From c89f0f34a38426d3902151cd6036aff355339640 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sat, 17 May 2025 04:03:55 +0000 Subject: [PATCH] Auto-Update: 2025-05-17T04:00:20.173634+00:00 --- CVE-2022/CVE-2022-43xx/CVE-2022-4363.json | 27 +++- CVE-2023/CVE-2023-70xx/CVE-2023-7086.json | 27 +++- CVE-2023/CVE-2023-70xx/CVE-2023-7088.json | 27 +++- CVE-2024/CVE-2024-104xx/CVE-2024-10499.json | 40 +++++- CVE-2024/CVE-2024-105xx/CVE-2024-10517.json | 40 +++++- CVE-2024/CVE-2024-105xx/CVE-2024-10518.json | 40 +++++- CVE-2024/CVE-2024-105xx/CVE-2024-10568.json | 40 +++++- CVE-2024/CVE-2024-107xx/CVE-2024-10708.json | 40 +++++- CVE-2024/CVE-2024-111xx/CVE-2024-11107.json | 40 +++++- CVE-2024/CVE-2024-118xx/CVE-2024-11841.json | 40 +++++- CVE-2024/CVE-2024-118xx/CVE-2024-11842.json | 46 ++++++- CVE-2024/CVE-2024-119xx/CVE-2024-11972.json | 40 +++++- CVE-2024/CVE-2024-125xx/CVE-2024-12587.json | 40 +++++- CVE-2024/CVE-2024-127xx/CVE-2024-12714.json | 28 +++- CVE-2024/CVE-2024-127xx/CVE-2024-12715.json | 28 +++- CVE-2024/CVE-2024-32xx/CVE-2024-3282.json | 40 +++++- CVE-2024/CVE-2024-454xx/CVE-2024-45404.json | 62 ++++++++- CVE-2024/CVE-2024-480xx/CVE-2024-48074.json | 44 +++++- CVE-2024/CVE-2024-577xx/CVE-2024-57771.json | 34 ++++- CVE-2024/CVE-2024-577xx/CVE-2024-57772.json | 36 ++++- CVE-2024/CVE-2024-577xx/CVE-2024-57773.json | 36 ++++- CVE-2024/CVE-2024-577xx/CVE-2024-57774.json | 36 ++++- CVE-2024/CVE-2024-577xx/CVE-2024-57776.json | 29 +++- CVE-2024/CVE-2024-67xx/CVE-2024-6715.json | 40 +++++- CVE-2024/CVE-2024-68xx/CVE-2024-6879.json | 28 +++- CVE-2024/CVE-2024-73xx/CVE-2024-7313.json | 40 +++++- CVE-2024/CVE-2024-89xx/CVE-2024-8983.json | 40 +++++- CVE-2024/CVE-2024-93xx/CVE-2024-9305.json | 62 ++++++++- CVE-2025/CVE-2025-324xx/CVE-2025-32407.json | 39 +++++- CVE-2025/CVE-2025-409xx/CVE-2025-40906.json | 27 +++- CVE-2025/CVE-2025-48xx/CVE-2025-4802.json | 27 +++- CVE-2025/CVE-2025-48xx/CVE-2025-4814.json | 145 ++++++++++++++++++++ CVE-2025/CVE-2025-48xx/CVE-2025-4815.json | 145 ++++++++++++++++++++ README.md | 49 ++++--- _state.csv | 90 ++++++------ 35 files changed, 1433 insertions(+), 159 deletions(-) create mode 100644 CVE-2025/CVE-2025-48xx/CVE-2025-4814.json create mode 100644 CVE-2025/CVE-2025-48xx/CVE-2025-4815.json diff --git a/CVE-2022/CVE-2022-43xx/CVE-2022-4363.json b/CVE-2022/CVE-2022-43xx/CVE-2022-4363.json index d4834ea0163..20302f2adaa 100644 --- a/CVE-2022/CVE-2022-43xx/CVE-2022-4363.json +++ b/CVE-2022/CVE-2022-43xx/CVE-2022-4363.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4363", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-16T21:15:33.123", - "lastModified": "2025-05-16T21:15:33.123", + "lastModified": "2025-05-17T03:15:24.300", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "The Wholesale Market WordPress plugin before 2.2.2, Wholesale Market for WooCommerce WordPress plugin before 2.0.1 have a flawed CSRF check when updating their settings, which could allow attackers to make a logged in admin update them via a CSRF attack" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/734dba0b-f550-4372-884a-d42f7b0c00c7/", diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7086.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7086.json index 70e4b57bbde..5c4be8389d6 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7086.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7086.json @@ -2,7 +2,7 @@ "id": "CVE-2023-7086", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:29.950", - "lastModified": "2025-05-16T14:43:26.160", + "lastModified": "2025-05-17T03:15:26.153", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento SVG Uploads Support de WordPress hasta la versi\u00f3n 2.1.1 no depura los archivos SVG cargados, lo que podr\u00eda permitir que los usuarios con un rol tan bajo como Autor carguen un SVG malicioso que contenga payloads XSS." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/94954e1a-dc09-4811-b57d-b12bf69a767d/", diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7088.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7088.json index 5e2f54f89b6..e90ac325f45 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7088.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7088.json @@ -2,7 +2,7 @@ "id": "CVE-2023-7088", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:30.040", - "lastModified": "2025-05-16T14:43:26.160", + "lastModified": "2025-05-17T03:15:26.553", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Add SVG Support for Media Uploader | inventivo WordPress hasta la versi\u00f3n 1.0.5 no depura los archivos SVG cargados, lo que podr\u00eda permitir que los usuarios con un rol tan bajo como Autor carguen un SVG malicioso que contenga payloads XSS." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/8f515e36-9072-4fc4-9d2f-d50f1adde626/", diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10499.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10499.json index ec6beac3c67..53f2fb6d4a2 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10499.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10499.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10499", "sourceIdentifier": "contact@wpscan.com", "published": "2024-12-12T06:15:20.337", - "lastModified": "2024-12-12T16:15:10.113", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-05-17T02:25:50.203", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:meowapps:ai_engine:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.6.5", + "matchCriteriaId": "56136211-2279-4122-9DC4-B70A190416B1" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/8606a93a-f61d-40df-a67e-0ac75eeadee8/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10517.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10517.json index 22aebbc1304..d838da36aca 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10517.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10517.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10517", "sourceIdentifier": "contact@wpscan.com", "published": "2024-12-12T06:15:20.457", - "lastModified": "2024-12-12T16:15:10.483", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-05-17T02:28:18.643", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:properfraction:profilepress:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "4.15.5", + "matchCriteriaId": "DAEFAACF-4FC6-4DA3-AB61-9BC596FA132F" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/f7c3a990-458e-4e15-b427-0b37de120740/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10518.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10518.json index eb405289dbb..04d96b846d0 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10518.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10518.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10518", "sourceIdentifier": "contact@wpscan.com", "published": "2024-12-12T06:15:20.593", - "lastModified": "2024-12-12T16:15:10.890", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-05-17T02:28:54.307", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:properfraction:profilepress:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "4.15.15", + "matchCriteriaId": "758C1DFF-9AA1-48FD-BB41-A72CEFBF5DF6" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/a1e5ad16-6240-4920-888a-36fbac22cc71/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10568.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10568.json index 706238feb0c..7f6db6e8da9 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10568.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10568.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10568", "sourceIdentifier": "contact@wpscan.com", "published": "2024-12-12T06:15:20.713", - "lastModified": "2024-12-12T16:15:11.250", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-05-17T02:31:03.903", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wp-dreams:ajax_search:*:*:*:*:lite:wordpress:*:*", + "versionEndExcluding": "4.12.4", + "matchCriteriaId": "C0039B4D-0D48-4046-98B9-DAD4E48CBDC0" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/1676aef0-be5d-4335-933d-dc0d54416fd4/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10708.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10708.json index 955287ed084..9d80cc265a1 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10708.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10708.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10708", "sourceIdentifier": "contact@wpscan.com", "published": "2024-12-10T06:15:20.737", - "lastModified": "2024-12-10T16:15:22.327", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-05-17T02:00:25.033", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bowo:system_dashboard:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.8.15", + "matchCriteriaId": "B27B70AC-1C23-446C-B63F-38DBBE996689" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/61d750a5-8c2c-4c94-a1a9-6a254c2a0d03/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11107.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11107.json index d7126f48d96..788d91b4c20 100644 --- a/CVE-2024/CVE-2024-111xx/CVE-2024-11107.json +++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11107.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11107", "sourceIdentifier": "contact@wpscan.com", "published": "2024-12-10T06:15:20.883", - "lastModified": "2024-12-10T16:15:22.450", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-05-17T02:02:04.643", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bowo:system_dashboard:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.8.15", + "matchCriteriaId": "B27B70AC-1C23-446C-B63F-38DBBE996689" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/a89f1117-8df3-417b-b54f-6587545833ee/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-118xx/CVE-2024-11841.json b/CVE-2024/CVE-2024-118xx/CVE-2024-11841.json index 28ff0a2f291..30e8929c666 100644 --- a/CVE-2024/CVE-2024-118xx/CVE-2024-11841.json +++ b/CVE-2024/CVE-2024-118xx/CVE-2024-11841.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11841", "sourceIdentifier": "contact@wpscan.com", "published": "2024-12-16T06:15:05.967", - "lastModified": "2024-12-16T17:15:07.830", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-05-17T02:19:18.333", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jordangillman:tithe.ly_giving_button:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.1", + "matchCriteriaId": "C98A6641-C2CA-4EFF-AC36-F131CF204AE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/e344c722-c9b3-4527-a50d-50cdf07ebace/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-118xx/CVE-2024-11842.json b/CVE-2024/CVE-2024-118xx/CVE-2024-11842.json index 45d5dcebf36..2a97fadec90 100644 --- a/CVE-2024/CVE-2024-118xx/CVE-2024-11842.json +++ b/CVE-2024/CVE-2024-118xx/CVE-2024-11842.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11842", "sourceIdentifier": "contact@wpscan.com", "published": "2024-12-27T06:15:23.260", - "lastModified": "2024-12-27T19:15:07.700", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-05-17T02:20:59.160", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:digireturn:shipping_by_weight_for_woocommerce:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.2", + "matchCriteriaId": "F1B4EFF4-4FE4-40A1-AF10-806B8603A0CE" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/2545f054-b6ca-4ee5-ac6f-f42193db21b1/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/2545f054-b6ca-4ee5-ac6f-f42193db21b1/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-119xx/CVE-2024-11972.json b/CVE-2024/CVE-2024-119xx/CVE-2024-11972.json index aaba4336c37..6ff99bd84ef 100644 --- a/CVE-2024/CVE-2024-119xx/CVE-2024-11972.json +++ b/CVE-2024/CVE-2024-119xx/CVE-2024-11972.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11972", "sourceIdentifier": "contact@wpscan.com", "published": "2024-12-31T06:15:23.777", - "lastModified": "2024-12-31T19:15:07.720", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-05-17T02:22:32.007", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themehunk:hunk_companion:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.9.0", + "matchCriteriaId": "BB19F3F1-97C9-4B4C-825C-CB52ADFB853E" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/4963560b-e4ae-451d-8f94-482779c415e4/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12587.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12587.json index 159180b559e..6e383fa3c26 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12587.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12587.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12587", "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-11T06:15:25.070", - "lastModified": "2025-01-13T20:15:27.283", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-05-17T02:35:33.397", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:edmonparker:contact_form_master:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0.7", + "matchCriteriaId": "DACAE805-2743-451D-ADDC-9C7A96EFC523" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/7cb040f5-d154-48ea-a54e-80451054bad8/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12714.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12714.json index 6032d73e122..e1238f1a4ff 100644 --- a/CVE-2024/CVE-2024-127xx/CVE-2024-12714.json +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12714.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12714", "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-09T06:15:14.797", - "lastModified": "2025-01-09T16:15:36.200", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-05-17T02:33:26.170", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:syedfakharabbas:backlink_monitoring_manager:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "0.1.3", + "matchCriteriaId": "7EC40DD5-F134-4C06-A68E-83A0A860C85E" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/f7fb2aef-16ce-4ae7-927c-2ffbc45fbda5/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12715.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12715.json index fe93a84896e..3c43275f9e2 100644 --- a/CVE-2024/CVE-2024-127xx/CVE-2024-12715.json +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12715.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12715", "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-09T06:15:14.917", - "lastModified": "2025-01-09T16:15:36.360", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-05-17T02:34:13.747", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:outself:asgard_security_scanner:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "0.7", + "matchCriteriaId": "D3DB857F-61FF-4CC9-8B15-BF521BC11767" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/e1456295-75ba-4dc2-9b1a-dc16a2000db2/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3282.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3282.json index 5006feaa66c..bc42f20472b 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3282.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3282.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3282", "sourceIdentifier": "contact@wpscan.com", "published": "2024-08-23T06:15:03.827", - "lastModified": "2024-08-23T16:18:28.547", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-05-17T02:06:54.693", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wptablebuilder:wp_table_builder:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.5.0", + "matchCriteriaId": "495B3306-5F0B-4C49-9C0E-B3D5787EADE2" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/12bf5e8e-24c9-48b9-b94c-c14ed60d7c15/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45404.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45404.json index 48df8614e39..6def7930e0d 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45404.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45404.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45404", "sourceIdentifier": "security-advisories@github.com", "published": "2024-12-12T02:02:09.530", - "lastModified": "2024-12-12T17:15:10.350", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-05-17T02:05:54.883", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-287" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-307" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:citeum:opencti:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.2.18", + "matchCriteriaId": "73074131-0C42-403D-A5DD-093EC773C608" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/OpenCTI-Platform/opencti/security/advisories/GHSA-hg56-r6hh-56j7", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/OpenCTI-Platform/opencti/security/advisories/GHSA-hg56-r6hh-56j7", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48074.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48074.json index fdb1803cdc5..6978effa831 100644 --- a/CVE-2024/CVE-2024-480xx/CVE-2024-48074.json +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48074.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48074", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-28T12:15:15.200", - "lastModified": "2024-11-08T22:15:20.877", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-05-17T02:14:47.187", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,50 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:draytek:vigor2960_firmware:1.4.4:*:*:*:*:*:*:*", + "matchCriteriaId": "44456785-AB07-490E-B33A-20CD6256EFB2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:draytek:vigor2960:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FDA3905-67DD-4F31-AFCF-014F1D7CCC1F" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Giles-one/6425e97dcd1ec97a722a1e20da25fad7", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/Giles-one/Vigor2960Crack", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57771.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57771.json index 6fdb038f476..bc57cab208b 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57771.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57771.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57771", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T18:15:26.717", - "lastModified": "2025-01-21T17:15:15.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-05-17T02:40:09.990", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jfinaloa_project:jfinaloa:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2025.01.01", + "matchCriteriaId": "AC9E759C-8A11-46AC-8E72-931B13695002" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/r1bbit/JFinalOA/issues/IBHUPO", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://gitee.com/r1bbit/JFinalOA/issues/IBHUPO", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57772.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57772.json index 451adf0496b..c175494deeb 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57772.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57772.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57772", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T18:15:26.940", - "lastModified": "2025-01-21T17:15:16.073", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-05-17T02:38:38.273", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,42 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jfinaloa_project:jfinaloa:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2025.01.01", + "matchCriteriaId": "AC9E759C-8A11-46AC-8E72-931B13695002" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/r1bbit/JFinalOA/issues/IBHUQ1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://gitee.com/r1bbit/JFinalOA/issues/IBHUQ1", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57773.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57773.json index a85ef00cd94..2eb0ae45034 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57773.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57773.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57773", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T18:15:27.173", - "lastModified": "2025-01-21T17:15:16.250", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-05-17T02:40:49.667", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,42 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jfinaloa_project:jfinaloa:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2025.01.01", + "matchCriteriaId": "AC9E759C-8A11-46AC-8E72-931B13695002" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/r1bbit/JFinalOA/issues/IBHUQ9", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://gitee.com/r1bbit/JFinalOA/issues/IBHUQ9", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57774.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57774.json index 7022cfa8b79..d90e040f038 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57774.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57774.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57774", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T18:15:27.407", - "lastModified": "2025-01-21T17:15:16.433", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-05-17T02:42:13.593", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,42 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jfinaloa_project:jfinaloa:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2025.01.01", + "matchCriteriaId": "AC9E759C-8A11-46AC-8E72-931B13695002" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/r1bbit/JFinalOA/issues/IBHUQQ", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://gitee.com/r1bbit/JFinalOA/issues/IBHUQQ", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57776.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57776.json index f2bd86ebb1a..33b368db401 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57776.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57776.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57776", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T18:15:27.870", - "lastModified": "2025-02-03T20:15:36.390", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-05-17T02:42:46.927", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,33 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jfinaloa_project:jfinaloa:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2025.01.01", + "matchCriteriaId": "AC9E759C-8A11-46AC-8E72-931B13695002" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/r1bbit/JFinalOA/issues/IBHUS8", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6715.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6715.json index 0f293a91d9e..8265e227dce 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6715.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6715.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6715", "sourceIdentifier": "contact@wpscan.com", "published": "2024-08-23T06:15:04.070", - "lastModified": "2024-08-26T15:35:18.010", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-05-17T02:08:32.527", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:metaphorcreations:ditty:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.1.46", + "matchCriteriaId": "150FEFD2-812A-4FF2-AAD5-DB4F26D5204E" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/19406acc-3441-4d4a-9163-ace8f1dceb78/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6879.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6879.json index 84535bb0fd8..dd2efbb0347 100644 --- a/CVE-2024/CVE-2024-68xx/CVE-2024-6879.json +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6879.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6879", "sourceIdentifier": "contact@wpscan.com", "published": "2024-08-26T06:15:04.867", - "lastModified": "2024-08-28T15:35:24.120", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-05-17T02:09:38.120", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:expresstech:quiz_and_survey_master:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "9.1.1", + "matchCriteriaId": "A3FFA074-C525-4BE1-BF8A-004DDB46D1D3" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/4da0b318-03e7-409d-9b02-f108e4232c87/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7313.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7313.json index 0c90e1316c4..77a3a9f8657 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7313.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7313.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7313", "sourceIdentifier": "contact@wpscan.com", "published": "2024-08-26T06:15:04.947", - "lastModified": "2024-08-26T18:35:13.207", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-05-17T02:11:04.260", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:getshieldsecurity:shield_security:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "20.0.6", + "matchCriteriaId": "2AB1F214-9890-40C5-9A47-21D6FE4DDDA1" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/83a1bdc6-098e-43d5-89e5-f4202ecd78a1/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8983.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8983.json index edf44cc2b53..2c720518314 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8983.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8983.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8983", "sourceIdentifier": "contact@wpscan.com", "published": "2024-10-08T06:15:02.490", - "lastModified": "2024-10-10T12:57:21.987", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-05-17T02:12:17.000", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:smashballoon:custom_twitter_feeds:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.2.3", + "matchCriteriaId": "1DFAEB3B-AA1E-4916-824D-927D2BABBCDD" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/29194dde-8d11-4096-a5ae-1d69c2c5dc33/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9305.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9305.json index 3e049561bcf..34560b74fb7 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9305.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9305.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9305", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-16T02:15:07.050", - "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-05-17T02:49:17.100", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -51,22 +71,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apppresser:apppresser:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.4.5", + "matchCriteriaId": "A4E4D62C-536A-42F0-975F-B4DB5BAD7B1D" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/apppresser/tags/4.4.4/inc/AppPresser_Ajax_Extras.php#L31", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/apppresser/tags/4.4.4/inc/AppPresser_WPAPI_Mods.php#L92", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3168744%40apppresser&new=3168744%40apppresser&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/45647fa6-a98d-4eb4-a287-f523e434688b?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32407.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32407.json index 92958d50c76..23e9b500677 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32407.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32407.json @@ -2,7 +2,7 @@ "id": "CVE-2025-32407", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-16T21:15:35.093", - "lastModified": "2025-05-16T21:15:35.093", + "lastModified": "2025-05-17T03:15:59.837", "vulnStatus": "Received", "cveTags": [ { @@ -18,7 +18,42 @@ "value": "Samsung Internet for Galaxy Watch version 5.0.9, available up until Samsung Galaxy Watch 3, does not properly validate TLS certificates, allowing for an attacker to impersonate any and all websites visited by the user. This is a critical misconfiguration in the way the browser validates the identity of the server. It negates the use of HTTPS as a secure channel, allowing for Man-in-the-Middle attacks, stealing sensitive information or modifying incoming and outgoing traffic. NOTE: This vulnerability is in an end-of-life product that is no longer maintained by the vendor." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] + } + ], "references": [ { "url": "https://github.com/diegovargasj/CVE-2025-32407", diff --git a/CVE-2025/CVE-2025-409xx/CVE-2025-40906.json b/CVE-2025/CVE-2025-409xx/CVE-2025-40906.json index f66fcc73e97..1727e0ac669 100644 --- a/CVE-2025/CVE-2025-409xx/CVE-2025-40906.json +++ b/CVE-2025/CVE-2025-409xx/CVE-2025-40906.json @@ -2,7 +2,7 @@ "id": "CVE-2025-40906", "sourceIdentifier": "9b29abf9-4ab0-4765-b253-1875cd9b441e", "published": "2025-05-16T16:15:41.493", - "lastModified": "2025-05-16T16:15:41.493", + "lastModified": "2025-05-17T03:16:49.357", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "BSON::XS versions 0.8.4 and earlier for Perl includes a bundled libbson 1.1.7, which has several vulnerabilities.\n\nThose include CVE-2017-14227, CVE-2018-16790, CVE-2023-0437, CVE-2024-6381, CVE-2024-6383, and CVE-2025-0755. \n\nBSON-XS was the official Perl XS implementation of MongoDB's BSON serialization, but this distribution has reached its end of life as of August 13, 2020 and is no longer supported." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e", diff --git a/CVE-2025/CVE-2025-48xx/CVE-2025-4802.json b/CVE-2025/CVE-2025-48xx/CVE-2025-4802.json index f38ea54538e..2eed6fe0e21 100644 --- a/CVE-2025/CVE-2025-48xx/CVE-2025-4802.json +++ b/CVE-2025/CVE-2025-48xx/CVE-2025-4802.json @@ -2,7 +2,7 @@ "id": "CVE-2025-4802", "sourceIdentifier": "3ff69d7a-14f2-4f67-a097-88dee7810d18", "published": "2025-05-16T20:15:22.280", - "lastModified": "2025-05-17T01:15:18.220", + "lastModified": "2025-05-17T03:16:56.270", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Library version 2.27 to 2.38 allows attacker controlled loading of dynamically shared library in statically compiled setuid binaries that call dlopen (including internal dlopen calls after setlocale or calls to NSS functions such as getaddrinfo)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "3ff69d7a-14f2-4f67-a097-88dee7810d18", diff --git a/CVE-2025/CVE-2025-48xx/CVE-2025-4814.json b/CVE-2025/CVE-2025-48xx/CVE-2025-4814.json new file mode 100644 index 00000000000..6e7fd1f5a38 --- /dev/null +++ b/CVE-2025/CVE-2025-48xx/CVE-2025-4814.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-4814", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-05-17T03:17:09.000", + "lastModified": "2025-05-17T03:17:09.000", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in Campcodes Sales and Inventory System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /pages/supplier_add.php. The manipulation of the argument Name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/iGGbondTC/cve/issues/1", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.309271", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.309271", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.574081", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.campcodes.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-48xx/CVE-2025-4815.json b/CVE-2025/CVE-2025-48xx/CVE-2025-4815.json new file mode 100644 index 00000000000..771866cdc69 --- /dev/null +++ b/CVE-2025/CVE-2025-48xx/CVE-2025-4815.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-4815", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-05-17T03:17:10.280", + "lastModified": "2025-05-17T03:17:10.280", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Campcodes Sales and Inventory System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /pages/supplier_update.php. The manipulation of the argument Name leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/iGGbondTC/cve/issues/2", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.309272", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.309272", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.574082", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.campcodes.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 99a8f637c43..62a4bdd7b0d 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-05-17T02:00:19.288604+00:00 +2025-05-17T04:00:20.173634+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-05-17T01:58:54.080000+00:00 +2025-05-17T03:17:10.280000+00:00 ``` ### Last Data Feed Release @@ -33,33 +33,46 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -294463 +294465 ``` ### CVEs added in the last Commit Recently added CVEs: `2` -- [CVE-2024-47893](CVE-2024/CVE-2024-478xx/CVE-2024-47893.json) (`2025-05-17T01:15:17.053`) -- [CVE-2025-1706](CVE-2025/CVE-2025-17xx/CVE-2025-1706.json) (`2025-05-17T01:15:18.103`) +- [CVE-2025-4814](CVE-2025/CVE-2025-48xx/CVE-2025-4814.json) (`2025-05-17T03:17:09.000`) +- [CVE-2025-4815](CVE-2025/CVE-2025-48xx/CVE-2025-4815.json) (`2025-05-17T03:17:10.280`) ### CVEs modified in the last Commit -Recently modified CVEs: `12` +Recently modified CVEs: `31` -- [CVE-2022-38946](CVE-2022/CVE-2022-389xx/CVE-2022-38946.json) (`2025-05-17T01:58:54.080`) -- [CVE-2022-38947](CVE-2022/CVE-2022-389xx/CVE-2022-38947.json) (`2025-05-17T01:57:19.603`) -- [CVE-2024-10000](CVE-2024/CVE-2024-100xx/CVE-2024-10000.json) (`2025-05-17T01:44:25.040`) -- [CVE-2024-10008](CVE-2024/CVE-2024-100xx/CVE-2024-10008.json) (`2025-05-17T01:43:57.553`) -- [CVE-2024-10480](CVE-2024/CVE-2024-104xx/CVE-2024-10480.json) (`2025-05-17T01:54:01.437`) -- [CVE-2024-10893](CVE-2024/CVE-2024-108xx/CVE-2024-10893.json) (`2025-05-17T01:49:51.280`) -- [CVE-2024-48411](CVE-2024/CVE-2024-484xx/CVE-2024-48411.json) (`2025-05-17T01:37:19.267`) -- [CVE-2024-51242](CVE-2024/CVE-2024-512xx/CVE-2024-51242.json) (`2025-05-17T01:40:33.183`) -- [CVE-2024-5429](CVE-2024/CVE-2024-54xx/CVE-2024-5429.json) (`2025-05-17T01:39:09.230`) -- [CVE-2024-8378](CVE-2024/CVE-2024-83xx/CVE-2024-8378.json) (`2025-05-17T01:45:00.733`) -- [CVE-2024-9934](CVE-2024/CVE-2024-99xx/CVE-2024-9934.json) (`2025-05-17T01:46:01.733`) -- [CVE-2025-4802](CVE-2025/CVE-2025-48xx/CVE-2025-4802.json) (`2025-05-17T01:15:18.220`) +- [CVE-2024-10568](CVE-2024/CVE-2024-105xx/CVE-2024-10568.json) (`2025-05-17T02:31:03.903`) +- [CVE-2024-10708](CVE-2024/CVE-2024-107xx/CVE-2024-10708.json) (`2025-05-17T02:00:25.033`) +- [CVE-2024-11107](CVE-2024/CVE-2024-111xx/CVE-2024-11107.json) (`2025-05-17T02:02:04.643`) +- [CVE-2024-11841](CVE-2024/CVE-2024-118xx/CVE-2024-11841.json) (`2025-05-17T02:19:18.333`) +- [CVE-2024-11842](CVE-2024/CVE-2024-118xx/CVE-2024-11842.json) (`2025-05-17T02:20:59.160`) +- [CVE-2024-11972](CVE-2024/CVE-2024-119xx/CVE-2024-11972.json) (`2025-05-17T02:22:32.007`) +- [CVE-2024-12587](CVE-2024/CVE-2024-125xx/CVE-2024-12587.json) (`2025-05-17T02:35:33.397`) +- [CVE-2024-12714](CVE-2024/CVE-2024-127xx/CVE-2024-12714.json) (`2025-05-17T02:33:26.170`) +- [CVE-2024-12715](CVE-2024/CVE-2024-127xx/CVE-2024-12715.json) (`2025-05-17T02:34:13.747`) +- [CVE-2024-3282](CVE-2024/CVE-2024-32xx/CVE-2024-3282.json) (`2025-05-17T02:06:54.693`) +- [CVE-2024-45404](CVE-2024/CVE-2024-454xx/CVE-2024-45404.json) (`2025-05-17T02:05:54.883`) +- [CVE-2024-48074](CVE-2024/CVE-2024-480xx/CVE-2024-48074.json) (`2025-05-17T02:14:47.187`) +- [CVE-2024-57771](CVE-2024/CVE-2024-577xx/CVE-2024-57771.json) (`2025-05-17T02:40:09.990`) +- [CVE-2024-57772](CVE-2024/CVE-2024-577xx/CVE-2024-57772.json) (`2025-05-17T02:38:38.273`) +- [CVE-2024-57773](CVE-2024/CVE-2024-577xx/CVE-2024-57773.json) (`2025-05-17T02:40:49.667`) +- [CVE-2024-57774](CVE-2024/CVE-2024-577xx/CVE-2024-57774.json) (`2025-05-17T02:42:13.593`) +- [CVE-2024-57776](CVE-2024/CVE-2024-577xx/CVE-2024-57776.json) (`2025-05-17T02:42:46.927`) +- [CVE-2024-6715](CVE-2024/CVE-2024-67xx/CVE-2024-6715.json) (`2025-05-17T02:08:32.527`) +- [CVE-2024-6879](CVE-2024/CVE-2024-68xx/CVE-2024-6879.json) (`2025-05-17T02:09:38.120`) +- [CVE-2024-7313](CVE-2024/CVE-2024-73xx/CVE-2024-7313.json) (`2025-05-17T02:11:04.260`) +- [CVE-2024-8983](CVE-2024/CVE-2024-89xx/CVE-2024-8983.json) (`2025-05-17T02:12:17.000`) +- [CVE-2024-9305](CVE-2024/CVE-2024-93xx/CVE-2024-9305.json) (`2025-05-17T02:49:17.100`) +- [CVE-2025-32407](CVE-2025/CVE-2025-324xx/CVE-2025-32407.json) (`2025-05-17T03:15:59.837`) +- [CVE-2025-40906](CVE-2025/CVE-2025-409xx/CVE-2025-40906.json) (`2025-05-17T03:16:49.357`) +- [CVE-2025-4802](CVE-2025/CVE-2025-48xx/CVE-2025-4802.json) (`2025-05-17T03:16:56.270`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 59e249c8a4e..48c542bf0b2 100644 --- a/_state.csv +++ b/_state.csv @@ -205757,8 +205757,8 @@ CVE-2022-38934,0,0,40d670d084123a35b6cf8e015d52100eba55e2e591a681d9be36901d5638d CVE-2022-38935,0,0,2867d602c6816f4aac26b935d0fc4fa197c9c6383b9487da9bba57d30962066a,2025-03-19T18:15:17.327000 CVE-2022-38936,0,0,b3e505552a6410e493866b78c37513e198bc95afcfc929838b193c22c9abfd36,2024-11-21T07:17:16.647000 CVE-2022-3894,0,0,b65672f2b7fa6c87ba7d4ddc2f311715efba1c64fcf556984e6c7ac4fdc452c5,2025-02-26T19:15:13.690000 -CVE-2022-38946,0,1,57509dee103c0dcf19485204211d9a706a23e7a618d157d3fcfbd0b6e0ce3d9b,2025-05-17T01:58:54.080000 -CVE-2022-38947,0,1,856da39aaf2d23025e058a4ee26ab51e984620b372e337b614c26a65975ed263,2025-05-17T01:57:19.603000 +CVE-2022-38946,0,0,57509dee103c0dcf19485204211d9a706a23e7a618d157d3fcfbd0b6e0ce3d9b,2025-05-17T01:58:54.080000 +CVE-2022-38947,0,0,856da39aaf2d23025e058a4ee26ab51e984620b372e337b614c26a65975ed263,2025-05-17T01:57:19.603000 CVE-2022-3895,0,0,a9fc841d0237473e1e94e430db8d1fa94b66fa1951ff679c2163fbfb09a98fbf,2024-11-21T07:20:29.067000 CVE-2022-38955,0,0,c67dc1036670bcfb324220053bea90a87f57af5b5b721977df093f2412b93825,2024-11-21T07:17:16.800000 CVE-2022-38956,0,0,aebbd9d93c58bae1388e61045fe497d1212a7d7f7f21427a6c71bed0dad0105b,2024-11-21T07:17:16.953000 @@ -209406,7 +209406,7 @@ CVE-2022-43626,0,0,e9aea1509cb419efdec4336e6ddf489c1cda9bfa8b1ec0dd8164ca3b5bc58 CVE-2022-43627,0,0,dc7f7012a26a56db94df08b49abec101d1b804569eab75e971257115807feb7b,2024-11-21T07:26:55.327000 CVE-2022-43628,0,0,ba34c0f7a368c569cc8f882b4d02bd351040f609c94e5c40a8a77a240d962a88,2024-11-21T07:26:55.453000 CVE-2022-43629,0,0,5ddd83db1f6646b01ce778b0da92fca9de49613987d197d1e6f3265332a277f4,2024-11-21T07:26:55.587000 -CVE-2022-4363,0,0,967f94ab5785c5f2b149ec9d164123a98f4903ed5eba762aa64b5bba0d2ee869,2025-05-16T21:15:33.123000 +CVE-2022-4363,0,1,10cc38d33152bf305b7d871d39e13a7429a2e4d1efc61f3c282d9c6c850ec0f4,2025-05-17T03:15:24.300000 CVE-2022-43630,0,0,232a06b1a0dc3f788d37010f97c7058d88c851ec0f6f0cdad06610dd1a6a5979,2024-11-21T07:26:55.720000 CVE-2022-43631,0,0,c24a8014ede8a0821432ae9a75484ce10deb39bee6fb5f647f56160e77ebfaf6,2024-11-21T07:26:55.860000 CVE-2022-43632,0,0,42f56d21c69a9175ecd5e3544092ae324c3980153b21a19c61f9c049da3ca3ad,2024-11-21T07:26:55.997000 @@ -243743,8 +243743,8 @@ CVE-2023-7082,0,0,01da1b16e99cb894b19b28e654f0eb0d1f946ad3cc9cf73b506a5d550a9446 CVE-2023-7083,0,0,c5aa53dbff112a3d086d0b26f297d981e1f6ee6c887d1ac2941e9a37a179680a,2024-11-21T08:45:13.047000 CVE-2023-7084,0,0,d9889df429199caea86387e661e3ff9a19490ddaa4c78a76e3ed6d89055dc2e5,2024-11-21T08:45:13.180000 CVE-2023-7085,0,0,ff31f837c71e6103db320dfb5036954bafa30bf8481edfd8ca5717d6131b3010,2025-05-05T18:00:58.713000 -CVE-2023-7086,0,0,165945ef4c49e3650673c51412517fd80ddf15f454961d5569ab46049bc4873c,2025-05-16T14:43:26.160000 -CVE-2023-7088,0,0,98cd85b0886274b6f77cb759654b7bb5dd7a4731f54826fc3ce2328bad01456e,2025-05-16T14:43:26.160000 +CVE-2023-7086,0,1,5f5556a768b7c5094b694e246744f2a06e6987bb2fe83cf2ef0166847738a87d,2025-05-17T03:15:26.153000 +CVE-2023-7088,0,1,4148005a3175c1264bca439ff073be17c825c20c346659e538a04eed61f85cd7,2025-05-17T03:15:26.553000 CVE-2023-7089,0,0,3eda31786e317c37a0b05cfc344876ae32458e35d6c8f690393958bfb9334612,2024-11-21T08:45:13.543000 CVE-2023-7090,0,0,594a7b8a9d6eff78de19931d6759536c96796d341f077f4eaa2759101ee8d992,2024-11-21T08:45:13.663000 CVE-2023-7091,0,0,93fc4b825a5b5c8789b661b74bbc6e0b8bb3e21b8cd7230a257f0fe5a439447b,2024-11-21T08:45:13.810000 @@ -244874,7 +244874,7 @@ CVE-2024-0997,0,0,5ec8578b4bca8a69f274edb8a3ec03c49f98c717a6e8611a089448de89b28b CVE-2024-0998,0,0,2bf794f7fd03b1ca4a5a341c68a99067a4f93d8adab36b76014054be7f007f52,2024-11-21T08:47:59.373000 CVE-2024-0999,0,0,2bcc7a3734497f94790bfc4bd872c406c8bb28974baeecad08fc73598bee9cf7,2024-11-21T08:47:59.550000 CVE-2024-1000,0,0,400a348a1f31a2e70c2feb8a2b6193c9cc0c8e936fdf0fc7d9c69186e4c45953,2024-11-21T08:49:33.687000 -CVE-2024-10000,0,1,ea295f0746965b37abedb4aea855b48d26c620fc6fcb91c9962c3d481cf55a93,2025-05-17T01:44:25.040000 +CVE-2024-10000,0,0,ea295f0746965b37abedb4aea855b48d26c620fc6fcb91c9962c3d481cf55a93,2025-05-17T01:44:25.040000 CVE-2024-10001,0,0,ac35d4329714e32b3533f7a1883d6fb833b180cba95e8a100e4ff8b3d0d33c34,2025-01-29T19:15:18.360000 CVE-2024-10002,0,0,5c691c4a49203474796aabd6e9efcaabae6ff9dc1c736726998728d7e8cf645f,2024-10-25T21:20:39.167000 CVE-2024-10003,0,0,8b9c472d9982deca9020bf02b2566867a0fbcfbb043b63feef8aaf6db3c162f7,2024-10-25T21:19:19.743000 @@ -244882,7 +244882,7 @@ CVE-2024-10004,0,0,2800a13d43bb6fef07922a0e23f8465b70bb754ac72d244c0164bee6476a9 CVE-2024-10005,0,0,78ffba26a833e534d1e625308e59cb7c869e5dd5e6d7d6bc50d06a38f40a9d8d,2025-01-10T13:15:08.223000 CVE-2024-10006,0,0,2fffefdb7dd7179eb39d6f0b72be9bdde10944b1e2aaf06c528994dab68c5860,2025-01-10T13:15:08.440000 CVE-2024-10007,0,0,10955020ee863bfd449165e4d3bf73ec65f861b9bf16f49d808624432328d9ae,2024-11-08T19:01:03.880000 -CVE-2024-10008,0,1,eafa6e70781466de84be8908cf45c31f6eee2c04c0c0e3cc6a45d246d90b1ef0,2025-05-17T01:43:57.553000 +CVE-2024-10008,0,0,eafa6e70781466de84be8908cf45c31f6eee2c04c0c0e3cc6a45d246d90b1ef0,2025-05-17T01:43:57.553000 CVE-2024-10009,0,0,aca143ed10c06cc6b282066354ac24ef7e5180edc896e533efd1eb167ae8b28a,2025-05-16T14:43:26.160000 CVE-2024-1001,0,0,140fc173e33ae8fa7b986d187129f7b01af76bf1cd74c6ed57f4103bfb5a0ff3,2024-11-21T08:49:33.840000 CVE-2024-10010,0,0,1371437a2294aadc15143f54d1c01735af263ef48293853d7cb88175f4d2421b,2025-05-07T13:28:46.577000 @@ -245349,7 +245349,7 @@ CVE-2024-10477,0,0,5945f5a0c0dded94912e59ec354ac61a7229d56159d97e42e8a275ce9d57f CVE-2024-10478,0,0,3c092509343a93ec957cab0db4c925179338ee0d061b602b8ae241cb8d24c713,2024-10-29T14:34:04.427000 CVE-2024-10479,0,0,811b1748f8f2e39c5f18d0e1187982bc27518243716716c5b22bf3fc13a17d7d,2024-10-29T14:34:04.427000 CVE-2024-1048,0,0,54e99ba5d606327e8cd421651df7663c241b0b270ee508d9aa21b93e6a9e6b78,2024-11-21T08:49:40.727000 -CVE-2024-10480,0,1,3bde38043909ac5bebf035551d8f6b30f05cdde9e5f2ff3b03cb7add8044e4bb,2025-05-17T01:54:01.437000 +CVE-2024-10480,0,0,3bde38043909ac5bebf035551d8f6b30f05cdde9e5f2ff3b03cb7add8044e4bb,2025-05-17T01:54:01.437000 CVE-2024-10481,0,0,6b53f798f56d3f0704a7f868f26f57971763be79d95c63ac3c8a29a4ddd30692,2025-03-20T10:15:17.010000 CVE-2024-10482,0,0,f9916cf18bccbc571a7a0b727df72dc5e1548775731d9e6d34b2f5acc60bfd72,2025-05-15T16:23:37.707000 CVE-2024-10483,0,0,7fd1abf4fef9a92c650a5dcdc07d93f54761d27be935e27db1055b09549e2735,2025-05-15T20:50:38.920000 @@ -245367,7 +245367,7 @@ CVE-2024-10495,0,0,61eb284488098464dcb80db86ee62914f924b9e87c86a002bac1af55a0417 CVE-2024-10496,0,0,d573864421f6af9d3652fc49ffb8f80bc45a66bc538be258cca3815a0a7d57fe,2025-03-04T18:35:39.467000 CVE-2024-10497,0,0,4212e0181580f29e1420db9a5e909d78265b1843b32c34455084331c49d5efd4,2025-01-17T11:15:06.980000 CVE-2024-10498,0,0,b6e36d63c386402ac4020d318693fe8dd16c04fbe0ab182bc1ac943bb311d11b,2025-01-17T11:15:08.340000 -CVE-2024-10499,0,0,17b74beb086be3ec64eefaa097e37e1d1fc71a291b6b0e133ea9adf1d4040a72,2024-12-12T16:15:10.113000 +CVE-2024-10499,0,1,2ec82403c4a113aa578b9c84ee6e60cc23a510406c393117b28e588860c83807,2025-05-17T02:25:50.203000 CVE-2024-1050,0,0,16f18f5c60fb64f5f6a6b201bdf68db704bc8fa10ab29a63c083d6c6dea0ac89,2024-11-21T08:49:41.043000 CVE-2024-10500,0,0,d1d703aa7dd4ac4b37a26e580106e6979cab8ee7fa2a02c79ef8db41df6b8a0c,2024-11-05T21:02:30.333000 CVE-2024-10501,0,0,b401194371e7efc697c4f8c72105cf36bf574248f2c758a0bba38115bb55da40,2024-11-06T17:20:32.857000 @@ -245385,8 +245385,8 @@ CVE-2024-10511,0,0,5e411f234441d712e134066c0fb752802b5b0a3f0734c4d32360f037e4b5a CVE-2024-10513,0,0,101dcfdb0daebc1898491c44833014dafb9860a3d1daf4cd8931e7be27303eeb,2025-03-20T10:15:17.140000 CVE-2024-10515,0,0,70e4b8a115d447d9e5de069185152143410d2b26272dd3213172f4c642a76ca3,2025-03-31T19:33:29.490000 CVE-2024-10516,0,0,2ebd9272720b07a5cf79c9a9ceb37a855be1402b37d213d1f22547ec3a1c9ddf,2024-12-06T14:15:19.667000 -CVE-2024-10517,0,0,ec874f706d612987436415b14947527e0ec4826e3f1f3a52572b8d2041a7e176,2024-12-12T16:15:10.483000 -CVE-2024-10518,0,0,9b672e9ec0f2ce289c42bf794385cc1499fe101df107e5b1e23b7eac5052f943,2024-12-12T16:15:10.890000 +CVE-2024-10517,0,1,6a9368939bb9e54d43ba40c1cd27101eeaccc2bc3e85cce1fa75a4756d3d19bf,2025-05-17T02:28:18.643000 +CVE-2024-10518,0,1,7d14ee272ada419ac81cd1198e6620a1bef417bd3ab2f8a0ab8e77aa88bf1b58,2025-05-17T02:28:54.307000 CVE-2024-10519,0,0,0f4b4a1e9d73c1dc5e7d90ae91171b7454c700ee85af6548970583aa8f68f73b,2024-11-23T10:15:03.600000 CVE-2024-1052,0,0,f9f471171db3127e337c7e7b487431751b54669175502f925317b3d80dbe42a7,2024-11-21T08:49:41.313000 CVE-2024-10520,0,0,ac5bf6bb61b521c0246a0bde539bac91db0754416631e077f810e1376ff7a8e9,2025-02-05T16:51:57.997000 @@ -245440,7 +245440,7 @@ CVE-2024-10563,0,0,ac5790a41f22274c1b16e5412b243171506a228648c034b59789ffc590d35 CVE-2024-10565,0,0,25c74f42f4d8c53bf595c6b607116ebc862daeb45d199e9928fc2f27cd65ff53,2025-04-02T17:38:01.750000 CVE-2024-10566,0,0,f2966782b8e732f7e9a134ea086de55f428fe1e8d8e5271f176fa05f847b9038,2025-04-01T16:45:55.157000 CVE-2024-10567,0,0,a04d3f3d999e2b2d50068629e658949590c474642a1d298fb74a13508e02b197,2024-12-04T09:15:04.177000 -CVE-2024-10568,0,0,29a6369be6bdec3fac3a49600567225eff324bd19cbe3ade1e99b53075e8cfa9,2024-12-12T16:15:11.250000 +CVE-2024-10568,0,1,6aba2fbf2bf6cce88b98459d036b618933403c34fb532e532e152da4ce9c12a9,2025-05-17T02:31:03.903000 CVE-2024-10569,0,0,ba58ab97f664e0a5466237383e79856c396838e4f78a1c850f8c146302ebdb81,2025-03-20T18:15:17.533000 CVE-2024-1057,0,0,82d074eff87805c0c8af6f292d67be991df4f6c4e8e298eece318c63dbd97000,2024-11-21T08:49:41.890000 CVE-2024-10570,0,0,d14f79535077a039c8f0d0d1b0a6c4a3ac35cc316f33ff69affb05a342db6337,2024-11-26T06:15:07.880000 @@ -245590,7 +245590,7 @@ CVE-2024-10704,0,0,8c53c2fec2a11424669d49a4ebd5c2d368117e3a562e04f9b1c39a82b8db5 CVE-2024-10705,0,0,d9ed7dfbd93f39275a245485013f732374d0e600783f5361f2946a662c0533a1,2025-02-04T20:08:12.543000 CVE-2024-10706,0,0,cc8e331f5087d1927b459b9ca6e2e4ca5703916a1c267546cc3894e0ff324665,2025-04-17T01:52:36.820000 CVE-2024-10707,0,0,35d45b41db0f2870421a42ede9f2de90d82dbc5a2a219940da2f1b1a855c12bf,2025-03-20T10:15:18.280000 -CVE-2024-10708,0,0,eea3aeda96ee17aa2e34b8299f4fa63911654caae1b5976f2282c61fc39e2c7d,2024-12-10T16:15:22.327000 +CVE-2024-10708,0,1,aafb16ee3ff9dbf2435bed13888c803b75b4d1575882ba66049063d53de0cb4e,2025-05-17T02:00:25.033000 CVE-2024-10709,0,0,1d7e6fad35601495d6536d85aae98c27e39b44fea186af240757647d3bb8700e,2025-05-15T15:43:57.160000 CVE-2024-1071,0,0,d0accdb8d0bba0ac3fd88a2e88f0c8f317a99cca32865aaeb994af57c4fd1d49,2025-03-05T16:26:23.523000 CVE-2024-10710,0,0,4d0694b9fd115804b0cff7ff8df96e9c0de9244614f9e3201a9f44bdd171cda5,2025-05-15T15:38:03.483000 @@ -245783,7 +245783,7 @@ CVE-2024-1089,0,0,147c65c4df1f886cc65952aecf6bb1b3cc2c957147d34449879a4278306dd3 CVE-2024-10890,0,0,291737e09e39acbad6d8cc1c52c0ae5cd2168a1e41e273e4ff02b1422afae399,2024-11-21T13:57:24.187000 CVE-2024-10891,0,0,6756c0c33d7417e4f522126d4552796d2cb16a6b1d07395aaddee44058a352b0,2024-11-21T13:57:24.187000 CVE-2024-10892,0,0,312b511750229143c2d4523c3c60fd4aac15c5b72091cac494c36ed4a65f4908,2025-05-14T20:14:11.990000 -CVE-2024-10893,0,1,53841ea5c54c5eb50cde949dc5b72f81fd3a761824e0a61a75b589378482093d,2025-05-17T01:49:51.280000 +CVE-2024-10893,0,0,53841ea5c54c5eb50cde949dc5b72f81fd3a761824e0a61a75b589378482093d,2025-05-17T01:49:51.280000 CVE-2024-10894,0,0,2e7657ff2d8e67f061e602d07955ca516c05617397bcfd7f7822f149d784517a,2025-04-11T15:40:10.277000 CVE-2024-10895,0,0,04c98611744adf39f95b71a878352eb8b113feb4aa126ef2824080fbccdc579f,2024-11-27T07:15:08.347000 CVE-2024-10896,0,0,4a6b0a1f8f702f9fb38a88cc6bccb32a05031238ca0b31b88b6c677fa4dda332,2025-05-15T17:35:40.350000 @@ -245998,7 +245998,7 @@ CVE-2024-11102,0,0,3365ca960e252b8799ecfbb434b5f87c2c3bfc2e33540eb49d3a7f6c57d86 CVE-2024-11103,0,0,f94e675b2a4ff0d167655a2e0e35a81ce0606ad0f32f9d1e37b52b25dd7b3884,2025-04-11T14:56:31.533000 CVE-2024-11104,0,0,abc1f01685dd477f3ac76cb0866f40db5c288e123c6ebcd8a292cf6f8d5f3c1d,2025-02-05T14:45:08.740000 CVE-2024-11106,0,0,4f7fe956431776c4fe3e507a22b518efb5f390b9e8eff5421b62ca54ec32b13a,2024-12-10T11:15:07.030000 -CVE-2024-11107,0,0,9acfc58960fd056b26158a4898d3cab204ba2e238bb413c388c6122ce49a79e3,2024-12-10T16:15:22.450000 +CVE-2024-11107,0,1,67bdb2840390c622a8ccd13b2d7b4740e5c3f3fcf925855c818bd6c128902106,2025-05-17T02:02:04.643000 CVE-2024-11108,0,0,6473fd6edf3fe79b9a6bf16b40cd9a268b9a41640edc7a3a927b1e02f07890cf,2025-05-14T16:28:46.010000 CVE-2024-11109,0,0,1b37ad7d85e5b17edfcc979852b32506ba232f44e9b538d7ab895b41deec44da,2025-05-16T14:43:26.160000 CVE-2024-1111,0,0,1e2a4c53f023bbf8c3b556fe6d8a896ca169d10bbf6dcef8f8f730e5e086694a,2024-11-21T08:49:49.257000 @@ -246766,8 +246766,8 @@ CVE-2024-11838,0,0,bebd3a64327db74b8dc0eb94a25fa843e32195ad49ef3db3f84e07af32862 CVE-2024-11839,0,0,33830d7c21d6453856be1e69ff0e0e25c1f59b4492a5f1ef6d05b26ba0b3c347,2024-12-13T06:15:26.273000 CVE-2024-1184,0,0,7b0789c4e91a5162e06df6289a54d1b7f2607f1e0a44e814477ad9c07a354474,2024-11-21T08:49:59.067000 CVE-2024-11840,0,0,4f72dc8e1aec5c10e4842e27b0438d261a566769857022259f6d9b1c51e882be,2024-12-11T11:15:06.453000 -CVE-2024-11841,0,0,29b2d8ff488587d8a4e1b1dd2198cfdea87c7a6a53f626f6147622127a8032b7,2024-12-16T17:15:07.830000 -CVE-2024-11842,0,0,b468b59966d33ed9e284180ae3d4b6da56e7697d6ed23bc6f677a3b17c040944,2024-12-27T19:15:07.700000 +CVE-2024-11841,0,1,344232de34d770a6aa5423be3e2aec2c71395928f1472511edc4860482d3acb0,2025-05-17T02:19:18.333000 +CVE-2024-11842,0,1,5d3f7f03aec1de59476cc9102b4d1c2e310d2486baacf5c1e41b3d22ffbb3d53,2025-05-17T02:20:59.160000 CVE-2024-11843,0,0,35bc86801c9f7be58f7f5259e72b92b1ba71c6d4bb844441c955a0931796adfd,2025-05-16T14:43:26.160000 CVE-2024-11844,0,0,04412f8d1e89e121c8013622c692022d4f804bc36ac5e0beee05cf8987e8ae7f,2024-12-03T09:15:04.473000 CVE-2024-11846,0,0,6d979cf66f6dd3ee37d22418790e77ab7d59d601391d04e5f4d4d86dc19d9a82,2025-01-02T18:15:15.860000 @@ -246901,7 +246901,7 @@ CVE-2024-11969,0,0,d3869ee85a393e22b7277fc4652d49a22be68a3946e5e05de40353058e929 CVE-2024-1197,0,0,45d3912b5b96c16c2c7bf2d968f246e6b35b4c5b3c4e5fbb80afbcf2d9b1f072,2024-11-21T08:50:01.030000 CVE-2024-11970,0,0,32dc5ec7aec937b80794045756cdb85326a90b3bfc25b4702c64990526e96dc6,2024-12-02T14:48:39.960000 CVE-2024-11971,0,0,05a328b969201591bf5658992e390aef14aec7c89bfc8198c4927b19717108eb,2024-12-03T20:04:46.493000 -CVE-2024-11972,0,0,424587fa039b828712cb1884c1163244d01256a0bdacac0a3ceb996cedd795f8,2024-12-31T19:15:07.720000 +CVE-2024-11972,0,1,762b768cd59aeb201f0df13756f12fb45ec88eeb9b7c6560a67bd238f4751aae,2025-05-17T02:22:32.007000 CVE-2024-11973,0,0,09d34ca9011760fd34330c9c7e372ea8a465e3a408c53b2a4fa8f77978915f63,2024-12-10T10:15:06.123000 CVE-2024-11974,0,0,f9691e92702301b17493ed5f06dc50de13d97fad3e6cc188b655234af18734fc,2025-03-31T14:00:33.780000 CVE-2024-11975,0,0,84cad561d2ec5c4dedd114d83278d4ca351957794503794e490beae7d9c6d982,2024-12-21T07:15:08.657000 @@ -247529,7 +247529,7 @@ CVE-2024-12583,0,0,18b36426c2246709d6e004bec0c8a5de7c91c679c9d1416c197a6176fa3a0 CVE-2024-12584,0,0,64396031b0ee032a447d54854bab6f2e56af0964fd90abb7b5a1c0b3a65a4983,2025-03-06T21:08:55.700000 CVE-2024-12585,0,0,319826ccd1373533cb5af1352d7d2db07a4178efa9aae7979d7a975206c88cca,2025-05-14T15:42:36.630000 CVE-2024-12586,0,0,c3319a523f5e3408cab3fdcaca4983788754a30d73dce884eedee1f530d07494,2025-03-25T14:15:23.370000 -CVE-2024-12587,0,0,55904562761e3f9093e0c6cbb7d6d24640e712d316a9fa79d8676a8f4ea73de0,2025-01-13T20:15:27.283000 +CVE-2024-12587,0,1,4d4ccbdf631830ee3a499104e3b80765d017bc1e638badbf7a6ab6957775a7e4,2025-05-17T02:35:33.397000 CVE-2024-12588,0,0,9ef4dd85f085f6ba612688cc14a2c49d05248e20e75bd2d7bdd4aff39b5ac0f2,2024-12-21T09:15:06.233000 CVE-2024-12589,0,0,2f16c2da3b709f27052870cdeab361b40ffcc7579768dcd995e684cb97e1d3bd,2025-04-02T12:42:32.610000 CVE-2024-1259,0,0,1c6bb100fc9cba505c4d696801bfd3102c508e530bb2e36c86a6685675278bd7,2024-11-21T08:50:10.730000 @@ -247649,8 +247649,8 @@ CVE-2024-12710,0,0,47453914e1b74979b7cb104fe22d1ae9255e40512305ca5e5237f17f98821 CVE-2024-12711,0,0,9b677fb642029180fdaa553160a64c71aa90c9b6592fc5efc1139f03e5c4de5f,2025-01-07T12:15:24.503000 CVE-2024-12712,0,0,9554afe0660aaeb94d322c68f376b4049a1c78b9e06148cca4a5ca650e9431ff,2025-01-08T10:15:06.660000 CVE-2024-12713,0,0,1dd49dc5e03b350467b5dcea4c6874a20628cdfedb6c7a59c15e947cc9533d45,2025-01-08T04:15:06.967000 -CVE-2024-12714,0,0,7148cdec6f8b212fef9fce024e81921849f016f20d04016c2915f69292998cb6,2025-01-09T16:15:36.200000 -CVE-2024-12715,0,0,c108391047bdc5cb3a30ab729c489c01e29510a155fea37302079b85e271c130,2025-01-09T16:15:36.360000 +CVE-2024-12714,0,1,77ca4adc457ee2cb7bcf6b4729e9e3da4bd5b80759ff32cfa0b1a48f0e1dad3f,2025-05-17T02:33:26.170000 +CVE-2024-12715,0,1,086ac6f63a614715bc3ba7cc5f74d04535b93d69419ca1a2a2c4d332775ec147,2025-05-17T02:34:13.747000 CVE-2024-12716,0,0,ab34878d9db5ac6b48773885a5f895c1669508ef7203358c8c8791e65946ccec,2025-05-16T14:43:26.160000 CVE-2024-12717,0,0,154dca6e7c3997c611d8bf724a605e850f7ca5cd826b6b3b708c332cefe51032,2025-04-21T17:09:36.177000 CVE-2024-12719,0,0,c34442f4a2a9e42bf0beba4200827e8cdf35e75eae83c71d20db9392843712f7,2025-03-13T17:23:01.420000 @@ -259497,7 +259497,7 @@ CVE-2024-32816,0,0,7102074d1cf47774606611faa75cb516acf8ae2f253e4df3d6d7b89b228ae CVE-2024-32817,0,0,818747c4333bbf12c89e8a771bbff9137749102073db106979b7baf0c4231a45,2024-11-21T09:15:47.240000 CVE-2024-32818,0,0,c75bb2482f9c929a6090cf473ba77feab56fba9e777aebb6fd87afad7687160d,2025-02-26T20:45:51.087000 CVE-2024-32819,0,0,9ecc3fe17094be3635820d619db36b5b3e489838fbbd15452fce4adbcfbcea1a,2024-11-21T09:15:47.490000 -CVE-2024-3282,0,0,2977abc8ebc8e261a03668327748556435729ae3791a979db649f12f281524ce,2024-08-23T16:18:28.547000 +CVE-2024-3282,0,1,8eb7e3951eb17fe8c4766a0722978f6aa163989e255c96e7580891ae9f042233,2025-05-17T02:06:54.693000 CVE-2024-32820,0,0,495a4b9b9e0126be04fe87e080a9a25d1c585579d55154d9cbfa042340ac3f74,2024-11-21T09:15:47.610000 CVE-2024-32821,0,0,765a22182d9ab33bc8e50993ed986c0bb8c6313f4341554cac127f315df5985d,2024-11-21T09:15:47.727000 CVE-2024-32822,0,0,ad58fd794c3a7c718f5b5924a40b7b9f7d73df9f0edd5ad9cd1b5beca0f1af07,2024-11-21T09:15:47.860000 @@ -269276,7 +269276,7 @@ CVE-2024-45400,0,0,6b3de7c142ace12a32180145a837a3fee347d92bd8a9824f5e254ab172d00 CVE-2024-45401,0,0,9c0b73241091786f611ed1be560a927a7a686e37ab02ee236f63bcd6d833ab2d,2025-01-02T20:16:12.107000 CVE-2024-45402,0,0,588fcb958fbf0695a891407461fde3dc192d59f89a319baf5fd90bcdae5897e4,2024-11-12T20:02:56.167000 CVE-2024-45403,0,0,fc1a1ea22a1e5886fbc09e495c39b7c751253cbcd9bcd0da75746ed78c736397,2024-11-12T19:59:51.097000 -CVE-2024-45404,0,0,6e5f1badf7bd96054410a91fc1484f8843186327a8ba97b1c757a5ca1413b00e,2024-12-12T17:15:10.350000 +CVE-2024-45404,0,1,e9aa160c413f08b417a03680f394a551a67d14e7d5a6b9ef20f2054503223bca,2025-05-17T02:05:54.883000 CVE-2024-45405,0,0,70c3022fc1c5f98ac6bfbf212bbe9a198a088d44f0351720e6f2af8cd6692070,2024-09-06T16:46:26.830000 CVE-2024-45406,0,0,19582af0b0bfb612e1e34662be501c58c951b3669d69edc0413ccdfab51c97a2,2024-09-13T15:30:45.380000 CVE-2024-45407,0,0,edf1998eb908871f83a15a4b54c33dbbf8ee82a6115588b799159388838ccff1,2024-09-20T16:18:46.717000 @@ -271164,7 +271164,7 @@ CVE-2024-47889,0,0,7a25b136e2c97de2e0c6a5b2e04bd7ccad755ce8336dd565a951a1f3afe09 CVE-2024-4789,0,0,cb1fce1149cb253592c06cf88232fe30f43f7e24305ca3501b7b2ce5d58908d4,2024-11-21T09:43:36.877000 CVE-2024-47891,0,0,23331e8fa0be20ed1af3e129f328dd22613e9738f9eb8b202f98a48b6dfd515b,2025-03-18T21:15:30.533000 CVE-2024-47892,0,0,e300db381f4cf7705266e90cba53b1a4b7a7defd036013afcd4a8d8ee5ca06f1,2024-12-16T19:15:08.393000 -CVE-2024-47893,1,1,a49fc10c96e25e6c5457fd3543df9171d7cfa41ff2df4a4d18d2cce453fa457f,2025-05-17T01:15:17.053000 +CVE-2024-47893,0,0,a49fc10c96e25e6c5457fd3543df9171d7cfa41ff2df4a4d18d2cce453fa457f,2025-05-17T01:15:17.053000 CVE-2024-47894,0,0,90877e14f180160e2f32b8f7e31918f3a5d81d9927bb9299954c6f367495fa91,2025-01-13T18:15:18.693000 CVE-2024-47895,0,0,3f8324ce2dbaf96facf113693c7520ff3a56a3e4203f9d7908ed4fe8545f1692,2025-01-13T18:15:18.933000 CVE-2024-47896,0,0,ac5033b7967d89a6dc45f6be553bc426bd15426b07612c8d75a85a0162c10688,2025-03-05T17:15:13.293000 @@ -271299,7 +271299,7 @@ CVE-2024-48070,0,0,ea197c4d3ff80949e846c0fe8c4248790b509d66b76b3ac51066c2659489c CVE-2024-48071,0,0,3cade52e98ecc60db2e1fc4b7454484a754d405ecc0275e169e1097d2ed4a778,2024-11-21T17:15:19.157000 CVE-2024-48072,0,0,a5afcc4df6f4cab9ebba48ccbbbb8e6ad7ad951985d0dfd2812b19c3932d260d,2024-11-21T17:15:19.497000 CVE-2024-48073,0,0,a0dd449974b738c26beb3021e27527834bf42533c9d1d0657f51f4262cbea909,2024-11-18T15:35:11.227000 -CVE-2024-48074,0,0,a9d347909eb857e96af017afeb35579129b604834557658407d72951d58bd8bf,2024-11-08T22:15:20.877000 +CVE-2024-48074,0,1,0022f007f2609f870f428c36c41da33f73f6c71aef6431214d976aaaeeda7e25,2025-05-17T02:14:47.187000 CVE-2024-48075,0,0,c750cfc63f2eb9e37fb6c605b4fffcddd3176068f4b6ccea67410855bd98fc08,2024-11-21T21:15:22.113000 CVE-2024-4808,0,0,d7268ce9d790e7395683b7b31cd3ece204741eb0029d4bc3b8923bcab9b0cfc0,2025-02-11T18:35:06.960000 CVE-2024-48080,0,0,b04413c84146627c983a8df352dd2273338d1085bc7d334012023d883bae7922,2025-02-21T06:15:20.670000 @@ -271436,7 +271436,7 @@ CVE-2024-4840,0,0,55ccd5cd93de647439d058661ef78145ac46b40735b9afde6747455bb308fd CVE-2024-48406,0,0,29efd63958fab2009ed4fc9683ab93a6a59efd85a7c3925c93c76285d2372909,2024-12-04T17:15:14.693000 CVE-2024-4841,0,0,177b39cd4a0e83cfae37bbb1b481e330bd5314d74a4028705ec45704dd9da463,2024-11-21T09:43:43.037000 CVE-2024-48410,0,0,76acfbbba797fbded687285f1d6b7f4e69da30abbf2ce3a40c171e75e974afe7,2024-11-04T21:35:10.317000 -CVE-2024-48411,0,1,5ba8131b11bb2988a2eb49fa3eefc8cdbecb398361070e12e74e9f6b82bf0708,2025-05-17T01:37:19.267000 +CVE-2024-48411,0,0,5ba8131b11bb2988a2eb49fa3eefc8cdbecb398361070e12e74e9f6b82bf0708,2025-05-17T01:37:19.267000 CVE-2024-48415,0,0,bb9e3b97ff90d39743d554ba54d4e6857ce95f8c7a439d575dc2c98763652ebd,2024-11-26T20:29:57.070000 CVE-2024-48416,0,0,29decd2545745852f0b3bd806430647ddf50e35438ebb0b0f6f40c1b2052b2fe,2025-01-28T20:15:49.987000 CVE-2024-48417,0,0,59f2a0de5969ada51249d1f6ea52133c8e8d1e70cc1504c4105530677f3feb32,2025-01-28T20:15:50.143000 @@ -273553,7 +273553,7 @@ CVE-2024-51229,0,0,6286e5c464538b72cbfb5c9a108ead1b75bec25eb8711771684f31b28f122 CVE-2024-5123,0,0,2b6b937686a9a35fd191a8a9979d8601b68b8d715a7d29c8ed1f841888f878fd,2025-02-10T14:30:40.057000 CVE-2024-5124,0,0,01cdda408be4b4d9f2a212f490d7f835314d13182c2b374b8c21580151cb10ec,2024-11-21T09:47:01.353000 CVE-2024-51240,0,0,68f6aa8bf26fd4ecbcc3322cdef826250eb560ee0d6b12cc4f54b2bd04622345,2024-11-06T20:35:34.963000 -CVE-2024-51242,0,1,1369ef3cde7876e612a3ed393dc699be98474f54b2454af93441c6bf8ee15946,2025-05-17T01:40:33.183000 +CVE-2024-51242,0,0,1369ef3cde7876e612a3ed393dc699be98474f54b2454af93441c6bf8ee15946,2025-05-17T01:40:33.183000 CVE-2024-51243,0,0,b1ec718b11a7a046a8d6763564a720830e685f91365e5bb979c0be153feab8bb,2025-05-06T20:17:43.293000 CVE-2024-51244,0,0,8f456cb9f1b95ea30e7fd04b7b9c6ef3180321cd88449c936f496f95113fd859,2024-11-05T19:28:09.403000 CVE-2024-51245,0,0,61b0de20e553f87c40f36479f1bcdba6ca48390f8adf8ae522ee41e1bcbcb356,2024-11-05T19:28:18.903000 @@ -275841,7 +275841,7 @@ CVE-2024-54286,0,0,63007b3a05dd2f8389a5e840b2572ac96a93e4ea9b965900ee9f595daab63 CVE-2024-54287,0,0,bc058b465955030e362fe4ac64f34799ea51ea1786c31ac1e36fdcec6c9b2999,2024-12-13T15:15:32.573000 CVE-2024-54288,0,0,3c9c3c6eb7ea5d0e80b3dc6c380a970c41d1702fdccfcbf7a1eb9279bdb11514,2024-12-13T15:15:32.707000 CVE-2024-54289,0,0,4924b8c9ee0119eb21584ceb261116e542e084f80864da6819de24f085376959,2024-12-13T15:15:32.840000 -CVE-2024-5429,0,1,5f55b2f1074ee455fb6fd02dc993ed03cd0161643df5cb595ef5d50bd42051fa,2025-05-17T01:39:09.230000 +CVE-2024-5429,0,0,5f55b2f1074ee455fb6fd02dc993ed03cd0161643df5cb595ef5d50bd42051fa,2025-05-17T01:39:09.230000 CVE-2024-54290,0,0,94f24c824c8ffe1a5d1b4e7456c8c53bdf7ab3ec7f2d25cded89b1a2e931e028,2024-12-13T15:15:32.997000 CVE-2024-54291,0,0,822a2d7e65d75d400a95fea2289113efc360c7b7aa70a7df381bc299f263089a,2025-03-28T18:11:40.180000 CVE-2024-54292,0,0,23ca83ef1b927ea8c753f6ff6aac4e8f46b4cc684f1a85a4d56d010b0b62eebe,2024-12-13T15:15:33.143000 @@ -277793,12 +277793,12 @@ CVE-2024-57768,0,0,fca6cb8f6e59edb1035d2279a7dd136b6a661141c7e439e9b19dac82dad2d CVE-2024-57769,0,0,efc4a8caf2b136c13496018b326e6bcda1bef2a41120431c03c2ab05d375b4e9,2025-01-23T17:15:18.303000 CVE-2024-5777,0,0,36540573098e4e57e2480cda4540050e04f465dce04feabfdc311a1dd5bf4bae,2024-06-12T08:15:51.113000 CVE-2024-57770,0,0,6b56cf56cad81281e75cceae9e32e33f671086383972b181c69d63f2e1943009,2025-01-23T17:15:18.480000 -CVE-2024-57771,0,0,eaf092bb0a93375274a0327d1c073ccab1dedd7c60e73e4c952c30beac3ab538,2025-01-21T17:15:15.880000 -CVE-2024-57772,0,0,5c9e3ebdf8909aa581e4be2fe94c325564f1d0feb1a0d39ebfd0677986ed4fc7,2025-01-21T17:15:16.073000 -CVE-2024-57773,0,0,1472bdb16aea64af8fca7b40bd42060d257a747077a74fb79d13a84acc8a924d,2025-01-21T17:15:16.250000 -CVE-2024-57774,0,0,2551abca035214b076f4360f33057fe8d04ee4b5e8e086ec9ba87a0de1485501,2025-01-21T17:15:16.433000 +CVE-2024-57771,0,1,f2857a54600b4b5039a251a4daf53200fb8de8c58a315f4020f0e10869ce47b7,2025-05-17T02:40:09.990000 +CVE-2024-57772,0,1,471259f3574aeff69acafd4e5b788c52e362f9d26fddfb61a3f7d67f85f4cb10,2025-05-17T02:38:38.273000 +CVE-2024-57773,0,1,9e3a2f83f2d37f649ab6fa5e0fe8cbf09f15ca103f7f8b4ce6c260d4ce7494aa,2025-05-17T02:40:49.667000 +CVE-2024-57774,0,1,842e864b43a28a01876162229bd301881b7c5688083490dde7ac43b0b4343d35,2025-05-17T02:42:13.593000 CVE-2024-57775,0,0,d443a466195113d1df55f765112263e4c5993950dd535868322856b10159040e,2025-01-31T21:15:12.570000 -CVE-2024-57776,0,0,3f1d44a7df34cf026fef540e7df11379f7f5ec930fc80f9b9e89c0c1941674ac,2025-02-03T20:15:36.390000 +CVE-2024-57776,0,1,4a16416f1a1d89cc85110e14b68e658b4235f6cc7acffaeff51c310d65f00870,2025-05-17T02:42:46.927000 CVE-2024-57777,0,0,0a0491ad5da31bf74445425855f0e8fab666a442d1eaff789c85a35d3cece260,2025-02-14T21:15:16.197000 CVE-2024-57778,0,0,88cc3788386a43b9b29a906a8a7d919e762036b78785413c8cdb1209d44810a7,2025-02-18T15:15:17.207000 CVE-2024-5778,0,0,44ca5dca3141a6d37f6826ebacfa9246d365e941b7c28662690166013bb5bd71,2024-06-12T08:15:51.173000 @@ -278973,7 +278973,7 @@ CVE-2024-6711,0,0,e58c9881f58bb53d59d3026ea95bcb88a81b4a9ba685c72284a8f3ca764ef0 CVE-2024-6712,0,0,e8518a366391443d5bb28c52f3c1efec653dba19da1a3a4fbedff8fa962f8265,2025-05-16T14:42:18.700000 CVE-2024-6713,0,0,3d2bbaf844f040b33544c3610f070c534760df5fbb3bb2bbb3dcd01dbd8f8709,2025-05-16T14:42:18.700000 CVE-2024-6714,0,0,4d143eb2206049fef2ee1d5627e204208e47aef252c1ff3a509884757088fd75,2024-11-21T09:50:10.127000 -CVE-2024-6715,0,0,13e40e2da82adb106cce965c5784e77fb81745ca6e1bd8f5850d4f411fff2412,2024-08-26T15:35:18.010000 +CVE-2024-6715,0,1,7217f2499fc3ac1e66b56e5c2e9de9ba012585ed06db3a7a1be267d6faac1162,2025-05-17T02:08:32.527000 CVE-2024-6716,0,0,ca1708114f36d8444701fefa878a89a05247338f5f098a766e8f3a056ffc732b,2024-09-04T14:15:14.457000 CVE-2024-6717,0,0,1e50f80488ec40daf4f51aa2f7be326f215c2ba686e96e77ed07cf459e003694,2024-11-21T09:50:10.447000 CVE-2024-6718,0,0,6d3ae56e8b24b17f422086e13361329f10631f7afd49e62529433ae8eb9f58fd,2025-05-16T14:42:18.700000 @@ -279132,7 +279132,7 @@ CVE-2024-6875,0,0,5a31d4b18be986447f2fdca90648c223a19e6902256ff757490fa3b7e0bf9b CVE-2024-6876,0,0,86cc0bdc0c805c051374e7613a493cc4eee5e10b19d58fefe3b4542003d81f50,2024-10-01T07:15:05.890000 CVE-2024-6877,0,0,5ed1e4cd1674150b380e2f7a1f813d0782162cb0c49c6426db9523ac2ae68ee0,2024-09-25T18:57:54.607000 CVE-2024-6878,0,0,41ef62599ee000f0b7cb66cbb9409b02268495b9f68f8c29ade1d58b08671386,2024-11-21T17:15:25.190000 -CVE-2024-6879,0,0,753ea1e54decb561e96e1a46f9fd9688f63066c8a23469e04de04c3099cb82f1,2024-08-28T15:35:24.120000 +CVE-2024-6879,0,1,65df40f4e4e6cda873dffc9ad8bcfdad6c211af0a28b2cf6862b738b188b4637,2025-05-17T02:09:38.120000 CVE-2024-6880,0,0,d829cfb647b510937857c473d92a8672253d89883cd466c5446570a799d01e4e,2025-01-10T18:15:26.350000 CVE-2024-6881,0,0,0955e41267fff938075e100f26e199d8edd5c8402a38f61ef488890d84289750,2024-11-21T09:50:27.293000 CVE-2024-6883,0,0,662a7f2e2236426ba6db654ada8526e127a6d5a8f172431513289b0cb21bfd25,2024-08-21T12:30:33.697000 @@ -279535,7 +279535,7 @@ CVE-2024-7309,0,0,ed91d9c0aa5f3f24fcf92732f3e0b4f284bf7adc38876b3e49d855bdfa0c6d CVE-2024-7310,0,0,9204698dadd01fc733d35c6e6a916e541dca49105549f0fda37955e9b5c2616e,2024-08-13T15:01:01.970000 CVE-2024-7311,0,0,8dcbc3f9579d285d284a3b0db9c9729009218b42be60db271cff0b09bfbe0c92,2024-08-13T15:03:33.910000 CVE-2024-7312,0,0,641179507959958e1b1a80f40fc2c2fe247ded9595f361521c4ffe25384cd43d,2024-09-13T16:27:50.577000 -CVE-2024-7313,0,0,ae740c6d7dd1bf3302aeb883c266930419f35d81ec4b27f2a358900478570646,2024-08-26T18:35:13.207000 +CVE-2024-7313,0,1,a9e5ba2db6d373fb38b9431711f17f47dcdf26c6525ff25f2f0cd915f8c943ec,2025-05-17T02:11:04.260000 CVE-2024-7314,0,0,a0e3db9e46a10685462d139958ab3e89d3fb6ba3d18ec1868705f43b6ca9ee6c,2024-09-17T15:45:01.970000 CVE-2024-7315,0,0,56d03bb851e218902be61d9870743d04499b218bcc577f5fd3c1ffdf7481e2c7,2025-05-16T20:32:49.070000 CVE-2024-7316,0,0,923af8c32a3fa170de4981ae877831203fc06eaf1a717938c8ebb060f5f6a697,2025-02-21T00:15:08.203000 @@ -280540,7 +280540,7 @@ CVE-2024-8374,0,0,ca02cb1d8f9493301326b3f2ebcbf769706c4933bc89729cb22baf7e425cf7 CVE-2024-8375,0,0,6d034a249584f3f3249aac9575cef27d1b8e645fd1ceb9646e6f860db02d62b5,2024-09-20T12:30:17.483000 CVE-2024-8376,0,0,3faa8260b166a707021254f1fdbf40dd63db484fc9efe9ba5d7fa2ade28ff967,2024-11-15T17:21:02.327000 CVE-2024-8377,0,0,23ffbb4374ede4a1221b265b239a19951d2b91c11d085cc50e7f0e5e01cda117,2025-02-08T22:15:28.403000 -CVE-2024-8378,0,1,e1c6e97d0f52bb4561a0e7f20b80ac3a9d9175834800cd7007a910ef68abe34c,2025-05-17T01:45:00.733000 +CVE-2024-8378,0,0,e1c6e97d0f52bb4561a0e7f20b80ac3a9d9175834800cd7007a910ef68abe34c,2025-05-17T01:45:00.733000 CVE-2024-8379,0,0,54299b5b9a452642f6e613294399c36ce4f416a729a725a83ee8db0e7534975c,2024-10-07T15:49:54.653000 CVE-2024-8380,0,0,442d9a0490d26c473d0b9ea7e08e0e94a5cbb885fed83eeb00813b86f1422403,2024-09-04T14:58:49.450000 CVE-2024-8381,0,0,75042d7abd369a31cccbe2f23d50432644230caef15b240d163193215ccd0397,2024-09-06T17:15:17.573000 @@ -281114,7 +281114,7 @@ CVE-2024-8979,0,0,c8d7a454a2e21b5a6419915f563e8d188611a09ebbbeb9864f16825c369f1c CVE-2024-8980,0,0,f21e1b5a085b95548892c69cb9e71b81f9ad3987b25a3b637ff6f5bc1ea3182e,2024-12-10T21:07:09.857000 CVE-2024-8981,0,0,ab731ebe09d14b423954c8d1c309f529eca9637e35f5ff7d59615aebbb87cece,2024-10-04T13:51:25.567000 CVE-2024-8982,0,0,2930dc62b3a363e4a24ea4a8e124903d3b0dfc04ae08adc4694ec199e6620c97,2025-03-20T10:15:45.463000 -CVE-2024-8983,0,0,27bd060291bf8fbf2987becf30df5e9011a78deda3d7b017aa5acbc337d382f1,2024-10-10T12:57:21.987000 +CVE-2024-8983,0,1,68df309962522c8e6d6daef1694c5d4821ee63ffc1eee8441ec1ed80a9d9a83e,2025-05-17T02:12:17 CVE-2024-8984,0,0,46c8ab322011d2937dcb9a3227b2990061f49bd084c86b2c493fb390cdb8d9e7,2025-03-20T10:15:45.583000 CVE-2024-8985,0,0,2747a15c007aed3b55062332e399a5ed9dbfdc53f9e2cb4a2cbced1eaac1da1a,2024-11-13T17:01:16.850000 CVE-2024-8986,0,0,10848646b093f228050195fb1208bce62cfae5b426c36cdbf4f322ebe5e17849,2024-09-20T12:30:17.483000 @@ -281415,7 +281415,7 @@ CVE-2024-9300,0,0,442ac2085f68c64115ce76e95ba7b7910512cb5fa6a041d7b62e88d475e942 CVE-2024-9301,0,0,636c7873e05ec1cc9c01b6e26054abf9ffdc2bcc136ed5adde084d210f9cff98,2024-10-07T13:12:48.953000 CVE-2024-9302,0,0,9748dd8b364bfdba39438084924c65212564d6f933c7b2e3bc26b29154b63aca,2024-11-05T17:39:17.120000 CVE-2024-9304,0,0,0c5f7319a5f4329e1cad78a3bd868784935dd3f5c24595949fdd780973db67d5,2024-10-04T13:51:25.567000 -CVE-2024-9305,0,0,67496173bf6765fc8feb128e0c96eb05e98292a81d60f1e0246a7dd00fc6c8c4,2024-10-16T16:38:14.557000 +CVE-2024-9305,0,1,64c25fbb0dd238915bf91234772dfc4f0b956c5e9e17c12460e9521974718b58,2025-05-17T02:49:17.100000 CVE-2024-9306,0,0,84a9ea83565c03ad670918f12a454396eb78292a897f7ffd96803c418d88cabd,2024-10-08T16:25:29.877000 CVE-2024-9307,0,0,5beeccc0d13dd928213a2571e46ba7a17d8dcf0dea0aa18ed538428ef3acf9d0,2024-11-08T21:18:16.210000 CVE-2024-9308,0,0,359c0c1ca3d58bf0935e68a70a85ccd82b86cd5b710e8cd109f378f4110807fc,2025-03-20T10:15:47.733000 @@ -281995,7 +281995,7 @@ CVE-2024-9930,0,0,e6d6bfffe0d4c1c103ac5e0ef6d516dc346886f833573d2d5991deef59aa07 CVE-2024-9931,0,0,088223542dfafb7e764446d64468eb9339205d46f1c0d43b986f3b696ef8e60c,2024-10-28T13:58:09.230000 CVE-2024-9932,0,0,4e0f603134bafc17ca660ad103069233ac725078ae8cfebb6b1827c0635e5670,2024-10-28T13:58:09.230000 CVE-2024-9933,0,0,93ce38ed1a39de0467a626c04a86861817231963b6ef9cf1cddae6d3f710997d,2024-10-28T13:58:09.230000 -CVE-2024-9934,0,1,6f1f3f5dab4d20565401384fbd77659838a18c8bf29ea74038d4804a4f8bef5e,2025-05-17T01:46:01.733000 +CVE-2024-9934,0,0,6f1f3f5dab4d20565401384fbd77659838a18c8bf29ea74038d4804a4f8bef5e,2025-05-17T01:46:01.733000 CVE-2024-9935,0,0,f06fac9a1e0f69e587b5a1a528890bb76351fc4722f6bb5b275546660c6f2970,2024-11-18T17:11:17.393000 CVE-2024-9936,0,0,1f6ddab8c53f4d6f468bc3c998b336f907b00c883130cc27707d2e94ed2db102,2025-03-31T17:42:12.170000 CVE-2024-9937,0,0,0766c76afe10a009ad41ed699dbcb8d528e71a258224f4e49db1d6ce7899ad8d,2024-10-16T16:38:14.557000 @@ -283340,7 +283340,7 @@ CVE-2025-1702,0,0,8350c512bb427a18e75fe369e7c514680d305e4b55cc00b262ae74877fe4e9 CVE-2025-1703,0,0,50c927778c00387d209f1db495acb3fcdf772388903cfdf917baab839124a719,2025-03-27T16:45:27.850000 CVE-2025-1704,0,0,45ed10bd85c28150ffd6d9e18a4e608ac36e439afa1d7fa6e04c31ca92cc52dc,2025-05-06T01:15:50.293000 CVE-2025-1705,0,0,269e355c7cfca537a526c588669165c0e79ec506469175122c59352a58fa4621,2025-03-28T18:11:40.180000 -CVE-2025-1706,1,1,c98f182776b68c18d47f550157bdc051789c5ebb2a58d71e2f123e3a5526cafd,2025-05-17T01:15:18.103000 +CVE-2025-1706,0,0,c98f182776b68c18d47f550157bdc051789c5ebb2a58d71e2f123e3a5526cafd,2025-05-17T01:15:18.103000 CVE-2025-1707,0,0,eb806af042366277371dce5ba4e4d20eb3821597874c2eb4040b48171f171ef9,2025-03-11T22:15:12.583000 CVE-2025-1714,0,0,6e67e5fe1ad7d1f8ea60e413f9fa7e7e2f63bd8d4c4369040436660c144fa80c,2025-03-07T05:15:16.233000 CVE-2025-1716,0,0,7b54faf04c0c346ecfa632bdb4185fc3c19aff41bf7399ecadc1ddfb775e6d41,2025-03-03T16:15:39.520000 @@ -291641,7 +291641,7 @@ CVE-2025-32403,0,0,67d807e8e2d2e53f5121d9ef462a978320bf8dfdf5c9ab96031a88f9b4f31 CVE-2025-32404,0,0,a0f299df07d8da96b7198bd812a8f434e2e9b2742b540a7049c9068048dba09b,2025-05-13T20:21:04.223000 CVE-2025-32405,0,0,db243eb6a62abfb2bac3bfc743a3096432c195003baf9f080f04d9c8b94e87f7,2025-05-13T20:21:09.813000 CVE-2025-32406,0,0,c67cbc23c83784ef10125f3cffbec33dfd15266df68765e80fc3a95cd3a58377,2025-04-08T18:16:08.917000 -CVE-2025-32407,0,0,ff57b452e254c8cef70e54d115263cce530858519cd5437b233858b406abc499,2025-05-16T21:15:35.093000 +CVE-2025-32407,0,1,8b3faa102357d62aa8366be1006a6edb5f1486cae846a689b75e55bed53793d1,2025-05-17T03:15:59.837000 CVE-2025-32408,0,0,cfe88da7dd510ea36757f995b7e9b904760a277abb0a3850521b8540f1106d90,2025-04-21T17:15:24.117000 CVE-2025-32409,0,0,90c935eaf5e08e3e6a0e3e6e3bd5188faa5a2fd80d7fe835b9b19800e46d38d1,2025-04-08T18:13:53.347000 CVE-2025-3241,0,0,594a540ab13070f27db4ae33cd1a92be4d81e360e241a5ce3cde519f3dcc5218,2025-04-07T14:18:15.560000 @@ -293107,7 +293107,7 @@ CVE-2025-4087,0,0,ead85732428df30f6dde46482790a007f48ff9549a57e3f3c0cd19f92a86b0 CVE-2025-4088,0,0,b2a675b5b672ce577c033338c83abe7c0addd720a6255d36218e5d47088e19f3,2025-05-09T19:33:06.050000 CVE-2025-4089,0,0,505a4df56497bc3e08f2e58439684c838786761a96bd4da3f2b0e37b4fa97ecc,2025-05-09T19:32:53.407000 CVE-2025-4090,0,0,7f9eabb4ad6772523e0c5f0a270166b4617494fcbb3075e75cc2736a0fa15b02,2025-05-09T19:32:34.333000 -CVE-2025-40906,0,0,fc43e35de60ae208ea4476ba2e512c316c4f1350ca43b946471ebb2bd9d3c648,2025-05-16T16:15:41.493000 +CVE-2025-40906,0,1,00484236307350c29350edb24e6e34020fbc81b8d33c0bbd83ccea97d5544ec5,2025-05-17T03:16:49.357000 CVE-2025-40907,0,0,a5fce20c067c86758114403e285ee666069f29296ec9209932f5210c5b135e51,2025-05-16T16:15:41.590000 CVE-2025-4091,0,0,798a4cccfe2006913bea941ae05240fec836c7335fe01bd824f887f2a82ba4a5,2025-05-09T19:32:09.470000 CVE-2025-4092,0,0,5c481b9edaa4dc01b6e2af0355fb37068b547aa3807c69c17d8381f725e9d766,2025-05-09T19:32:00.773000 @@ -294422,7 +294422,7 @@ CVE-2025-4793,0,0,e485659654567b965c81d022d075aed5bff9e96824f53f558384ac5d591998 CVE-2025-47930,0,0,19b1b7a285857f90bffb379b662daf30b43b34bd369e1d0ecf1fa5188f018150,2025-05-16T14:42:18.700000 CVE-2025-4794,0,0,cd3986204ece6cf91849386a545c9e596a135ab64f66c92ef283ad5744a010e1,2025-05-16T18:16:11.630000 CVE-2025-4795,0,0,5130706b8149797520a45754958bacf5fd7175405e55ed086d72f77c0decb664,2025-05-16T19:15:52.167000 -CVE-2025-4802,0,1,30137bd4898612b540fa57b4557e15c61d8ab463138816083637e51c75358f16,2025-05-17T01:15:18.220000 +CVE-2025-4802,0,1,93448225713a856b6f882a9bf935f542992a74d864e6df35ccedaf86339f4707,2025-05-17T03:16:56.270000 CVE-2025-48024,0,0,ac746fb497cccde7b671eda6326e72522381250e5b7c54697735594cf6f8aedc,2025-05-16T14:43:26.160000 CVE-2025-48027,0,0,1553e3de579c54b8c12347894e7e439de00450ca8ef6f8ae1617a684639bd852,2025-05-16T14:43:26.160000 CVE-2025-4804,0,0,0380716cd457674aab2c0de95c336b4dfd47ff0f885a4fe5cbf035e60ac8b567,2025-05-16T21:15:35.350000 @@ -294457,8 +294457,10 @@ CVE-2025-48135,0,0,a6375c29ca6bef5c54ad6c028e8b2423862f710d7e64173e1164fa9d81e69 CVE-2025-48136,0,0,a7a8a02a71d4f193d6393d6e0d4a8a851c36cebfb1f88980ec609b8237e029de,2025-05-16T16:15:45.527000 CVE-2025-48137,0,0,7173b2319bb74cd941edb5b41aa21f6f94ad2708f44101bb14f21074c66a515f,2025-05-16T16:15:45.653000 CVE-2025-48138,0,0,aed4e1994dd275e137d02d339fc9d3d3644b789dfbaeb6dfd260100aeedf5e67,2025-05-16T16:15:45.793000 +CVE-2025-4814,1,1,a0e49f0965861b61cb2bfc5e0c8bc0b964319008addaed5bff1238715f3f522e,2025-05-17T03:17:09 CVE-2025-48144,0,0,cef55e7c0bd7904d0a042c8d683c4924d2ceb518210e37f57f7b7806140c4247,2025-05-16T16:15:45.933000 CVE-2025-48146,0,0,fa7b77bcebafa3436c03130c36893abaa965b4ad81b9fe2c59f71d6aa0195742,2025-05-16T16:15:46.060000 +CVE-2025-4815,1,1,b0ffb7f21cf1f3187a7f141a6ebc6ff120778e813b35774d87dc7355b0c3d7cd,2025-05-17T03:17:10.280000 CVE-2025-48174,0,0,f26469907442315e96b5feb9308b03c4506fc8074c00574b934b171f795f26df,2025-05-16T14:42:18.700000 CVE-2025-48175,0,0,3f6bab737596fdb5634db37c0296a1b165ba48ea379824d01c7b1ce82612cf5b,2025-05-16T14:42:18.700000 CVE-2025-48188,0,0,2672529ed2134d7e822c4e80adc1926206b8fee924bd8bafce4743aab07b6b9a,2025-05-16T21:15:35.210000