diff --git a/CVE-2012/CVE-2012-60xx/CVE-2012-6068.json b/CVE-2012/CVE-2012-60xx/CVE-2012-6068.json index b3f71396c87..d3336452382 100644 --- a/CVE-2012/CVE-2012-60xx/CVE-2012-6068.json +++ b/CVE-2012/CVE-2012-60xx/CVE-2012-6068.json @@ -2,13 +2,13 @@ "id": "CVE-2012-6068", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2013-01-21T21:55:01.103", - "lastModified": "2025-04-11T00:51:21.963", + "lastModified": "2025-07-02T20:15:28.747", "vulnStatus": "Deferred", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "The Runtime Toolkit in CODESYS Runtime System 2.3.x and 2.4.x does not require authentication, which allows remote attackers to (1) execute commands via the command-line interface in the TCP listener service or (2) transfer files via requests to the TCP listener service." + "value": "The Runtime Toolkit in CODESYS Runtime System 2.3.x and 2.4.x does not require authentication, which allows remote attackers to execute commands via the command-line interface in the TCP listener service or transfer files via requests to the TCP listener service." }, { "lang": "es", @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,8 +66,18 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "ics-cert@hq.dhs.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", "description": [ { "lang": "en", @@ -102,13 +134,6 @@ } ], "references": [ - { - "url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-084-01", - "source": "ics-cert@hq.dhs.gov", - "tags": [ - "US Government Resource" - ] - }, { "url": "http://www.codesys.com/news-events/press-releases/detail/article/sicherheitsluecke-in-codesys-v23-laufzeitsystem.html", "source": "ics-cert@hq.dhs.gov", @@ -121,11 +146,16 @@ "source": "ics-cert@hq.dhs.gov" }, { - "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-01.pdf", - "source": "ics-cert@hq.dhs.gov", - "tags": [ - "US Government Resource" - ] + "url": "https://us.codesys.com/ecosystem/security/", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-13-011-01", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-14-084-01", + "source": "ics-cert@hq.dhs.gov" }, { "url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-084-01", diff --git a/CVE-2012/CVE-2012-60xx/CVE-2012-6069.json b/CVE-2012/CVE-2012-60xx/CVE-2012-6069.json index 286d58ee99e..eece64cb44b 100644 --- a/CVE-2012/CVE-2012-60xx/CVE-2012-6069.json +++ b/CVE-2012/CVE-2012-60xx/CVE-2012-6069.json @@ -2,13 +2,13 @@ "id": "CVE-2012-6069", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2013-01-21T21:55:01.150", - "lastModified": "2025-04-11T00:51:21.963", + "lastModified": "2025-07-02T21:15:39.193", "vulnStatus": "Deferred", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Directory traversal vulnerability in the Runtime Toolkit in CODESYS Runtime System 2.3.x and 2.4.x allows remote attackers to read, overwrite, or create arbitrary files via a .. (dot dot) in a request to the TCP listener service." + "value": "The CoDeSys Runtime Toolkit\u2019s file transfer functionality does not \nperform input validation, which allows an attacker to access files and \ndirectories outside the intended scope. This may allow an attacker to \nupload and download any file on the device. This could allow the \nattacker to affect the availability, integrity, and confidentiality of \nthe device." }, { "lang": "es", @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 10.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,8 +66,18 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "ics-cert@hq.dhs.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-23" + } + ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", "description": [ { "lang": "en", @@ -102,13 +134,6 @@ } ], "references": [ - { - "url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-084-01", - "source": "ics-cert@hq.dhs.gov", - "tags": [ - "US Government Resource" - ] - }, { "url": "http://www.codesys.com/news-events/press-releases/detail/article/sicherheitsluecke-in-codesys-v23-laufzeitsystem.html", "source": "ics-cert@hq.dhs.gov", @@ -121,15 +146,16 @@ "source": "ics-cert@hq.dhs.gov" }, { - "url": "http://www.securityfocus.com/bid/56300", + "url": "https://us.codesys.com/ecosystem/security/", "source": "ics-cert@hq.dhs.gov" }, { - "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-01.pdf", - "source": "ics-cert@hq.dhs.gov", - "tags": [ - "US Government Resource" - ] + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-13-011-01", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-14-084-01", + "source": "ics-cert@hq.dhs.gov" }, { "url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-084-01", diff --git a/CVE-2014/CVE-2014-07xx/CVE-2014-0760.json b/CVE-2014/CVE-2014-07xx/CVE-2014-0760.json index c35ec74ba87..56f8f026cbc 100644 --- a/CVE-2014/CVE-2014-07xx/CVE-2014-0760.json +++ b/CVE-2014/CVE-2014-07xx/CVE-2014-0760.json @@ -2,13 +2,13 @@ "id": "CVE-2014-0760", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2014-04-25T05:12:07.693", - "lastModified": "2025-04-12T10:46:40.837", + "lastModified": "2025-07-02T21:15:39.710", "vulnStatus": "Deferred", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "The Festo CECX-X-C1 Modular Master Controller with CoDeSys and CECX-X-M1 Modular Controller with CoDeSys and SoftMotion provide an undocumented access method involving the FTP protocol, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors." + "value": "The Festo CECX-X-C1 Modular Master Controller with CoDeSys and CECX-X-M1\n Modular Controller with CoDeSys and SoftMotion provide an undocumented \naccess method involving the FTP protocol, which could allow a remote attacker to execute arbitrary code or cause a denial of service (application \ncrash) via unspecified vectors." }, { "lang": "es", @@ -17,6 +17,29 @@ ], "metrics": { "cvssMetricV2": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, + "accessVector": "NETWORK", + "accessComplexity": "MEDIUM", + "authentication": "NONE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.6, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + }, { "source": "nvd@nist.gov", "type": "Primary", @@ -44,7 +67,7 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "ics-cert@hq.dhs.gov", "type": "Primary", "description": [ { @@ -52,6 +75,16 @@ "value": "CWE-287" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], "configurations": [ @@ -112,11 +145,8 @@ ], "references": [ { - "url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-084-01", - "source": "ics-cert@hq.dhs.gov", - "tags": [ - "US Government Resource" - ] + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-14-084-01", + "source": "ics-cert@hq.dhs.gov" }, { "url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-084-01", diff --git a/CVE-2014/CVE-2014-07xx/CVE-2014-0769.json b/CVE-2014/CVE-2014-07xx/CVE-2014-0769.json index c70816335cf..554f14fa09d 100644 --- a/CVE-2014/CVE-2014-07xx/CVE-2014-0769.json +++ b/CVE-2014/CVE-2014-07xx/CVE-2014-0769.json @@ -2,7 +2,7 @@ "id": "CVE-2014-0769", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2014-04-25T05:12:07.753", - "lastModified": "2025-04-12T10:46:40.837", + "lastModified": "2025-07-02T21:15:39.930", "vulnStatus": "Deferred", "cveTags": [], "descriptions": [ @@ -17,6 +17,29 @@ ], "metrics": { "cvssMetricV2": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, + "accessVector": "NETWORK", + "accessComplexity": "MEDIUM", + "authentication": "NONE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.6, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + }, { "source": "nvd@nist.gov", "type": "Primary", @@ -44,7 +67,7 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "ics-cert@hq.dhs.gov", "type": "Primary", "description": [ { @@ -52,6 +75,16 @@ "value": "CWE-287" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], "configurations": [ @@ -112,11 +145,8 @@ ], "references": [ { - "url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-084-01", - "source": "ics-cert@hq.dhs.gov", - "tags": [ - "US Government Resource" - ] + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-14-084-01", + "source": "ics-cert@hq.dhs.gov" }, { "url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-084-01", diff --git a/CVE-2022/CVE-2022-316xx/CVE-2022-31631.json b/CVE-2022/CVE-2022-316xx/CVE-2022-31631.json index 3c7b1581dee..9f8b38be7ed 100644 --- a/CVE-2022/CVE-2022-316xx/CVE-2022-31631.json +++ b/CVE-2022/CVE-2022-316xx/CVE-2022-31631.json @@ -2,8 +2,8 @@ "id": "CVE-2022-31631", "sourceIdentifier": "security@php.net", "published": "2025-02-12T22:15:29.007", - "lastModified": "2025-02-13T16:15:35.670", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-02T21:35:56.150", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,73 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndExcluding": "8.0.27", + "matchCriteriaId": "B25DE957-1D86-408D-AD1E-DBFB14115959" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.1.0", + "versionEndExcluding": "8.1.15", + "matchCriteriaId": "AF93F09C-C6A3-49AF-9202-0EC78065547D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.2.0", + "versionEndExcluding": "8.2.2", + "matchCriteriaId": "E87D2720-F21F-4FDE-A262-B8BA0B62AD98" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.39.2", + "matchCriteriaId": "46D17F35-DB4A-491C-BB28-4BFA36F3618F" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugs.php.net/bug.php?id=81740", - "source": "security@php.net" + "source": "security@php.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20230223-0007/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugs.php.net/bug.php?id=81740", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4104.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4104.json index 35a3e9e9efb..3012606a9e2 100644 --- a/CVE-2023/CVE-2023-41xx/CVE-2023-4104.json +++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4104.json @@ -2,13 +2,13 @@ "id": "CVE-2023-4104", "sourceIdentifier": "security@mozilla.org", "published": "2023-09-11T09:15:08.997", - "lastModified": "2024-11-21T08:34:24.063", + "lastModified": "2025-07-02T21:15:40.210", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "An invalid Polkit Authentication check and missing authentication requirements for D-Bus methods allowed any local user to configure arbitrary VPN setups.\n*This bug only affects Mozilla VPN on Linux. Other operating systems are unaffected.* This vulnerability affects Mozilla VPN client for Linux < v2.16.1." + "value": "An invalid Polkit Authentication check and missing authentication requirements for D-Bus methods allowed any local user to configure arbitrary VPN setups.\n*This bug only affects Mozilla VPN on Linux. Other operating systems are unaffected.* This vulnerability affects Mozilla VPN 2.16.1 < (Linux)." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12255.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12255.json index 558611394e7..86981322207 100644 --- a/CVE-2024/CVE-2024-122xx/CVE-2024-12255.json +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12255.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12255", "sourceIdentifier": "security@wordfence.com", "published": "2024-12-12T06:15:23.770", - "lastModified": "2024-12-12T15:15:09.967", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-02T20:06:31.637", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,14 +61,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zealousweb:accept_stripe_payments_using_contact_form_7:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.6", + "matchCriteriaId": "5FB207CC-EA49-4814-A6B7-6B2139F78983" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3205295%40accept-stripe-payments-using-contact-form-7&new=3205295%40accept-stripe-payments-using-contact-form-7&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8a9e1325-1027-41ea-93be-c321aef61dea?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-316xx/CVE-2024-31669.json b/CVE-2024/CVE-2024-316xx/CVE-2024-31669.json index cf810beb79a..7c17da01c31 100644 --- a/CVE-2024/CVE-2024-316xx/CVE-2024-31669.json +++ b/CVE-2024/CVE-2024-316xx/CVE-2024-31669.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31669", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-02T15:15:11.113", - "lastModified": "2024-12-03T16:15:21.540", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-02T20:36:02.780", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rizin:rizin:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.6.3", + "matchCriteriaId": "3A764AB8-1CB6-4DE6-A77B-8CF31D3DD3CB" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Crispy-fried-chicken/fb9f7000f0517a085483f7f2a60f0f08", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/rizinorg/rizin/commit/e42999dda0be7737fafaf5e63c1c5833a72fd9c9", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-316xx/CVE-2024-31670.json b/CVE-2024/CVE-2024-316xx/CVE-2024-31670.json index 98b2570b345..d6aa9f4494b 100644 --- a/CVE-2024/CVE-2024-316xx/CVE-2024-31670.json +++ b/CVE-2024/CVE-2024-316xx/CVE-2024-31670.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31670", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-12T18:15:23.977", - "lastModified": "2024-12-13T18:15:20.167", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-02T20:05:47.947", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rizin:rizin:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.6.3", + "matchCriteriaId": "3A764AB8-1CB6-4DE6-A77B-8CF31D3DD3CB" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/rizinorg/rizin/commit/75bac3088b2ec173e22d4be9d525ceacc987cf02", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-366xx/CVE-2024-36621.json b/CVE-2024/CVE-2024-366xx/CVE-2024-36621.json index 68299bbb388..2675006feaa 100644 --- a/CVE-2024/CVE-2024-366xx/CVE-2024-36621.json +++ b/CVE-2024/CVE-2024-366xx/CVE-2024-36621.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36621", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-29T18:15:07.993", - "lastModified": "2024-12-04T17:15:13.067", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-02T20:43:30.047", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mobyproject:moby:25.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "4B150E78-BD5F-48FA-BE6E-9643C1E67697" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/1047524396/5d44459edab5fafcdf86b43909b81135", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/moby/moby/blob/v25.0.5/builder/builder-next/adapters/snapshot/layer.go#L24", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/moby/moby/commit/37545cc644344dcb576cba67eb7b6f51a463d31e", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-366xx/CVE-2024-36622.json b/CVE-2024/CVE-2024-366xx/CVE-2024-36622.json index b878079b955..ecc682080f7 100644 --- a/CVE-2024/CVE-2024-366xx/CVE-2024-36622.json +++ b/CVE-2024/CVE-2024-366xx/CVE-2024-36622.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36622", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-29T18:15:08.140", - "lastModified": "2024-12-03T16:15:22.343", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-02T20:41:55.433", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:raspap:raspap-webgui:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.0.9", + "matchCriteriaId": "1B31EF76-BC27-41BE-B3D4-2D4F7DA0429E" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/1047524396/ab997b902ec892e592a0df93f38e6941", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/RaspAP/raspap-webgui/blob/3.0.9/ajax/logging/clearlog.php", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/raspap/raspap-webgui/commit/c98d2b0c15942b4829d31dec615b9b40cc6faa14#diff-939ee414d82245c3b3dd7d36b57f10706e06e8f0871b24bdcf9de6e0d181c4c9", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-366xx/CVE-2024-36623.json b/CVE-2024/CVE-2024-366xx/CVE-2024-36623.json index 686abec3d69..1230bb86f41 100644 --- a/CVE-2024/CVE-2024-366xx/CVE-2024-36623.json +++ b/CVE-2024/CVE-2024-366xx/CVE-2024-36623.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36623", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-29T18:15:08.293", - "lastModified": "2025-05-01T14:15:35.340", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-02T20:36:45.220", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mobyproject:moby:*:*:*:*:*:*:*:*", + "versionEndIncluding": "25.0.3", + "matchCriteriaId": "DF0603C7-4015-4481-96C0-04FA1AD21DA6" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/1047524396/c192c0159a19bf58a4373b696467dc29", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/moby/moby/blob/v25.0.3/pkg/streamformatter/streamformatter.go#L115", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/moby/moby/commit/5689dabfb357b673abdb4391eef426f297d7d1bb", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/moby/moby/commit/8e3bcf19748838b30e34d612832d1dc9d90363b8", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37377.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37377.json index 815256965fd..76f98f28c21 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37377.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37377.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37377", "sourceIdentifier": "support@hackerone.com", "published": "2024-12-12T01:55:19.320", - "lastModified": "2024-12-12T15:15:13.500", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-02T20:26:04.183", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,107 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:*:*:*:*:*:*:*:*", + "versionEndExcluding": "22.7", + "matchCriteriaId": "201EB882-0B2A-47DB-B517-1E72A0542B27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:-:*:*:*:*:*:*", + "matchCriteriaId": "F788F6D9-5368-4B8E-BFA0-E8FB3CDADB01" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1:*:*:*:*:*:*", + "matchCriteriaId": "2927A40D-E8A3-4DB6-9C93-04A6C6035C3D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.1:*:*:*:*:*:*", + "matchCriteriaId": "1399BBB4-E62B-4FF6-B9E3-6AAC68D4D583" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.2:*:*:*:*:*:*", + "matchCriteriaId": "1EAD1423-4477-4C35-BF93-697A2C0697C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.3:*:*:*:*:*:*", + "matchCriteriaId": "858353BC-12CB-4014-BFCA-DA7B1B3DD4B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.4:*:*:*:*:*:*", + "matchCriteriaId": "865F72BF-57B2-4B0C-BACE-3500E0AE6751" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.5:*:*:*:*:*:*", + "matchCriteriaId": "39E11407-E0C0-454F-B731-7DA4CBC696EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2:*:*:*:*:*:*", + "matchCriteriaId": "247E71F8-A03B-4097-B7BF-09F8BF3ED4D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.1:*:*:*:*:*:*", + "matchCriteriaId": "E0059C69-4A18-4153-9D9A-5C1B03AD1453" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.2:*:*:*:*:*:*", + "matchCriteriaId": "FC523C88-115E-4CD9-A8CB-AE6E6610F7D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.3:*:*:*:*:*:*", + "matchCriteriaId": "3447428E-DBCD-4553-B51D-AC08ECAFD881" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:*:*:*:*:*:*:*:*", + "versionEndExcluding": "22.7", + "matchCriteriaId": "FAD0FC91-CA1E-4DC3-A37E-1BF98906D07C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:22.7:-:*:*:*:*:*:*", + "matchCriteriaId": "1F22B988-2585-4853-9838-AB3746C8B888" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:22.7:r1:*:*:*:*:*:*", + "matchCriteriaId": "FD9BE8C2-43EB-4870-A4B7-267CB17A19F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:22.7:r1.1:*:*:*:*:*:*", + "matchCriteriaId": "C8915BB2-C1C0-4189-A847-DDB2EF161D62" + } + ] + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/December-2024-Security-Advisory-Ivanti-Connect-Secure-ICS-and-Ivanti-Policy-Secure-IPS-Multiple-CVEs", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-374xx/CVE-2024-37401.json b/CVE-2024/CVE-2024-374xx/CVE-2024-37401.json index 035c9e29835..229b2bc79c3 100644 --- a/CVE-2024/CVE-2024-374xx/CVE-2024-37401.json +++ b/CVE-2024/CVE-2024-374xx/CVE-2024-37401.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37401", "sourceIdentifier": "support@hackerone.com", "published": "2024-12-12T01:55:20.820", - "lastModified": "2024-12-12T15:15:13.877", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-02T20:07:12.820", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,107 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:*:-:*:*:*:*:*:*", + "versionEndExcluding": "22.7", + "matchCriteriaId": "A0EC2FCD-5402-4269-B86A-18F8DFB8F2C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:-:*:*:*:*:*:*", + "matchCriteriaId": "F788F6D9-5368-4B8E-BFA0-E8FB3CDADB01" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1:*:*:*:*:*:*", + "matchCriteriaId": "2927A40D-E8A3-4DB6-9C93-04A6C6035C3D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.1:*:*:*:*:*:*", + "matchCriteriaId": "1399BBB4-E62B-4FF6-B9E3-6AAC68D4D583" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.2:*:*:*:*:*:*", + "matchCriteriaId": "1EAD1423-4477-4C35-BF93-697A2C0697C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.3:*:*:*:*:*:*", + "matchCriteriaId": "858353BC-12CB-4014-BFCA-DA7B1B3DD4B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.4:*:*:*:*:*:*", + "matchCriteriaId": "865F72BF-57B2-4B0C-BACE-3500E0AE6751" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.5:*:*:*:*:*:*", + "matchCriteriaId": "39E11407-E0C0-454F-B731-7DA4CBC696EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2:*:*:*:*:*:*", + "matchCriteriaId": "247E71F8-A03B-4097-B7BF-09F8BF3ED4D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.1:*:*:*:*:*:*", + "matchCriteriaId": "E0059C69-4A18-4153-9D9A-5C1B03AD1453" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.2:*:*:*:*:*:*", + "matchCriteriaId": "FC523C88-115E-4CD9-A8CB-AE6E6610F7D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.3:*:*:*:*:*:*", + "matchCriteriaId": "3447428E-DBCD-4553-B51D-AC08ECAFD881" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:*:*:*:*:*:*:*:*", + "versionEndExcluding": "22.7", + "matchCriteriaId": "FAD0FC91-CA1E-4DC3-A37E-1BF98906D07C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:22.7:-:*:*:*:*:*:*", + "matchCriteriaId": "1F22B988-2585-4853-9838-AB3746C8B888" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:22.7:r1:*:*:*:*:*:*", + "matchCriteriaId": "FD9BE8C2-43EB-4870-A4B7-267CB17A19F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:22.7:r1.1:*:*:*:*:*:*", + "matchCriteriaId": "C8915BB2-C1C0-4189-A847-DDB2EF161D62" + } + ] + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/December-2024-Security-Advisory-Ivanti-Connect-Secure-ICS-and-Ivanti-Policy-Secure-IPS-Multiple-CVEs", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45206.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45206.json index b7874d773f5..35b4c80a23d 100644 --- a/CVE-2024/CVE-2024-452xx/CVE-2024-45206.json +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45206.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45206", "sourceIdentifier": "support@hackerone.com", "published": "2024-12-04T02:15:05.427", - "lastModified": "2025-03-13T19:15:48.013", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-02T20:34:43.323", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:veeam:veeam_service_provider_console:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0.12777", + "versionEndExcluding": "8.1.0.21377", + "matchCriteriaId": "50FFBB24-D779-42F4-8874-3905AA3ABF75" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.veeam.com/kb4649", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45207.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45207.json index 5df69a94571..de67e4236ea 100644 --- a/CVE-2024/CVE-2024-452xx/CVE-2024-45207.json +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45207.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45207", "sourceIdentifier": "support@hackerone.com", "published": "2024-12-04T02:15:05.520", - "lastModified": "2024-12-04T16:15:25.580", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-02T20:29:56.867", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:veeam:veeam_agent_for_windows:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.0.0.959", + "versionEndExcluding": "6.3.0.177", + "matchCriteriaId": "71DBFD55-CF57-4184-8BC4-4DFEFAC31880" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.veeam.com/kb4693", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45497.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45497.json index e403c891068..ca02f56e29e 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45497.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45497.json @@ -2,7 +2,7 @@ "id": "CVE-2024-45497", "sourceIdentifier": "secalert@redhat.com", "published": "2024-12-31T03:15:05.543", - "lastModified": "2025-07-02T09:15:23.290", + "lastModified": "2025-07-02T20:15:29.150", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -56,6 +56,10 @@ "url": "https://access.redhat.com/errata/RHSA-2025:9269", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:9759", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/errata/RHSA-2025:9765", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50699.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50699.json index 1406e6df0c7..b633cae0888 100644 --- a/CVE-2024/CVE-2024-506xx/CVE-2024-50699.json +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50699.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50699", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-10T19:15:30.193", - "lastModified": "2024-12-11T16:15:12.720", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-02T20:28:26.957", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,104 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tp-link:tl-wr845n_firmware:190219:*:*:*:*:*:*:*", + "matchCriteriaId": "735CFB5E-C8B3-4BC5-87A7-97F36A432D9C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tp-link:tl-wr845n:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3A9ADE93-33FC-43D4-BC86-042B4D6D48A5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tp-link:tl-wr845n_firmware:200909:*:*:*:*:*:*:*", + "matchCriteriaId": "0D942522-2F2B-4CDB-BDC7-23F9BBDAD844" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tp-link:tl-wr845n:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3A9ADE93-33FC-43D4-BC86-042B4D6D48A5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tp-link:tl-wr845n_firmware:201214:*:*:*:*:*:*:*", + "matchCriteriaId": "1D59784C-71BA-4212-8141-04EE7D675F4B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tp-link:tl-wr845n:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3A9ADE93-33FC-43D4-BC86-042B4D6D48A5" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.iiita.ac.in/iot/password-reset-missing-tplink.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://security.iiita.ac.in/iot/base64-authorization.docx", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8929.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8929.json index 7fb86585069..8ce317c6b55 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8929.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8929.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8929", "sourceIdentifier": "security@php.net", "published": "2024-11-22T07:15:03.447", - "lastModified": "2025-01-10T13:15:10.460", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-02T20:11:20.063", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -55,14 +55,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.1.0", + "versionEndExcluding": "8.1.31", + "matchCriteriaId": "CE6E1B68-3EB9-4C67-97A6-226EA02CC2EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.2.0", + "versionEndExcluding": "8.2.26", + "matchCriteriaId": "C160D91A-CF97-4DD1-A34F-8B8C852B3CEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.3.0", + "versionEndExcluding": "8.3.14", + "matchCriteriaId": "35B1BA7F-0EAE-4F40-ACA4-EBC5D63F609A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/php/php-src/security/advisories/GHSA-h35g-vwh6-m678", - "source": "security@php.net" + "source": "security@php.net", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20250110-0008/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8932.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8932.json index 31a3ed78161..a2af212404e 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8932.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8932.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8932", "sourceIdentifier": "security@php.net", "published": "2024-11-22T06:15:20.197", - "lastModified": "2025-01-10T13:15:10.617", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-02T20:08:35.010", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,68 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.1.0", + "versionEndExcluding": "8.1.31", + "matchCriteriaId": "CE6E1B68-3EB9-4C67-97A6-226EA02CC2EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.2.0", + "versionEndExcluding": "8.2.26", + "matchCriteriaId": "C160D91A-CF97-4DD1-A34F-8B8C852B3CEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.3.0", + "versionEndExcluding": "8.3.14", + "matchCriteriaId": "35B1BA7F-0EAE-4F40-ACA4-EBC5D63F609A" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:*", + "matchCriteriaId": "A20333EE-4C13-426E-8B54-D78679D5DDB8" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/php/php-src/security/advisories/GHSA-g665-fm4p-vhff", - "source": "security@php.net" + "source": "security@php.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20250110-0009/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-00xx/CVE-2025-0073.json b/CVE-2025/CVE-2025-00xx/CVE-2025-0073.json index 5d99427a123..2a66cc55735 100644 --- a/CVE-2025/CVE-2025-00xx/CVE-2025-0073.json +++ b/CVE-2025/CVE-2025-00xx/CVE-2025-0073.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0073", "sourceIdentifier": "arm-security@arm.com", "published": "2025-06-02T11:15:21.067", - "lastModified": "2025-06-02T17:32:17.397", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-02T21:18:03.963", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,35 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arm:5th_gen_gpu_architecture_kernel_driver:r53p0:*:*:*:*:*:*:*", + "matchCriteriaId": "286DD633-0184-413A-A39A-58CE2D469712" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arm:valhall_gpu_kernel_driver:r53p0:*:*:*:*:*:*:*", + "matchCriteriaId": "C77780C0-FA5F-4859-B983-4ECCF1098BCA" + } + ] + } + ] + } + ], "references": [ { "url": "https://developer.arm.com/documentation/110466/latest/", - "source": "arm-security@arm.com" + "source": "arm-security@arm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-08xx/CVE-2025-0819.json b/CVE-2025/CVE-2025-08xx/CVE-2025-0819.json index 3fbb5f7448a..7a8ee4a791e 100644 --- a/CVE-2025/CVE-2025-08xx/CVE-2025-0819.json +++ b/CVE-2025/CVE-2025-08xx/CVE-2025-0819.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0819", "sourceIdentifier": "arm-security@arm.com", "published": "2025-06-02T11:15:21.707", - "lastModified": "2025-06-02T17:32:17.397", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-02T21:18:07.187", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arm:5th_gen_gpu_architecture_kernel_driver:*:*:*:*:*:*:*:*", + "versionStartIncluding": "r44p0", + "versionEndExcluding": "r49p4", + "matchCriteriaId": "9996F189-E9B8-445E-82EF-962B28E20E1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arm:5th_gen_gpu_architecture_kernel_driver:*:*:*:*:*:*:*:*", + "versionStartIncluding": "r50p0", + "versionEndExcluding": "r54p1", + "matchCriteriaId": "34E4A755-7DA1-41CE-AE08-48F73DC7C88F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arm:bifrost_gpu_kernel_driver:*:*:*:*:*:*:*:*", + "versionStartIncluding": "r44p0", + "versionEndExcluding": "r49p4", + "matchCriteriaId": "CD001086-9219-45A4-886B-CB5491313F02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arm:bifrost_gpu_kernel_driver:r50p0:*:*:*:*:*:*:*", + "matchCriteriaId": "CFA42E01-84F9-40CE-A03A-EDB148B1D6DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arm:bifrost_gpu_kernel_driver:r51p0:*:*:*:*:*:*:*", + "matchCriteriaId": "8EFE8BA5-EE63-486C-A660-5C4D3D4D223E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arm:valhall_gpu_kernel_driver:*:*:*:*:*:*:*:*", + "versionStartIncluding": "r44p0", + "versionEndExcluding": "r49p4", + "matchCriteriaId": "F02BF9D9-AA49-4478-8772-AF907AC21CFA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arm:valhall_gpu_kernel_driver:*:*:*:*:*:*:*:*", + "versionStartIncluding": "r50p0", + "versionEndExcluding": "r54p1", + "matchCriteriaId": "F1518C84-7FFE-4AC8-8335-FC4804E0FBA6" + } + ] + } + ] + } + ], "references": [ { "url": "https://developer.arm.com/documentation/110466/latest/", - "source": "arm-security@arm.com" + "source": "arm-security@arm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1246.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1246.json index 6a0a5fdbd97..3d7b06a46b8 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1246.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1246.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1246", "sourceIdentifier": "arm-security@arm.com", "published": "2025-06-02T11:15:21.823", - "lastModified": "2025-06-02T17:32:17.397", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-02T21:27:05.870", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arm:5th_gen_gpu_architecture_userspace_driver:*:*:*:*:*:*:*:*", + "versionStartIncluding": "r41p0", + "versionEndExcluding": "r49p4", + "matchCriteriaId": "D15CAA8C-B125-4DD5-88DD-BD39D18F1EFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arm:5th_gen_gpu_architecture_userspace_driver:*:*:*:*:*:*:*:*", + "versionStartIncluding": "r50p0", + "versionEndExcluding": "r54p1", + "matchCriteriaId": "04ADA3A4-C98B-4BDA-8838-F742CAAE7F3C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arm:bifrost_gpu_userspace_driver:*:*:*:*:*:*:*:*", + "versionStartIncluding": "r48p0", + "versionEndExcluding": "r49p4", + "matchCriteriaId": "30D58642-28C3-4BAA-B90B-0FCDE8768578" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arm:bifrost_gpu_userspace_driver:r50p0:*:*:*:*:*:*:*", + "matchCriteriaId": "A63C1ACA-E608-4B65-BBA5-4637C3E4C662" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arm:bifrost_gpu_userspace_driver:r51p0:*:*:*:*:*:*:*", + "matchCriteriaId": "B8F7B1DC-0CA1-4F5E-B150-7864A88C6592" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arm:valhall_gpu_userspace_driver:*:*:*:*:*:*:*:*", + "versionStartIncluding": "r28p0", + "versionEndExcluding": "r49p4", + "matchCriteriaId": "B21C277E-C5D4-40DE-8824-41BBC6EDF035" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arm:valhall_gpu_userspace_driver:*:*:*:*:*:*:*:*", + "versionStartIncluding": "r50p0", + "versionEndExcluding": "r54p1", + "matchCriteriaId": "18A9000D-8DAA-4B5E-930A-B3E1225C63D2" + } + ] + } + ] + } + ], "references": [ { "url": "https://developer.arm.com/documentation/110466/latest/", - "source": "arm-security@arm.com" + "source": "arm-security@arm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1734.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1734.json index f7ae22fb164..8c947ce61b5 100644 --- a/CVE-2025/CVE-2025-17xx/CVE-2025-1734.json +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1734.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1734", "sourceIdentifier": "security@php.net", "published": "2025-03-30T06:15:14.603", - "lastModified": "2025-05-23T14:15:26.087", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-02T20:13:31.447", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } ] }, "weaknesses": [ @@ -73,14 +95,75 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.1.0", + "versionEndExcluding": "8.1.32", + "matchCriteriaId": "240B9DA6-4FE3-42D1-931A-9F4C62EC0ABA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.2.0", + "versionEndExcluding": "8.2.28", + "matchCriteriaId": "3C01313A-447A-4190-B275-3A6394EEFD96" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.3.0", + "versionEndExcluding": "8.3.19", + "matchCriteriaId": "A525415D-4C9F-4884-9F85-94989608D805" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.4.0", + "versionEndExcluding": "8.4.5", + "matchCriteriaId": "AC94B1EC-530A-4A25-9BCD-DAC5F52F6813" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:*", + "matchCriteriaId": "A20333EE-4C13-426E-8B54-D78679D5DDB8" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/php/php-src/security/advisories/GHSA-pcmh-g36c-qc44", - "source": "security@php.net" + "source": "security@php.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20250523-0009/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1736.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1736.json index 93a6453eb56..3b1430fac14 100644 --- a/CVE-2025/CVE-2025-17xx/CVE-2025-1736.json +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1736.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1736", "sourceIdentifier": "security@php.net", "published": "2025-03-30T06:15:14.803", - "lastModified": "2025-05-23T14:15:26.203", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-02T20:14:40.817", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } ] }, "weaknesses": [ @@ -73,14 +95,75 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.1.0", + "versionEndExcluding": "8.1.32", + "matchCriteriaId": "240B9DA6-4FE3-42D1-931A-9F4C62EC0ABA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.2.0", + "versionEndExcluding": "8.2.28", + "matchCriteriaId": "3C01313A-447A-4190-B275-3A6394EEFD96" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.3.0", + "versionEndExcluding": "8.3.19", + "matchCriteriaId": "A525415D-4C9F-4884-9F85-94989608D805" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.4.0", + "versionEndExcluding": "8.4.5", + "matchCriteriaId": "AC94B1EC-530A-4A25-9BCD-DAC5F52F6813" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:*", + "matchCriteriaId": "A20333EE-4C13-426E-8B54-D78679D5DDB8" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/php/php-src/security/advisories/GHSA-hgf5-96fm-v528", - "source": "security@php.net" + "source": "security@php.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20250523-0006/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1861.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1861.json index d2a15cd01d0..88e632038a1 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1861.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1861.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1861", "sourceIdentifier": "security@php.net", "published": "2025-03-30T06:15:14.957", - "lastModified": "2025-05-23T14:15:26.320", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-02T20:17:38.193", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } ] }, "weaknesses": [ @@ -73,14 +95,75 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.1.0", + "versionEndExcluding": "8.1.31", + "matchCriteriaId": "CE6E1B68-3EB9-4C67-97A6-226EA02CC2EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.2.0", + "versionEndExcluding": "8.2.26", + "matchCriteriaId": "C160D91A-CF97-4DD1-A34F-8B8C852B3CEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.3.0", + "versionEndExcluding": "8.3.14", + "matchCriteriaId": "35B1BA7F-0EAE-4F40-ACA4-EBC5D63F609A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.4.0", + "versionEndExcluding": "8.4.5", + "matchCriteriaId": "AC94B1EC-530A-4A25-9BCD-DAC5F52F6813" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:*", + "matchCriteriaId": "A20333EE-4C13-426E-8B54-D78679D5DDB8" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/php/php-src/security/advisories/GHSA-52jp-hrpf-2jff", - "source": "security@php.net" + "source": "security@php.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20250523-0005/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-340xx/CVE-2025-34074.json b/CVE-2025/CVE-2025-340xx/CVE-2025-34074.json new file mode 100644 index 00000000000..9c33af97818 --- /dev/null +++ b/CVE-2025/CVE-2025-340xx/CVE-2025-34074.json @@ -0,0 +1,90 @@ +{ + "id": "CVE-2025-34074", + "sourceIdentifier": "disclosure@vulncheck.com", + "published": "2025-07-02T20:15:29.410", + "lastModified": "2025-07-02T20:15:29.410", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An authenticated remote code execution vulnerability exists in Lucee\u2019s administrative interface due to insecure design in the scheduled task functionality. An administrator with access to /lucee/admin/web.cfm can configure a scheduled job to retrieve a remote .cfm file from an attacker-controlled server, which is written to the Lucee webroot and executed with the privileges of the Lucee service account. Because Lucee does not enforce integrity checks, path restrictions, or execution controls for scheduled task fetches, this feature can be abused to achieve arbitrary code execution. This issue is distinct from CVE-2024-55354." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.4, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + }, + { + "lang": "en", + "value": "CWE-829" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/lucee/Lucee", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/lucee_scheduled_job.rb", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://vulncheck.com/advisories/lucee-admin-interface-rce", + "source": "disclosure@vulncheck.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-340xx/CVE-2025-34075.json b/CVE-2025/CVE-2025-340xx/CVE-2025-34075.json new file mode 100644 index 00000000000..aec7a77f6d8 --- /dev/null +++ b/CVE-2025/CVE-2025-340xx/CVE-2025-34075.json @@ -0,0 +1,106 @@ +{ + "id": "CVE-2025-34075", + "sourceIdentifier": "disclosure@vulncheck.com", + "published": "2025-07-02T20:15:29.553", + "lastModified": "2025-07-02T21:15:40.790", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An authenticated virtual machine escape vulnerability exists in HashiCorp Vagrant when using the default synced folder configuration. By design, Vagrant automatically mounts the host system\u2019s project directory into the guest VM under /vagrant (or C:\\vagrant on Windows). This includes the Vagrantfile configuration file, which is a Ruby script evaluated by the host every time a vagrant command is executed in the project directory. If a low-privileged attacker obtains shell access to the guest VM, they can append arbitrary Ruby code to the mounted Vagrantfile. When a user on the host later runs any vagrant command, the injected code is executed on the host with that user\u2019s privileges.\n\n While this shared-folder behavior is well-documented by Vagrant, the security implications of Vagrantfile execution from guest-writable storage are not explicitly addressed. This effectively enables guest-to-host code execution in multi-tenant or adversarial VM scenarios." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "ACTIVE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + }, + { + "lang": "en", + "value": "CWE-276" + }, + { + "lang": "en", + "value": "CWE-668" + } + ] + } + ], + "references": [ + { + "url": "https://developer.hashicorp.com/vagrant", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://developer.hashicorp.com/vagrant/docs/synced-folders/basic_usage", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://developer.hashicorp.com/vagrant/docs/vagrantfile", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/local/vagrant_synced_folder_vagrantfile_breakout.rb", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://vulncheck.com/advisories/hashicorp-vagrant-synced-folder-vagrantfile-breakout", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/local/vagrant_synced_folder_vagrantfile_breakout.rb", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-340xx/CVE-2025-34076.json b/CVE-2025/CVE-2025-340xx/CVE-2025-34076.json new file mode 100644 index 00000000000..bf62a70f9d9 --- /dev/null +++ b/CVE-2025/CVE-2025-340xx/CVE-2025-34076.json @@ -0,0 +1,98 @@ +{ + "id": "CVE-2025-34076", + "sourceIdentifier": "disclosure@vulncheck.com", + "published": "2025-07-02T20:15:29.690", + "lastModified": "2025-07-02T20:15:29.690", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An authenticated local file inclusion vulnerability exists in Microweber CMS versions <= 1.2.11 through misuse of the backup management API. Authenticated users can abuse the /api/BackupV2/upload and /api/BackupV2/download endpoints to read arbitrary files from the underlying filesystem. By specifying an absolute file path in the src parameter of the upload request, the server may relocate or delete the target file depending on the web service user\u2019s privileges. The corresponding download endpoint can then be used to retrieve the file contents, effectively enabling local file disclosure. This behavior stems from insufficient validation of user-supplied paths and inadequate restrictions on file access and backup logic." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/microweber/microweber", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://github.com/microweber/microweber/commit/572bdc36b5b47923790016f6b961c8df53226855", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://github.com/microweber/microweber/commit/98d025467128ecc24195dcb56c533febc3c91af6", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://huntr.com/bounties/09218d3f-1f6a-48ae-981c-85e86ad5ed8b", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/gather/microweber_lfi.rb", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://vulncheck.com/advisories/microweber-cms-lfi", + "source": "disclosure@vulncheck.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-340xx/CVE-2025-34078.json b/CVE-2025/CVE-2025-340xx/CVE-2025-34078.json new file mode 100644 index 00000000000..101c80fc0b5 --- /dev/null +++ b/CVE-2025/CVE-2025-340xx/CVE-2025-34078.json @@ -0,0 +1,94 @@ +{ + "id": "CVE-2025-34078", + "sourceIdentifier": "disclosure@vulncheck.com", + "published": "2025-07-02T20:15:29.827", + "lastModified": "2025-07-02T20:15:29.827", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A local privilege escalation vulnerability exists in NSClient++ 0.5.2.35 when both the web interface and ExternalScripts features are enabled. The configuration file (nsclient.ini) stores the administrative password in plaintext and is readable by local users. By extracting this password, an attacker can authenticate to the NSClient++ web interface (typically accessible on port 8443) and abuse the ExternalScripts plugin to inject and execute arbitrary commands as SYSTEM by registering a custom script, saving the configuration, and triggering it via the API.\n\nThis behavior is documented but insecure, as the plaintext credential exposure undermines access isolation between local users and administrative functions." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + }, + { + "lang": "en", + "value": "CWE-312" + } + ] + } + ], + "references": [ + { + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/local/nscp_pe.rb", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://vulncheck.com/advisories/nsclient-localtoremote-system-compromise", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://www.exploit-db.com/exploits/46802", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://www.exploit-db.com/exploits/48360", + "source": "disclosure@vulncheck.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-340xx/CVE-2025-34079.json b/CVE-2025/CVE-2025-340xx/CVE-2025-34079.json new file mode 100644 index 00000000000..90039cae5a6 --- /dev/null +++ b/CVE-2025/CVE-2025-340xx/CVE-2025-34079.json @@ -0,0 +1,90 @@ +{ + "id": "CVE-2025-34079", + "sourceIdentifier": "disclosure@vulncheck.com", + "published": "2025-07-02T20:15:29.963", + "lastModified": "2025-07-02T20:15:29.963", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An authenticated remote code execution vulnerability exists in NSClient++ version 0.5.2.35 when the web interface and ExternalScripts module are enabled. A remote attacker with the administrator password can authenticate to the web interface (default port 8443), inject arbitrary commands as external scripts via the /settings/query.json API, save the configuration, and trigger the script via the /query/{name} endpoint. The injected commands are executed with SYSTEM privileges, enabling full remote compromise.\n\nThis capability is an intended feature, but the lack of safeguards or privilege separation makes it risky when exposed to untrusted actors." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + }, + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "references": [ + { + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/http/nscp_authenticated_rce.rb", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://vulncheck.com/advisories/nsclient-localtoremote-system-compromise", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://www.exploit-db.com/exploits/48360", + "source": "disclosure@vulncheck.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-340xx/CVE-2025-34090.json b/CVE-2025/CVE-2025-340xx/CVE-2025-34090.json new file mode 100644 index 00000000000..2fa898a1dcf --- /dev/null +++ b/CVE-2025/CVE-2025-340xx/CVE-2025-34090.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2025-34090", + "sourceIdentifier": "disclosure@vulncheck.com", + "published": "2025-07-02T20:15:30.110", + "lastModified": "2025-07-02T20:15:30.110", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A security bypass vulnerability exists in Google Chrome AppBound cookie encryption mechanism due to insufficient validation of COM server paths during inter-process communication. A local low-privileged attacker can hijack the COM class identifier (CLSID) registration used by Chrome's elevation service and point it to a non-existent or malicious binary. When this hijack occurs, Chrome silently falls back to the legacy cookie encryption mechanism (protected only by user-DPAPI), thereby enabling cookie decryption by any user-context malware without SYSTEM-level access. This flaw bypasses the protections intended by the AppBound encryption design and allows cookie theft from Chromium-based browsers.\n\nConfirmed in Google Chrome with AppBound Encryption enabled. Other Chromium-based browsers may be affected if they implement similar COM-based encryption mechanisms." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + }, + { + "lang": "en", + "value": "CWE-426" + } + ] + } + ], + "references": [ + { + "url": "https://vulncheck.com/advisories/google-chrome-appbound-cookie-encryption", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://www.cyberark.com/resources/threat-research-blog/c4-bomb-blowing-up-chromes-appbound-cookie-encryption", + "source": "disclosure@vulncheck.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-340xx/CVE-2025-34091.json b/CVE-2025/CVE-2025-340xx/CVE-2025-34091.json new file mode 100644 index 00000000000..1d11cb5a4bd --- /dev/null +++ b/CVE-2025/CVE-2025-340xx/CVE-2025-34091.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2025-34091", + "sourceIdentifier": "disclosure@vulncheck.com", + "published": "2025-07-02T20:15:30.260", + "lastModified": "2025-07-02T20:15:30.260", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A padding oracle vulnerability exists in Google Chrome\u2019s AppBound cookie encryption mechanism due to observable decryption failure behavior in Windows Event Logs when handling malformed ciphertext in SYSTEM-DPAPI-encrypted blobs. A local attacker can repeatedly send malformed ciphertexts to the Chrome elevation service and distinguish between padding and MAC errors, enabling a padding oracle attack. This allows partial decryption of the SYSTEM-DPAPI layer and eventual recovery of the user-DPAPI encrypted cookie key, which is trivially decrypted by the attacker\u2019s own context. This issue undermines the core purpose of AppBound Encryption by enabling low-privileged cookie theft through cryptographic misuse and verbose error feedback.\n\nConfirmed in Google Chrome with AppBound Encryption enabled. Other Chromium-based browsers may be affected if they implement similar COM-based encryption mechanisms.\n\nThis behavior arises from a combination of Chrome\u2019s AppBound implementation and the way Microsoft Windows DPAPI reports decryption failures via Event Logs. As such, the vulnerability relies on cryptographic behavior and error visibility in all supported versions of Windows." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + }, + { + "lang": "en", + "value": "CWE-209" + } + ] + } + ], + "references": [ + { + "url": "https://vulncheck.com/advisories/google-chrome-appbound-cookie-encryption", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://www.cyberark.com/resources/threat-research-blog/c4-bomb-blowing-up-chromes-appbound-cookie-encryption", + "source": "disclosure@vulncheck.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-340xx/CVE-2025-34092.json b/CVE-2025/CVE-2025-340xx/CVE-2025-34092.json new file mode 100644 index 00000000000..db09c2089fe --- /dev/null +++ b/CVE-2025/CVE-2025-340xx/CVE-2025-34092.json @@ -0,0 +1,90 @@ +{ + "id": "CVE-2025-34092", + "sourceIdentifier": "disclosure@vulncheck.com", + "published": "2025-07-02T20:15:30.413", + "lastModified": "2025-07-02T20:15:30.413", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A cookie encryption bypass vulnerability exists in Google Chrome\u2019s AppBound mechanism due to weak path validation logic within the elevation service. When Chrome encrypts a cookie key, it records its own executable path as validation metadata. Later, when decrypting, the elevation service compares the requesting process\u2019s path to this stored path. However, due to path canonicalization inconsistencies, an attacker can impersonate Chrome (e.g., by naming their binary chrome.exe and placing it in a similar path) and successfully retrieve the encrypted cookie key. This allows malicious processes to retrieve cookies intended to be restricted to the Chrome process only.\n\nConfirmed in Google Chrome with AppBound Encryption enabled. Other Chromium-based browsers may be affected if they implement similar COM-based encryption mechanisms." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + }, + { + "lang": "en", + "value": "CWE-290" + }, + { + "lang": "en", + "value": "CWE-706" + } + ] + } + ], + "references": [ + { + "url": "https://vulncheck.com/advisories/google-chrome-appbound-cookie-encryption", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://www.cyberark.com/resources/threat-research-blog/c4-bomb-blowing-up-chromes-appbound-cookie-encryption", + "source": "disclosure@vulncheck.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-430xx/CVE-2025-43025.json b/CVE-2025/CVE-2025-430xx/CVE-2025-43025.json new file mode 100644 index 00000000000..2191cb8315b --- /dev/null +++ b/CVE-2025/CVE-2025-430xx/CVE-2025-43025.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-43025", + "sourceIdentifier": "hp-security-alert@hp.com", + "published": "2025-07-02T20:15:30.550", + "lastModified": "2025-07-02T20:15:30.550", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "HP Universal Print Driver is potentially vulnerable to denial of service due to buffer overflow in versions of UPD 7.4 or older (e.g., v7.3.x, v7.2.x, v7.1.x, etc.)." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "hp-security-alert@hp.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "LOW", + "subAvailabilityImpact": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "hp-security-alert@hp.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://support.hp.com/us-en/document/ish_12690576-12690598-16/hpsbpi04032", + "source": "hp-security-alert@hp.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-450xx/CVE-2025-45029.json b/CVE-2025/CVE-2025-450xx/CVE-2025-45029.json index 64ab94454b4..46334ffd99f 100644 --- a/CVE-2025/CVE-2025-450xx/CVE-2025-45029.json +++ b/CVE-2025/CVE-2025-450xx/CVE-2025-45029.json @@ -2,7 +2,7 @@ "id": "CVE-2025-45029", "sourceIdentifier": "cve@mitre.org", "published": "2025-07-02T14:15:25.470", - "lastModified": "2025-07-02T14:15:25.470", + "lastModified": "2025-07-02T21:15:41.003", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "WINSTAR WN572HP3 v230525 was discovered to contain a heap overflow via the CONTENT_LENGTH variable at /cgi-bin/upload.cgi." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "http://winstar.com", diff --git a/CVE-2025/CVE-2025-466xx/CVE-2025-46647.json b/CVE-2025/CVE-2025-466xx/CVE-2025-46647.json index 9a1f3428f7f..f7fb969c9af 100644 --- a/CVE-2025/CVE-2025-466xx/CVE-2025-46647.json +++ b/CVE-2025/CVE-2025-466xx/CVE-2025-46647.json @@ -2,7 +2,7 @@ "id": "CVE-2025-46647", "sourceIdentifier": "security@apache.org", "published": "2025-07-02T12:15:28.227", - "lastModified": "2025-07-02T12:15:28.227", + "lastModified": "2025-07-02T21:15:41.190", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,11 +11,34 @@ "value": "A vulnerability of plugin\u00a0openid-connect in Apache APISIX.\n\nThis vulnerability will only have an impact if all of the following conditions are met:\n1. Use the openid-connect plugin with introspection mode\n2. The auth service connected to openid-connect provides services to multiple issuers\n3. Multiple issuers share the same private key and relies only on the issuer being different\n\nIf affected by this vulnerability, it would allow an attacker with a valid account on one of the issuers to log into the other issuer.\n\n\n\n\nThis issue affects Apache APISIX: until 3.12.0.\n\nUsers are recommended to upgrade to version 3.12.0 or higher." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-491xx/CVE-2025-49175.json b/CVE-2025/CVE-2025-491xx/CVE-2025-49175.json index 1ab74ac957d..8e50ad58ebf 100644 --- a/CVE-2025/CVE-2025-491xx/CVE-2025-49175.json +++ b/CVE-2025/CVE-2025-491xx/CVE-2025-49175.json @@ -2,7 +2,7 @@ "id": "CVE-2025-49175", "sourceIdentifier": "secalert@redhat.com", "published": "2025-06-17T15:15:45.290", - "lastModified": "2025-06-30T20:15:24.553", + "lastModified": "2025-07-02T20:15:30.693", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -52,6 +52,10 @@ } ], "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2025:10258", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/errata/RHSA-2025:9303", "source": "secalert@redhat.com" diff --git a/CVE-2025/CVE-2025-491xx/CVE-2025-49176.json b/CVE-2025/CVE-2025-491xx/CVE-2025-49176.json index b5aae6ae7f8..16006b48887 100644 --- a/CVE-2025/CVE-2025-491xx/CVE-2025-49176.json +++ b/CVE-2025/CVE-2025-491xx/CVE-2025-49176.json @@ -2,7 +2,7 @@ "id": "CVE-2025-49176", "sourceIdentifier": "secalert@redhat.com", "published": "2025-06-17T15:15:45.470", - "lastModified": "2025-06-30T20:15:24.690", + "lastModified": "2025-07-02T20:15:30.820", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -52,6 +52,10 @@ } ], "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2025:10258", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/errata/RHSA-2025:9303", "source": "secalert@redhat.com" diff --git a/CVE-2025/CVE-2025-491xx/CVE-2025-49177.json b/CVE-2025/CVE-2025-491xx/CVE-2025-49177.json index 7398c947a40..bf9cde27535 100644 --- a/CVE-2025/CVE-2025-491xx/CVE-2025-49177.json +++ b/CVE-2025/CVE-2025-491xx/CVE-2025-49177.json @@ -2,7 +2,7 @@ "id": "CVE-2025-49177", "sourceIdentifier": "secalert@redhat.com", "published": "2025-06-17T15:15:45.650", - "lastModified": "2025-06-30T10:15:25.913", + "lastModified": "2025-07-02T20:15:30.943", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", @@ -52,6 +52,10 @@ } ], "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2025:10258", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/errata/RHSA-2025:9304", "source": "secalert@redhat.com" diff --git a/CVE-2025/CVE-2025-491xx/CVE-2025-49178.json b/CVE-2025/CVE-2025-491xx/CVE-2025-49178.json index 4d7e248109a..f1785b6f826 100644 --- a/CVE-2025/CVE-2025-491xx/CVE-2025-49178.json +++ b/CVE-2025/CVE-2025-491xx/CVE-2025-49178.json @@ -2,7 +2,7 @@ "id": "CVE-2025-49178", "sourceIdentifier": "secalert@redhat.com", "published": "2025-06-17T15:15:45.813", - "lastModified": "2025-06-30T21:15:30.693", + "lastModified": "2025-07-02T20:15:31.057", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -52,6 +52,10 @@ } ], "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2025:10258", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/errata/RHSA-2025:9303", "source": "secalert@redhat.com" diff --git a/CVE-2025/CVE-2025-491xx/CVE-2025-49179.json b/CVE-2025/CVE-2025-491xx/CVE-2025-49179.json index 48cbdf44af5..3c2c0ab8be8 100644 --- a/CVE-2025/CVE-2025-491xx/CVE-2025-49179.json +++ b/CVE-2025/CVE-2025-491xx/CVE-2025-49179.json @@ -2,7 +2,7 @@ "id": "CVE-2025-49179", "sourceIdentifier": "secalert@redhat.com", "published": "2025-06-17T15:15:46.000", - "lastModified": "2025-06-30T20:15:24.817", + "lastModified": "2025-07-02T20:15:31.187", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -52,6 +52,10 @@ } ], "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2025:10258", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/errata/RHSA-2025:9303", "source": "secalert@redhat.com" diff --git a/CVE-2025/CVE-2025-491xx/CVE-2025-49180.json b/CVE-2025/CVE-2025-491xx/CVE-2025-49180.json index eba1510bf0e..ba0c83f8527 100644 --- a/CVE-2025/CVE-2025-491xx/CVE-2025-49180.json +++ b/CVE-2025/CVE-2025-491xx/CVE-2025-49180.json @@ -2,7 +2,7 @@ "id": "CVE-2025-49180", "sourceIdentifier": "secalert@redhat.com", "published": "2025-06-17T15:15:46.183", - "lastModified": "2025-06-30T20:15:24.940", + "lastModified": "2025-07-02T20:15:31.320", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -52,6 +52,10 @@ } ], "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2025:10258", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/errata/RHSA-2025:9303", "source": "secalert@redhat.com" diff --git a/CVE-2025/CVE-2025-492xx/CVE-2025-49262.json b/CVE-2025/CVE-2025-492xx/CVE-2025-49262.json index 3a1195ac6bf..eb92c67366b 100644 --- a/CVE-2025/CVE-2025-492xx/CVE-2025-49262.json +++ b/CVE-2025/CVE-2025-492xx/CVE-2025-49262.json @@ -2,8 +2,8 @@ "id": "CVE-2025-49262", "sourceIdentifier": "audit@patchstack.com", "published": "2025-06-06T13:15:42.713", - "lastModified": "2025-06-06T14:06:58.193", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-02T20:02:58.340", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 4.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sinaextra:sina_extension_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.7.0", + "matchCriteriaId": "5E8362F9-A91A-4A5E-820E-DBD767B84655" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/sina-extension-for-elementor/vulnerability/wordpress-sina-extension-for-elementor-3-6-1-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-492xx/CVE-2025-49291.json b/CVE-2025/CVE-2025-492xx/CVE-2025-49291.json index d08c95a6e37..db1e2fd70dd 100644 --- a/CVE-2025/CVE-2025-492xx/CVE-2025-49291.json +++ b/CVE-2025/CVE-2025-492xx/CVE-2025-49291.json @@ -2,8 +2,8 @@ "id": "CVE-2025-49291", "sourceIdentifier": "audit@patchstack.com", "published": "2025-06-06T13:15:44.933", - "lastModified": "2025-06-06T14:06:58.193", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-02T20:02:18.077", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:codepeople:calculated_fields_form:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.3.59", + "matchCriteriaId": "9C2BAF19-B851-4B02-B0B5-C1DD3F829029" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/calculated-fields-form/vulnerability/wordpress-calculated-fields-form-5-3-58-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-525xx/CVE-2025-52559.json b/CVE-2025/CVE-2025-525xx/CVE-2025-52559.json new file mode 100644 index 00000000000..681fc623d8d --- /dev/null +++ b/CVE-2025/CVE-2025-525xx/CVE-2025-52559.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2025-52559", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-07-02T20:15:31.443", + "lastModified": "2025-07-02T20:15:31.443", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Zulip is an open-source team chat application. From versions 2.0.0-rc1 to before 10.4 in Zulip Server, the /digest/ URL of a server shows a preview of what the email weekly digest would contain. This URL, though not the digest itself, contains a cross-site scripting (XSS) vulnerability in both topic names and channel names. This issue has been fixed in Zulip Server 10.4. A workaround for this issue involves denying access to /digest/." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/zulip/zulip/commit/175ec1f365b0db982d6eac9019701cbf6e8bc2f2", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/zulip/zulip/commit/1a8429e338ff53bdcc4b42e7e71b6fffdd84fcd1", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/zulip/zulip/commit/6608c8777254e73a4b540e5e1c4af92e680a55fc", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/zulip/zulip/security/advisories/GHSA-vgf2-vw4r-m663", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-528xx/CVE-2025-52841.json b/CVE-2025/CVE-2025-528xx/CVE-2025-52841.json index 7b460d278d6..6f9532aae24 100644 --- a/CVE-2025/CVE-2025-528xx/CVE-2025-52841.json +++ b/CVE-2025/CVE-2025-528xx/CVE-2025-52841.json @@ -2,7 +2,7 @@ "id": "CVE-2025-52841", "sourceIdentifier": "help@fluidattacks.com", "published": "2025-07-02T17:15:53.807", - "lastModified": "2025-07-02T17:15:53.807", + "lastModified": "2025-07-02T20:15:31.610", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -60,7 +60,7 @@ "weaknesses": [ { "source": "help@fluidattacks.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -77,6 +77,10 @@ { "url": "https://github.com/mohaiminur/laundry", "source": "help@fluidattacks.com" + }, + { + "url": "https://fluidattacks.com/advisories/tort", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-528xx/CVE-2025-52842.json b/CVE-2025/CVE-2025-528xx/CVE-2025-52842.json new file mode 100644 index 00000000000..73d32618180 --- /dev/null +++ b/CVE-2025/CVE-2025-528xx/CVE-2025-52842.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2025-52842", + "sourceIdentifier": "help@fluidattacks.com", + "published": "2025-07-02T20:15:31.727", + "lastModified": "2025-07-02T20:15:31.727", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Laundry on Linux, MacOS allows Account Takeover. This issue affects Laundry: 2.3.0." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "help@fluidattacks.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "ACTIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "LOW", + "subIntegrityImpact": "LOW", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "help@fluidattacks.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://fluidattacks.com/advisories/winehouse", + "source": "help@fluidattacks.com" + }, + { + "url": "https://github.com/mohaiminur/laundry", + "source": "help@fluidattacks.com" + }, + { + "url": "https://fluidattacks.com/advisories/winehouse", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-532xx/CVE-2025-53256.json b/CVE-2025/CVE-2025-532xx/CVE-2025-53256.json index b81cda510c4..56226c59b0c 100644 --- a/CVE-2025/CVE-2025-532xx/CVE-2025-53256.json +++ b/CVE-2025/CVE-2025-532xx/CVE-2025-53256.json @@ -2,13 +2,13 @@ "id": "CVE-2025-53256", "sourceIdentifier": "audit@patchstack.com", "published": "2025-06-27T14:15:44.917", - "lastModified": "2025-06-30T18:38:48.477", + "lastModified": "2025-07-02T21:15:41.410", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in YayCommerce YaySMTP allows SQL Injection. This issue affects YaySMTP: from n/a through 6.8.1." + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in YayCommerce YaySMTP allows SQL Injection.This issue affects YaySMTP: from n/a through 2.6.5." }, { "lang": "es", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-64xx/CVE-2025-6424.json b/CVE-2025/CVE-2025-64xx/CVE-2025-6424.json index 4e579cea700..f7daf5a133a 100644 --- a/CVE-2025/CVE-2025-64xx/CVE-2025-6424.json +++ b/CVE-2025/CVE-2025-64xx/CVE-2025-6424.json @@ -2,13 +2,13 @@ "id": "CVE-2025-6424", "sourceIdentifier": "security@mozilla.org", "published": "2025-06-24T13:15:23.273", - "lastModified": "2025-07-02T18:11:28.190", - "vulnStatus": "Analyzed", + "lastModified": "2025-07-02T21:15:41.517", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A use-after-free in FontFaceSet resulted in a potentially exploitable crash. This vulnerability affects Firefox < 140, Firefox ESR < 115.25, and Firefox ESR < 128.12." + "value": "A use-after-free in FontFaceSet resulted in a potentially exploitable crash. This vulnerability affects Firefox < 140, Firefox ESR < 115.25, Firefox ESR < 128.12, Thunderbird < 140, and Thunderbird < 128.12." }, { "lang": "es", @@ -110,6 +110,14 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-54/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-55/", + "source": "security@mozilla.org" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-64xx/CVE-2025-6425.json b/CVE-2025/CVE-2025-64xx/CVE-2025-6425.json index ea476faa476..36812d212e3 100644 --- a/CVE-2025/CVE-2025-64xx/CVE-2025-6425.json +++ b/CVE-2025/CVE-2025-64xx/CVE-2025-6425.json @@ -2,13 +2,13 @@ "id": "CVE-2025-6425", "sourceIdentifier": "security@mozilla.org", "published": "2025-06-24T13:15:23.403", - "lastModified": "2025-06-26T18:58:14.280", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-02T21:15:41.670", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "An attacker who enumerated resources from the WebCompat extension could have obtained a persistent UUID that identified the browser, and persisted between containers and normal/private browsing mode, but not profiles. This vulnerability affects Firefox < 140, Firefox ESR < 115.25, and Firefox ESR < 128.12." + "value": "An attacker who enumerated resources from the WebCompat extension could have obtained a persistent UUID that identified the browser, and persisted between containers and normal/private browsing mode, but not profiles. This vulnerability affects Firefox < 140, Firefox ESR < 115.25, Firefox ESR < 128.12, Thunderbird < 140, and Thunderbird < 128.12." }, { "lang": "es", @@ -67,6 +67,14 @@ { "url": "https://www.mozilla.org/security/advisories/mfsa2025-53/", "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-54/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-55/", + "source": "security@mozilla.org" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-69xx/CVE-2025-6942.json b/CVE-2025/CVE-2025-69xx/CVE-2025-6942.json index 1cd6d0613ef..00c8a682f12 100644 --- a/CVE-2025/CVE-2025-69xx/CVE-2025-6942.json +++ b/CVE-2025/CVE-2025-69xx/CVE-2025-6942.json @@ -2,13 +2,13 @@ "id": "CVE-2025-6942", "sourceIdentifier": "1443cd92-d354-46d2-9290-d812316ca43a", "published": "2025-07-02T16:15:29.883", - "lastModified": "2025-07-02T16:15:29.883", + "lastModified": "2025-07-02T20:15:31.957", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "The distributed engine of Secret Server versions 11.7.49 and earlier can be exploited during an initial authorization event that would allow an attacker to impersonate another distributed engine." + "value": "The distributed engine versions 8.4.39.0 and earlier of Secret Server versions 11.7.49 and earlier can be exploited during an initial authorization event that would allow an attacker to impersonate another distributed engine." } ], "metrics": { @@ -61,7 +61,7 @@ "source": "1443cd92-d354-46d2-9290-d812316ca43a" }, { - "url": "https://trust.delinea.com", + "url": "https://trust.delinea.com/?tcuUid=2b68edca-7930-438d-b960-2d6da07cdde9", "source": "1443cd92-d354-46d2-9290-d812316ca43a" } ] diff --git a/README.md b/README.md index 33f85a6dfc8..01da5d6289b 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-07-02T20:00:11.604133+00:00 +2025-07-02T22:00:11.330468+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-07-02T19:56:33.060000+00:00 +2025-07-02T21:35:56.150000+00:00 ``` ### Last Data Feed Release @@ -33,46 +33,55 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -300092 +300103 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `11` -- [CVE-2025-45813](CVE-2025/CVE-2025-458xx/CVE-2025-45813.json) (`2025-07-02T18:15:24.170`) -- [CVE-2025-49713](CVE-2025/CVE-2025-497xx/CVE-2025-49713.json) (`2025-07-02T18:15:24.303`) +- [CVE-2025-34074](CVE-2025/CVE-2025-340xx/CVE-2025-34074.json) (`2025-07-02T20:15:29.410`) +- [CVE-2025-34075](CVE-2025/CVE-2025-340xx/CVE-2025-34075.json) (`2025-07-02T20:15:29.553`) +- [CVE-2025-34076](CVE-2025/CVE-2025-340xx/CVE-2025-34076.json) (`2025-07-02T20:15:29.690`) +- [CVE-2025-34078](CVE-2025/CVE-2025-340xx/CVE-2025-34078.json) (`2025-07-02T20:15:29.827`) +- [CVE-2025-34079](CVE-2025/CVE-2025-340xx/CVE-2025-34079.json) (`2025-07-02T20:15:29.963`) +- [CVE-2025-34090](CVE-2025/CVE-2025-340xx/CVE-2025-34090.json) (`2025-07-02T20:15:30.110`) +- [CVE-2025-34091](CVE-2025/CVE-2025-340xx/CVE-2025-34091.json) (`2025-07-02T20:15:30.260`) +- [CVE-2025-34092](CVE-2025/CVE-2025-340xx/CVE-2025-34092.json) (`2025-07-02T20:15:30.413`) +- [CVE-2025-43025](CVE-2025/CVE-2025-430xx/CVE-2025-43025.json) (`2025-07-02T20:15:30.550`) +- [CVE-2025-52559](CVE-2025/CVE-2025-525xx/CVE-2025-52559.json) (`2025-07-02T20:15:31.443`) +- [CVE-2025-52842](CVE-2025/CVE-2025-528xx/CVE-2025-52842.json) (`2025-07-02T20:15:31.727`) ### CVEs modified in the last Commit -Recently modified CVEs: `66` +Recently modified CVEs: `41` -- [CVE-2025-5439](CVE-2025/CVE-2025-54xx/CVE-2025-5439.json) (`2025-07-02T18:08:04.770`) -- [CVE-2025-5440](CVE-2025/CVE-2025-54xx/CVE-2025-5440.json) (`2025-07-02T18:07:16.100`) -- [CVE-2025-5877](CVE-2025/CVE-2025-58xx/CVE-2025-5877.json) (`2025-07-02T19:17:43.003`) -- [CVE-2025-6140](CVE-2025/CVE-2025-61xx/CVE-2025-6140.json) (`2025-07-02T18:58:42.230`) -- [CVE-2025-6152](CVE-2025/CVE-2025-61xx/CVE-2025-6152.json) (`2025-07-02T19:47:02.363`) -- [CVE-2025-6167](CVE-2025/CVE-2025-61xx/CVE-2025-6167.json) (`2025-07-02T19:36:26.940`) -- [CVE-2025-6177](CVE-2025/CVE-2025-61xx/CVE-2025-6177.json) (`2025-07-02T18:26:40.590`) -- [CVE-2025-6179](CVE-2025/CVE-2025-61xx/CVE-2025-6179.json) (`2025-07-02T18:23:31.617`) -- [CVE-2025-6269](CVE-2025/CVE-2025-62xx/CVE-2025-6269.json) (`2025-07-02T19:01:55.227`) -- [CVE-2025-6270](CVE-2025/CVE-2025-62xx/CVE-2025-6270.json) (`2025-07-02T19:02:17.373`) -- [CVE-2025-6271](CVE-2025/CVE-2025-62xx/CVE-2025-6271.json) (`2025-07-02T19:03:29.737`) -- [CVE-2025-6272](CVE-2025/CVE-2025-62xx/CVE-2025-6272.json) (`2025-07-02T19:04:23.387`) -- [CVE-2025-6274](CVE-2025/CVE-2025-62xx/CVE-2025-6274.json) (`2025-07-02T18:33:27.390`) -- [CVE-2025-6275](CVE-2025/CVE-2025-62xx/CVE-2025-6275.json) (`2025-07-02T18:34:42.377`) -- [CVE-2025-6281](CVE-2025/CVE-2025-62xx/CVE-2025-6281.json) (`2025-07-02T18:37:11.983`) -- [CVE-2025-6296](CVE-2025/CVE-2025-62xx/CVE-2025-6296.json) (`2025-07-02T18:46:52.983`) -- [CVE-2025-6299](CVE-2025/CVE-2025-62xx/CVE-2025-6299.json) (`2025-07-02T18:53:41.497`) -- [CVE-2025-6363](CVE-2025/CVE-2025-63xx/CVE-2025-6363.json) (`2025-07-02T18:56:45.850`) -- [CVE-2025-6403](CVE-2025/CVE-2025-64xx/CVE-2025-6403.json) (`2025-07-02T18:56:36.940`) -- [CVE-2025-6424](CVE-2025/CVE-2025-64xx/CVE-2025-6424.json) (`2025-07-02T18:11:28.190`) -- [CVE-2025-6447](CVE-2025/CVE-2025-64xx/CVE-2025-6447.json) (`2025-07-02T18:24:21.523`) -- [CVE-2025-6570](CVE-2025/CVE-2025-65xx/CVE-2025-6570.json) (`2025-07-02T18:24:35.030`) -- [CVE-2025-6608](CVE-2025/CVE-2025-66xx/CVE-2025-6608.json) (`2025-07-02T18:24:47.807`) -- [CVE-2025-6609](CVE-2025/CVE-2025-66xx/CVE-2025-6609.json) (`2025-07-02T18:24:56.760`) -- [CVE-2025-6610](CVE-2025/CVE-2025-66xx/CVE-2025-6610.json) (`2025-07-02T18:29:30.530`) +- [CVE-2024-45497](CVE-2024/CVE-2024-454xx/CVE-2024-45497.json) (`2025-07-02T20:15:29.150`) +- [CVE-2024-50699](CVE-2024/CVE-2024-506xx/CVE-2024-50699.json) (`2025-07-02T20:28:26.957`) +- [CVE-2024-8929](CVE-2024/CVE-2024-89xx/CVE-2024-8929.json) (`2025-07-02T20:11:20.063`) +- [CVE-2024-8932](CVE-2024/CVE-2024-89xx/CVE-2024-8932.json) (`2025-07-02T20:08:35.010`) +- [CVE-2025-0073](CVE-2025/CVE-2025-00xx/CVE-2025-0073.json) (`2025-07-02T21:18:03.963`) +- [CVE-2025-0819](CVE-2025/CVE-2025-08xx/CVE-2025-0819.json) (`2025-07-02T21:18:07.187`) +- [CVE-2025-1246](CVE-2025/CVE-2025-12xx/CVE-2025-1246.json) (`2025-07-02T21:27:05.870`) +- [CVE-2025-1734](CVE-2025/CVE-2025-17xx/CVE-2025-1734.json) (`2025-07-02T20:13:31.447`) +- [CVE-2025-1736](CVE-2025/CVE-2025-17xx/CVE-2025-1736.json) (`2025-07-02T20:14:40.817`) +- [CVE-2025-1861](CVE-2025/CVE-2025-18xx/CVE-2025-1861.json) (`2025-07-02T20:17:38.193`) +- [CVE-2025-45029](CVE-2025/CVE-2025-450xx/CVE-2025-45029.json) (`2025-07-02T21:15:41.003`) +- [CVE-2025-46647](CVE-2025/CVE-2025-466xx/CVE-2025-46647.json) (`2025-07-02T21:15:41.190`) +- [CVE-2025-49175](CVE-2025/CVE-2025-491xx/CVE-2025-49175.json) (`2025-07-02T20:15:30.693`) +- [CVE-2025-49176](CVE-2025/CVE-2025-491xx/CVE-2025-49176.json) (`2025-07-02T20:15:30.820`) +- [CVE-2025-49177](CVE-2025/CVE-2025-491xx/CVE-2025-49177.json) (`2025-07-02T20:15:30.943`) +- [CVE-2025-49178](CVE-2025/CVE-2025-491xx/CVE-2025-49178.json) (`2025-07-02T20:15:31.057`) +- [CVE-2025-49179](CVE-2025/CVE-2025-491xx/CVE-2025-49179.json) (`2025-07-02T20:15:31.187`) +- [CVE-2025-49180](CVE-2025/CVE-2025-491xx/CVE-2025-49180.json) (`2025-07-02T20:15:31.320`) +- [CVE-2025-49262](CVE-2025/CVE-2025-492xx/CVE-2025-49262.json) (`2025-07-02T20:02:58.340`) +- [CVE-2025-49291](CVE-2025/CVE-2025-492xx/CVE-2025-49291.json) (`2025-07-02T20:02:18.077`) +- [CVE-2025-52841](CVE-2025/CVE-2025-528xx/CVE-2025-52841.json) (`2025-07-02T20:15:31.610`) +- [CVE-2025-53256](CVE-2025/CVE-2025-532xx/CVE-2025-53256.json) (`2025-07-02T21:15:41.410`) +- [CVE-2025-6424](CVE-2025/CVE-2025-64xx/CVE-2025-6424.json) (`2025-07-02T21:15:41.517`) +- [CVE-2025-6425](CVE-2025/CVE-2025-64xx/CVE-2025-6425.json) (`2025-07-02T21:15:41.670`) +- [CVE-2025-6942](CVE-2025/CVE-2025-69xx/CVE-2025-6942.json) (`2025-07-02T20:15:31.957`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 635fe2dd9dd..e514b9feec2 100644 --- a/_state.csv +++ b/_state.csv @@ -57134,8 +57134,8 @@ CVE-2012-6064,0,0,00dfc63961f9d2f48fea7498cff02d1f2421fa76b24927ab3f00edb3f45a3b CVE-2012-6065,0,0,7c2175c41600228ebd0c1f5b78e5c0ea9a55775d6bf6bb3f67bebb3b1c94f4a9,2025-04-11T00:51:21.963000 CVE-2012-6066,0,0,21c6bf3723b1806f5fa7f588834d08d256c294ff8360b08ba820de86088f3316,2025-04-11T00:51:21.963000 CVE-2012-6067,0,0,1418583d7df1633572e12da1ee582751278150b44c4a2c7d1d088f5f0d94ec2b,2025-04-11T00:51:21.963000 -CVE-2012-6068,0,0,a5cb1b673e047f69b55b7b51976951249a00e124c7724e4dd31494d0d0784fb0,2025-04-11T00:51:21.963000 -CVE-2012-6069,0,0,6d24ba6e3fb7bc9bee282f7a49a92d5a05b0f4911ee947210137766ed133b8c3,2025-04-11T00:51:21.963000 +CVE-2012-6068,0,1,e3d950c15015fd759ac3c665fa4a24263029bb895dd53a768209168f2e2802e2,2025-07-02T20:15:28.747000 +CVE-2012-6069,0,1,f4aeb16a54681aee4e0fd13511c2e4eeb84f1e3105227dc2ae70233a3c659fc5,2025-07-02T21:15:39.193000 CVE-2012-6070,0,0,c96e07fbbe5a5885f8017955a7e41db880979ceabef9aec74dad3d1857e61d69,2024-11-21T01:45:45.387000 CVE-2012-6071,0,0,855c72b937ed3b2c1ed93820ec0e120ade527b2f5c5c801871b7628cd19cd706,2024-11-21T01:45:45.507000 CVE-2012-6072,0,0,bc4fd1bc9efc8624039dc318c232f5eaf1b0d89aaa6d596e9d7714cfc1fe5618,2025-04-11T00:51:21.963000 @@ -65224,7 +65224,7 @@ CVE-2014-0756,0,0,8182da2ba5b0fb60b9f4347418bda13902887de796c946dc114475c6445c8d CVE-2014-0757,0,0,168e8c1aac9c85efc339ce8e20d9b2db230dcd503ac6f43b9658d95f3e87035d,2025-04-11T00:51:21.963000 CVE-2014-0758,0,0,6983a30267631c41724920d6872de0c24a328fe20e52aa00a5ca79f089f61c79,2025-04-11T00:51:21.963000 CVE-2014-0759,0,0,159ee845c6a7733811e28579f911af8f19e8475e4c4e96da6413887043b6c475,2025-04-12T10:46:40.837000 -CVE-2014-0760,0,0,0b94b43198c3d40d178d76235092400c77f8b8beff9985994bb20924a97f71e3,2025-04-12T10:46:40.837000 +CVE-2014-0760,0,1,d884b9415b798cefb1f4bcb96e37d8c65c636c184daea2a86963635237b6fa09,2025-07-02T21:15:39.710000 CVE-2014-0761,0,0,a9e210fc97e939bc353b0dc2fce1a893b009252961de1cdbf3747d0cfe5e3500,2025-04-12T10:46:40.837000 CVE-2014-0762,0,0,a2d00d194f91a41898fcae546f2fb77365861a07f1b8676393c4c79ee569bb6c,2025-04-12T10:46:40.837000 CVE-2014-0763,0,0,37a6adf709a00b7917a393f00ba4a7ae3f209fa33e846e9c01022a09df1914ba,2025-04-12T10:46:40.837000 @@ -65233,7 +65233,7 @@ CVE-2014-0765,0,0,ca72b19876799da1bed2b116eb45b0a992313f01100fd2591641de4a18e559 CVE-2014-0766,0,0,20754167ca05b764529ca502d2b64a040b0363de9c7720f7c03c1eb22f9770de,2025-04-12T10:46:40.837000 CVE-2014-0767,0,0,d21414b854b58f39dc8bf51e8ce7de807749919ef74902a41e8797e9dcbf5865,2025-04-12T10:46:40.837000 CVE-2014-0768,0,0,dfe2ace2ad52d510597aa7c107e03ef096f049ecb19c18cb31e149930d1a358e,2025-04-12T10:46:40.837000 -CVE-2014-0769,0,0,a0c28850a814cfc7e27659c306e4e2dbdee38f5d30eadcb4f4aeb4540db4202c,2025-04-12T10:46:40.837000 +CVE-2014-0769,0,1,aeded6b900757f2d693acc367cde76d833ffd622709c0fc2e1c1c2f7d947ec4e,2025-07-02T21:15:39.930000 CVE-2014-0770,0,0,aaf77d8c8e98222f1c84311265729dd56041715b40027c74f6860f225cb89cf2,2025-04-12T10:46:40.837000 CVE-2014-0771,0,0,f411bbd3908d308c314c4cdbfd92d6f52559d677ad50c11c5b1cb40d86204271,2025-04-12T10:46:40.837000 CVE-2014-0772,0,0,c4c12f2d9bc93b391986779f439c03f0c25fbb2b6a464efad2b6ee985866e16e,2025-04-12T10:46:40.837000 @@ -200088,7 +200088,7 @@ CVE-2022-31627,0,0,7988c7987107767faa26c91c4891892d0041cc614c7a6d1a3a06deb7caf95 CVE-2022-31628,0,0,ddf8d9d176ca572281725bcb1b547da70694f62f03744783ee8e12be7f37ea23,2024-11-21T07:04:53.293000 CVE-2022-31629,0,0,5ef862df04f8d255ed02bf719beeb80649437a92cf9e67e9f3f71844fbe16d82,2024-11-21T07:04:53.460000 CVE-2022-31630,0,0,048f94737739e9ec1f539180d01531111b8a9b6e3fb03b23f54e62135c59134e,2024-11-21T07:04:53.693000 -CVE-2022-31631,0,0,a9c408cc6e6afdf7686591ae2032302c0465931613c958a8b300d4947a3f980e,2025-02-13T16:15:35.670000 +CVE-2022-31631,0,1,3c470cf378cff90f59cdfeb387547b572cd9177260458e7329ad7b096e176859,2025-07-02T21:35:56.150000 CVE-2022-31635,0,0,f33cce5b1e193c9081577f172af1b88917acd23104921caa053576c10bfcf687,2025-01-03T15:15:06.873000 CVE-2022-31636,0,0,dc5d48671ff8c8359b8ab236feb93a3c4723a165b95081331578932b6b185c1e,2025-01-03T15:15:08.580000 CVE-2022-31637,0,0,30c8596251895654f5e10b1d0756a872401cb82752723a34976c21eb08a2360a,2025-01-03T20:15:24.413000 @@ -233596,7 +233596,7 @@ CVE-2023-41036,0,0,02272cf2fa97f95dd91a385e67294f11eac8744c630b8c26dd9ff9462edd6 CVE-2023-41037,0,0,f1c3742f17296c158e6b7072d1d1a9102ccf74a2caecd6be7e25a339f6b9a0fa,2024-11-21T08:20:25.840000 CVE-2023-41038,0,0,dd600939ee54220a321d470a3ad1b3ecd0da7d549612b368f00cee9449536ce0,2024-11-21T08:20:25.967000 CVE-2023-41039,0,0,e49689ed186320a038c36307f466e022818c9bec98aa462c1be5a9ea4c4c172f,2024-11-21T08:20:26.090000 -CVE-2023-4104,0,0,ebd3c98f7b974266e0cd3ce9392fb522e9bc704ab30fa16ddd5dbd35fb9dafd1,2024-11-21T08:34:24.063000 +CVE-2023-4104,0,1,6c2f8ecaac38f35d21b5169a003420cc4ae4f83405abfca8ec0ccf15315fa891,2025-07-02T21:15:40.210000 CVE-2023-41040,0,0,426e541e09c3630b3c9f58683762e9a042bddd14dd5886a0f8de5abee437a61e,2024-11-21T08:20:26.217000 CVE-2023-41041,0,0,555d17e2ca52e4dbb2d3be131541fecc6a92d5f967837e4bf934250e0c4e47d7,2024-11-21T08:20:26.350000 CVE-2023-41042,0,0,f6501d9067f705e2792db78f5e5c3c0939468f1a27b5dfcebced4337049e26ed,2024-11-21T08:20:26.477000 @@ -236440,7 +236440,7 @@ CVE-2023-4508,0,0,ddcfeff3689ff681a56c8969c508364a5228b41d5fccf16d84adfe9f47e473 CVE-2023-45083,0,0,3743538578c2e9a7b3cf417e490ee04603f9bf5a4fa95a25f5e9054707035c43,2024-11-21T08:26:21.397000 CVE-2023-45084,0,0,e140cc27d5c28d76849fecef9ad885e226819fcb74c7da18eb83c35c56bcac1e,2024-11-21T08:26:21.520000 CVE-2023-45085,0,0,cb82bc80bf471263d5f40a4a24295728702a1b98bd6772e81c80d200fe1526ba,2024-11-21T08:26:21.640000 -CVE-2023-4509,0,1,f94021b4408adf16e1714a3c19253e2324a03d285b2fe014decd850bd9a1e299,2025-07-02T18:09:48.900000 +CVE-2023-4509,0,0,f94021b4408adf16e1714a3c19253e2324a03d285b2fe014decd850bd9a1e299,2025-07-02T18:09:48.900000 CVE-2023-45101,0,0,91b701945f1241c8f2e5a1f78802e24fe9b33b09efc15431dd320b8a1ed31cf5,2025-02-05T14:57:27.703000 CVE-2023-45102,0,0,8dfb431d08e4bb6547ac932a1cd7a69df7e786aae8df335276cb697f9eac6d6e,2024-11-21T08:26:21.757000 CVE-2023-45103,0,0,e13888dfbd39792b0beee4852b93eda208a746c1f407d0bd3d6d9dab70a7a0ca,2024-11-21T08:26:21.887000 @@ -237927,7 +237927,7 @@ CVE-2023-47020,0,0,77958b1e974ce3a0af29c7a34f0132e69536d415fc0c65e83c01b308bc43d CVE-2023-47022,0,0,73d82f89852a7fe6d598baa6e948b789fe12b29f69f371d14a570d87cb620bb5,2025-06-17T17:15:31.567000 CVE-2023-47024,0,0,c125fb103042924f5281e92be53a4da5c6431c794e2412cda8329c78f5f25120,2025-06-17T17:15:31.783000 CVE-2023-47025,0,0,66fd4d735d74f56390288fda0ceba4f40992fc464fda52a22d2276e16b06cc2e,2024-11-21T08:29:38.117000 -CVE-2023-47029,0,1,f354e0d314861ff3810be1e131692dc0d76cfe93a1ccf5f7f94664c270d7e2dd,2025-07-02T19:06:22.507000 +CVE-2023-47029,0,0,f354e0d314861ff3810be1e131692dc0d76cfe93a1ccf5f7f94664c270d7e2dd,2025-07-02T19:06:22.507000 CVE-2023-4703,0,0,a6d5e78e1192a3e0f4c01547c7f4ce3e0b04c7358d175d4096197c6b6119861c,2025-06-20T17:15:34.147000 CVE-2023-47030,0,0,93ccd1f7d36567d2d295f9d2eefa083e76664b4db1969b2faf0e950bfafbca21,2025-06-25T12:50:37.217000 CVE-2023-47031,0,0,a451f00aa91dc8a8504ff9338181d2c777cbbe9a238b568badcf58bf8e44beb3,2025-06-25T13:13:50.157000 @@ -238162,7 +238162,7 @@ CVE-2023-4728,0,0,c339ab5d87c7af4ab30b66d47f7562aee044b141169095045add07af35952c CVE-2023-47282,0,0,93bba9396c0f58046a2b076dfea038b721d5ee4b96d78dc125aa534f53adb836,2024-11-21T08:30:07.197000 CVE-2023-47283,0,0,6caec9eee746cdac4ea27e9ab2b0209b5ee8c2d3553a8d29b97a8533862b9ad7,2024-11-21T08:30:07.433000 CVE-2023-4729,0,0,f77231c363b30e96bfc2db8cebd3839401370fbb7b50252d996e4c9ee1c2023f,2025-01-15T16:31:19.903000 -CVE-2023-47294,0,1,0891f318a99f2d09fb329c085f755075f92b0879fa6d0ce3dd707982d03e4c13,2025-07-02T19:10:16.237000 +CVE-2023-47294,0,0,0891f318a99f2d09fb329c085f755075f92b0879fa6d0ce3dd707982d03e4c13,2025-07-02T19:10:16.237000 CVE-2023-47295,0,0,28a72d717c8a4fa3591c8aa3a96aa82e9fec7a018320bb6b31941ca440092c65,2025-06-25T13:30:08.523000 CVE-2023-47297,0,0,c14fd87e4e15a5f8e3c0ca94948127ff1c65a697a69ee20c14900dd6601ff3f3,2025-06-26T12:46:49.080000 CVE-2023-47298,0,0,4c4acd197c7d9d302a966e30e51e5a36b182be0dd23706e335a822f619b88bec,2025-06-26T12:44:00.433000 @@ -245677,9 +245677,9 @@ CVE-2024-10269,0,0,bb2a3cab40a3b831fa7114c2862087ff1fd138065989f0b23db24140c8ebf CVE-2024-1027,0,0,88d0ec1849f0d05d69fb41d518f3d3eea7fd3db3a17e6bfa013ac44746536bf0,2024-11-21T08:49:37.867000 CVE-2024-10270,0,0,421f39f32cf5ae0b6f47e1854986b3fe16c531173581711002b42dee462ad7ef,2024-11-25T08:15:03.747000 CVE-2024-10272,0,0,4f442f29307f7fe4036be7fda7d7f31f538cb47aef157e3f603bc675d724abf7,2025-06-20T15:48:55.677000 -CVE-2024-10273,0,1,b99eeb03b73538ed47e3d7a607111e4ebb0eec777d67674d1ab59477b6c1d8f3,2025-07-02T19:35:11.680000 -CVE-2024-10274,0,1,723f3e107ffa9063adac9c362f7a596f6db681264113e88ff1c1d74bca71b600,2025-07-02T19:36:18.843000 -CVE-2024-10275,0,1,f47d73a816c53cca67d2a586eeaee114b8100acbcb515f8fe9f63d3db92edde0,2025-07-02T19:44:10.070000 +CVE-2024-10273,0,0,b99eeb03b73538ed47e3d7a607111e4ebb0eec777d67674d1ab59477b6c1d8f3,2025-07-02T19:35:11.680000 +CVE-2024-10274,0,0,723f3e107ffa9063adac9c362f7a596f6db681264113e88ff1c1d74bca71b600,2025-07-02T19:36:18.843000 +CVE-2024-10275,0,0,f47d73a816c53cca67d2a586eeaee114b8100acbcb515f8fe9f63d3db92edde0,2025-07-02T19:44:10.070000 CVE-2024-10276,0,0,bbe5dca2c1dc09165161e39681c1afec6bdfb1c1343f5cc1f9d6b5eea19bb37b,2025-05-01T14:37:50.833000 CVE-2024-10277,0,0,e1fa37b2ed695484142d55c4ddb4c40c516da25ba5b81ab0ec41d2668f9b3fc4,2024-11-04T22:13:13.207000 CVE-2024-10278,0,0,ee389174d0d07be53228b369506eb2a5bd5fc093c877e739b81978bb42c04e5b,2024-11-04T22:11:53.397000 @@ -245735,7 +245735,7 @@ CVE-2024-10326,0,0,6eeeb54338e02e3b25be40bbf84444e0702dfe78c7e1bd0a270bb17e3e840 CVE-2024-10327,0,0,617a4d395486d23ce50d5a586c94c2ff3daf8827139e812231380168dcff8e94,2024-10-25T12:56:07.750000 CVE-2024-10329,0,0,94fb4c89783f4f56c3fde9a354774d639a28f26feb5034ca8d1df1766578ff46,2024-11-08T15:59:16.407000 CVE-2024-1033,0,0,0ebd094b5e36eb84c86356f7abcaa085e713213c3f39a08a73759a5dc273336c,2024-11-21T08:49:38.737000 -CVE-2024-10330,0,1,5a6b498805190a6d27c6b3dd99e053fe1340d1097bc72765d56b15447b8daf2b,2025-07-02T19:47:15.657000 +CVE-2024-10330,0,0,5a6b498805190a6d27c6b3dd99e053fe1340d1097bc72765d56b15447b8daf2b,2025-07-02T19:47:15.657000 CVE-2024-10331,0,0,545d86073c1b16b1e54e3aa12a73c5203a2e01c429347a56d6807bae364370b1,2024-11-01T12:41:51.470000 CVE-2024-10332,0,0,178b3b2d5779ad727e66a4d765c9c3bfa9f0c7bf18d561efe5247ecb16c1e02f,2024-10-25T12:56:07.750000 CVE-2024-10334,0,0,6fa8d04cf36ddff4c2f72241ffeda286c7e688d7b4196e8e08471b4591fd3ede,2025-02-10T15:15:12.010000 @@ -246190,7 +246190,7 @@ CVE-2024-10759,0,0,bbdf7a44e2df17995fc3ce93c00f06fe8f2cedf5b3758258953dc660e3e73 CVE-2024-1076,0,0,d6b7d15ad0127ffcaf72f056aa57d487e659f735a80893cb5d0c07667a853d1c,2025-06-17T18:53:43.263000 CVE-2024-10760,0,0,0b9b500e1019eafd6e558ce9cb0f21344fc2e3c4d0abc286f58598dd4ef95aa8,2024-11-05T19:45:47.893000 CVE-2024-10761,0,0,1cb3fab5d6d1f4f7f5fdcb5b145372ea58104799dd3c3bce34e56dcf696afb62,2025-01-22T08:15:07.060000 -CVE-2024-10762,0,1,e4ac77bd8763f10c0a337866ae7866ed197292b6f3be539a092c6f94d41ee71e,2025-07-02T19:47:49.677000 +CVE-2024-10762,0,0,e4ac77bd8763f10c0a337866ae7866ed197292b6f3be539a092c6f94d41ee71e,2025-07-02T19:47:49.677000 CVE-2024-10763,0,0,c84b0255641931d082631abd1cc7fda92c4e46c5a769f1ed64c15028d182d08e,2025-02-24T16:41:26.690000 CVE-2024-10764,0,0,363554fdaa09a90549e37c839266df04a89856b50c0157bbb3a4b35036effdc0,2024-11-06T14:44:53.410000 CVE-2024-10765,0,0,e30cd9d11a555bed376192e628278e56ac69b3a29cb754ff08918d36a8eb53cb,2024-11-06T14:45:35.600000 @@ -246572,7 +246572,7 @@ CVE-2024-11133,0,0,303e9becf34f489bb74b3f178e52cbdead1fcd42fc3bc65ffd28fc2c4e859 CVE-2024-11134,0,0,089169c177e677a380789df17eed101521b8b80a85cc2eaa375e39ac59d1ba6b,2025-03-04T16:32:22.030000 CVE-2024-11135,0,0,d8de5922b60e4931d635f75acddf5021e57eddeba122af8b647ceaee2fe873b0,2025-03-05T19:44:42.607000 CVE-2024-11136,0,0,14c34b52e51da32486499993d034c5625233241e56703eeb628fb429016a0b8a,2024-11-15T13:58:08.913000 -CVE-2024-11137,0,1,d803a2c8858f9aae62999e4f57dd7cba3f86b49b95491d5c9ceb7a9a00881009,2025-07-02T19:48:23.140000 +CVE-2024-11137,0,0,d803a2c8858f9aae62999e4f57dd7cba3f86b49b95491d5c9ceb7a9a00881009,2025-07-02T19:48:23.140000 CVE-2024-11138,0,0,2f34cc7cd067d0c6304b6c652f672298f3f38bc0e02398b29badaf312aaed525,2024-12-10T21:11:45.043000 CVE-2024-11139,0,0,2d6fd6ceae8e9f801cb28510138174f054ac674fa052625032eec6de670d70fb,2025-01-17T09:15:06.370000 CVE-2024-1114,0,0,26f8d922f7817a26291214f4551b12b577ca7b3e88078b0c0c71e617799dfdd6,2024-11-21T08:49:49.727000 @@ -246742,7 +246742,7 @@ CVE-2024-11298,0,0,cd8027ff7c1e39b70cf43f7d5a6cec3a72565a042c79fb93ed3ff58ccba5d CVE-2024-11299,0,0,5b4394fe2aa80862409246ed4c3feac26c1712c3bcb574f58a66e2a4a1c6972d,2025-04-30T14:52:15.387000 CVE-2024-1130,0,0,679ee2f34d13ebb9df2fe1e2f1252066bb0e47c7a2921656bbd7730c6eaa121e,2025-01-15T17:29:06.433000 CVE-2024-11300,0,0,17e6044959868c1f0bfbb5c535147bb16853bb47032cabda2a83334d5515df63,2025-04-01T20:35:24.003000 -CVE-2024-11301,0,1,6225e7ece5150f1b1553eaf7df199f06f4f4064fb3a19ee088059485638e06b9,2025-07-02T19:48:49.337000 +CVE-2024-11301,0,0,6225e7ece5150f1b1553eaf7df199f06f4f4064fb3a19ee088059485638e06b9,2025-07-02T19:48:49.337000 CVE-2024-11302,0,0,a9e7c5f35aa45cf3a68fe4e8a0b7ad7e381f05d31f40f556663ee486cb82ae77,2025-03-20T10:15:25.003000 CVE-2024-11303,0,0,de43b70f5f22d5d570b4c2c539e9b20cc817dc3ef76e189e06955f2c2af2eb2a,2024-11-21T22:15:07.213000 CVE-2024-11304,0,0,0ff719fe517b127c477c9f0080aa8ce846c0a32261aa4bc0cacd8fd67151b1ef,2024-11-21T22:15:07.470000 @@ -247738,7 +247738,7 @@ CVE-2024-12251,0,0,f8224b4c39bb6ff66af3b002f83eca082baa817480b19609180c28190f340 CVE-2024-12252,0,0,f0cb19f49810803840f5ee985f8df8513974df82162830a7e3c14eaee14d9385,2025-01-07T05:15:16.660000 CVE-2024-12253,0,0,ddc85ae180bc30a65db67a43f7fe8d6c4299882333782166c00f6946fb3a98d4,2024-12-07T10:15:06.030000 CVE-2024-12254,0,0,976d5bdc66f5280972e0a945f02b4d24fbb18a073445a80e18a1cdb637f945ee,2025-04-04T23:15:39.980000 -CVE-2024-12255,0,0,3e6ee7ef8ecf957b3c9750bb4e9452362942858fad7f6d35e3c4d339eaa5898b,2024-12-12T15:15:09.967000 +CVE-2024-12255,0,1,f9e7fa18a777f074cf9f4ebb79aee4fd7bcb7bf62d73f2eb1283b313a6b11fa0,2025-07-02T20:06:31.637000 CVE-2024-12256,0,0,c941079a381520ece27502570cadaf7ad5874ae769a71d660938dc9b1a958440,2025-01-07T05:15:16.857000 CVE-2024-12257,0,0,51052901a7cca4cc3e08f8db1db23715b8800d7e5a86753505efbff635c332e0,2024-12-07T02:15:19.187000 CVE-2024-12258,0,0,3eb19625a1330fc72081e9c0b05d899d6c52aedf5334c3f98a645064595ca085,2024-12-12T04:15:07.160000 @@ -248159,7 +248159,7 @@ CVE-2024-12658,0,0,660d38c39623ff82f2493210faedf64d2df3c4a27194d20971b3a3cbb4cd7 CVE-2024-12659,0,0,116b271a8259e00752a6db2ed55fb8c06bbe6ab2e35e4f94d9c78a27c4e7a0a7,2024-12-19T14:49:24.747000 CVE-2024-1266,0,0,2a4a1a9a97982898c100d9d9cb94e7da9ed50410ea3a8e686081520943168bc9,2024-11-21T08:50:11.767000 CVE-2024-12660,0,0,1be5de9c4da1baae53520340558ecfdc75e086a26bf9d397bc573d215373259d,2024-12-19T14:49:52.357000 -CVE-2024-12661,0,1,57bc0c3e56680b2b26dbfdde9021c17660305f6013db1d413f20d673ca1f87d8,2025-07-02T19:09:06.467000 +CVE-2024-12661,0,0,57bc0c3e56680b2b26dbfdde9021c17660305f6013db1d413f20d673ca1f87d8,2025-07-02T19:09:06.467000 CVE-2024-12662,0,0,7b96f34669085c4823ad63e363326704524182ece7e82bc08beba6f210f6c9ab,2024-12-19T14:45:43.547000 CVE-2024-12663,0,0,38c203f9613e213521137748477df599864fe9f022d1a6f0ef81d9fb28c81fd6,2024-12-16T20:15:08.963000 CVE-2024-12664,0,0,1756d032c2c12fb2b7ecf9f35feee6496c6bcaf3c242debe315a55e136b7d073,2024-12-19T14:55:00.460000 @@ -248386,7 +248386,7 @@ CVE-2024-1289,0,0,f8c8a55f2a440d9e8129941363295ecfe343266b0f62bd6ed92e6812c89039 CVE-2024-12890,0,0,e2f73fdaf8c4ef5e556a453d5bfaa3f903b2ab4fd1e2980fe92a08675a75c831,2025-04-03T16:34:16.893000 CVE-2024-12891,0,0,b740369ab4eecee7f2ba03eeffe8e52609e68ff3d8a7086ca071eb45f72087ba,2025-04-03T16:34:08.690000 CVE-2024-12892,0,0,29c077f75a1118a1ed7617444ec6d09dcc3f84bdeae9786eea54babcfaef1c6e,2025-04-03T16:33:44.877000 -CVE-2024-12893,0,1,c746937e54bfa12137a052a993d1b33568ea8fb9bb6bbfaffbab1300d47938aa,2025-07-02T19:09:29.480000 +CVE-2024-12893,0,0,c746937e54bfa12137a052a993d1b33568ea8fb9bb6bbfaffbab1300d47938aa,2025-07-02T19:09:29.480000 CVE-2024-12894,0,0,1e10666d8acc6c61b752f325ab245ea683d5c0b34b3d8a2e36aed876a59d8d59,2025-01-10T21:12:49.420000 CVE-2024-12895,0,0,508317eaa9f408889cb5852800e668256aecfd2ec6475ea355129fcd0828dab4,2025-01-10T21:14:24.240000 CVE-2024-12896,0,0,ca6278e76b896e6f263468efff1622abbcaddec6824cd88839d8b751927785f2,2024-12-24T16:15:24.153000 @@ -248703,9 +248703,9 @@ CVE-2024-1320,0,0,aaaef1a9478a9ac2768f9b592c02529e1f1a3518e3f017f4f309a188cefbc9 CVE-2024-13200,0,0,d822abfe6e5e94a697ac2e9a1763a17382b3dffc110b1c5388c29c0804177820,2025-01-09T03:15:23.820000 CVE-2024-13201,0,0,5d359878f9b931ff0ca27dbd2120d63d4ca3a12566a5da18deebf81e1b6c50cd,2025-01-09T03:15:24.020000 CVE-2024-13202,0,0,f279d957bc8c15549a1fec1f8d734e200c7292a1f3e6ec699b88a8730e6ea9a0,2025-01-09T17:15:12.110000 -CVE-2024-13203,0,1,9705c29b8f871ad171b9611037f417cc06952b9e0e2c9a17f04e7637c3cf9fc8,2025-07-02T19:10:33.930000 -CVE-2024-13204,0,1,8e44c9562524eef9dd90633de35532c3f176504884fae9d025814c79778b5e0e,2025-07-02T19:10:51.463000 -CVE-2024-13205,0,1,dcea910338790025bd48cd39fb8d1254813858a4906d15f53839b63656fc82e1,2025-07-02T19:10:59.873000 +CVE-2024-13203,0,0,9705c29b8f871ad171b9611037f417cc06952b9e0e2c9a17f04e7637c3cf9fc8,2025-07-02T19:10:33.930000 +CVE-2024-13204,0,0,8e44c9562524eef9dd90633de35532c3f176504884fae9d025814c79778b5e0e,2025-07-02T19:10:51.463000 +CVE-2024-13205,0,0,dcea910338790025bd48cd39fb8d1254813858a4906d15f53839b63656fc82e1,2025-07-02T19:10:59.873000 CVE-2024-13206,0,0,38f706ce6b6c370d84f9fdfa1a0fa83d7b17374dd65798f61119206bb3782636,2025-01-09T04:15:10.990000 CVE-2024-13207,0,0,3dd3df33280782bf57f7214c6ae8f2fe091c3ded8c8b55211d10abd97ff87f20,2025-04-29T20:11:23.573000 CVE-2024-13208,0,0,fbcc7fb88734920ac7622aaa96691cf6208c93c520208996bfc4dbe74f31382d,2025-05-14T20:35:16.690000 @@ -259223,9 +259223,9 @@ CVE-2024-31652,0,0,cd620e76c3a3b5773fd0b42a3a685acd481dec307908c8df3a6879a1a3b7b CVE-2024-3166,0,0,7c4799e6f2d4de4c6793757b3de0601ca1d1298c8c6272ffb0dc9b3a0678bb7b,2024-11-21T09:29:03.133000 CVE-2024-31666,0,0,9feb924667e4d55fe73065a5c4296ea21e1ac0f03e29d40ad28b081993f9d303,2025-03-28T16:00:36.103000 CVE-2024-31668,0,0,92d852b5513f85b46c5c8aacca49dc78103d1045b501ee09fe75860fd2d477f4,2024-12-18T16:15:12.693000 -CVE-2024-31669,0,0,e67157c072d6472b13e8463ea23f9b22948945715ffb2a3485fbc46118d6e7b5,2024-12-03T16:15:21.540000 +CVE-2024-31669,0,1,7c7c298661c05091696213a278cebfe5e8ab98503171568287612d5df4b82ef1,2025-07-02T20:36:02.780000 CVE-2024-3167,0,0,b0bdf42e92bad376276c8af48f28639bc7025690df7bfcbc255509f46b757355,2024-11-21T09:29:03.290000 -CVE-2024-31670,0,0,485c6b39a9c06c65b704780df5587d61e2c68aff13a9abfb705a544147e51149,2024-12-13T18:15:20.167000 +CVE-2024-31670,0,1,1b78a8a9417b6d13f96bde82954389cfce36a53143f6ff2e04417fee86967b90,2025-07-02T20:05:47.947000 CVE-2024-31673,0,0,daaabfb840b3730af21ab36c24cc562730d3a8e824427e5f8ad6fa6a3f345120,2025-06-17T15:05:11.003000 CVE-2024-31678,0,0,4d44fd7de319bb3c3e3ca325e023129ab6329704291ba3ed2bd041396946b733,2025-04-08T15:20:02.083000 CVE-2024-3168,0,0,877aaf095d6020a88ac424b786e5481114bcabd626ac29a10ba6589de92c2016,2025-03-13T14:15:29.337000 @@ -263087,9 +263087,9 @@ CVE-2024-36618,0,0,62c87a1bff03a64e4f28a666c51b4b62b72812b9ffc80282cc17dc0940ecc CVE-2024-36619,0,0,25c66a36cc573eb50e022a289bcdcf146eeaea7df50ea0a14f20d5577424d417,2025-06-03T16:06:04.510000 CVE-2024-3662,0,0,8d6ed9bf9906e37e9ee1a22ecd8054bc46ce6b65afee8d23661f06eab90c13fc,2024-11-21T09:30:07.787000 CVE-2024-36620,0,0,e7fadb7af6f5a78b8c55d69ecbdd641820ab4cc821b26169ef5eb1f1ac8b3c39,2024-12-04T17:15:12.890000 -CVE-2024-36621,0,0,aaf0328dbf2afd58578f5ffa16091dd967860c37f203448fdc0268c980dab4ef,2024-12-04T17:15:13.067000 -CVE-2024-36622,0,0,07de4151f2340ac6d06674e425feabdd5df0677a18b73b685b4c7de1fe1f2642,2024-12-03T16:15:22.343000 -CVE-2024-36623,0,0,2efd80dd8d9bbbdca40b71283df2be6fa3e1bbaf45e89ff3c5b0919eb6fef43d,2025-05-01T14:15:35.340000 +CVE-2024-36621,0,1,f9d2908d14ad8cbb33679837d43a275001af76a8287a86296ace9e6d4aae74d7,2025-07-02T20:43:30.047000 +CVE-2024-36622,0,1,ee8ef64e9d1ab4e12eadc6267b66dea36560b42ddf16b4d3e246de2397ca176b,2025-07-02T20:41:55.433000 +CVE-2024-36623,0,1,3c51c7d22761c4b54b8bc7bbdd9ff83d36237169e2d8b8d161c831f7f374a346,2025-07-02T20:36:45.220000 CVE-2024-36624,0,0,fdc7f23fbe63d2cdb59da638c84f39b48f5c43770d98e1865c028f25cc604428,2024-11-29T19:15:07.923000 CVE-2024-36625,0,0,4a041487d3f029331c4bac0b4c0a56e68cc15b0c6d2de96e45c99b08fcea151f,2024-11-29T18:15:08.607000 CVE-2024-36626,0,0,ddfefccb9c7c111af71afd167e3a259095102573d138ddc44028818aa56910d5,2024-11-29T18:15:08.840000 @@ -263696,7 +263696,7 @@ CVE-2024-37373,0,0,2847e99c027e210636b1d596d67704fa58348616cd3faf9bd4b3793a4d930 CVE-2024-37374,0,0,a3f6a856277d969b5278070e608360817edf02cab5ccf8d8f18d5284d45c7fd7,2025-02-15T01:15:10.570000 CVE-2024-37375,0,0,8217c80f0bd457ad7fb99331336c4763aefd1b5314374f4e51de6172c1073d6d,2025-02-15T01:15:10.650000 CVE-2024-37376,0,0,daf6c4d98c4582c652276d94c5995189b0a6fd61725f60a72793dd5b59839fb9,2025-05-01T18:01:46.330000 -CVE-2024-37377,0,0,caef14ff514966e0f1ee38c7ff4edbc7bd09ca12f789eaaa3ae9e03a1f92295a,2024-12-12T15:15:13.500000 +CVE-2024-37377,0,1,a16ab8135cd25161e11b9211eb78f67c2eee50fb73a0b380f70e60012132a023,2025-07-02T20:26:04.183000 CVE-2024-3738,0,0,6b7c5ee43d749786d04736c3425539aee3d10b90489eb5acbf775617e1e2b292,2024-11-21T09:30:16.940000 CVE-2024-37380,0,0,77cf3dfb25923a81bead84472c82f0af78f2d433b4d7604e764b919f8522c470,2024-11-21T09:23:44.180000 CVE-2024-37381,0,0,9f8a1e24016e672c46f9ac1942c6c3e469697399412e29900bea76bbfcf0caef,2024-11-21T09:23:44.310000 @@ -263720,7 +263720,7 @@ CVE-2024-37398,0,0,0f42760c0326cdea8f98f78b855bbf63b71770b97a72517371b459e84e271 CVE-2024-37399,0,0,91513a99b1995bb678a44db233b24968cd7625f00c77086c4c8d80914d8fefca,2024-08-15T17:31:49.067000 CVE-2024-3740,0,0,f1db815ebd196c841f9a03e4af1f223458e4ef3810b51b1b12ab408848abbe0e,2024-11-21T09:30:17.230000 CVE-2024-37400,0,0,1e14e88d44c848ea44c9bbe92279b9c2f34340798a2cb3eb210a97ba1aa452e9,2025-06-27T18:46:03.483000 -CVE-2024-37401,0,0,5a3af3f5613cf18b6fb0d152156b5ab3157faa43dbf40e0bf8bbef7d6755b5e1,2024-12-12T15:15:13.877000 +CVE-2024-37401,0,1,5d6699101ec368a4740a824e0928a231ad40e96d0b2a93b33a6f4100e5f3fff9,2025-07-02T20:07:12.820000 CVE-2024-37403,0,0,5e662ed809b0b10e6b99aa8c2f4ac8b35c922847c3b6d64b5b20add4d0709792,2025-03-25T17:15:57.523000 CVE-2024-37404,0,0,cb110a34d87f4812dc406a460298c89dd3f74daf508e6083996d73ed421121f5,2024-10-21T17:10:22.857000 CVE-2024-37405,0,0,3fb82c05472465d4a94ae43ca82eb762e9089f45f86f1b3cd3cb77a2d12c0c24,2024-11-21T09:23:47.573000 @@ -269762,8 +269762,8 @@ CVE-2024-45201,0,0,1008d923104020063a79ec3ff9863805234d3d78944913eab118b0fc97b0b CVE-2024-45203,0,0,88d501dfc424f0e16923ae703e15eee937ae6b3d90cede56c1d4b11c192d7644,2025-03-13T20:15:22.630000 CVE-2024-45204,0,0,c17d724ab71326993fc885d0d9808c0b2eaae94c47b7923f22dde16d2eff63f9,2025-04-24T16:59:33.837000 CVE-2024-45205,0,0,a10f061421a2a3424e1b6c374ce4a524c46fcb2bdda2afd1dfd63ddbb6391abd,2024-12-04T17:15:14.330000 -CVE-2024-45206,0,0,d9e968acf0dd8b42fc18894be4d96b31b86b907e5133e5110d37345500c02d41,2025-03-13T19:15:48.013000 -CVE-2024-45207,0,0,c6ee04eede270568245ffcec461ab781dd5d887b6f188268b86eaa3a09be9e39,2024-12-04T16:15:25.580000 +CVE-2024-45206,0,1,59696493804a40bc8906cc19858af6db25f4cab9c3124ecf5e6625ca82a947e4,2025-07-02T20:34:43.323000 +CVE-2024-45207,0,1,f931bce30ac6ec0212eae4286db6adba9745eb0609af5ad3101b7112da783af9,2025-07-02T20:29:56.867000 CVE-2024-45208,0,0,db1fbdffa5214c693071c57618b5195bfb9a8bab8d8ca4cc65fac4eeef686294,2025-06-23T20:16:59.783000 CVE-2024-4521,0,0,4a1a789411022da9e12743f86f636c858525a8f77c0a3180e65a51191dfff476,2025-02-19T18:01:20.563000 CVE-2024-45216,0,0,a409e39e2e64d050771f416dcd29e4ec99d053af119629d20c842c9e04bc2f80,2025-07-01T20:28:13.847000 @@ -270025,7 +270025,7 @@ CVE-2024-45493,0,0,63ded12e1cce66753793ae82bef6c61efd91f10fe98a5bd1c054c3ddfbe0b CVE-2024-45494,0,0,e62b8176d74731dfdb1c9ebc3d4575fcabd14aac12deeb9776633eac1b50aecb,2024-12-17T19:15:06.497000 CVE-2024-45495,0,0,052cbd46ff58a2733b006c164c39180c42ff3c9c0f05edf173b6ee70b661cd18,2024-12-04T17:15:14.537000 CVE-2024-45496,0,0,f647c5447ed213c353caf91ddf707bc78331ddddcd98c233146cc0a0d9ee301a,2025-01-09T09:15:07.600000 -CVE-2024-45497,0,0,53a7f15546741074e12fdf12aa0db1b6ceecb91ed174d672eb3ba1967d3337c3,2025-07-02T09:15:23.290000 +CVE-2024-45497,0,1,27067e5a7e8ca6f8560a908cfbd7cb8ad5ac323dd2ef2c71ed66f5404b6f4758,2025-07-02T20:15:29.150000 CVE-2024-45498,0,0,1b37b8abea607b55d06bdeca0f52a798741defd10e0d0992aaa1892048a4a705,2025-06-03T21:12:43.280000 CVE-2024-4550,0,0,d020c2baa57a4c8c78c6437cdbbe1c555a0bddf99dab5627801ef1d8b20c6e80,2024-09-14T11:47:14.677000 CVE-2024-45504,0,0,117e3b0ea98f4e26734959281e27af071785e94eccc716f5288207bae003b1cf,2024-11-04T21:35:09.173000 @@ -274004,7 +274004,7 @@ CVE-2024-50695,0,0,a8e5ee5cc10be805e3c4e996405c61809a60d1d6ddd9bae02633187192d0d CVE-2024-50696,0,0,49d7ba99b4ac37eed2a024d1d30c4a422fa564603999c94e5aa233896ef00f04,2025-04-07T18:48:52.107000 CVE-2024-50697,0,0,51d665dbeca89a90870b833eb56e0b112fdedf1185882e0efb70f0cd1cbfd406,2025-05-29T16:02:02.670000 CVE-2024-50698,0,0,7e1e58e2fa9dad0c12ad8622265abb94ccbd43282e31206a6e7638cbcbb39c14,2025-05-29T16:01:55.367000 -CVE-2024-50699,0,0,b7bfb9ce8d871e66c8bc846d040c669e65be2a2e4a5ca2c2838499d7e02651cc,2024-12-11T16:15:12.720000 +CVE-2024-50699,0,1,90b0d7dbae9a9ca912ecbbf7a7a08214d658cc8df69b04058b315d57da5437b2,2025-07-02T20:28:26.957000 CVE-2024-50701,0,0,a80b1dc6acfa0163b2b418f9af2de103abd46652e86be76b69c935d1bde098bf,2024-12-30T16:15:11.387000 CVE-2024-50702,0,0,364da4b19de28c5c7b507be40fbdae2c11e3df8d6828b6df401d4df157b3f54d,2024-12-30T16:15:11.550000 CVE-2024-50703,0,0,e1914095d1b7a0ffe223f333a29d6d8f0777fb87821c72e0f90605f07525e975,2024-12-30T16:15:11.713000 @@ -280462,7 +280462,7 @@ CVE-2024-7472,0,0,de0c1c1a6d606e95989fe7fe23b929a31aec4fa2eabaf43817b16d02244205 CVE-2024-7473,0,0,b8dc981d2d85278013abb8b222f018481282dc1a8b74ff93c8c1b319e96a9851,2024-11-03T17:15:15.493000 CVE-2024-7474,0,0,4bb7bfd29d1bc5751b49854603ab81b86841ddf06908a96e8a11dc8238ed09e9,2025-01-09T18:15:29.380000 CVE-2024-7475,0,0,7bbd1b2dc6caeee9f6f7cf58e1447eb5146831b0c5f989701c0b6c3d0833ecff,2024-11-04T13:55:37.233000 -CVE-2024-7476,0,1,11ed9f196a60a925bd68ba4f51a007360d4e4c3b5f7bbf94aab2604fe522073f,2025-07-02T19:49:07.510000 +CVE-2024-7476,0,0,11ed9f196a60a925bd68ba4f51a007360d4e4c3b5f7bbf94aab2604fe522073f,2025-07-02T19:49:07.510000 CVE-2024-7477,0,0,6c6434fc676e81002c750c9627714098eaf963ca81b6eff0a8aeb3b62c2e1988,2024-09-11T15:03:06.637000 CVE-2024-7479,0,0,2ea71efff98f3f4975f4e7b351509dce6668cdd1c5b196a9e030ff840526ff07,2024-09-26T13:32:02.803000 CVE-2024-7480,0,0,889913e08b28911ab727e916e197e7a32d9902edd6649d9f23fe700790b2a411,2024-09-11T15:03:37.293000 @@ -281683,9 +281683,9 @@ CVE-2024-8759,0,0,8f91dc531a873b29dfdf6fbd42af16f8d3159a182f0ca9db9db9f35e40cdf8 CVE-2024-8760,0,0,f43fa3e1b72e595062f394352cfb1e3caedac57a707088dc78ba85c7fa736094,2024-10-15T12:57:46.880000 CVE-2024-8761,0,0,950b3a9df3cc991d5c0bedc660970e758785bfc0f8e6d816aeaf43e66fff13f1,2024-09-27T18:41:43.043000 CVE-2024-8762,0,0,3b421bee27666c9e7bcdd06dc59315fa24346e5ae512b3889caf5a60eb7e32fc,2024-09-14T15:54:10.687000 -CVE-2024-8763,0,1,9841a18e4cc930f4925ff99f7d7ae8367c238719036df31068ff81343f9ff5b6,2025-07-02T19:50:00.760000 -CVE-2024-8764,0,1,95b4c496f3a932b56f69def6b05425d870ded9788671f9813e48047637114ce7,2025-07-02T19:50:32.273000 -CVE-2024-8765,0,1,e2d80212eeb336f89e52548d9b96ab4b32fb82b57dfd293f0262e945a0e39542,2025-07-02T19:51:11.997000 +CVE-2024-8763,0,0,9841a18e4cc930f4925ff99f7d7ae8367c238719036df31068ff81343f9ff5b6,2025-07-02T19:50:00.760000 +CVE-2024-8764,0,0,95b4c496f3a932b56f69def6b05425d870ded9788671f9813e48047637114ce7,2025-07-02T19:50:32.273000 +CVE-2024-8765,0,0,e2d80212eeb336f89e52548d9b96ab4b32fb82b57dfd293f0262e945a0e39542,2025-07-02T19:51:11.997000 CVE-2024-8766,0,0,6a1d0fd4381a2aefa3c3ebd3af5a6a5535392c6f90911151b52ef1d8a2df5478,2025-01-02T16:15:08.817000 CVE-2024-8767,0,0,33d117715b6ccb12375aec292e3823ec127bf8cb9f35e261208b79e9c4041c2f,2024-09-20T12:31:20.110000 CVE-2024-8768,0,0,68f3eb07488e96273391cb6bb54e3745accce33e0ac973772852eacb968b15fb,2024-09-20T12:30:51.220000 @@ -281844,8 +281844,8 @@ CVE-2024-8924,0,0,fa653b47436154676c3f1b541069065d978b00290a8ee89e15492973ea1ea9 CVE-2024-8925,0,0,f8e6224c919b32dad944cbb3d7da3b4d7b30369cbcd1a2c103a12e6bb26c7138,2025-03-17T18:15:20.433000 CVE-2024-8926,0,0,fb965ebd8a92fe27f14e71c494d4747397dd6fd47d2404bcc941456ac9c9eaeb,2025-04-24T22:15:14.663000 CVE-2024-8927,0,0,aafe8ef71dfcc052ecaa8fa4a1e0007cf5cf5ad740e9765835524ef8a42eab43,2025-03-18T17:15:44.707000 -CVE-2024-8929,0,0,ff6a045732aac1c81eaaf843b68c1293fe05ebd7ecf4460b6fec091ede522e48,2025-01-10T13:15:10.460000 -CVE-2024-8932,0,0,c5fffc9638f172950dd3b0bc71a124092612a89bfe67c2c048ea6a2b2b43d457,2025-01-10T13:15:10.617000 +CVE-2024-8929,0,1,b9d81acd55c07a73552846699b7a13b15a1e733925c70fe38246b0610deb010d,2025-07-02T20:11:20.063000 +CVE-2024-8932,0,1,404e753499a4a20ac9ba63130e63473ee83f2dbac0e437e544448ff8f6952c8d,2025-07-02T20:08:35.010000 CVE-2024-8933,0,0,e152f6df34730481cad628f83b188861c2c7c15e75dea66549d9b61f891274d1,2024-11-13T17:01:16.850000 CVE-2024-8934,0,0,ef1f8f6984d6b9c4cfe47d2ed66bbef40367f32f9c9af452fc22ae5c4812c362,2024-11-01T12:57:03.417000 CVE-2024-8935,0,0,3134dacd24f5b1cf37b3337cc4cd7783ada25f9c365ac8d35d10490670825111,2024-11-13T17:01:16.850000 @@ -282874,7 +282874,7 @@ CVE-2025-0069,0,0,d7ac8ba36cfcab8a8836c1588e52e8bbaed2d415e393c11bf82b7bb82617b0 CVE-2025-0070,0,0,dbf9edc467887c587ee503735d983d3eb618b4cd55fb133fb8e2178f124d6f6b,2025-01-14T01:15:17.427000 CVE-2025-0071,0,0,a9f17b8587d9681508885fa05b5cb6e1fb480f5738675f612162a9b567f90271,2025-03-11T01:15:33.917000 CVE-2025-0072,0,0,7c68681d522f867cd278cffcb4470ef78b9648796a6206167a2247ec164299a1,2025-05-12T16:15:21.587000 -CVE-2025-0073,0,0,f6a29770af6bbc103680f6db7dbfc3d85fdf01358f971fa2c75114246009b84d,2025-06-02T17:32:17.397000 +CVE-2025-0073,0,1,dada6658789f56fb64564197f1ffc1b8028bfb6db99ba6cd6d93031c5a423beb,2025-07-02T21:18:03.963000 CVE-2025-0101,0,0,391653291dbc9e356bdd9f7cf48cb4ee16c22960b84cfac559c323183419fbd8,2025-04-16T13:25:37.340000 CVE-2025-0103,0,0,06fd8d922bac50d8ab7e8102b5457a5978f502265c9b1059554ccaf6e0c9679c,2025-01-11T03:15:22.020000 CVE-2025-0104,0,0,dc4c81878786bc602ee20c50b1dae485c1da904352cbab72ccb96b2a9dcd9e75,2025-01-11T03:15:22.183000 @@ -283454,7 +283454,7 @@ CVE-2025-0814,0,0,275433a2e2c23056d581480e8763e8e9197d76ff67d734aa21e397b5cac2bf CVE-2025-0815,0,0,f73b50d64016c2e64fd2df2d6c90edb74018594168bb3b9f019d2de177423288,2025-02-13T07:15:11.160000 CVE-2025-0816,0,0,d49cff9b1300ba83e836640c26fee4d28d3c84d54249c4f7af3bef6763c2c81e,2025-02-13T07:15:11.353000 CVE-2025-0817,0,0,11343ed20662b8da62be45ff4c13d864ae4d9a05be3d231b0a3e4a5cb280e5dc,2025-02-21T12:15:11.963000 -CVE-2025-0819,0,0,bdaf17bf70e25617b1e90a1272039a5410ce1c65c874d7bdd41c6cb02c05003e,2025-06-02T17:32:17.397000 +CVE-2025-0819,0,1,528b6ca4483b4651cbe9a0a186ca398be698967851a1a8e2364971c90f5291f6,2025-07-02T21:18:07.187000 CVE-2025-0820,0,0,6d45f28eb00b0039ad804e065c885bf40234d2bcc3aa26a58867a7f5eaafc285,2025-03-01T05:15:15.953000 CVE-2025-0821,0,0,276d38f36e1718392d91943f87a21d4117bd30970ca15dadffff44ef97d51e0f,2025-02-25T03:42:52.263000 CVE-2025-0822,0,0,4c844a6713ce2631895193eac241699c6c3839eb1c8dbea359488af5de55887f,2025-02-24T12:36:46.670000 @@ -283657,7 +283657,7 @@ CVE-2025-1070,0,0,63c9f6366f7886d6af04d22c614f55b0f42e20f4e6634878d1102f0014dfbf CVE-2025-1071,0,0,ec670b61a4cae3c6bd1b5d7c58db808e7643f8c91b0bf1aa44c5e336a078699f,2025-02-14T14:15:32.560000 CVE-2025-1072,0,0,bb0514ae35802411e3da1596896cb302b1b469b7b79e6814634b3c15db99cbed,2025-02-07T04:15:07.737000 CVE-2025-1073,0,0,60172e8f6f7042a3e0dae5bdecfd8cea2f2f414971078e028146b285831b8bc3,2025-04-11T15:39:52.920000 -CVE-2025-1074,0,1,fa27fa0c9cb977dbec9e01b7e0e09573d564049dce536c4e96cb4da4f04b16cb,2025-07-02T19:11:15.693000 +CVE-2025-1074,0,0,fa27fa0c9cb977dbec9e01b7e0e09573d564049dce536c4e96cb4da4f04b16cb,2025-07-02T19:11:15.693000 CVE-2025-1075,0,0,797c9475355694050b39edcabe9ae24db6febfe58de9ae04f1e1ad1e92e5bacb,2025-02-19T10:15:09.043000 CVE-2025-1076,0,0,0fb5ade089952c20fae90954aaa2f08206a3bcb696af25bbf4ec969a8662af5f,2025-02-06T14:15:30.287000 CVE-2025-1077,0,0,88be144d908f74868edd4d84609ed66b73f57b9c8388994c4810420e7c62d244,2025-02-07T09:15:08.380000 @@ -283802,7 +283802,7 @@ CVE-2025-1240,0,0,363ac0ec488e57d295d78c481b595c1c1507ba076f5813d8f4f20530988afa CVE-2025-1243,0,0,b36908327b1b41fa664c4a39c71934592fd1d75bcc40ba67f7d64ed64955da7e,2025-02-12T01:15:09.073000 CVE-2025-1244,0,0,ca7dde03c53f2f538c0b12fb599e84ae66a426ff6488b7e67f4989aba1f7a6f7,2025-03-13T14:15:34.977000 CVE-2025-1245,0,0,02f6531ee412acf536871fa74be895340813b85f3805e0a3e6f8a053107da143,2025-05-16T14:42:18.700000 -CVE-2025-1246,0,0,266a95be5134ef4b55d24992997b7f1229c8a727bdfdfdf4f14f294d872f0d25,2025-06-02T17:32:17.397000 +CVE-2025-1246,0,1,ba71751fa27047f7c79c3e8dc96ae22f8996ca289dfa9df416ee4c290be2b815,2025-07-02T21:27:05.870000 CVE-2025-1247,0,0,413d4bcd6e00b55487b15f2b541fa31d8a6169438afa6345f0107f85b8ddc727,2025-03-03T14:15:34.120000 CVE-2025-1249,0,0,6a7f3a2500b58cdcea7c9e46385c15368818268591d8a8d12de3eb4b42bd3d72,2025-02-26T15:15:24.470000 CVE-2025-1252,0,0,eef150a4ad81125836b2e5c10bdfbfd08634b9526bf9de1f39407e70823ba714,2025-06-05T14:31:07.047000 @@ -284200,8 +284200,8 @@ CVE-2025-1728,0,0,126b29abd5a8b7142eab21be075a4425d5b9e0d4bb1eedd2c9477807954e21 CVE-2025-1730,0,0,1995ccb1e144a2c7a6984fe76cde065e7b6f85edc7bf90ff89583ed751f146df,2025-03-01T07:15:11.380000 CVE-2025-1731,0,0,6cda5a39952dbb72fa0562ae6653e830de6b4814d02aafc6e5dc87eccf1d921b,2025-06-12T07:15:23.537000 CVE-2025-1732,0,0,4f17f76249b0949cdce334206f9e87f9bb21a194c5034bf6b38b1f20a234be49,2025-06-12T07:15:24.120000 -CVE-2025-1734,0,0,dd726e0e9f8572ae11922e7390e5eb39ee22b5717e7e4d56ed056f32ac64ca1e,2025-05-23T14:15:26.087000 -CVE-2025-1736,0,0,a8a0b6e522595e6c6789f877a806c710ab0238e7a997a6d116d5acfa113937b6,2025-05-23T14:15:26.203000 +CVE-2025-1734,0,1,9ca53d91c8f07fb7aeb2fb76e0c547c53292f2008c24ec1e6e7dc553df762068,2025-07-02T20:13:31.447000 +CVE-2025-1736,0,1,2cb7db9ff654a6577a0a5fca10cf4357e9656f3556a748e86223fabf40f575cf,2025-07-02T20:14:40.817000 CVE-2025-1738,0,0,88cd928ab6b3e7b21edc6d43e0b3a3d2962b8b23417ddd8c84224e61394ebbde,2025-02-27T13:15:11.720000 CVE-2025-1739,0,0,3fd0271bebf5dab4e4b7dc5bc9151c4b432e19911079ec61b281141a587b7651,2025-02-27T13:15:11.883000 CVE-2025-1741,0,0,e3cefbac58ae300d7a16e849817a4e07ca1da020b4a797f97ccd724d6b4aefd2,2025-02-27T16:15:38.930000 @@ -284305,7 +284305,7 @@ CVE-2025-1857,0,0,103488c59c7a3d799f85f8b3efbe569a5fa266b7447ed4b764264983fb4cd7 CVE-2025-1858,0,0,d219d72b5d3e367e984fc9a00844c02aab063afaf214c90b6e3c689da36b22a1,2025-03-03T09:15:38.857000 CVE-2025-1859,0,0,715968264e27416be4e429a636c651518503d08e64cf5ab3dbe6a5fa99ff6b6b,2025-03-07T14:13:19.170000 CVE-2025-1860,0,0,986db9034dd4736f004df6791bb74c7adef99a61d4693b6737c6f7fc4ffbb052,2025-05-12T16:15:22.170000 -CVE-2025-1861,0,0,364f3b6bd4e38a4ff44cc455b88480ffaa5b0a11bae05538d89afdc1a809f552,2025-05-23T14:15:26.320000 +CVE-2025-1861,0,1,d588036ac40432e2fee376ea3e3321747bb47a31f0304293b6e450d4a10b85ab,2025-07-02T20:17:38.193000 CVE-2025-1863,0,0,58913d0cdbc19b044a0ae40116888b87bc7f9f8b2879c510a7e2907cf0a66748,2025-04-21T14:23:45.950000 CVE-2025-1864,0,0,1521ea631a62fdc5c10914bd32f7e46bc38cfd57795522efc4e14681c16c00ac,2025-07-01T14:55:32.677000 CVE-2025-1865,0,0,179ef00ae451af792a624f7eacd4e1dcfb5d9e6f54597854dbd2ec89833d4411,2025-04-07T14:18:15.560000 @@ -289537,7 +289537,7 @@ CVE-2025-26876,0,0,684f7a7019e1ec0a8365c1fd8b8ec9cf15327b5b9ed01836c80ba8ecb2aa9 CVE-2025-26877,0,0,b6bbd106fc09effb170ea41e4eff1e72fc5e0e40d7a5e670464380cec25fedef,2025-02-25T15:15:24.380000 CVE-2025-26878,0,0,b83c78001aed3b72257afa473beed64325520c746080d9d4c55fc0721207cb83,2025-02-25T15:15:24.560000 CVE-2025-26879,0,0,ff13b8336e93c3c4112258e1261f28d97f76ce67ffc3e5951e1c9eced4ea0dc7,2025-03-03T14:15:56.213000 -CVE-2025-2688,0,1,df9fbd881c0903a7e1840c86191135c0e3ef5a103499e72c1374800ca40be24a,2025-07-02T18:03:25.497000 +CVE-2025-2688,0,0,df9fbd881c0903a7e1840c86191135c0e3ef5a103499e72c1374800ca40be24a,2025-07-02T18:03:25.497000 CVE-2025-26880,0,0,da84e2330a560f7b1855215c494200741db29c3a24f93ba76a255f39bbbbece3,2025-04-16T13:25:37.340000 CVE-2025-26881,0,0,921429dd5a0c5a1101d4da691445afee44c665c84de754602fbf841d0217b94b,2025-02-25T15:15:24.690000 CVE-2025-26882,0,0,7062fd0c75af34ccf6b6ec2ff75c922493b57ba8fdc01187594aa2fa72d319c7,2025-02-25T15:15:24.837000 @@ -289744,7 +289744,7 @@ CVE-2025-27136,0,0,c01448066d938a954aacb43927a32ddc1070de1cae5a8be4183115a3e5216 CVE-2025-27137,0,0,5824d60f023fc733adf708b73443cf5ddf0a1c321fa7b10d5058188a954ef313,2025-02-24T21:15:11.213000 CVE-2025-27138,0,0,51df3b05aad41c98a88fe0b061ed7e110b02a2b2eed44112c3eb8d323dce6520,2025-03-21T15:22:28.790000 CVE-2025-27139,0,0,b35d01c363d768feea22a1a4baf4d96af8539b18da2c1e17aac951b9b3709d79,2025-02-28T13:55:46.533000 -CVE-2025-2714,0,1,df9ea0f742d96e2adc4020cdb7c6f94de38301f10e5d53c30c9f52fbf987a9dd,2025-07-02T19:11:51.457000 +CVE-2025-2714,0,0,df9ea0f742d96e2adc4020cdb7c6f94de38301f10e5d53c30c9f52fbf987a9dd,2025-07-02T19:11:51.457000 CVE-2025-27140,0,0,fc1e0ec308089fd541d5158018c00bc169df7e00ec8cc3330ecb17a15d6f21a7,2025-02-28T16:35:12.980000 CVE-2025-27141,0,0,a447ac927713f36258c6b25c5f083c429dfe0fb04b42a5d1767a162b87028124,2025-02-28T16:24:18.650000 CVE-2025-27142,0,0,1bb5f40990adb8c35f5889afc7c3575d307334e192075d779b188f2171513971,2025-02-28T13:50:54.373000 @@ -290884,7 +290884,7 @@ CVE-2025-29529,0,0,131ba8e09816d09cacfdacbc1b605e02d00f30b0838eb43d19239f9695636 CVE-2025-2953,0,0,67c63f73a2bad438c65b917bf9a538e529ded5fd2828dfe2a2982ca0c2662c95,2025-04-22T12:15:16.043000 CVE-2025-2954,0,0,0672b048d9a1bc1b6cab4c4533c01031021ece5eaf46619f3aa405740d82e196,2025-04-15T17:57:44.213000 CVE-2025-29547,0,0,aa60854d017a9798e6777b390c1094114e4d0521b16eb135eea88d0b1da0a19c,2025-06-23T18:23:41.120000 -CVE-2025-2955,0,1,ae0098f14cc539866dfc24b906cab2145f36ba1504dd8a9ee610f2bdc6a2a1d5,2025-07-02T18:04:07.640000 +CVE-2025-2955,0,0,ae0098f14cc539866dfc24b906cab2145f36ba1504dd8a9ee610f2bdc6a2a1d5,2025-07-02T18:04:07.640000 CVE-2025-2956,0,0,12b742621d86c28d988776b85da597ef776ef6fe74e703c6823d14feeb258af7,2025-04-01T20:26:30.593000 CVE-2025-29568,0,0,3b23dcb888abcc37f1444d0fc863cef625a6ebdc671441b643f7de7ab4accc97,2025-05-14T13:09:12.467000 CVE-2025-2957,0,0,d90251765154920d1060d5e6f1781980ec9f028972bb25184edb9ab3b3acf04f,2025-04-01T20:26:30.593000 @@ -293479,8 +293479,8 @@ CVE-2025-32794,0,0,15f940929f35bdb8def3a5939321437a8ded7053db5533722d2bdb036ad0a CVE-2025-32795,0,0,3226787ef9fde307f13d92b52c13368891b70059c6d43e363196d275603a2be2,2025-06-19T00:25:59.333000 CVE-2025-32796,0,0,20ed07849a09b1f538632557f0ede2b9976cfa2cb03f0965ae7b2114a9dbac36,2025-04-30T16:12:32.757000 CVE-2025-32797,0,0,39a1453b6f2631a027a7807128ca6c2891d742d8758fbedb098024372cb946b4,2025-06-17T20:50:23.507000 -CVE-2025-32798,0,1,9407151681d732db4f4b5e97951401f98ff95fb1516d1e5d4816cfb40cac18a7,2025-07-02T18:21:45.133000 -CVE-2025-32799,0,1,e869b9d8fcc430e1c2795fb35d5e0aa3be352f16e50b12310082045cbc70e2a7,2025-07-02T18:12:39.140000 +CVE-2025-32798,0,0,9407151681d732db4f4b5e97951401f98ff95fb1516d1e5d4816cfb40cac18a7,2025-07-02T18:21:45.133000 +CVE-2025-32799,0,0,e869b9d8fcc430e1c2795fb35d5e0aa3be352f16e50b12310082045cbc70e2a7,2025-07-02T18:12:39.140000 CVE-2025-3280,0,0,bbfa48dab65dd8e30d4af992e1eee1a23f41dd90ea1a7ea7a1775416dce3500e,2025-04-29T13:52:47.470000 CVE-2025-32800,0,0,e753f34f7c42d4666d6bce3002ee2779f11bd28dcf07a2833aa1c4b318c92022,2025-06-17T20:50:23.507000 CVE-2025-32801,0,0,6146013012d0cc266cf2a68a1cfcd1c7bf0ca9e930c722235f6d34464ee53a2b,2025-05-29T14:29:50.247000 @@ -293859,10 +293859,18 @@ CVE-2025-34070,0,0,47207d5ee1b0a71e1e9c5d5e77d6671366cac2a9ddc16a23d5790cb18a739 CVE-2025-34071,0,0,d5f2123198e3e31dbb6015474f33f67a7d06e2e32e6e418e40981220ace5d68f,2025-07-02T14:15:24.667000 CVE-2025-34072,0,0,4af0fa0afa5efa1a0910d60d94c8609fe067147223eb06c75d936925a073cf51,2025-07-02T14:15:24.817000 CVE-2025-34073,0,0,a16ab3d23c59acfb344a3dcbf7457a63d81df4c42fe785cea9964f2d0f1fb835,2025-07-02T14:15:24.967000 +CVE-2025-34074,1,1,c9bed057c2dd103eff6868716b6ebe9755e961ad12da88dcec416d293e283f1a,2025-07-02T20:15:29.410000 +CVE-2025-34075,1,1,46b05ba8ed0540eaca2bc6fc2b2d2eaead785a961f81ccfee6b179894a1eecb5,2025-07-02T21:15:40.790000 +CVE-2025-34076,1,1,dc9c9153a1078aa89465a7fa76b93d0c09d8c4c18c0fb4bfb18ac17ba5899305,2025-07-02T20:15:29.690000 +CVE-2025-34078,1,1,28894bcdcf6854686c9bcd752f96f78735e5cb33d5d9478f95ee5ca42e4bfcda,2025-07-02T20:15:29.827000 +CVE-2025-34079,1,1,cce584a780196713a8c6ee827a7e6f3ea01852d4c7563952b676a805ccd7d608,2025-07-02T20:15:29.963000 CVE-2025-3408,0,0,a88be7d5c921572f767d8ba3e6ebc652be3930b6ee80cf6e4b3b3197df125283,2025-04-08T18:13:53.347000 CVE-2025-34080,0,0,0645af92852c4c75a352979a10036d36cc531562915f2b81600076c5490ceabd,2025-07-01T18:15:24.487000 CVE-2025-34081,0,0,d696ccc2eacf212028f355783a4b82494f5e56e1a84e1ce50916672890cde099,2025-07-01T18:15:24.627000 CVE-2025-3409,0,0,f59095d51838a53941b8bd9796d34dc98a766466b963796da5b26614478f737a,2025-04-08T18:13:53.347000 +CVE-2025-34090,1,1,97f5958fd22032ced3b8ddd1529f8f5a720845df4a1e135990e3fd2f8a2534e7,2025-07-02T20:15:30.110000 +CVE-2025-34091,1,1,22299bd382ea2b6c89cd8b7fd45538cdd112e7adb16e52e95b2ffaaaf061b193,2025-07-02T20:15:30.260000 +CVE-2025-34092,1,1,17459f64090cb762564ec217468df56e4314f2f81160243614827459795aa891,2025-07-02T20:15:30.413000 CVE-2025-3410,0,0,c70ad1f10853e4bee6dfe4932ecd12d3acdcade7cac158141968cc85be8d2fc1,2025-04-08T18:13:53.347000 CVE-2025-3411,0,0,8cff3e75ab7d8c8c3df6b9fa01111f95a8fb7002f322628e53333c48f3625fa7,2025-04-08T18:13:53.347000 CVE-2025-3412,0,0,25a3c2ab8fa0aef3dfffc2c9723b43f279f3600f9f3d1f7632095f66cdc52ea3,2025-04-08T18:13:53.347000 @@ -294184,8 +294192,8 @@ CVE-2025-37091,0,0,5c59e2385d6842be695126488e55eb86dc7f72c0f9c94efe260f5f7e3aa86 CVE-2025-37092,0,0,d2e906c9093c897b5382406a4ca5cd4666b5641e70b3de6ce3bdd44d14dded8c,2025-07-02T01:14:24.027000 CVE-2025-37093,0,0,eeeeed73a80d1152deaf3bfadaf1854957afd5bed01935ed49d0b9f9068124a4,2025-07-02T01:12:24.617000 CVE-2025-37094,0,0,6d20c74e0741eefc76e4a020d08745b8fe40dc1428103809a851ddf2e74dc111,2025-07-02T01:10:16.433000 -CVE-2025-37095,0,1,9f5a4b4c5e73a32bc6c2404219bef3755544819c6d7bb87d449ba9b756875fa1,2025-07-02T18:07:31.213000 -CVE-2025-37096,0,1,22707a31098e9cdb448fcf8a56edafe251897b155cebe6289af122e54309fcbf,2025-07-02T18:01:41.810000 +CVE-2025-37095,0,0,9f5a4b4c5e73a32bc6c2404219bef3755544819c6d7bb87d449ba9b756875fa1,2025-07-02T18:07:31.213000 +CVE-2025-37096,0,0,22707a31098e9cdb448fcf8a56edafe251897b155cebe6289af122e54309fcbf,2025-07-02T18:01:41.810000 CVE-2025-37097,0,0,292a1d43ae472647d44dd5b39b4ad8edbe31c0eba297cdbc6fe988f335fe723a,2025-07-01T15:15:25.470000 CVE-2025-37098,0,0,95cb86c5eef296a62dd04b26f15930cd5f734eaaf609b8e9dff49dc3a5d65e14,2025-07-01T15:15:25.643000 CVE-2025-37099,0,0,88fa93292d2fe5248dd41ae272ed75f499c34942181d8a755c03c589be1349a8,2025-07-01T18:15:24.763000 @@ -295530,6 +295538,7 @@ CVE-2025-43013,0,0,cea29fefbb7874147d20ca0439a948894c9ed92ca59da3ffe37724562ec07 CVE-2025-43014,0,0,8c8e187893b05115834c1fe60888f6689d95da1f55e6603f1b98a0a40089dd30,2025-04-23T16:11:35.837000 CVE-2025-43015,0,0,e1099e2d690e6500afcce9f63f8d90a3ffca94e6d4b413f55df99246e9d63336,2025-04-25T16:30:24.887000 CVE-2025-43016,0,0,f2c72cd86df0dc4f466aff47f20427f717da38e7cfd3bc2cf6bf3e8b276a88fe,2025-04-29T13:52:28.490000 +CVE-2025-43025,1,1,b07e86ae70e69fe18bf8b04cda66d709e4c93e7e792df4542ad7f61979a79609,2025-07-02T20:15:30.550000 CVE-2025-43026,0,0,6b388ee0410ccd9f871364237fa3dd74ba38ecd5d6baae293c1bba0c62bbe8ed,2025-06-06T14:07:28.330000 CVE-2025-4303,0,0,ca67198b40d61e86a7061774e966351f8111400fea02ca918ed591bfeb4cb946,2025-05-08T19:03:26.480000 CVE-2025-4304,0,0,6f1b91465a276129a41d4871b4c0d6efc81ef52ea3bf5203539481683a02fc06,2025-05-13T19:21:33.627000 @@ -295949,7 +295958,7 @@ CVE-2025-45019,0,0,0a36b603f2eee8504693a95bb056a9c5dae180c245f5aedb0d853035198fd CVE-2025-4502,0,0,b6fc5856f80283661b9f5c0d6810233d4d120b34ab21f730a7ef052c4b6101bb,2025-05-16T14:04:15.523000 CVE-2025-45020,0,0,429832f3a891b985adb256db95fa4e3605a43b22020d294b189541e25f18c802,2025-05-09T13:45:23.603000 CVE-2025-45021,0,0,23c622248a57818d5ade75ad7b5f8e628d9aa7d69a6dd26ddccdebefb2f9e8a5,2025-05-09T13:43:27.980000 -CVE-2025-45029,0,0,b7d25a95caf25ec9fb132078b8b45cab948328f0f9ac9c894e776e0f051a1993,2025-07-02T14:15:25.470000 +CVE-2025-45029,0,1,d7d170dff6079a8ee0141fff8940c9df92246aa0d19bc872721b41cc9ccd8026,2025-07-02T21:15:41.003000 CVE-2025-4503,0,0,85f8ea7af4d81365d4c769cefc49de185f192dc2edd583f57e3e7fc284a882a1,2025-05-16T13:58:11.200000 CVE-2025-4504,0,0,f39a2a3f679765bc9c2c6ee848dc7fb913ca841c89fbba4626c8dd3bc0803ed4,2025-05-16T13:46:04.210000 CVE-2025-45042,0,0,e22830cb7bf04c3c2d82e6baefcc0ab2bba0906b03ab3d09def3ca7404c47455,2025-05-07T16:39:20.990000 @@ -296007,7 +296016,7 @@ CVE-2025-4539,0,0,4cea8fc534f9fe405b8ad908d4e6f097f4382bef617bc18109b8d5e8c637ff CVE-2025-4540,0,0,8cc0219b9599542c1458321b60f6526b4a06d781c2bf124752cf69c701bf9208,2025-05-23T18:15:36.813000 CVE-2025-4541,0,0,f69af7cb834435790fd2bc7c7fdd35148c39775cd73b6e79ac588217ba1217a2,2025-06-12T12:55:42.967000 CVE-2025-4542,0,0,b2811e2a4a5d7456e65880ba2e5fe541779cd453c5ff8f673586e2db73c7c0e2,2025-05-12T17:32:32.760000 -CVE-2025-45424,0,1,d869a9d779495922573d9ef38a24a63ffd2a962a8dfed5fcc1e6147428166476,2025-07-02T18:15:23.987000 +CVE-2025-45424,0,0,d869a9d779495922573d9ef38a24a63ffd2a962a8dfed5fcc1e6147428166476,2025-07-02T18:15:23.987000 CVE-2025-45427,0,0,2acb289b4531d79e0a4fdda0743ea875280a2030836ee1f38a4e78112f2ff823,2025-04-30T13:51:20.023000 CVE-2025-45428,0,0,a55753fec0ea61e23d5357aef97cfebf259250af906a54fae9de1214ab7deb77,2025-04-30T16:12:11.190000 CVE-2025-45429,0,0,32099a126e41e157c073e4b282e42326bf59a85e3c0de57c5dd11afb3e22532d,2025-04-30T15:48:51.963000 @@ -296063,7 +296072,7 @@ CVE-2025-4562,0,0,d2657f9e359abe15e16bbecb49ae9ba4428138285e1222df0d7e8c7358260e CVE-2025-4563,0,0,c69851f0735281b2a51d3c75d19e39d88123d1ecc1e2b9bcaa275dabdc915d52,2025-06-23T20:16:21.633000 CVE-2025-4564,0,0,8d3f9720d908e446b737db8b900434db81b180dd53397ac7362129a7e91e5314,2025-05-16T14:43:26.160000 CVE-2025-4565,0,0,4256f50161ec95000de287e54ecfa2b8b56d3a683613b559af85e1b918e03fef,2025-06-17T20:50:23.507000 -CVE-2025-45661,0,1,1c1ef68e950b72d58944291d0421cef6e6e2261c3d51f19b8a645061629a6e45,2025-07-02T19:15:57.543000 +CVE-2025-45661,0,0,1c1ef68e950b72d58944291d0421cef6e6e2261c3d51f19b8a645061629a6e45,2025-07-02T19:15:57.543000 CVE-2025-4567,0,0,121a90467be941d9ad01a97d3e24fb32b96a7e829013a214205341e8c0284209,2025-06-05T14:09:17.020000 CVE-2025-4568,0,0,a7dc4015dc0dc8a1d051ca0a0c8659f2aa00a001767db9893b5b3f88ebbd1af5,2025-06-05T20:12:23.777000 CVE-2025-4571,0,0,cfaf6e0f0966147161fbd50ba7ab7242473c58c0fee9a367c407b586b3a394d5,2025-06-23T20:16:59.783000 @@ -296092,8 +296101,8 @@ CVE-2025-45797,0,0,9ceb633e87e0ccdd08b067f487627f7a3614f4d7f4f938b0faf7b483b05c0 CVE-2025-45798,0,0,1e256e91813f740bb0ddebf5c159b4041ec84583a75a9898cffd38b365095dd3,2025-05-19T15:08:18.653000 CVE-2025-4580,0,0,2c434f3aced55b1225815c7de47b3cc229863447aaf3ca455a84427f71dfeaeb,2025-06-04T20:04:21.700000 CVE-2025-45800,0,0,2adeb4a59c132c5d4a56fe8afda223e1c5b86658a949bac17c9d9bc540ba8292,2025-06-04T17:26:02.743000 -CVE-2025-45813,1,1,3ec09f5d44c8d8e4d8fa47d228892dba7ee1b3131eb02705ebe52f01a130e38f,2025-07-02T19:15:23.583000 -CVE-2025-45814,0,1,12a99868b5c59661b6aacf919e64b0a019734fba54186d68fbc61f712abdf28f,2025-07-02T19:15:23.797000 +CVE-2025-45813,0,0,3ec09f5d44c8d8e4d8fa47d228892dba7ee1b3131eb02705ebe52f01a130e38f,2025-07-02T19:15:23.583000 +CVE-2025-45814,0,0,12a99868b5c59661b6aacf919e64b0a019734fba54186d68fbc61f712abdf28f,2025-07-02T19:15:23.797000 CVE-2025-45818,0,0,9a72de08da5294536bea0753f94263b2b855db9b94abd12b9c3b0d1fd37d9e3b,2025-06-17T19:42:01.770000 CVE-2025-45819,0,0,c665b8750201a2fc239ff6acb7a2f60c43e76c91b36aa53da175cb91cdf72bb5,2025-06-17T19:41:54.183000 CVE-2025-45820,0,0,95a4e4eb3429b44b329ce72184a4d2ba508647a05ea4c8a36c99350258cec814,2025-06-17T19:41:43.420000 @@ -296484,7 +296493,7 @@ CVE-2025-46634,0,0,adbdc53bb91ce45c108dfae363ac172a5467f9ef6b9ad8bfd5e234ff22520 CVE-2025-46635,0,0,c81a16a7aac883be5eb8baced44885a6963efe19158222244e53c4c42c8380a1,2025-05-27T14:18:12.740000 CVE-2025-4664,0,0,d4044bce681082456ae2ed2a3baaa6f65e61937d9e24855cf4b96203efa26903,2025-06-06T01:00:02.617000 CVE-2025-46646,0,0,af70cd637f7e4a86250852ca6ab0f9700c2c92e88ef676964700053f516200e9,2025-06-23T18:36:04.753000 -CVE-2025-46647,0,0,d82464c6c61e702011e9e44c980b1298b7f5a3a5e2d3a313cda5347792a3790d,2025-07-02T12:15:28.227000 +CVE-2025-46647,0,1,382094ff66f393a7b551a88c71cfe9ccf8952d527fa253dd4e103d77a8c23272,2025-07-02T21:15:41.190000 CVE-2025-46652,0,0,9d812ecaad689bd29eeb08cd6e51fc2313308ed71660c22dce020d578677f79a,2025-04-29T13:52:10.697000 CVE-2025-46653,0,0,3b6009fc3a51ec55453aaec5d1f7a19d2114d1ff8e2f811535a6f418b5dab168,2025-04-29T16:15:37.150000 CVE-2025-46654,0,0,0aa14c4ea6fe1b19c5c6aa8b1b364a4f4f00114d15c5d807117da3c6c36c9dc8,2025-06-16T21:00:11.573000 @@ -297455,7 +297464,7 @@ CVE-2025-48122,0,0,5d90346782f906a83ce1f7d5406c733daa96859222d3462e9a9aaa87bf4bb CVE-2025-48123,0,0,927dd0eda078889f31c80e97c49d639c615c1cd4fa7a86919723f469b8aa5c94,2025-06-12T16:06:47.857000 CVE-2025-48124,0,0,344bcd7cc563cf76038c7c18a4851f7ab64343be1a5e3b5eb9102a205871c94a,2025-06-12T16:06:47.857000 CVE-2025-48125,0,0,8eee42a4c025e254ddba8ffca9e8c3fac55262865ad675299523c2fb1d918797,2025-06-12T16:06:47.857000 -CVE-2025-48126,0,1,ecdca4ce3b1162231bdcbd2bb065c08db119dd38ae154f8ad8b6883248ca0b22,2025-07-02T19:56:33.060000 +CVE-2025-48126,0,0,ecdca4ce3b1162231bdcbd2bb065c08db119dd38ae154f8ad8b6883248ca0b22,2025-07-02T19:56:33.060000 CVE-2025-48127,0,0,11ee29dc31cd85b0b718162f384541d319a9748ffc96b9bab70d5b0619027f27,2025-05-19T13:35:20.460000 CVE-2025-48128,0,0,94de179bd7e9fd5a02611e704c16ad33a9258dcb246bf38f48064c8c6fc5c170,2025-05-19T13:35:20.460000 CVE-2025-48129,0,0,24214096cd06eb0308e1dd9643f414175e6d2be1c23c282925107f3249cc2ade,2025-06-12T16:06:47.857000 @@ -297531,7 +297540,7 @@ CVE-2025-48258,0,0,05558dc9a056a4c45220e853dbcfba9265f36b69d0b6ff2d0c20a24925735 CVE-2025-48259,0,0,1f3946fa4bd270c9c3c52b83f5d392e74c67e5ceedfed5fc79e2daf54a324c93,2025-05-21T20:25:33.823000 CVE-2025-4826,0,0,5eb26ca2bf69b529dbc693897efb8fc6040465a4c812b7540761802d8b952625,2025-05-23T15:49:48.400000 CVE-2025-48260,0,0,a3f874679cdeac9df55dbfd1c86be6a056999148c9f31eda32540292f95592b6,2025-05-21T20:25:33.823000 -CVE-2025-48261,0,1,94047db5a1c5d5536dc6e9c476a110f9750dabd62d4c44853ee5d54376b538c6,2025-07-02T19:54:00.397000 +CVE-2025-48261,0,0,94047db5a1c5d5536dc6e9c476a110f9750dabd62d4c44853ee5d54376b538c6,2025-07-02T19:54:00.397000 CVE-2025-48262,0,0,e5106d3e36e1c55dca7b98309c44fab864699d88d7fb693a4b04c9c4036ab717,2025-05-21T20:25:33.823000 CVE-2025-48263,0,0,4b385dcf2f602e3ac6e9aa1fa8960317b4cd6beb44864083fa26204c658914e2,2025-05-21T20:25:33.823000 CVE-2025-48264,0,0,304bd89e1a992b208c192e2c5d98dc5704c1686813ea9b5846a7bf1a3d8fcdb6,2025-05-21T20:25:33.823000 @@ -297761,7 +297770,7 @@ CVE-2025-48848,0,0,38731265ae915b14c5e915b02c11b0e53a54815641117da26fffd1c6f20ec CVE-2025-4885,0,0,8b1f3d2344963a11ed048c1b11c72d90a832e37d4502c4d02b2f6dc0aedfb978,2025-05-28T11:49:42.250000 CVE-2025-4886,0,0,ee7f76edd86c24830d90a51f41a4fa49fae21d920e8b2e20261474187c5dd2a8,2025-06-04T16:10:37.057000 CVE-2025-48865,0,0,94f89730bd8ed106556973261399e33383a3753b92f1a19b2cc4e5a5c200670c,2025-06-04T19:54:41.613000 -CVE-2025-48866,0,1,5c2aa70d83b7537c313b22e7f244f72f8c04af4feccd44edfc4020d24dffe29c,2025-07-02T18:11:34.663000 +CVE-2025-48866,0,0,5c2aa70d83b7537c313b22e7f244f72f8c04af4feccd44edfc4020d24dffe29c,2025-07-02T18:11:34.663000 CVE-2025-4887,0,0,b3da4e0d52d5d712d7aa083818ad0dfb6e4d4e8d4d6275a1920198b65f71ddac,2025-06-04T16:10:54.340000 CVE-2025-48870,0,0,f0dd4c510b4e0f1b9cd4488ee6e0602ab690635caab16c9782c16ad205fa1ad1,2025-05-30T20:15:43.107000 CVE-2025-48871,0,0,e51827db50c06633d673c9028d7cda097fa8237d9938def1c48be2ebb4d18762,2025-05-30T20:15:43.197000 @@ -297845,7 +297854,7 @@ CVE-2025-48960,0,0,6388a249faff67cc5a4d2fa4bca8d3989a10ec11030dddacff72a168ec292 CVE-2025-48961,0,0,44e1cee69124b46bd6b795101bc0b7c9c4699ce00a138653c66e2e8aeff53be4,2025-06-04T14:54:33.783000 CVE-2025-48962,0,0,4b2d64282106eed58f9e4647aa4bdcfb03945a2468e53d084f7081033bf14af0,2025-06-04T14:54:33.783000 CVE-2025-4897,0,0,104730cc5ad0680860a774881c7ad06896ad7afe2bb00c017480a43cf79011cd,2025-05-27T16:30:05.410000 -CVE-2025-48976,0,1,e56bb4765d78cbe565c80bb91cfe5a5c34b532c6610162061b09dd3dc9884f9c,2025-07-02T18:29:35.560000 +CVE-2025-48976,0,0,e56bb4765d78cbe565c80bb91cfe5a5c34b532c6610162061b09dd3dc9884f9c,2025-07-02T18:29:35.560000 CVE-2025-4898,0,0,088de021e18707e0dc4ec8499500601b39900fc456f0a7d4c0f7a0b50fbac254,2025-05-21T19:37:41.533000 CVE-2025-48988,0,0,89f3346fcc4cd557a41994a11d0d1a4d79127913ab475205777ebe370f1ad8d6,2025-06-24T19:49:04.033000 CVE-2025-4899,0,0,384aad67823f1c19c564c5975182391c80467536acba8235a635dfd93a5393e3,2025-05-21T19:37:31.280000 @@ -297902,8 +297911,8 @@ CVE-2025-4911,0,0,8165f0d1dc1e78afded21e50626575112805e2ff63d8f266295fb56c02f369 CVE-2025-49112,0,0,53acc03eb5f34e287cf80e6f2606bfb4760fb16ea2fe509fc70b20f7de56218f,2025-06-02T17:32:17.397000 CVE-2025-49113,0,0,56a8fd04a9ef82f1d5c677d3aef05bbaae629657949015a38e21cc671f31eeb2,2025-06-12T17:15:29.310000 CVE-2025-4912,0,0,952cc1697455c59886c397e61a80308747f6eedd0f377c0531d621b366fc5d7d,2025-05-21T17:41:21.063000 -CVE-2025-49124,0,1,7aaed7db3c7c3425730e28a3746bf707c007c3574467d4e0189597a3f538e67a,2025-07-02T18:28:47.897000 -CVE-2025-49125,0,1,9850d5e560b7706bc221711b24d8b458428db1e191d16003b58dd27aa88f673f,2025-07-02T18:28:13.577000 +CVE-2025-49124,0,0,7aaed7db3c7c3425730e28a3746bf707c007c3574467d4e0189597a3f538e67a,2025-07-02T18:28:47.897000 +CVE-2025-49125,0,0,9850d5e560b7706bc221711b24d8b458428db1e191d16003b58dd27aa88f673f,2025-07-02T18:28:13.577000 CVE-2025-49126,0,0,f2746aec11bbc747d0228cb8139b07ac427a821bbfb80f0a313e06bf384fe2ff,2025-06-23T20:16:21.633000 CVE-2025-49127,0,0,3f4889eef877e3cbd48aa702e8cb35c833e3234501017b5b4ce4fc613f23b00a,2025-06-09T16:15:44.833000 CVE-2025-49128,0,0,be74e1e3636b4e3c68c2e5f707126adefa5b42c030884a0a961eb0fa96655c19,2025-06-09T16:15:44.947000 @@ -297943,13 +297952,13 @@ CVE-2025-49162,0,0,30d8f0e974a690ba3faf665b7cd4695ab5fb985c2cad4bb0465fb4c9980fa CVE-2025-49163,0,0,643a72915169b3c81852832f164c7ce28984b32bf8cbac1ededba1c30e43e026,2025-06-04T14:54:33.783000 CVE-2025-49164,0,0,d5b91c5cc8e76d4adf3dda6a9132b65234dcdefc36da28ceddedfd5530304934,2025-06-04T14:54:33.783000 CVE-2025-4917,0,0,402a8702a0d07685076d8d3bbf70a58c8189448c063fea494a0fac6dd2626eee,2025-05-19T17:38:05.883000 -CVE-2025-49175,0,0,bc48898aa22840d684e986dd4bc99123d118318d12fcdde1f78c0811c7f9da52,2025-06-30T20:15:24.553000 -CVE-2025-49176,0,0,7c8e3298f5c5daf34fd87a5b2093060a65cb032351d81042db8ee9f2aaa6d551,2025-06-30T20:15:24.690000 -CVE-2025-49177,0,0,88fe85ebfb311cc7851d290d91c8e67844d99ab06620a758f4cae9a3c93ed2ef,2025-06-30T10:15:25.913000 -CVE-2025-49178,0,0,2977b66486df3bf07a30aa6a0bfb1cefd659d07df5857968bf6e6aab4abd4148,2025-06-30T21:15:30.693000 -CVE-2025-49179,0,0,690955eeef8fc1b93cd649b8d87bd4128d4338f5aa14dc011f7c01904dc55014,2025-06-30T20:15:24.817000 +CVE-2025-49175,0,1,05c4c0c17d157a274e33624cd51023c28750ce70bbac8c685e97e41cde6a8598,2025-07-02T20:15:30.693000 +CVE-2025-49176,0,1,58f0bc9899911c80c8035c853483a104069a082e71868005a69b053ba046fdae,2025-07-02T20:15:30.820000 +CVE-2025-49177,0,1,2776354ba86cd7216ed2eee07d464dd343e2260aa14001f109fcd75b0e6568d1,2025-07-02T20:15:30.943000 +CVE-2025-49178,0,1,205db7ae9d348939de33e6cdf7edc77ae1dce68a6cdac3af14a3294c8dfe7349,2025-07-02T20:15:31.057000 +CVE-2025-49179,0,1,fa802d5830c7b07b71c2a6064db3460130d6b592fa0e646d30819ff56cc53a0b,2025-07-02T20:15:31.187000 CVE-2025-4918,0,0,ab4c079e1da6cd4dfa69cf1fcc57b5e852fcef00a973643da3dd71ab3f3ec47e,2025-05-28T14:05:35.853000 -CVE-2025-49180,0,0,e9711ad3588c97661db2e1f474cb48105c3aa995cfcc9886fec475a3e87c02d2,2025-06-30T20:15:24.940000 +CVE-2025-49180,0,1,d656594d323a36014cef5dacb2709fbdc583abfca1e258a8d0fd1163a8698a62,2025-07-02T20:15:31.320000 CVE-2025-49181,0,0,65f8ea01de63d019d8688de775c40b302b8c0b1e44c040e53e46324e69435218,2025-06-12T16:06:20.180000 CVE-2025-49182,0,0,8adc8833944dbbffb6c925bafc811eee2574582f2d7b7b09537e334080770141,2025-06-13T09:15:20.130000 CVE-2025-49183,0,0,c9c3ab65e477d8e9a4d5c9adaf45822d49f0873835d0971680386eb894e72562,2025-06-12T16:06:20.180000 @@ -298023,7 +298032,7 @@ CVE-2025-49259,0,0,db4e2e6ad352e612216ee40424170ff047ce4767289f88fe44b36338c3261 CVE-2025-4926,0,0,321f7efe7ac33228adea3a7bf6c22d3279632b362ddc9dd47d64aee357b84d4f,2025-05-21T12:46:59.150000 CVE-2025-49260,0,0,20df55cb1d6ae6d831c559c85aa2fffadf12ac6a127a9822419ce67dc6550363,2025-06-17T20:50:23.507000 CVE-2025-49261,0,0,1c637cdb70f65c420754aa2396c2000cec4df743068bf0b57eab505c84c0b69a,2025-06-17T20:50:23.507000 -CVE-2025-49262,0,0,c8ecb38e2a6bbb509b5464e93a8e807cf4fe47f70ed1e288b103f2145fd0fbb6,2025-06-06T14:06:58.193000 +CVE-2025-49262,0,1,06475fea8bb8e08acfd3209a58a6aae72c911267f58fd5a9f0003b35cc972834,2025-07-02T20:02:58.340000 CVE-2025-49263,0,0,38aa1f55e3d42e2ae1c5f0e906030fae07b5739b8521b0ba5395b28e605e2da3,2025-06-06T14:06:58.193000 CVE-2025-49265,0,0,93f04cd3c02c56137db8c1a60ed5bdbd759fe4413ddae7beafb034d9122bdb3e,2025-06-12T16:06:47.857000 CVE-2025-49266,0,0,2ec88e02ae1dd89b21bfb67afc114b109690cc3e3c98198e7fe6084e9cdd1222,2025-06-17T20:50:23.507000 @@ -298051,7 +298060,7 @@ CVE-2025-49288,0,0,fd55b6e659457965b044763d373bc487f4f85d0422ecf0bdb451203ab3005 CVE-2025-49289,0,0,6db9920d9566ce3cab2322c92454f3a08523c9da68abd3449538cf2f7bf511af,2025-06-06T14:06:58.193000 CVE-2025-4929,0,0,a8e593e93f40512d4e00d2cf8b1f6bcbb5d53e9a2cd29f3fc687456ae4295712,2025-06-11T14:54:00.567000 CVE-2025-49290,0,0,cf4e11029979fd4c0003797d9d335aaa3fc468b369e4ac17f80d2929b723f4be,2025-06-30T18:38:48.477000 -CVE-2025-49291,0,0,9daa3b20fed7cc8f0088dbb844645608b4c71dd2f7cfa859b6d976a11504f1d4,2025-06-06T14:06:58.193000 +CVE-2025-49291,0,1,153742cefd7a33afe363ac01c19e5547522b77d678ed71f932188ac106c837be,2025-07-02T20:02:18.077000 CVE-2025-49292,0,0,1b2cdbc10ccaf92dc3f2c2fa167a6bb6220406e291e936a3a5a6ab308c52f19a,2025-06-06T14:06:58.193000 CVE-2025-49293,0,0,306999d754a56fe33b1688646f3766e55e4d4cf04e569fd466480109a4867d8c,2025-06-06T14:06:58.193000 CVE-2025-49294,0,0,4a7f3ec895253ffd59c41f8c6fbee8a9fb92663981d502e562f03c0a1f3b2feb,2025-06-06T14:06:58.193000 @@ -298161,7 +298170,7 @@ CVE-2025-49520,0,0,c00c5db1e0d7cdfcf03ce2a151d4a6f1c9dd6234f02cc9e35bc9dc762ccb8 CVE-2025-49521,0,0,f5759572ad27815817cd4949078de9ea61bd0b160316fbc144b68c5d87cc6701,2025-07-01T02:15:22.310000 CVE-2025-4954,0,0,1842fa5885eb88cf4e938c25f5c28a2b06178d338bd8f50c89b12e7a73a12077,2025-07-02T16:11:11.290000 CVE-2025-49549,0,0,d51ae214ec023b9fbf2d300a776160828d2a71b7300d33bc04b291b25e1ecd5e,2025-06-26T18:57:43.670000 -CVE-2025-4955,0,1,dfeeeedd1c9e503552c289dc5a5f282eaa3f31fc9b39c1438869fa46290cc865,2025-07-02T19:25:30.180000 +CVE-2025-4955,0,0,dfeeeedd1c9e503552c289dc5a5f282eaa3f31fc9b39c1438869fa46290cc865,2025-07-02T19:25:30.180000 CVE-2025-49550,0,0,81d29c0d656ad2b61bb825237b123272a33fd2799782f8797b7b40fb5e1f45eb,2025-06-26T18:57:43.670000 CVE-2025-49574,0,0,fb5e38666a9d5db5e2fea3eff17a1cec1849b841049d294374c0873eea7d745e,2025-06-23T20:16:21.633000 CVE-2025-49575,0,0,5239212f6088f8e9f5d72981748315013281ee63030d12ad53f604f56fb5ce0a,2025-06-16T12:32:18.840000 @@ -298201,7 +298210,7 @@ CVE-2025-4969,0,0,4f90cc424a2a0f4e9ed8afa3693879db2394c134460b9fa8753024f2852d39 CVE-2025-49709,0,0,6e5da86ede95ac762ffd2aaae8e4447b199f72a6fba5fa138a2263e19d8c9c57,2025-06-16T16:41:05.487000 CVE-2025-4971,0,0,ec01b010a198b670732c969d73dfa53bbd76f2e075f866245cc573c614982079,2025-05-21T20:25:16.407000 CVE-2025-49710,0,0,fdef6b70e5300806b4a42e9567df3fa6452819f84b853bd1194cd77188110e32,2025-06-16T16:40:48.453000 -CVE-2025-49713,1,1,cf099eb8e0034d45f9d7ba5d6cfc1c4f3f92e67b5aee5bac95e8839d1a7d9a9a,2025-07-02T18:15:24.303000 +CVE-2025-49713,0,0,cf099eb8e0034d45f9d7ba5d6cfc1c4f3f92e67b5aee5bac95e8839d1a7d9a9a,2025-07-02T18:15:24.303000 CVE-2025-49715,0,0,d350a971b67f9d6562ee1abd43003afbcfd7b9d445831ceec772b587e6084416,2025-06-23T20:16:40.143000 CVE-2025-4973,0,0,a09baa9620620eb012f5ddd6b5ca6dd7efd75fb0c8b55678f3f3e6206d444643,2025-06-12T16:06:20.180000 CVE-2025-49741,0,0,1b29e4a4fce34a8586e58f3bcb010a13d592cf566421071690fdc217420c1cd8,2025-07-02T14:15:25.737000 @@ -298404,7 +298413,7 @@ CVE-2025-5030,0,0,6d4b94a2a3e4b3835c2395db7b8595a9109a231f789fd318934411db49833e CVE-2025-5031,0,0,5f2ab8d2bd00dbf44f07508d2176837c7f0d7e14295892849ea6ba136599d0aa,2025-05-21T20:24:58.133000 CVE-2025-5032,0,0,4156143fef9ccb288081dade2120fec7f51a54986c4f66b96dc31d6794fced0f,2025-05-28T14:12:07.037000 CVE-2025-5033,0,0,06c9afb9196a99dd4f0b3020a989f4b3254b2b9e05cd3f3304d140aa64b94a45,2025-06-20T16:15:38.947000 -CVE-2025-5034,0,1,f0ac7332abf996a6e6e6a22f6f30e0617c7501cb6293576154766b569ef16c9e,2025-07-02T19:00:24.197000 +CVE-2025-5034,0,0,f0ac7332abf996a6e6e6a22f6f30e0617c7501cb6293576154766b569ef16c9e,2025-07-02T19:00:24.197000 CVE-2025-50348,0,0,5081ba7593ae8342ef6e03ff05001a5e9251f0737e546d04330fd65ae4fb2e2a,2025-06-25T13:08:13.867000 CVE-2025-50349,0,0,15e0e70949273fa56afdfb5bd13043f639cdede12bd48e56cc46a914f6d4ad3a,2025-06-25T13:01:11.240000 CVE-2025-5035,0,0,1deb7e75a6c3e09c6c339251bdadee3dfedda027cf22bf3c096a61d9e90df423,2025-07-01T17:43:20.530000 @@ -298558,7 +298567,7 @@ CVE-2025-5207,0,0,e402cb7000c0d3ec5faf704526317d521bb7be7fab48c7474536b7fb38ce69 CVE-2025-5208,0,0,9e9535cfb50c25096d995fee715ad33ab744750f67296c60cac7b3a386d28ef1,2025-06-05T14:14:06.397000 CVE-2025-5209,0,0,1de988bb6fc9688228254af9049355449ffefba36f51df5a462735aed22ede34,2025-06-26T16:01:40.640000 CVE-2025-5210,0,0,7f798974cbc440c4e4dd8009e513c3eb9007b33b9ead67a41eab0bd81192fbbf,2025-06-05T14:13:54.527000 -CVE-2025-52101,0,1,7e2c22898ccb8924744ecf98bd8477845feb337808e53054f63b88710899e0c7,2025-07-02T18:15:24.513000 +CVE-2025-52101,0,0,7e2c22898ccb8924744ecf98bd8477845feb337808e53054f63b88710899e0c7,2025-07-02T18:15:24.513000 CVE-2025-5211,0,0,8f4ed9a6be734738ba7e8af34dfd90276884a544fade7898e9f11540d4e9c7c6,2025-06-05T14:13:12.777000 CVE-2025-5212,0,0,09bde77c0a73fbc6c1f35bedb61d3c4c409f9d9416e30903b1d4777f1733a256,2025-06-05T14:12:55.247000 CVE-2025-5213,0,0,8262fd7ad3860a05f2599b6c82e670c892a52b241834cc36a8cbcfe508de4e0a,2025-06-05T14:12:38.577000 @@ -298633,6 +298642,7 @@ CVE-2025-52555,0,0,6a75b391ee3c8272fca348930578b6893d5d810e2019dea636affd2993361 CVE-2025-52556,0,0,01d14cdcd651409b8ec6f2a117321e576266f60affdb5d61d3b6cf66da0be9ba,2025-06-23T20:16:21.633000 CVE-2025-52557,0,0,d6ac46828bdd4bd5689e0ed9e6db622a0cd2c5e50b4932c5603e932a5d57d26a,2025-06-23T20:16:21.633000 CVE-2025-52558,0,0,feddd9b17bf18205609fd5d4ab75e553c171fbe3defa5726e634521dfcb6dbbe,2025-06-26T18:58:14.280000 +CVE-2025-52559,1,1,a3f55a55125ee4d97083028ffb56541e54f129f69d9872b72d7582a3a8363808,2025-07-02T20:15:31.443000 CVE-2025-5256,0,0,8e276989283383806f3abf5c20dbe67142f0dc8ca07046605c539922633ebc4a,2025-05-29T14:29:50.247000 CVE-2025-52560,0,0,e5a785d0108feab8a82fba59c5f9cae135ba29f0ebde34364e03ae7ca5151c5a,2025-06-26T18:58:14.280000 CVE-2025-52561,0,0,aabef282808932d733941a0236add55fa34255b30e526cf4822de55340d2d48f,2025-06-26T18:58:14.280000 @@ -298722,7 +298732,8 @@ CVE-2025-52827,0,0,04da4f456c5a4f30ec7c35209b7acc7cd69257169d05a3aac291d93074f0d CVE-2025-52829,0,0,eb4d964acfddba9bd78da4c0fddfa106090ce982a7436b16afafa186380d210d,2025-06-30T18:38:48.477000 CVE-2025-5283,0,0,a8169db79b4666d05c59f16c729749cd032f3753a6abd4a1bda7e79d017ef3ab,2025-05-31T23:15:20.553000 CVE-2025-52834,0,0,4ca40346c1caeb484e6b4cab253e3c17da1f917f108bf85aa6fe3c08b7cc103c,2025-06-30T18:38:48.477000 -CVE-2025-52841,0,0,5a42bcc8c21230be36d8ea2efa4d9e98607dc20ce1b9d31997d3a6a58a268bee,2025-07-02T17:15:53.807000 +CVE-2025-52841,0,1,3d7da849a8e31127ec689a0a5860b78312f807447c1f9221344c0a6c20dd5d34,2025-07-02T20:15:31.610000 +CVE-2025-52842,1,1,2b03370c1b6578bbc27d600c72444b127d07a7bdf8339b142f09fa8e34be311f,2025-07-02T20:15:31.727000 CVE-2025-5285,0,0,44bcec87abafcefe0886e878731e41dce32b0fc09d4f84e223174bcbfeb5ce09,2025-06-02T17:32:17.397000 CVE-2025-5286,0,0,05e7ca3386f0ef15ac2b01314d8e06913e02de8c1752e75b99b02bac23121404,2025-05-29T14:29:50.247000 CVE-2025-5287,0,0,b8300f230839e0ad3335fdc92731d9b07abc7f3405256834dd55febc4f9b0133,2025-05-28T15:01:30.720000 @@ -298754,7 +298765,7 @@ CVE-2025-52901,0,0,597dd3e0884e75a10ca3c76c1126f6f1d090a216692cce1bc426e825d8307 CVE-2025-52902,0,0,b8d594698346e33c9857483268477e14dc09fa28d15e66d418ce57128530f231,2025-06-26T18:57:43.670000 CVE-2025-52903,0,0,94a4c6feeb3ab5f2f3f94f951914d81f3159a284c72cdc60f80cd2659d917108,2025-06-30T18:39:09.973000 CVE-2025-52904,0,0,bcfb9cec165acf9ecfbf631b206a037247a445035acaabf7192276de61173353,2025-06-30T18:39:09.973000 -CVE-2025-5291,0,1,ee4ed627d63194987274d8b55aa61e23a8b543ff69ad0554b0f4621e985f3424,2025-07-02T19:33:43.910000 +CVE-2025-5291,0,0,ee4ed627d63194987274d8b55aa61e23a8b543ff69ad0554b0f4621e985f3424,2025-07-02T19:33:43.910000 CVE-2025-52916,0,0,438f7afeba591d6d5b3e576c75dcb415d3bd31981574da43af97e05ceabf2876,2025-06-30T16:15:23.727000 CVE-2025-52917,0,0,7ab3bf82ed52daa48453df20fd6fb2069e3c2235c3d59c92d3f64c725f7f20d8,2025-06-30T16:15:23.870000 CVE-2025-52918,0,0,6c4c967ecd4d1d5b8ca4b1dd9bdc53d47425d36549eb42b0c5b72cef192ebe55,2025-06-30T16:15:23.990000 @@ -298864,7 +298875,7 @@ CVE-2025-5325,0,0,c13176172452a62b2dce96df66b8263f391e2e94fbea914673cf01de62808a CVE-2025-53253,0,0,214e24e64f3a68a364c0361453a4da1d0055b4e89b2079e94acddb30e59f02c0,2025-06-30T18:38:48.477000 CVE-2025-53254,0,0,8d56ffe402bb76b24185845decdc59779e8802d356487d5334398779a07bb1d1,2025-06-30T18:38:48.477000 CVE-2025-53255,0,0,ec730ac042e0abf9b2a31b64f28be2cdcae6a879850b6d271183060760548fc2,2025-06-30T18:38:48.477000 -CVE-2025-53256,0,0,399929b9fdbd9d3e98feee405e4fc6cba57be7abb7239bb64e68315c9e0a64bf,2025-06-30T18:38:48.477000 +CVE-2025-53256,0,1,bb84d9ae19d9cae363a736c94205d30da11efb3c31c9b4723bb955c7beec5e2b,2025-07-02T21:15:41.410000 CVE-2025-53257,0,0,a9a11065de348b88d4b75cff097eee7a5ba0f26c0158d0437a76d9c025fa2cc5,2025-06-30T18:38:48.477000 CVE-2025-53258,0,0,3d6cf121ab247ccedc31021cef85a1fb400e0208a4dc46b8d259781a69aea504,2025-06-30T18:38:48.477000 CVE-2025-53259,0,0,1a676ff829527268718afb1a97ac7922e0cf1bdad3ac66285a3c31c12b74b980,2025-06-30T18:38:48.477000 @@ -299034,9 +299045,9 @@ CVE-2025-5434,0,0,9c74c53f1cf63c29a6c4f421d3e66dd8e0230e030b10a94ec340a164b1af82 CVE-2025-5435,0,0,a07b000fdd10d693271c33e5855ef762ee79c33e1434ecbd5fe85a5e86df8fc5,2025-06-02T17:32:17.397000 CVE-2025-5436,0,0,79ce2e03946bf46829683ce641eb6e62632f0261fbc1007a9d8df993bd98e559,2025-06-02T17:32:17.397000 CVE-2025-5437,0,0,811a7dd33c5ee8133b31f658086585361c8a0965b92e0717d81b56b78c843fdd,2025-06-02T17:32:17.397000 -CVE-2025-5438,0,1,9312f400ed497dd6a9c823f72cf10956f6f2a6670a1b3fc79f6968b12c1a2555,2025-07-02T18:08:56.187000 -CVE-2025-5439,0,1,5393809746e167bdac62d8e2386c4e04df7737502cd4e1d8c350287b2fcd8f5a,2025-07-02T18:08:04.770000 -CVE-2025-5440,0,1,af2be9dcb24d92c343a6f8f918709518afa77f6a52ec237e760c0fddd3d435a5,2025-07-02T18:07:16.100000 +CVE-2025-5438,0,0,9312f400ed497dd6a9c823f72cf10956f6f2a6670a1b3fc79f6968b12c1a2555,2025-07-02T18:08:56.187000 +CVE-2025-5439,0,0,5393809746e167bdac62d8e2386c4e04df7737502cd4e1d8c350287b2fcd8f5a,2025-07-02T18:08:04.770000 +CVE-2025-5440,0,0,af2be9dcb24d92c343a6f8f918709518afa77f6a52ec237e760c0fddd3d435a5,2025-07-02T18:07:16.100000 CVE-2025-5441,0,0,ac74c7cc0f531f603ebba9c2bca9d48918e26d19fe5966f70f4992ef7f9dc14a,2025-06-02T17:32:17.397000 CVE-2025-5442,0,0,aff4e7dbcf6e16c07e1755fc79189c8c906002caae35c81216b58555f7942402,2025-06-02T17:32:17.397000 CVE-2025-5443,0,0,c979fc559b9753e7b8f3cea4a3591b3d21b403fd87a023a9ecde01c1efbe3d0f,2025-06-10T15:14:40.057000 @@ -299389,7 +299400,7 @@ CVE-2025-5873,0,0,94e40892e1834c35ffd2c63a40f58e3bdf2ff473f557d19637cf12f248462e CVE-2025-5874,0,0,726c9df65c566725a510f5c58b0c057c9bdfc295fa5f1ff3d2641c2157e02012,2025-06-09T12:15:47.880000 CVE-2025-5875,0,0,c25b34ccfcd613e0dc066c8ac82a22ec084260cbb2bc3930454841ae31515b22,2025-06-23T14:21:01.890000 CVE-2025-5876,0,0,32a8af4e9cd8f7d2c246abe46c081e26ff3051e42e928a128210a8c01026ea88,2025-06-09T13:15:25.777000 -CVE-2025-5877,0,1,d0fc9d475beccd3a1a467515982c1f66a610522bd0dbdcaf601a57c1a88517bd,2025-07-02T19:17:43.003000 +CVE-2025-5877,0,0,d0fc9d475beccd3a1a467515982c1f66a610522bd0dbdcaf601a57c1a88517bd,2025-07-02T19:17:43.003000 CVE-2025-5878,0,0,7460e28b521adf15f1e0947b351c873b699a9b031f986dc0aaec957b1b03014c,2025-06-30T18:38:23.493000 CVE-2025-5879,0,0,756604528009a19f95fc6aaf90273ff5d2ceec0a3e555d776ee81b7d6b78c298,2025-06-12T16:06:47.857000 CVE-2025-5880,0,0,30053a977ddbe5e71c046af93902c42d00bc2985c0890b6525775f4d57544340,2025-06-12T16:06:47.857000 @@ -299561,7 +299572,7 @@ CVE-2025-6136,0,0,5f7e8be2da42633353469049b7512fa5d07106f6da9174f3722e62acbd430a CVE-2025-6137,0,0,ddc67afa546c83e767dcbbc7b7e064e9742a4bea6b7f9760a6f55350f1985699,2025-06-26T16:33:18.123000 CVE-2025-6138,0,0,69c19eff97e06c34f5b8cfdfba9cb33f9498a49d64177b5418e8373bd3e2dbbf,2025-06-20T14:34:32.397000 CVE-2025-6139,0,0,1e573675182fd2c70c93e9d60e690c79091588fc0dffcb1bdf91b56cec3b2b4c,2025-06-26T16:27:37.157000 -CVE-2025-6140,0,1,b68f1270ebcdebc6a09ed170a65e7944b3aca32e5ee78468b2c7d0a773e49e2a,2025-07-02T18:58:42.230000 +CVE-2025-6140,0,0,b68f1270ebcdebc6a09ed170a65e7944b3aca32e5ee78468b2c7d0a773e49e2a,2025-07-02T18:58:42.230000 CVE-2025-6141,0,0,da13bc3db5b6441ec02280dd31d41a049dec0de80cbb8316bf3d83796a9c0f04,2025-06-17T20:50:23.507000 CVE-2025-6142,0,0,e80f42b3df69bc7d34694aade5534d0147faa50d387373f1d151bcbe4aa458f3,2025-06-17T20:50:23.507000 CVE-2025-6143,0,0,27cb56360567787dbec604a031c63766d0d7cb50b276f94212b3c1d5cb88a2f9,2025-06-23T19:29:54.330000 @@ -299573,7 +299584,7 @@ CVE-2025-6148,0,0,1d80dfd65e83b1c0094d1738353bddfce30f1ccddcddac7fd512e97214056b CVE-2025-6149,0,0,bfa9b70c74b833d4b13edc2b8c0deb75557d095959799446cbc897b529f45341,2025-06-23T19:28:26.243000 CVE-2025-6150,0,0,1c1c8c9840248db413992659480d6a0621f81bf1fb34376aa4877ba8e62a64a5,2025-06-23T19:28:18.330000 CVE-2025-6151,0,0,66f985d955d28732cb3e20742ce5c2b75d056fdf6e0c0fd5329b3e2551fd465e,2025-06-19T01:20:04.247000 -CVE-2025-6152,0,1,32d4186f036cfff413fb083fa82eb785e9512523c1a40900c862dc16e87a29b7,2025-07-02T19:47:02.363000 +CVE-2025-6152,0,0,32d4186f036cfff413fb083fa82eb785e9512523c1a40900c862dc16e87a29b7,2025-07-02T19:47:02.363000 CVE-2025-6153,0,0,9cb391bc0c728a51d1642ebf8a165fb9af8fa2212048ca86e4445e0b055258b3,2025-06-24T15:53:37.673000 CVE-2025-6154,0,0,95060072831785f3ed57ae597e6cc6e6409b897d7a65ff870ebacbcf6fb1f450,2025-06-24T15:53:35.847000 CVE-2025-6155,0,0,3e8fc69cbf51a07d93c7df9f9e6e4b66e36cc96b90ecd10cbf6a0ab1b9592e90,2025-06-24T15:53:33.717000 @@ -299588,13 +299599,13 @@ CVE-2025-6163,0,0,6e13a9e163cb9e3184563f5c7b63b8596f5e63cf06bd837983ba5aafb4c041 CVE-2025-6164,0,0,c17ffe7ec702387ad5d177a5e91c7296a9ef4f80a11f6ea499b523afd7af1e02,2025-06-23T19:01:39.440000 CVE-2025-6165,0,0,d37487f3351fd79c79a2b837a802b50cbfd6b0061561d5f5248627aadf9d8941,2025-06-23T18:54:37.140000 CVE-2025-6166,0,0,5466d469b66b84ed623983bf0f3157156a6c338ed721d2f72b93fc8c6a2c9f49,2025-06-17T20:50:23.507000 -CVE-2025-6167,0,1,1a7f72e942e8f63b6fc7e9227e5e064378d6c419b03d398adf0c1014d4174418,2025-07-02T19:36:26.940000 +CVE-2025-6167,0,0,1a7f72e942e8f63b6fc7e9227e5e064378d6c419b03d398adf0c1014d4174418,2025-07-02T19:36:26.940000 CVE-2025-6169,0,0,24b56c63dd5c2b9799043dae6dc3b75a3e06e9ee630be707f681a9bb09cd5b58,2025-06-16T12:32:18.840000 CVE-2025-6170,0,0,b78aff7a1c8e8db8ce7aabd9ccc1b29ff578e0357c573a194099cb12287faea6,2025-06-17T20:50:23.507000 CVE-2025-6172,0,0,df5b11377ae2bcb860baea092fdadde3351cf8aeca30edf92e0d7977024948be,2025-06-16T17:15:31.503000 CVE-2025-6173,0,0,c070b1517acd95c5e869ebc2e1f1712fafd19138bea48c0324a49cddfc5a27e5,2025-06-26T15:57:47.900000 -CVE-2025-6177,0,1,edd6b1d41a5c4b8e0408f6aa59fea86a8c8b780a92c52491789320f71941d7a1,2025-07-02T18:26:40.590000 -CVE-2025-6179,0,1,42334162f4ea7781bf58c27d11fa5142617025c2a62fd9b39e81ec90028c3d21,2025-07-02T18:23:31.617000 +CVE-2025-6177,0,0,edd6b1d41a5c4b8e0408f6aa59fea86a8c8b780a92c52491789320f71941d7a1,2025-07-02T18:26:40.590000 +CVE-2025-6179,0,0,42334162f4ea7781bf58c27d11fa5142617025c2a62fd9b39e81ec90028c3d21,2025-07-02T18:23:31.617000 CVE-2025-6191,0,0,f0f3b688b48f4f8183a91df95fa38ffe0dfc74cf3682559765b5451f2fa22fc1,2025-06-23T20:16:59.783000 CVE-2025-6192,0,0,8db66416da4cd3b86c62307f3f4665206cb350578778274a773d4c246ef21cd0,2025-06-23T20:16:59.783000 CVE-2025-6193,0,0,8f7cbe3660433ebbbde46b01965a942eccd778d0ad783408ec78638602642ace,2025-06-23T20:16:40.143000 @@ -299616,19 +299627,19 @@ CVE-2025-6264,0,0,f32dcf95c634dc2f1ab86702d3943727ebae8018b2fa6b536fe8be4f7c8173 CVE-2025-6266,0,0,83020883d3aae1b262b30700af6ace7e5c0118a4b262e735a3268c83525b299f,2025-06-23T20:16:59.783000 CVE-2025-6267,0,0,f67fce7007c3c00cf880637b4dba7c946432602560144eb3304995260da703c2,2025-06-23T20:16:59.783000 CVE-2025-6268,0,0,5f6af6ae27404ab496f8142bc1bb6b12379a204a2c7b25a2283e1abd50ac4f70,2025-06-23T20:16:59.783000 -CVE-2025-6269,0,1,024eb914f10771a08084c9baf8010d041e3441c638e70a7c2c9e615bdaa7a700,2025-07-02T19:01:55.227000 -CVE-2025-6270,0,1,2f2b33b3f299d0c0737f68aaef955f3f89328f2d6c3aeb68c37b17e94cb9fa3d,2025-07-02T19:02:17.373000 -CVE-2025-6271,0,1,a979bd02238c97052b0931fd18d71d0fb43cf9d242e65ca25985753b912552ae,2025-07-02T19:03:29.737000 -CVE-2025-6272,0,1,69aacf1933584e6c697bffc9f4ef45990c895ad88679eb28f0e65dbaf6d7a0d5,2025-07-02T19:04:23.387000 +CVE-2025-6269,0,0,024eb914f10771a08084c9baf8010d041e3441c638e70a7c2c9e615bdaa7a700,2025-07-02T19:01:55.227000 +CVE-2025-6270,0,0,2f2b33b3f299d0c0737f68aaef955f3f89328f2d6c3aeb68c37b17e94cb9fa3d,2025-07-02T19:02:17.373000 +CVE-2025-6271,0,0,a979bd02238c97052b0931fd18d71d0fb43cf9d242e65ca25985753b912552ae,2025-07-02T19:03:29.737000 +CVE-2025-6272,0,0,69aacf1933584e6c697bffc9f4ef45990c895ad88679eb28f0e65dbaf6d7a0d5,2025-07-02T19:04:23.387000 CVE-2025-6273,0,0,7fbd43be0636c447274ca5dd224661b382933a1bb0936c93b976e34f99babf3b,2025-06-23T20:16:40.143000 -CVE-2025-6274,0,1,d1c56c73fd2ed1a2abccafe1b4d838b5dae80f1e1020fdb3cb0cfa7fc119ea61,2025-07-02T18:33:27.390000 -CVE-2025-6275,0,1,6847ddb53c428ab782b5bb5144510fc9c30ff8873135f2b57a95ea2880350651,2025-07-02T18:34:42.377000 +CVE-2025-6274,0,0,d1c56c73fd2ed1a2abccafe1b4d838b5dae80f1e1020fdb3cb0cfa7fc119ea61,2025-07-02T18:33:27.390000 +CVE-2025-6275,0,0,6847ddb53c428ab782b5bb5144510fc9c30ff8873135f2b57a95ea2880350651,2025-07-02T18:34:42.377000 CVE-2025-6276,0,0,ccb81ed6c0bd85a63d78fd4d2a38a1b018d0dc69b6dbbfdd1314d8ec4b6bfe0b,2025-06-23T20:16:40.143000 CVE-2025-6277,0,0,f3138c5bf160fb9cc92ef2790899f67376501f52199dbecebe88985f0053453c,2025-06-23T20:16:40.143000 CVE-2025-6278,0,0,56924f4824f1de8e40fbe3d811ae61d82b96bc317af063e543633f656d17d6e6,2025-06-23T20:16:40.143000 CVE-2025-6279,0,0,527629d7d97f098383822910b706a7a13367898e9f1dfe64476c44f692b096ba,2025-06-23T20:16:40.143000 CVE-2025-6280,0,0,c054ffe4a30a56c9b692c4925f4f9370a417b5510cae29fc18d2b9dcd65b5f7a,2025-06-23T20:16:40.143000 -CVE-2025-6281,0,1,25aa7b9dfe081c112d8d58e4ce5efb1b8be42368bc102fb60103d61db49b7134,2025-07-02T18:37:11.983000 +CVE-2025-6281,0,0,25aa7b9dfe081c112d8d58e4ce5efb1b8be42368bc102fb60103d61db49b7134,2025-07-02T18:37:11.983000 CVE-2025-6282,0,0,0c2da46a89cbbe9026c79b3c6cf10427703bbd3c6e9eb8bd217b26455bfc69f6,2025-06-23T20:16:40.143000 CVE-2025-6283,0,0,4cfad25df5b2dfa9412a94aeb6561731ac12af51fae0d0ff6c2572f4fb134921,2025-06-23T20:16:40.143000 CVE-2025-6284,0,0,01c0a9b6c36fe98d11c601a672d683a0e8fb89235f309774f6bbaa34d1b90b9b,2025-06-26T21:36:59.597000 @@ -299642,9 +299653,9 @@ CVE-2025-6292,0,0,950777517b48d376f4e9cfbb6475ca5763192a729885525f030e7df89973a7 CVE-2025-6293,0,0,30342ac281aebc0a30969c59d523a1a3a2cc7a536dbaaadfbb8317c27c072af8,2025-06-26T17:22:14.003000 CVE-2025-6294,0,0,2f20bcf126712080bcfde5ea574f9107db7d0aaac3eeac826f2b5961068819f0,2025-06-26T17:21:26.107000 CVE-2025-6295,0,0,c68657e703a32d8a27635af3bd0cbcf47590717c8db4b4d0b6e9b6fdea795c7c,2025-06-26T17:19:48.817000 -CVE-2025-6296,0,1,1b01f8de9ec8aa98699a786d2352531b8134f89a6f041b3b274dde19ecadbda6,2025-07-02T18:46:52.983000 +CVE-2025-6296,0,0,1b01f8de9ec8aa98699a786d2352531b8134f89a6f041b3b274dde19ecadbda6,2025-07-02T18:46:52.983000 CVE-2025-6297,0,0,546fd58bd43ac02228726c05947618b3d9627925bf9812bc9d83c75541bcfc9b,2025-07-01T18:15:26.143000 -CVE-2025-6299,0,1,c652a5d9354c93c03ffa4782b81a8816f51e8849ed73f570b231410e0d04b7c1,2025-07-02T18:53:41.497000 +CVE-2025-6299,0,0,c652a5d9354c93c03ffa4782b81a8816f51e8849ed73f570b231410e0d04b7c1,2025-07-02T18:53:41.497000 CVE-2025-6300,0,0,e2ec6cf8b98712d407f84e21f599347de059cbe66e2eb84a9fc4eb6c7fb27268,2025-06-26T17:14:20.587000 CVE-2025-6301,0,0,1a6a37865c9ad16879d590be6f25642d0cfa9abb4a67fa3b3dc503342ed3c79d,2025-06-26T17:09:26.040000 CVE-2025-6302,0,0,7f10f5dee54455b560940cbe13c783bb122850b8235db9ba002e5789736c0a78,2025-07-02T17:40:51.843000 @@ -299701,7 +299712,7 @@ CVE-2025-6359,0,0,4c6b3a89015ba9383cd0f30179b8f5c4de98d22d2446e398ba201465b8f648 CVE-2025-6360,0,0,cd47aa26c5ecbd48de29b33b9fb52e4ccfc785bed014ddf3d7b77089b3be3045,2025-06-26T15:35:49.490000 CVE-2025-6361,0,0,69dfed4b6ee28f48f4584674801cbba5191a06ac465e39fa526b231064a630aa,2025-06-26T15:33:24.173000 CVE-2025-6362,0,0,ed837364dd32376dc1cfdf8d173bec48f29c4e974fad65f0c43a106ea3f3894b,2025-06-26T15:30:56.573000 -CVE-2025-6363,0,1,a2092da75c1239a931ef4653704a6e5fd116fd3da1a6a5dbab6e327924c9b517,2025-07-02T18:56:45.850000 +CVE-2025-6363,0,0,a2092da75c1239a931ef4653704a6e5fd116fd3da1a6a5dbab6e327924c9b517,2025-07-02T18:56:45.850000 CVE-2025-6364,0,0,be4a9d9271654f5f2f84bfeb78f337d623dc5f4d4aa408522a8f5cef88e4cf46,2025-06-26T15:28:57.953000 CVE-2025-6365,0,0,6295553fcc137edc7fd1d78ad23ef5d3ffd4b910db1e6b10ac05939d4d2aa7b7,2025-06-23T20:16:21.633000 CVE-2025-6367,0,0,bb431b3b23d08c0eaf6da1f3ebee6c3fd3be15fbba72c9deb2782b2a49fd2678,2025-06-25T20:07:04.093000 @@ -299724,7 +299735,7 @@ CVE-2025-6399,0,0,1cc4662a693a649a9f407a6e359aaca52fe988ef413a3d7e4dcc120f8e622d CVE-2025-6400,0,0,b7834b01ffc76dd6d3a754915f4603e275b0aa9a7826af0f6615e59accec721d,2025-06-25T20:13:52.420000 CVE-2025-6401,0,0,5cf4034351d983ee04de416dd673b8a67d86755e6334b356b4bd42e3cd39ff44,2025-06-25T20:14:01.440000 CVE-2025-6402,0,0,9fcf059d93a615de79cdd3b74519970d6c73c80b6f86a7557b01dae4c88ad665,2025-06-25T20:14:57.620000 -CVE-2025-6403,0,1,007861183f6687f9c9a79ed265c27e5792ce1d4050de9b4571cc349ce6d48442,2025-07-02T18:56:36.940000 +CVE-2025-6403,0,0,007861183f6687f9c9a79ed265c27e5792ce1d4050de9b4571cc349ce6d48442,2025-07-02T18:56:36.940000 CVE-2025-6404,0,0,f0c24c4f38cddef26208faf5fffbe2ab0f5998ff0d6d820bde73ac92320b2d1d,2025-06-24T19:33:00.033000 CVE-2025-6405,0,0,892fa39ea25d0fceb083bcffe5177ecfbe7cb9096e1732c10483f9dee58de891,2025-06-24T19:16:58.253000 CVE-2025-6406,0,0,2db684a16f4e28aaee6c2ddbef92630dbb3eb77bc0c3d22bde49da8224e470bc,2025-06-24T19:09:54.780000 @@ -299744,8 +299755,8 @@ CVE-2025-6419,0,0,3035370a10769e2b2e73a65b80dc5ee8dff995026db0f171ea652406a466dc CVE-2025-6420,0,0,9da6d53d9af64779bc447f9508c903bdaaf225194f0f56a912ef73481b378df7,2025-06-25T20:16:33.910000 CVE-2025-6421,0,0,3169c91105fc051d7d3498fdef6562a4792481aab354e9c38ba63bbee575aace,2025-06-25T19:50:23.227000 CVE-2025-6422,0,0,b5bb87a55ad52736bcc24be8713e2086821b4454f2e12e2c901389f24f632355,2025-06-25T19:49:55.057000 -CVE-2025-6424,0,1,0630cc84b8bc4e7e33d067590e034f02a6924c5d57890588fa2ad8820ff20d76,2025-07-02T18:11:28.190000 -CVE-2025-6425,0,0,4e6f88db6b79c26241a241a9d550f07188ec00afadd00edebbade3f226007ade,2025-06-26T18:58:14.280000 +CVE-2025-6424,0,1,1e63adf2085979e6f873069e1f25dbb0b0c105bf60d8b2c9c09f02e2fce4efb4,2025-07-02T21:15:41.517000 +CVE-2025-6425,0,1,fa7cbed5e15a458f8c061c0de26eef9274c73cee36ee7c904693ded1ee8ed5d3,2025-07-02T21:15:41.670000 CVE-2025-6426,0,0,130a7b245654ec700b52dd46d82662a731b3edeb808204b596d0afabe7d54c19,2025-06-26T18:58:14.280000 CVE-2025-6427,0,0,4fd1993d0ac7db16c968bc0eb6d4c8ebb892c92134eaab56fa8b779c043e4819,2025-06-26T18:58:14.280000 CVE-2025-6428,0,0,7e20fafdd0f36de7df3c59cde9ab6c32f568c3b0ee5af525470ee15553873cb8,2025-06-26T18:58:14.280000 @@ -299763,7 +299774,7 @@ CVE-2025-6443,0,0,234c9867f25d85d44fc506bbf75440155c7227dc8656924121bdfd34971fe1 CVE-2025-6444,0,0,37705057457fe7179db85da84838ca3b56fe8ff63e8fcdb240ff0b993581938c,2025-06-26T18:57:43.670000 CVE-2025-6445,0,0,f99b123e574fa4e59daea983acb9603622fc84af3252757bbdb2c3411966afec,2025-06-26T18:57:43.670000 CVE-2025-6446,0,0,3600b7ecc27e2374ecf53656a0787999f8467a509514c75f50c495fcd2cddda1,2025-06-23T20:16:21.633000 -CVE-2025-6447,0,1,cc4ebe57b30e1c29fcaaa701b4af675091d7dd851765dc9a4e58ac638527c45c,2025-07-02T18:24:21.523000 +CVE-2025-6447,0,0,cc4ebe57b30e1c29fcaaa701b4af675091d7dd851765dc9a4e58ac638527c45c,2025-07-02T18:24:21.523000 CVE-2025-6448,0,0,5a0a3ee3d9f4340542c17b153af4b14314a4d2b8a9a47066bf08ed33363fd48a,2025-06-27T16:58:56.890000 CVE-2025-6449,0,0,7b1cdc99f16ea600bb8750d2b6d082ed5fc5e753ed757d63ed225090755d0c8d,2025-06-27T16:59:11.193000 CVE-2025-6450,0,0,08d07073e69e5d11efa66a56b9a50f9dbeb64a9dc7ddde1cd9563a1194634076,2025-06-27T16:59:51.930000 @@ -299860,7 +299871,7 @@ CVE-2025-6566,0,0,affe36b1d137bfbb12f982c13c1f5a07ceb2d195d5a802635829756c7ce109 CVE-2025-6567,0,0,14a2a071a0db80b9d7b89b6f2738bddcf0dd4b44cc731a017fe21ac626971c3b,2025-06-27T16:48:39.390000 CVE-2025-6568,0,0,a4540d7c2520ddc46cfd36d840f1c3e8a02d8624a298126e252d8f82930ddab7,2025-06-27T16:43:42.703000 CVE-2025-6569,0,0,b43ce3c7fe66b936da7e514a37487a1a6951013e9fe5039c6b5b6ecfa14d08be,2025-06-26T18:58:14.280000 -CVE-2025-6570,0,1,ef06c766ed700945b0765e92be8f2736de22bf32e8c65e68952ef9e654cea751,2025-07-02T18:24:35.030000 +CVE-2025-6570,0,0,ef06c766ed700945b0765e92be8f2736de22bf32e8c65e68952ef9e654cea751,2025-07-02T18:24:35.030000 CVE-2025-6578,0,0,a99a9e383f515c0ced0d32ac616ed9a1ed673d64f2ed9cf85426f8c304e13984,2025-06-26T18:58:14.280000 CVE-2025-6579,0,0,3d6a7c5d0aad3e5c34ccac81738e70023b07954822764311505b50e140781b0c,2025-06-26T18:58:14.280000 CVE-2025-6580,0,0,14c9a21bff52d8562deb8a5ff102203adfe298df563381633ada51bbda9d23fc,2025-07-02T17:13:55.277000 @@ -299873,9 +299884,9 @@ CVE-2025-6604,0,0,96d4dfdd3e003ea63aa1e4bba18d79cbe7cea5abcd4dc3ee0391b4f83c2246 CVE-2025-6605,0,0,3b1e9a90fef26eeec1cb23b63bf01d509568da803a212f4c59d24734ac4ce5b3,2025-07-02T16:34:13.343000 CVE-2025-6606,0,0,95377cc9129cebdaa5f3a34697e72c1a75fc693f2083fa64b9fdb2a4aacce7cf,2025-07-02T16:23:44.753000 CVE-2025-6607,0,0,5d2ed51fefc4ee7d5927f68a2b22555ed1cd7c54d232405f09ca25f5bc7c299d,2025-07-02T16:20:14.400000 -CVE-2025-6608,0,1,cb3f6b0bfbbd057d2a402b3531cf43c4915b6d50c6cd74b52259c17d2e8110d4,2025-07-02T18:24:47.807000 -CVE-2025-6609,0,1,8674c3684ac1cabbd631923e3d3e8db7a4e769694a18039c08e4cd4eb094bc34,2025-07-02T18:24:56.760000 -CVE-2025-6610,0,1,e0a0ac50a3ac5be67a10a2b3071a05d9af3fdc035a32bce33ddacfc6d4e7b2b8,2025-07-02T18:29:30.530000 +CVE-2025-6608,0,0,cb3f6b0bfbbd057d2a402b3531cf43c4915b6d50c6cd74b52259c17d2e8110d4,2025-07-02T18:24:47.807000 +CVE-2025-6609,0,0,8674c3684ac1cabbd631923e3d3e8db7a4e769694a18039c08e4cd4eb094bc34,2025-07-02T18:24:56.760000 +CVE-2025-6610,0,0,e0a0ac50a3ac5be67a10a2b3071a05d9af3fdc035a32bce33ddacfc6d4e7b2b8,2025-07-02T18:29:30.530000 CVE-2025-6611,0,0,7995f1edc0c30b62b1f03248a1d743ad11e83dfc62a7cad6296156bfe59bddfa,2025-06-27T18:35:43.527000 CVE-2025-6612,0,0,07b59bf2a678137703650a46707e7aec19f5fdbc648bdd54e33c6dd2e18a3de4,2025-06-27T18:22:07.427000 CVE-2025-6613,0,0,c2bb8cd99265a5034c5ee33c32e611c24a3a55d21cdfdfeada424dd85f68d2a1,2025-07-02T16:43:35.053000 @@ -300076,7 +300087,7 @@ CVE-2025-6937,0,0,b10d8c1265117b053b6599e6b544c7c61d2c978d507bac9b95b840b3f696bf CVE-2025-6938,0,0,4fd9227ca597d68f11aeeaf0509beaf1b4bac7f33c7e6cf52ec4920ff118ddaa,2025-07-01T14:15:42.597000 CVE-2025-6939,0,0,22776f4e1566605da22c764584fd19e7bf5c94050807d3717fc162d620a969e9,2025-07-01T14:15:42.923000 CVE-2025-6940,0,0,692dc02623b91f77fa8a61f1ce9db90633920d7bc4914267ab9387b6f19f68ff,2025-07-01T14:15:43.063000 -CVE-2025-6942,0,0,dae50f0c834a45857e9193e44500f4fb13c41056df3c36a0f1feeabe6f40778b,2025-07-02T16:15:29.883000 +CVE-2025-6942,0,1,83a5e5e1ce50f3aa56fb8b5a20dcb89667587d5e1650ef446dc9762e08db271e,2025-07-02T20:15:31.957000 CVE-2025-6943,0,0,47ec0034a5e60779e756f274ba911165a53ed9b90dca2c4c369b8c069340ea4a,2025-07-02T16:15:30.060000 CVE-2025-6951,0,0,bc0426adb285583bec2a19fe1efc81ab85a4e6e2c93ef1f9996dfc34d21d6e46,2025-07-01T12:15:24.123000 CVE-2025-6952,0,0,ef1bec1b6180d9fb26ad38c0771f751baec562e5a678d8e9b2113976cfeed9a0,2025-07-01T12:15:24.343000