,194e7655d876d40489be3a7d03ba20619a21699508383ed4892c19147d52b CVE-2022-34615,0,0,ce55bc001700461a5f63106913df53f285f68642466708f709f9004d79bace60,2024-11-21T07:09:51.683000 CVE-2022-34618,0,0,c389af5aec69fe2fd8b17c9178e9896543c6cee1d99291f3769333df846bdc15,2024-11-21T07:09:51.840000 CVE-2022-34619,0,0,f29373db595d685f653a5477949286d245cdc2cd91a6a03f7c28408187cb7e6b,2024-11-21T07:09:51.987000 -CVE-2022-3462,0,0,8d5592447ca7a7aae299a11e9c8544cdcbf87850b7e8337624cc2125e2fe3248,2024-11-21T07:19:34.470000 +CVE-2022-3462,0,1,96903a533df62b20f774c0c3bbf235904645765fb4e7866f0769b340c2f7d23b,2025-05-01T21:15:51.297000 CVE-2022-34621,0,0,bbd3393f471162dec9086d770d9dfbb7c184aac5a7222bf4e17f7e09e583284e,2024-11-21T07:09:52.133000 CVE-2022-34623,0,0,4dfdc205da18d9878c032a001dca8a3301bc1380b68426c723bb61ef996090a3,2024-05-07T18:15:07.817000 CVE-2022-34624,0,0,f7d689c40bfbd8b8f26f3fd1534bb3fb07dd75d7d541cfec095af599546775ad,2024-11-21T07:09:52.357000 CVE-2022-34625,0,0,9662ade6fe76b1e6f11343d975429b0e88d97c44dc52598cfcc27570169765cb,2024-11-21T07:09:52.520000 -CVE-2022-3463,0,0,1de50ec12b8fff578bea0c8901d2ab289e12d80335a80ea7077865c273e93f72,2024-11-21T07:19:34.590000 +CVE-2022-3463,0,1,989b5fcffb82dd6a05e59b942ef8722bb730a234e674d7b7aba243ef93c185f7,2025-05-01T21:15:51.500000 CVE-2022-34632,0,0,a40d832b6165f92b8b057b0b28b789a391499964f241ec1a8281899f6ddf4477,2024-11-21T07:09:52.683000 CVE-2022-34633,0,0,3d952d423393e6b68c658ddd46fa97ce390d650893fa335755cc920ada014380,2024-11-21T07:09:52.823000 CVE-2022-34634,0,0,bf1546e4f7e878f3ba4f8acd6a61fba0fccb2cfb258131e50a6b8ce99df70fef,2024-11-21T07:09:52.967000 @@ -202477,7 +202477,7 @@ CVE-2022-34806,0,0,67f333bfd05e818859a4241cafb5a44b5ff63fee1b5554d2a08ff624c1c9a CVE-2022-34807,0,0,3e231e335f90c449a2076fbe0bc4e8800c97b8cf4ab49dfd3974a09fb037a09a,2024-11-21T07:10:13.500000 CVE-2022-34808,0,0,c9f287b63b38e13ac54567ad52672bcd9e2a8e5c23e89505122dd38fb7f798c7,2024-11-21T07:10:13.627000 CVE-2022-34809,0,0,13eb11e3787f74b4d3a7d345f1cf69a7699cb3688ed4ec2af25434da1a1c4f36,2024-11-21T07:10:13.740000 -CVE-2022-3481,0,0,852476540b652a1b92ec78d0c8b4bce738d2c0c3a090d3e6bda9f5600f009b56,2024-11-21T07:19:37.440000 +CVE-2022-3481,0,1,46a7e4725b685945aa1d09e67a70f1b9212a060aa050e2d699b5f648f006e6ac,2025-05-01T20:15:33.057000 CVE-2022-34810,0,0,90cb5e52ae610dd3ae06f86f80135149a2bd01357e056ed09a9efba7f7b4c915,2024-11-21T07:10:13.853000 CVE-2022-34811,0,0,44f8ff8296536b86d694b56f5d159ea3f301370e17f4a79b633f3bc85393984e,2024-11-21T07:10:13.960000 CVE-2022-34812,0,0,293b0e917e26db2b483017e404940505f68089554d6fa26049c69595e7cc9199,2024-11-21T07:10:14.087000 @@ -202493,8 +202493,8 @@ CVE-2022-34820,0,0,b0cd8903a339d60c797766f8c0184643570737952e552ea0a0797aedc1014 CVE-2022-34821,0,0,425afe6eb77552864db0e6f478adc8f969ac400e3bccb9e207700a6cd15aaebc,2025-01-14T11:15:10.343000 CVE-2022-34822,0,0,18dcffcd54884b0cb08bb90eabd875e0b96d24c3c554a5f12a43ff763ce481b1,2024-11-21T07:10:15.440000 CVE-2022-34823,0,0,0545f066d01d26a1466efb9beaefaca6ce66688ceee33b2dc28e911bf755e164,2024-11-21T07:10:15.557000 -CVE-2022-34824,0,0,c288a5af99db4cb7304e20be603441acb2c1d900db701a2adc6a5d8370bfed79,2024-11-21T07:10:15.670000 -CVE-2022-34825,0,0,cf83c1c1e4cffcdc3470b290e0492587576a2ad22d2dfb26139b2c58f7cffe6d,2024-11-21T07:10:15.773000 +CVE-2022-34824,0,1,792bbaf40b2f7b16f5a61519b7159c09a98ca9deb8f6a8ae63bde8ba8dfde0a5,2025-05-01T19:15:52.263000 +CVE-2022-34825,0,1,d59f35e1d9b4de1fb572f7ab71ebc314a2f9e508f25715dca0a1e1fec55e7721,2025-05-01T19:15:52.433000 CVE-2022-34826,0,0,d34d23461e68624b229b9bce8c2d86aaae6149cb1db7023d65d15e92fb10f040,2024-11-21T07:10:15.870000 CVE-2022-34827,0,0,3e07a1f742f229de27939fd015b69c19434d3a292ed3e53f04cb7964272013da,2025-04-29T20:15:20.073000 CVE-2022-34829,0,0,82524d4d4ad44fc09c525a7b63f3d6968740b2c8f4b9bcaaf6bcb2208ae899f8,2024-11-21T07:10:16.157000 @@ -202525,7 +202525,7 @@ CVE-2022-34854,0,0,4ce509f6a1e4f8f76d64e4596f68387006441cc7a8051a23bb63f31f972c7 CVE-2022-34855,0,0,c1da54178233a65b7f63e1a5c32c4f8cfb65c465edfb51bdbff289e90af0c1ab,2024-11-21T07:10:19.100000 CVE-2022-34857,0,0,03ac3c1b7047f0506b92bf7e5e259308898485d277000ed41b5ccfb7963cfcd2,2024-11-21T07:10:19.217000 CVE-2022-34858,0,0,89e725df796eff2f85c9ad5904649b961bce1743cee867054fe9d6a86fbf8dd4,2024-11-21T07:10:19.343000 -CVE-2022-3486,0,0,002abe5e1fc57273c7074e1570d77f9f4feb17e9c0c761a65046ec7a4c3477ed,2024-11-21T07:19:38.060000 +CVE-2022-3486,0,1,f8d227d3c87f6bdac3949e8c007efa2c494f129ae9f4ac8f10fea38eb18f1b95,2025-05-01T20:15:33.323000 CVE-2022-34862,0,0,be7e5ca13160931f7b99454182591d729e852329dc10f6b0d78c6c35bc5ae70c,2024-11-21T07:10:19.487000 CVE-2022-34864,0,0,7cfd8edbc2e4ba4d5167e51373af3cd34088ba5486db6af6a72db1581513b56e,2024-11-21T07:10:19.633000 CVE-2022-34865,0,0,6c465b70bcf20193fa9950a90a82eaa7b091a0300d5241c2afdb589d3c36a02b,2024-11-21T07:10:19.770000 @@ -202554,7 +202554,7 @@ CVE-2022-34886,0,0,0db4f4080db869047dd71f933ded0b23f2c33f4b3b50e0ee20c0d30e5f097 CVE-2022-34887,0,0,342aad8d8a669f960cb83181d2a3730523e690c536e734024d45f934c4fa9d32,2024-11-21T07:10:22.640000 CVE-2022-34888,0,0,9b72586846b79f18354b538e937352db3f7ea97f1262edce6f8dd9534f091b70,2024-11-21T07:10:22.770000 CVE-2022-34889,0,0,7c36901daa70ac5ebd70588fc24f1ec3f0c07d89771d3d28913c78bc124b5871,2024-11-21T07:10:23 -CVE-2022-3489,0,0,3a2bbed1d284fc931900d1da8f50da7a1df70804fec5b9a4a591a46c86ad1fc3,2024-11-21T07:19:38.323000 +CVE-2022-3489,0,1,bddf6e40bd2b77cb72817769ebd10aa42204e70a1d9ad646419e19090b29005e,2025-05-01T20:15:33.460000 CVE-2022-34890,0,0,5c77840e884c659799d44ee63bf613a12856bb1e3ffa3bc263e00f1fee8b0c21,2024-11-21T07:10:23.127000 CVE-2022-34891,0,0,7ce0a61420f4ff76d33714d1f64717aa4f6137cd9d83d3beb079a2f45001a434,2024-11-21T07:10:23.263000 CVE-2022-34892,0,0,310d0e76967fe05ff5d408dd7f5ef5d6120320fc5ec3ad9316ebebad414c2683,2024-11-21T07:10:23.383000 @@ -202586,7 +202586,7 @@ CVE-2022-34927,0,0,e385520ff20ff8128748fff7e1629d6ca836a5fe3881018ec54dc85237e22 CVE-2022-34928,0,0,c19c71baa693e90e5ae535f8144bfaf90df7871dcac233c4bbe4a7e5b173693f,2024-11-21T07:10:26.713000 CVE-2022-3493,0,0,b1dcfc739ae0959da4baf794d73541dc1796d0859806eb0635f3a9d3ca72c4ac,2024-11-21T07:19:38.877000 CVE-2022-34937,0,0,b34d7bf0b21c5f3045ff423b5f7a020221f91770652b5650218eaa7e2685b82c,2024-11-21T07:10:26.847000 -CVE-2022-3494,0,0,bb38b7aa57c3719cca8766fdcbeeddd51d300215d81f1834d45bbc13ad6ce257,2024-11-21T07:19:39.003000 +CVE-2022-3494,0,1,0b2ab4ea5728a7acba20f88852c3441d5fb0d10567a8c5a434d95c15ee35de8a,2025-05-01T20:15:33.697000 CVE-2022-34943,0,0,754cd2db9aae02d6fb8bfe1ebb3f50fd0ab27286243e047ca4492fdf9e5f1778,2023-11-07T03:48:48.067000 CVE-2022-34945,0,0,7ab74761f60926443a760dfc90e89ef8a25bb4593051e6f5f43357d4f930263e,2024-11-21T07:10:27 CVE-2022-34946,0,0,80171814d20abeaeef3f2c1d3a833f817f031e3f84ebc742b76ba435bf824d20,2024-11-21T07:10:27.150000 @@ -202952,7 +202952,7 @@ CVE-2022-35356,0,0,90933d8ebf7a473356d778f233cc74d2189d145f5ac05938c1f94ec956a2e CVE-2022-35357,0,0,cbe7aac6419b934d7c2b84d613dd808a6a722a0bd1d64a491ba11c024322e4ee,2023-11-07T03:49:05.590000 CVE-2022-35358,0,0,44f254bbc3956f3515925fadb32803f4a6d00b75b0d8eb09aac608d1d47c7b34,2023-11-07T03:49:05.840000 CVE-2022-35359,0,0,aef8d7ae25a3b0882fb427a6cd8a8929dabb49363d8e5814cf66fa394dc91edd,2023-11-07T03:49:06.143000 -CVE-2022-3536,0,0,083b53666aa38591b85da67f2009c910b8afb92067eb4e8f25bcdc74f476d454,2024-11-21T07:19:43.240000 +CVE-2022-3536,0,1,a67bb2e7542eeb517f4e4176c751dc077bb83d4eed912047e6b825c5a0378125,2025-05-01T20:15:33.907000 CVE-2022-35360,0,0,8edb178b1c3e96cc796fb7d5f586a357e9fc84f6fdf32fe00715077e9ae06a23,2023-11-07T03:49:06.473000 CVE-2022-35361,0,0,784440a76cae8e5062b6f364fc745f614b2782951b867ade83e62f7f07fb7132,2023-11-07T03:49:06.713000 CVE-2022-35362,0,0,d9dee6ca2c4b12a543b591588f17ff63c586f3f0896810c395bebb81c60ea6a8,2023-11-07T03:49:06.987000 @@ -202963,7 +202963,7 @@ CVE-2022-35366,0,0,f9f6015dfda6944f602b3f52ceed7daa3cf1aee9c81eb42aba32d5e6c0a73 CVE-2022-35367,0,0,524d86d4d8f1986fe0f2035a19a80f8d956bc70fbf8ca460c668c77127009f90,2023-11-07T03:49:08.363000 CVE-2022-35368,0,0,decb8ae3bd994b5b971827db0866ad57b0192271fad032acc94f5be8ef9fe2af,2023-11-07T03:49:08.643000 CVE-2022-35369,0,0,e60b3dea40fbf5a1143933bddcee32e4cb24afd9ec355d564f7aa621d21eb5c8,2023-11-07T03:49:08.893000 -CVE-2022-3537,0,0,e1e01b59be32253ab356ee38f3b1392ca5806ab8b0c3aa7bf9634ba7004e1e26,2024-11-21T07:19:43.370000 +CVE-2022-3537,0,1,4c72eafe77a709ad61a06fef2b2f586c85f2a0148133356625d8e122bde11ac3,2025-05-01T20:15:34.087000 CVE-2022-35370,0,0,b929ee1f02138f659be5e923b1238dd7436040aa4189c0010ddb0329158c39bf,2023-11-07T03:49:09.203000 CVE-2022-35371,0,0,dfb6ac1557293273f0e2b85180097e90a482e91d4bd369e63a2817a5a3c09928,2023-11-07T03:49:09.610000 CVE-2022-35372,0,0,8578dc7e1cc3efa1b482da60d93dcfa3b054652c98c2ad06bc661c4ae85c6a53,2023-11-07T03:49:09.880000 @@ -203113,7 +203113,7 @@ CVE-2022-35560,0,0,5a3602e063c94f2d1b18751c9fa0464db166352d932a23398b9387bbd1ab2 CVE-2022-35561,0,0,7a1c028d78406dada0d85e1cc9eae62edcd1155823ec8e646e360c6bba48984a,2024-11-21T07:11:20.430000 CVE-2022-35569,0,0,46dbfde11e602995fe63c9cff3b89b162998751976dcc7a041105a316ad19e00,2024-11-21T07:11:20.587000 CVE-2022-35572,0,0,e5d95e9f09f143affd13b4097606c0f5a97b20c6f18bc4fca512d2fbce33564e,2024-11-21T07:11:20.740000 -CVE-2022-3558,0,0,d1869b1a070a4f140668c54fcaee07ae10418631bc055deaa5a305d3f3f0cb7e,2024-11-21T07:19:45.827000 +CVE-2022-3558,0,1,2c257769d52a7b6dbd3dd83eaa46861be8bdf0595e2dda98464829a6393dea04,2025-05-01T20:15:34.310000 CVE-2022-35582,0,0,851a4677ae8cee47bf049ce03956eeeffe5381244611708fc7140a9876efb5f6,2024-11-21T07:11:20.903000 CVE-2022-35583,0,0,104e140e7e50813c17c6743d2480c6be57bbf50f09ffa8a2bb685e5543833882,2025-03-18T18:42:23.757000 CVE-2022-35585,0,0,397582c6a1ffa62254617c234e9f56d46fbfd92be79c2d9b6adad3271a69a0a4,2024-11-21T07:11:21.227000 @@ -204394,7 +204394,7 @@ CVE-2022-37010,0,0,5fd1ae8964f95d27a86857208b6c8025625e888f8fc854c06e0ffaa6ecb9c CVE-2022-37011,0,0,e00f278fd17331bd717b7612fb7973285869218ab07d0a0a36385ca6b7e57236,2024-11-21T07:14:16.827000 CVE-2022-37012,0,0,db798de5b23392fba5e4df4c09c03b1b2bb648ded3b9742b5b44cde4bb2e90e8,2024-11-21T07:14:16.950000 CVE-2022-37013,0,0,30d5f33bf4449b7f70c625b18c6809691d2724ed039a024424ed5de2cb048ef2,2024-11-21T07:14:17.077000 -CVE-2022-37015,0,0,31337c1238328f6eb531b69004d903ad15053d693a75c8db560fc909b519e9e9,2024-11-21T07:14:17.203000 +CVE-2022-37015,0,1,a3daf7268df4ed9cc7ff07ac84f192de2149b3ed443b2f087b283318d5e3abab,2025-05-01T19:15:52.583000 CVE-2022-37016,0,0,67876ac35e2c8c0c06a58bb092614ae0c4dc36a1b6d86d35ef76800c90c6f204,2025-04-24T21:15:17.953000 CVE-2022-37017,0,0,aa4fbf693bad23b8211c1feba037da4800f2244bcab3f2c3722698012112b453,2025-04-24T21:15:18.830000 CVE-2022-37018,0,0,310dec56a7d882670c4c459c6b25c4802531ba4d3dca12d19214da84296b430a,2025-04-29T05:15:41.360000 @@ -204477,7 +204477,7 @@ CVE-2022-37099,0,0,b3da2db1d47698be6a2ff11ce342e43f7cd1327dcf509acdea1a6bb9df2a0 CVE-2022-3710,0,0,20c9170401c6a50c2abe845ef4df8bcf39b42ce249f4910fa6237456743a5df3,2025-04-23T21:15:16.453000 CVE-2022-37100,0,0,5bc3563b35a90e0b8dabd0cbf7a12b8d2d7d646760ac383b34338ae90a53984a,2024-11-21T07:14:28.070000 CVE-2022-37108,0,0,e4adb894712083c4a29c3d692a46361ff503ecd0d2c017612ec10d92a6f8c4d8,2024-11-21T07:14:28.217000 -CVE-2022-37109,0,0,1748b9298872e9e2b735527b4b79570d1cfe2824976b115c45bd08a095f86d09,2024-11-21T07:14:28.367000 +CVE-2022-37109,0,1,494148a85943d1cfd603e0ef9963252b43aa84be247f1e14c6da4ec2fe12f66d,2025-05-01T19:15:52.750000 CVE-2022-3711,0,0,4f07e5f34e7e741a33c832a11f97f7011685db94bcd24d18d4080c4da5a1459b,2025-04-23T16:15:24.810000 CVE-2022-37111,0,0,f3a81d26e4ca0e3f095a46ff2729bec8f7cfbfe54789c713ade3d2c17eb7d253,2024-11-21T07:14:28.523000 CVE-2022-37112,0,0,bcb32031066d64e19ed6f906d31f5c14c8bddb37933ea9d5eb41f9d492645629,2024-11-21T07:14:28.703000 @@ -204876,7 +204876,7 @@ CVE-2022-37860,0,0,e3277b539c5250fe49de2c77ec1c649d1aa46eeb2c7bcfa82887b7cf063a1 CVE-2022-37861,0,0,f97f5fa13f42d07e6e11b58aa2d487a6b08f86f5a5070d5028af00fdcfdff677,2024-11-21T07:15:17.010000 CVE-2022-37864,0,0,f61d1bd71af25edf8f2125dcfe9f4f30890ffc71b4d466e385fc9bc73d0dc51a,2024-11-21T07:15:17.167000 CVE-2022-37865,0,0,bd049638e0fafdc46de9fbaf66b9c2a5f35ffb87cfc95922cf8faf19f93603ef,2024-11-21T07:15:17.277000 -CVE-2022-37866,0,0,df1b06f034d5aeedf83d0179936e695b2088475396128198204a57a097d9c803,2024-11-21T07:15:17.407000 +CVE-2022-37866,0,1,25852de0b259dd3c39c261b1bd881506cbc3fd3150faab73e1921b71121a1c12,2025-05-01T21:15:50.343000 CVE-2022-3787,0,0,02fab16afacc323def7f13f75d2b6979157fd37f6a4a382232da6afa3627df03,2025-02-18T20:15:15.750000 CVE-2022-37877,0,0,98c1c5f2efaca21dba518d26e3c1ce55cf30ae4a8dd99ac342ac9d123318c982,2024-11-21T07:15:17.543000 CVE-2022-37878,0,0,657a1763bfb6162cf7c08809f01a428bf87f9df752ffc625a0b6bba09e9fafd9,2024-11-21T07:15:17.660000 @@ -205187,7 +205187,7 @@ CVE-2022-38176,0,0,7dc2ffa907110c800e397b2d20a01831372f72b9405ab81a9cfeefa1eddb7 CVE-2022-38177,0,0,325368e277828090b7fdaa3162015a8ba5fd562588a650b697f5b8b2a30eab47,2024-11-21T07:15:56.610000 CVE-2022-38178,0,0,56e1701e4518723c9868dde11699a01ccf178abcd63b7ea27f3ec7116d9f48f9,2024-11-21T07:15:56.780000 CVE-2022-38179,0,0,8eb5a75364f2da36cac0b25134c014b6b5e26ea2ff47147200fba4ba31248efa,2024-11-21T07:15:56.943000 -CVE-2022-3818,0,0,46283e9b478b426247793cc13a3538978ca57255e1d4f40c4962dcca14b550a0,2024-11-21T07:20:17.820000 +CVE-2022-3818,0,1,f41147c1480a432c4901aeb3f0f0cc78401d5bc618a944049c2d9086aebc18eb,2025-05-01T20:15:34.673000 CVE-2022-38180,0,0,6df38655376ce54d910acc17ce7cb510f2c6d7f62f7eff8187bb766adc7b47d5,2024-11-21T07:15:57.073000 CVE-2022-38181,0,0,0d223f2d7b3bcbf6cbacb92f0605eb2b3cad2c9170301be3fb3a12d028456eac,2025-04-03T18:54:52.257000 CVE-2022-38183,0,0,b6fa75fd2cbc4b7675f2613012570f087d29977dfcb60b3016adacaa4067343d,2024-11-21T07:15:57.377000 @@ -205196,7 +205196,7 @@ CVE-2022-38186,0,0,6b7207c678ec548d93dc6ea665fb511844cf5d685ad07b74f30703c16a16c CVE-2022-38187,0,0,a2024e807f9c66f5146a55c3e5089aa731fb118e9b78b56e962f87d2bee698bc,2024-11-21T07:15:57.793000 CVE-2022-38188,0,0,794130eb54d2f7feab3a8050c85ce0f5b1fe6cedf3501c96f04d9192f1c7a82a,2024-11-21T07:15:57.910000 CVE-2022-38189,0,0,1d8da66cf77fc55ce829936edbbf6979ef46520418f037c3b1e5baff476c3f53,2024-11-21T07:15:58.023000 -CVE-2022-3819,0,0,17343c9d10e38945c690845d0cde3b49d7f36d820163535bb6c588d729d6b506,2024-11-21T07:20:17.953000 +CVE-2022-3819,0,1,2d62f79da2c203d7e16bd97051cee461fc7342f319235d558deb8c59ae6e69a3,2025-05-01T20:15:34.800000 CVE-2022-38190,0,0,c4cce8f6a487b652b06779413ec5c7cd1f485b5df9a840a3b7bb0c68098e9bb7,2024-11-21T07:15:58.137000 CVE-2022-38191,0,0,ddeb321f91bb2bef76f7673abb569f53e6dee8dcb3b3dda7635691f60432e1b8,2024-11-21T07:15:58.247000 CVE-2022-38192,0,0,db1d1eb4826d880b54faa8403c3473a2812bb7bb08a232723ecb727116f1af2e,2024-11-21T07:15:58.360000 @@ -207646,9 +207646,9 @@ CVE-2022-41429,0,0,20a5890d574cd6647f024495d4b7ca09ae888c36c639197bdf2926ebc979b CVE-2022-4143,0,0,c5194807e3941cc158017253f549d695eaf5b0890f5b3488f5d60557cb2d3261,2024-11-21T07:34:39.557000 CVE-2022-41430,0,0,8e6555224558da377896e780ffc6026c29018e58c7d9bbde7e5ae048841ba9ae,2024-11-21T07:23:12.943000 CVE-2022-41431,0,0,e1e25d2f98f3e7a8af3ddc6677688b6f69e469f2526d9e82d0c3dd684b0844ed,2024-11-21T07:23:13.087000 -CVE-2022-41432,0,0,c3a3677c888c4857dc688e7f5e824872cc9086f956df95ca85b2c656c55a798e,2024-11-21T07:23:13.230000 -CVE-2022-41433,0,0,95421606f11b9765db98219a83b2d66f0a61599aedfa0d58e07399423dc2c64b,2024-11-21T07:23:13.370000 -CVE-2022-41434,0,0,b85001d3cae5411f91f61c9ee76091c8f3b48ba9ceb0ef271c1eb64bb12a29e1,2024-11-21T07:23:13.500000 +CVE-2022-41432,0,1,66963a717601d370e87ed97a887c1e74e286b9bf7884f42d908066be4734f88c,2025-05-01T19:15:53.433000 +CVE-2022-41433,0,1,69830dc20226c1f0e3e77509f9ce63b9a09fd05690a28cd1b47487eb3585950a,2025-05-01T19:15:53.613000 +CVE-2022-41434,0,1,d392287cb60d76e230328d0f0c02b9eb4363ade22960338767b857be70347db7,2025-05-01T19:15:53.790000 CVE-2022-41435,0,0,2e9d3745efae09ff8a19f34a5db6982483010a3d6156877ebd951fdbaa26043c,2024-11-21T07:23:13.633000 CVE-2022-41436,0,0,67ae6f6430b4ce10d4150b3580b357aa507b8df48bc66ee37216cfdb1ef5eb80,2024-11-21T07:23:13.777000 CVE-2022-41437,0,0,61cb62dc4e6bdcf1d9ad3a51fcdf3c0f4570219fc5c275ee9742690f0387b87d,2024-11-21T07:23:13.917000 @@ -207928,7 +207928,7 @@ CVE-2022-41748,0,0,206cd8732d92088b7fb7a52c083e51c9137e356a17c27b36e1709077de536 CVE-2022-41749,0,0,beb4c2555eb4eb0d23984a8718cf6d6c316c6d07f22f8fc56844d6771847d7f7,2024-11-21T07:23:47.230000 CVE-2022-4175,0,0,7b828bd35e06ebd0a35ffa55153758023f469cc42fa1c43034a7ee55b2fd63d2,2024-11-21T07:34:43.260000 CVE-2022-41751,0,0,1f06ec29f323c31e19946980b7ad887e45eac318f1ddbcf511bb79214670f868,2024-11-21T07:23:47.343000 -CVE-2022-41757,0,0,0555917f9217a0df423ffe72103c5bc48b893612984dd074dad9e79454b56542,2024-11-21T07:23:47.513000 +CVE-2022-41757,0,1,43a282864d3bd6635ea81fed7dc619ebf429f2bb12b9657171cedc5ccc50b433,2025-05-01T19:15:54.017000 CVE-2022-4176,0,0,e56d7a8a062820fa2139a7ff2254136c2ffe2235523b970e4133fa5ff3d334fb,2024-11-21T07:34:43.373000 CVE-2022-41760,0,0,bcf4a451560df21a15fe081880cc00c486c852abd440fd38627d1ff83f25b1dd,2024-11-21T07:23:47.660000 CVE-2022-41761,0,0,e7808633517783e13f8d72963bb1e23d9e68df3697c699f99eeb843667067078,2024-11-21T07:23:47.800000 @@ -209003,7 +209003,7 @@ CVE-2022-4314,0,0,b2d7e2c2d34983b5612bbe613ee90b322bcf58c270b648e62d25d8832fa87d CVE-2022-43140,0,0,c9d53be271af91e52214186c9df783071208bd0020ca24effbc1828c10837e73,2025-04-30T14:15:25.740000 CVE-2022-43142,0,0,8a22fc2eb35900f908f884c1ac55d8d632fa2450cacd301c94373997ac788ac6,2025-04-29T16:15:25.667000 CVE-2022-43143,0,0,5c01884f0a97afe708a14aaa834e46a63f8946a303b61ee1c0b8709f41971d1c,2025-04-29T20:15:22.233000 -CVE-2022-43144,0,0,b4d526f2c0777c15dfcdb374db47406c2f99a3af19d967e0e1257848d30d33f4,2024-11-21T07:25:59.257000 +CVE-2022-43144,0,1,cc4d9d3983edb851ff01c5174b8b2513ae98156c22aa425740303586a072d7f2,2025-05-01T19:15:54.393000 CVE-2022-43146,0,0,d6efe320cfefa298d7a785ddab7640dbf3484c167e744529e4ec06346cde3952,2025-05-01T14:15:29.287000 CVE-2022-43148,0,0,e88598e3e00227e7df01cb914dc1a11f6419c5e39f486159d9588bf142ad77bb,2024-11-21T07:25:59.620000 CVE-2022-4315,0,0,589cd86586bec174ff140f0732f6950973899f093feb268cbe72598f8fca0d1a,2025-03-04T16:15:33.893000 @@ -209129,7 +209129,7 @@ CVE-2022-43333,0,0,bf33a5b696a46bb09b3fdb2bbfa1c27bb7cd6d80aa7b05bbe89fc1c9db314 CVE-2022-4334,0,0,4a37dee2ebbbbca61bfc2e12bc694d49b75fc95115e1acd3f2a5da45247e9d69,2023-11-07T03:57:34.307000 CVE-2022-43340,0,0,5db857e0193b1b777f9c5fe586e64ca593781dd141374d371b29acc52a8dd48f,2024-11-21T07:26:18.300000 CVE-2022-43342,0,0,1924ca34eed3b762a5635281a673c3880f500198eb74038f4df8f0d189a85db5,2025-04-30T16:15:28.100000 -CVE-2022-43343,0,0,160e5591155cbce5d8ead8c9b21219717a4c9394cf8fe6af691fdafeff85695d,2024-11-21T07:26:18.627000 +CVE-2022-43343,0,1,3a268e4483160aad7a6b3862bd4399433b97e1d217defd25181ac78f4e6c2a8a,2025-05-01T19:15:54.587000 CVE-2022-4335,0,0,ba636c67f94d81abb522fc6fcb38741449cc737db34323300f45361f041ef89c,2025-03-28T15:15:42.973000 CVE-2022-43350,0,0,107bd99cb182c98e0b5ed410f1fc9ecaa26ba06a4afcec937a420692dedb7681,2024-11-21T07:26:18.780000 CVE-2022-43351,0,0,b3c3d192a7d15302fcbe416fc06be1b4cbcc193829e5c645ba84e55b2f7be795,2024-11-21T07:26:18.930000 @@ -209671,7 +209671,7 @@ CVE-2022-43941,0,0,8a95e6cc13d0318cc36cd354aca9164c4dbce8d2d470d039b2a273472126f CVE-2022-43942,0,0,450d4d905c5895c0889942c86d82dbc1da73dabf530c8072a01ec2c06303cd18,2023-11-07T03:54:08.840000 CVE-2022-43943,0,0,ae9a15e15c105229f0a8d1bfab8d48d650336d3bde3b51173a936f789c7f93d5,2023-11-07T03:54:09.210000 CVE-2022-43944,0,0,c0e268b88aea6d733e45e62373d6c4e07e18a815f6dc77a2ff3b6dc08349eb0d,2023-11-07T03:54:09.557000 -CVE-2022-43945,0,0,a0a9a2b46edc4b4d749d49d9b1b2f495294d449e8840dd3822425c058a7e45f9,2024-11-21T07:27:23.453000 +CVE-2022-43945,0,1,0d0a2e12a1b5b5777967984f26677338bcf3fc8d4725e6602895e1ad152e3929,2025-05-01T19:15:55.283000 CVE-2022-43946,0,0,cd4cbbd03b194a23c4cb89423961adf48afe204ea0c605234a644d3d92826c97,2024-11-21T07:27:23.573000 CVE-2022-43947,0,0,e0f2c5ae57f9bdeaf76762be8e3d57b10c5ed9db9457890644ddfcebf808df7e,2024-11-21T07:27:23.687000 CVE-2022-43948,0,0,2ad6d57342e04b939dcb8bc732882e5480bf112b78eb769d72503c72a1ab5c4a,2024-11-21T07:27:23.800000 @@ -209763,7 +209763,7 @@ CVE-2022-44050,0,0,6a8d17057780b65bf1faa027e9bdc382bc892de2cd47cf03cd8ef203fabf6 CVE-2022-44051,0,0,99453933a9ce93799cdb9edf1512d5cf6eed1d7b21d77b8639bded93e2a6f474,2024-11-21T07:27:36.107000 CVE-2022-44052,0,0,9518eca2314cb76ce86b9824c9142ca046cd088bb5a19915e07da910e8584e65,2024-11-21T07:27:36.260000 CVE-2022-44053,0,0,1c943cfbab147a3a84c45c050c5de4a1f14d004401fd6e4bdcf0a2a254d96ac6,2024-11-21T07:27:36.410000 -CVE-2022-44054,0,0,414340e74ae9c2b5fe9ea6d550eeb5b64b6b6cc7804801c22013dc3450b6bd82,2024-11-21T07:27:36.567000 +CVE-2022-44054,0,1,0dbcd2803227233313f00f63b047b62d5299530fcd987f7afd97631bb66c69c0,2025-05-01T18:15:48.503000 CVE-2022-44069,0,0,cc5af01a5a577b2702b971f9ad02b8ef3e25502151afa268b801c6d6bd16b3c9,2025-04-30T16:15:31.050000 CVE-2022-4407,0,0,c9c3af685ebf2c701f4678196d6fa21172369d0cf6f76d58a3cac952dd23f8a0,2024-11-21T07:35:12.677000 CVE-2022-44070,0,0,ff4408675e37400b82fd90a7f09e04cf643d797079a13bc26d1c8c37a858cdc6,2025-04-30T16:15:31.277000 @@ -209842,7 +209842,7 @@ CVE-2022-44232,0,0,07b9e71fbb7eba093bb3164af0effe9aa5c5e9562a1a6e394fdeff634d375 CVE-2022-44235,0,0,ebc3a7c399214a257c3d31bcecce2a9f0d4ae461ee8815bb3f616103dc45c2b1,2025-04-21T15:15:54.500000 CVE-2022-44236,0,0,a30a9aae10b784c346da11b42a34537221bbf96034272e060b1cce22e21a2fa1,2025-04-21T15:15:54.690000 CVE-2022-4424,0,0,ce582685d63d3f075e58d62efb1e41565332e4614cdbf9018bfed0cf5fb69802,2024-08-30T20:15:06.703000 -CVE-2022-44244,0,0,22e6a319db5c9e25fe30893d69683c80ec5659966dab727562e9460049e05f44,2024-11-21T07:27:46.447000 +CVE-2022-44244,0,1,8c027c72606e5097039cd4ed76b6dd99d2d8200fe09375c8b9332b3aedc85122,2025-05-01T18:15:48.710000 CVE-2022-44249,0,0,f34b22564538782ce23e6ab5d8777fd5b5ac02c89e01f248da3f6520fcc7c2d4,2025-04-25T21:15:34.723000 CVE-2022-4425,0,0,bf43d7a5b7e50b5efc474ea54f2b26ce0140204e8483422731306bef83e2f2af,2024-08-19T16:15:06.823000 CVE-2022-44250,0,0,68fcdf31384a522b1b654c72abc8a3e355dd34da452b3a8d1077204fb78b9d84,2025-04-25T21:15:34.880000 @@ -209885,18 +209885,18 @@ CVE-2022-44299,0,0,5adbf77681e09b8399532a96a6a9d4ae34eead786fe1c0029300fa2d65f72 CVE-2022-44303,0,0,2b4ae38475bbb8e115a6d75edadb94690a1d2e2156007458fc4083144ea93be8,2025-04-22T15:16:04.667000 CVE-2022-4431,0,0,723db002c5699096c9126aa7688dc656d3723d7dde55c074d8c392948d015d8a,2025-04-04T21:15:42.073000 CVE-2022-44310,0,0,7a72af122186838fc7bfed1392316c46767978b12ec7c0f1861ca40c49475bed,2025-03-12T16:15:17.480000 -CVE-2022-44311,0,0,1390ad964710d376d223686d1d0a0aa9a2e60ff70e3e9e276eaf20d3340a2e87,2024-11-21T07:27:52.043000 -CVE-2022-44312,0,0,4c5ba9ac81239a5b02862be3bd3d25706812c7973b613af5d4a48f28f25d7ea3,2024-11-21T07:27:52.190000 -CVE-2022-44313,0,0,b94be32f1a5e170d607e7529a7d612d7b592afc39b4caf4e060fa15c93348764,2024-11-21T07:27:52.367000 -CVE-2022-44314,0,0,714351f17b7463be32c9435ec1d2181f6866e9bc5d66d54ef5bb3fdd22e2e428,2024-11-21T07:27:52.510000 -CVE-2022-44315,0,0,73879dca6b6209bf805c4f550b85c0eb4e8ac7aedb8a18231a974a040a8c5509,2024-11-21T07:27:52.653000 -CVE-2022-44316,0,0,a706a44895f09f432ed497651c116e1da6d0234cb50e18104076485bfe80b797,2024-11-21T07:27:52.803000 +CVE-2022-44311,0,1,e0637746a19b42166c10a0141768be5ccb66bad9f844694f7c6e31842b3c0ef3,2025-05-01T19:15:55.473000 +CVE-2022-44312,0,1,20f299b13703ec5d0a4921af7c3927a8885cda6f468735105965c3d222db106f,2025-05-01T19:15:55.657000 +CVE-2022-44313,0,1,aec1f6c1831be3dda2afeff0637ba1a395df989874befa3f6d00d96c011eef89,2025-05-01T18:15:48.907000 +CVE-2022-44314,0,1,6a0cee5cc1cc8c56c0ba0acecdcf8db851ad1ef7018edbcbddca6c4139e46edd,2025-05-01T18:15:49.107000 +CVE-2022-44315,0,1,7d25c77c3c4846850d0726b147bae69b78feb26ca3c21f1c37b2602845e4f22c,2025-05-01T18:15:49.303000 +CVE-2022-44316,0,1,f2feb3fdeb3e141235870083fa0d2df3de54f1c112aca607706a4e3c85a2d2fd,2025-05-01T18:15:49.490000 CVE-2022-44317,0,0,02d044130a4d31a3e1d91732a71132d9a75d4f62cea77dcfe15ff4bef7991862,2025-05-01T15:15:56.330000 CVE-2022-44318,0,0,81d769eff4fd8706da9a474f8da66d161fa94f93f3ea579311630e82445d082f,2025-05-01T15:15:56.520000 -CVE-2022-44319,0,0,fcc2faaebee97039e9f4f0fc2a49e1c5367549522130746411acf6c7dda0aebc,2024-11-21T07:27:53.290000 +CVE-2022-44319,0,1,f7bd77b1985bbe99ce1a64f0049b1a1a8fa94f8217330aa412eb28d00d6b4076,2025-05-01T19:15:55.897000 CVE-2022-4432,0,0,2c5778e51f2561c3f5aad7366c2ee08fada4c4ffa8f8ed8277e593013eec7b74,2024-11-21T07:35:15.043000 -CVE-2022-44320,0,0,4a818f66a5b06f0a76d4435c4ee8e6f9ac7fdd5b3813c26d143f777cf241edf8,2024-11-21T07:27:53.450000 -CVE-2022-44321,0,0,57f8f5a061d153a272fbdd0541de039407623ee7df3339fc5aa2c5a65b4c996d,2024-11-21T07:27:53.590000 +CVE-2022-44320,0,1,5314af568dfe4995d33c8ec64124139dcf2e14d67336d89f8957fc184ecd4048,2025-05-01T18:15:49.690000 +CVE-2022-44321,0,1,25117cb7b1480a1342dbe17426334c63f9c348be746928819bccc83af300201a,2025-05-01T18:15:49.877000 CVE-2022-4433,0,0,75b9aa23ac6f3f36967876623eae1e95b7f973744795563285e35e943f439c8a,2024-11-21T07:35:15.170000 CVE-2022-4434,0,0,10e1fbbac279ba1398eae57bb0e90c0ed5f9b58f3e102f4c5eec3656df2b632c,2024-11-21T07:35:15.297000 CVE-2022-44343,0,0,fa3820db6742bae63165ce4dc94768ba45786dc578308380594374c0422abe04,2025-03-26T15:15:40.970000 @@ -209982,7 +209982,7 @@ CVE-2022-4445,0,0,cedca36b9b879b049e03157ad890d2870ba90bb1afe63e410a0ea538ec3aa6 CVE-2022-44451,0,0,88ff513a50262d6c08f63eeb08dcc8ac12e57100481f0cda5bace6b6ce4ed782,2024-11-21T07:28:02.837000 CVE-2022-44455,0,0,caaec9a1c6a516d2eb328a8ab89408344ba8e11b0492593fb2f08013274d61a3,2024-11-21T07:28:02.960000 CVE-2022-44456,0,0,ff0595ad58a974386954b8f9b2199132f89a7be8cb4b1c31a08af64b223e3aa6,2025-04-17T15:15:49.467000 -CVE-2022-44457,0,0,2f0beb7edb78f06bda820a580846d26293b970925b3ef1e3a5a6bbc5bba372db,2024-11-21T07:28:03.203000 +CVE-2022-44457,0,1,45769eac46f891ea1cbd1e65e24102fa7228a31454f5b366691d1faf7efb505d,2025-05-01T18:15:50.063000 CVE-2022-4446,0,0,8c2425071f39685764da1196fea5b8540e69f6f98eb2045cf6064774e0ed3d11,2024-11-21T07:35:16.730000 CVE-2022-44462,0,0,090c03bc74d2ccf3ac759f3a136430e3ac02355172e3933a56a5b61592eaaa82,2024-11-21T07:28:03.333000 CVE-2022-44463,0,0,7f788671eaae81652c9fe69df5cbfbfed13045dc7b2147cefa3c48a66edc82fc,2024-11-21T07:28:03.470000 @@ -210031,7 +210031,7 @@ CVE-2022-44541,0,0,5e7c5e63f9179662dc466a1fff3a273dabd037688c2e83077b363804c4ff5 CVE-2022-44542,0,0,3e753218e976c04fd1c4f1375622b6c96505d2f5a3e796ecfbe58bf137249e4b,2024-11-21T07:28:05.897000 CVE-2022-44543,0,0,e322bf4d1bb1b34312267c4ab1620c4b85dfe18a5f672870a1edd5b39ed2007a,2024-11-21T07:28:06.037000 CVE-2022-44544,0,0,e93718d93ad4d8df602f7337bbff71fb4681370667d2c937c2b7d22298289318,2024-11-21T07:28:06.187000 -CVE-2022-44546,0,0,e6603c633db133e34864ab99b33f9c4d47adfd423f38c59bf0022a9608f6b1a4,2024-11-21T07:28:06.330000 +CVE-2022-44546,0,1,4f50bc86bc898052cb28b6f4a0ed697458b93b9c51f7c3b2163ccca802850cc1,2025-05-01T18:15:50.247000 CVE-2022-44547,0,0,20f906bc7c0ee081e7bb7e5bc5273175a09b1b06d9fecb3986580b607b353a06,2025-05-01T16:15:25.440000 CVE-2022-44548,0,0,212868af170dc8a9331f2fadd4ea5803f22b23d5eb09a77fde3f3bf47958b5f7,2025-05-01T15:15:56.697000 CVE-2022-44549,0,0,42ee3f648443173213d9d3cdedd964edf780fc552ed66ea57bb0cec565e5d805,2025-05-01T15:15:56.863000 @@ -210042,7 +210042,7 @@ CVE-2022-44552,0,0,fc22ddc47e83cbc2ae311d019c191fc263884122e89d593e3122669c19566 CVE-2022-44553,0,0,23bfc4e3f288b1a847d43833a9b2486d5fdbb9979f4e9206e215c45d805cdfb5,2025-05-01T14:15:30.937000 CVE-2022-44554,0,0,dd14d3c64ee7b41c334bbf538687845e554a33eba892823c3ef8f2a536e023bf,2025-05-01T14:15:31.210000 CVE-2022-44555,0,0,d5c8764927459850e1962aa17a11c8bf954e772b1f0293c4bc416d969baf40a1,2025-05-01T14:15:31.493000 -CVE-2022-44556,0,0,778bc2e8c757ff0646017cf156370a43556d216f0172fa9cdcf24b24634c455d,2024-11-21T07:28:07.440000 +CVE-2022-44556,0,1,ec835f8b4403f35390e1d40b49f48b9b7210fa32b4701ef09e6824c0d213a104,2025-05-01T18:15:50.437000 CVE-2022-44557,0,0,361188a833a54343279a2def133e22fdf7570335ef8f0b7931221244ce606f06,2025-05-01T14:15:32.100000 CVE-2022-44558,0,0,6b82ae53f3a74e3d5d6e54cacd97ac85b3e9db1cf7336daf78db8226778ce946,2025-05-01T14:15:32.603000 CVE-2022-44559,0,0,d6f0ef6f19335ec835071e613f85605b7094980bfc35688b0f8d2686e26a25fa,2025-05-01T14:15:32.830000 @@ -210228,10 +210228,10 @@ CVE-2022-4479,0,0,531de5b4547c24cd49254e640831ce039c38e992c04d4f424d7b4a70439979 CVE-2022-44790,0,0,71a7901b8de6c136144b4452f1d70c0ca5c68049086e2189ab53edf7641e1b4e,2025-04-23T15:15:53.120000 CVE-2022-44792,0,0,643daa38dc73f851e91540e7c05d989610268d8a325ff4bf384269768105b857,2024-11-21T07:28:27.647000 CVE-2022-44793,0,0,6073354ca5b1442bf90a252035bad3e86884cee5da2257248065b80d078704fb,2024-11-21T07:28:27.803000 -CVE-2022-44794,0,0,dae146d913ca5007c3ed48023c527ddd105c245d06f76af539eab439d1072d9f,2024-11-21T07:28:27.963000 -CVE-2022-44795,0,0,4e9fc84c7fc093d109644b489a9d1ef246d47a27e2a663de516cc43709ab2f5b,2024-11-21T07:28:28.097000 -CVE-2022-44796,0,0,fabe7ae18d724c9cc72cecb6a04533ba97d3ca005b0a708d8a649021ab1b03b9,2024-11-21T07:28:28.227000 -CVE-2022-44797,0,0,bee760686d211f3c6e6e5658ef83b88f726413109481c22e3242cfc01f37084b,2024-11-21T07:28:28.360000 +CVE-2022-44794,0,1,cdfd600f9b20bb942f1b1ca1d4cf90c7f6913fedee9299b7498850a462091ec3,2025-05-01T18:15:50.807000 +CVE-2022-44795,0,1,a4a59c6645d0ec5980425f127c5bff2d48c2a3c1b192f281b505fb7041b41686,2025-05-01T18:15:51.010000 +CVE-2022-44796,0,1,a0191254bcdcae9a3a7b0f1116f1f2b0386ca2b0089cf0e3b3007135a460492d,2025-05-01T18:15:51.210000 +CVE-2022-44797,0,1,4b9ff41db5a222f3b9b7f4369f92c965428b7d29d43ed7b391f555a172e1a7ec,2025-05-01T18:15:51.430000 CVE-2022-4480,0,0,b80cbe11ddae958d960ce897aef7cdda3990ad0ad077a3ea287b1ff069a448a1,2025-04-04T19:15:43.277000 CVE-2022-44801,0,0,b05c9aa04b17daf435805471949b6f5c9f6e245b4289b97edd40e973c7df6a0e,2025-04-29T20:15:23.793000 CVE-2022-44804,0,0,ff5f70c0b6bbb40677a4186bb05b901d3a6e80c35c6d0508f9c811633d450aca,2025-04-29T20:15:24.020000 @@ -210467,7 +210467,7 @@ CVE-2022-45192,0,0,107e690f38d578462bea0f199171a41451f2ac8fc74bf716c6fb8bae4a703 CVE-2022-45193,0,0,003f809f56ea4befcfa35d54e72551277227d98e7c9c7657ea8a066b59ea5148,2025-04-29T15:15:53.137000 CVE-2022-45194,0,0,0043d25d02c8b5350faf5bdd89abd93be9cd7f29b30d98e1afe97db565c86930,2025-05-01T14:15:34.460000 CVE-2022-45195,0,0,8c301bf2ed8850e12377c265455a8e60f5497e71e3fce3b89df6cbbecf594e6f,2025-05-01T14:15:34.660000 -CVE-2022-45196,0,0,6d315f47811d57a2419966281cb2c7d66fff9eb4145e1e074fa912f20a3acc0d,2024-11-21T07:28:56.687000 +CVE-2022-45196,0,1,05afebce4ac6f4916aaea5e39989548d6aebb291349df6b428e9529952f0710f,2025-05-01T19:15:56.127000 CVE-2022-45197,0,0,e2797594facab33eb8a64e894f3d80227e2c3fb6b001db583f81a9c4f527747e,2025-04-14T19:15:32.297000 CVE-2022-45198,0,0,2f83eca86b413074047ae0108c6feb23d1202b02e6f4005aad94fb4653e9740e,2024-11-21T07:28:56.987000 CVE-2022-45199,0,0,d1c1175a0ef080fdf9a7cc241c1ae7cb7fccb388690911059d96e4fbe19a95c0,2024-11-21T07:28:57.157000 @@ -217183,7 +217183,7 @@ CVE-2023-21240,0,0,2fa435c19bb0e22145de6572d0015baba09b9a64fd37c945511b4def1fcc5 CVE-2023-21241,0,0,a9c52cc3d271695ea6e26c73c5d86c4c4dbf2dd781083ecb5949ea8883089b52,2024-11-21T07:42:28.543000 CVE-2023-21242,0,0,8a0858444fe1e9582d88e57bac5e027e0cc7bb99af9f5c9dc4a02b511574b9c4,2024-11-21T07:42:28.650000 CVE-2023-21243,0,0,7d6e099126f714628cf154778994e112a34dacd44ad8236454879a2be712856d,2024-11-21T07:42:28.760000 -CVE-2023-21244,0,0,8dac766f4b86486f00562cef81d9807715c2856710458f7069b50370db3533e3,2024-11-21T07:42:28.877000 +CVE-2023-21244,0,1,740ddb3b830b9cf287bc151fccb10feda4baa255bf007c87b1de5601d9656b9a,2025-05-01T20:15:35.350000 CVE-2023-21245,0,0,6f31a6018414b862e341c83f1931be358fbe28d70c7df234c4a282c3249ceceb,2025-01-06T17:15:11.087000 CVE-2023-21246,0,0,1f6bcffc9d220b84d23cb12a7e9b770433c98266c39e0604ab29512f2ade75be,2024-11-21T07:42:29.117000 CVE-2023-21247,0,0,bc133ab9c456551ec2ef0a7118cff02a516dc7bf991de0bb51275c15c330ed1c,2024-11-21T07:42:29.240000 @@ -222967,13 +222967,13 @@ CVE-2023-28205,0,0,37b54305c2b3b2e91ff9c17ed58b5bf03ad35fd96c25af1cc3b2329eb3d9f CVE-2023-28206,0,0,6e5dc3d4a2a2958b6ddb1a15a9f93ff5b3964265ec2bafe35327d70da05b7e31,2025-02-28T14:57:44.363000 CVE-2023-28207,0,0,a1fab6698fff87fca47c3daae39e8114979c9109db482e99c2fcc225fb52310f,2025-03-25T13:15:39.417000 CVE-2023-28208,0,0,8fc033bc09b7b40815121b04865c55bdd349e84c32a87bcecfbf9bec0bf2a61e,2024-12-12T14:26:18.893000 -CVE-2023-28209,0,0,ae4ef08c6845cc374897f4c97156cf6614c7c1aa7babc4b8a598ea53ad27998a,2024-11-21T07:54:36.330000 -CVE-2023-28210,0,0,0a0bf3ceb4448c02d2ec01f4d787a866c183ef21b5c4e0a2261156a4b2c55497,2024-11-21T07:54:36.460000 +CVE-2023-28209,0,1,e70d54dba2faa67c19d0e4c4b3e9220141b902812d08c482644dfa2e1573b1c8,2025-05-01T19:15:56.320000 +CVE-2023-28210,0,1,ec8c04069dc65712788ddf9a2978cecfc9205044b95dc106021d2d6137c61991,2025-05-01T20:15:35.557000 CVE-2023-28211,0,0,2c47262728ad176602183272ee6e13d09c3d058aa1bc5e5323714b37fe246b7d,2024-11-21T07:54:36.583000 CVE-2023-28212,0,0,da0ce5dfded38a2987b9094cbf118ffc80212a72f93249f8791fdfae0bab6394,2024-11-21T07:54:36.707000 CVE-2023-28213,0,0,8c46738d5bc47e330afcfffe8664d3d5e0d2249d2eb18ef9ae7a24c15eef6a68,2024-11-21T07:54:36.823000 CVE-2023-28214,0,0,06fddd0d91d1c6e8b2d836253119bd9343d80e9e9fccd9be0cfa2f97b5054f9c,2024-11-21T07:54:36.957000 -CVE-2023-28215,0,0,71792a40164ae7ab2a4b584598ff7e445f2f80c7ef807687223db7472d484c64,2024-11-21T07:54:37.080000 +CVE-2023-28215,0,1,742e357c06269b88a73e78cba0b1c0c4eda49da126bb93bebbcbc29000aa9166,2025-05-01T19:15:56.570000 CVE-2023-28216,0,0,b2d125bea06cb7bb1734ba11f5fd5356b74627392457ac8f344513e9cd98df8d,2024-11-21T07:54:37.217000 CVE-2023-28217,0,0,81807bce1955171c185900aee83c3380c1749d3604c567fd46cebd7b57d9a0b3,2024-11-21T07:54:37.370000 CVE-2023-28218,0,0,aba3540add773a88ac0d00a1a2b9aaca6e472563f26c9a5a7b34249b25febcc3,2024-11-21T07:54:37.527000 @@ -226212,7 +226212,7 @@ CVE-2023-32352,0,0,283c961c6ee48407fc9ea3be28023f1b1fc235003863597257ba37d9897f6 CVE-2023-32353,0,0,32c9640dafa7baf1552c2f7c3d9581b130f5d1f437ee599cf02c3cba57aa2f12,2024-12-05T16:15:20.873000 CVE-2023-32354,0,0,dc7c07db2279a794326f737156c20241a21b28e67545a92477839f04b8c6f6f9,2024-11-21T08:03:10.400000 CVE-2023-32355,0,0,eb3f3328639712a77a44c87115d171c54bebe320890b16333d8f0ccc07f54071,2024-12-05T16:15:21.057000 -CVE-2023-32356,0,0,971f4abfdd650cf4f80a551feb8c4d41205d06445bce43a3bcbcbd3cc9e10989,2024-11-21T08:03:10.650000 +CVE-2023-32356,0,1,92a276500d052627418f5a87c0b467bb52647d591774db4fa15f9469908e6c01,2025-05-01T19:15:56.733000 CVE-2023-32357,0,0,cadb2185ce69140feed2a12024eb9be32d32612ebb26f3387dadda31b14c1e86,2024-12-05T17:15:08.620000 CVE-2023-32358,0,0,2e1af697d676962c288e955717636b83960aaf97a8129ae712b4c4de87c6d0c6,2024-11-21T08:03:10.893000 CVE-2023-32359,0,0,a02d5540391a1dba317d85336cb3a82ae4e6c79a17de59e2fe8291744d4a97e4,2024-11-21T08:03:11.013000 @@ -234756,7 +234756,7 @@ CVE-2023-43252,0,0,03b403f9d63a92611672a304c4b25edd1643add0bc21711f741bdbee4b569 CVE-2023-43256,0,0,c911a780c91fd26f92aff57ea6ecb7538df44e0fcaa71e52053a0423a332f35a,2024-11-21T08:23:53.973000 CVE-2023-4326,0,0,8def9cb85026194d9d744590c3332c024f14751b029aeed72bf34dc05adf1e4c,2024-11-21T08:34:51.680000 CVE-2023-43260,0,0,b3fbeae20a244244d61c605d6ff62b0198c4d0f8926330fe1f92b9b26fa5fdec,2024-11-21T08:23:54.130000 -CVE-2023-43261,0,0,1547e426587d15d80d902afe57c85f6fe5eb99ce37bb87c53e566b01970aeb73,2024-11-21T08:23:54.307000 +CVE-2023-43261,0,1,45b2a15d8e9e8f3df4fb05235adaabf3c12acc0d07f62250a1bf882176a8c437,2025-05-01T18:15:51.780000 CVE-2023-43263,0,0,96b2d7653d824210bced111450614c8155cf85a4d15ad8bbe2063a476bc186e4,2024-11-21T08:23:54.477000 CVE-2023-43267,0,0,712e61f11735f14a214a8dc48f0903f5ca6620b7046fc2423a5f8f4643dc4c61,2024-11-21T08:23:54.620000 CVE-2023-43268,0,0,79b5a5a1066111c31398602e2fe423616af58f4afe5a64202a7096b7e371ba8c,2024-11-21T08:23:54.770000 @@ -240795,7 +240795,7 @@ CVE-2023-51676,0,0,9c5fdce2df6f0753a166254119ed41b27eb8fdd07a855c67677efd7185fb6 CVE-2023-51677,0,0,30b2f5af2eb6896c6284e42b0a2864336294f40fcf86114ebf403fe1ad6ea952,2024-11-21T08:38:35.450000 CVE-2023-51678,0,0,610bbe9e534a5d0731aafd40fdf7b603df85ea34aa86557639d2bc384dc8014b,2024-11-21T08:38:35.580000 CVE-2023-51679,0,0,c994bf4ccdfd44a920fd0f54b457ae94c9c8c678c5ca5771fc270d810d5d56ed,2024-11-21T08:38:35.700000 -CVE-2023-5168,0,0,1bfdca9df820aa3d56fccd94e6d09d245f98062f488681057cb45cd4c1e67c38,2024-11-21T08:41:13.283000 +CVE-2023-5168,0,1,2c3955bc006d2fae7c57615ee8c6af79f5245132cded24fbd0bf49feebc9d73d,2025-05-01T21:15:51.850000 CVE-2023-51680,0,0,f89d8e21178d9824fbd938895dbce0298cb364f9f6262f0cee98010731fdcfc7,2024-11-21T08:38:35.830000 CVE-2023-51681,0,0,ba1a4c43a4168658ded1e68a21fceee19a1b3943ee7e86d10442f079a9440a2e,2024-11-21T08:38:35.953000 CVE-2023-51682,0,0,4f94ffc288425935bb79d9b13abacda59a8d6920bd5f73141207b0235ab86e36,2024-11-21T08:38:36.073000 @@ -240831,7 +240831,7 @@ CVE-2023-51713,0,0,fc0a6d5f8abb19a01e260bc41cba76050522cc0031032446c9b2496f9d57e CVE-2023-51714,0,0,7051316db750dfd96a8322c236a2bc507f2e96cf6e417eaff348d34d4f2a5cc2,2025-03-20T21:31:13.473000 CVE-2023-51717,0,0,0e2e1e215ca5caae4c90f2f30ed2beff52d71cdbcbf33ffa5a4110ee7c7ece87,2024-11-21T08:38:39.843000 CVE-2023-51719,0,0,77c2de1ad36378d1939c75c3b1c56c52ab5484eb1450d6ab6f12bdbc692d1bef,2024-11-21T08:38:39.997000 -CVE-2023-5172,0,0,845f701a3fa01033c4cc7e9f1c17ff5b41f439e0755e6591ac6c8d8760c75216,2024-11-21T08:41:13.800000 +CVE-2023-5172,0,1,4bdb5eb696f49e05a5a68e52278cf9c1f8f1555d06323e944a0916cebcc26728,2025-05-01T18:15:52.133000 CVE-2023-51720,0,0,179439789d35bdad890e83b21425d1c84aa174b13056ceda76769e7081146f46,2024-11-21T08:38:40.140000 CVE-2023-51721,0,0,9b902149093592694534135685bc4797bccc3741b7bf0c8cc51207fda45d041d,2024-11-21T08:38:40.267000 CVE-2023-51722,0,0,21226e1855779c231fac7c3722fa4a4dfbc61167a11ccd125f247a57af319a9d,2024-11-21T08:38:40.383000 @@ -240864,12 +240864,12 @@ CVE-2023-51746,0,0,9983b83f606d188d1cd1ab76f828d27fe807ce4194761eccf9ab0087796de CVE-2023-51747,0,0,d55e4845b5b6178c77f162428ed926091444b02248e06686ba57815fa903357e,2025-02-13T18:15:53.470000 CVE-2023-51748,0,0,1c7d9270aeab86a642e5f879974bba644cbd248c17a79619d18a3e201fc821da,2024-11-21T08:38:43.800000 CVE-2023-51749,0,0,37d09e9aa58b4a7462cdb0d4486d5aaa759f73fb158f410bcbae12282308c57b,2024-11-21T08:38:43.950000 -CVE-2023-5175,0,0,7649901f6631c94a4c35f5154345c9e06464b2a360067b4435820fc35982f481,2024-11-21T08:41:14.140000 +CVE-2023-5175,0,1,ee2e784beb417523600b06663a45ec9c9c79e0a125409e96ff2ec3ddb94a713c,2025-05-01T20:15:35.723000 CVE-2023-51750,0,0,f1527bed12ad0fe531dc02237976313053955582c2d4b6f2a688de8223d763f0,2024-11-21T08:38:44.090000 CVE-2023-51751,0,0,690ba7b341fc2f46b4227d302630de387895c687fb2d5bdf90e12b362424a002,2024-11-21T08:38:44.260000 CVE-2023-51754,0,0,5990abeb92795a2483bca9447d29e85b563f90fee4bd3d86ef95fd44bfd359a9,2024-02-14T18:15:46.867000 CVE-2023-51755,0,0,ef67db68f5dc8286b447ec3eb725f76132db71d3e97ab41205e0053447e1146c,2024-02-14T18:15:46.907000 -CVE-2023-5176,0,0,ccccbc3036ac7bbf3f196abbc5590d11a49226791b143a7d6d4a88d192d69c8e,2024-11-21T08:41:14.250000 +CVE-2023-5176,0,1,089cb1115288b184fde7bf8813f6b12c223a35a4f0d244f28238a4c94b47588e,2025-05-01T18:15:52.350000 CVE-2023-51761,0,0,1709a6f4c796a77b89bab9f2c057c6c3c8e6480bb4ecd12673f8d8974befbff5,2024-11-21T08:38:44.447000 CVE-2023-51763,0,0,c10c499362cf03a08a3f609dba3fd908e128903e62356fa988042861b44383ca,2024-11-21T08:38:44.580000 CVE-2023-51764,0,0,68bf6066af973c65f300d23894dbf4aa356a3e3cf8cee280eeb2640147512e22,2024-11-21T08:38:44.733000 @@ -242016,7 +242016,7 @@ CVE-2023-5341,0,0,04fcaa2a103ff4f1179f89eb801c614481572f75e6537324cbea1ce4040e49 CVE-2023-5343,0,0,1c2bd20ff5aaa557f20c3942b76bed9cbbf7ed075596e481a5fa4d6d4503ea3c,2024-11-21T08:41:34.357000 CVE-2023-5344,0,0,07698be75f57e5440d2ca84dedbd3873284ef02ca3dbf655895ad4dc3d36f155,2024-11-21T08:41:34.530000 CVE-2023-5345,0,0,41174ffb7773ebd5df5108f6ca6dcbe6acce921fab0ec9d5e7cee4d42d1e42b0,2025-03-20T16:59:45.643000 -CVE-2023-5346,0,0,bf333a64017863a234f43c56993c7e431bf960c683f419697193977abd21f1a3,2024-11-21T08:41:34.830000 +CVE-2023-5346,0,1,b5e64cdae8dbcb22fa7dd92016a79e618372d5dcc6b695b3491ed64f57f8ff5b,2025-05-01T20:15:35.880000 CVE-2023-5347,0,0,3ec8ebc53ec81086bf5e3668a8bdf114fcac4b56d729442a3031b66e68a76b95,2024-11-21T08:41:34.967000 CVE-2023-5348,0,0,4fb769a5184d3d90417877bd75aeed4b5bb33f7e359ebe6a781d3624a05f3430,2024-11-21T08:41:35.150000 CVE-2023-5349,0,0,cd815307b3f4e6952d177f6b157cd639c833f8a4f52e2ac9b0f40f9ecb1e6ee2,2024-11-21T08:41:35.263000 @@ -242135,11 +242135,11 @@ CVE-2023-5468,0,0,1eec919f626caae0ef756cff8d072afb7bf54cc212f9c6d508e0f99619f8b5 CVE-2023-5469,0,0,98a50cf30b58f208d23d7567934f0a629b1333751854c4d8530b60939f166926,2024-11-21T08:41:49.993000 CVE-2023-5470,0,0,b2166409a677e40169ef89299e8cc9f64afb0de953f0fec9f0875c87aa667765,2024-11-21T08:41:50.113000 CVE-2023-5471,0,0,5eef1a53d94c7fb7534271c74bd67e17294b89c623990ba9fad257f896ad0eb9,2024-11-21T08:41:50.240000 -CVE-2023-5472,0,0,35350d225292bd24ce000154e47d25b60d28a91617ee56e1038d627bb9462b94,2024-11-21T08:41:50.380000 +CVE-2023-5472,0,1,b1fd84adf746d9392aa528bbe598e356bef6eee7485d1d5b5a36eb0f0463410c,2025-05-01T19:15:56.893000 CVE-2023-5473,0,0,e20924940c764c51a814caeb5894ab0596875b13dbc703c1a709bc6fa4077295,2024-11-21T08:41:50.510000 -CVE-2023-5474,0,0,be5d0a0aed97fd41126f04466c3ec10cccb0adba41fc0a8b3778c0943363c7c9,2024-11-21T08:41:50.640000 +CVE-2023-5474,0,1,f637e8a9cd133d1384788bf8a0308a762be14355e592c4d59ff38458ea19249a,2025-05-01T18:15:52.563000 CVE-2023-5475,0,0,2b4e9af48c980d18194e4e12e9043729ec1c3fbbe1a92b5db7f1041dc558367e,2024-11-21T08:41:50.777000 -CVE-2023-5476,0,0,ed8a9d7eefa793ba95b59cf33f2b22bedcd17700aa571ab1ce509cc8121b6560,2024-11-21T08:41:50.917000 +CVE-2023-5476,0,1,fdae12ed03828c7551aafb68a6cd41e26ae3f8867e2e0289e09d1df7bae6223e,2025-05-01T18:15:52.957000 CVE-2023-5477,0,0,7fe5d45b8e5de68f8b23f2824f7d6bffc89f9277869ac51ab9623d07710e5270,2024-11-21T08:41:51.063000 CVE-2023-5478,0,0,cc7b80d1b8bb417dbded88cc2ac5f6a8850fd874b0a11d9c4e4dbe5191289d1f,2024-11-21T08:41:51.197000 CVE-2023-5479,0,0,e5cf8e214ced58ee69b13fef527a65865cd669b2cd1afde07fc5b19bcbf70e48,2024-11-21T08:41:51.330000 @@ -248101,7 +248101,7 @@ CVE-2024-13378,0,0,7ea1d4cbb0f87859cae348c2da93d49f3902e773337fd492c684caf293929 CVE-2024-13379,0,0,ebe77b8be5bdd70ba192f2850f9b10f6648b43e1ba162a550ae4527fcdc56169,2025-02-25T17:40:45.270000 CVE-2024-1338,0,0,dc2761903a1c29795472be9ec50c80e554c7222ddc44792707b7eb37ea2462f8,2024-12-31T16:51:41.113000 CVE-2024-13380,0,0,fedf57869c030ff4f3637f3803a39ecc31ada14291471686481185c2393e5fb5,2025-02-18T19:15:13.623000 -CVE-2024-13381,0,0,2ad933d8567a12c3aeb3940861bfbe17e47a5284fdbf3b91b123b049d238749c,2025-05-01T06:15:33.553000 +CVE-2024-13381,0,1,96b71edb43363539141e65972f656160dd40970474178a2a14e8981b0fca7903,2025-05-01T18:15:53.797000 CVE-2024-13385,0,0,341bf9c15400cae53ddc0851921970fc70795f9f5473739da6d466eaaa0f96aa,2025-01-18T07:15:08.463000 CVE-2024-13386,0,0,6ff136adf169af3d89231135a7ce4b15faa5760d31440cb4c68dca430369b948,2025-01-17T07:15:27.300000 CVE-2024-13387,0,0,4fa5b6a4b1e6e7fbc2f3075a5d8980b29e2968b35b02e0f8e5098804434c72ad,2025-01-16T10:15:09.103000 @@ -255521,7 +255521,7 @@ CVE-2024-27901,0,0,446889df5d6f342bce9db6ffc9b1986b1759b684a2d1d50d324de40c72781 CVE-2024-27902,0,0,3f5f42385a9393698754c09b1605f789b8b50c7c4fa044200e33f2b6d1873978,2025-02-26T16:32:20.917000 CVE-2024-27903,0,0,58c75e7797eeb5b5e663237ce1ebff14bcaef9f53e4f7a44ed3cacca0730af63,2024-11-21T09:05:23.177000 CVE-2024-27905,0,0,48d50f750a1fe5ee845f6ed61ede3995e1acb62ebf4008a533d76b056005f060,2025-02-13T18:17:46.050000 -CVE-2024-27906,0,0,160f6b5d5dc3eae404c60cdf874de59bdd19cf0f75cb1583c0a8c89bca4c27cf,2025-02-13T18:17:46.247000 +CVE-2024-27906,0,1,731e562fb02d09e59aa935a73da13968e33460b043c225932f39912e734d2943,2025-05-01T19:13:54.827000 CVE-2024-27907,0,0,93a68ff71d3aeb34f42e681e9dbe8b630d16db6c3637b4d175bc07a7bf1a29ca,2024-11-21T09:05:23.727000 CVE-2024-27908,0,0,840cdafd91ba5316553d234a9ffe03fc9fc46a31b723f45c70182dcee40a4254,2024-11-21T09:05:23.857000 CVE-2024-27909,0,0,f7fa7e105accb9eb0c4b6b109fe14e65b7b64d13c1aec10d06a022e4e69f8cd6,2024-11-21T09:05:24.003000 @@ -256431,8 +256431,8 @@ CVE-2024-29128,0,0,bee4cc55f3c0e24c76ebe3483bbff8c5899d6283f7177a8d0f1c303d78f13 CVE-2024-29129,0,0,9adea97588bea2f7e3de08bc7666d9e97383a04c1f3a60e0591161bb6ab0557c,2025-02-27T14:33:11.600000 CVE-2024-2913,0,0,bdee00fa9056fa8a0ad1417004d7f8c2e104929c730aae671329cfb89a446ed2,2024-11-21T09:10:49.413000 CVE-2024-29130,0,0,755cd3d9a510f7e14b48ccbdb1966ab8a2e33133bdff60a3a4d71d312037ac6f,2025-02-25T15:30:29.553000 -CVE-2024-29131,0,0,24b46e30d1cfc3079608b0a60246a31cd95da0f260e841bb9a4077a1c7f2063d,2025-02-13T18:17:49.693000 -CVE-2024-29133,0,0,1399dc78b6ccc8cac87fb186c2774c66e5787056a39bd75c3d093a0a7fb720d9,2025-02-13T18:17:49.867000 +CVE-2024-29131,0,1,e8275042bee0df9e00fd61d5ff71afbf063ee4df5823076110ab9f30bd4e398f,2025-05-01T19:13:04.290000 +CVE-2024-29133,0,1,0445521125fd5ce325615402bd0442c5a1d84d3659f125b4f4f4ae487f17545b,2025-05-01T19:12:24.250000 CVE-2024-29134,0,0,74f630344df59b77b1263dca45da470ec79da582f3c589e4f0bfde79a77c9969,2025-02-25T15:24:13.637000 CVE-2024-29135,0,0,8ab9dbe3cfa66f9339e1f7837af56e95edc4e778d88679bd4a63315e4b98fa42,2025-02-25T15:24:28.333000 CVE-2024-29136,0,0,a86a64a9bf52abb81f052e1763413265c01183b73c47692e36959d5d26385659,2025-02-25T15:22:52.013000 @@ -260757,13 +260757,13 @@ CVE-2024-34777,0,0,be880f5d9300a5088e13fa19ac10c6b025c3dca9069c4c291fa2fac13a210 CVE-2024-34779,0,0,e889ed02ebbf7be7a3483cdba1d97a550775f3fedf135fa003cb98fb6ad367f2,2024-09-12T22:35:06.133000 CVE-2024-3478,0,0,792529935ccfdfe2a41a3dc3e9675cebc6e9da71379b755568eb487063791c18,2025-03-25T19:15:43.823000 CVE-2024-34780,0,0,39f91616594a8b516bcf548b5f4c052308f66dc1e96d7d813f4461507a0de071,2025-04-23T19:18:18.210000 -CVE-2024-34781,0,1,0c45f38a7c2512ac217beac78dd182b458b1de2d20003e331477bc0da5b38ca4,2025-05-01T18:01:17.703000 -CVE-2024-34782,0,0,197104349b8cd448bbb078ce78b8735e7fd4273b8b853010492002da1b578311,2024-11-13T17:01:16.850000 +CVE-2024-34781,0,0,0c45f38a7c2512ac217beac78dd182b458b1de2d20003e331477bc0da5b38ca4,2025-05-01T18:01:17.703000 +CVE-2024-34782,0,1,7139c8963308ad14a166ebf6eb16c082cb99c4ba0c39d739faf285de96fdc408,2025-05-01T18:01:32.403000 CVE-2024-34783,0,0,85ae9bc60bf82ddd043eb14e7baa653c0f1a16b9704ebc37acf3d3840d7e8e1c,2024-09-12T22:35:06.833000 -CVE-2024-34784,0,0,85bfcd5ba7ba6977784343e6cc074ed32dc9cf0d465b39db39f327c8bfa1f25f,2024-11-13T17:01:16.850000 +CVE-2024-34784,0,1,525ad1cd71ef16af1a8541bd821c15ed00e6cf84e107b239380bea4daed99c78,2025-05-01T18:01:40.537000 CVE-2024-34785,0,0,20f6357b91b61716747aace350a3f58a8e803f0c60764d0852540f787d9ba863,2024-09-12T22:35:07.533000 CVE-2024-34786,0,0,a9fd72be231ba743b6c3e0c8b9a50be75d515b86c30d07b70db9f4c289708dfe,2025-02-10T23:15:13.840000 -CVE-2024-34787,0,0,0ae255cfa1933431d8825c6135fc327c19208846cb6d28dabc1a896108f62b00,2024-11-13T17:01:16.850000 +CVE-2024-34787,0,1,11bd19684fe7015a31652ba4c8ef6171ab251c7a5f8c3d0383b65e5314882e73,2025-05-01T18:01:43.600000 CVE-2024-34788,0,0,e595a05920b484eeaa6b15d0e5cc3b23a09b6d36a58a6e5227491ba7182e45bf,2024-08-12T18:52:25.127000 CVE-2024-34789,0,0,5420175300148f92244d462dfb1cdcddb6f757c1fc4063a7ca7e0d360f3e7d6b,2024-11-21T09:19:24.027000 CVE-2024-3479,0,0,9d3ffb69e1a203705a76fd98fa518a0ec5ec0ebe942d9440a14aafbaa3e4c23e,2024-11-21T09:29:41.480000 @@ -262243,7 +262243,7 @@ CVE-2024-36735,0,0,eb5bce5adcd2cc796dec063db96956a90de38ac952af99d20d8fc9bc42842 CVE-2024-36736,0,0,03be2a30087ff58c5018661c420fd6bfa3b6017adc091c78b30103b20ee1a821,2025-03-25T17:15:57.270000 CVE-2024-36737,0,0,0570a0af82c8cb7cea9db8761bd6dd4f3feaa61a8587165222ca6da64f8f51b4,2024-11-21T09:22:34.843000 CVE-2024-3674,0,0,22193ad9925936ca40eafc01b0fc37460e0cb0f612b5716ded7f8e8445f6046c,2024-11-21T09:30:09.347000 -CVE-2024-36740,0,0,26bb12c2c0bac7d2c18f8b182eb360b69df3faa918b57f2b0769297cadda426c,2024-11-21T09:22:35.070000 +CVE-2024-36740,0,1,cee6e4212e5f146ca1a5bd7ecd50211d6b87b4fd1f18110143470c959740ea9f,2025-05-01T19:51:29.793000 CVE-2024-36742,0,0,3a8ac06d2b7460d92170f393580d757a9169bcf0cb47f2df5b6b9175dc24eef2,2024-11-21T09:22:35.287000 CVE-2024-36743,0,0,997f7cc47dfdd9276a067f7a34f5b7be0237277a0a3157d65da6a25a7753b82b,2024-11-21T09:22:35.510000 CVE-2024-36745,0,0,582e3910cb74af93f78109d65947378a8998249b6686e38e76a8a9fa5b61ef88,2025-03-25T18:15:32.900000 @@ -262801,15 +262801,15 @@ CVE-2024-37372,0,0,7a94c4a740e696ec712d604dbf685f52d8913fa3a37f4a5e5f0c2a9e491b2 CVE-2024-37373,0,0,2847e99c027e210636b1d596d67704fa58348616cd3faf9bd4b3793a4d930cde,2024-08-15T17:31:32.407000 CVE-2024-37374,0,0,a3f6a856277d969b5278070e608360817edf02cab5ccf8d8f18d5284d45c7fd7,2025-02-15T01:15:10.570000 CVE-2024-37375,0,0,8217c80f0bd457ad7fb99331336c4763aefd1b5314374f4e51de6172c1073d6d,2025-02-15T01:15:10.650000 -CVE-2024-37376,0,0,1dc51b5aa826df22d3254cf3516fef937d6ac86fcd512aa6922bb2d33fdbd215,2024-11-13T17:01:16.850000 +CVE-2024-37376,0,1,daf6c4d98c4582c652276d94c5995189b0a6fd61725f60a72793dd5b59839fb9,2025-05-01T18:01:46.330000 CVE-2024-37377,0,0,caef14ff514966e0f1ee38c7ff4edbc7bd09ca12f789eaaa3ae9e03a1f92295a,2024-12-12T15:15:13.500000 CVE-2024-3738,0,0,6b7c5ee43d749786d04736c3425539aee3d10b90489eb5acbf775617e1e2b292,2024-11-21T09:30:16.940000 CVE-2024-37380,0,0,77cf3dfb25923a81bead84472c82f0af78f2d433b4d7604e764b919f8522c470,2024-11-21T09:23:44.180000 CVE-2024-37381,0,0,9f8a1e24016e672c46f9ac1942c6c3e469697399412e29900bea76bbfcf0caef,2024-11-21T09:23:44.310000 CVE-2024-37382,0,0,351acbbb35c6e810a4a4b14170847f37e61db11e04c62933e1148863747f62d1,2024-08-29T14:29:32.920000 CVE-2024-37383,0,0,b1ff3cb6598ed1ba41af52ada946067c26e1f9b448619cfbacc86943333f66e9,2024-12-20T16:52:05.623000 -CVE-2024-37384,0,0,fc4471efd9bb23449fa9db31dee7f8a0d5954ec59042d211a974e2576d8626f9,2024-11-21T09:23:44.963000 -CVE-2024-37385,0,0,42dba148074eb68f96dc3032ef510bc428ca2ec23394b14e18ac5efc7f3674b6,2024-11-21T09:23:45.193000 +CVE-2024-37384,0,1,ad39b8f2b7beb056b389d2886956d444c82cec1e3e644506cf5378e089d3a07e,2025-05-01T19:51:01.563000 +CVE-2024-37385,0,1,4a64cb5f1e6a395b2e3f32e82f111d69e0709cb35cf6f6ff7e244f48ce6e22e1,2025-05-01T19:49:21.887000 CVE-2024-37386,0,0,b3b80f364518cfd17d5ee452f25d6cb7775d8ae7b1e0df3e35aae4575b507127,2024-11-21T09:23:45.460000 CVE-2024-37387,0,0,986898eb3c2ba6d33db09c226c2611a01ced689aa2bf5c987d0d9f7cb262461f,2024-11-21T09:23:45.683000 CVE-2024-37388,0,0,57cf4af147a424250df7b46d4b3e45c17f1c85f1e3b7be38767484284423b466,2024-11-21T09:23:45.877000 @@ -263075,7 +263075,7 @@ CVE-2024-3772,0,0,d7764ec2008c8c849bb15599d550308a995271f50ec13b7ce4e2de026bd648 CVE-2024-37726,0,0,d896df11823efbf9a4d73a2cbb465f2cdd2815bdf2c264ca9fbdce6d5c110fcd,2024-11-21T09:24:15.257000 CVE-2024-37728,0,0,641fb24219d355f90fe60a18a51d79dd7660e42ab60fba2f2dbfa7ea2d39b361,2024-09-11T15:15:12.140000 CVE-2024-37732,0,0,b9b0fe1b01dee8766f35de513c3af28f9ca9a7bca6f59ea9eb577760e5a5f9ea,2024-11-21T09:24:15.687000 -CVE-2024-37734,0,0,c29b7305eb3a656f6b393634d560813e85405c30b1d082e6cb5c8e32de8d8492,2024-11-21T09:24:15.913000 +CVE-2024-37734,0,1,942d71720aad180ed2fca0dd3a14d392234ecbc7fd118327494f9ee9c137bc7d,2025-05-01T19:38:20.270000 CVE-2024-3774,0,0,7a7a597b589690c12f919940345595f31743063972f70d8b4f9ea657d33a59e6,2024-11-21T09:30:22.263000 CVE-2024-37741,0,0,cdea71c096b6020452f86c61c722c71d411c4901d61352f541581e27bedfb10b,2024-11-21T09:24:16.130000 CVE-2024-37742,0,0,7c57418640c4a372993ae3363ea2c4e93948b308f1c699d6cb68e3e245b5578a,2024-11-21T09:24:16.373000 @@ -263698,8 +263698,8 @@ CVE-2024-38437,0,0,ccb22b800ca035bcc67eb76a0923d5bf4359b548903b49f1ee2f17d34af38 CVE-2024-38438,0,0,3dc83134267dd01a65062427d3ff01cdd33a7e0398dee4466f7b390caa0819dd,2024-11-21T09:25:51.540000 CVE-2024-38439,0,0,e91372788a8b82b01307a76f45b0dbec1cb7a19a170d78cf3c93a9739cd3acc9,2024-11-21T09:25:51.770000 CVE-2024-3844,0,0,411f44c7beffac7e4b6326ab389a4f30c5e05a5d7bd2c96e81023cefe43a60a4,2024-12-19T13:59:12.247000 -CVE-2024-38440,0,0,821d76770250f5bb74131e589677bd4a9512d8c9462d2d1db6397554f562cb8e,2024-11-21T09:25:52.217000 -CVE-2024-38441,0,0,876fb4ecab58feb1e8d0c7c50879f79f8314f2367e45e3ab08137414142234bd,2024-11-21T09:25:52.753000 +CVE-2024-38440,0,1,52b7e49af1c459e0eac06417bf5e2e9031773cc8c7f8bd6ef770cc535ff62eaa,2025-05-01T19:44:52.170000 +CVE-2024-38441,0,1,9789f7bf0ba535ef2b407d56cc54c414e4e1d81b75ddbe05d5815ff9da9cc252,2025-05-01T19:42:41.313000 CVE-2024-38443,0,0,d7f45b6e4b42b6c6cc7b1e3ba8f6c3c008035f970b0fb09d2408d339165fa7ad,2024-11-21T09:25:53.177000 CVE-2024-38446,0,0,701cc2525c0d53c6716fd48172fea7d553f245fdd9150cff1c179a37285facfd,2024-11-21T09:25:53.547000 CVE-2024-38447,0,0,7b8507515389bad7e0c61be3ff3b5c755e883644162393c68fe20803c4233b58,2024-11-21T09:25:53.860000 @@ -265278,11 +265278,11 @@ CVE-2024-40705,0,0,498d1b36f9941cc45abf0a56c450cafece4560bbcc29015fb60565ec3b88f CVE-2024-40706,0,0,2d75f09e0bc9af501f366be096b838d208163d04225f16f3e88ae1b8a5e11931,2025-03-11T17:58:30.353000 CVE-2024-40709,0,0,fc599183e9661cbcade523183f2c327fbd248e82b89d065b196cf8d66176a6c5,2024-09-09T15:35:08.283000 CVE-2024-4071,0,0,6b7a15c8812d01f9851365bf0640804d8a54a0d07fe306e122faf1e050f7c253,2024-11-21T09:42:08.097000 -CVE-2024-40710,0,0,856e33ca3d527bf9b22b62289626b50ebc3d6e424d6f27bc2ffc658b22c43af6,2024-09-09T17:35:04.207000 +CVE-2024-40710,0,1,33f47bde0eee9df81a3d13ac16a78b8d2be42fe375f6d404f19b1d60a462273f,2025-05-01T18:13:16.443000 CVE-2024-40711,0,0,7b916b0711bc44aabe5c56eee896ffffaf138f2a0c03f97b9d1731ef29c51dd9,2024-12-20T16:35:59.103000 -CVE-2024-40712,0,0,6d586c1a31e56b18f9afd5ffde6bebf31ff6a2bc70de6651490583f97ace2cc5,2024-09-09T16:35:06.673000 -CVE-2024-40713,0,0,2303d5845f3e1769b40edbce8d5c46ac298cede1429baa41dbf73abcb5c3fb0c,2024-09-09T15:35:08.970000 -CVE-2024-40714,0,0,2a7716752829d3ca6e4092e866d341ca8adf9c7c7707ac29dc65ea8ad2d2aafe,2024-09-09T14:35:02.980000 +CVE-2024-40712,0,1,ef18192fde748f748cfeca9b3f2f65ca1e507d5f5501e77aa0677c374aeafec8,2025-05-01T18:17:14.087000 +CVE-2024-40713,0,1,d1641d8689f3f2825f95fa7dba3ec1727dbece1b59037e75c48698292a83ac1a,2025-05-01T18:17:17.203000 +CVE-2024-40714,0,1,78050cc82b587b65ff63de49285822b06f68adb48a8244b9ad71fe17326e743c,2025-05-01T18:17:19.890000 CVE-2024-40715,0,0,cd2d0e6b93f8526d3f852ec36fecdaa91f1ef62b879b3196a87899cb1aca86d4,2025-03-25T17:15:59.260000 CVE-2024-40717,0,0,760add4750a1f9533b043ea6903ea886ca6e48eb3722c6717e0870f2e63a4c14,2025-04-24T17:21:39.267000 CVE-2024-40718,0,0,5a16884bd3354f7249b866c39e0cc14ad31746c4bdd4b9e0de9fc42b5a92b665,2024-09-09T14:35:03.723000 @@ -266305,7 +266305,7 @@ CVE-2024-42012,0,0,dab60b90550b7395695be78e9c7e9d756f3298efdec2478270e4b89ffdc55 CVE-2024-42013,0,0,c990b304cdb2611cc1d7f1680b840fcf81dd270dffc1ebb57b99daf30afabb35,2025-02-04T19:15:31.570000 CVE-2024-42017,0,0,5509e2b803cf969223b73bdcf88f1502d3b190466153a8d92dad3bae23d94eb3,2024-10-29T15:35:30.713000 CVE-2024-42018,0,0,eb9a1a6ae48726fe6d8ca5270a76e202e200b6b8c357ecfcb36c7033e7e13c63,2024-11-06T20:35:23.377000 -CVE-2024-42019,0,0,f56b7dabfa0a3aa6dd50c961825a0c75da61580b49dbccee32e2e0bfbe61c364,2024-09-09T17:35:05.247000 +CVE-2024-42019,0,1,11614567cf7dabdea5b286662a0ddf3f4386e206ac3155ab0a1b9131b1280572,2025-05-01T18:19:46.747000 CVE-2024-4202,0,0,cd42359c1b21fc769f879c1384ee1c2c1322dbc238d0ef6567e7dbfbb051908d,2025-01-16T17:16:54.653000 CVE-2024-42020,0,0,3ae4a555964a5b7715d3199084fdcd6ec4c70c8fdce0e1a022fc653cd1290be8,2024-10-27T15:35:08.650000 CVE-2024-42021,0,0,5af29c237ca74a951592deaab3d6c96c427257e7460746e95221ac8ab6087461,2025-04-28T16:54:23.607000 @@ -269461,9 +269461,9 @@ CVE-2024-4616,0,0,c88a5bb19ffab0b116976f147bd01e0835cf9dd78a3350693b45be3922df36 CVE-2024-4617,0,0,591f2f27c42c02f697911ff625983cd1e4eaf8f3a464b0dba65cf73eb6c11bdb,2024-11-21T09:43:13.580000 CVE-2024-4618,0,0,344fb57e11ecc3269da0e852eb09c883837fdcaedda34c53b2be452ba9572fa9,2025-01-24T16:37:51.287000 CVE-2024-4619,0,0,14bb5af1dc671627629008d94a085bd654debd474fde8162d072b32fcf392846,2025-01-24T14:20:44.467000 -CVE-2024-4620,0,0,ba6cb8b4b90a19279ffa16a083d9166077215ec27ed0288a47d1ce2ebcacc327,2024-11-21T09:43:13.923000 +CVE-2024-4620,0,1,69a1bcd2f5610100874840f4b1b51663007aea9b5587529aa678edcbe1f400b7,2025-05-01T19:47:03.910000 CVE-2024-46209,0,0,d3bbc915447ec1fe735ec63d5553d0fa25a7e9df2ec6f6285302779d3f6b2f93,2025-01-07T16:15:33.800000 -CVE-2024-4621,0,0,5b081f12feb85affecbce7e55cb325897bb9294ab5a34846e1b6b33436e2d24d,2024-11-21T09:43:14.093000 +CVE-2024-4621,0,1,b9797f219d024d908699660241169113490d175831cdc6cf05e0f2b4b5428339,2025-05-01T19:46:27.260000 CVE-2024-46210,0,0,dd0259ca7d3b357c4120cf4dc5f3010d93adc7f5a3403c8d9782eaa71d816fad,2025-01-31T17:15:13.950000 CVE-2024-46212,0,0,9fb6a248b9aee6c6623aaaed9592269e8faf25b72106f535b7602ba05dd43c74,2024-10-18T12:53:04.627000 CVE-2024-46213,0,0,14e6aca58c78f4091257ec1bdfcf4f32aabc7fd46f373f1f42d1b8882c20a13c,2024-10-18T12:53:04.627000 @@ -271362,6 +271362,9 @@ CVE-2024-48901,0,0,71a32a44c0ef4ae7be4ebee83c1da9cd9051ae7f4725178587fe5cc4d9f33 CVE-2024-48902,0,0,fac907ba592985cedbc6c7d62d6399de126c11c59cc432f7434b088369952c3f,2024-10-16T16:57:23.463000 CVE-2024-48903,0,0,49fdfa095e9ba18ef9d33ae5dbb85500094116df8d52da97c48eb1a137b560a0,2025-03-13T14:15:32.560000 CVE-2024-48904,0,0,35d8cc445681b5e4ff1fcbbfd5a27253a724d76e1a2a2d6acebb5b7ec5903547,2024-10-23T15:12:34.673000 +CVE-2024-48905,1,1,495d88498fa5b82128403525135ef9aa9b343e986333680d9b011db4d6076370,2025-05-01T21:15:52.033000 +CVE-2024-48906,1,1,d762bfbc7c92b3a7157948c0a2cf1b92eb9376eea40b8c1ec2d527e27ae79f28,2025-05-01T21:15:52.160000 +CVE-2024-48907,1,1,338a9a416595c71ef18897526cd0cc1143e55b9a605d832d6db3938d52aea332,2025-05-01T21:15:52.270000 CVE-2024-48909,0,0,5af217867017b45645b1cd88e9368407196c63b062f42cfaf011c832caa8e595,2024-10-17T17:56:11.130000 CVE-2024-4891,0,0,da144f5b8eac6a1bb02dce3640ba1147c865a134b9c516618c4c8a80a71defd2,2025-01-30T15:45:34.377000 CVE-2024-48910,0,0,7f12c97e649c7955bf5eb5f3507eac6092487e8d427486ba58a1995cf7bdfe0b,2024-11-01T12:57:03.417000 @@ -271727,7 +271730,7 @@ CVE-2024-49336,0,0,e067cf209d0caf1be065d750b3da5a2f0d985bb3fee7dc2a9c294ed4ce1c4 CVE-2024-49337,0,0,9a4ebdd351aff7440b19d3ce5cd2382d5830ba7ddfb58fedee89e4665adf0252,2025-03-11T14:06:18.787000 CVE-2024-49338,0,0,089f0961a6c5fcf1312af989afac1f42747fad3dccba1132721dce2e32b4ec33,2025-01-18T15:15:07.433000 CVE-2024-49339,0,0,9425fb5c81f6dff392aaa0664ff1617cf111ffa2e6ae53225c22b9e873bc9df4,2025-01-31T17:15:15.260000 -CVE-2024-4934,0,0,c48302b0b85313af5a6e75f2285d80b1e442db3b1b019c52648c5cb5dff0b2d3,2024-11-21T09:43:54.343000 +CVE-2024-4934,0,1,f3bf05d944028b6dc52d3ac1d5ee6175716f3cb42e62baa9ecab608138b23e74,2025-05-01T19:37:29.113000 CVE-2024-49340,0,0,121e4a69718b7eafa91c4d48c066b6562f54cd89bd7dd643eed0f1ac402e3c12,2024-11-08T15:06:21.730000 CVE-2024-49344,0,0,347784b34265f8b719b2af5b861570ef0177fd877a75f8c8b31285ef2dd3bfb4,2025-03-11T14:02:39.433000 CVE-2024-49348,0,0,3f0061500b4dd4e17045ad16baa9e311ee1ac03ef6339695bbc97d441fd8b3c3,2025-02-05T12:15:28.570000 @@ -273092,7 +273095,7 @@ CVE-2024-50993,0,0,45c7499f43a514ad709ec77267045299bf6c27e2c53a4be735be70acccb77 CVE-2024-50994,0,0,07634b30aeaed5bbea21628a66cda719abeadecbd44ef6bc664304359fa32278,2025-04-22T18:11:27.543000 CVE-2024-50995,0,0,ff4da6830dfe2233c73a1743ee79568bc8fc78868949b08c062690d46086ed8c,2025-04-22T18:11:51.507000 CVE-2024-50996,0,0,d15809f5d04e082ff15b8d7a24a6158c2c29b377119b170d41bc7c7f32c2ab03,2024-11-05T17:35:21.940000 -CVE-2024-50997,0,0,de81e76c7d84878e27d20cc3c16bd4bf5b767733ee44465c3f602bae8bb012f6,2024-11-05T17:35:22.727000 +CVE-2024-50997,0,1,c586f057d16bf08d19fc1bbbf3f510a9d3eb859b1a92842694834a5c0698c148,2025-05-01T18:22:26.830000 CVE-2024-50998,0,0,131106f189d33d06381b3f5e5ad0c5f50ff2409a4ea03dc3c6f695e44d1e14ab,2025-04-22T18:12:56.867000 CVE-2024-50999,0,0,6fff8d5ab7a41b0bb1f77b7d0bf186eabb0f814576f950b3e851d3a85caab338,2025-04-22T18:13:30.633000 CVE-2024-5100,0,0,c1dc57708cd24a7fb6ffd96dd6b5a2ef484b8819be25ec95c2f19687d36b3e27,2025-02-10T14:26:40.580000 @@ -274424,6 +274427,7 @@ CVE-2024-52899,0,0,fd381e4ffbd82c5c3ae3119791a451a008b2780104bd8e38b6962694cf0bd CVE-2024-5290,0,0,63b2ebbbc89fe3009e69f8f9e716432542a09cc7bbb7656b9181d2882b05d010,2024-09-17T13:09:13.683000 CVE-2024-52901,0,0,36d188f2446e50c3cb0f73c4dc9bb8995fd68fc57b5b23eb83b9c2e8f4d32395,2025-01-07T18:16:58.680000 CVE-2024-52902,0,0,a3380a1085a80da252bc071d60beac51ec60c4709d752c512c4410d14d967500,2025-02-19T15:15:14.660000 +CVE-2024-52903,1,1,5ecc3114aa79480be35da2f63225aa31dbb91e8786416c67a84d1524a4afa24b,2025-05-01T23:15:50.317000 CVE-2024-52905,0,0,a9327b81440c72b84de5e99b76ac1dcf189fe6b815c22c3fc715232a781b5c5e,2025-03-10T16:15:12.887000 CVE-2024-52906,0,0,431d94d1b8f33effe6649fec1d40fce02705d36efd5f14a5de5395492c85ff96,2024-12-25T15:15:07.470000 CVE-2024-5291,0,0,59cced621ba81a9183b7024bcfca25ce68853e845d2185c7bff426c187f3d943,2024-11-21T09:47:22.270000 @@ -278024,7 +278028,7 @@ CVE-2024-6126,0,0,b09ed2039637bb3d7e6f1afcbe7c1e837e12dc96d65cf0ff47588c83c029e7 CVE-2024-6127,0,0,1726d163c509b612517e4a319b352f43607ab4a25ae05c2f9363d54a12398ea2,2024-11-21T09:49:01.177000 CVE-2024-6128,0,0,5f9f555c9b59fadd7a22254021d7e110151a9a1c148f0cbe3eee558230caaccd,2024-11-21T09:49:01.310000 CVE-2024-6129,0,0,13dfa73056aa69b8e5335358908f0e333ef68e763129328eff64d453e70d435a,2024-11-21T09:49:01.480000 -CVE-2024-6130,0,0,a325b28915cb970e04cfebdda77f4f39fdf11c52751ed828cb7baa868617bf53,2024-11-21T09:49:01.660000 +CVE-2024-6130,0,1,134d5144d388be1cb2403a746a0d7cf37161eda25ce64e9e2bccf290c61c6576,2025-05-01T19:35:44.337000 CVE-2024-6132,0,0,768064dfe266590fab6eb87af467790439c19168c36d4137acab744261e9cb99,2024-11-21T09:49:01.850000 CVE-2024-6133,0,0,6f899556dc8c8fffafc19f9a581fea17fb2f03fdbed5158ec01d29475ec42047,2024-08-13T01:18:26.570000 CVE-2024-6134,0,0,2139f7a60f388d7636a3b9c753e3c58732bd9a7a90f573262be596aaac4e7eb6,2024-08-16T17:35:11.413000 @@ -282450,7 +282454,7 @@ CVE-2025-1213,0,0,226c2da2d3a4aac647d77e7a97567bbe3f4fafbe21e513e404ff5a1441bfa5 CVE-2025-1214,0,0,ee530a0ccb2dbec34bd0adb6326677fa3eb44dee2c85c32f60f080d2175851ef,2025-02-12T20:15:39.200000 CVE-2025-1215,0,0,28588a9b24de663f5bef0961d5dfe96e8a71be7eda3beced3b32d3f6d90dfb60,2025-03-21T18:15:34.290000 CVE-2025-1216,0,0,c2395b4be7af9479c54e2cb380a24f136f34a8574d4e9d63fb5aa8873ac74d92,2025-02-12T20:15:39.907000 -CVE-2025-1217,0,0,f74552a142dcd5e85706f08bc76411c96bc658c62a6f6e261d78a36e1748ce94,2025-04-01T20:26:30.593000 +CVE-2025-1217,0,1,dc75860fdff4f312a33adb63496d9467a081dca0551a2ce25a7a2880d15cf13e,2025-05-01T19:29:33.903000 CVE-2025-1219,0,0,5210c7f263d775516f66c950787d83de95c289c580f8d113c7a7dd0dd2d1ff5a,2025-04-15T16:54:55.650000 CVE-2025-1222,0,0,37e1c4bd7e5e0aef71d4eaf69d903e1860c5e20ac2c3d888fafec2d8540da40a,2025-02-20T01:15:09.707000 CVE-2025-1223,0,0,79c0b4e1b63833c27fb384ab59edaf7afe279373880088cf1aa2309d13ed89d4,2025-02-20T01:15:09.837000 @@ -282525,6 +282529,7 @@ CVE-2025-1324,0,0,0b272f0faceca289f0c40e81d7e67cfed130feb379b2f510016e8db4dc34ec CVE-2025-1325,0,0,9137ca9db40c6a3347b80f5ba95e12ff095900fd07663b36ee12c2c6e50b3fd2,2025-03-24T18:12:02.770000 CVE-2025-1328,0,0,e2b9ad996048bde72d17ec9a6affa826b875b275e51ef749199b511eae0ab088,2025-02-25T18:03:46.410000 CVE-2025-1332,0,0,651a32ff0ce1e4c178256e4e7fa7755a14b2351228c1c710a764ce12601a0c92,2025-03-04T17:17:39.640000 +CVE-2025-1333,1,1,2972206f498bbf6ec8037d1c8662e397f071fa65de7ac25b50f6595d8b6b26bf,2025-05-01T22:15:16.657000 CVE-2025-1335,0,0,564364b2f61e7747ac590848e7f26fbef6a8ec644fa7858b0ae594d6c732e9b5,2025-02-28T19:56:39.220000 CVE-2025-1336,0,0,5bb81efefa47b6b10a748758c689250ae0a85244c2bc3fa4b57d2310008c62b3,2025-02-28T19:55:19.603000 CVE-2025-1337,0,0,d50b5c2b5aabd36826ddbc10fd1c9ad645d3a485550527f95248dd387d871087,2025-04-09T13:15:41.100000 @@ -284923,8 +284928,8 @@ CVE-2025-2286,0,0,a29011b43d479279660c1eaaab71fd21b21b30735d3755825b9279066e08e1 CVE-2025-22865,0,0,19a89c82649ad3129bff7c393f18a8aa29547854e8bed3a25f76183fca3a3ccc,2025-01-28T16:15:40.540000 CVE-2025-22866,0,0,c708175c229fdd910b5da4acb829b622112b0d84eed2186edc0f9bf19e465443,2025-02-21T18:15:32.243000 CVE-2025-22867,0,0,89eb6539ba2561e6ed2f62e1706818e853753182ae09675c0ce3557a15684ce3,2025-02-06T22:15:40.393000 -CVE-2025-22868,0,0,62e5cc790705ff43a96912efe031bc8048b68c63111113cd225e255aecffe6c0,2025-02-26T15:15:24.993000 -CVE-2025-22869,0,0,79719125726880f26bc2b13b7ff722f5a8e85ca88bf5332b957a80e592d67370,2025-04-11T22:15:29.837000 +CVE-2025-22868,0,1,d1d2cb163ce6a7a2f43c74e1da3a17017538bcfa2c48f499f79bf9ef6116db7e,2025-05-01T19:27:10.430000 +CVE-2025-22869,0,1,38afca1cfa10682336a08f171318df7218a1c033ead869de99bcc515f6754ef5,2025-05-01T19:28:20.740000 CVE-2025-2287,0,0,8813dfc8049edc90f8c2884aee49dcafb730530912f5261432ad51214abb5088,2025-04-08T18:13:53.347000 CVE-2025-22870,0,0,5e2155600788a6616ffe365d219c4b2615228a685c5d4bcb3d43989a57212eec,2025-03-18T17:15:45.467000 CVE-2025-22871,0,0,8447f63e9a6c66830ffd6379e6b0b42476a147330f64e19484778d9e21b37e01,2025-04-18T15:15:57.923000 @@ -286259,6 +286264,7 @@ CVE-2025-24513,0,0,5c5908095b7b8f59692c97894f2bc39950e9c619c5cca524158b823c48174 CVE-2025-24514,0,0,1a64291b9861e3b81420eacf402909141500e0f7a383b259826850512f786e18,2025-03-27T16:45:46.410000 CVE-2025-24517,0,0,92131f25cdc7b580ee3c2f39a62649371095f9520a185b59d5123817df32924c,2025-04-01T20:26:30.593000 CVE-2025-24521,0,0,8d587ccd83944db33992c871adfb713baf82b8ebec6fcce78327a7080ffb5677,2025-03-05T16:15:39.093000 +CVE-2025-24522,1,1,79fb9971d80f2a2acd010fd80308eb5a19784bf39af22ca86792dd70b07f14da,2025-05-01T19:15:57.097000 CVE-2025-24526,0,0,1e18d1f5ae98abeeaf7d844b3f89d785c7636c11b538120dbb867fa27b9c5f64,2025-02-24T08:15:10.427000 CVE-2025-24527,0,0,64c5f15d3a36426dd086cf6753a3bcfcae0a9e70014bff12440c7ea401e9bd26,2025-02-24T16:15:14.683000 CVE-2025-24529,0,0,bc0b161a595e000cd783abe643c1f26152f3142c15687c9c73e18c43346dadb9,2025-01-23T06:15:27.710000 @@ -287873,7 +287879,7 @@ CVE-2025-27184,0,0,e6149fd65e46b5854fee94f2de03fd44c85ae65131821f271d09a5b6c7a66 CVE-2025-27185,0,0,c30bbc9646936df980735d902ff64b4c34288cb3c4ceabc380df571dcebd3311,2025-04-18T14:38:49.510000 CVE-2025-27186,0,0,44a8e92bf9434680bd487917bded79fc72095f247bde46cf38e1629246e811a9,2025-04-18T14:38:32.703000 CVE-2025-27187,0,0,5d9a84c966c9abc49dd16f1baaa0732eb8143073d03564c576c529a906480bd3,2025-04-18T14:38:20.120000 -CVE-2025-27188,0,0,c2ef64956505ac4bb9ad252af3d6a22fd3baa35e1dd408e9464d0782bf3b8b67,2025-05-01T16:15:26.760000 +CVE-2025-27188,0,1,3fee81d5c9b68c8c0a2b648ccdc04fc5ac8240ce46c102b0d80fd489b889b576,2025-05-01T20:00:44.443000 CVE-2025-27189,0,0,096c257f85297617cb727b6f0986e74b141270d8532e0b124bc7236c8d913f6e,2025-04-30T14:59:09.547000 CVE-2025-2719,0,0,aab61dbd321f094053bdc03116bddf17d81ea49d4be45c3ea7db49b33c86fb71,2025-04-11T15:39:52.920000 CVE-2025-27190,0,0,f6f93c1a2aea709128307aab4dd8f7522a1d7f29cb3bdc0326949ea46ad2467a,2025-04-09T20:02:41.860000 @@ -288012,6 +288018,7 @@ CVE-2025-27357,0,0,906169a569eb5a8ab170c576da5f537f983e8f3b76fbc6f0db581847c8ddd CVE-2025-2736,0,0,e7cf98020d21878cb789676050f2b64482f392b9f6e63f08f76876bbe2073fa3,2025-03-27T16:45:46.410000 CVE-2025-27363,0,0,eacfc55a70741273922ea22dff488f5249055c44f792def36c729ba640204fe8,2025-04-02T22:15:18.963000 CVE-2025-27364,0,0,9286c5546baa0d62309d5b0261f0843f04abf72743b73d703ec5236da175e8e1,2025-02-24T20:15:34.180000 +CVE-2025-27365,1,1,00a2e36f49b81334e8bf80ef2c81768adf1281622379775560f1c86c51c612a4,2025-05-01T22:15:17.500000 CVE-2025-2737,0,0,9d40414dcab50f45f0c2fa5c2a682879f8d578b9615da1fd43e795859731e769,2025-03-27T16:45:46.410000 CVE-2025-27370,0,0,0e4b7966e83d8d55e2eb5b8a991cbcb244993a6e600774bc55d7606305b3dc3b,2025-04-25T15:15:35.820000 CVE-2025-27371,0,0,45275223bafac4474512200e04f0e5f05b6e9358eb7647331e7f7cea3c7d0d4c,2025-04-25T15:15:35.937000 @@ -288513,7 +288520,7 @@ CVE-2025-2851,0,0,afcce46a15e06b1b4bc9eb376d825514c609838d555c56fd7f796bf11435ff CVE-2025-2852,0,0,0d42e9d434b18478fcbc1ef34c3e03e30ec2091c6cee0b07643f5fc055f1c0a9,2025-04-01T15:44:08.323000 CVE-2025-2854,0,0,61a1a0a363b6d457b0e3c52638dc6ae7e2fa609b47ce203d47a3c268ebed477d,2025-03-28T13:15:40.923000 CVE-2025-2855,0,0,4084d95f609a0847eed16b474beea5ea69671ccab6790be5478fe46b5fc8411e,2025-03-27T16:45:12.210000 -CVE-2025-2857,0,0,e3a56eea7b2206ca5257da5a192ee84a5aaaa3a949ef76cf7051ec14bc52c03b,2025-03-28T16:15:30.180000 +CVE-2025-2857,0,1,56f4507026c618c6ff4f2337587de947410a1f3a9c107f44b15fe806477c5ad1,2025-05-01T19:31:14.930000 CVE-2025-2858,0,0,0a6c9eae60f33cb248f3119d73fc6162429c11278e6347bea0ce44cf9aef2f3c,2025-03-28T18:11:40.180000 CVE-2025-2859,0,0,e65abd0b60f7827efad318631d07986b97bfd6a357c0604e2e3311a9d74c8481,2025-04-04T13:15:46.493000 CVE-2025-2860,0,0,8a82659ce782c704e35b992ab741da8f89550cecff77e53bbcdeb016970ae171,2025-03-28T18:11:40.180000 @@ -288645,8 +288652,8 @@ CVE-2025-29032,0,0,12b1441dc9358c5c16def012730045c4192ae6bcec0473634ec29643cb183 CVE-2025-29033,0,0,5eca366ad2f6b7bc48c9c10555d9d4de9f98752ea608be3c325a7269b2a18fae,2025-04-04T21:15:44.653000 CVE-2025-29036,0,0,1cfdba0275e788d67daeea9f29674422f2b95f026fe7bf91e23dbade8cbd52ae,2025-04-04T21:15:44.813000 CVE-2025-29039,0,0,881da009fc6597d81f3f9f4cb283b05453c5021c8889e1146e84959f079014fa,2025-04-25T18:28:39.133000 -CVE-2025-29040,0,0,ba15783e261065c92d08b79425bfe770efe8d4ef8e75f1a4ddce4c1adb9632c2,2025-04-25T18:34:37.217000 -CVE-2025-29041,0,0,5ebc36aba69d028a8ef3c7cd54ba9294d08a0f3d80a0332a5ec684088ddb306c,2025-04-25T18:28:55.070000 +CVE-2025-29040,0,1,4f590af51a2aea5d42b85e5cabb59e5c929ea050c3646c8b8ff5998165f2d558,2025-05-01T18:15:54.197000 +CVE-2025-29041,0,1,2ca872071e9cae45a96769afaa7515961ba49ccb57bb76b75b7a3c8b04cdf948,2025-05-01T18:15:54.737000 CVE-2025-29042,0,0,2d0230a4f27f8c90c859c9e34754c9a1e3a510ddc3e4f99c877efc19ebb8f376,2025-04-25T18:32:08.817000 CVE-2025-29043,0,0,1cef223cd8fe283b6ca31c2b51ea32a91259cc12b1a64f8c47d9023c163fcf4b,2025-04-25T18:32:43.667000 CVE-2025-29044,0,0,97c1f84201c58c1cd211c59dd61961380f9d3f314950e59244831d0ef457598e,2025-04-21T18:42:48.887000 @@ -288850,6 +288857,7 @@ CVE-2025-2974,0,0,695ae768ef6524a31e333a2a15c7b6d7e58b63b62d57be8f5f977780042de4 CVE-2025-29743,0,0,81120842f22b2571ea7e3fe058ac6f5d5658e8dd31a46120b990d9a82771d185,2025-04-30T13:54:38.493000 CVE-2025-2975,0,0,a51ab4826f882dfc9eb64143ebea4f1b786d39ebf186c00a08fe8a9302ac16b4,2025-04-01T20:26:30.593000 CVE-2025-2976,0,0,2714beee469a94bef5bdeffcc7963fd27d32ec325e019e7704104b1aec409041,2025-04-01T20:26:30.593000 +CVE-2025-29763,1,1,bf55241b67fdd310b98028858a08a97cc074676a6765a11772e4f8ce63994862,2025-05-01T20:15:36.110000 CVE-2025-29766,0,0,d0d6c01c0aacc0172ff6cf10187bd4c58c9fb5a0b02e4e65dffc9f50e759cbe7,2025-04-01T20:26:22.890000 CVE-2025-29768,0,0,492de4cf9bc586f0c097ff358f0d6522edec16b3a3700b1c85d835d10d900b1f,2025-03-13T17:15:37.623000 CVE-2025-29769,0,0,4fcc16eaf29fce8a5b34f75047a3eed2f720a6f7db558d6fc5f5bb71e21d7a8b,2025-04-30T22:15:16.870000 @@ -289785,7 +289793,7 @@ CVE-2025-31286,0,0,e856201c9b42834f1c9528734a2606281893fc23418757a05099912d18c27 CVE-2025-3129,0,0,9ce9125356a6ba22d5c34f89147622c417a2440c2d1cce155406586438a1f6de,2025-04-15T15:16:09.733000 CVE-2025-3130,0,0,3331839c90977481f0952c53c01c561e7ce3f9a4b6241dc2a679ea9232965364,2025-04-29T13:09:32.353000 CVE-2025-3131,0,0,22058460edb80eeb28e47627ce19a90708c04371cfdf5beafe6e1efa2f6db14c,2025-04-22T16:16:30.543000 -CVE-2025-31324,0,0,0d7eeb4fe3f5358af63f9829699b005f4296230116a2f18408e1400ba4ad4a08,2025-04-30T01:00:02.383000 +CVE-2025-31324,0,1,d93d12367b475f5e11942374d7fb089791ba0262634d4cb71ff992042648c1c6,2025-05-01T20:15:36.200000 CVE-2025-31327,0,0,32f90adc396c5de5b649e8fa5cbb5b70c97a786ce6ce173df87cdac30806552e,2025-04-23T14:08:13.383000 CVE-2025-31328,0,0,7562727b37bc696206e3437191848ea7fd9fb71483caff96e2687c6513ba8732,2025-04-23T14:08:13.383000 CVE-2025-31330,0,0,9b648c9ab2cbfab0d4ac3a100d1bd1b8fecdcaefd29ce618613bbd2f9e42ddfd,2025-04-08T18:13:53.347000 @@ -290334,6 +290342,7 @@ CVE-2025-3197,0,0,e79e9bde316dbfd1ba7b8b9ac58822adceab867075d18a7670c50494d88176 CVE-2025-3198,0,0,9ea9a8c586fb27cd4141f26bc5f53c6d47512dda4a6f8f32123c47190f49343b,2025-04-07T14:18:15.560000 CVE-2025-3199,0,0,b2c8a0f552e5c66b559702403ed11bd1140ca56173e2c4b53e84f8a9895b6f6e,2025-04-07T14:18:15.560000 CVE-2025-3200,0,0,e6d1aa16add34c820864a3d6c718e90502c6669aab7d22ef7eaf272e8427c425,2025-04-29T13:52:10.697000 +CVE-2025-32011,1,1,9e10662ecff2b59b4586d0b8a8797348e002a7769464c61527a23d38739e310e,2025-05-01T19:15:57.357000 CVE-2025-32012,0,0,b0776b1f52985236e3b0f0ac31e6563e5d0337c072f41a1ff81c3b677d9f11c3,2025-04-16T13:25:59.640000 CVE-2025-32013,0,0,c9fa83fb3b6c11b2eb57b44937dc465050a0a4b58e55a1ffb249ac7249aa9f12,2025-04-08T18:54:07.337000 CVE-2025-32014,0,0,af089ef047d3ce8d7747406914b66a9d22daea2274c66b4c0d88bc73728bf977,2025-04-08T18:14:17.307000 @@ -290877,7 +290886,7 @@ CVE-2025-32730,0,0,44cce1a9327b117b4904f0c237377c22ba67547a2108fe2d846b0c147958e CVE-2025-32743,0,0,22cd88375a4ea091d730f6e11751ffcb7fa9bb31f6c5963a03a37755aa77afd4,2025-04-11T15:39:52.920000 CVE-2025-3275,0,0,21a93c4b8629a3b2ced7ba0d70601ec8bc49832622baa8caefb367590d177cbe,2025-04-21T14:23:45.950000 CVE-2025-32754,0,0,b06e63b88f7bcd6c413b62f3af573f57520ee0eb9275ec793f6c9f8573602933,2025-04-11T15:39:52.920000 -CVE-2025-32755,0,0,175a1fce528510120500c18a22b61bcac85074898c8ecaeea2d8f09f47c3080a,2025-04-11T15:39:52.920000 +CVE-2025-32755,0,1,4ed97f3d3f2e5954631338e5cf4d228679fd49dea435094cd33b8aa004db6792,2025-05-01T19:05:44.990000 CVE-2025-32757,0,0,c640364748c5c666fd6dc8aec9d84948af9deb15cd9711efe75ce6833fb0d8c1,2025-04-11T03:15:13.903000 CVE-2025-32758,0,0,d3608f6f13a9a5b49230d2ebeae393f102196b87b92e834ebddf934752919dc3,2025-04-11T03:15:14.427000 CVE-2025-32759,0,0,4ec2028500fce9598ebd65d94b8913a1d569360cd32f22b47c68102fcbfca47a,2025-04-11T03:15:14.477000 @@ -290980,7 +290989,17 @@ CVE-2025-32870,0,0,9dfaf4968559e46a3335f01151ff3a08e8a477d9c61bda01559d6ee35cfa4 CVE-2025-32871,0,0,0858782c82e95a39be97e7ffdc176ada44bec9377cc23b99d288083a9a1b85e3,2025-04-17T20:21:48.243000 CVE-2025-32872,0,0,a6acd2c4749d25af3a9674e470b92f66756a824f6626eef20d9bf26ef8cf4544,2025-04-17T20:21:48.243000 CVE-2025-3288,0,0,f38b6103c86e4b43a603efa2302f1894dd9c86a56576c13140616463a055f77c,2025-04-08T18:13:53.347000 +CVE-2025-32881,1,1,187ce57fcc198ae3da8054a25a299a0b08e93f90e6e45f695090e32ea7beb895,2025-05-01T20:15:36.350000 +CVE-2025-32882,1,1,7d4220be167788645b2c5d5423feddc180f8a5697e1d3c607028601cf6f5498c,2025-05-01T20:15:36.530000 +CVE-2025-32883,1,1,d10d8b5dc8fa83592876d98aeb3dec6fee6b7753135db4330393274bdef024e7,2025-05-01T20:15:36.820000 +CVE-2025-32884,1,1,766c1431970508c24218c3610a1496b9ab3bb0bc24736c8d1ffa6e252b8dfd15,2025-05-01T20:15:36.977000 +CVE-2025-32885,1,1,ba840610fdbd04089d32e632667fb5509570b8a3d6fa5fd7ecaf8b0958e60d39,2025-05-01T20:15:37.150000 +CVE-2025-32886,1,1,f269813c77176aa46490bf250d6e960d235b16e9e28a21c0e64fd2f7abe7e607,2025-05-01T20:15:37.360000 +CVE-2025-32887,1,1,a4b40d13dc100f98029411c7cd50d75acb6c37f55fbc5659302ea9ce73e5c131,2025-05-01T20:15:37.537000 +CVE-2025-32888,1,1,39f8e92eb73963aeb1d3dd219ee9b7aaea01b1728570aca63f5288583bda23ac,2025-05-01T20:15:37.710000 +CVE-2025-32889,1,1,cf52a77ebf2d5756df7e069c35d468683c23fe48657e14d508cda83e71b927b6,2025-05-01T19:15:57.583000 CVE-2025-3289,0,0,2dce3ef8eb88e8d6d3c6bdcdd7b6d448658ce48e819de5faca8e16dde3fc5df6,2025-04-08T18:13:53.347000 +CVE-2025-32890,1,1,c06a9527ae142b10137fec8d9b523920114f7a4ff7b1ff9909ba27c508000c0c,2025-05-01T19:15:57.750000 CVE-2025-32906,0,0,4ec5f2ca7b9b8ea45c77e5ce5ab48abb3a754736cb55462f85af932adb790b5a,2025-04-15T18:39:27.967000 CVE-2025-32907,0,0,1e86adb6a5d89d4f9bf781229ca64bca81be27db36a8583b08ded3a98fcbc5e9,2025-04-28T11:15:38.037000 CVE-2025-32908,0,0,f80bb7c7aa52de7bec22f93e1f33735c17e76c61d454a4c320c750a2c077bf2f,2025-04-15T18:39:27.967000 @@ -291205,6 +291224,7 @@ CVE-2025-3504,0,0,e34938852a994d8486a6964124908312ffa84f9d81cb15ad06b54d64447d28 CVE-2025-3509,0,0,96ce11e8415b6fa7a6d814b563a660b77be726c43a7ecd1b450b2b36646bd53b,2025-04-21T14:23:45.950000 CVE-2025-3511,0,0,2581a75036be8d737bc9c5afcbd1a9fd25ea23392ab1ff727e244646bbc80fb2,2025-04-29T13:52:28.490000 CVE-2025-3512,0,0,20d5b7a0c651482d59ceef752919a6e419c7dc684bf79b235343ded68357dd77,2025-04-25T18:15:26.103000 +CVE-2025-3517,1,1,9826ec02e67fed395583686801421f1afc5165df66ffc435f0e008a4fb1c8eea,2025-05-01T19:15:58.517000 CVE-2025-3518,0,0,7497563947f75b629887a4413d991889fb74f762947f73f77cc72069a35bed4e,2025-04-24T15:15:58.393000 CVE-2025-3519,0,0,7a1e772e7e1a4f83fd384db353598690580e540b87458701710d69fa7ae08b1c,2025-04-23T14:08:13.383000 CVE-2025-3520,0,0,7c7eeccf15cf970d93a11f89bdf4e7c6995461b0f04fc2e4a054f485b85dec3a,2025-04-21T14:23:45.950000 @@ -291271,8 +291291,10 @@ CVE-2025-3591,0,0,9faf0d8d54afa4d861e787bba12e728bac4244da2f6db382b13f6aac7674e6 CVE-2025-3592,0,0,3766f02a8a9b7546b3744ae601fb2a46406e95eb867e2ef9712274445e3cdb7b,2025-04-15T18:39:27.967000 CVE-2025-3593,0,0,a01f66982e63d1a9077a22fb9d3bb17c3788e9968a5ce8acfaa25734a955883b,2025-04-15T18:39:27.967000 CVE-2025-35965,0,0,4aa642d84377cde687111c4598cf1eaeacbb56cf1c939bfc9602ea66c09fbf1f,2025-04-29T13:52:47.470000 +CVE-2025-35975,1,1,b4b42cf5f6fc280eecf52596e7f2255900f6e7674ca78faf6a1e93cfce44e9d7,2025-05-01T19:15:57.887000 CVE-2025-3598,0,0,70b9a8b9865ad46cd7a5f55390c31e93b9d1bfaea80e4e73f88e90a6585b45a6,2025-04-21T14:23:45.950000 CVE-2025-3599,0,0,67a4f7a0d400377c7240ea79ad684bcff45e8c3341cf587c90e5d0658bca468b,2025-04-30T17:15:50.760000 +CVE-2025-35996,1,1,8b1c884e749cfa5cb350fcd7e410cfea0f71d1ded60cc96f1e319eee810ba9e4,2025-05-01T19:15:58.047000 CVE-2025-3603,0,0,8fc219493265409dea0354ed582a157fa1e4783601045e446f4ea74d7c8f20d5,2025-04-29T13:52:47.470000 CVE-2025-3604,0,0,07d89cc421108391d0d00a1dbe62611cc85596ef2f0a6ad665200edb2fc067bb,2025-04-29T13:52:47.470000 CVE-2025-3606,0,0,9e462a995d1e7019ecb96791362c7ba0b1305419ebea53ce8f14b67c14ed347e,2025-04-29T13:52:28.490000 @@ -291303,6 +291325,8 @@ CVE-2025-3644,0,0,365e9e8433b5ead241ee998456744472d655ba7fae400f15e1f2bacd6b27c7 CVE-2025-3645,0,0,5320ad93e35344910c21a67f764477dae50463a61312eda5cb948a8a0d2e4f5f,2025-04-29T13:52:28.490000 CVE-2025-3647,0,0,d085366814e191fa929649b449c3c94db9fdfb290fac2614b251f62d5616efc9,2025-04-29T13:52:28.490000 CVE-2025-3651,0,0,30e087cb1671b81c1bf0c1d2a4d51e77f706a32948b7aa67dbe7688506dce698,2025-04-17T20:21:48.243000 +CVE-2025-36521,1,1,dfca5fe1691dfa095d039007b00074a23d952edb0d0801f5894352352aa9fd87,2025-05-01T19:15:58.203000 +CVE-2025-36558,1,1,39a1fc5d5fd782a37f8f86ad6e10d93d9bf037dfdbcc30b002152ba3f3b42458,2025-05-01T19:15:58.367000 CVE-2025-3661,0,0,dd52ef0b5adcc429dab993fa8b0a07866db488604856f931ffdf953b111b0450,2025-04-21T14:23:45.950000 CVE-2025-36625,0,0,45de53deee0dce100ce8c109fcd29d898f18f9e0ae3fd1f38ff75bfff7ae47fe,2025-04-21T14:23:45.950000 CVE-2025-3663,0,0,1ce80bfc94e480b50f27d0432deca8fffb2ad8de6b84f90469934d90488bc703,2025-04-16T13:25:37.340000 @@ -291337,7 +291361,7 @@ CVE-2025-3696,0,0,c9ab94df00ff04766cce2561d027119a9032534a917dfd3e05cf8b6ba11c26 CVE-2025-3697,0,0,3b95a7e7cf9a326216d918f39d4c1e90f5f67a925139c5ea0fbe1b56085f8902,2025-04-17T20:22:16.240000 CVE-2025-3698,0,0,3410d174ae31c43abb68f418121b89dca3911c4e48575a9281b05507afa201de,2025-04-23T16:25:56.830000 CVE-2025-3706,0,0,af36967002cae35edc22a037b5e4639098ca61a00f66dc40237f6cb847234a6c,2025-04-29T13:52:10.697000 -CVE-2025-37087,0,0,a32cfc93639cde0565b8ba96aa9e37c7b9002ed2bfbea62267aca86b19c1b098,2025-04-23T14:15:29.167000 +CVE-2025-37087,0,1,20c409449e046fc0b07333a7d65b24c67907255590b88923cb6e09a524d20ee6,2025-05-01T22:15:17.647000 CVE-2025-37088,0,0,71633ca0bded0afe76b62e0125774b335261cca8d10e4cf7c2e40c7ecc23dc6b,2025-04-25T15:15:36.593000 CVE-2025-3723,0,0,ac1a7b432f0687619c826f8821efe42fadb8233c83242ddecb3e153783227b4b,2025-04-17T20:21:48.243000 CVE-2025-3724,0,0,0c27b6d880aca8711a1a2fb00ca494e400bb411c54c3f2d370225b565eac7253,2025-04-17T20:21:48.243000 @@ -291854,6 +291878,14 @@ CVE-2025-4162,0,0,26d7832c6d9aa77cd2e2b0951fcf113f262951d7be491357599a7de418c886 CVE-2025-4163,0,0,aad4a1ee6b85eb4644fef4fe8e99ac7792c23da35a6956ba10144cdbc08b17b3,2025-05-01T12:15:18.027000 CVE-2025-4164,0,0,3dfe497c4c78856107763aebcd4aaf5aae65bdd5e57383a37abe4f04e24a4c52,2025-05-01T12:15:18.410000 CVE-2025-4173,0,0,3de28a010b0b2d8cc56823c163d155455b6be0112efbb76238ef46f7a1adec28,2025-05-01T17:15:51.257000 +CVE-2025-4174,1,1,33d0b435380ee56decb65d6be1ac34fc1f8170dc3f13066a99af01232ee6ed55,2025-05-01T19:15:59.333000 +CVE-2025-4175,1,1,33720f288e4fec17a0d0f1d917210b002e612398f8059818e563208c102ef090,2025-05-01T21:15:54.687000 +CVE-2025-4176,1,1,110b208b24455f94b24f7502f30fe28dbdd59bbe110cf41d91f6c0f8bba6bdc4,2025-05-01T22:15:17.950000 +CVE-2025-4178,1,1,b75d6a34fb7ddc058619357809dc5df6713de2f3f5f21e8b3cef16753b41ee87,2025-05-01T22:15:18.140000 +CVE-2025-4180,1,1,5293a2ceb3f80504c8ad22a6baa1677056c3f16e393647c5422ffe5bf297f483,2025-05-01T22:15:18.313000 +CVE-2025-4181,1,1,40be45ab3fb740c50982802f73ef984bf09982493bbaf98ffeef04f091f14348,2025-05-01T23:15:50.833000 +CVE-2025-4182,1,1,ae28ee6c7991911b96c690ce616ebeb0f6b7d0f8e5eae2449fe58dcdac6c5b43,2025-05-01T23:15:51.023000 +CVE-2025-4183,1,1,478e5a297b942b694e43864ca94074bd5f6e44011ccd463568b2b0b41f065f9e,2025-05-01T23:15:51.197000 CVE-2025-42598,0,0,4c400d87dc34a2b74819c41bbdd48bd1c3da0af3c35841d82c2177d30b1cb5f5,2025-04-29T13:52:10.697000 CVE-2025-42599,0,0,d39e065342929b05f2b0a2b6fd7615d0e3f6e7c2f605fdbeb3b3bb9e83f12d93,2025-04-29T19:46:44.310000 CVE-2025-42600,0,0,a98a7820b508b5a8b0c7d0f0dd6cbaa5b07d1e37b05a983a49eb79024a0cd435,2025-04-23T14:08:13.383000 @@ -291868,6 +291900,7 @@ CVE-2025-43013,0,0,cea29fefbb7874147d20ca0439a948894c9ed92ca59da3ffe37724562ec07 CVE-2025-43014,0,0,8c8e187893b05115834c1fe60888f6689d95da1f55e6603f1b98a0a40089dd30,2025-04-23T16:11:35.837000 CVE-2025-43015,0,0,e1099e2d690e6500afcce9f63f8d90a3ffca94e6d4b413f55df99246e9d63336,2025-04-25T16:30:24.887000 CVE-2025-43016,0,0,f2c72cd86df0dc4f466aff47f20427f717da38e7cfd3bc2cf6bf3e8b276a88fe,2025-04-29T13:52:28.490000 +CVE-2025-43595,1,1,a04d9dd7bfa248d6cf101c368f0cbf03aa9d5d68a7d7a3a12857ccc19ec3aff7,2025-05-01T22:15:17.800000 CVE-2025-43703,0,0,d6625a868be77b8d7893d215165a3a98f3361eec5aed450c8d69ce3a9dfaf391,2025-04-17T20:21:48.243000 CVE-2025-43704,0,0,e4a4f68c1c515be2555ad90b5dc0fde58f5ff1d76445660f48da718ee733becf,2025-04-17T20:21:48.243000 CVE-2025-43708,0,0,d38c003beeae09584e47fb48659652128bc4a5d2c5ae13da147de319358e0588,2025-04-17T20:21:48.243000 @@ -291925,12 +291958,12 @@ CVE-2025-43973,0,0,13dab0fb1f701205cfd9cad27015dccaf756a3a9efa54232fb7a7485989ce CVE-2025-44134,0,0,c0decd3d363f604830285cd961562924fffe823a249ba621863dcb721cf11427,2025-04-29T13:52:47.470000 CVE-2025-44135,0,0,2f14d8cd913bdc3dc0575273f090317f2dea5d37f51e4b759398031eab8adf71,2025-04-29T13:52:47.470000 CVE-2025-44192,0,0,0e6b914c358cef89bb517f9e57f1d6677efa206022db24b681a1e4cb76d949a0,2025-04-30T18:15:47.597000 -CVE-2025-44193,0,0,91a5cb318417103a884a2912f46b12ec35e818055b716ca6861e55fd173a5caa,2025-04-30T18:15:47.707000 -CVE-2025-44194,0,0,dff7b680c6688ba301aeab271fc98975f90e0bc83191be201f37dc2282ff4d18,2025-04-30T18:15:47.823000 -CVE-2025-44835,0,0,b80128ee2e1cf486e65a39b658f0c81679bfdef3e640068d08144ac382814f12,2025-05-01T14:15:45.473000 -CVE-2025-44836,0,0,0f556272ad29dac00674619ab7223afefeee18fe93701f744a1371fd7373ed88,2025-05-01T15:16:20.723000 -CVE-2025-44837,0,0,75fed06ab3313107abccce326425dcd2990c40b9affb423c7010a1efe6681cd2,2025-05-01T15:16:20.837000 -CVE-2025-44838,0,0,e9df1fe717e820dc5f5e79d303394179a18b979f69d756958b95314cdfa584dc,2025-05-01T15:16:20.950000 +CVE-2025-44193,0,1,cc6553d59b4936354ce6714e5ec4bbd5d712472f5848cf10ef791af521402d7d,2025-05-01T19:15:58.680000 +CVE-2025-44194,0,1,9edbbfe6e188eb21a28dae02d04a0b6183c69eddde98778f94855a4c5b4aa77f,2025-05-01T19:15:58.820000 +CVE-2025-44835,0,1,c1165c1eb1801d117f9eed6ceacff32c704b59d4657371fbe19185e500cac9e9,2025-05-01T21:15:52.447000 +CVE-2025-44836,0,1,ddbe5fc5cbfaf914229b1b01bb8385795976f7d1adf5730c260ecb219d2c0797,2025-05-01T21:15:52.607000 +CVE-2025-44837,0,1,1ef9054e661f71a5b152ef0da550360571b79acf8ded19fe4a6a1c11baa630a2,2025-05-01T21:15:52.757000 +CVE-2025-44838,0,1,f667161eead8b0bf2a57bbb83a642db1225c0ced124d0143d392d3d93e0918b9,2025-05-01T21:15:52.907000 CVE-2025-44839,0,0,c9fa27f8e43a1ce3bc41ec4354751aab8c2abe9e746bd42d11de4fd0b3520cc2,2025-05-01T17:15:50.127000 CVE-2025-44840,0,0,79d34e0be9fd0a3c81738e0cac9840dbe8d464abac33c93e307967e6dccce1e2,2025-05-01T17:15:50.253000 CVE-2025-44841,0,0,25d846edd047baa7a9c20758e1e50b7597d67036db9947b577f40cde7b48e277,2025-05-01T17:15:50.360000 @@ -291938,10 +291971,18 @@ CVE-2025-44842,0,0,f7bc8653ba8a1b86bc159263cac51a681e961a965f76cbabbb118199eacdf CVE-2025-44843,0,0,f9284e3141650eae6821b6b6a340682b9ea6c42b46eb6e0c0030b531cce2780f,2025-05-01T17:15:50.583000 CVE-2025-44844,0,0,04d5133a017fc1f0b9b4be69b29980ea568d154e51ece922132983ea15847a8c,2025-05-01T17:15:50.690000 CVE-2025-44845,0,0,1c5d3a6ac11cf9dfe0241f89b6414bad8840ed0b56eadc2b26e2dafdd8d16bdf,2025-05-01T17:15:50.807000 -CVE-2025-44846,0,0,d99b649008d4dfab6f6c897a612bdf2e1900bc3f993a43811e4989c7350ef9f6,2025-05-01T17:15:50.917000 -CVE-2025-44847,0,0,6c5f6fe4511b909e87e78f2527b1c5242cec096c4df519cdfbac874f409e32bb,2025-05-01T17:15:51.037000 +CVE-2025-44846,0,1,37eecb5bf5fa7e503c446cbe5313b7e691794625a9313cafe3b9ca9816d873be,2025-05-01T21:15:53.053000 +CVE-2025-44847,0,1,12c21646845dc4bcdd5d153840d5aa1763fcae72c23a279fb6f75ecc2884f800,2025-05-01T21:15:53.213000 CVE-2025-44848,0,0,adb5353939f1c1fdb0ee441912a23c01efc2520c33e02d8bf61ae1aa816a94e0,2025-05-01T17:15:51.140000 -CVE-2025-44854,0,0,3fadc923e09e91455e8732a3fa358f3f95e691eb6a707846c217057dc0f93709,2025-05-01T14:15:45.593000 +CVE-2025-44854,0,1,e588ca8a113bec1ee42bb2afaa992a78c4e6104539259a1b860390928801f0fb,2025-05-01T21:15:53.367000 +CVE-2025-44860,1,1,e9a2154cc7a1266e0a42bbc0a17823185e18ed68f0650e5fb09c93d005270a1e,2025-05-01T18:15:56.537000 +CVE-2025-44861,1,1,275692e93fe2c16a3dbb05bde66fa7ad3fe8dac1b418db6e2c2b4bc8f44efed6,2025-05-01T21:15:53.530000 +CVE-2025-44862,1,1,190891527af9e76811f465c1b114f7acc2a6e42b3ee4cf65a43a922cd86076bd,2025-05-01T21:15:53.677000 +CVE-2025-44863,1,1,ed6c7c05faeedc1c6cc47469f157f10ae1c815d163e5090e42c7443108984b98,2025-05-01T18:15:56.873000 +CVE-2025-44864,1,1,81a3e5344df5ac7e41114ad7d1697ab40c02ac770f16d24ea7e57175ef5345be,2025-05-01T21:15:53.840000 +CVE-2025-44865,1,1,1b2012a36d343a841fc12af8ed837c91aa1080e26fadb61ba5ac0ee7249fc632,2025-05-01T21:15:54.020000 +CVE-2025-44866,1,1,527d1ff5a65ee012751cb59ce290fe01d0bca21045278dae9f41fdbfd56b7469,2025-05-01T21:15:54.190000 +CVE-2025-44867,1,1,967a350985bc451984deae52f4821539d363bb523096ee7df5f875f88ae1c779,2025-05-01T21:15:54.343000 CVE-2025-45007,0,0,100485181c0bf0632d780c3e19c796fdb1d0c7eb9eb6723940430db4fd763513,2025-04-30T15:16:02.120000 CVE-2025-45009,0,0,d1f9e65fd715088e7d8ce4c1d2f7f07526daf0dbbcc927c133ef061cf8cd27de,2025-04-30T16:15:37.273000 CVE-2025-45010,0,0,1b2f8905795ffc179b858de1af8914665e86713b1f917538f17729f3b5a3bbcc,2025-04-30T16:15:37.617000 @@ -292013,10 +292054,12 @@ CVE-2025-46329,0,0,1d8b0b655c5ee4be78d21cf937cad34a0490b04921710a8a7012c30d06a78 CVE-2025-46330,0,0,51af3999ada150afbbf505b46b013fc8998be7f881a043ebf16b2f9bf195bef4,2025-04-29T13:52:10.697000 CVE-2025-46331,0,0,793e89fd4cc317d2e38229c7e08782b3f496b6f00556e746bec3af72450d966b,2025-04-30T19:15:55.490000 CVE-2025-46333,0,0,4ca215b72a98284b0530b719160d5251f8056ccde380184cb21e0e8b208b2507,2025-04-29T13:52:10.697000 +CVE-2025-46337,1,1,506b96b14e8d711d1e892fd3c48657ffbcf6f3d0220eca2a71fff65ed4b71336,2025-05-01T18:15:57.510000 CVE-2025-46338,0,0,8dd5ab3bf26120dbbf3d57add19341ad71bb2d2b518d4a3f65a5105f8b059051,2025-04-29T13:52:10.697000 CVE-2025-46342,0,0,743df6e5d851509c117755f99755388ba8fd2f50387aa4bdd8188053111505f0,2025-04-30T15:16:02.440000 CVE-2025-46343,0,0,52577a02becc74f566d147c93aa34d1201c2aeb60bd9c6b3587e72786d7cfdf1,2025-04-29T13:52:10.697000 CVE-2025-46344,0,0,0e1bdd0abc274d8b4f72165decf505184fe3cac2027aba198740472c192425dc,2025-04-29T21:15:51.987000 +CVE-2025-46345,1,1,99d528e39af7a45f8422b7e6467b8011453b1e303d5c40b483ceca1a2e71dbc9,2025-05-01T18:15:57.657000 CVE-2025-46346,0,0,efb4a705dea859f4963def5401db351bc3f21e31297583e9052f4256f9c73a74,2025-04-29T18:15:44.570000 CVE-2025-46347,0,0,cb06edc7de7f9bb5de1509e59cff9ca8a65435b351fa5c6baf03122bc5d13953,2025-04-29T19:15:53.650000 CVE-2025-46348,0,0,91b522b743e4fe5635d77be2a9fc5f8cbd948781a366b749212a960d501f2cda,2025-04-30T14:15:29.943000 @@ -292133,6 +292176,11 @@ CVE-2025-46554,0,0,8951f9294471f8c439518c9ee61d5ccbaa7b5c88db97538d578189d04bba4 CVE-2025-46557,0,0,66a19e3c51c2918e94e250f76b024235583c5e21beafe942dd6d9473b7d6bdac,2025-04-30T19:15:55.783000 CVE-2025-46558,0,0,254c1ce23ebac3d4ad4fffd00c469505801264f1836a8ac5a6d81a277cfc1012,2025-04-30T19:15:55.930000 CVE-2025-46560,0,0,2abe4e922ac573be38bde81d641cdbd289da9155f6f595038ac325bfcc6e0ec1,2025-04-30T14:15:30.283000 +CVE-2025-46565,1,1,00ad2a8262402039c85411473e9ae2ed33615323f1aea8470c95e95dae7739d7,2025-05-01T18:15:57.797000 +CVE-2025-46566,1,1,65b7e647bc24b5f27ffde052f2456a4f18d20765a14a3fa925cd07e0a87fb38e,2025-05-01T18:15:57.940000 +CVE-2025-46567,1,1,ad6d1d534bb23b40a2d62843b31df44b2db620fdc15593abecedc7073055cb05,2025-05-01T18:15:58.117000 +CVE-2025-46568,1,1,b5a5f6ef467d7b564509955f087c8fb50748d49bf917c9b7b28a65dc97c304fe,2025-05-01T18:15:58.263000 +CVE-2025-46569,1,1,9060e38202eee51f97b86ace6a82c081f59adbd004977d664c1583d884555869,2025-05-01T20:15:37.887000 CVE-2025-46574,0,0,92478992098cfd3e1c073cf382d77a474f9304fa70a4c0ac8d3d7924ea977234,2025-04-29T13:52:10.697000 CVE-2025-46575,0,0,2f0a5b24310dd6fd0827bf911a3730e65f94967c7a1c701ec5837ae7adf431ee,2025-04-29T13:52:10.697000 CVE-2025-46576,0,0,2a8d4b326347bdc18987acae65447d891b53c21b768c7297f2b5b705e0556ad3,2025-04-29T13:52:10.697000 @@ -292147,7 +292195,18 @@ CVE-2025-46614,0,0,a1f2104588668560a01f61ff5e7e61263dcf0af77c6af3863b6b7e1062879 CVE-2025-46616,0,0,a3467bedc13913153241aada047204661f44b5d0ba1c446ec0cc09c7d5e149d6,2025-04-29T13:52:28.490000 CVE-2025-46617,0,0,a067c3a85663b48a7bac38fc9c3c5761c1c7fcff2b5288d6d48d5707712e1ac2,2025-04-29T13:52:28.490000 CVE-2025-46618,0,0,c3b67f9c650592ec3402578e92b748c7bba440b755336274cfea73fc21e2f82e,2025-04-29T13:52:28.490000 -CVE-2025-46619,0,0,a67ba64d7b51790c0d9301e231ba9ed8f7e0f4bddd49c9a31d3a0a6481f1a6ba,2025-04-30T18:15:48.220000 +CVE-2025-46619,0,1,dd1c382aabfdd527af7c7e2ec142cf3d98f645750dc53b265273ca769dccbcb8,2025-05-01T19:15:59.040000 +CVE-2025-46625,1,1,c27976e5c89a2e0741ed6716b69dc399611ef5ff195a024129b4b01fadc2d111,2025-05-01T21:15:54.527000 +CVE-2025-46626,1,1,a1ae835e78b4b2f73b1c45d3109d7daafb76f527be33f99b227316178079bd52,2025-05-01T20:15:38.190000 +CVE-2025-46627,1,1,f7633d744408a0032c1e7f066d4c5f6fcfa24dd6d8ea2888cb4b94e2c9da098e,2025-05-01T20:15:38.350000 +CVE-2025-46628,1,1,00044c6f1fee94ee415f859c793e9f900e9e265512d1ccff2e3a45c6272e5510,2025-05-01T20:15:38.510000 +CVE-2025-46629,1,1,f80f4719c353cb51db43d7255a5a90058005c3217a0834f416499bca62db13c8,2025-05-01T20:15:38.660000 +CVE-2025-46630,1,1,d2ac00428f549e19cb82bd2f817817ebbe5f2481e1ad269a7b80798f174764dd,2025-05-01T20:15:38.803000 +CVE-2025-46631,1,1,b610eda2f10bbca999e3c734fb84ccaa74fc712c5971875a1690a41ef85fd3e8,2025-05-01T20:15:39.010000 +CVE-2025-46632,1,1,338a529aa8f8ad752436c4236dc10b678c7d70d976fc13f9deac4bd02b817254,2025-05-01T20:15:39.167000 +CVE-2025-46633,1,1,60ba997791653d087a7b488b7c17032485265a86a67039301dfdbb9b18968cb1,2025-05-01T20:15:39.310000 +CVE-2025-46634,1,1,1830d4ef26007610e8c83b054decd36cf18ab73e1fff4eebc3f88ff02858c431,2025-05-01T20:15:39.460000 +CVE-2025-46635,1,1,57f567d4697d52205f46c4d0ec7c13a3a4fda51d914b42ec8683680f32aadb67,2025-05-01T20:15:39.600000 CVE-2025-46646,0,0,777aacedd29eb87d2f3d4179421a3b07a825895319bd1804480c003b4bbcf895,2025-04-29T13:52:10.697000 CVE-2025-46652,0,0,9d812ecaad689bd29eeb08cd6e51fc2313308ed71660c22dce020d578677f79a,2025-04-29T13:52:10.697000 CVE-2025-46653,0,0,3b6009fc3a51ec55453aaec5d1f7a19d2114d1ff8e2f811535a6f418b5dab168,2025-04-29T16:15:37.150000 @@ -292178,5 +292237,5 @@ CVE-2025-46779,0,0,37c24e5b7e4a0045a4d100f0b48f14bc24b2b68a67fe538c22d10ef701f0d CVE-2025-46780,0,0,5993d506455854cf118c6763aa0e87cfcb5c499499a4d09b9c1fb1cc0884d3f3,2025-04-30T03:15:19.307000 CVE-2025-46781,0,0,e7fe47a74e2ae94a42cb82d6842951a5dd9286ffd4d5d353415d63928d0e29b9,2025-04-30T03:15:19.367000 CVE-2025-46782,0,0,190c817e4f3c09faf97df326ed9cdbea1555cc1850d161b9d9da454d08c1d46e,2025-04-30T03:15:19.430000 -CVE-2025-47153,0,0,f0c250de648eee6c3edaee13377f5db8fda6f5bd0ad134391a657cda076338ba,2025-05-01T08:15:17.807000 +CVE-2025-47153,0,1,340bdf52a7558d551cebe545c694445e21811ea84f0ea1c4145665270ca6cb19,2025-05-01T18:15:58.410000 CVE-2025-47154,0,0,f90b1200d60c0b4452319cbe4d71613e51b0f8408cb5386aa1603f9f93278411,2025-05-01T16:15:27.077000