diff --git a/CVE-2018/CVE-2018-162xx/CVE-2018-16210.json b/CVE-2018/CVE-2018-162xx/CVE-2018-16210.json index 31972181bef..38fa12f5f71 100644 --- a/CVE-2018/CVE-2018-162xx/CVE-2018-16210.json +++ b/CVE-2018/CVE-2018-162xx/CVE-2018-16210.json @@ -2,8 +2,8 @@ "id": "CVE-2018-16210", "sourceIdentifier": "cve@mitre.org", "published": "2018-10-12T22:15:07.377", - "lastModified": "2024-11-21T03:52:17.730", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-13T17:56:26.900", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "baseScore": 6.1, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", @@ -77,6 +77,370 @@ } ], "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:wago:750-362_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "05", + "matchCriteriaId": "051F8A1F-4792-44FE-A35E-DD1BFD71FC43" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:wago:750-362:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6330A839-FAE3-43EB-B1AA-BA6844D9906D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:wago:750-363_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "05", + "matchCriteriaId": "AA136553-094E-4760-9C25-89E0954F4B95" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:wago:750-363:-:*:*:*:*:*:*:*", + "matchCriteriaId": "54E13E9C-226E-4BD6-8F0C-3061092E892A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:wago:750-823_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "05", + "matchCriteriaId": "0E3196F5-4242-40DB-8D56-9E580C69D478" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:wago:750-823:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CB88572A-CB05-4B52-8BFC-05EFDC819244" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:wago:750-832_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "05", + "matchCriteriaId": "488896BD-593D-46AA-9521-CA089F8D6977" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:wago:750-832:-:*:*:*:*:*:*:*", + "matchCriteriaId": "13D1FA8D-C8BA-4D1C-8372-DECD40177631" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:wago:750-862_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "05", + "matchCriteriaId": "8C6FB898-CBBC-4D80-ABCD-04B3E9BA5B82" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:wago:750-862:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA04FBFB-9E1C-4618-9FDC-70675506D8D5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:wago:750-891_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "05", + "matchCriteriaId": "BE14C0B9-8B13-479D-9341-866B9FC71F9D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:wago:750-891:-:*:*:*:*:*:*:*", + "matchCriteriaId": "22BAABD9-A10D-4904-AA02-C37C4490B47A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:wago:750-890_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "05", + "matchCriteriaId": "E61D2577-BB7F-4EC0-8709-C68026322EA9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:wago:750-890:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11751A8B-FCFD-433B-9065-B4FC85168A93" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:wago:750-352_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14", + "matchCriteriaId": "8E001859-A338-43DA-877E-C43F57E7F9AD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:wago:750-352:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C0865A4-6C89-4470-98E3-7E90BDF94D15" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:wago:750-831_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14", + "matchCriteriaId": "3631065F-27D6-4217-84EA-A8B40CC1F38F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:wago:750-831:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F0631884-FF6F-4AA9-9D76-CDECB5A738FC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:wago:750-852_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14", + "matchCriteriaId": "1E940C38-F03A-4D81-9AEA-C3CAC90916E8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:wago:750-852:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D6739E1-EF0B-48EE-90FC-5708756FC362" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:wago:750-880_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14", + "matchCriteriaId": "A5974664-66D9-45BC-8977-98E3CE1D282F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:wago:750-880:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CFEAC4D9-15CF-44B8-844D-C012AA4637A2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:wago:750-881_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14", + "matchCriteriaId": "72B66D0B-53CF-4018-831A-5A67CBA51B14" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:wago:750-881:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6FE51647-62C1-4D3C-91FA-13ACA6CD71D2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:wago:750-889_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14", + "matchCriteriaId": "FF2B7B07-532C-4D7B-B168-A9C3700EE8DD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:wago:750-889:-:*:*:*:*:*:*:*", + "matchCriteriaId": "57919AAB-2962-4543-810A-C143300351F8" + } + ] + } + ] + }, { "operator": "AND", "nodes": [ diff --git a/CVE-2022/CVE-2022-450xx/CVE-2022-45064.json b/CVE-2022/CVE-2022-450xx/CVE-2022-45064.json index 53b2fe24d15..245ae715be8 100644 --- a/CVE-2022/CVE-2022-450xx/CVE-2022-45064.json +++ b/CVE-2022/CVE-2022-450xx/CVE-2022-45064.json @@ -2,8 +2,8 @@ "id": "CVE-2022-45064", "sourceIdentifier": "security@apache.org", "published": "2023-04-13T11:15:06.737", - "lastModified": "2025-05-23T16:44:02.653", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-13T17:55:57.933", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -76,8 +76,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:apache:sling:2.13.0:*:*:*:*:*:*:*", - "matchCriteriaId": "F0452CA1-A3AB-430A-9011-25A37AD1F2A9" + "criteria": "cpe:2.3:a:apache:apache_sling_engine:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.14.0", + "matchCriteriaId": "F89F26B7-0485-4677-A00E-3A6B6B7D67AA" } ] } diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4976.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4976.json index d1a76861934..32fd5e0de5e 100644 --- a/CVE-2022/CVE-2022-49xx/CVE-2022-4976.json +++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4976.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4976", "sourceIdentifier": "9b29abf9-4ab0-4765-b253-1875cd9b441e", "published": "2025-06-12T01:15:25.370", - "lastModified": "2025-06-12T16:06:20.180", + "lastModified": "2025-06-13T16:15:23.827", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Archive::Unzip::Burst (versi\u00f3n 0.01-0.09) para Perl incluye una librer\u00eda InfoZip afectada por varias vulnerabilidades. Esta librer\u00eda est\u00e1 afectada por CVE-2014-8139, CVE-2014-8140 y CVE-2014-8141." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://rt.cpan.org/Public/Bug/Display.html?id=143547", diff --git a/CVE-2023/CVE-2023-02xx/CVE-2023-0224.json b/CVE-2023/CVE-2023-02xx/CVE-2023-0224.json index 02c8db320cb..a153d83530e 100644 --- a/CVE-2023/CVE-2023-02xx/CVE-2023-0224.json +++ b/CVE-2023/CVE-2023-02xx/CVE-2023-0224.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0224", "sourceIdentifier": "contact@wpscan.com", "published": "2024-01-16T16:15:10.440", - "lastModified": "2024-11-21T07:36:46.640", + "lastModified": "2025-06-13T16:15:24.050", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-520xx/CVE-2023-52074.json b/CVE-2023/CVE-2023-520xx/CVE-2023-52074.json index 805da10d9e2..a9d3ef5384c 100644 --- a/CVE-2023/CVE-2023-520xx/CVE-2023-52074.json +++ b/CVE-2023/CVE-2023-520xx/CVE-2023-52074.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52074", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-08T22:15:45.267", - "lastModified": "2024-11-21T08:39:06.930", + "lastModified": "2025-06-13T16:15:24.240", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-521xx/CVE-2023-52115.json b/CVE-2023/CVE-2023-521xx/CVE-2023-52115.json index 078166fd610..544e1c288c1 100644 --- a/CVE-2023/CVE-2023-521xx/CVE-2023-52115.json +++ b/CVE-2023/CVE-2023-521xx/CVE-2023-52115.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52115", "sourceIdentifier": "psirt@huawei.com", "published": "2024-01-16T09:15:07.933", - "lastModified": "2024-11-21T08:39:12.530", + "lastModified": "2025-06-13T16:15:24.457", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2024/CVE-2024-217xx/CVE-2024-21733.json b/CVE-2024/CVE-2024-217xx/CVE-2024-21733.json index fe937b37ebe..2435276d632 100644 --- a/CVE-2024/CVE-2024-217xx/CVE-2024-21733.json +++ b/CVE-2024/CVE-2024-217xx/CVE-2024-21733.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21733", "sourceIdentifier": "security@apache.org", "published": "2024-01-19T11:15:08.043", - "lastModified": "2025-02-13T18:16:43.363", + "lastModified": "2025-06-13T16:15:24.760", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,13 +36,33 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, "weaknesses": [ { "source": "security@apache.org", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-315xx/CVE-2024-31503.json b/CVE-2024/CVE-2024-315xx/CVE-2024-31503.json index ffb86a5c034..1bbf3a97c32 100644 --- a/CVE-2024/CVE-2024-315xx/CVE-2024-31503.json +++ b/CVE-2024/CVE-2024-315xx/CVE-2024-31503.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31503", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T00:15:07.220", - "lastModified": "2024-11-21T09:13:39.700", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-13T16:22:08.547", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +61,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:*:*:*:*:*:*:*:*", + "versionEndExcluding": "19.0.1", + "matchCriteriaId": "CF5533A5-6CDB-4FB2-9031-A3758F995F0F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/alexbsec/CVEs/blob/master/2024/CVE-2024-31503.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/alexbsec/CVEs/blob/master/2024/CVE-2024-31503.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-324xx/CVE-2024-32405.json b/CVE-2024/CVE-2024-324xx/CVE-2024-32405.json index ea78963eb05..382c445d792 100644 --- a/CVE-2024/CVE-2024-324xx/CVE-2024-32405.json +++ b/CVE-2024/CVE-2024-324xx/CVE-2024-32405.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32405", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T20:15:07.737", - "lastModified": "2024-11-21T09:14:52.610", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-13T16:10:19.593", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,58 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:inducer:relate:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.1", + "matchCriteriaId": "B37DF50A-E856-4111-8584-D04B26CBB9F7" + } + ] + } + ] + } + ], "references": [ { "url": "https://cxsecurity.com/issue/WLB-2024040051", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://packetstormsecurity.com/files/178101/Relate-Cross-Site-Scripting.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://cxsecurity.com/issue/WLB-2024040051", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://packetstormsecurity.com/files/178101/Relate-Cross-Site-Scripting.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-324xx/CVE-2024-32407.json b/CVE-2024/CVE-2024-324xx/CVE-2024-32407.json index c67525f7b55..2d8fde0665f 100644 --- a/CVE-2024/CVE-2024-324xx/CVE-2024-32407.json +++ b/CVE-2024/CVE-2024-324xx/CVE-2024-32407.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32407", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T19:15:46.680", - "lastModified": "2024-11-21T09:14:53.060", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-13T16:11:59.863", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:inducer:relate:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.1", + "matchCriteriaId": "B37DF50A-E856-4111-8584-D04B26CBB9F7" + } + ] + } + ] + } + ], "references": [ { "url": "https://book.hacktricks.xyz/v/jp/pentesting-web/ssti-server-side-template-injection", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Permissions Required" + ] }, { "url": "https://cxsecurity.com/issue/WLB-2024040049", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://book.hacktricks.xyz/v/jp/pentesting-web/ssti-server-side-template-injection", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://cxsecurity.com/issue/WLB-2024040049", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33900.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33900.json index fe897b8071a..26b925306dd 100644 --- a/CVE-2024/CVE-2024-339xx/CVE-2024-33900.json +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33900.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33900", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-20T21:15:09.177", - "lastModified": "2024-11-21T09:17:42.003", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-13T16:16:24.497", + "vulnStatus": "Analyzed", "cveTags": [ { "sourceIdentifier": "cve@mitre.org", @@ -58,38 +58,79 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:keepassxc:keepassxc:2.7.7:*:*:*:*:*:*:*", + "matchCriteriaId": "F0371F11-5591-4125-A5C9-BAF33F1F7969" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Fastor01/30c6d89c842feb1865ec2cd2d3806838", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/keepassxreboot/keepassxc/issues/10784", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://keepassxc.org/blog/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://keepassxc.org/blog/2019-02-21-memory-security/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://gist.github.com/Fastor01/30c6d89c842feb1865ec2cd2d3806838", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/keepassxreboot/keepassxc/issues/10784", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://keepassxc.org/blog/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://keepassxc.org/blog/2019-02-21-memory-security/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33901.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33901.json index 97aa685d498..87898d9a8e5 100644 --- a/CVE-2024/CVE-2024-339xx/CVE-2024-33901.json +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33901.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33901", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-20T21:15:09.243", - "lastModified": "2024-11-21T09:17:42.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-13T16:13:44.500", + "vulnStatus": "Analyzed", "cveTags": [ { "sourceIdentifier": "cve@mitre.org", @@ -58,38 +58,79 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:keepassxc:keepassxc:2.7.7:*:*:*:*:*:*:*", + "matchCriteriaId": "F0371F11-5591-4125-A5C9-BAF33F1F7969" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Fastor01/30c6d89c842feb1865ec2cd2d3806838", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/keepassxreboot/keepassxc/issues/10784", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://keepassxc.org/blog/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://keepassxc.org/blog/2019-02-21-memory-security/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://gist.github.com/Fastor01/30c6d89c842feb1865ec2cd2d3806838", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/keepassxreboot/keepassxc/issues/10784", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://keepassxc.org/blog/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://keepassxc.org/blog/2019-02-21-memory-security/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37821.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37821.json index a2b427e7704..156c58b35ec 100644 --- a/CVE-2024/CVE-2024-378xx/CVE-2024-37821.json +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37821.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37821", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-18T20:15:13.640", - "lastModified": "2024-11-21T09:24:20.780", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-13T16:17:59.667", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:*:*:*:*:*:*:*:*", + "versionEndExcluding": "19.0.2", + "matchCriteriaId": "3DE01B5C-BB48-4C7E-883C-2B325E89092C" + } + ] + } + ] + } + ], "references": [ { "url": "http://dolibarr.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/alexbsec/CVEs/blob/master/2024/CVE-2024-37821.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://dolibarr.com", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://github.com/alexbsec/CVEs/blob/master/2024/CVE-2024-37821.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-508xx/CVE-2024-50849.json b/CVE-2024/CVE-2024-508xx/CVE-2024-50849.json index 566ec9816c7..71626154cb0 100644 --- a/CVE-2024/CVE-2024-508xx/CVE-2024-50849.json +++ b/CVE-2024/CVE-2024-508xx/CVE-2024-50849.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50849", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-18T21:15:06.360", - "lastModified": "2024-11-21T21:15:22.790", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-13T16:06:03.393", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rws:worldserver:11.8.2:*:*:*:*:*:*:*", + "matchCriteriaId": "64E10421-18E3-4D62-9DAA-CF742298A85F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Wh1teSnak3/CVE-2024-50849", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.trados.com/product/worldserver/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-574xx/CVE-2024-57459.json b/CVE-2024/CVE-2024-574xx/CVE-2024-57459.json index c745415b4b4..f9009ef25ab 100644 --- a/CVE-2024/CVE-2024-574xx/CVE-2024-57459.json +++ b/CVE-2024/CVE-2024-574xx/CVE-2024-57459.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57459", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-02T16:15:27.390", - "lastModified": "2025-06-02T17:32:17.397", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-13T16:29:02.383", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vishalmathur:cloudclassroom-php_project:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4C9EE693-395C-473A-95BD-57C656C61AB3" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/b0mk35h/921cfa00f9ea1af66645574537d38587", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://owasp.org/www-community/attacks/SQL_Injection", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Not Applicable" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22941.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22941.json index e1b49ed610d..b0d56147c33 100644 --- a/CVE-2025/CVE-2025-229xx/CVE-2025-22941.json +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22941.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22941", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-31T15:15:43.873", - "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-13T16:22:57.000", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:adtran:411_firmware:l80.00.0011.m2:*:*:*:*:*:*:*", + "matchCriteriaId": "ECFFEF0A-A1ED-4291-8D27-C35E4380C459" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:adtran:411:-:*:*:*:*:*:*:*", + "matchCriteriaId": "92259AC3-268C-4305-A5B5-4FD24524312E" + } + ] + } + ] + } + ], "references": [ { "url": "https://drive.google.com/file/d/1levaZk5aC6g6a2zPW8xlOIVAu9MFYvAz/view", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://drive.google.com/file/d/1levaZk5aC6g6a2zPW8xlOIVAu9MFYvAz/view", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23104.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23104.json index af0614aa764..67f3e4c683c 100644 --- a/CVE-2025/CVE-2025-231xx/CVE-2025-23104.json +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23104.json @@ -2,8 +2,8 @@ "id": "CVE-2025-23104", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-02T18:15:23.770", - "lastModified": "2025-06-09T14:15:22.403", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-13T17:46:36.533", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,49 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:exynos_2200_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "63C0D9AC-BD23-48C9-83E7-301DEC06E583" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:samsung:exynos_2200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A72ADEBB-ED72-4A5B-BB27-95EDE43F8116" + } + ] + } + ] + } + ], "references": [ { "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-23104/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-260xx/CVE-2025-26013.json b/CVE-2025/CVE-2025-260xx/CVE-2025-26013.json index 9b086b9e4a9..ab0bc7b13b1 100644 --- a/CVE-2025/CVE-2025-260xx/CVE-2025-26013.json +++ b/CVE-2025/CVE-2025-260xx/CVE-2025-26013.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26013", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-21T16:15:33.313", - "lastModified": "2025-02-21T21:15:24.470", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-13T16:03:12.363", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:olajowon:loggrove:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8BDBFB14-6451-4192-B0B3-80C21629D5C4" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/olajowon/loggrove/issues/IBJSXS", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-260xx/CVE-2025-26014.json b/CVE-2025/CVE-2025-260xx/CVE-2025-26014.json index a79a5353d87..260ec91591f 100644 --- a/CVE-2025/CVE-2025-260xx/CVE-2025-26014.json +++ b/CVE-2025/CVE-2025-260xx/CVE-2025-26014.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26014", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-21T17:15:14.680", - "lastModified": "2025-04-17T16:15:34.477", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-13T16:00:56.813", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:olajowon:loggrove:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8BDBFB14-6451-4192-B0B3-80C21629D5C4" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/olajowon/loggrove/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://gitee.com/olajowon/loggrove/issues/IBJT1K", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://github.com/olajowon/loggrove/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-279xx/CVE-2025-27953.json b/CVE-2025/CVE-2025-279xx/CVE-2025-27953.json index 1f7e9e612de..a6dd1dc087b 100644 --- a/CVE-2025/CVE-2025-279xx/CVE-2025-27953.json +++ b/CVE-2025/CVE-2025-279xx/CVE-2025-27953.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27953", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-02T18:15:23.903", - "lastModified": "2025-06-04T14:54:53.980", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-13T17:52:01.717", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:philips:clinical_collaboration_platform:12.2.1.5:*:*:*:*:*:*:*", + "matchCriteriaId": "46E3EB9F-09D5-4331-9ABF-7E8A4E87389B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/intruderlabs/cvex/tree/main/Carestream/session-token-in-url", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-279xx/CVE-2025-27954.json b/CVE-2025/CVE-2025-279xx/CVE-2025-27954.json index 1663a7006b1..e56e08e675f 100644 --- a/CVE-2025/CVE-2025-279xx/CVE-2025-27954.json +++ b/CVE-2025/CVE-2025-279xx/CVE-2025-27954.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27954", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-02T18:15:24.030", - "lastModified": "2025-06-04T16:15:35.770", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-13T17:53:04.447", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:philips:clinical_collaboration_platform:12.2.1.5:*:*:*:*:*:*:*", + "matchCriteriaId": "46E3EB9F-09D5-4331-9ABF-7E8A4E87389B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/intruderlabs/cvex/tree/main/Carestream/session-token-in-url", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://portswigger.net/kb/issues/00500700_session-token-in-url", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-283xx/CVE-2025-28381.json b/CVE-2025/CVE-2025-283xx/CVE-2025-28381.json index dddf2ad776f..85f0e8bfd66 100644 --- a/CVE-2025/CVE-2025-283xx/CVE-2025-28381.json +++ b/CVE-2025/CVE-2025-283xx/CVE-2025-28381.json @@ -2,7 +2,7 @@ "id": "CVE-2025-28381", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-13T14:15:20.177", - "lastModified": "2025-06-13T14:15:20.177", + "lastModified": "2025-06-13T16:15:25.227", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A credential leak in OpenC3 COSMOS v6.0.0 allows attackers to access service credentials as environment variables stored in all containers." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-526" + } + ] + } + ], "references": [ { "url": "https://openc3.com/", diff --git a/CVE-2025/CVE-2025-283xx/CVE-2025-28388.json b/CVE-2025/CVE-2025-283xx/CVE-2025-28388.json index 0d4dafc289f..2831cd4de4d 100644 --- a/CVE-2025/CVE-2025-283xx/CVE-2025-28388.json +++ b/CVE-2025/CVE-2025-283xx/CVE-2025-28388.json @@ -2,7 +2,7 @@ "id": "CVE-2025-28388", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-13T14:15:20.883", - "lastModified": "2025-06-13T14:15:20.883", + "lastModified": "2025-06-13T16:15:25.387", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "OpenC3 COSMOS v6.0.0 was discovered to contain hardcoded credentials for the Service Account." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], "references": [ { "url": "https://openc3.com/", diff --git a/CVE-2025/CVE-2025-283xx/CVE-2025-28389.json b/CVE-2025/CVE-2025-283xx/CVE-2025-28389.json index 9ce39b96e37..34343b9f224 100644 --- a/CVE-2025/CVE-2025-283xx/CVE-2025-28389.json +++ b/CVE-2025/CVE-2025-283xx/CVE-2025-28389.json @@ -2,7 +2,7 @@ "id": "CVE-2025-28389", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-13T14:15:21.010", - "lastModified": "2025-06-13T14:15:21.010", + "lastModified": "2025-06-13T16:15:25.550", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Weak password requirements in OpenC3 COSMOS v6.0.0 allow attackers to bypass authentication via a brute force attack." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-521" + } + ] + } + ], "references": [ { "url": "https://openc3.com/", diff --git a/CVE-2025/CVE-2025-440xx/CVE-2025-44091.json b/CVE-2025/CVE-2025-440xx/CVE-2025-44091.json index 57ac8209aa0..3d5ab61f027 100644 --- a/CVE-2025/CVE-2025-440xx/CVE-2025-44091.json +++ b/CVE-2025/CVE-2025-440xx/CVE-2025-44091.json @@ -2,16 +2,55 @@ "id": "CVE-2025-44091", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-12T21:15:21.347", - "lastModified": "2025-06-12T21:15:21.347", + "lastModified": "2025-06-13T16:15:25.863", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "yangyouwang crud v1.0.0 is vulnerable to Cross Site Scripting (XSS) via the role management function." + }, + { + "lang": "es", + "value": "yangyouwang crud v1.0.0 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s de la funci\u00f3n de administraci\u00f3n de roles." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/HL4245/f2e88b7afea9ee08cc4282f38b5ea1cf", @@ -20,6 +59,10 @@ { "url": "https://github.com/HL4245/CVE/blob/main/%E7%AE%80%E7%BA%A6%E5%90%8E%E5%8F%B0%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F.md", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/HL4245/CVE/blob/main/%E7%AE%80%E7%BA%A6%E5%90%8E%E5%8F%B0%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-441xx/CVE-2025-44115.json b/CVE-2025/CVE-2025-441xx/CVE-2025-44115.json index b9493a0c8d3..2e101fdf93b 100644 --- a/CVE-2025/CVE-2025-441xx/CVE-2025-44115.json +++ b/CVE-2025/CVE-2025-441xx/CVE-2025-44115.json @@ -2,8 +2,8 @@ "id": "CVE-2025-44115", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-02T16:15:29.593", - "lastModified": "2025-06-02T20:15:22.637", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-13T17:21:25.870", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cotonti:cotonti_siena:0.9.25:*:*:*:*:*:*:*", + "matchCriteriaId": "CF2E67AA-DA0D-42D3-A681-FB1F67B2CFB6" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/yA0-Z/9666b1a333607381ab8dfcc137f2b65c", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/Cotonti/Cotonti/issues/1650", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://github.com/Cotonti/Cotonti/issues/1834", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-455xx/CVE-2025-45542.json b/CVE-2025/CVE-2025-455xx/CVE-2025-45542.json index cf3e62e921d..c4544dbb12e 100644 --- a/CVE-2025/CVE-2025-455xx/CVE-2025-45542.json +++ b/CVE-2025/CVE-2025-455xx/CVE-2025-45542.json @@ -2,8 +2,8 @@ "id": "CVE-2025-45542", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-02T16:15:29.707", - "lastModified": "2025-06-03T16:15:25.397", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-13T17:45:40.463", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vishalmathur:cloudclassroom-php_project:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4C9EE693-395C-473A-95BD-57C656C61AB3" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/mathurvishal/CloudClassroom-PHP-Project", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://medium.com/@sanjay70023/cve-2025-45542-time-based-blind-sql-injection-in-cloudclassroom-php-project-v1-0-1fa0efc8a94a", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "Exploit" + ] }, { "url": "http://seclists.org/fulldisclosure/2025/Jun/12", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-460xx/CVE-2025-46060.json b/CVE-2025/CVE-2025-460xx/CVE-2025-46060.json index c32590080d8..8a35bda526a 100644 --- a/CVE-2025/CVE-2025-460xx/CVE-2025-46060.json +++ b/CVE-2025/CVE-2025-460xx/CVE-2025-46060.json @@ -2,7 +2,7 @@ "id": "CVE-2025-46060", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-13T13:15:21.187", - "lastModified": "2025-06-13T13:15:21.187", + "lastModified": "2025-06-13T16:15:26.030", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Buffer Overflow vulnerability in TOTOLINK N600R v4.3.0cu.7866_B2022506 allows a remote attacker to execute arbitrary code via the UPLOAD_FILENAME component" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "http://totolink.com", diff --git a/CVE-2025/CVE-2025-460xx/CVE-2025-46096.json b/CVE-2025/CVE-2025-460xx/CVE-2025-46096.json index 80dbe5b4cf4..4ff47fa5aa5 100644 --- a/CVE-2025/CVE-2025-460xx/CVE-2025-46096.json +++ b/CVE-2025/CVE-2025-460xx/CVE-2025-46096.json @@ -2,7 +2,7 @@ "id": "CVE-2025-46096", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-13T13:15:21.710", - "lastModified": "2025-06-13T13:15:21.710", + "lastModified": "2025-06-13T16:15:26.193", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,46 @@ "value": "Directory Traversal vulnerability in solon v.3.1.2 allows a remote attacker to conduct XSS attacks via the solon-faas-luffy component" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + }, + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/yaoyao-cool/1b7d80930fea88b6fd4839646cedc437", diff --git a/CVE-2025/CVE-2025-469xx/CVE-2025-46976.json b/CVE-2025/CVE-2025-469xx/CVE-2025-46976.json index 83a2ef98462..02f639fb90c 100644 --- a/CVE-2025/CVE-2025-469xx/CVE-2025-46976.json +++ b/CVE-2025/CVE-2025-469xx/CVE-2025-46976.json @@ -2,8 +2,8 @@ "id": "CVE-2025-46976", "sourceIdentifier": "psirt@adobe.com", "published": "2025-06-10T23:15:42.103", - "lastModified": "2025-06-12T16:06:29.520", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-13T17:29:49.670", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.23.0", + "matchCriteriaId": "15DC0724-7B85-4EC8-B9E6-76DA0F26F6D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2025.5.0", + "matchCriteriaId": "8A395D75-088D-41C2-BCE6-30CB049798FE" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb25-48.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-469xx/CVE-2025-46977.json b/CVE-2025/CVE-2025-469xx/CVE-2025-46977.json index e977da99630..a35d5e6438d 100644 --- a/CVE-2025/CVE-2025-469xx/CVE-2025-46977.json +++ b/CVE-2025/CVE-2025-469xx/CVE-2025-46977.json @@ -2,8 +2,8 @@ "id": "CVE-2025-46977", "sourceIdentifier": "psirt@adobe.com", "published": "2025-06-10T23:15:42.267", - "lastModified": "2025-06-12T16:06:29.520", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-13T17:33:20.470", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.23.0", + "matchCriteriaId": "15DC0724-7B85-4EC8-B9E6-76DA0F26F6D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2025.5.0", + "matchCriteriaId": "8A395D75-088D-41C2-BCE6-30CB049798FE" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb25-48.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-469xx/CVE-2025-46978.json b/CVE-2025/CVE-2025-469xx/CVE-2025-46978.json index 418256ea887..829ed55f34c 100644 --- a/CVE-2025/CVE-2025-469xx/CVE-2025-46978.json +++ b/CVE-2025/CVE-2025-469xx/CVE-2025-46978.json @@ -2,8 +2,8 @@ "id": "CVE-2025-46978", "sourceIdentifier": "psirt@adobe.com", "published": "2025-06-10T23:15:42.447", - "lastModified": "2025-06-12T16:06:29.520", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-13T17:41:41.383", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.23.0", + "matchCriteriaId": "15DC0724-7B85-4EC8-B9E6-76DA0F26F6D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2025.5.0", + "matchCriteriaId": "8A395D75-088D-41C2-BCE6-30CB049798FE" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb25-48.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-469xx/CVE-2025-46979.json b/CVE-2025/CVE-2025-469xx/CVE-2025-46979.json index d60794e2f06..7f1558667fa 100644 --- a/CVE-2025/CVE-2025-469xx/CVE-2025-46979.json +++ b/CVE-2025/CVE-2025-469xx/CVE-2025-46979.json @@ -2,8 +2,8 @@ "id": "CVE-2025-46979", "sourceIdentifier": "psirt@adobe.com", "published": "2025-06-10T23:15:42.597", - "lastModified": "2025-06-12T16:06:29.520", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-13T17:44:35.590", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.23.0", + "matchCriteriaId": "15DC0724-7B85-4EC8-B9E6-76DA0F26F6D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2025.5.0", + "matchCriteriaId": "8A395D75-088D-41C2-BCE6-30CB049798FE" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb25-48.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-469xx/CVE-2025-46981.json b/CVE-2025/CVE-2025-469xx/CVE-2025-46981.json index e350db5ff41..529b39c2d02 100644 --- a/CVE-2025/CVE-2025-469xx/CVE-2025-46981.json +++ b/CVE-2025/CVE-2025-469xx/CVE-2025-46981.json @@ -2,8 +2,8 @@ "id": "CVE-2025-46981", "sourceIdentifier": "psirt@adobe.com", "published": "2025-06-10T23:15:42.743", - "lastModified": "2025-06-12T16:06:29.520", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-13T17:44:41.920", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.23.0", + "matchCriteriaId": "15DC0724-7B85-4EC8-B9E6-76DA0F26F6D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2025.5.0", + "matchCriteriaId": "8A395D75-088D-41C2-BCE6-30CB049798FE" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb25-48.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48914.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48914.json new file mode 100644 index 00000000000..74c0229b1eb --- /dev/null +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48914.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-48914", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-06-13T16:15:26.457", + "lastModified": "2025-06-13T16:15:26.457", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal COOKiES Consent Management allows Cross-Site Scripting (XSS).This issue affects COOKiES Consent Management: from 0.0.0 before 1.2.15." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2025-075", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48915.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48915.json new file mode 100644 index 00000000000..d14c808ee45 --- /dev/null +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48915.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-48915", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-06-13T16:15:26.580", + "lastModified": "2025-06-13T16:15:26.580", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal COOKiES Consent Management allows Cross-Site Scripting (XSS).This issue affects COOKiES Consent Management: from 0.0.0 before 1.2.15." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2025-076", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48916.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48916.json new file mode 100644 index 00000000000..09dd9f27eaf --- /dev/null +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48916.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-48916", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-06-13T16:15:26.790", + "lastModified": "2025-06-13T16:15:26.790", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Drupal Bookable Calendar allows Forceful Browsing.This issue affects Bookable Calendar: from 0.0.0 before 2.2.13." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2025-070", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48917.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48917.json new file mode 100644 index 00000000000..eabc97e03ea --- /dev/null +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48917.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-48917", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-06-13T16:15:26.930", + "lastModified": "2025-06-13T17:15:21.713", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal EU Cookie Compliance (GDPR Compliance) allows Cross-Site Scripting (XSS).This issue affects EU Cookie Compliance (GDPR Compliance): from 0.0.0 before 1.26.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.0, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2025-072", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48918.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48918.json new file mode 100644 index 00000000000..5b92220dd80 --- /dev/null +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48918.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-48918", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-06-13T16:15:27.053", + "lastModified": "2025-06-13T16:15:27.053", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Simple Klaro allows Cross-Site Scripting (XSS).This issue affects Simple Klaro: from 0.0.0 before 1.10.0." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2025-071", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48919.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48919.json new file mode 100644 index 00000000000..6799927b66d --- /dev/null +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48919.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-48919", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-06-13T16:15:27.177", + "lastModified": "2025-06-13T17:15:22.757", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Simple Klaro allows Cross-Site Scripting (XSS).This issue affects Simple Klaro: from 0.0.0 before 1.10.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.0, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2025-073", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48920.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48920.json new file mode 100644 index 00000000000..31909a9d1f0 --- /dev/null +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48920.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-48920", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-06-13T16:15:27.293", + "lastModified": "2025-06-13T16:15:27.293", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal etracker allows Cross-Site Scripting (XSS).This issue affects etracker: from 0.0.0 before 3.1.0." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2025-074", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-495xx/CVE-2025-49580.json b/CVE-2025/CVE-2025-495xx/CVE-2025-49580.json new file mode 100644 index 00000000000..1f875692334 --- /dev/null +++ b/CVE-2025/CVE-2025-495xx/CVE-2025-49580.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2025-49580", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-06-13T16:15:27.417", + "lastModified": "2025-06-13T16:15:27.417", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "XWiki is a generic wiki platform. From 8.2 and 7.4.5 until 17.1.0-rc-1, 16.10.4, and 16.4.7, pages can gain script or programming rights when they contain a link and the target of the link is renamed or moved. This might lead to execution of scripts contained in xobjects that should have never been executed. This vulnerability is fixed in 17.1.0-rc-1, 16.10.4, and 16.4.7." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "ACTIVE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/xwiki/xwiki-platform/commit/ab209acd780da69a4c5ff77ff011efd698273cec", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-jm43-hrq7-r7w6", + "source": "security-advisories@github.com" + }, + { + "url": "https://jira.xwiki.org/browse/XWIKI-22836", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-495xx/CVE-2025-49581.json b/CVE-2025/CVE-2025-495xx/CVE-2025-49581.json new file mode 100644 index 00000000000..6d108df9053 --- /dev/null +++ b/CVE-2025/CVE-2025-495xx/CVE-2025-49581.json @@ -0,0 +1,94 @@ +{ + "id": "CVE-2025-49581", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-06-13T16:15:27.570", + "lastModified": "2025-06-13T16:15:27.570", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "XWiki is a generic wiki platform. Any user with edit right on a page (could be the user's profile) can execute code (Groovy, Python, Velocity) with programming right by defining a wiki macro. This allows full access to the whole XWiki installation. The main problem is that if a wiki macro parameter allows wiki syntax, its default value is executed with the rights of the author of the document where it is used. This can be exploited by overriding a macro like the children macro that is used in a page that has programming right like the page XWiki.ChildrenMacro and thus allows arbitrary script macros. This vulnerability has been patched in XWiki 16.4.7, 16.10.3 and 17.0.0 by executing wiki parameters with the rights of the wiki macro's author when the parameter's value is the default value." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + }, + { + "lang": "en", + "value": "CWE-250" + }, + { + "lang": "en", + "value": "CWE-270" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/xwiki/xwiki-platform/commit/c99d501ed41cbee6a3c02ff927714531570789de", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-9875-cw22-f7cx", + "source": "security-advisories@github.com" + }, + { + "url": "https://jira.xwiki.org/browse/XWIKI-22760", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-495xx/CVE-2025-49582.json b/CVE-2025/CVE-2025-495xx/CVE-2025-49582.json new file mode 100644 index 00000000000..967057032ab --- /dev/null +++ b/CVE-2025/CVE-2025-495xx/CVE-2025-49582.json @@ -0,0 +1,110 @@ +{ + "id": "CVE-2025-49582", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-06-13T17:15:23.180", + "lastModified": "2025-06-13T17:15:23.180", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "XWiki is a generic wiki platform. When editing content that contains \"dangerous\" macros like malicious script macros that were authored by a user with fewer rights, XWiki warns about the execution of these macros since XWiki 15.9RC1. These required rights analyzers that trigger these warnings are incomplete, allowing an attacker to hide malicious content. For most macros, the existing analyzers don't consider non-lowercase parameters. Further, most macro parameters that can contain XWiki syntax like titles of information boxes weren't analyzed at all. Similarly, the \"source\" parameters of the content and context macro weren't anylzed even though they could contain arbitrary XWiki syntax. In the worst case, this could allow a malicious to add malicious script macros including Groovy or Python macros to a page that are then executed after another user with programming righs edits the page, thus allowing remote code execution. The required rights analyzers have been made more robust and extended to cover those cases in XWiki 16.4.7, 16.10.3 and 17.0.0." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-693" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/xwiki/xwiki-platform/commit/0a705e8e253cb871b804e25c53b2bde879c886bd", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/xwiki/xwiki-platform/commit/3d451e957fe2b14459e9ac64172b4a0e4c46971c", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/xwiki/xwiki-platform/commit/abdcefc0db27035b67329add836fd683e0cf92b8", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/xwiki/xwiki-platform/commit/cc74dc802efe0e2d3fa2ba3355dbadc51c5fd8c7", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-c32m-27pj-4xcj", + "source": "security-advisories@github.com" + }, + { + "url": "https://jira.xwiki.org/browse/XWIKI-22758", + "source": "security-advisories@github.com" + }, + { + "url": "https://jira.xwiki.org/browse/XWIKI-22759", + "source": "security-advisories@github.com" + }, + { + "url": "https://jira.xwiki.org/browse/XWIKI-22763", + "source": "security-advisories@github.com" + }, + { + "url": "https://jira.xwiki.org/browse/XWIKI-22799", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-495xx/CVE-2025-49583.json b/CVE-2025/CVE-2025-495xx/CVE-2025-49583.json new file mode 100644 index 00000000000..d0b4dfee957 --- /dev/null +++ b/CVE-2025/CVE-2025-495xx/CVE-2025-49583.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2025-49583", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-06-13T17:15:23.390", + "lastModified": "2025-06-13T17:15:23.390", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "XWiki is a generic wiki platform. When a user without script right creates a document with an `XWiki.Notifications.Code.NotificationEmailRendererClass` object, and later an admin edits and saves that document, the email templates in this object will be used for notifications. No malicious code can be executed, though, as while these templates allow Velocity code, the existing generic analyzer already warns admins before editing Velocity code. The main impact would thus be to send spam, e.g., with phishing links to other users or to hide notifications about other attacks. Note that warnings before editing documents with dangerous properties have only been introduced in XWiki 15.9, before that version, this was a known issue and the advice was simply to be careful. This has been patched in XWiki 16.10.2, 16.4.7 and 15.10.16 by adding an analysis for the respective XClass properties." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "LOW", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-270" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/xwiki/xwiki-platform/commit/3d96bf3ceb167bf0213d63f0be1f7e1732eb0a92", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-ff6v-w58f-v97w", + "source": "security-advisories@github.com" + }, + { + "url": "https://jira.xwiki.org/browse/XWIKI-22471", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6035.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6035.json new file mode 100644 index 00000000000..f7f1d7229ec --- /dev/null +++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6035.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-6035", + "sourceIdentifier": "secalert@redhat.com", + "published": "2025-06-13T16:15:28.067", + "lastModified": "2025-06-13T16:15:28.067", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in GIMP. An integer overflow vulnerability exists in the GIMP \"Despeckle\" plug-in. The issue occurs due to unchecked multiplication of image dimensions, such as width, height, and bytes-per-pixel (img_bpp), which can result in allocating insufficient memory and subsequently performing out-of-bounds writes. This issue could lead to heap corruption, a potential denial of service (DoS), or arbitrary code execution in certain scenarios." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", + "baseScore": 6.6, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2025-6035", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372515", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6052.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6052.json new file mode 100644 index 00000000000..7328403058e --- /dev/null +++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6052.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-6052", + "sourceIdentifier": "secalert@redhat.com", + "published": "2025-06-13T16:15:28.230", + "lastModified": "2025-06-13T16:15:28.230", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in how GLib\u2019s GString manages memory when adding data to strings. If a string is already very large, combining it with more input can cause a hidden overflow in the size calculation. This makes the system think it has enough memory when it doesn\u2019t. As a result, data may be written past the end of the allocated memory, leading to crashes or memory corruption." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 3.7, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2025-6052", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372666", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 37fed6829d4..29b978e8ebd 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-13T16:00:19.907749+00:00 +2025-06-13T18:00:19.979595+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-06-13T15:49:20.863000+00:00 +2025-06-13T17:56:26.900000+00:00 ``` ### Last Data Feed Release @@ -33,55 +33,57 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -297898 +297911 ``` ### CVEs added in the last Commit -Recently added CVEs: `11` +Recently added CVEs: `13` -- [CVE-2025-28380](CVE-2025/CVE-2025-283xx/CVE-2025-28380.json) (`2025-06-13T14:15:20.030`) -- [CVE-2025-28381](CVE-2025/CVE-2025-283xx/CVE-2025-28381.json) (`2025-06-13T14:15:20.177`) -- [CVE-2025-28382](CVE-2025/CVE-2025-283xx/CVE-2025-28382.json) (`2025-06-13T14:15:20.440`) -- [CVE-2025-28384](CVE-2025/CVE-2025-283xx/CVE-2025-28384.json) (`2025-06-13T14:15:20.590`) -- [CVE-2025-28386](CVE-2025/CVE-2025-283xx/CVE-2025-28386.json) (`2025-06-13T14:15:20.713`) -- [CVE-2025-28388](CVE-2025/CVE-2025-283xx/CVE-2025-28388.json) (`2025-06-13T14:15:20.883`) -- [CVE-2025-28389](CVE-2025/CVE-2025-283xx/CVE-2025-28389.json) (`2025-06-13T14:15:21.010`) -- [CVE-2025-36631](CVE-2025/CVE-2025-366xx/CVE-2025-36631.json) (`2025-06-13T15:15:19.627`) -- [CVE-2025-36633](CVE-2025/CVE-2025-366xx/CVE-2025-36633.json) (`2025-06-13T15:15:20.183`) -- [CVE-2025-6029](CVE-2025/CVE-2025-60xx/CVE-2025-6029.json) (`2025-06-13T15:15:21.430`) -- [CVE-2025-6030](CVE-2025/CVE-2025-60xx/CVE-2025-6030.json) (`2025-06-13T15:15:21.600`) +- [CVE-2025-48914](CVE-2025/CVE-2025-489xx/CVE-2025-48914.json) (`2025-06-13T16:15:26.457`) +- [CVE-2025-48915](CVE-2025/CVE-2025-489xx/CVE-2025-48915.json) (`2025-06-13T16:15:26.580`) +- [CVE-2025-48916](CVE-2025/CVE-2025-489xx/CVE-2025-48916.json) (`2025-06-13T16:15:26.790`) +- [CVE-2025-48917](CVE-2025/CVE-2025-489xx/CVE-2025-48917.json) (`2025-06-13T16:15:26.930`) +- [CVE-2025-48918](CVE-2025/CVE-2025-489xx/CVE-2025-48918.json) (`2025-06-13T16:15:27.053`) +- [CVE-2025-48919](CVE-2025/CVE-2025-489xx/CVE-2025-48919.json) (`2025-06-13T16:15:27.177`) +- [CVE-2025-48920](CVE-2025/CVE-2025-489xx/CVE-2025-48920.json) (`2025-06-13T16:15:27.293`) +- [CVE-2025-49580](CVE-2025/CVE-2025-495xx/CVE-2025-49580.json) (`2025-06-13T16:15:27.417`) +- [CVE-2025-49581](CVE-2025/CVE-2025-495xx/CVE-2025-49581.json) (`2025-06-13T16:15:27.570`) +- [CVE-2025-49582](CVE-2025/CVE-2025-495xx/CVE-2025-49582.json) (`2025-06-13T17:15:23.180`) +- [CVE-2025-49583](CVE-2025/CVE-2025-495xx/CVE-2025-49583.json) (`2025-06-13T17:15:23.390`) +- [CVE-2025-6035](CVE-2025/CVE-2025-60xx/CVE-2025-6035.json) (`2025-06-13T16:15:28.067`) +- [CVE-2025-6052](CVE-2025/CVE-2025-60xx/CVE-2025-6052.json) (`2025-06-13T16:15:28.230`) ### CVEs modified in the last Commit Recently modified CVEs: `34` -- [CVE-2024-52769](CVE-2024/CVE-2024-527xx/CVE-2024-52769.json) (`2025-06-13T14:14:39.027`) -- [CVE-2024-52770](CVE-2024/CVE-2024-527xx/CVE-2024-52770.json) (`2025-06-13T14:17:59.650`) -- [CVE-2024-52771](CVE-2024/CVE-2024-527xx/CVE-2024-52771.json) (`2025-06-13T14:23:57.197`) -- [CVE-2024-53425](CVE-2024/CVE-2024-534xx/CVE-2024-53425.json) (`2025-06-13T14:27:14.820`) -- [CVE-2024-57529](CVE-2024/CVE-2024-575xx/CVE-2024-57529.json) (`2025-06-13T15:38:57.627`) -- [CVE-2025-22236](CVE-2025/CVE-2025-222xx/CVE-2025-22236.json) (`2025-06-13T14:15:19.323`) -- [CVE-2025-22237](CVE-2025/CVE-2025-222xx/CVE-2025-22237.json) (`2025-06-13T14:15:19.467`) -- [CVE-2025-22238](CVE-2025/CVE-2025-222xx/CVE-2025-22238.json) (`2025-06-13T14:15:19.610`) -- [CVE-2025-22239](CVE-2025/CVE-2025-222xx/CVE-2025-22239.json) (`2025-06-13T14:15:19.747`) -- [CVE-2025-22240](CVE-2025/CVE-2025-222xx/CVE-2025-22240.json) (`2025-06-13T14:15:19.893`) -- [CVE-2025-28099](CVE-2025/CVE-2025-280xx/CVE-2025-28099.json) (`2025-06-13T15:18:08.250`) -- [CVE-2025-3623](CVE-2025/CVE-2025-36xx/CVE-2025-3623.json) (`2025-06-13T14:15:21.147`) -- [CVE-2025-45752](CVE-2025/CVE-2025-457xx/CVE-2025-45752.json) (`2025-06-13T15:49:20.863`) -- [CVE-2025-45984](CVE-2025/CVE-2025-459xx/CVE-2025-45984.json) (`2025-06-13T15:15:20.423`) -- [CVE-2025-45985](CVE-2025/CVE-2025-459xx/CVE-2025-45985.json) (`2025-06-13T15:15:20.580`) -- [CVE-2025-45986](CVE-2025/CVE-2025-459xx/CVE-2025-45986.json) (`2025-06-13T15:15:20.747`) -- [CVE-2025-45987](CVE-2025/CVE-2025-459xx/CVE-2025-45987.json) (`2025-06-13T15:15:20.947`) -- [CVE-2025-45988](CVE-2025/CVE-2025-459xx/CVE-2025-45988.json) (`2025-06-13T15:15:21.097`) -- [CVE-2025-46983](CVE-2025/CVE-2025-469xx/CVE-2025-46983.json) (`2025-06-13T14:30:52.440`) -- [CVE-2025-46984](CVE-2025/CVE-2025-469xx/CVE-2025-46984.json) (`2025-06-13T14:30:46.537`) -- [CVE-2025-46985](CVE-2025/CVE-2025-469xx/CVE-2025-46985.json) (`2025-06-13T14:30:30.603`) -- [CVE-2025-46986](CVE-2025/CVE-2025-469xx/CVE-2025-46986.json) (`2025-06-13T14:30:11.690`) -- [CVE-2025-46987](CVE-2025/CVE-2025-469xx/CVE-2025-46987.json) (`2025-06-13T14:30:04.197`) -- [CVE-2025-46988](CVE-2025/CVE-2025-469xx/CVE-2025-46988.json) (`2025-06-13T14:26:54.667`) -- [CVE-2025-48068](CVE-2025/CVE-2025-480xx/CVE-2025-48068.json) (`2025-06-13T15:15:21.300`) +- [CVE-2024-32407](CVE-2024/CVE-2024-324xx/CVE-2024-32407.json) (`2025-06-13T16:11:59.863`) +- [CVE-2024-33900](CVE-2024/CVE-2024-339xx/CVE-2024-33900.json) (`2025-06-13T16:16:24.497`) +- [CVE-2024-33901](CVE-2024/CVE-2024-339xx/CVE-2024-33901.json) (`2025-06-13T16:13:44.500`) +- [CVE-2024-37821](CVE-2024/CVE-2024-378xx/CVE-2024-37821.json) (`2025-06-13T16:17:59.667`) +- [CVE-2024-50849](CVE-2024/CVE-2024-508xx/CVE-2024-50849.json) (`2025-06-13T16:06:03.393`) +- [CVE-2024-57459](CVE-2024/CVE-2024-574xx/CVE-2024-57459.json) (`2025-06-13T16:29:02.383`) +- [CVE-2025-22941](CVE-2025/CVE-2025-229xx/CVE-2025-22941.json) (`2025-06-13T16:22:57.000`) +- [CVE-2025-23104](CVE-2025/CVE-2025-231xx/CVE-2025-23104.json) (`2025-06-13T17:46:36.533`) +- [CVE-2025-26013](CVE-2025/CVE-2025-260xx/CVE-2025-26013.json) (`2025-06-13T16:03:12.363`) +- [CVE-2025-26014](CVE-2025/CVE-2025-260xx/CVE-2025-26014.json) (`2025-06-13T16:00:56.813`) +- [CVE-2025-27953](CVE-2025/CVE-2025-279xx/CVE-2025-27953.json) (`2025-06-13T17:52:01.717`) +- [CVE-2025-27954](CVE-2025/CVE-2025-279xx/CVE-2025-27954.json) (`2025-06-13T17:53:04.447`) +- [CVE-2025-28381](CVE-2025/CVE-2025-283xx/CVE-2025-28381.json) (`2025-06-13T16:15:25.227`) +- [CVE-2025-28388](CVE-2025/CVE-2025-283xx/CVE-2025-28388.json) (`2025-06-13T16:15:25.387`) +- [CVE-2025-28389](CVE-2025/CVE-2025-283xx/CVE-2025-28389.json) (`2025-06-13T16:15:25.550`) +- [CVE-2025-44091](CVE-2025/CVE-2025-440xx/CVE-2025-44091.json) (`2025-06-13T16:15:25.863`) +- [CVE-2025-44115](CVE-2025/CVE-2025-441xx/CVE-2025-44115.json) (`2025-06-13T17:21:25.870`) +- [CVE-2025-45542](CVE-2025/CVE-2025-455xx/CVE-2025-45542.json) (`2025-06-13T17:45:40.463`) +- [CVE-2025-46060](CVE-2025/CVE-2025-460xx/CVE-2025-46060.json) (`2025-06-13T16:15:26.030`) +- [CVE-2025-46096](CVE-2025/CVE-2025-460xx/CVE-2025-46096.json) (`2025-06-13T16:15:26.193`) +- [CVE-2025-46976](CVE-2025/CVE-2025-469xx/CVE-2025-46976.json) (`2025-06-13T17:29:49.670`) +- [CVE-2025-46977](CVE-2025/CVE-2025-469xx/CVE-2025-46977.json) (`2025-06-13T17:33:20.470`) +- [CVE-2025-46978](CVE-2025/CVE-2025-469xx/CVE-2025-46978.json) (`2025-06-13T17:41:41.383`) +- [CVE-2025-46979](CVE-2025/CVE-2025-469xx/CVE-2025-46979.json) (`2025-06-13T17:44:35.590`) +- [CVE-2025-46981](CVE-2025/CVE-2025-469xx/CVE-2025-46981.json) (`2025-06-13T17:44:41.920`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 9d00bdd073f..428dab942c3 100644 --- a/_state.csv +++ b/_state.csv @@ -116634,7 +116634,7 @@ CVE-2018-16205,0,0,1f86caeec012004b2fd74347fb65b21a5d8869bb035d5d199474adf5b0630 CVE-2018-16206,0,0,096f153133d00fa3a9c383a862c234f12cd1410079be9f925b6e0b71fc9a3138,2024-11-21T03:52:17.463000 CVE-2018-16207,0,0,f515e2e88f25f4525f5741c734447fcfbd4289d9c7f85b1587b37e2c82594244,2024-11-21T03:52:17.583000 CVE-2018-1621,0,0,8e7763bfadb6a9f1b9161ad4d36701746abcc3efcccac159e423574cea723b0b,2024-11-21T04:00:05.857000 -CVE-2018-16210,0,0,ca9d646c7328347950206c0f5bcfea60f100fd45701699f0e744489e2fdd3a13,2024-11-21T03:52:17.730000 +CVE-2018-16210,0,1,940b381152ae41a797bf5ea418b76a194b33ad019bef72ea3e18ecbc60ec9aff,2025-06-13T17:56:26.900000 CVE-2018-16216,0,0,5717f7973b04da3e3ae49f5bbbef4148153bda6d6c61b07d0ba1e48df934cbd8,2024-11-21T03:52:17.880000 CVE-2018-16217,0,0,7fd43189534f945bd6cb20a8ae203685088b4224ad0046495e34d1f26cb6ba2c,2024-11-21T03:52:18.033000 CVE-2018-16218,0,0,99bd270f2fd02e047cd8f3c8890ba7e12eba9b1cd0627619c82774a4236f3c27,2024-11-21T03:52:18.180000 @@ -207875,7 +207875,7 @@ CVE-2022-41568,0,0,fe6de37da0cc7e35a34e070cf787e31c960cfc085a8e6f85999e37f415176 CVE-2022-4157,0,0,d662f859f279f16c8788b2c5f2b8f383e9b2c0033612c5b4767e87c54df200ef,2025-04-12T00:15:17.427000 CVE-2022-41570,0,0,53855d0d0d1b4104bcdbfd0cb4535849d7ac6282acb641cb229560b5ced02dc3,2025-05-21T16:15:29.900000 CVE-2022-41571,0,0,826b4bca65124a8cbcf9a47c0d862fc6e8229576f255a492eb3b18b7d6c166c0,2025-05-21T19:16:05.903000 -CVE-2022-41572,0,1,96e743ab385e1dc71ffc276660606cc749260f6514d96dc981ed76ee49ed3e1e,2025-06-13T15:10:08.940000 +CVE-2022-41572,0,0,96e743ab385e1dc71ffc276660606cc749260f6514d96dc981ed76ee49ed3e1e,2025-06-13T15:10:08.940000 CVE-2022-41573,0,0,bab3410501c8850e950c5a66d689d391095aee77d84a2c3c751b6585883d88b4,2025-01-08T15:15:09.840000 CVE-2022-41574,0,0,21e917fa5154deb6e3b8d21ad116ef9dde7c875c812d3df1ee5d78c46dfa6a1a,2024-11-21T07:23:25.140000 CVE-2022-41575,0,0,2300a68e6adfd2ed7ec91333ec432fa68fd5538ac42a7abc4001c973c5b81b6e,2025-05-07T15:15:55.533000 @@ -210511,7 +210511,7 @@ CVE-2022-45060,0,0,dc748f9dfe0f8348e46270757f3de5f8e4911c7851a993cc419c45d9ad831 CVE-2022-45061,0,0,5339cd564b3b73d35ca78b0983fd8ae2780ee0bad2ac35648ae423f2f6179d67,2025-05-01T15:15:58.423000 CVE-2022-45062,0,0,0b9bb058574c413c4bdaf89e2db4ad5f58640e2d9087ac12c096a712faf150be,2025-05-01T15:15:58.727000 CVE-2022-45063,0,0,227c0b7e4ed15ea588a44eabdc089ffcfa8486ddcf2bf6779ec61efcfe7c0a17,2024-11-21T07:28:42.460000 -CVE-2022-45064,0,0,ec7d8f6bc3ceebdf973590f414c5e225e2ba2da5e5408a1bfdee0324dd1d56ad,2025-05-23T16:44:02.653000 +CVE-2022-45064,0,1,2570c4987879b77379ba3ebff986cedfeb04676465652cd00cd446fcf732e1f2,2025-06-13T17:55:57.933000 CVE-2022-45065,0,0,2edab8ec30c288436d9e22b9716b26e5c37fdf6edc1164c7c0a372f8197b998e,2024-11-21T07:28:42.777000 CVE-2022-45066,0,0,3a5f15f57f42eda080a2888a3f7880f3abe7246bc0dc95b2834d7bf959e29f84,2024-11-21T07:28:42.903000 CVE-2022-45067,0,0,e2895a1f219722bd7d8e458690731d98f48a0b0e12c7af783d3995b745f09884,2024-11-21T07:28:43.030000 @@ -214224,7 +214224,7 @@ CVE-2022-49756,0,0,28920c36f39ed7319bcb4d4236e8245608208e3f90c3360954d712de1c536 CVE-2022-49757,0,0,f8d513bb3408f94b37dd44d9f1e8f5e5feb62b8907acb8142b1365c9258f9ce5,2025-04-15T14:51:20.980000 CVE-2022-49758,0,0,13ab6803b3172e199b2b62b8f0fd070e3b7f408e7b5f310b0914ea640333e00f,2025-04-15T14:51:37.410000 CVE-2022-49759,0,0,16c0668f206f3a39bb8bc5a0a0a170615639fe2527f287f643903901252e5edc,2025-04-15T14:51:51.090000 -CVE-2022-4976,0,0,8f4dd00e6df8090b2fc757e17bf900e567dbbf06f5fb88fd61120f6590f3f5f2,2025-06-12T16:06:20.180000 +CVE-2022-4976,0,1,ccd19f2e7e8d5dd2f4b90502c3fefddfe2c6d0901ccc7f52ead04ba2b1a39f49,2025-06-13T16:15:23.827000 CVE-2022-49760,0,0,174c6ebf6ffdba46560ee57082a10e2bd736443de432b3c57d79e8c3a863f4d9,2025-03-28T18:11:49.747000 CVE-2022-49761,0,0,182b2acd2b419d0dc6631691801e74dd45ce3a727bffa39bafb3990c4066bd75,2025-04-01T15:40:43.063000 CVE-2022-49762,0,0,ccaf97e765af5278ad3af6c562d2944eabb4eac5592b6d3bbb9bf7ef819843d2,2025-05-02T13:53:20.943000 @@ -214617,7 +214617,7 @@ CVE-2023-0219,0,0,8cfe7a4a0277cef2601ec8e0ed6bd1bb04e8ad1292de441a9cbad0289b6373 CVE-2023-0220,0,0,784a0224a0dd3c111a203c3d8539476a45ff326eed743db1a47ea1b1c86739db,2025-03-21T17:15:37.220000 CVE-2023-0221,0,0,552fdbf9cca2c0cc2192330242786d81d481672178c2df7f8d811d4075e7deb6,2024-11-21T07:36:46.403000 CVE-2023-0223,0,0,f970018ad447d52f5c4c73db31e1dc382548828a36a7df9a5f4ce6851743b9e5,2024-11-21T07:36:46.520000 -CVE-2023-0224,0,0,3bae8323d50ead6a758de985f14ad7ccb408e4655e031f23a9a22291bd0e9c0a,2024-11-21T07:36:46.640000 +CVE-2023-0224,0,1,706ccaea4684acfdac08f142e8c987cbf8f8f488f5fed6e59000591f9cb9235e,2025-06-13T16:15:24.050000 CVE-2023-0225,0,0,a72a7e366297972e0cd4722812cadd80547d328081f7452d3dbadbbc7857ca6c,2025-02-18T16:15:14.343000 CVE-2023-0227,0,0,98a0f994aabc24f9a79e73d465c96d5502c3570a3ffff65f257adc1edbd461f5,2024-11-21T07:36:46.873000 CVE-2023-0228,0,0,9e2493b74d39b6f51d9410a3ab073ec81fa70112a7384534844033d57893c83b,2024-11-21T07:36:46.990000 @@ -241242,7 +241242,7 @@ CVE-2023-52070,0,0,250134024d350dfc154d8e35b8085d7897bef84e646a77739f4c15d2bc8cf CVE-2023-52071,0,0,812221a84c238215dcedea186e9ad0947ed6c219cfb74718c68ca339bd585423,2024-02-23T09:15:21.867000 CVE-2023-52072,0,0,da47f0f32ccc3973848e15cd0c301535b950c574a4913e948e1c17e24c6846fa,2025-04-17T19:15:58.003000 CVE-2023-52073,0,0,bf3a80a7f116b0237280e58fd1d5955464cfab36093fd51e83f88ec763351be4,2025-06-03T15:15:49.393000 -CVE-2023-52074,0,0,8c8a30c4bc95b4cc098140e899189032dc53c8e311db85ed0acff923c7d4273b,2024-11-21T08:39:06.930000 +CVE-2023-52074,0,1,2533ddfc13ec8b7da99f125cdeac3d104b6877754542c5240b3df32dd90b8fae,2025-06-13T16:15:24.240000 CVE-2023-52075,0,0,6cb7b154b23a7ded2e6e2ff32f253a0202b2ab2ab046e1434391aa5436f4d8b1,2024-11-21T08:39:07.077000 CVE-2023-52076,0,0,16004d644550cb5d8dcf358a683e5a43d21402d3ab67056829ed5a1140278995,2024-11-21T08:39:07.200000 CVE-2023-52077,0,0,b9d80ba6bb5a119e482597ca36557a484350da39ccb0a2ec375015a35d15ec85,2024-11-21T08:39:07.370000 @@ -241281,7 +241281,7 @@ CVE-2023-52111,0,0,3b67e0acb2e95e29d9f067ae353c8f5a778d5ab622495d9880a0f43ed407b CVE-2023-52112,0,0,227e27d86a9c9316298e239eaf0139dd29a24be0b462b0e617bcb2267b094bb7,2024-11-21T08:39:12.083000 CVE-2023-52113,0,0,7d151873e19965534c24c0943f302b295268a104ac6379b8250facc484d8dbec,2024-11-21T08:39:12.203000 CVE-2023-52114,0,0,696b244783e9216372eb73b5cbabebc1983ae7dc8c3c4df795efa89e0c296042,2024-11-21T08:39:12.333000 -CVE-2023-52115,0,0,7a8c5d1a373e69410d6f5e41b93c760a5859a3f6bbdd585cccb0a84d50aee8f9,2024-11-21T08:39:12.530000 +CVE-2023-52115,0,1,e32a337dad686a379adc55bae32f3ee4479b23cf12c62a0432df3b49bcff3575,2025-06-13T16:15:24.457000 CVE-2023-52116,0,0,1a222d4dfbd11bc07b85f8505e8b3a14bfb073a6d6fca2fff1ce0b06bb2b19e1,2025-06-02T16:15:25.853000 CVE-2023-52117,0,0,5a1db97fcb60fa12b005bd5a93a0a6523faf86d1211f03c97f9be4dd238556ca,2024-11-21T08:39:12.767000 CVE-2023-52118,0,0,87e36a21e66c915009801742d49f910407d76de310f823220cd6ba7586dd1812,2024-11-21T08:39:12.907000 @@ -251300,7 +251300,7 @@ CVE-2024-2173,0,0,c84705e6544c7810b2dd24a487d4a093d605aa797e9da01d225283aed5e17c CVE-2024-21730,0,0,3fb54c28ca30ec2bd40b6d6fb2091cbe68d186fd51891abb72beb75eef450a5a,2025-03-19T17:15:39.783000 CVE-2024-21731,0,0,5498da9c2571dd8675b69a41552ec2344ce7a7dd99f451ca8cb3acc427b2e6ef,2025-03-13T15:15:41.053000 CVE-2024-21732,0,0,24137ad844492856b4c0e788ad2796debe96d3c45db9a67efcbc8ecc63e4982f,2025-06-03T15:15:56.083000 -CVE-2024-21733,0,0,b4e277d651a67cc40677cb23dcfabd83b71c95e7ccb1c0ef3df3cb43157c87cc,2025-02-13T18:16:43.363000 +CVE-2024-21733,0,1,70fee4b87268fdffd4777d8f57b33368227512c410f15158c609d571a9b964ee,2025-06-13T16:15:24.760000 CVE-2024-21734,0,0,05a714dc545e8464bb57c1634923299c8c0fea8fc589e5ef7cd7d6f5a6804036,2024-11-21T08:54:54.110000 CVE-2024-21735,0,0,48d2102a1a8b1e565f1eca95901e1f59c8f6f1a12fe9aee88f5bbf6e5aa085f5,2024-11-21T08:54:54.260000 CVE-2024-21736,0,0,2b962fff62a73e04211530a72bb3c53715e2d90806d56ac2accd55133794f464,2024-11-21T08:54:54.400000 @@ -252145,7 +252145,7 @@ CVE-2024-22889,0,0,bc789a72f7d1e24bd814b0b6d2146517cc600e2afe43b498499dda222266b CVE-2024-2289,0,0,35dfd6fd1bbaaacb962aec793685e482a5818b6aa405dc4199bbd540825768c0,2025-04-15T15:45:34.800000 CVE-2024-22891,0,0,a60262184c3c29b0e0c7f3fe22f6adcbb2816519fa464ccdba3d14fcd28d24d4,2025-05-13T14:35:36.937000 CVE-2024-22892,0,0,ab4685bd3e54af7b091a985b4e2bd0ce232ea37ad229896d47c941f92093c96e,2025-03-14T16:15:29.140000 -CVE-2024-22893,0,1,ac777c12867094b25caf3bf4db380ed2caa566135f6f4a056077e3eff696f71a,2025-06-13T15:03:18.493000 +CVE-2024-22893,0,0,ac777c12867094b25caf3bf4db380ed2caa566135f6f4a056077e3eff696f71a,2025-06-13T15:03:18.493000 CVE-2024-22894,0,0,42f5b44dcbf5f726764f56c5b153b80c427e59c7fdf8f4595198f383354dc3bc,2024-11-21T08:56:45.447000 CVE-2024-22895,0,0,b8c14c65b8853d2c945aa08790c67740a5056848181492d7c8902cda3d48dd78,2025-06-05T16:15:26.750000 CVE-2024-22899,0,0,e0b1270af06adae37849d6178e4aceee74c98c48605efe5906b7249773cb3736,2025-06-04T21:15:37.730000 @@ -258797,7 +258797,7 @@ CVE-2024-31497,0,0,f8413273b090c2c99439b9ea2d6bf31cf1271980399575d533158182cac51 CVE-2024-31498,0,0,b2e6276a70232623190c44e8fb464ed6a164bd12de239edf2266e9b650ae46d0,2024-11-21T09:13:39.247000 CVE-2024-3150,0,0,75d0be56062bf1a530210c178aada19a6cec46e37ca674016ee68e74c48916e5,2024-11-21T09:29:00.520000 CVE-2024-31502,0,0,e1a3371156b5bfc652018b1d8fcd99dd9bbdd2be7fa3fdac29255561faa54a60,2024-11-21T09:13:39.480000 -CVE-2024-31503,0,0,518cd08ef865de234cd65cfcb97b45b19d6b39872e738ecf53628254de118758,2024-11-21T09:13:39.700000 +CVE-2024-31503,0,1,530411a449c8426e81e299f531fc066bec6672190a1939b892141fcba7227e4a,2025-06-13T16:22:08.547000 CVE-2024-31504,0,0,e609fdd3d56331d45ea8d49c7af4d1de4b29d053dc7ca378918a58ec72a1ae55,2024-11-21T09:13:39.917000 CVE-2024-31506,0,0,616284889025843c021b0726709d0c2938adbe743bbeef4b239aedaa6c11d52a,2025-03-20T19:15:29.227000 CVE-2024-31507,0,0,09533bcdb609fea2f5a5fb10fa1fa7fffce9c3a62004ff2e439e8975ef660f06,2025-04-18T18:35:31.437000 @@ -259339,9 +259339,9 @@ CVE-2024-32394,0,0,fcd63d75d4da407251404a1d2d08afc172eff51aa3e4e8bae9c2e181b13c6 CVE-2024-32399,0,0,451fd8b2233e189ac161bb1115242ec61a34c2ccc4b6f8530cbfaeecf7c2697b,2024-11-21T09:14:52.160000 CVE-2024-3240,0,0,971173d54c1994d6b1cfc2e3e8433d0c58e5901156fde410070d2514a513396a,2024-11-21T09:29:13.397000 CVE-2024-32404,0,0,74a4e470851f7065c54824eefb65f28406cfe534ec539cba27c7d9ad4f1d2283,2024-11-21T09:14:52.383000 -CVE-2024-32405,0,0,d6cebee4f160fbfebcd1643d9266858f67b5ac275a62bd0c0eb14ec6bc477ccb,2024-11-21T09:14:52.610000 +CVE-2024-32405,0,1,03b8b3b387fd90d2d3e2e81b9e088d252ad26d5ebcb2d54e41548bc8a9a694ff,2025-06-13T16:10:19.593000 CVE-2024-32406,0,0,adc8cb262025358dc4dfe8f438d40cf02ab2906d5eddacd2f331ca567828e67d,2024-11-21T09:14:52.837000 -CVE-2024-32407,0,0,0df07e739a8ca11adc8e64033efd14a2769f0d1340e998db62e6a377858daa19,2024-11-21T09:14:53.060000 +CVE-2024-32407,0,1,69b4d3bff3264ca20ca024b87ba188215e92e6004de70e7b110ab1314abf0286,2025-06-13T16:11:59.863000 CVE-2024-32409,0,0,bf9e59848caae45d0cc6872d258056c0c656eeada01f508a560f9f71f7f2c3bf,2025-04-04T13:23:40.187000 CVE-2024-3241,0,0,99a869aa2cdccb45dc97a20b04d1a56e494390a52ac89cc6fa2586d94a876e7a,2025-05-14T16:47:45.590000 CVE-2024-32418,0,0,3b612e1d20e5e03e948db07ab7f08df1357d8d8d34f36f6a6b36d36afa39f251,2025-04-30T16:47:33.967000 @@ -260516,8 +260516,8 @@ CVE-2024-33896,0,0,5c27b6760d023c29860f84077aa2b8fbe358a20c4089f16c9bf1299102adb CVE-2024-33897,0,0,27ebeedb6fb85da132797c9baf2303375ff3cca126efacc3a0f2865cde364aba,2024-11-21T09:17:41.393000 CVE-2024-33898,0,0,7e7b7517b9d975bf9ea39eb343f947bde4dad6c5d7ccb5595643c97b9f74c000,2025-02-06T22:15:37.507000 CVE-2024-33899,0,0,b3980927db4f974fd1906c7202adc3e1699df19d4c56878bd1f82fe30f8bed35,2024-11-21T09:17:41.793000 -CVE-2024-33900,0,0,abfad61d7293c0773d365c121adb2bb9f1f891725591b07fde4167bf5da41918,2024-11-21T09:17:42.003000 -CVE-2024-33901,0,0,912d048de34a068ceaffe86e576e80e402b91e11759b7e8340515582d90cc739,2024-11-21T09:17:42.220000 +CVE-2024-33900,0,1,cc7636c398693a35f05f830cd893543244a276686af48247c63a7847025a9b48,2025-06-13T16:16:24.497000 +CVE-2024-33901,0,1,a7676477cee317ce9b073c5b4c29aa0697ab444b822b02de4cda733693068639,2025-06-13T16:13:44.500000 CVE-2024-33903,0,0,d8b08cea7eff76191e72dc5c11afa7582b0eada85d3ac185fdd43eaa6843dd60,2024-11-21T09:17:42.427000 CVE-2024-33904,0,0,c7e4cd7a2ae08716b76b395008e60a2a6bc57551c6c48eaaf3388d6fa710d56e,2024-11-21T09:17:42.640000 CVE-2024-33905,0,0,a3999c3e7c9fbdd628c02c84460ca35429739070f9c5928b18a5254c26d822d0,2024-11-21T09:17:42.843000 @@ -262660,7 +262660,7 @@ CVE-2024-36517,0,0,25520f7bbfeaaa0d674db75f5ceb0dc55bd7766c7f78310f1683242faeb8d CVE-2024-36518,0,0,b008988df19e903bad3b0bc86f6b8c800a5baaacddd161bf228ff0ddf48948e3,2024-11-21T23:06:35.190000 CVE-2024-3652,0,0,f3d59df85a77fa4be0249e01ff821e4b507f89580101327f0c903d244ca366dd,2024-11-21T09:30:05.313000 CVE-2024-36522,0,0,9b80d6d8ad834b2ad12a9c002e135616fd5e236e3616bd648663cccfef77bea3,2024-11-21T09:22:19.577000 -CVE-2024-36523,0,1,f7b7bcbc5434b21680c168d843b914d0511d30ee8cbb896becb72f25cb745615,2025-06-13T14:46:07.467000 +CVE-2024-36523,0,0,f7b7bcbc5434b21680c168d843b914d0511d30ee8cbb896becb72f25cb745615,2025-06-13T14:46:07.467000 CVE-2024-36526,0,0,7eb130a5f3d73c89b7f5cd8217a059ab207fdeab2df485fcb069aa0328d07168,2024-11-21T09:22:19.993000 CVE-2024-36527,0,0,2fe968f9db97e47864d546cb83cbb537d4cf1bd288baee48e4ffbf302a88ab2b,2024-11-21T09:22:20.213000 CVE-2024-36528,0,0,7d2ac3f933b7d4ae4e0c8f5c2d73d6177e5b580ae5639fefe1188c34354b0dde,2025-06-10T18:31:33.757000 @@ -263590,12 +263590,12 @@ CVE-2024-37661,0,0,ee08e04759841bbf9e002e732331f80dee9de5ef526cd60e9627ae7db039d CVE-2024-37662,0,0,9fb609c29e351aae318bf190d1652757771b4257bef2c46e7c384208ed859872,2025-06-06T17:09:55.507000 CVE-2024-37663,0,0,0350e1df46b9c03476a6921b27b5739d2a9a16e3abb310ac2c48fd9f451c04a6,2024-11-22T16:15:24.273000 CVE-2024-37664,0,0,e6af7d2e65909320ac2e066c551b6342cf322fc988e4e028dd24fa51ad921593,2024-11-22T16:15:24.463000 -CVE-2024-37665,0,1,2cad5de31fe3539f14a7a59779bc1c1b41d67d74fef14da4545d1089f67dab75,2025-06-13T14:49:18.100000 +CVE-2024-37665,0,0,2cad5de31fe3539f14a7a59779bc1c1b41d67d74fef14da4545d1089f67dab75,2025-06-13T14:49:18.100000 CVE-2024-3767,0,0,b4ea3f0e16993e9f310cfbde1e62879723209ff6ca6fab1f3423f8b6c9db7f57,2025-05-30T12:15:19.907000 CVE-2024-37671,0,0,63a7bb054b9783dd1c7933bd57d4a8f7e2cfd8dd008993792ee8177e6854a803,2025-03-14T16:15:32.600000 CVE-2024-37672,0,0,e44dfa3a5448c7ddc8be3e7358264cb6292a7fdffc27b2a73e33c9a81cd357fa,2024-11-21T09:24:12.893000 CVE-2024-37673,0,0,4948f447146a2f01fa61fd5402a993016f9583881e815929a457af264ecd9e35,2024-11-21T09:24:13.130000 -CVE-2024-37674,0,1,7f9a9b623444e71e66f7ed4ea494cb947ca04eeb0ae2bc068889dca4f2215949,2025-06-13T14:33:53.170000 +CVE-2024-37674,0,0,7f9a9b623444e71e66f7ed4ea494cb947ca04eeb0ae2bc068889dca4f2215949,2025-06-13T14:33:53.170000 CVE-2024-37675,0,0,cd47fb3488bba19fc49d7577cb541036bb9ed9f63f77e17cc9553db9023f3802,2025-03-18T15:15:51.737000 CVE-2024-37676,0,0,415ada6299f7cd143b15bc431799ef76592986b2443e085c31e97cb8bf3da618,2024-11-21T09:24:13.720000 CVE-2024-37677,0,0,914b27f644b99c23fa73430b334c2012f02e568866d02ad51d6528274c4668e8,2024-11-21T09:24:13.930000 @@ -263619,7 +263619,7 @@ CVE-2024-37741,0,0,cdea71c096b6020452f86c61c722c71d411c4901d61352f541581e27bedfb CVE-2024-37742,0,0,7c57418640c4a372993ae3363ea2c4e93948b308f1c699d6cb68e3e245b5578a,2024-11-21T09:24:16.373000 CVE-2024-3775,0,0,527f7d608f8da6f09f241b673d5077f6d9275917117f8ac6d0ce1a26efac2c10,2025-04-08T16:30:51.500000 CVE-2024-37758,0,0,6aad1ab20925aeaf835ed115698dffcd6067c2af6f08e49e2fb33789c105b9ec,2024-12-20T20:15:22.937000 -CVE-2024-37759,0,1,606805366b9f9646e3d660f6895299941a599eeb90c9b36368cb920769a669bf,2025-06-13T15:00:19.157000 +CVE-2024-37759,0,0,606805366b9f9646e3d660f6895299941a599eeb90c9b36368cb920769a669bf,2025-06-13T15:00:19.157000 CVE-2024-3776,0,0,f1875e31c2fb41ed87b0999dab19da3668683a670607040ff349bb93a48f4c45,2025-04-08T16:31:04.280000 CVE-2024-37762,0,0,e5f736f5834235475cd2df0b4cffb0c488f0e2566543dfa263c43f8239901743,2025-04-30T16:37:36.887000 CVE-2024-37763,0,0,7f19c01bae82333f6ad4461e377e4924b7a38f62f73deecf0f18a1d6b2fd4dd4,2025-04-30T16:38:05.183000 @@ -263654,7 +263654,7 @@ CVE-2024-37816,0,0,0255491dd0ac61fe8f883862d2c202814fc8f53a759901f88a06c7013f466 CVE-2024-37818,0,0,adc0803b390ef119b7312d5c108656cbe1c41da7e77dc9f33c1c6c84e04bc7b6,2024-11-21T09:24:20.427000 CVE-2024-3782,0,0,4b02780447541e30d62b65dc88b0dcbe597ba7d13fa25dfd48bc608a09152829,2025-04-10T19:54:59.537000 CVE-2024-37820,0,0,cd852e1dadcb7edc135763a1f4f8f423dcb6c177e797c3b00dca3df88e5d65fd,2024-11-21T19:15:09.450000 -CVE-2024-37821,0,0,1453a655cd572a4a0dd83a571605e37d7e86ccc97e2d883b331db535ee79a9ea,2024-11-21T09:24:20.780000 +CVE-2024-37821,0,1,b539d00cf834395efef42d3baa76a5a606359b4bbefd2096c9686e7daf11886b,2025-06-13T16:17:59.667000 CVE-2024-37825,0,0,9415ecb729c8ea23547630f5e9156dca92043a10d0acfd9c137211bd64cfbf2f,2024-11-21T09:24:21.010000 CVE-2024-37826,0,0,f9a8ace64d558700333ee9b1f1cf1267d32914e88f1ead58ed9ae128c89a10d7,2025-06-06T20:33:52.350000 CVE-2024-37828,0,0,766adf4d444cb8eb6560cf67ecd774e30c8a3685f9d4dfd3f03a2ce063007731,2024-11-21T09:24:21.423000 @@ -264632,9 +264632,9 @@ CVE-2024-3882,0,0,ff357033633ea83089941ee72ffb1ed520c8dd6a221dd7e52cb47b408a9921 CVE-2024-38820,0,0,517fdb1091af57612900b39a11b0b83e3890144a7a4d4cb71cfb71c69b405fa9,2024-11-29T12:15:07.007000 CVE-2024-38821,0,0,74b8175803172fc63d22dc332a41fdd98b88e2c1ead7e686074b3e1c775d2446,2025-01-24T20:15:32.427000 CVE-2024-38822,0,0,1de129502c834593a380596e49c11c4c982d91761db595315325ff60e1f44ece,2025-06-13T07:15:19.300000 -CVE-2024-38823,0,1,fb82bf33848268556a877cd19f1a813d141fbec7693a2d4e6c81edd7cf64449f,2025-06-13T14:15:18.823000 +CVE-2024-38823,0,0,fb82bf33848268556a877cd19f1a813d141fbec7693a2d4e6c81edd7cf64449f,2025-06-13T14:15:18.823000 CVE-2024-38824,0,0,54e57dcf925789c6c00c49d9811baccd3488b72aef696e2d154306781f58b0a3,2025-06-13T08:15:18.800000 -CVE-2024-38825,0,1,53e71332e9b4cba350a68ba9e2de46504d460d834fc9582f4da2d50364c7e4a4,2025-06-13T14:15:18.983000 +CVE-2024-38825,0,0,53e71332e9b4cba350a68ba9e2de46504d460d834fc9582f4da2d50364c7e4a4,2025-06-13T14:15:18.983000 CVE-2024-38826,0,0,506930d335a5efb8c27d5014fa191907479a7be8d8701e39690034739d2c8ebb,2025-03-17T22:15:12.667000 CVE-2024-38827,0,0,2e81585c986691122bd5b137a7a8366ca83e5bd591adaec79ae968dfb0819731,2025-01-24T20:15:32.553000 CVE-2024-38828,0,0,30ca64d92e91bdd0f728034345a0be072d18df3b4628bfb9f9d8fb65850f39eb,2025-05-09T20:15:38.413000 @@ -264814,7 +264814,7 @@ CVE-2024-39165,0,0,301bacb9ee4b80bd8b1672f3716e4ccfa691474967bfc0399bcf2a55b330c CVE-2024-3917,0,0,0dcebc99ec7e3d7429f10d31b7200aeec59137894857a495f5e98ebf8939c2ff,2025-05-21T19:04:11.037000 CVE-2024-39171,0,0,e487ca51b57de27bab9c91c5e2e674078d69d78bdd6189118036255c96252b16,2024-11-21T09:27:16.373000 CVE-2024-39173,0,0,3883906d32a0fb43dd48f587f37a33510baedaa91c6c21f392cdc16e74d96d88,2024-11-21T09:27:16.597000 -CVE-2024-39174,0,1,b8c707eead574966035941b20eecff50ee4e5344b26f5e09adf439ff3bbb45f6,2025-06-13T14:40:01.927000 +CVE-2024-39174,0,0,b8c707eead574966035941b20eecff50ee4e5344b26f5e09adf439ff3bbb45f6,2025-06-13T14:40:01.927000 CVE-2024-39178,0,0,e3f056e4d2ff7c9e96d849ffa2d88c9c7d209f2223fd8b6f0b13c0297346769c,2024-11-21T09:27:17.017000 CVE-2024-3918,0,0,5e88c6bb6c1d350e2e9569b1e46a8f5310347d6785e5496a32d31d232a5a3c35,2025-05-21T19:04:32.700000 CVE-2024-39181,0,0,5a637c334e0bde0f3e3c7aa2076e0f80b7362cc211716f1c4adfc099b7fcdb9f,2024-11-21T09:27:17.240000 @@ -273690,7 +273690,7 @@ CVE-2024-50841,0,0,0c9f5d96c311feed151f0159836ea6d99ded7827df5ad4d8897d729392dc7 CVE-2024-50842,0,0,4c735253ec1e8b86c3e85fb3a1ca258bea07d4915643f46399467486251fb604,2025-05-06T13:41:46.400000 CVE-2024-50843,0,0,6acc80c8b4614d2e59af8695a22de1b6450b94cce946869e20e2f46f841378a3,2025-03-27T17:49:33.550000 CVE-2024-50848,0,0,029be70c6f0581fb2d1c733e95adef6b4abf98e8e75f3950fb323857590bcd24,2024-11-19T21:57:32.967000 -CVE-2024-50849,0,0,e67c5a6149d8b159c78ff28b73b71340785928f655a17cf30920dcd256664bf0,2024-11-21T21:15:22.790000 +CVE-2024-50849,0,1,ca7669f43ec1bf5eeadbe4cc0e539fdbaf2d57b49b4d33da7ca7d4551d25db3e,2025-06-13T16:06:03.393000 CVE-2024-5085,0,0,6d4282fe0a1ba0f862798def59da3a37fcde959484995ab67584cb690f171172,2025-03-01T02:39:18.967000 CVE-2024-50852,0,0,a554aacf991646da5b2721516004d1f4d3015c73785e9e42d26b1a8b27fd0d85,2024-11-21T17:15:21.473000 CVE-2024-50853,0,0,a2c16db2d9a48c6744a7c1a41fb13ec1d9457efe837db0d74474da40cef9ea9d,2024-11-21T17:15:21.783000 @@ -274986,10 +274986,10 @@ CVE-2024-5276,0,0,5f4d0d1d8da4f71778d386f61f8318d411a2daa5050a355330b05dfbb58c55 CVE-2024-52762,0,0,0ba93538cdcceffbc2ce711add8a68aa6535f792ec7a07bfa4c816b008d21953,2024-11-29T21:00:39.843000 CVE-2024-52763,0,0,bf728b5a47dd0413d8210dc0bce8f5be7122657bdb084f64d14e2b08f6408d30,2024-11-29T21:00:47.937000 CVE-2024-52765,0,0,476b03c829577e5243ce6135d79398720058b5846d4e6fe9a1bdd7ebaa31e9c4,2025-03-13T14:15:33.100000 -CVE-2024-52769,0,1,d45d0df361ea72f170b51634b5ca68bdbfbd03621f0db2bd7c3faf01657c457d,2025-06-13T14:14:39.027000 +CVE-2024-52769,0,0,d45d0df361ea72f170b51634b5ca68bdbfbd03621f0db2bd7c3faf01657c457d,2025-06-13T14:14:39.027000 CVE-2024-5277,0,0,03acecca3b8a13f8db6e023f3de98c1d934c950fd9eaf83bed7426af357ffac9,2024-11-21T09:47:20.217000 -CVE-2024-52770,0,1,49f50f28d95c2fddf385afcd98377de2d99c4a4d67e6d2d2550353d8e2826762,2025-06-13T14:17:59.650000 -CVE-2024-52771,0,1,2d525cd95be1799d8a0b84a7f1c1c522c66416841adc7dad735a52afb8223cd2,2025-06-13T14:23:57.197000 +CVE-2024-52770,0,0,49f50f28d95c2fddf385afcd98377de2d99c4a4d67e6d2d2550353d8e2826762,2025-06-13T14:17:59.650000 +CVE-2024-52771,0,0,2d525cd95be1799d8a0b84a7f1c1c522c66416841adc7dad735a52afb8223cd2,2025-06-13T14:23:57.197000 CVE-2024-52777,0,0,f5e5264bb68ac8b5d172e0cc8c7fdb06682839b5e8788bcfc83ecc35b406d4fc,2024-11-29T18:15:10.153000 CVE-2024-52778,0,0,5392ea6a109b7d3fc54a9ea4204adcb9b5d7fe60eec97cc74680b55f7e49c5b0,2024-11-29T18:15:10.380000 CVE-2024-52779,0,0,f6c9c20937b78925a2b0164de08d61e7bfbb2d9ee416738f50eb7d042cf69967,2024-11-29T18:15:10.597000 @@ -275541,7 +275541,7 @@ CVE-2024-53408,0,0,1aab9be4aaf2573b8ac1b0fb3d37a28e2e7437d63a980cdaed7de900ff395 CVE-2024-5341,0,0,65ff8689965c5e29ef124f69d82afd0c059edc6db5694aac65d8224f8b995833,2025-01-29T18:09:48.960000 CVE-2024-5342,0,0,c19ccffd3ff364daed28ff3ce4f3e63c62c97b909f79a312d9891c60f97a9cce,2024-11-21T09:47:27.517000 CVE-2024-53423,0,0,ed5e6f4c3c0fed5d53906280cf00f9afdb869719488d1d9f4f5f554e2cdae7ad,2025-06-03T15:36:02.130000 -CVE-2024-53425,0,1,fcd149d99e9f74ac38439947fe93ee54860a005dec0bf8524e3cb3476f6ecb46,2025-06-13T14:27:14.820000 +CVE-2024-53425,0,0,fcd149d99e9f74ac38439947fe93ee54860a005dec0bf8524e3cb3476f6ecb46,2025-06-13T14:27:14.820000 CVE-2024-53426,0,0,9339130e86a75243ea176c2c1911663d0047bd370b4ea0fccb09719eca2c3ad9,2024-11-26T18:15:20.330000 CVE-2024-53427,0,0,7046890ce65dccc1bf63a6a08e048f989a61810260a23dacfa371c3a036c1add,2025-03-28T17:15:27.420000 CVE-2024-53429,0,0,eaa70acb2843e8489abf02d5796dd8a314b9b85961845be919325cda159f0f76,2024-12-03T16:15:23.833000 @@ -277974,7 +277974,7 @@ CVE-2024-5745,0,0,7e65c88ad788c6b0931bb1e2e7e3abdcf09fad20076d859b2aa0fb4c2f137d CVE-2024-57450,0,0,dca4876f05e9c619adb9a59b22dcaaa94ab25788656ded13536c3752d289859d,2025-05-13T19:40:51.173000 CVE-2024-57451,0,0,e8712741c53f94e08c6064dcde30faf3287d36a6d399ce65670c03a0937d1b99,2025-05-13T19:31:39.313000 CVE-2024-57452,0,0,8a20887d1f3d68429026240827826abb328116cf3af896137c2c5ffa4395c131,2025-05-13T19:39:27.263000 -CVE-2024-57459,0,0,b2d0b28ca53dea35095ae17a417e682f9dcdd070f3ee5d2392715184f1fabf37,2025-06-02T17:32:17.397000 +CVE-2024-57459,0,1,83a0beca9ccaee818da0c53fb032353e9417f68cab17d549f39adbc95b2a0b52,2025-06-13T16:29:02.383000 CVE-2024-5746,0,0,983f92b35d2851c40a6d833edd298ce544be182f3cbb073e4d5723a172283607,2024-11-21T09:48:16.580000 CVE-2024-5747,0,0,b0a73052a2b0fb8e91ca0186eb03a0a139ee155bf24624c988c4f85a0b80da72,2025-02-11T02:15:35.543000 CVE-2024-57471,0,0,6c28f55d6ac6c23c45f2d45459061e089bd18c0bc4656c9d1b783fab10287cf0,2025-05-27T17:00:54.740000 @@ -278001,7 +278001,7 @@ CVE-2024-5752,0,0,4279b49c1e8f69df93439002f6af091c9949f569d62ed33209701a1ff6b32e CVE-2024-57520,0,0,b3f90fb26fb200b53ae4777fd3baed004f17dd559e6923e11bec593e0ff8203b,2025-02-06T16:15:40.833000 CVE-2024-57522,0,0,18e711bef02ec93aea7b480aff73784056d9c41ed01c1af04200010cd11c145d,2025-04-22T20:08:29.483000 CVE-2024-57523,0,0,9fd5b8b30d9788fd284244369559ac2fca5a537a05cecae34a4e95bce1786a29,2025-04-22T20:06:16.133000 -CVE-2024-57529,0,1,417415f3c07912ce2a364a344cee3ae7a31a06936b98edbe69a008646d827c28,2025-06-13T15:38:57.627000 +CVE-2024-57529,0,0,417415f3c07912ce2a364a344cee3ae7a31a06936b98edbe69a008646d827c28,2025-06-13T15:38:57.627000 CVE-2024-5753,0,0,35e5857965ec4fb8ff4da87da0ad57743fc77f757356d105b68f8e07a9b9291a,2024-11-21T09:48:16.923000 CVE-2024-57536,0,0,691bbe45b6c8dec1b3fb6ba4e32723d879ed3feb0eb9208588f95b190d231a22,2025-04-22T14:11:56.087000 CVE-2024-57537,0,0,2907e2eda64c6ec8a608ebd4f389b1d60cc8d7e07d9c5be63960d897e0e4a121,2025-04-22T14:11:50.577000 @@ -285595,12 +285595,12 @@ CVE-2025-22231,0,0,bd2ff59ef079880253edeca06616e1c3a205871c44a51a92d95e60e549741 CVE-2025-22232,0,0,bee762df9dfabd3d4c6c12e64136a19453238ca07b81d2e49eee527157bf661b,2025-04-11T15:39:52.920000 CVE-2025-22233,0,0,50310437fe70f8c52d32549c7a5d723959e232fe0d070a21f27a0de47dd17286,2025-05-19T13:35:20.460000 CVE-2025-22235,0,0,9096c227dda3418e3d7b103b041dc8b2cd855202b867daccc1ae1ca882f5e87f,2025-05-16T23:15:19.600000 -CVE-2025-22236,0,1,dbb7d3a02e1c6d6d2f684cbfdbbcb2430ac0f7e9d9f41812cc45c086eb186b9e,2025-06-13T14:15:19.323000 -CVE-2025-22237,0,1,db6f32966bfc17ee0f11f666363e02f870457734ae40bcd1b44e6cb1a9576688,2025-06-13T14:15:19.467000 -CVE-2025-22238,0,1,828c364242003eaf354a1faf07d2a48308c32d665a7d2f838c4c88b3a40f83fb,2025-06-13T14:15:19.610000 -CVE-2025-22239,0,1,b8e3232987f5bdeb114a6f1bb3eac05b37d07f2823e39c700952228ab1ff5e2b,2025-06-13T14:15:19.747000 +CVE-2025-22236,0,0,dbb7d3a02e1c6d6d2f684cbfdbbcb2430ac0f7e9d9f41812cc45c086eb186b9e,2025-06-13T14:15:19.323000 +CVE-2025-22237,0,0,db6f32966bfc17ee0f11f666363e02f870457734ae40bcd1b44e6cb1a9576688,2025-06-13T14:15:19.467000 +CVE-2025-22238,0,0,828c364242003eaf354a1faf07d2a48308c32d665a7d2f838c4c88b3a40f83fb,2025-06-13T14:15:19.610000 +CVE-2025-22239,0,0,b8e3232987f5bdeb114a6f1bb3eac05b37d07f2823e39c700952228ab1ff5e2b,2025-06-13T14:15:19.747000 CVE-2025-2224,0,0,a251902d7a3f4027222d02a92ceecc551380ed3d87526ebb058f0bdbf9a04b21,2025-03-27T16:45:46.410000 -CVE-2025-22240,0,1,af29f0df6cdc720e01fa31c02d21fefaf97e9808c7c3c6d48054b8948bbc5d45,2025-06-13T14:15:19.893000 +CVE-2025-22240,0,0,af29f0df6cdc720e01fa31c02d21fefaf97e9808c7c3c6d48054b8948bbc5d45,2025-06-13T14:15:19.893000 CVE-2025-22241,0,0,5f9646794e52bdbc3f490b3330e1f9c68ea5ffdfa0df29aae7c5e61961ca5b57,2025-06-13T07:15:21.567000 CVE-2025-22242,0,0,b8a6fb1b6e8de9a5a97438f1176658027665c59502c2549ed9c21537b7ef446a,2025-06-13T07:15:21.710000 CVE-2025-22243,0,0,5f41737989264b2994eac99e02c12b9f81310f29baab0cf31082285d453e8c22,2025-06-05T20:12:23.777000 @@ -286226,7 +286226,7 @@ CVE-2025-22938,0,0,e6807abe137e5b2b47b5ff4158bb661bb62a642f14207093ac8ab43630389 CVE-2025-22939,0,0,a81a8c19b454bc9c8043ab6bf7f335372876b8c96ac868e5e90252d024cd56ee,2025-06-12T20:50:44.883000 CVE-2025-2294,0,0,1a05467c41eb5981388eaf0b9197f5e7cd9d05937d25f388597e1f34f296e807,2025-03-28T18:11:40.180000 CVE-2025-22940,0,0,d97dc2eae3e26fb6624010719f59be6d0b5ca1761f6c260f5028360d669673d5,2025-04-01T20:26:22.890000 -CVE-2025-22941,0,0,5c314b5cce5a97ff5f95a7de2c69a40ec47fb2a9f0d215e48b7dc301ebe60431,2025-04-01T20:26:22.890000 +CVE-2025-22941,0,1,6cb077c28cfd3700f1de179829e4cce0a5c3eb1cd11f2b4f0c92951cfc0dd92b,2025-06-13T16:22:57 CVE-2025-22946,0,0,8f60ec518577214b45229d7545a35c55879825b19b6c253aab60d563104c0dd8,2025-04-09T18:35:44.810000 CVE-2025-22949,0,0,0a7be0866c6b82c18c7c0f13e28a95eb01b8c6d66c113ff800e86b319df10485,2025-04-09T18:36:01.027000 CVE-2025-2295,0,0,5afd41ba1c620aa8b1c09ed9d5c8905d7597b06ca6637c246ba28374bca35eb0,2025-03-14T22:15:11.600000 @@ -286340,7 +286340,7 @@ CVE-2025-23100,0,0,46b37fe2c3228425bf3c04fe972bc0cdefe57e7dc18dacde4550fc6f81a56 CVE-2025-23101,0,0,f160545d41ff89f0e2bf53610ce461ba6724caf22d0b5475f217a36457647ba5,2025-06-11T18:56:06.930000 CVE-2025-23102,0,0,49abde4781c7970c0963b4225909dbd07917e4ed564029a579d5c8c20b131ddd,2025-06-10T20:07:12.893000 CVE-2025-23103,0,0,af7de4223ee48e5d5418763433d6687e1e0444809ae878b4ad8a4335b22ba78e,2025-06-06T18:49:19.250000 -CVE-2025-23104,0,0,5a4215e79ac958e04815e0d83cdbdc0822de3272f45b4d0aea0c06e194c03746,2025-06-09T14:15:22.403000 +CVE-2025-23104,0,1,3afd1a0a4ba827e9038f4e466775cf04bc07954c48fd413d8e941185a35a889a,2025-06-13T17:46:36.533000 CVE-2025-23105,0,0,0cfe1826e7f6e2704ce0e8c0045a2d064cd7652071b287e953f8c489e8a22a74,2025-06-04T14:54:33.783000 CVE-2025-23106,0,0,455bafa176b8cc42b3f4fddb1f1700de46399377a04a2ee53ab833bb2e61e5b7,2025-06-11T18:54:42.973000 CVE-2025-23107,0,0,473e9f3950324060da83c2e03546f7606cb24c446ae5eb77e417a460d4770978,2025-06-06T18:49:12.190000 @@ -288568,8 +288568,8 @@ CVE-2025-26009,0,0,8f7f210f0d6391dc793746a507475487d34df96ad5f97137cea8c79aa3fd6 CVE-2025-2601,0,0,b2f2bc957bad364409e842d81b3bbb7a2d8ffe3aa3bf35cd41e278f677537515,2025-05-14T21:18:48.637000 CVE-2025-26010,0,0,cf5a04d9860ec5e77e2e34e26dd6be3079064fe7b613efd3b5c093d4f0e21516,2025-04-01T16:33:40.410000 CVE-2025-26011,0,0,7d295bbc36362f782172277753f7e055d256a1db3b7bed76509ca8e09eca8473,2025-04-01T15:42:54.437000 -CVE-2025-26013,0,0,40734f6d8ee5bc23e3bb6d3f316f5ff417211c76e3bd05950ea58ed84cc035a5,2025-02-21T21:15:24.470000 -CVE-2025-26014,0,0,f214b17d5a22324a838383615ccbc65f42d977244cb293df71aa8e2b4b792ab3,2025-04-17T16:15:34.477000 +CVE-2025-26013,0,1,f40ce2fe75f7e5fe576fe0336055aea99ffde70101935fe9e09815b8d87995a4,2025-06-13T16:03:12.363000 +CVE-2025-26014,0,1,55f4f76205f070f91a94c396d3e4534aea6f94fd77d914a86f6c8d7024002e36,2025-06-13T16:00:56.813000 CVE-2025-2602,0,0,55184d4444cf6fcb654297213a71fd82f15a6409f468fa51c940547b67d87704,2025-05-14T21:18:56.027000 CVE-2025-2603,0,0,625b00c9525209b5099994d377f6407402ebb3e82c4e2dce028f1396925733cd,2025-04-01T20:28:42.917000 CVE-2025-2604,0,0,209dc94fc4ece561b20c49ebedaf1fa67845d362ce425198a9d48be9814fba65,2025-04-01T20:26:24.393000 @@ -289863,8 +289863,8 @@ CVE-2025-27937,0,0,46e59abc87395fad933022253638fee740418314c08fa44c43852bb835ed4 CVE-2025-27938,0,0,bf71cc20089ab7c31af5546076ba78a2d82abe6a041a4a3a3ccbdca3b4c0c117,2025-04-16T13:25:59.640000 CVE-2025-27939,0,0,62ad4faad8f2ae97298e92fdca3809e2a8391141ef6e47b0825e7d4aff3fc3a9,2025-04-16T13:25:59.640000 CVE-2025-2794,0,0,b6c5052929166b2fdf6e3c269a20ead353e60c001082fefc35ed2b51aad72541,2025-04-01T20:26:22.890000 -CVE-2025-27953,0,0,bbd1e72d5b15b75fe7ef006002f7b1c0e63667796301a844910133745b8912a5,2025-06-04T14:54:53.980000 -CVE-2025-27954,0,0,6b8d322652df09b5b2dbc4bfc11bc0654d3e25850d0018081e344e4aff72dae8,2025-06-04T16:15:35.770000 +CVE-2025-27953,0,1,f48e5eb368965a09e5cec3e2f9ad987d5a3179ee9886989bc065a7f4aac22db2,2025-06-13T17:52:01.717000 +CVE-2025-27954,0,1,a6640143c58c7f0579a3ef9e2925938e49f98c8805c146a9042b42a7de0e1041,2025-06-13T17:53:04.447000 CVE-2025-27955,0,0,de6e670ad498a5c71c83e1f0db7a8a75a0c45230e9af658462383b36bffafdf5,2025-06-04T16:15:35.930000 CVE-2025-27956,0,0,d55a7b54ffbb480d5dca0bcbefc32df202fac276d1c366d1805bd881a6fc642d,2025-06-04T14:54:53.980000 CVE-2025-2796,0,0,53e1f7c20777e5a56703d611323bf74e7aea306b658a5fd01e0390cfe50e5f4f,2025-05-28T15:01:30.720000 @@ -289926,7 +289926,7 @@ CVE-2025-28093,0,0,29a5b3080e3cbf963755de2e44da431efef91255ecccdc5fdce85267962b8 CVE-2025-28094,0,0,43b699593b6066edfc5dc99b07a87e6aa9cb43db61462f8282257bc196f89aa1,2025-04-07T14:09:44.973000 CVE-2025-28096,0,0,35d4134d78905af0129462be767cef757b9b22ca399b6d6ee9e18c61774ffdf3,2025-04-07T14:00:57.987000 CVE-2025-28097,0,0,6168db1fe1d777fd2d394c22e9d594177390d1d2e476a2272a9ebd5e94287f26,2025-04-07T13:59:18.590000 -CVE-2025-28099,0,1,c9c7c1d5f2ef23ae8afe0efdf15d6b98c1d7246b1707b7dade78a5c132cd239e,2025-06-13T15:18:08.250000 +CVE-2025-28099,0,0,c9c7c1d5f2ef23ae8afe0efdf15d6b98c1d7246b1707b7dade78a5c132cd239e,2025-06-13T15:18:08.250000 CVE-2025-28100,0,0,47615e085b89dc6af9340e37a1268b38c4739fdcdad9b7a5d078e2055be1f054,2025-04-22T17:54:47.210000 CVE-2025-28101,0,0,0f86f2850fd962837a135afcbd92f387d72c4c75bd19f965545a2702eace95f6,2025-04-23T19:03:51.237000 CVE-2025-28102,0,0,bb22996fe7772eaf42d446062afc7bbcb989b55312593ee64c6759c7d31fc886,2025-04-23T14:08:13.383000 @@ -289995,13 +289995,13 @@ CVE-2025-28367,0,0,4a07d437818fe7720795b8f309552d71415612c2033b36795a35ab5455779 CVE-2025-2837,0,0,b89aeb2a53f8a50fdc7d1cb971618f78d6548d3dfb914df0b41cb0d9a2a5f82a,2025-03-27T16:45:27.850000 CVE-2025-28371,0,0,9134c0b29ad829ee44935d8e974e7c73f0d8c01267cd2682d218b45eeaf0a178,2025-06-12T16:26:26.253000 CVE-2025-2838,0,0,ad5519332c14610c417f2ebe0957fac238c08deca06808872c71584919e4dfa3,2025-03-27T16:45:27.850000 -CVE-2025-28380,1,1,23247cc5b8b71eb021f52bc527b84c9e76321cc685b352c6b9a5086bc52cb2c8,2025-06-13T14:15:20.030000 -CVE-2025-28381,1,1,88c033b3c7986e3e9b8b3ebe7ed89d82083a26177c80b50560e93131888afd8d,2025-06-13T14:15:20.177000 -CVE-2025-28382,1,1,ae77e3b4096b42c852587f60023ee9556a5e91831288834e65bea057c3bc1651,2025-06-13T14:15:20.440000 -CVE-2025-28384,1,1,534f2b9e80a8901e83d20c9e9c6af8d0c5a429d18909ed67a5ede595204be569,2025-06-13T14:15:20.590000 -CVE-2025-28386,1,1,ef8702069c2f027a92b50e4914636e7631785cdbf48dc34254c8a832b215251d,2025-06-13T14:15:20.713000 -CVE-2025-28388,1,1,a135b80ca3687db3dc9c98272693fb395d1e0f63bb84ccad9d90a9b3721a68f4,2025-06-13T14:15:20.883000 -CVE-2025-28389,1,1,129d37b73bf546127ba5a09c2d88ee5f90e77d5418598b6eca029d12e5a4c423,2025-06-13T14:15:21.010000 +CVE-2025-28380,0,0,23247cc5b8b71eb021f52bc527b84c9e76321cc685b352c6b9a5086bc52cb2c8,2025-06-13T14:15:20.030000 +CVE-2025-28381,0,1,39b7cc899f9c111fc1c462db749276045ab89748c7ae3428b15001fa97ee1759,2025-06-13T16:15:25.227000 +CVE-2025-28382,0,0,ae77e3b4096b42c852587f60023ee9556a5e91831288834e65bea057c3bc1651,2025-06-13T14:15:20.440000 +CVE-2025-28384,0,0,534f2b9e80a8901e83d20c9e9c6af8d0c5a429d18909ed67a5ede595204be569,2025-06-13T14:15:20.590000 +CVE-2025-28386,0,0,ef8702069c2f027a92b50e4914636e7631785cdbf48dc34254c8a832b215251d,2025-06-13T14:15:20.713000 +CVE-2025-28388,0,1,0efe3f826c7b8b3aad9492d5d491ce127b3ddb1193b5d8746d93fb8e640fe979,2025-06-13T16:15:25.387000 +CVE-2025-28389,0,1,82823d94eb606d5aab985c92ed7cf6d86d72b178cc5a4493aee3ed383b0ff367,2025-06-13T16:15:25.550000 CVE-2025-2839,0,0,b5f50833ae89a723232ee09a371d928add8cd2f82f45ae4596cf5961719812f4,2025-04-23T14:08:13.383000 CVE-2025-28395,0,0,e2a008eff6d871d94e498e18fdcd7ec1a8104377f0bfd0c36d8d69a8cfbea062,2025-04-15T12:52:46.433000 CVE-2025-28398,0,0,a80aa3350f7ebc843f0b185d49e6b66d7edf0d8201a54a2ee3a02548dd1b1270,2025-04-15T12:51:12.750000 @@ -293440,7 +293440,7 @@ CVE-2025-3618,0,0,304b127c053921d914e116b0c3d51c4ee5b2fd33efb8ce7a0d299de12188b5 CVE-2025-3619,0,0,d6505a8fbe042bc57caae6de787bee69f36be813ff60b26db9609f14022d6c10,2025-04-23T18:12:45.323000 CVE-2025-3620,0,0,fac1ac0d011a3ca6c7407b0f1dd2c7aa4f0d27161282923069a13fa36620f271,2025-04-23T18:11:43.153000 CVE-2025-3622,0,0,6b7db9933e6b248f0000367113483a5e806bad53678214380c37af6b793ac885,2025-04-15T18:39:27.967000 -CVE-2025-3623,0,1,617cffe0141337c7867deb96e2a7d70a856c2a880b7f99e53e2fda3baeae607b,2025-06-13T14:15:21.147000 +CVE-2025-3623,0,0,617cffe0141337c7867deb96e2a7d70a856c2a880b7f99e53e2fda3baeae607b,2025-06-13T14:15:21.147000 CVE-2025-3624,0,0,7ed4cd410ce03398fb8e34cfd1d803d6ee7ef277c76293f0adef5df6e973fd9d,2025-05-16T14:42:18.700000 CVE-2025-3625,0,0,d6561c041e4acba7ed90c8d98fbb347b5dba3a1ddd62ef69a31db98635660ea5,2025-04-29T13:52:28.490000 CVE-2025-3627,0,0,302bdecab936e184f9bf4ca731ff6de1e144d2e255e7d1f3a730e3c71cb62588,2025-04-29T13:52:28.490000 @@ -293487,8 +293487,8 @@ CVE-2025-3661,0,0,dd52ef0b5adcc429dab993fa8b0a07866db488604856f931ffdf953b111b04 CVE-2025-3662,0,0,3e1dd0745f4aafb27713ee2b3d9daccf1be19770e4b95d3787e2f2ca8d2c3c07,2025-06-05T14:09:58.017000 CVE-2025-36625,0,0,45de53deee0dce100ce8c109fcd29d898f18f9e0ae3fd1f38ff75bfff7ae47fe,2025-04-21T14:23:45.950000 CVE-2025-3663,0,0,8e1f6f32c25b3b8d1ec3b3a3f1e13e7a7d56fd1e7c8e37fb37a5c673e5d21e5b,2025-05-12T19:50:03.073000 -CVE-2025-36631,1,1,8e43299b1a01b44d6c1d55f857781480094134c0c9d979f60d21984f36707970,2025-06-13T15:15:19.627000 -CVE-2025-36633,1,1,d18a02d0f0f971ff43946df3f6f567c8e2d6332a29da376569706a2a73786c3c,2025-06-13T15:15:20.183000 +CVE-2025-36631,0,0,8e43299b1a01b44d6c1d55f857781480094134c0c9d979f60d21984f36707970,2025-06-13T15:15:19.627000 +CVE-2025-36633,0,0,d18a02d0f0f971ff43946df3f6f567c8e2d6332a29da376569706a2a73786c3c,2025-06-13T15:15:20.183000 CVE-2025-3664,0,0,8622093c787fd6e9e1b160486bb91e2aaa36ebec298b1306944080b7ed6d8600,2025-04-22T16:53:30.190000 CVE-2025-3665,0,0,78418ed087f4c6d368331a8d9052902c502665982824123068b1a33cdb306774,2025-04-22T16:54:19.520000 CVE-2025-3666,0,0,dfe48caac00032cb0762e3ed3443fb6db6489e0b4c74cf8f9509f4e75c167ddb,2025-05-12T19:49:52.043000 @@ -294967,10 +294967,10 @@ CVE-2025-44073,0,0,682d7dbf7db857e708c67e0917ba715c71ef5bc25a4925c433f4eaf10db8c CVE-2025-44074,0,0,a07abf1517695aa7f067711dbd8501cec1c1dac19368b70ce83f8cc0a4c96967,2025-05-13T20:05:29.563000 CVE-2025-44083,0,0,9046793f34bd6f929b6235055941a80a823b0cd56db66235de77c34aa9f0f37d,2025-06-03T13:52:39.333000 CVE-2025-44084,0,0,9e514baa1a1b4ecd455bdc468a519f4662e489440f358688b169a12eb8124052,2025-05-30T16:19:21.193000 -CVE-2025-44091,0,0,131dbd4bb169d0f84a4c2428b2429058df00d5bc5a27a13a6e24301e6f26007b,2025-06-12T21:15:21.347000 +CVE-2025-44091,0,1,d8cf7f956cd5564dd70feef953c0451bcabcf253729ed155e4e3cb48c2fc6640,2025-06-13T16:15:25.863000 CVE-2025-44108,0,0,7f74cb8563a8e2b89a17733e62268b2a8dcb711594c4c578db48bdedf50f42d6,2025-06-12T16:26:10.203000 CVE-2025-44110,0,0,40655c12d535de96e9af0530c97aab6193addb0ec4d9bc7565ff96634b123dda,2025-06-12T13:56:06.197000 -CVE-2025-44115,0,0,d990fe7228f0dbe35841148aa572f913a3a82f4880f65057c40ef3edd4ebd7bc,2025-06-02T20:15:22.637000 +CVE-2025-44115,0,1,f4048a768a9c3bfb169ae566f384c1b85dd60f51eddb9136d8a89bd9c2a57faa,2025-06-13T17:21:25.870000 CVE-2025-4412,0,0,8c8c59397117a84a167d36fb79f68c5cd99b79261327a1fb082cf24faee6cc19,2025-05-28T15:01:30.720000 CVE-2025-44134,0,0,45b85d904dd860695476948041d246707a0696d9dc7fe9b405a5e27a85d44980,2025-05-14T13:05:17.200000 CVE-2025-44135,0,0,e8d32c865e9ccdb8b63503c21fad4c48843876d5709a3df063410109f034ccc9,2025-05-14T13:04:58.830000 @@ -295212,7 +295212,7 @@ CVE-2025-4552,0,0,78d43dd6fb452cd4c88c9ba8880aef53f1ef01b609cdfafec2c65ebbd9c2ca CVE-2025-45529,0,0,e167386bb5394c534585ea5a04f1a046eac90f4928a6eeb5d60ef274f5e67c1c,2025-05-28T15:01:30.720000 CVE-2025-4553,0,0,cc42244e3fcc3fa0e4735902b7107755da4e8cf945b2a43e81a0e7fb4c007005,2025-05-16T17:08:50.060000 CVE-2025-4554,0,0,689d20479ad000d274d22e94958c98af69dd587a0aebcdb180b3f5df25fbdcf6,2025-05-16T17:05:01.380000 -CVE-2025-45542,0,0,b39ed42a0e4c5c11d71518fd6553eed4ef45b45571d6a75edac0093585e5f57d,2025-06-03T16:15:25.397000 +CVE-2025-45542,0,1,8d78c8ce54cce28d25176b8f60395b493e3616afc4cda36b64936d5e7d008d28,2025-06-13T17:45:40.463000 CVE-2025-4555,0,0,92efb70deec25d60ec902d20eaa6cf2a584d7395d53612a3fa2dc305d46a0586,2025-05-12T17:32:32.760000 CVE-2025-4556,0,0,70e2f3738f440c4cbe1c4fc31d83071c8d6532a4954eceb08e26edbb4a06fb92,2025-05-12T17:32:32.760000 CVE-2025-4557,0,0,923891368ba582855d183f0d5ed088d1956f49e0c8ca1b57be2ee3de81550700,2025-05-12T17:32:32.760000 @@ -295241,7 +295241,7 @@ CVE-2025-4574,0,0,a936e70ea81d08570f1b370d85f904e33ed32b85014f55e350943da2afdfcf CVE-2025-45746,0,0,4f739c19260013516117a27de71915ddd8b481653d1fe15c253a574b15da0223,2025-05-21T14:15:31.553000 CVE-2025-4575,0,0,0624d6300232d42a9f90f1e62069c560ca8ea8d361bea47508069c55d62ec0b1,2025-05-23T15:55:02.040000 CVE-2025-45751,0,0,de89d7eb563ced8140d03e3271409a0c1ca243ce5972ff6bb5c7d466a89cb054,2025-05-07T19:16:08.903000 -CVE-2025-45752,0,1,15ad999c256ffcdb41870752b943c0d97b29f8594b1a7d0a56cecab33b114d2c,2025-06-13T15:49:20.863000 +CVE-2025-45752,0,0,15ad999c256ffcdb41870752b943c0d97b29f8594b1a7d0a56cecab33b114d2c,2025-06-13T15:49:20.863000 CVE-2025-45753,0,0,30657d89657a69d831b066e35506609b3d0fe532bff6b15754cd56eb0d90a508,2025-06-10T19:34:41.410000 CVE-2025-45754,0,0,a302b00636684b408f789314fb369b31d357d4a411342b7876cf26fe121b9472,2025-05-21T20:24:58.133000 CVE-2025-45755,0,0,6fe3262fee3e82261947590b30e342c111c5db410776b66947644241532cfec3,2025-06-10T19:34:54.193000 @@ -295297,11 +295297,11 @@ CVE-2025-45953,0,0,4ae22ace1fa79622bebb714ee3a1b2bc44139600b15fc188f0269a639daf2 CVE-2025-45956,0,0,5c4c4370cebea5362e52ff80785ad75271a9ace1cfcc698a1fc7b6e2a3193f1f,2025-05-14T21:01:22.690000 CVE-2025-4597,0,0,dcada8bd747b5d8fe51a3029b8ca767324f59d50104363211751e3771511674b,2025-05-30T16:31:03.107000 CVE-2025-4598,0,0,0afb48f5d4beb8ba717edab0a2c1dbaaa02bcad15f4563ef46c0692744ec8051,2025-06-05T07:15:23.047000 -CVE-2025-45984,0,1,6b171784ee058d3e6808993969caed8226d4084a473bdfcb9f43fe773ed829f1,2025-06-13T15:15:20.423000 -CVE-2025-45985,0,1,8191aa43d73b19341a3f474123257e698140b7587a971313b35ab7996615e104,2025-06-13T15:15:20.580000 -CVE-2025-45986,0,1,bc063efdc5ad4cf314751c0d7053687531377bc8a0a36aa7aa9cf55ff009e950,2025-06-13T15:15:20.747000 -CVE-2025-45987,0,1,187f26ea2f3d7d1fa7ff833a4e9cda040ffd02f12136eabf150be87fb851c4df,2025-06-13T15:15:20.947000 -CVE-2025-45988,0,1,4401707d0ef8179814241362ac92378693bd31c525f3d07512b13045864312ec,2025-06-13T15:15:21.097000 +CVE-2025-45984,0,0,6b171784ee058d3e6808993969caed8226d4084a473bdfcb9f43fe773ed829f1,2025-06-13T15:15:20.423000 +CVE-2025-45985,0,0,8191aa43d73b19341a3f474123257e698140b7587a971313b35ab7996615e104,2025-06-13T15:15:20.580000 +CVE-2025-45986,0,0,bc063efdc5ad4cf314751c0d7053687531377bc8a0a36aa7aa9cf55ff009e950,2025-06-13T15:15:20.747000 +CVE-2025-45987,0,0,187f26ea2f3d7d1fa7ff833a4e9cda040ffd02f12136eabf150be87fb851c4df,2025-06-13T15:15:20.947000 +CVE-2025-45988,0,0,4401707d0ef8179814241362ac92378693bd31c525f3d07512b13045864312ec,2025-06-13T15:15:21.097000 CVE-2025-45997,0,0,6427fb401720f5a1ec9f9ddb9a7287b863d0733096e213df5c6d6f0eb039c3d2,2025-06-09T18:53:36.927000 CVE-2025-4600,0,0,026383a000ee9b132f9dd97af63a0401be9be3b21241dcdc822424d27f013326,2025-05-16T14:42:18.700000 CVE-2025-4601,0,0,420ee2c846cf84b8070c3dfb7dddc6fbabb1090be5e1b7c4bf957aa0ce301eee,2025-06-12T16:06:39.330000 @@ -295313,11 +295313,11 @@ CVE-2025-46041,0,0,c6bcad8ca808cadc98009ed4cb5205d0538a9f9c0167900e290e14b436daa CVE-2025-4605,0,0,dd03f785e2fc8613696d02a4b9a63d6872b22992f27cd122b6503ea0ee189f65,2025-06-12T16:06:20.180000 CVE-2025-46052,0,0,3024fe589e39f7170008b5c168c5578a4d86fe26344910133fdba56a4c51eb38,2025-06-12T13:19:06.093000 CVE-2025-46053,0,0,cc1dee8d73635536f4f2cef7e3661b210bf2aa73e288776021aac13839576374,2025-06-12T13:12:25.303000 -CVE-2025-46060,0,0,5d02123267484ed4fadce9d90d5dc44c47b2bf6aac67f097a5569cf07e008f44,2025-06-13T13:15:21.187000 +CVE-2025-46060,0,1,4320533b89a2cc7bf2c8001b52d89389eaf59630bfc6e46bd9466bcd404d4934,2025-06-13T16:15:26.030000 CVE-2025-4607,0,0,7929f7497a2f3fdbdefa5c40c24e8dfb722bcbca57929b42733b89c15e0bc1dd,2025-06-02T17:32:17.397000 CVE-2025-46078,0,0,2fc8a269b5a28c0015e225ca3c3d8f64c503abc0c5a8ea5ce240137e0c4c6776,2025-06-04T19:59:09.353000 CVE-2025-46080,0,0,e77557f865cb8f0c8a7b01f1f6fbdee1ca66bad8ebda2925b71b207a25112a43,2025-06-04T19:59:02.890000 -CVE-2025-46096,0,0,69a5f7e820479bcdf6f300bbb9b43926700871805d8303ba37f658d6fbba1fec,2025-06-13T13:15:21.710000 +CVE-2025-46096,0,1,81b4884face5e9f6263565f69b82a6c4c962e188f23086cd58a40a64c50976a9,2025-06-13T16:15:26.193000 CVE-2025-4610,0,0,d61d953fe0fd6f0d2b21233839836df5133468380db75b47c2a05d78020b6b82,2025-05-19T13:35:20.460000 CVE-2025-4611,0,0,551957ca30c77144066c2501102cbe8b5cc59e5d0e8959ef20d14b731299a950,2025-05-21T20:24:58.133000 CVE-2025-4613,0,0,3590c372be8e2b7d0c55efde83c979e68177b14db7b7b8f8c25c3457b303607f,2025-06-12T16:06:20.180000 @@ -295859,19 +295859,19 @@ CVE-2025-46972,0,0,6c1022ed7462b7ffb3adcadfaa2249965de1d0662476b248a5bbf90b6f5b2 CVE-2025-46973,0,0,8ec4589ff076d3a7a38666ea17f380feeb966f455cb99e7cb355f5789890cd55,2025-06-12T16:06:29.520000 CVE-2025-46974,0,0,89a29de31928970500be797dd33638bbf8b7589ab8bdc06ac619788470950f49,2025-06-12T16:06:29.520000 CVE-2025-46975,0,0,db250026b14c9a4396c20df56c259309af38ad43ba3537d5424d673fdf208ab2,2025-06-12T16:06:29.520000 -CVE-2025-46976,0,0,a40ac69987c3a0b86d819c3e022c1791aa80cd77c3125cc6851f798ba3106838,2025-06-12T16:06:29.520000 -CVE-2025-46977,0,0,dd291131872a6817b84ba246ed9d25bd8142761eaa2ef4bfc9a85946850275d3,2025-06-12T16:06:29.520000 -CVE-2025-46978,0,0,cfb562108aeb2bb74e777d599bc1c37ce595750756569d46011bae9a27a54050,2025-06-12T16:06:29.520000 -CVE-2025-46979,0,0,19f5f7900e66d978f8aeec401edf8371a04f65b4ff8ceea7a9ce6d06a22706cc,2025-06-12T16:06:29.520000 +CVE-2025-46976,0,1,e0bebf7a9ecd155ee459b645a576bb4c4a412e5a89b74aaead29a5299cd744e7,2025-06-13T17:29:49.670000 +CVE-2025-46977,0,1,dd0192cdaf141656ebfb7c277f4d8cab8527877cf27cfeb319e095536ad67775,2025-06-13T17:33:20.470000 +CVE-2025-46978,0,1,cc32f0eda916e17af59a22d63962890a1ded4646c37b392221f421f8bf98ab20,2025-06-13T17:41:41.383000 +CVE-2025-46979,0,1,3a361370cb3b462c1858237eb3bc6942ae2ea5f44ad70bd37d66dee160b91bd1,2025-06-13T17:44:35.590000 CVE-2025-4698,0,0,629d6280fd3d3fe101760664e35242f9f6abe094cabf022cd7d827567767722a,2025-05-28T14:22:16.457000 -CVE-2025-46981,0,0,93105f711d93284c1ed7d2ab71e677065f7002088fcf10fd6c3b0eba2850ae58,2025-06-12T16:06:29.520000 +CVE-2025-46981,0,1,8ea206ca3c61530455b9360dea71f17fed4849c7b4fc801f00a17b049464bfed,2025-06-13T17:44:41.920000 CVE-2025-46982,0,0,d3803de29452150058e270c2772bc2ac8e02c9b1cdbaf7a435913843cb151440,2025-06-12T16:06:29.520000 -CVE-2025-46983,0,1,d8b2c11077a2c15c9d1ea632801dd725b34566ea28446af1231775c03900eb59,2025-06-13T14:30:52.440000 -CVE-2025-46984,0,1,8a96c6283405b49327fdf63c9305583ea8d6f92231c9a26aafdf4b5dea9a26ef,2025-06-13T14:30:46.537000 -CVE-2025-46985,0,1,b7aafe1eda945998fead91b79c0050185879d1f38e20943c147ced11187c637c,2025-06-13T14:30:30.603000 -CVE-2025-46986,0,1,0b720a94ea5d38affec22263d5a9e16db2460f05e32acf3197baf2d50bfa7755,2025-06-13T14:30:11.690000 -CVE-2025-46987,0,1,b43b6fa21445769e94021eb5411604f5e442ce9c55a3fbd8b16d47861a68470c,2025-06-13T14:30:04.197000 -CVE-2025-46988,0,1,e1ecf207f4eec7395ec43223e98d455a19ef8bf2b592717062ef924ac573ec6c,2025-06-13T14:26:54.667000 +CVE-2025-46983,0,0,d8b2c11077a2c15c9d1ea632801dd725b34566ea28446af1231775c03900eb59,2025-06-13T14:30:52.440000 +CVE-2025-46984,0,0,8a96c6283405b49327fdf63c9305583ea8d6f92231c9a26aafdf4b5dea9a26ef,2025-06-13T14:30:46.537000 +CVE-2025-46985,0,0,b7aafe1eda945998fead91b79c0050185879d1f38e20943c147ced11187c637c,2025-06-13T14:30:30.603000 +CVE-2025-46986,0,0,0b720a94ea5d38affec22263d5a9e16db2460f05e32acf3197baf2d50bfa7755,2025-06-13T14:30:11.690000 +CVE-2025-46987,0,0,b43b6fa21445769e94021eb5411604f5e442ce9c55a3fbd8b16d47861a68470c,2025-06-13T14:30:04.197000 +CVE-2025-46988,0,0,e1ecf207f4eec7395ec43223e98d455a19ef8bf2b592717062ef924ac573ec6c,2025-06-13T14:26:54.667000 CVE-2025-46989,0,0,77bf54aae4078dad031403f1bc73002c14f027a010e1601d2e93624f78640fbd,2025-06-12T16:06:29.520000 CVE-2025-4699,0,0,8050368b263de08669c173a654994e653b6b74b6e1b034c43e19a012e2c34d52,2025-05-28T14:29:57.107000 CVE-2025-46990,0,0,650dd4e8e79fc57160ef4db06cdb156f924c05e39b1c02226f928a3dcdd6b067,2025-06-12T16:06:29.520000 @@ -296533,7 +296533,7 @@ CVE-2025-48063,0,0,30768bd0b996f4003af001e4f1f93e88434b229ec5305143caf606aa28b95 CVE-2025-48064,0,0,f30f6abfc706c8ec009b8e1646b8ce7a94ad294f1fc91f47ca51b619773ad0e0,2025-05-21T20:24:58.133000 CVE-2025-48066,0,0,faea31f6567e989a0ef973c3f26a498ca723f84a2b80d40e0205222fbd185beb,2025-05-30T01:18:41.410000 CVE-2025-48067,0,0,22969738b1365af0ae4410d8bd56f8dea0ca6b885ed0c705e09d5f2697dbeef5,2025-06-12T16:06:39.330000 -CVE-2025-48068,0,1,3adf8c4426528e9588d2fb1b989467e898314b1a84e0c17cf8e21dbda6ff768b,2025-06-13T15:15:21.300000 +CVE-2025-48068,0,0,3adf8c4426528e9588d2fb1b989467e898314b1a84e0c17cf8e21dbda6ff768b,2025-06-13T15:15:21.300000 CVE-2025-48069,0,0,d201b903e106fd4e8e9a5c16c5ee97dd49fc9c17d0474c4fa89382c7bdd7010c,2025-05-21T20:24:58.133000 CVE-2025-4807,0,0,38e0deb05d9d726281158918611fe40bc8b500e3135a018beac99acf23d735d4,2025-05-28T13:38:25.170000 CVE-2025-48070,0,0,bed1805e46e1e55370ff9bc19da5a6d7e3c95e34134426c68a907b0b4c694440,2025-05-23T15:55:02.040000 @@ -296877,7 +296877,14 @@ CVE-2025-4891,0,0,ce5eadb58621294f252fd31aa2b4c3c08be14da6ad289e0467dbab1173f367 CVE-2025-48910,0,0,b0802914093d2b8a5e0d094bc7d58f666a6ae381ef73fed402d6537c5ab4a23d,2025-06-06T14:07:28.330000 CVE-2025-48911,0,0,d3230d9fd5ec3a98359dbbf269123ba96a632f8f634d15bc217e0ffc40994451,2025-06-06T14:07:28.330000 CVE-2025-48912,0,0,4848d33489117f53b877c948399935df619e976eec472273191f1ca26ec7244c,2025-06-04T18:29:44.323000 +CVE-2025-48914,1,1,1249dd63a69dfa615bdbac81bcb59663551a90c10e1c48c3ca6651a199a51f69,2025-06-13T16:15:26.457000 +CVE-2025-48915,1,1,cc5391eff99330511e5b7e8f5f551c790c9cf990adb2b38de00b9d5abd658b02,2025-06-13T16:15:26.580000 +CVE-2025-48916,1,1,29f7e83b9af2845ed52e45443920e3ba10ffd21ec1b67186918f75a08dab0ed2,2025-06-13T16:15:26.790000 +CVE-2025-48917,1,1,2b3ea003e3fbb5ea17e7efb6714a05219e09023a587775e2361e2cf00bba1391,2025-06-13T17:15:21.713000 +CVE-2025-48918,1,1,723e627a849ec44816c08b9cad05f12081a13a99927b424c2a2c2d30ba25d64b,2025-06-13T16:15:27.053000 +CVE-2025-48919,1,1,9f844d9b572b0a73a73e3a24a2d73e4b4f1070512b4cd3f693eaf76a5374b071,2025-06-13T17:15:22.757000 CVE-2025-4892,0,0,002d5f2a93da7cbbf0db54aa5606cb91f8377f6151252d2e3edadf3dcfd06185,2025-05-28T15:32:12.643000 +CVE-2025-48920,1,1,c59f2722462d21af36e20909bd4c548923faf7d3d085c6a8d3437408e2d660b6,2025-06-13T16:15:27.293000 CVE-2025-48925,0,0,21a2cb4f4a9620e34d454c14028a00f2b70dc9544a21aca3383488609c689c05,2025-05-29T14:29:50.247000 CVE-2025-48926,0,0,7c30f38d95fc987bd6e8852b968a55a7e51032b7c79b54853568428b8d32ecb1,2025-05-29T14:29:50.247000 CVE-2025-48927,0,0,709ff3b5cba6df23c4ebbabd98b2844e61f0bb8547f17efd794502cb0ceeec47,2025-05-29T14:29:50.247000 @@ -297147,6 +297154,10 @@ CVE-2025-49576,0,0,b2723fb22aa5829f0ce429477c76e5b4be58d4daa1264d569175497beaf60 CVE-2025-49577,0,0,bb68f9188472bd2017df69d95e02b7aa5a3a083734396feae9ea2615cb3b51c9,2025-06-12T19:15:20.463000 CVE-2025-49578,0,0,288e8c183178acc5000ab891a16029574d6b0212d2674d2101b8418a15ffe81e,2025-06-12T19:15:20.610000 CVE-2025-49579,0,0,67dec54330923f2fe11ef6954e0aba932cb47f64147fc09d7fdbce3390833989,2025-06-12T19:15:20.750000 +CVE-2025-49580,1,1,447e61071a03e5ffc7cd650d9ab130ef5607bb2773b532b44ceeb795ebb4dc4f,2025-06-13T16:15:27.417000 +CVE-2025-49581,1,1,ef451a72858a865aa49086653e770f6c7c0527c9925847d4c7ffeac26da353c6,2025-06-13T16:15:27.570000 +CVE-2025-49582,1,1,c9a93ca35303928b2d50696bb46adb9e0493e475da93b14ee8eade13d6db5a71,2025-06-13T17:15:23.180000 +CVE-2025-49583,1,1,38ffd40f78f3e608242c33f8c493cd99aac26207ac245f95bee02c19e5b96fdd,2025-06-13T17:15:23.390000 CVE-2025-49589,0,0,6e39ca9502db96dca38042ca3660dd277813c58c5c4d372f028b81d7ad7dd16c,2025-06-12T21:15:21.480000 CVE-2025-49599,0,0,cd0748db942732a0e968c564ce05d560bd51611e52e8cb06dc26ca9e65d8d9b0,2025-06-09T16:15:46.830000 CVE-2025-49619,0,0,bf456b7c74aaa6eab01b4c779d57de166fafc9ff7198338c147fed153e2c86a7,2025-06-09T16:15:46.937000 @@ -297894,6 +297905,8 @@ CVE-2025-6008,0,0,bdfd3cc3e4441917f3e7587cffe8368d1b175ba60e9dbe2f7dbae2a1b2f944 CVE-2025-6009,0,0,45d2cd3c349eec086d7dbf8e5d3677c0ad4a90d0009e476cec317ccc54ba0f3a,2025-06-12T16:06:20.180000 CVE-2025-6012,0,0,85bb11daadd2c9711de1e56ddc8b0e0022d882d1b7428575f169e5e84f349018,2025-06-13T08:15:19.507000 CVE-2025-6021,0,0,d8cb911042c78ed7473b58fa173a0ecc04974b2be82b9747683ed0cea25a5aba,2025-06-12T16:06:20.180000 -CVE-2025-6029,1,1,0a7d097872a3743dce758382e23d64ef6427ff251b4a0e0984b49fe00ded11c1,2025-06-13T15:15:21.430000 -CVE-2025-6030,1,1,971340cab3989d6f103f455b80ce687f5365decc2b747d306ee807e98b81854a,2025-06-13T15:15:21.600000 +CVE-2025-6029,0,0,0a7d097872a3743dce758382e23d64ef6427ff251b4a0e0984b49fe00ded11c1,2025-06-13T15:15:21.430000 +CVE-2025-6030,0,0,971340cab3989d6f103f455b80ce687f5365decc2b747d306ee807e98b81854a,2025-06-13T15:15:21.600000 CVE-2025-6031,0,0,f55877d9a515055d82923e15e107b73e885b2a97ca1430544a245162a02b6450,2025-06-12T20:15:22.450000 +CVE-2025-6035,1,1,07dd0ef801ecdc5affcaf0e86947bc44410ec1004ed310d74f8d9a296fc9d5aa,2025-06-13T16:15:28.067000 +CVE-2025-6052,1,1,d6d0e5e14eb20ceb0c3bc2cb2793ad0094d53a851be1a17d6cfc808d70a5cddb,2025-06-13T16:15:28.230000