From df2a148244b0b31d4fc20c9e6705b3afb19baf49 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 9 Jul 2025 16:03:50 +0000 Subject: [PATCH] Auto-Update: 2025-07-09T16:00:12.546512+00:00 --- CVE-2019/CVE-2019-54xx/CVE-2019-5418.json | 36 ++- CVE-2019/CVE-2019-96xx/CVE-2019-9621.json | 250 ++++++++++------ CVE-2023/CVE-2023-31xx/CVE-2023-3107.json | 22 +- CVE-2023/CVE-2023-348xx/CVE-2023-34872.json | 32 +- CVE-2023/CVE-2023-37xx/CVE-2023-3735.json | 32 +- CVE-2024/CVE-2024-130xx/CVE-2024-13059.json | 49 +++- CVE-2024/CVE-2024-15xx/CVE-2024-1511.json | 33 ++- CVE-2024/CVE-2024-15xx/CVE-2024-1520.json | 45 ++- CVE-2024/CVE-2024-16xx/CVE-2024-1600.json | 45 ++- CVE-2024/CVE-2024-16xx/CVE-2024-1602.json | 55 +++- CVE-2024/CVE-2024-21xx/CVE-2024-2178.json | 38 ++- CVE-2024/CVE-2024-22xx/CVE-2024-2299.json | 60 +++- CVE-2024/CVE-2024-239xx/CVE-2024-23928.json | 45 ++- CVE-2024/CVE-2024-23xx/CVE-2024-2358.json | 38 ++- CVE-2024/CVE-2024-23xx/CVE-2024-2361.json | 38 ++- CVE-2024/CVE-2024-23xx/CVE-2024-2366.json | 38 ++- CVE-2024/CVE-2024-31xx/CVE-2024-3126.json | 48 ++- CVE-2024/CVE-2024-324xx/CVE-2024-32488.json | 78 ++++- CVE-2024/CVE-2024-325xx/CVE-2024-32568.json | 52 +++- CVE-2024/CVE-2024-34xx/CVE-2024-3435.json | 48 ++- CVE-2024/CVE-2024-351xx/CVE-2024-35164.json | 59 +++- CVE-2024/CVE-2024-376xx/CVE-2024-37663.json | 45 ++- CVE-2024/CVE-2024-376xx/CVE-2024-37664.json | 45 ++- CVE-2024/CVE-2024-386xx/CVE-2024-38657.json | 130 ++++++++- CVE-2024/CVE-2024-391xx/CVE-2024-39123.json | 35 ++- CVE-2024/CVE-2024-399xx/CVE-2024-39962.json | 45 ++- CVE-2024/CVE-2024-415xx/CVE-2024-41597.json | 33 ++- CVE-2024/CVE-2024-428xx/CVE-2024-42815.json | 45 ++- CVE-2024/CVE-2024-43xx/CVE-2024-4322.json | 38 ++- CVE-2024/CVE-2024-43xx/CVE-2024-4326.json | 48 ++- CVE-2024/CVE-2024-43xx/CVE-2024-4330.json | 61 +++- CVE-2024/CVE-2024-44xx/CVE-2024-4498.json | 37 ++- CVE-2024/CVE-2024-48xx/CVE-2024-4869.json | 84 +++++- CVE-2024/CVE-2024-48xx/CVE-2024-4897.json | 38 ++- CVE-2024/CVE-2024-576xx/CVE-2024-57605.json | 27 +- CVE-2024/CVE-2024-579xx/CVE-2024-57969.json | 32 +- CVE-2024/CVE-2024-62xx/CVE-2024-6250.json | 35 ++- CVE-2024/CVE-2024-63xx/CVE-2024-6394.json | 28 +- CVE-2024/CVE-2024-64xx/CVE-2024-6448.json | 47 ++- CVE-2024/CVE-2024-99xx/CVE-2024-9919.json | 28 +- CVE-2025/CVE-2025-11xx/CVE-2025-1112.json | 56 ++++ CVE-2025/CVE-2025-257xx/CVE-2025-25772.json | 29 +- CVE-2025/CVE-2025-259xx/CVE-2025-25957.json | 29 +- CVE-2025/CVE-2025-25xx/CVE-2025-2538.json | 4 +- CVE-2025/CVE-2025-260xx/CVE-2025-26058.json | 27 +- CVE-2025/CVE-2025-266xx/CVE-2025-26668.json | 142 ++++++++- CVE-2025/CVE-2025-266xx/CVE-2025-26669.json | 142 ++++++++- CVE-2025/CVE-2025-266xx/CVE-2025-26670.json | 142 ++++++++- CVE-2025/CVE-2025-266xx/CVE-2025-26671.json | 66 ++++- CVE-2025/CVE-2025-266xx/CVE-2025-26672.json | 142 ++++++++- CVE-2025/CVE-2025-266xx/CVE-2025-26674.json | 87 +++++- CVE-2025/CVE-2025-266xx/CVE-2025-26675.json | 69 ++++- CVE-2025/CVE-2025-266xx/CVE-2025-26676.json | 76 ++++- CVE-2025/CVE-2025-266xx/CVE-2025-26678.json | 87 +++++- CVE-2025/CVE-2025-268xx/CVE-2025-26877.json | 47 ++- CVE-2025/CVE-2025-26xx/CVE-2025-2670.json | 56 ++++ CVE-2025/CVE-2025-30xx/CVE-2025-3041.json | 78 ++++- CVE-2025/CVE-2025-30xx/CVE-2025-3042.json | 78 ++++- CVE-2025/CVE-2025-37xx/CVE-2025-3702.json | 27 +- CVE-2025/CVE-2025-466xx/CVE-2025-46647.json | 38 ++- CVE-2025/CVE-2025-471xx/CVE-2025-47162.json | 61 +++- CVE-2025/CVE-2025-471xx/CVE-2025-47163.json | 37 ++- CVE-2025/CVE-2025-471xx/CVE-2025-47164.json | 61 +++- CVE-2025/CVE-2025-471xx/CVE-2025-47165.json | 62 +++- CVE-2025/CVE-2025-471xx/CVE-2025-47166.json | 37 ++- CVE-2025/CVE-2025-471xx/CVE-2025-47167.json | 62 +++- CVE-2025/CVE-2025-471xx/CVE-2025-47168.json | 66 ++++- CVE-2025/CVE-2025-484xx/CVE-2025-48461.json | 92 +++++- CVE-2025/CVE-2025-484xx/CVE-2025-48462.json | 92 +++++- CVE-2025/CVE-2025-484xx/CVE-2025-48463.json | 92 +++++- CVE-2025/CVE-2025-484xx/CVE-2025-48466.json | 55 +++- CVE-2025/CVE-2025-484xx/CVE-2025-48467.json | 92 +++++- CVE-2025/CVE-2025-484xx/CVE-2025-48468.json | 92 +++++- CVE-2025/CVE-2025-484xx/CVE-2025-48469.json | 98 ++++++- CVE-2025/CVE-2025-484xx/CVE-2025-48470.json | 92 +++++- CVE-2025/CVE-2025-488xx/CVE-2025-48823.json | 20 +- CVE-2025/CVE-2025-497xx/CVE-2025-49794.json | 10 +- CVE-2025/CVE-2025-497xx/CVE-2025-49796.json | 10 +- CVE-2025/CVE-2025-523xx/CVE-2025-52364.json | 21 ++ CVE-2025/CVE-2025-530xx/CVE-2025-53021.json | 38 ++- CVE-2025/CVE-2025-533xx/CVE-2025-53355.json | 10 +- CVE-2025/CVE-2025-535xx/CVE-2025-53513.json | 10 +- CVE-2025/CVE-2025-535xx/CVE-2025-53546.json | 60 ++++ CVE-2025/CVE-2025-60xx/CVE-2025-6021.json | 10 +- CVE-2025/CVE-2025-70xx/CVE-2025-7030.json | 31 +- CVE-2025/CVE-2025-71xx/CVE-2025-7119.json | 72 ++++- CVE-2025/CVE-2025-71xx/CVE-2025-7134.json | 72 ++++- CVE-2025/CVE-2025-71xx/CVE-2025-7135.json | 77 ++++- CVE-2025/CVE-2025-71xx/CVE-2025-7136.json | 72 ++++- CVE-2025/CVE-2025-71xx/CVE-2025-7137.json | 71 ++++- CVE-2025/CVE-2025-71xx/CVE-2025-7138.json | 71 ++++- CVE-2025/CVE-2025-71xx/CVE-2025-7139.json | 75 ++++- CVE-2025/CVE-2025-71xx/CVE-2025-7140.json | 75 ++++- CVE-2025/CVE-2025-71xx/CVE-2025-7142.json | 71 ++++- CVE-2025/CVE-2025-71xx/CVE-2025-7143.json | 71 ++++- CVE-2025/CVE-2025-71xx/CVE-2025-7144.json | 71 ++++- CVE-2025/CVE-2025-71xx/CVE-2025-7147.json | 71 ++++- CVE-2025/CVE-2025-71xx/CVE-2025-7148.json | 72 ++++- CVE-2025/CVE-2025-71xx/CVE-2025-7187.json | 14 +- CVE-2025/CVE-2025-71xx/CVE-2025-7190.json | 14 +- CVE-2025/CVE-2025-71xx/CVE-2025-7191.json | 14 +- CVE-2025/CVE-2025-71xx/CVE-2025-7192.json | 14 +- CVE-2025/CVE-2025-71xx/CVE-2025-7193.json | 14 +- CVE-2025/CVE-2025-71xx/CVE-2025-7197.json | 10 +- CVE-2025/CVE-2025-72xx/CVE-2025-7200.json | 10 +- CVE-2025/CVE-2025-72xx/CVE-2025-7204.json | 56 ++++ CVE-2025/CVE-2025-72xx/CVE-2025-7206.json | 10 +- CVE-2025/CVE-2025-72xx/CVE-2025-7207.json | 10 +- README.md | 66 +++-- _state.csv | 307 ++++++++++---------- 110 files changed, 5548 insertions(+), 687 deletions(-) create mode 100644 CVE-2025/CVE-2025-11xx/CVE-2025-1112.json create mode 100644 CVE-2025/CVE-2025-26xx/CVE-2025-2670.json create mode 100644 CVE-2025/CVE-2025-523xx/CVE-2025-52364.json create mode 100644 CVE-2025/CVE-2025-535xx/CVE-2025-53546.json create mode 100644 CVE-2025/CVE-2025-72xx/CVE-2025-7204.json diff --git a/CVE-2019/CVE-2019-54xx/CVE-2019-5418.json b/CVE-2019/CVE-2019-54xx/CVE-2019-5418.json index 8a21bf9278c..b65b1da1bea 100644 --- a/CVE-2019/CVE-2019-54xx/CVE-2019-5418.json +++ b/CVE-2019/CVE-2019-54xx/CVE-2019-5418.json @@ -2,8 +2,8 @@ "id": "CVE-2019-5418", "sourceIdentifier": "support@hackerone.com", "published": "2019-03-27T14:29:01.533", - "lastModified": "2025-07-08T01:00:02.203", - "vulnStatus": "Modified", + "lastModified": "2025-07-09T15:23:23.357", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -288,7 +288,10 @@ }, { "url": "https://groups.google.com/forum/#%21topic/rubyonrails-security/pFRKI96Sm8Q", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00042.html", @@ -300,14 +303,18 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y43636TH4D6T46IC6N2RQVJTRFJAAYGA/", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/", "source": "support@hackerone.com", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "Broken Link" ] }, { @@ -376,7 +383,10 @@ }, { "url": "https://groups.google.com/forum/#%21topic/rubyonrails-security/pFRKI96Sm8Q", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00042.html", @@ -388,14 +398,18 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y43636TH4D6T46IC6N2RQVJTRFJAAYGA/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "Broken Link" ] }, { @@ -409,7 +423,11 @@ }, { "url": "https://web.archive.org/web/20190313201629/https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2019/CVE-2019-96xx/CVE-2019-9621.json b/CVE-2019/CVE-2019-96xx/CVE-2019-9621.json index e38626c53fd..044d1c2d73b 100644 --- a/CVE-2019/CVE-2019-96xx/CVE-2019-9621.json +++ b/CVE-2019/CVE-2019-96xx/CVE-2019-9621.json @@ -2,8 +2,8 @@ "id": "CVE-2019-9621", "sourceIdentifier": "cve@mitre.org", "published": "2019-04-30T18:29:08.633", - "lastModified": "2025-07-08T01:00:02.203", - "vulnStatus": "Modified", + "lastModified": "2025-07-09T15:22:52.043", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,8 @@ "metrics": { "cvssMetricV31": [ { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "source": "nvd@nist.gov", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", @@ -36,15 +36,13 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 - } - ], - "cvssMetricV30": [ + }, { - "source": "nvd@nist.gov", - "type": "Primary", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", @@ -121,188 +119,248 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:zimbra:collaboration_server:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:*:*:*:*:*:*:*:*", "versionEndExcluding": "8.6.0", - "matchCriteriaId": "58B5F91A-E6B3-4020-AFAF-AE9830F07203" + "matchCriteriaId": "CAE2C83F-03C0-4C2A-AC40-5B16BF350FE4" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:zimbra:collaboration_server:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:*:*:*:*:*:*:*:*", "versionStartIncluding": "8.7.0", "versionEndExcluding": "8.7.11", - "matchCriteriaId": "E1387AC8-F393-421E-A0C6-E9BB1A0FE39D" + "matchCriteriaId": "9A91CE8F-5E21-459E-A253-A1706357B82B" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:zimbra:collaboration_server:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:*:*:*:*:*:*:*:*", "versionStartIncluding": "8.8.0", - "versionEndExcluding": "8.8.10", - "matchCriteriaId": "19953218-6103-4689-BE3D-6CC2F240FB3F" + "versionEndExcluding": "8.8.9", + "matchCriteriaId": "172EF781-F36D-49D1-8E80-5F344551F543" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:zimbra:collaboration_server:8.6.0:-:*:*:*:*:*:*", - "matchCriteriaId": "34C10FC4-6B08-46EA-9DBC-C38BC51C43DA" + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.6.0:-:*:*:*:*:*:*", + "matchCriteriaId": "09016525-12F2-49D0-A803-E38294FE3EFC" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:zimbra:collaboration_server:8.6.0:p1:*:*:*:*:*:*", - "matchCriteriaId": "EF7FE7FE-4BFF-4381-94B9-CE59308E0303" + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.6.0:patch1:*:*:*:*:*:*", + "matchCriteriaId": "256ABB7E-46FB-471A-95D1-589A2F985BF9" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:zimbra:collaboration_server:8.6.0:p10:*:*:*:*:*:*", - "matchCriteriaId": "D4B1DF9D-F603-469D-B5E7-8BFB48517780" + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.6.0:patch10:*:*:*:*:*:*", + "matchCriteriaId": "48F84B56-C83D-41D9-AC55-3D72A9EED4DE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:zimbra:collaboration_server:8.6.0:p11:*:*:*:*:*:*", - "matchCriteriaId": "3B9F25B4-D10E-4C43-8309-C27015B44E1F" + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.6.0:patch11:*:*:*:*:*:*", + "matchCriteriaId": "75435F38-8FD9-4185-9A82-AB60EF29242A" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:zimbra:collaboration_server:8.6.0:p12:*:*:*:*:*:*", - "matchCriteriaId": "A17C648F-8CFE-4418-8EBF-80757ABF67DA" + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.6.0:patch12:*:*:*:*:*:*", + "matchCriteriaId": "9C7423B7-A09A-4E1F-B5C7-71FB276ABEAD" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:zimbra:collaboration_server:8.6.0:p2:*:*:*:*:*:*", - "matchCriteriaId": "CFFD07C7-3E61-4C2C-82C2-4BE0F392BE3D" + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.6.0:patch2:*:*:*:*:*:*", + "matchCriteriaId": "6A4EE384-AB5A-42AB-8BD9-7B41235A3285" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:zimbra:collaboration_server:8.6.0:p3:*:*:*:*:*:*", - "matchCriteriaId": "63C3A9C3-033B-4730-B1D4-BA4B2EA1E717" + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.6.0:patch3:*:*:*:*:*:*", + "matchCriteriaId": "E06F070B-CB6E-46A8-94BE-4C036DDD79AC" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:zimbra:collaboration_server:8.6.0:p4:*:*:*:*:*:*", - "matchCriteriaId": "D45EA214-8E61-46B9-B5E3-E1F2048436C1" + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.6.0:patch4:*:*:*:*:*:*", + "matchCriteriaId": "C7932C40-61F8-4267-894B-A843D7465571" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:zimbra:collaboration_server:8.6.0:p5:*:*:*:*:*:*", - "matchCriteriaId": "1E341AFD-76EE-4D69-842E-E9E69A6482F1" + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.6.0:patch5:*:*:*:*:*:*", + "matchCriteriaId": "72038138-CDB7-4790-A5C7-5F0EC6334A0D" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:zimbra:collaboration_server:8.6.0:p6:*:*:*:*:*:*", - "matchCriteriaId": "32B34C20-8F04-419D-8F69-A15DB1BD1DE3" + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.6.0:patch6:*:*:*:*:*:*", + "matchCriteriaId": "B0677BB2-9D02-4F88-8210-969ECBC23C30" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:zimbra:collaboration_server:8.6.0:p7:*:*:*:*:*:*", - "matchCriteriaId": "A1D3A234-603E-47FC-AC89-F868BEF557E4" + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.6.0:patch7:*:*:*:*:*:*", + "matchCriteriaId": "F182ED10-C40E-4B90-AEBA-0C54B7D1BF6D" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:zimbra:collaboration_server:8.6.0:p8:*:*:*:*:*:*", - "matchCriteriaId": "DB10A55D-3708-4C7E-8B15-C28AFB80ADED" + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.6.0:patch8:*:*:*:*:*:*", + "matchCriteriaId": "ABBDA068-C4C8-4FE7-9E86-8778FD24B8F5" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:zimbra:collaboration_server:8.6.0:p9:*:*:*:*:*:*", - "matchCriteriaId": "A1E7168D-2BB7-4CC1-92B3-AFA4CECC4440" + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.6.0:patch9:*:*:*:*:*:*", + "matchCriteriaId": "D1C95543-0162-4F9A-A9F5-8D2534210489" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:zimbra:collaboration_server:8.7.11:-:*:*:*:*:*:*", - "matchCriteriaId": "CC3B2D35-FC6E-45CB-A0D1-F3EDD4035094" + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.7.11:-:*:*:*:*:*:*", + "matchCriteriaId": "A98A1461-959C-4FC5-8860-76C3A9605F41" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:zimbra:collaboration_server:8.7.11:p1:*:*:*:*:*:*", - "matchCriteriaId": "27F59D2D-BE7E-490F-8C7B-09145FF18243" + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.7.11:patch1:*:*:*:*:*:*", + "matchCriteriaId": "BD265B8F-EA30-4871-86C2-92C04611A947" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:zimbra:collaboration_server:8.7.11:p2:*:*:*:*:*:*", - "matchCriteriaId": "B815B700-6242-434E-A4DF-50CAF01F7088" + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.7.11:patch10:*:*:*:*:*:*", + "matchCriteriaId": "C2D22C23-0CDC-4D9C-AC2B-16338802D0E4" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:zimbra:collaboration_server:8.7.11:p3:*:*:*:*:*:*", - "matchCriteriaId": "EB38E99F-B630-4389-8159-6E8ED61416DA" + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.7.11:patch2:*:*:*:*:*:*", + "matchCriteriaId": "A2FF8E1C-C700-45D1-B834-E23BF241DCC5" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:zimbra:collaboration_server:8.7.11:p4:*:*:*:*:*:*", - "matchCriteriaId": "D1B6501F-8E63-4672-A40F-D79D068861CD" + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.7.11:patch3:*:*:*:*:*:*", + "matchCriteriaId": "BA825F54-5CD7-4D27-88B1-CEEC5AE7EE93" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:zimbra:collaboration_server:8.7.11:p5:*:*:*:*:*:*", - "matchCriteriaId": "815E22AF-7406-4B70-9A85-F9E6B875A3E5" + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.7.11:patch4:*:*:*:*:*:*", + "matchCriteriaId": "81BA5A67-A156-4298-A61F-B968DE5572EF" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:zimbra:collaboration_server:8.7.11:p6:*:*:*:*:*:*", - "matchCriteriaId": "42C87747-2220-4856-8AEF-EF6F7C889FCC" + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.7.11:patch5:*:*:*:*:*:*", + "matchCriteriaId": "6E82DF8E-F9AA-4E40-AD8F-63E696249822" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:zimbra:collaboration_server:8.7.11:p7:*:*:*:*:*:*", - "matchCriteriaId": "E809B8B9-829B-4483-B85C-0B58A73BD24B" + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.7.11:patch6:*:*:*:*:*:*", + "matchCriteriaId": "5524DBD2-8E86-4F7F-B958-01B0C1AB002C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:zimbra:collaboration_server:8.7.11:p8:*:*:*:*:*:*", - "matchCriteriaId": "9939EE2E-99C6-4697-9385-E470D31416B0" + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.7.11:patch7:*:*:*:*:*:*", + "matchCriteriaId": "33E6EF4B-DFBE-4C8A-AC45-335E4DACB34A" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:zimbra:collaboration_server:8.7.11:p9:*:*:*:*:*:*", - "matchCriteriaId": "D42CECDD-9DD7-4C24-ACCD-C2F876A2750F" + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.7.11:patch8:*:*:*:*:*:*", + "matchCriteriaId": "640B50EA-C8F2-4EA7-8138-0E0F7942D3FB" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:zimbra:collaboration_server:8.8.10:-:*:*:*:*:*:*", - "matchCriteriaId": "325FBDCD-13CB-4DC6-BBAA-592F37FDE5C0" + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.7.11:patch9:*:*:*:*:*:*", + "matchCriteriaId": "4BCDDD0B-0E2E-4A02-99B2-C74BD103C7A9" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:zimbra:collaboration_server:8.8.10:p1:*:*:*:*:*:*", - "matchCriteriaId": "19CD7665-5C06-46AF-B2D6-5ED0000AF98C" + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.9:-:*:*:*:*:*:*", + "matchCriteriaId": "01E60F13-49E8-45C7-80D0-3FE174C26AA4" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:zimbra:collaboration_server:8.8.10:p2:*:*:*:*:*:*", - "matchCriteriaId": "A945C9FA-DA43-426D-8E02-4FCBC8A2B8FD" + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.9:p5:*:*:*:*:*:*", + "matchCriteriaId": "E2700268-0FA5-4657-B896-590C8F67DD2C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:zimbra:collaboration_server:8.8.10:p3:*:*:*:*:*:*", - "matchCriteriaId": "8254749E-E88D-44D5-9644-B6DD3E7574C9" + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.9:patch1:*:*:*:*:*:*", + "matchCriteriaId": "E55B35D0-6AEF-4746-A895-63D3840DFF01" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:zimbra:collaboration_server:8.8.10:p4:*:*:*:*:*:*", - "matchCriteriaId": "B468616F-0F41-4F53-98A3-102617A92C59" + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.9:patch2:*:*:*:*:*:*", + "matchCriteriaId": "998D6937-06A3-40B3-B059-0EC7E28E1CB9" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:zimbra:collaboration_server:8.8.10:p5:*:*:*:*:*:*", - "matchCriteriaId": "14BEBF0D-F2C1-49D9-A02F-7CD6B4D81D55" + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.9:patch3:*:*:*:*:*:*", + "matchCriteriaId": "907F7ECA-5D3D-46E4-9504-FD75C1CEEEED" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:zimbra:collaboration_server:8.8.10:p6:*:*:*:*:*:*", - "matchCriteriaId": "2C8CF223-3E24-4452-9B3C-701F15680584" + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.9:patch4:*:*:*:*:*:*", + "matchCriteriaId": "7E95C6B4-4316-43D2-8279-945CFFCF7C59" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:zimbra:collaboration_server:8.8.11:-:*:*:*:*:*:*", - "matchCriteriaId": "25546B97-61AA-480F-AA66-9F6C0DD25F23" + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.9:patch6:*:*:*:*:*:*", + "matchCriteriaId": "34391900-6320-46CF-8A77-35CC6F217ADD" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:zimbra:collaboration_server:8.8.11:p1:*:*:*:*:*:*", - "matchCriteriaId": "CD145A57-203B-450A-B79B-602C66BCE58C" + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.9:patch7:*:*:*:*:*:*", + "matchCriteriaId": "EB0B89FF-4BB7-4AA3-9CFF-7E4BAECDE4D1" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:zimbra:collaboration_server:8.8.11:p2:*:*:*:*:*:*", - "matchCriteriaId": "DB0E3CA9-6687-483A-8BC4-6046AC7A846F" + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.9:patch8:*:*:*:*:*:*", + "matchCriteriaId": "86447807-6AAF-428B-927A-277869782BBA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.9:patch9:*:*:*:*:*:*", + "matchCriteriaId": "6FECDF27-FBB2-4189-9164-53AF0BD338D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.10:-:*:*:*:*:*:*", + "matchCriteriaId": "EEE708DD-3340-4190-B3B0-D102D798C091" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.10:patch1:*:*:*:*:*:*", + "matchCriteriaId": "766B9A21-CD09-4A9F-9637-9A40ABB44513" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.10:patch2:*:*:*:*:*:*", + "matchCriteriaId": "3C49F150-FF50-42AB-8710-B518EC78306A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.10:patch3:*:*:*:*:*:*", + "matchCriteriaId": "0DE64748-4F42-46AC-8536-BAD4C6C0D951" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.10:patch4:*:*:*:*:*:*", + "matchCriteriaId": "C3A4D1E3-D075-46DF-BA0A-C343992559FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.10:patch6:*:*:*:*:*:*", + "matchCriteriaId": "94FBCF3B-BF84-40B3-9FE3-B4F87144E06E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.10:patch7:*:*:*:*:*:*", + "matchCriteriaId": "212959A7-A966-43EC-801A-35C4AF617CF4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.11:-:*:*:*:*:*:*", + "matchCriteriaId": "A0B38B6A-83D3-4983-A4E7-4A1418C3F0D9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.11:patch1:*:*:*:*:*:*", + "matchCriteriaId": "7E0EA919-7260-4878-88A7-53AD15649634" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.11:patch2:*:*:*:*:*:*", + "matchCriteriaId": "D586F989-0EDD-40D3-B839-CEE9BC56999A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.11:patch3:*:*:*:*:*:*", + "matchCriteriaId": "7E11310D-3A18-47B2-836F-75B205032AF3" } ] } @@ -321,7 +379,12 @@ }, { "url": "http://packetstormsecurity.com/files/153190/Zimbra-XML-Injection-Server-Side-Request-Forgery.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.rapid7.com/db/modules/exploit/linux/http/zimbra_xxe_rce", @@ -347,7 +410,10 @@ }, { "url": "https://bugzilla.zimbra.com/show_bug.cgi?id=109127", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://wiki.zimbra.com/wiki/Security_Center", @@ -384,7 +450,12 @@ }, { "url": "http://packetstormsecurity.com/files/153190/Zimbra-XML-Injection-Server-Side-Request-Forgery.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.rapid7.com/db/modules/exploit/linux/http/zimbra_xxe_rce", @@ -410,7 +481,10 @@ }, { "url": "https://bugzilla.zimbra.com/show_bug.cgi?id=109127", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://wiki.zimbra.com/wiki/Security_Center", diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3107.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3107.json index 73385858863..efd6bab258d 100644 --- a/CVE-2023/CVE-2023-31xx/CVE-2023-3107.json +++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3107.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3107", "sourceIdentifier": "secteam@freebsd.org", "published": "2023-08-01T23:15:30.580", - "lastModified": "2025-02-13T17:16:55.347", + "lastModified": "2025-07-09T14:15:26.207", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-348xx/CVE-2023-34872.json b/CVE-2023/CVE-2023-348xx/CVE-2023-34872.json index f95cde6dbdb..ae4474381e5 100644 --- a/CVE-2023/CVE-2023-348xx/CVE-2023-34872.json +++ b/CVE-2023/CVE-2023-348xx/CVE-2023-34872.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34872", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-31T14:15:10.427", - "lastModified": "2024-11-21T08:07:39.720", + "lastModified": "2025-07-09T14:15:24.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3735.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3735.json index f06d3689681..bfc4af5a687 100644 --- a/CVE-2023/CVE-2023-37xx/CVE-2023-3735.json +++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3735.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3735", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-08-01T23:15:32.773", - "lastModified": "2024-11-21T08:17:56.687", + "lastModified": "2025-07-09T14:15:26.490", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-838" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13059.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13059.json index 86a80a9c1f4..63f50bfd16c 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13059.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13059.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13059", "sourceIdentifier": "security@huntr.dev", "published": "2025-02-10T19:15:37.587", - "lastModified": "2025-02-11T00:15:28.563", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-09T15:11:29.243", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,20 +49,59 @@ "value": "CWE-29" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mintplexlabs:anythingllm:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.3.1", + "matchCriteriaId": "B3A39FD4-F125-4AF1-86A0-CA2F8AD2A178" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/mintplex-labs/anything-llm/commit/0b7bf68f2c02ca68075970fbf85d5a70ca5e94ca", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/92a875fe-c5b3-485c-b03f-d3185189e0b1", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://huntr.com/bounties/92a875fe-c5b3-485c-b03f-d3185189e0b1", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1511.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1511.json index 19c22e4ff72..068f7e68861 100644 --- a/CVE-2024/CVE-2024-15xx/CVE-2024-1511.json +++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1511.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1511", "sourceIdentifier": "security@huntr.dev", "published": "2024-04-10T17:15:51.670", - "lastModified": "2024-11-21T08:50:44.160", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T14:08:00.500", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lollms:lollms_web_ui:9.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2399B0FB-25C6-49CD-B523-0839533EAC2D" + } + ] + } + ] + } + ], "references": [ { "url": "https://huntr.com/bounties/62b77589-772d-4d6e-aef4-2aec4cfe5f8b", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://huntr.com/bounties/62b77589-772d-4d6e-aef4-2aec4cfe5f8b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1520.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1520.json index 0c664990cc7..ca34872fbcf 100644 --- a/CVE-2024/CVE-2024-15xx/CVE-2024-1520.json +++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1520.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1520", "sourceIdentifier": "security@huntr.dev", "published": "2024-04-10T17:15:51.930", - "lastModified": "2024-11-21T08:50:44.787", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T14:14:56.047", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lollms:lollms_web_ui:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0", + "versionEndExcluding": "9.2", + "matchCriteriaId": "9E0EC7FC-C4F9-4BEE-82D6-3845F3BE3A92" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/parisneo/lollms-webui/commit/2497d1a4fe5a09f003bf7a9bc426139e9295a934", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/405c2059-3fe9-4233-8eed-741ec847d181", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/parisneo/lollms-webui/commit/2497d1a4fe5a09f003bf7a9bc426139e9295a934", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/405c2059-3fe9-4233-8eed-741ec847d181", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1600.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1600.json index 310f6fd0d38..859a54b002d 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1600.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1600.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1600", "sourceIdentifier": "security@huntr.dev", "published": "2024-04-10T17:15:52.317", - "lastModified": "2024-11-21T08:50:55.133", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T14:14:24.293", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lollms:lollms_web_ui:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0", + "versionEndExcluding": "9.6", + "matchCriteriaId": "E4CAE6D2-7A95-44AB-AB97-258F7580CE2F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/parisneo/lollms-webui/commit/49b0332e98d42dd5204dda53dee410b160106265", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/29ec621a-bd69-4225-ab0f-5bb8a1d10c67", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/parisneo/lollms-webui/commit/49b0332e98d42dd5204dda53dee410b160106265", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/29ec621a-bd69-4225-ab0f-5bb8a1d10c67", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1602.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1602.json index 387f6d56025..45288ae6ef5 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1602.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1602.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1602", "sourceIdentifier": "security@huntr.dev", "published": "2024-04-10T17:15:52.537", - "lastModified": "2024-11-21T08:50:55.387", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T14:14:04.560", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -51,14 +73,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lollms:lollms_web_ui:9.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2399B0FB-25C6-49CD-B523-0839533EAC2D" + } + ] + } + ] + } + ], "references": [ { "url": "https://huntr.com/bounties/59be0d5a-f18e-4418-8f29-72320269a097", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://huntr.com/bounties/59be0d5a-f18e-4418-8f29-72320269a097", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2178.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2178.json index 36601afda7b..1f6fb906970 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2178.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2178.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2178", "sourceIdentifier": "security@huntr.dev", "published": "2024-06-02T11:15:07.390", - "lastModified": "2024-11-21T09:09:11.810", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T14:25:18.873", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lollms:lollms_web_ui:*:*:*:*:*:*:*:*", + "versionEndExcluding": "9.4", + "matchCriteriaId": "E8DA02EF-1A49-47C3-B2E4-5F70C25D8B34" + } + ] + } + ] + } + ], "references": [ { "url": "https://huntr.com/bounties/e585f1dd-a026-4419-8f42-5835e85fad9e", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking", + "Patch" + ] }, { "url": "https://huntr.com/bounties/e585f1dd-a026-4419-8f42-5835e85fad9e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2299.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2299.json index f3b4acce05e..9191e26f41b 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2299.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2299.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2299", "sourceIdentifier": "security@huntr.dev", "published": "2024-05-14T15:18:47.760", - "lastModified": "2024-11-21T09:09:27.393", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T14:41:13.210", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -51,14 +73,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lollms:lollms_web_ui:*:*:*:*:*:*:*:*", + "versionEndExcluding": "9.5", + "matchCriteriaId": "E7DA38B5-6496-47C5-88AF-17C4AF269B59" + } + ] + } + ] + } + ], "references": [ { "url": "https://huntr.com/bounties/f1adaac0-b9ed-4093-a0f3-2d0a4ecba398", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking", + "Patch" + ] }, { "url": "https://huntr.com/bounties/f1adaac0-b9ed-4093-a0f3-2d0a4ecba398", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-239xx/CVE-2024-23928.json b/CVE-2024/CVE-2024-239xx/CVE-2024-23928.json index f31f79aae30..67abe9f65f5 100644 --- a/CVE-2024/CVE-2024-239xx/CVE-2024-23928.json +++ b/CVE-2024/CVE-2024-239xx/CVE-2024-23928.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23928", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2025-01-31T00:15:09.030", - "lastModified": "2025-07-01T14:15:31.630", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T15:22:13.007", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "ics-cert@hq.dhs.gov", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,14 +51,49 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:pioneer:dmh-wt7600nex_firmware:*:*:*:*:*:*:*:*", + "matchCriteriaId": "02D0AE30-A9A3-4FB3-80A2-6D2123004B31" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:pioneer:dmh-wt7600nex:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E9082E28-D451-488C-A621-4A174B887EB3" + } + ] + } + ] + } + ], "references": [ { "url": "https://jpn.pioneer/ja/car/dl/dmh-sz700_sf700/", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "Product" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1045/", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2358.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2358.json index e380d7c4235..3520cfc9df6 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2358.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2358.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2358", "sourceIdentifier": "security@huntr.dev", "published": "2024-05-16T09:15:09.800", - "lastModified": "2024-11-21T09:09:35.293", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T14:39:33.337", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lollms:lollms_web_ui:*:*:*:*:*:*:*:*", + "versionEndExcluding": "9.5", + "matchCriteriaId": "E7DA38B5-6496-47C5-88AF-17C4AF269B59" + } + ] + } + ] + } + ], "references": [ { "url": "https://huntr.com/bounties/b2771df3-be50-45bd-93c4-0974ce38bc22", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking", + "Patch" + ] }, { "url": "https://huntr.com/bounties/b2771df3-be50-45bd-93c4-0974ce38bc22", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2361.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2361.json index faf583408ce..c427c038837 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2361.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2361.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2361", "sourceIdentifier": "security@huntr.dev", "published": "2024-05-16T09:15:10.060", - "lastModified": "2024-11-21T09:09:35.667", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T14:38:45.987", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lollms:lollms_web_ui:*:*:*:*:*:*:*:*", + "versionEndExcluding": "9.5", + "matchCriteriaId": "E7DA38B5-6496-47C5-88AF-17C4AF269B59" + } + ] + } + ] + } + ], "references": [ { "url": "https://huntr.com/bounties/cd383817-924a-445a-838e-d0c867c6a176", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking", + "Patch" + ] }, { "url": "https://huntr.com/bounties/cd383817-924a-445a-838e-d0c867c6a176", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2366.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2366.json index 4675891398a..07f24b2ce88 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2366.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2366.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2366", "sourceIdentifier": "security@huntr.dev", "published": "2024-05-16T09:15:10.287", - "lastModified": "2024-11-21T09:09:36.327", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T14:37:53.760", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lollms:lollms_web_ui:*:*:*:*:*:*:*:*", + "versionEndExcluding": "9.5", + "matchCriteriaId": "E7DA38B5-6496-47C5-88AF-17C4AF269B59" + } + ] + } + ] + } + ], "references": [ { "url": "https://huntr.com/bounties/63266c77-408b-45ff-962c-8163db50a864", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking", + "Patch" + ] }, { "url": "https://huntr.com/bounties/63266c77-408b-45ff-962c-8163db50a864", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3126.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3126.json index c3ea835d156..72a54ee7c48 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3126.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3126.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3126", "sourceIdentifier": "security@huntr.dev", "published": "2024-05-16T09:15:13.840", - "lastModified": "2024-11-21T09:28:57.510", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T14:36:46.093", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,58 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lollms:lollms_web_ui:*:*:*:*:*:*:*:*", + "versionEndExcluding": "9.5", + "matchCriteriaId": "E7DA38B5-6496-47C5-88AF-17C4AF269B59" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/parisneo/lollms-webui/commit/41dbb1b3f2e78ea276e5269544e50514252c0c25", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/0e2bec70-826e-4c24-8015-31921e23fd12", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking", + "Patch" + ] }, { "url": "https://github.com/parisneo/lollms-webui/commit/41dbb1b3f2e78ea276e5269544e50514252c0c25", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/0e2bec70-826e-4c24-8015-31921e23fd12", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-324xx/CVE-2024-32488.json b/CVE-2024/CVE-2024-324xx/CVE-2024-32488.json index 59a995fa2b4..f92fe5b1644 100644 --- a/CVE-2024/CVE-2024-324xx/CVE-2024-32488.json +++ b/CVE-2024/CVE-2024-324xx/CVE-2024-32488.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32488", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-15T06:15:07.863", - "lastModified": "2024-11-21T09:15:00.873", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T14:52:10.653", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,84 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.1.12.37872", + "matchCriteriaId": "C9D011A1-EE2D-4D61-B5B5-E862EBD88F8A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.0.0", + "versionEndExcluding": "11.2.8.53842", + "matchCriteriaId": "C1C6E513-5F37-4C0C-B079-F987E55CDDB7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.0.0", + "versionEndExcluding": "12.1.4.15400", + "matchCriteriaId": "94EE6FF3-2762-417B-87C3-A212E655DC7B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0.0", + "versionEndExcluding": "13.0.1.21693", + "matchCriteriaId": "07D509A7-E4DB-4A8D-B8E1-4CF9F1FCC861" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2023.1.0.15510", + "versionEndExcluding": "2023.3.0.23028", + "matchCriteriaId": "8EFD226E-D837-43CD-8FA3-501779AAB780" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:foxit:pdf_reader:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2023.3.0.23028", + "matchCriteriaId": "3B8CFDB3-13D5-45AD-9780-A97779F2392D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.foxit.com/support/security-bulletins.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.foxit.com/support/security-bulletins.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-325xx/CVE-2024-32568.json b/CVE-2024/CVE-2024-325xx/CVE-2024-32568.json index f76f3e559d6..a85443161b6 100644 --- a/CVE-2024/CVE-2024-325xx/CVE-2024-32568.json +++ b/CVE-2024/CVE-2024-325xx/CVE-2024-32568.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32568", "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-18T10:15:11.100", - "lastModified": "2024-11-21T09:15:11.960", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-09T14:56:18.497", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:melapress:wp_2fa:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.6.3", + "matchCriteriaId": "B24A6393-4603-478F-ADE7-EACC297068A5" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wp-2fa/wordpress-wp-2fa-plugin-2-6-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/wp-2fa/wordpress-wp-2fa-plugin-2-6-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-34xx/CVE-2024-3435.json b/CVE-2024/CVE-2024-34xx/CVE-2024-3435.json index 2dfd66dd576..35896dc6a70 100644 --- a/CVE-2024/CVE-2024-34xx/CVE-2024-3435.json +++ b/CVE-2024/CVE-2024-34xx/CVE-2024-3435.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3435", "sourceIdentifier": "security@huntr.dev", "published": "2024-05-16T09:15:14.290", - "lastModified": "2024-11-21T09:29:36.027", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T14:33:50.620", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,58 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lollms:lollms_web_ui:*:*:*:*:*:*:*:*", + "versionEndExcluding": "9.5", + "matchCriteriaId": "E7DA38B5-6496-47C5-88AF-17C4AF269B59" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/parisneo/lollms-webui/commit/bb99b59e710d00c4f2598faa5e183fa30fbd3bc2", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/494f349a-8650-4d30-a0bd-4742fda44ce5", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking", + "Patch" + ] }, { "url": "https://github.com/parisneo/lollms-webui/commit/bb99b59e710d00c4f2598faa5e183fa30fbd3bc2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/494f349a-8650-4d30-a0bd-4742fda44ce5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-351xx/CVE-2024-35164.json b/CVE-2024/CVE-2024-351xx/CVE-2024-35164.json index 7a6cd981d58..b95fb185bf9 100644 --- a/CVE-2024/CVE-2024-351xx/CVE-2024-35164.json +++ b/CVE-2024/CVE-2024-351xx/CVE-2024-35164.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35164", "sourceIdentifier": "security@apache.org", "published": "2025-07-02T12:15:27.770", - "lastModified": "2025-07-03T15:13:53.147", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-09T15:24:36.757", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 5.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 } ] }, @@ -49,12 +69,45 @@ "value": "CWE-129" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:guacamole:*:*:*:*:*:*:*:*", + "versionStartIncluding": "0.8.0", + "versionEndExcluding": "1.6.0", + "matchCriteriaId": "C4DFA73D-049A-4EC8-87D8-907E13733558" + } + ] + } + ] } ], "references": [ { "url": "https://lists.apache.org/thread/sgs8lplbkrpvd3hrvcnnxh3028h4py70", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37663.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37663.json index 7d2c9b7f4b8..b9a7cc19bcf 100644 --- a/CVE-2024/CVE-2024-376xx/CVE-2024-37663.json +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37663.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37663", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-17T18:15:17.653", - "lastModified": "2024-11-22T16:15:24.273", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T15:13:50.520", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:mi:redmi_ax6s_firmware:1.0.57:*:*:*:*:*:*:*", + "matchCriteriaId": "1363B726-7865-4041-86AD-B5BF28BF5685" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mi:redmi_ax6s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D0923D4E-7087-4FAB-BD00-B82A9E9F5FC5" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ouuan/router-vuln-report/blob/master/icmp-redirect/redmi-rb03-redirect.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/ouuan/router-vuln-report/blob/master/icmp-redirect/redmi-rb03-redirect.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37664.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37664.json index 04b2a4dfb8f..6d6d7d15598 100644 --- a/CVE-2024/CVE-2024-376xx/CVE-2024-37664.json +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37664.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37664", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-17T18:15:17.743", - "lastModified": "2024-11-22T16:15:24.463", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T15:05:21.807", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:mi:redmi_ax6s_firmware:1.0.57:*:*:*:*:*:*:*", + "matchCriteriaId": "1363B726-7865-4041-86AD-B5BF28BF5685" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mi:redmi_ax6s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D0923D4E-7087-4FAB-BD00-B82A9E9F5FC5" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ouuan/router-vuln-report/blob/master/nat-rst/redmi-rb03-nat-rst.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/ouuan/router-vuln-report/blob/master/nat-rst/redmi-rb03-nat-rst.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-386xx/CVE-2024-38657.json b/CVE-2024/CVE-2024-386xx/CVE-2024-38657.json index ec1dd50abc3..e41dd19e936 100644 --- a/CVE-2024/CVE-2024-386xx/CVE-2024-38657.json +++ b/CVE-2024/CVE-2024-386xx/CVE-2024-38657.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38657", "sourceIdentifier": "support@hackerone.com", "published": "2025-02-21T02:15:28.860", - "lastModified": "2025-02-21T16:15:32.340", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T14:50:48.063", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "support@hackerone.com", @@ -51,10 +73,112 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:*:*:*:*:*:*:*:*", + "versionEndExcluding": "22.7", + "matchCriteriaId": "201EB882-0B2A-47DB-B517-1E72A0542B27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:-:*:*:*:*:*:*", + "matchCriteriaId": "F788F6D9-5368-4B8E-BFA0-E8FB3CDADB01" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1:*:*:*:*:*:*", + "matchCriteriaId": "2927A40D-E8A3-4DB6-9C93-04A6C6035C3D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.1:*:*:*:*:*:*", + "matchCriteriaId": "1399BBB4-E62B-4FF6-B9E3-6AAC68D4D583" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.2:*:*:*:*:*:*", + "matchCriteriaId": "1EAD1423-4477-4C35-BF93-697A2C0697C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.3:*:*:*:*:*:*", + "matchCriteriaId": "858353BC-12CB-4014-BFCA-DA7B1B3DD4B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.4:*:*:*:*:*:*", + "matchCriteriaId": "865F72BF-57B2-4B0C-BACE-3500E0AE6751" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.5:*:*:*:*:*:*", + "matchCriteriaId": "39E11407-E0C0-454F-B731-7DA4CBC696EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2:*:*:*:*:*:*", + "matchCriteriaId": "247E71F8-A03B-4097-B7BF-09F8BF3ED4D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.1:*:*:*:*:*:*", + "matchCriteriaId": "E0059C69-4A18-4153-9D9A-5C1B03AD1453" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.2:*:*:*:*:*:*", + "matchCriteriaId": "FC523C88-115E-4CD9-A8CB-AE6E6610F7D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.3:*:*:*:*:*:*", + "matchCriteriaId": "3447428E-DBCD-4553-B51D-AC08ECAFD881" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:*:*:*:*:*:*:*:*", + "versionEndExcluding": "22.7", + "matchCriteriaId": "FAD0FC91-CA1E-4DC3-A37E-1BF98906D07C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:22.7:-:*:*:*:*:*:*", + "matchCriteriaId": "1F22B988-2585-4853-9838-AB3746C8B888" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:22.7:r1:*:*:*:*:*:*", + "matchCriteriaId": "FD9BE8C2-43EB-4870-A4B7-267CB17A19F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:22.7:r1.1:*:*:*:*:*:*", + "matchCriteriaId": "C8915BB2-C1C0-4189-A847-DDB2EF161D62" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:22.7:r1.2:*:*:*:*:*:*", + "matchCriteriaId": "8D24A8DB-D697-4C60-935D-B08EE36861CB" + } + ] + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/February-Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-and-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-391xx/CVE-2024-39123.json b/CVE-2024/CVE-2024-391xx/CVE-2024-39123.json index f126cc5711a..882f2272adc 100644 --- a/CVE-2024/CVE-2024-391xx/CVE-2024-39123.json +++ b/CVE-2024/CVE-2024-391xx/CVE-2024-39123.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39123", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-19T20:15:07.797", - "lastModified": "2024-11-21T09:27:12.653", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T15:28:45.570", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,41 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*", + "versionStartIncluding": "0.6.0", + "versionEndIncluding": "0.6.21", + "matchCriteriaId": "94480F88-F928-41E1-8674-92970EDCC8F7" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/pentesttoolscom/vulnerability-research/tree/master/CVE-2024-39123", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/pentesttoolscom/vulnerability-research/tree/master/CVE-2024-39123", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-399xx/CVE-2024-39962.json b/CVE-2024/CVE-2024-399xx/CVE-2024-39962.json index 0585f0722ec..165ca3e7818 100644 --- a/CVE-2024/CVE-2024-399xx/CVE-2024-39962.json +++ b/CVE-2024/CVE-2024-399xx/CVE-2024-39962.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39962", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-19T15:15:10.320", - "lastModified": "2024-11-21T09:28:38.377", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T15:30:52.603", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dir-823x_firmware:240126:*:*:*:*:*:*:*", + "matchCriteriaId": "3C63FF02-C46A-4DD9-AEB0-72FF5D4C2ABF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dir-823x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "09CE2627-49F3-4B6F-B48B-F52665C6B8C6" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Swind1er/40c33f1b1549028677cb4e2e5ef69109", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://gist.github.com/Swind1er/40c33f1b1549028677cb4e2e5ef69109", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-415xx/CVE-2024-41597.json b/CVE-2024/CVE-2024-415xx/CVE-2024-41597.json index 1aeda8b799e..80e4bed5948 100644 --- a/CVE-2024/CVE-2024-415xx/CVE-2024-41597.json +++ b/CVE-2024/CVE-2024-415xx/CVE-2024-41597.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41597", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-19T20:15:08.993", - "lastModified": "2024-11-21T09:32:49.140", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T15:23:41.090", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:processwire:processwire:3.0.229:*:*:*:*:*:*:*", + "matchCriteriaId": "DA6F3D4C-8845-44FF-A021-F202C57F38CF" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/DefensiumDevelopers/608be4d10b016dce0566925368a8b08c#file-cve-2024-41597-md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://gist.github.com/DefensiumDevelopers/608be4d10b016dce0566925368a8b08c#file-cve-2024-41597-md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-428xx/CVE-2024-42815.json b/CVE-2024/CVE-2024-428xx/CVE-2024-42815.json index ef57a50081d..20dca01eb89 100644 --- a/CVE-2024/CVE-2024-428xx/CVE-2024-42815.json +++ b/CVE-2024/CVE-2024-428xx/CVE-2024-42815.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42815", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-19T20:15:07.193", - "lastModified": "2024-10-24T20:35:07.330", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T14:47:20.853", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tp-link:re365_firmware:180213:*:*:*:*:*:*:*", + "matchCriteriaId": "23EAC17A-EE9B-4288-BA52-EB6C59770B91" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tp-link:re365:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B15C75BF-B2B9-4734-8FF2-6EA57B14DF8C" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/XiaoCurry/14d46e0becd79d9bb9907f2fbe147cfe", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://securityonline.info/cve-2024-42815-cvss-9-8-buffer-overflow-flaw-in-tp-link-routers-opens-door-to-rce/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4322.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4322.json index ffe04445aa2..3338e1695cd 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4322.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4322.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4322", "sourceIdentifier": "security@huntr.dev", "published": "2024-05-16T09:15:16.613", - "lastModified": "2024-11-21T09:42:37.400", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T14:32:00.963", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lollms:lollms_web_ui:*:*:*:*:*:*:*:*", + "versionEndExcluding": "9.8", + "matchCriteriaId": "B8698D4D-FA1A-40D5-9DD2-0804D296907C" + } + ] + } + ] + } + ], "references": [ { "url": "https://huntr.com/bounties/5116d858-ce00-418c-a5a5-851c5608c209", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking", + "Patch" + ] }, { "url": "https://huntr.com/bounties/5116d858-ce00-418c-a5a5-851c5608c209", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4326.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4326.json index 8c3b7aaf66c..8ff007254ba 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4326.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4326.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4326", "sourceIdentifier": "security@huntr.dev", "published": "2024-05-16T09:15:16.887", - "lastModified": "2024-11-21T09:42:37.887", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T14:29:46.210", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,58 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lollms:lollms_web_ui:*:*:*:*:*:*:*:*", + "versionEndExcluding": "9.5", + "matchCriteriaId": "E7DA38B5-6496-47C5-88AF-17C4AF269B59" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/parisneo/lollms-webui/commit/abb4c6d495a95a3ef5b114ffc57f85cd650b905e", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/2ab9f03d-0538-4317-be21-0748a079cbdd", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking", + "Patch" + ] }, { "url": "https://github.com/parisneo/lollms-webui/commit/abb4c6d495a95a3ef5b114ffc57f85cd650b905e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/2ab9f03d-0538-4317-be21-0748a079cbdd", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4330.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4330.json index f02fde04d0a..81fcbfb6d4d 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4330.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4330.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4330", "sourceIdentifier": "security@huntr.dev", "published": "2024-05-30T15:15:49.890", - "lastModified": "2024-11-21T09:42:38.397", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T14:27:48.867", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -51,14 +73,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lollms:lollms_web_ui:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.6", + "versionEndExcluding": "9.8", + "matchCriteriaId": "010C9279-CDD7-4D1B-8700-642A9C3A183F" + } + ] + } + ] + } + ], "references": [ { "url": "https://huntr.com/bounties/154a78d5-3960-4fc6-8666-f982b5e70ed7", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking", + "Patch" + ] }, { "url": "https://huntr.com/bounties/154a78d5-3960-4fc6-8666-f982b5e70ed7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-44xx/CVE-2024-4498.json b/CVE-2024/CVE-2024-44xx/CVE-2024-4498.json index a36cd5b28bc..b185c3c4edd 100644 --- a/CVE-2024/CVE-2024-44xx/CVE-2024-4498.json +++ b/CVE-2024/CVE-2024-44xx/CVE-2024-4498.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4498", "sourceIdentifier": "security@huntr.dev", "published": "2024-06-25T20:15:12.127", - "lastModified": "2024-11-21T09:42:57.323", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T14:24:04.403", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,43 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lollms:lollms_web_ui:9.7:*:*:*:*:*:*:*", + "matchCriteriaId": "1E7E6E82-8963-4DF4-9991-5E9905DD0A7A" + } + ] + } + ] + } + ], "references": [ { "url": "https://huntr.com/bounties/9238e88a-a6ca-4915-9b5d-6cdb4148d3f4", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking", + "Patch" + ] }, { "url": "https://huntr.com/bounties/9238e88a-a6ca-4915-9b5d-6cdb4148d3f4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4869.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4869.json index 49d9d649525..35c73e99bad 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4869.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4869.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4869", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-26T00:15:10.897", - "lastModified": "2024-11-21T09:43:45.670", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-09T15:13:14.877", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,33 +36,101 @@ }, "exploitabilityScore": 3.9, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpeka:wp_cookie_consent:*:*:*:*:-:wordpress:*:*", + "versionEndExcluding": "3.3.0", + "matchCriteriaId": "39D102EE-1283-4791-929E-F82DD0675DF6" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/gdpr-cookie-consent/tags/3.2.0/public/class-gdpr-cookie-consent-public.php#L793", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/gdpr-cookie-consent/tags/3.2.0/public/modules/consent-logs/class-wpl-cookie-consent-consent-logs.php#L570", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/507b2e65-987b-4d4a-8a99-5366048d925e?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/gdpr-cookie-consent/tags/3.2.0/public/class-gdpr-cookie-consent-public.php#L793", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/gdpr-cookie-consent/tags/3.2.0/public/modules/consent-logs/class-wpl-cookie-consent-consent-logs.php#L570", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/507b2e65-987b-4d4a-8a99-5366048d925e?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4897.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4897.json index 5d1b5faafb3..da83fde1ab1 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4897.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4897.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4897", "sourceIdentifier": "security@huntr.dev", "published": "2024-07-02T15:15:11.853", - "lastModified": "2024-11-21T09:43:49.010", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T14:22:10.363", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lollms:lollms_web_ui:*:*:*:*:*:*:*:*", + "versionEndExcluding": "9.8", + "matchCriteriaId": "B8698D4D-FA1A-40D5-9DD2-0804D296907C" + } + ] + } + ] + } + ], "references": [ { "url": "https://huntr.com/bounties/ecf386df-4b6a-40b2-9000-db0974355acc", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking", + "Patch" + ] }, { "url": "https://huntr.com/bounties/ecf386df-4b6a-40b2-9000-db0974355acc", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57605.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57605.json index 0c2222a0e10..58a7f0611a1 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57605.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57605.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57605", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T22:15:41.210", - "lastModified": "2025-03-19T15:15:52.740", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T15:03:30.957", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E3A44312-83D2-4421-9A35-3FD048EA578A" + } + ] + } + ] + } + ], "references": [ { "url": "https://hkohi.ca/vulnerability/3", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57969.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57969.json index 0e0113ea1d4..2f73bf3151b 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57969.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57969.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57969", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-14T07:15:32.340", - "lastModified": "2025-02-14T07:15:32.340", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T15:00:03.157", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:misp:misp:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.4.198", + "matchCriteriaId": "3D77A5E8-3E54-4F32-9888-521C71F53A1F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/MISP/MISP/commit/4f27f83a775aba4d3cca9255f69c3c9998b7df7f", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/MISP/MISP/compare/v2.4.197...v2.4.198", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6250.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6250.json index 4215fc403ab..f6b466afbab 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6250.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6250.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6250", "sourceIdentifier": "security@huntr.dev", "published": "2024-06-27T19:15:20.280", - "lastModified": "2024-11-21T09:49:16.530", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T14:23:34.807", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,41 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lollms:lollms_web_ui:9.6:*:*:*:*:*:*:*", + "matchCriteriaId": "3E1D9151-8F98-4B92-B63D-E911ED3AD347" + } + ] + } + ] + } + ], "references": [ { "url": "https://huntr.com/bounties/11a8bf9d-16f3-49b3-b5fc-ad36d8993c73", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://huntr.com/bounties/11a8bf9d-16f3-49b3-b5fc-ad36d8993c73", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6394.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6394.json index 5ddd7ce50e7..a7762e2ec20 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6394.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6394.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6394", "sourceIdentifier": "security@huntr.dev", "published": "2024-09-30T08:15:03.850", - "lastModified": "2024-09-30T12:45:57.823", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T14:18:48.220", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lollms:lollms_web_ui:9.8:*:*:*:*:*:*:*", + "matchCriteriaId": "D9177E7C-9C27-4C3C-AC97-7F277FEEC725" + } + ] + } + ] + } + ], "references": [ { "url": "https://huntr.com/bounties/6df4f990-b632-4791-b3ea-f40c9ea905bf", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6448.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6448.json index 9c52d45554e..7b160b6ad63 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6448.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6448.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6448", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-28T04:15:11.320", - "lastModified": "2024-08-28T12:57:27.610", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-09T14:42:18.463", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,20 +49,57 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mollie:mollie_payments_for_woocommerce:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "7.8.0", + "matchCriteriaId": "3CA2B828-83D7-45A5-B60E-173D63FDB4BA" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/mollie-payments-for-woocommerce/tags/7.5.5/vendor/mollie/mollie-api-php/examples/initialize.php#L5", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3142176%40mollie-payments-for-woocommerce&new=3142176%40mollie-payments-for-woocommerce&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0c98026c-28a9-4c69-9f34-4c3bd4f75d85?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9919.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9919.json index 3f758ad9bf6..b2c8fa334e6 100644 --- a/CVE-2024/CVE-2024-99xx/CVE-2024-9919.json +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9919.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9919", "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:50.660", - "lastModified": "2025-03-20T10:15:50.660", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T14:17:49.673", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lollms:lollms_web_ui:13:*:*:*:*:*:*:*", + "matchCriteriaId": "33B0BD9C-2312-401C-9E7F-C3E614A336A3" + } + ] + } + ] + } + ], "references": [ { "url": "https://huntr.com/bounties/5c00f56b-32a8-4e26-a4e3-de64f139da6b", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1112.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1112.json new file mode 100644 index 00000000000..f4e84cd396c --- /dev/null +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1112.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-1112", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-07-09T15:15:23.457", + "lastModified": "2025-07-09T15:15:23.457", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM OpenPages with Watson 8.3 and 9.0 could allow an authenticated user to obtain sensitive information that should only be available to privileged users." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-282" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7239151", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-257xx/CVE-2025-25772.json b/CVE-2025/CVE-2025-257xx/CVE-2025-25772.json index eeff3d127bb..ce497420ad0 100644 --- a/CVE-2025/CVE-2025-257xx/CVE-2025-25772.json +++ b/CVE-2025/CVE-2025-257xx/CVE-2025-25772.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25772", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-21T19:15:14.690", - "lastModified": "2025-02-21T22:15:12.813", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T14:43:22.090", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,33 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ujcms:jspxcms:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0.0", + "versionEndIncluding": "9.5.0", + "matchCriteriaId": "F8822348-0C5E-4748-9D83-1EF73E533437" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.yuque.com/u123456789-6sobi/cdgcbq/pkwoqmkamcm9854r?singleDoc#%E3%80%8AjspXcms_csrf%E3%80%8B", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-259xx/CVE-2025-25957.json b/CVE-2025/CVE-2025-259xx/CVE-2025-25957.json index c83c44f9291..c6afd0da7b9 100644 --- a/CVE-2025/CVE-2025-259xx/CVE-2025-25957.json +++ b/CVE-2025/CVE-2025-259xx/CVE-2025-25957.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25957", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-20T23:15:13.280", - "lastModified": "2025-02-21T15:15:13.067", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T14:52:36.587", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,33 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xunruicms:xunruicms:*:*:*:*:*:*:*:*", + "versionEndIncluding": "4.6.3", + "matchCriteriaId": "A9953572-AFFE-4CFE-89CC-9EBE07958917" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/dayrui/xunruicms/issues/5", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-25xx/CVE-2025-2538.json b/CVE-2025/CVE-2025-25xx/CVE-2025-2538.json index d888eab85bb..e5a6b7e850f 100644 --- a/CVE-2025/CVE-2025-25xx/CVE-2025-2538.json +++ b/CVE-2025/CVE-2025-25xx/CVE-2025-2538.json @@ -2,13 +2,13 @@ "id": "CVE-2025-2538", "sourceIdentifier": "psirt@esri.com", "published": "2025-03-20T21:15:23.730", - "lastModified": "2025-04-01T14:15:33.303", + "lastModified": "2025-07-09T15:15:24.227", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A hardcoded credential vulnerability exists in a specific deployment pattern for Esri Portal for ArcGIS versions 11.4 and below that may allow a remote authenticated attacker\u00a0to\u00a0gain administrative access to the system." + "value": "A hardcoded credential vulnerability exists in a specific deployment pattern for Esri Portal for ArcGIS versions 11.4 and below that may allow a remote unauthenticated attacker\u00a0to\u00a0gain administrative access to the system." }, { "lang": "es", diff --git a/CVE-2025/CVE-2025-260xx/CVE-2025-26058.json b/CVE-2025/CVE-2025-260xx/CVE-2025-26058.json index 687ffc6f6cd..2b830f4918e 100644 --- a/CVE-2025/CVE-2025-260xx/CVE-2025-26058.json +++ b/CVE-2025/CVE-2025-260xx/CVE-2025-26058.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26058", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-18T18:15:35.653", - "lastModified": "2025-02-19T21:15:15.920", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T14:54:04.937", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:webkul:qloapps:1.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "A58133B7-029B-4E77-8470-C28C0F8CBC35" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/mano257200/QloApps-VUL", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26668.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26668.json index 2c9fe8b235f..583c4c5f972 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26668.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26668.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26668", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:50.160", - "lastModified": "2025-04-09T20:03:01.577", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T14:14:33.413", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,146 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20978", + "matchCriteriaId": "575117BF-9A1E-4B90-85D8-4172A58B3B72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20978", + "matchCriteriaId": "B3B4804C-685B-4F37-92DE-CE73D1B106B4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7969", + "matchCriteriaId": "474622F8-06D4-4AD1-8D72-A674909A7634" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7969", + "matchCriteriaId": "559D55D4-2BF2-4B8F-90CA-C6B885334A3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.7136", + "matchCriteriaId": "13A4A79D-8D45-48FA-84F5-CE1A78E8E424" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.7136", + "matchCriteriaId": "03AB53EC-354E-4F30-A278-2835CA341503" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5737", + "matchCriteriaId": "2ACCA6F4-C140-4B2E-93FF-1B9DC093E831" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5737", + "matchCriteriaId": "09E0970D-79B9-40D9-BFFF-25EE5A686B04" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.5189", + "matchCriteriaId": "640C45C8-83C3-4BBC-9176-705BEAA80E64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.5189", + "matchCriteriaId": "4CE9402D-6417-4F82-909A-D89C06C98794" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.3775", + "matchCriteriaId": "ED4B5FB3-A574-4DA6-9A43-0950B121CC92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", + "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7969", + "matchCriteriaId": "6A232AB6-1EC5-44E7-AB75-0EB9A5A63259" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.7136", + "matchCriteriaId": "D2941A94-927C-4393-B2A0-4630F03B8B3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3453", + "matchCriteriaId": "52706BEC-E3D6-4188-BB88-7078FE4AF970" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1551", + "matchCriteriaId": "0DA8E1E4-0C78-4ADC-9490-4A608D8601FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.3775", + "matchCriteriaId": "99601356-2DEE-482F-BCBC-A5C7D92D2D74" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26668", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26669.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26669.json index ffee109661a..98a12a4044d 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26669.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26669.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26669", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:50.347", - "lastModified": "2025-04-09T20:03:01.577", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T14:14:09.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,146 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20978", + "matchCriteriaId": "575117BF-9A1E-4B90-85D8-4172A58B3B72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20978", + "matchCriteriaId": "B3B4804C-685B-4F37-92DE-CE73D1B106B4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7969", + "matchCriteriaId": "474622F8-06D4-4AD1-8D72-A674909A7634" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7969", + "matchCriteriaId": "559D55D4-2BF2-4B8F-90CA-C6B885334A3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.7136", + "matchCriteriaId": "13A4A79D-8D45-48FA-84F5-CE1A78E8E424" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.7136", + "matchCriteriaId": "03AB53EC-354E-4F30-A278-2835CA341503" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5737", + "matchCriteriaId": "2ACCA6F4-C140-4B2E-93FF-1B9DC093E831" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5737", + "matchCriteriaId": "09E0970D-79B9-40D9-BFFF-25EE5A686B04" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.5189", + "matchCriteriaId": "640C45C8-83C3-4BBC-9176-705BEAA80E64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.5189", + "matchCriteriaId": "4CE9402D-6417-4F82-909A-D89C06C98794" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.3775", + "matchCriteriaId": "ED4B5FB3-A574-4DA6-9A43-0950B121CC92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", + "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7969", + "matchCriteriaId": "6A232AB6-1EC5-44E7-AB75-0EB9A5A63259" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.7136", + "matchCriteriaId": "D2941A94-927C-4393-B2A0-4630F03B8B3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3453", + "matchCriteriaId": "52706BEC-E3D6-4188-BB88-7078FE4AF970" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1551", + "matchCriteriaId": "0DA8E1E4-0C78-4ADC-9490-4A608D8601FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.3775", + "matchCriteriaId": "99601356-2DEE-482F-BCBC-A5C7D92D2D74" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26669", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26670.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26670.json index adc62060c88..4d87748ecf0 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26670.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26670.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26670", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:50.817", - "lastModified": "2025-04-09T20:03:01.577", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T14:12:36.960", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,146 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20978", + "matchCriteriaId": "575117BF-9A1E-4B90-85D8-4172A58B3B72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20978", + "matchCriteriaId": "B3B4804C-685B-4F37-92DE-CE73D1B106B4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7969", + "matchCriteriaId": "474622F8-06D4-4AD1-8D72-A674909A7634" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7969", + "matchCriteriaId": "559D55D4-2BF2-4B8F-90CA-C6B885334A3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.7136", + "matchCriteriaId": "13A4A79D-8D45-48FA-84F5-CE1A78E8E424" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.7136", + "matchCriteriaId": "03AB53EC-354E-4F30-A278-2835CA341503" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5737", + "matchCriteriaId": "2ACCA6F4-C140-4B2E-93FF-1B9DC093E831" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5737", + "matchCriteriaId": "09E0970D-79B9-40D9-BFFF-25EE5A686B04" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.5189", + "matchCriteriaId": "640C45C8-83C3-4BBC-9176-705BEAA80E64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.5189", + "matchCriteriaId": "4CE9402D-6417-4F82-909A-D89C06C98794" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.3775", + "matchCriteriaId": "ED4B5FB3-A574-4DA6-9A43-0950B121CC92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", + "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7969", + "matchCriteriaId": "6A232AB6-1EC5-44E7-AB75-0EB9A5A63259" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.7136", + "matchCriteriaId": "D2941A94-927C-4393-B2A0-4630F03B8B3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3453", + "matchCriteriaId": "52706BEC-E3D6-4188-BB88-7078FE4AF970" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1551", + "matchCriteriaId": "0DA8E1E4-0C78-4ADC-9490-4A608D8601FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.3775", + "matchCriteriaId": "99601356-2DEE-482F-BCBC-A5C7D92D2D74" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26670", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26671.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26671.json index d0bd0f7540b..7d966c5ad04 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26671.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26671.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26671", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:51.003", - "lastModified": "2025-04-09T20:03:01.577", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T14:11:44.377", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -55,10 +55,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7969", + "matchCriteriaId": "6A232AB6-1EC5-44E7-AB75-0EB9A5A63259" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.7136", + "matchCriteriaId": "D2941A94-927C-4393-B2A0-4630F03B8B3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3453", + "matchCriteriaId": "52706BEC-E3D6-4188-BB88-7078FE4AF970" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1551", + "matchCriteriaId": "0DA8E1E4-0C78-4ADC-9490-4A608D8601FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.3775", + "matchCriteriaId": "99601356-2DEE-482F-BCBC-A5C7D92D2D74" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26671", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26672.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26672.json index db49c9f9091..bdbdf7e3ef3 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26672.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26672.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26672", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:51.177", - "lastModified": "2025-04-09T20:03:01.577", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T14:10:52.523", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,146 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20978", + "matchCriteriaId": "575117BF-9A1E-4B90-85D8-4172A58B3B72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20978", + "matchCriteriaId": "B3B4804C-685B-4F37-92DE-CE73D1B106B4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7969", + "matchCriteriaId": "474622F8-06D4-4AD1-8D72-A674909A7634" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7969", + "matchCriteriaId": "559D55D4-2BF2-4B8F-90CA-C6B885334A3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.7136", + "matchCriteriaId": "13A4A79D-8D45-48FA-84F5-CE1A78E8E424" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.7136", + "matchCriteriaId": "03AB53EC-354E-4F30-A278-2835CA341503" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5737", + "matchCriteriaId": "2ACCA6F4-C140-4B2E-93FF-1B9DC093E831" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5737", + "matchCriteriaId": "09E0970D-79B9-40D9-BFFF-25EE5A686B04" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.5189", + "matchCriteriaId": "640C45C8-83C3-4BBC-9176-705BEAA80E64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.5189", + "matchCriteriaId": "4CE9402D-6417-4F82-909A-D89C06C98794" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.3775", + "matchCriteriaId": "ED4B5FB3-A574-4DA6-9A43-0950B121CC92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", + "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7969", + "matchCriteriaId": "6A232AB6-1EC5-44E7-AB75-0EB9A5A63259" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.7136", + "matchCriteriaId": "D2941A94-927C-4393-B2A0-4630F03B8B3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3453", + "matchCriteriaId": "52706BEC-E3D6-4188-BB88-7078FE4AF970" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1551", + "matchCriteriaId": "0DA8E1E4-0C78-4ADC-9490-4A608D8601FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.3775", + "matchCriteriaId": "99601356-2DEE-482F-BCBC-A5C7D92D2D74" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26672", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26674.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26674.json index efc76c7b639..a36f174d5c3 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26674.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26674.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26674", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:51.553", - "lastModified": "2025-04-09T20:03:01.577", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T14:24:32.313", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,91 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.7136", + "matchCriteriaId": "13A4A79D-8D45-48FA-84F5-CE1A78E8E424" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.7136", + "matchCriteriaId": "03AB53EC-354E-4F30-A278-2835CA341503" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5737", + "matchCriteriaId": "2ACCA6F4-C140-4B2E-93FF-1B9DC093E831" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5737", + "matchCriteriaId": "09E0970D-79B9-40D9-BFFF-25EE5A686B04" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.5189", + "matchCriteriaId": "640C45C8-83C3-4BBC-9176-705BEAA80E64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.5189", + "matchCriteriaId": "4CE9402D-6417-4F82-909A-D89C06C98794" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.3775", + "matchCriteriaId": "ED4B5FB3-A574-4DA6-9A43-0950B121CC92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.7136", + "matchCriteriaId": "D2941A94-927C-4393-B2A0-4630F03B8B3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3453", + "matchCriteriaId": "52706BEC-E3D6-4188-BB88-7078FE4AF970" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1551", + "matchCriteriaId": "0DA8E1E4-0C78-4ADC-9490-4A608D8601FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.3775", + "matchCriteriaId": "99601356-2DEE-482F-BCBC-A5C7D92D2D74" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26674", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26675.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26675.json index 91765012094..b59d632bcff 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26675.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26675.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26675", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:51.757", - "lastModified": "2025-04-09T20:03:01.577", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T14:23:49.987", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,73 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5737", + "matchCriteriaId": "2ACCA6F4-C140-4B2E-93FF-1B9DC093E831" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5737", + "matchCriteriaId": "09E0970D-79B9-40D9-BFFF-25EE5A686B04" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.5189", + "matchCriteriaId": "640C45C8-83C3-4BBC-9176-705BEAA80E64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.5189", + "matchCriteriaId": "4CE9402D-6417-4F82-909A-D89C06C98794" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.3775", + "matchCriteriaId": "ED4B5FB3-A574-4DA6-9A43-0950B121CC92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3453", + "matchCriteriaId": "52706BEC-E3D6-4188-BB88-7078FE4AF970" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1551", + "matchCriteriaId": "0DA8E1E4-0C78-4ADC-9490-4A608D8601FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.3775", + "matchCriteriaId": "99601356-2DEE-482F-BCBC-A5C7D92D2D74" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26675", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26676.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26676.json index bf14def4b8b..8f58b74695e 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26676.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26676.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26676", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:52.023", - "lastModified": "2025-04-09T20:03:01.577", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T14:17:34.547", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,80 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", + "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7969", + "matchCriteriaId": "6A232AB6-1EC5-44E7-AB75-0EB9A5A63259" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.7136", + "matchCriteriaId": "D2941A94-927C-4393-B2A0-4630F03B8B3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3453", + "matchCriteriaId": "52706BEC-E3D6-4188-BB88-7078FE4AF970" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1551", + "matchCriteriaId": "0DA8E1E4-0C78-4ADC-9490-4A608D8601FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.3775", + "matchCriteriaId": "99601356-2DEE-482F-BCBC-A5C7D92D2D74" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26676", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26678.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26678.json index e49c6f292e9..8054bbec405 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26678.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26678.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26678", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:52.303", - "lastModified": "2025-04-09T20:03:01.577", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T14:16:36.630", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,91 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.7136", + "matchCriteriaId": "13A4A79D-8D45-48FA-84F5-CE1A78E8E424" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.7136", + "matchCriteriaId": "03AB53EC-354E-4F30-A278-2835CA341503" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5737", + "matchCriteriaId": "2ACCA6F4-C140-4B2E-93FF-1B9DC093E831" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5737", + "matchCriteriaId": "09E0970D-79B9-40D9-BFFF-25EE5A686B04" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.5189", + "matchCriteriaId": "640C45C8-83C3-4BBC-9176-705BEAA80E64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.5189", + "matchCriteriaId": "4CE9402D-6417-4F82-909A-D89C06C98794" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.3775", + "matchCriteriaId": "ED4B5FB3-A574-4DA6-9A43-0950B121CC92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.7136", + "matchCriteriaId": "D2941A94-927C-4393-B2A0-4630F03B8B3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3453", + "matchCriteriaId": "52706BEC-E3D6-4188-BB88-7078FE4AF970" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1551", + "matchCriteriaId": "0DA8E1E4-0C78-4ADC-9490-4A608D8601FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.3775", + "matchCriteriaId": "99601356-2DEE-482F-BCBC-A5C7D92D2D74" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26678", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-268xx/CVE-2025-26877.json b/CVE-2025/CVE-2025-268xx/CVE-2025-26877.json index ee861b9d8e4..f807dd21090 100644 --- a/CVE-2025/CVE-2025-268xx/CVE-2025-26877.json +++ b/CVE-2025/CVE-2025-268xx/CVE-2025-26877.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26877", "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-25T15:15:24.380", - "lastModified": "2025-02-25T15:15:24.380", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T14:40:53.830", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -37,6 +37,26 @@ "exploitabilityScore": 2.3, "impactScore": 3.7 }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -81,10 +101,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:etoilewebdesign:front_end_users:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.2.31", + "matchCriteriaId": "EA65EC65-718E-4A44-922C-B13A388BEA60" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/front-end-only-users/vulnerability/wordpress-front-end-users-plugin-3-2-30-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2670.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2670.json new file mode 100644 index 00000000000..647794c62b8 --- /dev/null +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2670.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-2670", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-07-09T15:15:24.370", + "lastModified": "2025-07-09T15:15:24.370", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM OpenPages 9.0 is vulnerable to information disclosure of sensitive information due to a weaker than expected security for certain REST end points related to workflow feature of OpenPages. An authenticated user is able to obtain certain information about Workflow related configuration and internal state." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-497" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7239153", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3041.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3041.json index 1f4905d2d6b..03f14b54c46 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3041.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3041.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3041", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-01T00:15:15.200", - "lastModified": "2025-04-01T20:26:11.547", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-09T15:45:43.937", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,24 +142,68 @@ "value": "CWE-434" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:projectworlds:online_time_table_generator:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "89AF98EE-9983-48E4-B200-212717C6C739" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/ydnd/cve/issues/12", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.302103", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.302103", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.524935", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3042.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3042.json index 1d5aa564ef4..2d39900bc7b 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3042.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3042.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3042", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-01T01:15:20.890", - "lastModified": "2025-04-01T20:26:11.547", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-09T15:38:08.457", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,24 +142,68 @@ "value": "CWE-434" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:projectworlds:online_time_table_generator:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "89AF98EE-9983-48E4-B200-212717C6C739" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/ydnd/cve/issues/13", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.302104", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.302104", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.524936", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-37xx/CVE-2025-3702.json b/CVE-2025/CVE-2025-37xx/CVE-2025-3702.json index 7a8238a0301..cdd323bf8a8 100644 --- a/CVE-2025/CVE-2025-37xx/CVE-2025-3702.json +++ b/CVE-2025/CVE-2025-37xx/CVE-2025-3702.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3702", "sourceIdentifier": "audit@patchstack.com", "published": "2025-07-03T13:15:28.387", - "lastModified": "2025-07-03T15:13:53.147", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T15:26:35.943", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:melapress:melapress_file_monitor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.2.0", + "matchCriteriaId": "39C0392B-011F-4DB3-8854-8AAA54C5C206" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/website-file-changes-monitor/vulnerability/wordpress-melapress-file-monitor-plugin-2-2-0-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-466xx/CVE-2025-46647.json b/CVE-2025/CVE-2025-466xx/CVE-2025-46647.json index fc446ad3b60..0c52593e2b7 100644 --- a/CVE-2025/CVE-2025-466xx/CVE-2025-46647.json +++ b/CVE-2025/CVE-2025-466xx/CVE-2025-46647.json @@ -2,8 +2,8 @@ "id": "CVE-2025-46647", "sourceIdentifier": "security@apache.org", "published": "2025-07-02T12:15:28.227", - "lastModified": "2025-07-03T15:13:53.147", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-09T15:25:56.260", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,44 @@ "value": "CWE-302" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:apisix:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.12.0", + "matchCriteriaId": "95C48984-B84A-47F5-9D21-9E6D5A8A2BE3" + } + ] + } + ] } ], "references": [ { "url": "https://lists.apache.org/thread/yrpp2cd3o4qkxlrh421mq8gsrt0k4x0w", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47162.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47162.json index c62257f66b7..ffc1d88a611 100644 --- a/CVE-2025/CVE-2025-471xx/CVE-2025-47162.json +++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47162.json @@ -2,8 +2,8 @@ "id": "CVE-2025-47162", "sourceIdentifier": "secure@microsoft.com", "published": "2025-06-10T17:23:26.630", - "lastModified": "2025-06-12T16:06:39.330", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T14:00:13.640", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,65 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "40C15EDD-98D4-4D06-BA06-21AE0F33C72D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office:-:*:*:*:*:android:*:*", + "matchCriteriaId": "DD6ED53F-7197-439D-A458-0DF13E16AE91" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:*", + "matchCriteriaId": "E0B3B0BC-C7C6-4687-AD72-DCA29FF9AE3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*", + "matchCriteriaId": "FF177984-A906-43FA-BF60-298133FBBD6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:*:*", + "matchCriteriaId": "6C9D7C93-E8CB-4A8A-BA15-093B03ACC62F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:macos:*:*", + "matchCriteriaId": "BF0E8112-5B6F-4E55-8E40-38ADCF6FC654" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:*:*", + "matchCriteriaId": "BEA7C196-354E-414A-B0B8-821658C8BFB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:macos:*:*", + "matchCriteriaId": "EF3E56B5-E6A6-4061-9380-D421E52B9199" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47162", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47163.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47163.json index 2275473f47e..7f4179b1ad4 100644 --- a/CVE-2025/CVE-2025-471xx/CVE-2025-47163.json +++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47163.json @@ -2,8 +2,8 @@ "id": "CVE-2025-47163", "sourceIdentifier": "secure@microsoft.com", "published": "2025-06-10T17:23:28.840", - "lastModified": "2025-06-12T16:06:39.330", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T14:00:48.633", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,41 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*", + "matchCriteriaId": "9C082CC4-6128-475D-BC19-B239E348FDB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_server:*:*:*:*:subscription:*:*:*", + "versionEndExcluding": "16.0.18526.20396", + "matchCriteriaId": "C7035301-1B6D-486C-B000-456842F16359" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*", + "matchCriteriaId": "6122D014-5BF1-4AF4-8B4D-80205ED7785E" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47163", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47164.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47164.json index 5c252ee01e3..78b22b7401a 100644 --- a/CVE-2025/CVE-2025-471xx/CVE-2025-47164.json +++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47164.json @@ -2,8 +2,8 @@ "id": "CVE-2025-47164", "sourceIdentifier": "secure@microsoft.com", "published": "2025-06-10T17:23:31.333", - "lastModified": "2025-06-12T16:06:39.330", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T14:01:20.687", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,65 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "40C15EDD-98D4-4D06-BA06-21AE0F33C72D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office:-:*:*:*:*:android:*:*", + "matchCriteriaId": "DD6ED53F-7197-439D-A458-0DF13E16AE91" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:*", + "matchCriteriaId": "E0B3B0BC-C7C6-4687-AD72-DCA29FF9AE3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*", + "matchCriteriaId": "FF177984-A906-43FA-BF60-298133FBBD6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:*:*", + "matchCriteriaId": "6C9D7C93-E8CB-4A8A-BA15-093B03ACC62F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:macos:*:*", + "matchCriteriaId": "BF0E8112-5B6F-4E55-8E40-38ADCF6FC654" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:*:*", + "matchCriteriaId": "BEA7C196-354E-414A-B0B8-821658C8BFB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:macos:*:*", + "matchCriteriaId": "EF3E56B5-E6A6-4061-9380-D421E52B9199" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47164", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47165.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47165.json index 1ac68b2e1de..7fbb9551abd 100644 --- a/CVE-2025/CVE-2025-471xx/CVE-2025-47165.json +++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47165.json @@ -2,8 +2,8 @@ "id": "CVE-2025-47165", "sourceIdentifier": "secure@microsoft.com", "published": "2025-06-10T17:23:36.527", - "lastModified": "2025-06-12T16:06:39.330", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T14:02:09.283", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,66 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "40C15EDD-98D4-4D06-BA06-21AE0F33C72D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:*:*", + "matchCriteriaId": "09BF0981-749E-470B-A7AC-95AD087797EF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*", + "matchCriteriaId": "FF177984-A906-43FA-BF60-298133FBBD6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:*:*", + "matchCriteriaId": "6C9D7C93-E8CB-4A8A-BA15-093B03ACC62F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:macos:*:*", + "matchCriteriaId": "BF0E8112-5B6F-4E55-8E40-38ADCF6FC654" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:*:*", + "matchCriteriaId": "BEA7C196-354E-414A-B0B8-821658C8BFB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:macos:*:*", + "matchCriteriaId": "EF3E56B5-E6A6-4061-9380-D421E52B9199" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office_online_server:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.0.10417.20018", + "matchCriteriaId": "FBDC86AC-541D-46FF-8F88-26114DDD1D76" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47165", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47166.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47166.json index ed69190e87c..b2f907ed4f1 100644 --- a/CVE-2025/CVE-2025-471xx/CVE-2025-47166.json +++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47166.json @@ -2,8 +2,8 @@ "id": "CVE-2025-47166", "sourceIdentifier": "secure@microsoft.com", "published": "2025-06-10T17:23:38.753", - "lastModified": "2025-06-12T16:06:39.330", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T14:02:40.430", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,41 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*", + "matchCriteriaId": "9C082CC4-6128-475D-BC19-B239E348FDB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_server:*:*:*:*:subscription:*:*:*", + "versionEndExcluding": "16.0.18526.20396", + "matchCriteriaId": "C7035301-1B6D-486C-B000-456842F16359" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*", + "matchCriteriaId": "6122D014-5BF1-4AF4-8B4D-80205ED7785E" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47166", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47167.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47167.json index c5eee9439b9..51681e38077 100644 --- a/CVE-2025/CVE-2025-471xx/CVE-2025-47167.json +++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47167.json @@ -2,8 +2,8 @@ "id": "CVE-2025-47167", "sourceIdentifier": "secure@microsoft.com", "published": "2025-06-10T17:23:41.107", - "lastModified": "2025-06-12T16:06:39.330", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T14:05:38.950", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,66 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "40C15EDD-98D4-4D06-BA06-21AE0F33C72D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office:*:*:*:*:*:android:*:*", + "versionEndExcluding": "16.0.18925.20000", + "matchCriteriaId": "41DBED30-0F7F-4734-A2C4-E81D46D3DEDF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:*", + "matchCriteriaId": "E0B3B0BC-C7C6-4687-AD72-DCA29FF9AE3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*", + "matchCriteriaId": "FF177984-A906-43FA-BF60-298133FBBD6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:*:*", + "matchCriteriaId": "6C9D7C93-E8CB-4A8A-BA15-093B03ACC62F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:macos:*:*", + "matchCriteriaId": "BF0E8112-5B6F-4E55-8E40-38ADCF6FC654" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:*:*", + "matchCriteriaId": "BEA7C196-354E-414A-B0B8-821658C8BFB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:macos:*:*", + "matchCriteriaId": "EF3E56B5-E6A6-4061-9380-D421E52B9199" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47167", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47168.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47168.json index 491f3285951..94f9a507116 100644 --- a/CVE-2025/CVE-2025-471xx/CVE-2025-47168.json +++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47168.json @@ -2,8 +2,8 @@ "id": "CVE-2025-47168", "sourceIdentifier": "secure@microsoft.com", "published": "2025-06-10T17:23:43.307", - "lastModified": "2025-06-12T16:06:39.330", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T14:06:45.143", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "40C15EDD-98D4-4D06-BA06-21AE0F33C72D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*", + "matchCriteriaId": "FF177984-A906-43FA-BF60-298133FBBD6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:*:*", + "matchCriteriaId": "6C9D7C93-E8CB-4A8A-BA15-093B03ACC62F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:macos:*:*", + "matchCriteriaId": "BF0E8112-5B6F-4E55-8E40-38ADCF6FC654" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:*:*", + "matchCriteriaId": "BEA7C196-354E-414A-B0B8-821658C8BFB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:macos:*:*", + "matchCriteriaId": "EF3E56B5-E6A6-4061-9380-D421E52B9199" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*", + "matchCriteriaId": "9C082CC4-6128-475D-BC19-B239E348FDB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*", + "matchCriteriaId": "6122D014-5BF1-4AF4-8B4D-80205ED7785E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:*:*", + "matchCriteriaId": "4DA042D4-B14E-4DDF-8423-DFB255679EFE" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47168", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-484xx/CVE-2025-48461.json b/CVE-2025/CVE-2025-484xx/CVE-2025-48461.json index cc2ae4d1739..ed0edc4fcdf 100644 --- a/CVE-2025/CVE-2025-484xx/CVE-2025-48461.json +++ b/CVE-2025/CVE-2025-484xx/CVE-2025-48461.json @@ -2,8 +2,8 @@ "id": "CVE-2025-48461", "sourceIdentifier": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4", "published": "2025-06-24T03:15:33.613", - "lastModified": "2025-06-26T18:58:14.280", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-09T15:02:51.153", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,96 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:advantech:wise-4060lan_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "40764D08-8173-4AF3-BB93-249D12A9D07D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:advantech:wise-4060lan:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E7DCE031-021A-47BC-B81C-1B0DCB9EB8F1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:advantech:wise-4050lan_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9CFD6963-E219-48F1-8BDE-C3D9F6B2091B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:advantech:wise-4050lan:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72DFF800-1684-4038-BB79-C679DCAF4105" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:advantech:wise-4010lan_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "87715BBD-E9A9-404A-B11E-CFCE0E4CA409" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:advantech:wise-4010lan:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9241107A-6586-475F-AE13-C541F9AE8AE6" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061/", - "source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4" + "source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-484xx/CVE-2025-48462.json b/CVE-2025/CVE-2025-484xx/CVE-2025-48462.json index 1f7472007ba..ca5793a0bc9 100644 --- a/CVE-2025/CVE-2025-484xx/CVE-2025-48462.json +++ b/CVE-2025/CVE-2025-484xx/CVE-2025-48462.json @@ -2,8 +2,8 @@ "id": "CVE-2025-48462", "sourceIdentifier": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4", "published": "2025-06-24T03:15:33.753", - "lastModified": "2025-06-26T18:58:14.280", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-09T15:03:03.620", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,96 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:advantech:wise-4060lan_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "40764D08-8173-4AF3-BB93-249D12A9D07D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:advantech:wise-4060lan:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E7DCE031-021A-47BC-B81C-1B0DCB9EB8F1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:advantech:wise-4050lan_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9CFD6963-E219-48F1-8BDE-C3D9F6B2091B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:advantech:wise-4050lan:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72DFF800-1684-4038-BB79-C679DCAF4105" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:advantech:wise-4010lan_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "87715BBD-E9A9-404A-B11E-CFCE0E4CA409" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:advantech:wise-4010lan:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9241107A-6586-475F-AE13-C541F9AE8AE6" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061", - "source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4" + "source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-484xx/CVE-2025-48463.json b/CVE-2025/CVE-2025-484xx/CVE-2025-48463.json index b2711760d46..1fce1249786 100644 --- a/CVE-2025/CVE-2025-484xx/CVE-2025-48463.json +++ b/CVE-2025/CVE-2025-484xx/CVE-2025-48463.json @@ -2,8 +2,8 @@ "id": "CVE-2025-48463", "sourceIdentifier": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4", "published": "2025-06-24T03:15:33.870", - "lastModified": "2025-06-26T18:58:14.280", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-09T15:03:14.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,96 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:advantech:wise-4060lan_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "40764D08-8173-4AF3-BB93-249D12A9D07D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:advantech:wise-4060lan:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E7DCE031-021A-47BC-B81C-1B0DCB9EB8F1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:advantech:wise-4050lan_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9CFD6963-E219-48F1-8BDE-C3D9F6B2091B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:advantech:wise-4050lan:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72DFF800-1684-4038-BB79-C679DCAF4105" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:advantech:wise-4010lan_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "87715BBD-E9A9-404A-B11E-CFCE0E4CA409" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:advantech:wise-4010lan:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9241107A-6586-475F-AE13-C541F9AE8AE6" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061", - "source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4" + "source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-484xx/CVE-2025-48466.json b/CVE-2025/CVE-2025-484xx/CVE-2025-48466.json index fda2b2eac73..38f3043b58e 100644 --- a/CVE-2025/CVE-2025-484xx/CVE-2025-48466.json +++ b/CVE-2025/CVE-2025-484xx/CVE-2025-48466.json @@ -2,8 +2,8 @@ "id": "CVE-2025-48466", "sourceIdentifier": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4", "published": "2025-06-24T03:15:34.013", - "lastModified": "2025-06-26T18:58:14.280", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-09T15:04:12.913", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,61 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:advantech:wise-4060lan_firmware:2.02b00:*:*:*:*:*:*:*", + "matchCriteriaId": "F6FD59CB-F033-4D1B-A24C-32C361ACCD5B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:advantech:wise-4060lan:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E7DCE031-021A-47BC-B81C-1B0DCB9EB8F1" + } + ] + } + ] + }, + {}, + { + "nodes": [ + { + "operator": "AND", + "negate": false + } + ] + }, + {}, + {} + ], "references": [ { "url": "https://github.com/shipcod3/CVE-2025-48466", - "source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4" + "source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061", - "source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4" + "source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-484xx/CVE-2025-48467.json b/CVE-2025/CVE-2025-484xx/CVE-2025-48467.json index 0b56f7c7fd4..a8eeaa96b4e 100644 --- a/CVE-2025/CVE-2025-484xx/CVE-2025-48467.json +++ b/CVE-2025/CVE-2025-484xx/CVE-2025-48467.json @@ -2,8 +2,8 @@ "id": "CVE-2025-48467", "sourceIdentifier": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4", "published": "2025-06-24T03:15:34.140", - "lastModified": "2025-06-26T18:58:14.280", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-09T15:20:17.210", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,96 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:advantech:wise-4010lan_firmware:2.02b00:*:*:*:*:*:*:*", + "matchCriteriaId": "329D6F6B-850F-408B-8335-820C61C1085D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:advantech:wise-4010lan:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9241107A-6586-475F-AE13-C541F9AE8AE6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:advantech:wise-4050lan_firmware:2.02b00:*:*:*:*:*:*:*", + "matchCriteriaId": "108653D3-5184-44B1-B2BE-F8D7E8011058" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:advantech:wise-4050lan:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72DFF800-1684-4038-BB79-C679DCAF4105" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:advantech:wise-4060lan_firmware:2.02b00:*:*:*:*:*:*:*", + "matchCriteriaId": "F6FD59CB-F033-4D1B-A24C-32C361ACCD5B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:advantech:wise-4060lan:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E7DCE031-021A-47BC-B81C-1B0DCB9EB8F1" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061", - "source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4" + "source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-484xx/CVE-2025-48468.json b/CVE-2025/CVE-2025-484xx/CVE-2025-48468.json index 42aabfad172..42016b1dce6 100644 --- a/CVE-2025/CVE-2025-484xx/CVE-2025-48468.json +++ b/CVE-2025/CVE-2025-484xx/CVE-2025-48468.json @@ -2,8 +2,8 @@ "id": "CVE-2025-48468", "sourceIdentifier": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4", "published": "2025-06-24T03:15:34.267", - "lastModified": "2025-06-26T18:58:14.280", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-09T15:20:29.410", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,96 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:advantech:wise-4010lan_firmware:2.02b00:*:*:*:*:*:*:*", + "matchCriteriaId": "329D6F6B-850F-408B-8335-820C61C1085D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:advantech:wise-4010lan:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9241107A-6586-475F-AE13-C541F9AE8AE6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:advantech:wise-4050lan_firmware:2.02b00:*:*:*:*:*:*:*", + "matchCriteriaId": "108653D3-5184-44B1-B2BE-F8D7E8011058" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:advantech:wise-4050lan:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72DFF800-1684-4038-BB79-C679DCAF4105" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:advantech:wise-4060lan_firmware:2.02b00:*:*:*:*:*:*:*", + "matchCriteriaId": "F6FD59CB-F033-4D1B-A24C-32C361ACCD5B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:advantech:wise-4060lan:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E7DCE031-021A-47BC-B81C-1B0DCB9EB8F1" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061", - "source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4" + "source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-484xx/CVE-2025-48469.json b/CVE-2025/CVE-2025-484xx/CVE-2025-48469.json index ed537aac96e..a46d39300e9 100644 --- a/CVE-2025/CVE-2025-484xx/CVE-2025-48469.json +++ b/CVE-2025/CVE-2025-484xx/CVE-2025-48469.json @@ -2,8 +2,8 @@ "id": "CVE-2025-48469", "sourceIdentifier": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4", "published": "2025-06-24T03:15:34.390", - "lastModified": "2025-06-26T18:58:14.280", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-09T15:21:28.920", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,104 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:advantech:wise-4060lan_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "40764D08-8173-4AF3-BB93-249D12A9D07D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:advantech:wise-4060lan:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E7DCE031-021A-47BC-B81C-1B0DCB9EB8F1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:advantech:wise-4050lan_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9CFD6963-E219-48F1-8BDE-C3D9F6B2091B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:advantech:wise-4050lan:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72DFF800-1684-4038-BB79-C679DCAF4105" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:advantech:wise-4010lan_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "87715BBD-E9A9-404A-B11E-CFCE0E4CA409" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:advantech:wise-4010lan:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9241107A-6586-475F-AE13-C541F9AE8AE6" + } + ] + } + ] + } + ], "references": [ { "url": "https://jro.sg/CVEs/CVE-2025-48469/", - "source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4" + "source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061/", - "source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4" + "source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-484xx/CVE-2025-48470.json b/CVE-2025/CVE-2025-484xx/CVE-2025-48470.json index 6a83e5890fd..b89f69b38b0 100644 --- a/CVE-2025/CVE-2025-484xx/CVE-2025-48470.json +++ b/CVE-2025/CVE-2025-484xx/CVE-2025-48470.json @@ -2,8 +2,8 @@ "id": "CVE-2025-48470", "sourceIdentifier": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4", "published": "2025-06-24T03:15:34.523", - "lastModified": "2025-06-26T18:58:14.280", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-09T15:21:40.570", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,96 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:advantech:wise-4010lan_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "87715BBD-E9A9-404A-B11E-CFCE0E4CA409" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:advantech:wise-4010lan:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9241107A-6586-475F-AE13-C541F9AE8AE6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:advantech:wise-4050lan_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9CFD6963-E219-48F1-8BDE-C3D9F6B2091B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:advantech:wise-4050lan:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72DFF800-1684-4038-BB79-C679DCAF4105" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:advantech:wise-4060lan_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "40764D08-8173-4AF3-BB93-249D12A9D07D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:advantech:wise-4060lan:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E7DCE031-021A-47BC-B81C-1B0DCB9EB8F1" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061", - "source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4" + "source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-488xx/CVE-2025-48823.json b/CVE-2025/CVE-2025-488xx/CVE-2025-48823.json index 8100443bee7..95127165c4c 100644 --- a/CVE-2025/CVE-2025-488xx/CVE-2025-48823.json +++ b/CVE-2025/CVE-2025-488xx/CVE-2025-48823.json @@ -2,20 +2,24 @@ "id": "CVE-2025-48823", "sourceIdentifier": "secure@microsoft.com", "published": "2025-07-08T17:15:47.580", - "lastModified": "2025-07-08T17:15:47.580", + "lastModified": "2025-07-09T14:15:29.097", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cryptographic issues in Windows Cryptographic Services allows an unauthorized attacker to disclose information over a network." + }, + { + "lang": "es", + "value": "Los problemas criptogr\u00e1ficos en Windows Cryptographic Services permiten que un atacante no autorizado divulgue informaci\u00f3n a trav\u00e9s de una red." } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", @@ -35,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-326" + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48823", diff --git a/CVE-2025/CVE-2025-497xx/CVE-2025-49794.json b/CVE-2025/CVE-2025-497xx/CVE-2025-49794.json index b3a15943ecb..d283a931f93 100644 --- a/CVE-2025/CVE-2025-497xx/CVE-2025-49794.json +++ b/CVE-2025/CVE-2025-497xx/CVE-2025-49794.json @@ -2,7 +2,7 @@ "id": "CVE-2025-49794", "sourceIdentifier": "secalert@redhat.com", "published": "2025-06-16T16:15:18.997", - "lastModified": "2025-07-09T03:15:29.003", + "lastModified": "2025-07-09T14:15:32.797", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -56,6 +56,14 @@ "url": "https://access.redhat.com/errata/RHSA-2025:10630", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:10698", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:10699", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2025-49794", "source": "secalert@redhat.com" diff --git a/CVE-2025/CVE-2025-497xx/CVE-2025-49796.json b/CVE-2025/CVE-2025-497xx/CVE-2025-49796.json index da79bf89df0..939ab4ec9a7 100644 --- a/CVE-2025/CVE-2025-497xx/CVE-2025-49796.json +++ b/CVE-2025/CVE-2025-497xx/CVE-2025-49796.json @@ -2,7 +2,7 @@ "id": "CVE-2025-49796", "sourceIdentifier": "secalert@redhat.com", "published": "2025-06-16T16:15:19.370", - "lastModified": "2025-07-09T03:15:30.307", + "lastModified": "2025-07-09T14:15:32.927", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -56,6 +56,14 @@ "url": "https://access.redhat.com/errata/RHSA-2025:10630", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:10698", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:10699", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2025-49796", "source": "secalert@redhat.com" diff --git a/CVE-2025/CVE-2025-523xx/CVE-2025-52364.json b/CVE-2025/CVE-2025-523xx/CVE-2025-52364.json new file mode 100644 index 00000000000..b077a4a0bdb --- /dev/null +++ b/CVE-2025/CVE-2025-523xx/CVE-2025-52364.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-52364", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-07-09T15:15:24.650", + "lastModified": "2025-07-09T15:15:24.650", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insecure Permissions vulnerability in Tenda CP3 Pro Firmware V22.5.4.93 allows the telnet service (telnetd) by default at boot via the initialization script /etc/init.d/eth.sh. This allows remote attackers to connect to the device s shell over the network, potentially without authentication if default or weak credentials are present" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.tendacn.com/product/download/cp3pro.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-530xx/CVE-2025-53021.json b/CVE-2025/CVE-2025-530xx/CVE-2025-53021.json index 0c8c9d0be54..b04d89e9426 100644 --- a/CVE-2025/CVE-2025-530xx/CVE-2025-53021.json +++ b/CVE-2025/CVE-2025-530xx/CVE-2025-53021.json @@ -2,8 +2,8 @@ "id": "CVE-2025-53021", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-24T20:15:26.867", - "lastModified": "2025-06-26T18:58:14.280", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T15:23:31.237", + "vulnStatus": "Analyzed", "cveTags": [ { "sourceIdentifier": "cve@mitre.org", @@ -58,18 +58,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0.0", + "versionEndIncluding": "3.11.18", + "matchCriteriaId": "3452833D-B192-471B-B958-44ADA0C3CCC8" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/moodle/moodle/releases/tag/v3.11.18", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://moodledev.io/general/releases#moodle-311", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://rentry.co/moodle-oauth2-cve", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-533xx/CVE-2025-53355.json b/CVE-2025/CVE-2025-533xx/CVE-2025-53355.json index 21e911b25a3..c48e402ae92 100644 --- a/CVE-2025/CVE-2025-533xx/CVE-2025-53355.json +++ b/CVE-2025/CVE-2025-533xx/CVE-2025-53355.json @@ -2,13 +2,17 @@ "id": "CVE-2025-53355", "sourceIdentifier": "security-advisories@github.com", "published": "2025-07-08T20:15:30.020", - "lastModified": "2025-07-08T21:15:28.120", + "lastModified": "2025-07-09T14:15:33.143", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "MCP Server Kubernetes is an MCP Server that can connect to a Kubernetes cluster and manage it. A command injection vulnerability exists in the mcp-server-kubernetes MCP Server. The vulnerability is caused by the unsanitized use of input parameters within a call to child_process.execSync, enabling an attacker to inject arbitrary system commands. Successful exploitation can lead to remote code execution under the server process's privileges. This vulnerability is fixed in 2.5.0." + }, + { + "lang": "es", + "value": "MCP Server Kubernetes es un servidor MCP que puede conectarse a un cl\u00faster de Kubernetes y administrarlo. Existe una vulnerabilidad de inyecci\u00f3n de comandos en el servidor MCP mcp-server-kubernetes. Esta vulnerabilidad se debe al uso no autorizado de par\u00e1metros de entrada en una llamada a child_process.execSync, lo que permite a un atacante inyectar comandos arbitrarios del sistema. Una explotaci\u00f3n exitosa puede provocar la ejecuci\u00f3n remota de c\u00f3digo con los privilegios del proceso del servidor. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 2.5.0." } ], "metrics": { @@ -59,6 +63,10 @@ { "url": "https://github.com/cyanheads/git-mcp-server/commit/0dbd6995ccdf76ab770b58013034365b2d06c4d9", "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/Flux159/mcp-server-kubernetes/security/advisories/GHSA-gjv4-ghm7-q58q", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-535xx/CVE-2025-53513.json b/CVE-2025/CVE-2025-535xx/CVE-2025-53513.json index d7cc9ad888d..e78114fd067 100644 --- a/CVE-2025/CVE-2025-535xx/CVE-2025-53513.json +++ b/CVE-2025/CVE-2025-535xx/CVE-2025-53513.json @@ -2,13 +2,17 @@ "id": "CVE-2025-53513", "sourceIdentifier": "security@ubuntu.com", "published": "2025-07-08T17:16:04.593", - "lastModified": "2025-07-08T17:16:04.593", + "lastModified": "2025-07-09T14:15:33.260", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The /charms endpoint on a Juju controller lacked sufficient authorization checks, allowing any user with an account on the controller to upload a charm. Uploading a malicious charm that exploits a Zip Slip vulnerability could allow an attacker to gain access to a machine running a unit through the affected charm." + }, + { + "lang": "es", + "value": "El endpoint /charms de un controlador Juju carec\u00eda de suficientes comprobaciones de autorizaci\u00f3n, lo que permit\u00eda a cualquier usuario con una cuenta en el controlador cargar un charm. Cargar un charm malicioso que explota una vulnerabilidad de Zip Slip podr\u00eda permitir a un atacante acceder a una m\u00e1quina que ejecuta una unidad a trav\u00e9s del charm afectado." } ], "metrics": { @@ -51,6 +55,10 @@ { "url": "https://github.com/juju/juju/security/advisories/GHSA-24ch-w38v-xmh8", "source": "security@ubuntu.com" + }, + { + "url": "https://github.com/juju/juju/security/advisories/GHSA-24ch-w38v-xmh8", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-535xx/CVE-2025-53546.json b/CVE-2025/CVE-2025-535xx/CVE-2025-53546.json new file mode 100644 index 00000000000..c7677fd6a1f --- /dev/null +++ b/CVE-2025/CVE-2025-535xx/CVE-2025-53546.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-53546", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-07-09T15:15:24.787", + "lastModified": "2025-07-09T15:15:24.787", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Folo organizes feeds content into one timeline. Using pull_request_target on .github/workflows/auto-fix-lint-format-commit.yml can be exploited by attackers, since untrusted code can be executed having full access to secrets (from the base repo). By exploiting the vulnerability is possible to exfiltrate GITHUB_TOKEN which has high privileges. GITHUB_TOKEN can be used to completely overtake the repo since the token has content write privileges. This vulnerability is fixed in commit 585c6a591440cd39f92374230ac5d65d7dd23d6a." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-829" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/RSSNext/Folo/commit/585c6a591440cd39f92374230ac5d65d7dd23d6a", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/RSSNext/Folo/security/advisories/GHSA-h87r-5w74-qfm4", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6021.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6021.json index 6e50cc60b98..d962b8f19a4 100644 --- a/CVE-2025/CVE-2025-60xx/CVE-2025-6021.json +++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6021.json @@ -2,7 +2,7 @@ "id": "CVE-2025-6021", "sourceIdentifier": "secalert@redhat.com", "published": "2025-06-12T13:15:25.590", - "lastModified": "2025-07-09T03:15:30.930", + "lastModified": "2025-07-09T14:15:33.413", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -56,6 +56,14 @@ "url": "https://access.redhat.com/errata/RHSA-2025:10630", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:10698", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:10699", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2025-6021", "source": "secalert@redhat.com" diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7030.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7030.json index 6d07c48025b..19886c06e39 100644 --- a/CVE-2025/CVE-2025-70xx/CVE-2025-7030.json +++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7030.json @@ -2,16 +2,43 @@ "id": "CVE-2025-7030", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-07-08T21:15:28.773", - "lastModified": "2025-07-08T21:15:28.773", + "lastModified": "2025-07-09T15:15:25.103", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Privilege Defined With Unsafe Actions vulnerability in Drupal Two-factor Authentication (TFA) allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Two-factor Authentication (TFA): from 0.0.0 before 1.11.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de privilegio definido con acciones inseguras en Drupal Two-factor Authentication (TFA) permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a la autenticaci\u00f3n de dos factores (TFA): desde la versi\u00f3n 0.0.0 hasta la 1.11.0." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.2 + } + ] + }, "weaknesses": [ { "source": "mlhess@drupal.org", diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7119.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7119.json index 404c653a63e..2c9e8f2d9ec 100644 --- a/CVE-2025/CVE-2025-71xx/CVE-2025-7119.json +++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7119.json @@ -2,8 +2,8 @@ "id": "CVE-2025-7119", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-07T08:15:25.787", - "lastModified": "2025-07-08T16:18:34.923", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T15:26:56.123", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,26 +144,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:campcodes:complaint_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4A8CF3F0-0777-435C-8C66-5B2FB702840B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ez-lbz/poc/issues/42", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.315031", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.315031", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.605911", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.campcodes.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7134.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7134.json index 1a4ce9b9410..0f939a12c86 100644 --- a/CVE-2025/CVE-2025-71xx/CVE-2025-7134.json +++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7134.json @@ -2,8 +2,8 @@ "id": "CVE-2025-7134", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-07T16:15:29.800", - "lastModified": "2025-07-08T16:18:34.923", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-09T15:27:04.847", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,26 +144,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:campcodes:online_recruitment_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D9037ECC-11B2-4334-9E4B-0D5349E34D4A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/wyl091256/CVE/issues/21", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.315046", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.315046", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.605952", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.campcodes.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7135.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7135.json index 23ff5b994bf..7cd68041807 100644 --- a/CVE-2025/CVE-2025-71xx/CVE-2025-7135.json +++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7135.json @@ -2,8 +2,8 @@ "id": "CVE-2025-7135", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-07T16:15:30.080", - "lastModified": "2025-07-08T16:18:34.923", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-09T15:27:19.667", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,30 +144,71 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:campcodes:online_recruitment_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D9037ECC-11B2-4334-9E4B-0D5349E34D4A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/wyl091256/CVE/issues/22", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.315047", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.315047", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.605953", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.campcodes.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/wyl091256/CVE/issues/22", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7136.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7136.json index 1de8a24dd05..dca12fc6449 100644 --- a/CVE-2025/CVE-2025-71xx/CVE-2025-7136.json +++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7136.json @@ -2,8 +2,8 @@ "id": "CVE-2025-7136", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-07T17:15:32.693", - "lastModified": "2025-07-08T16:18:34.923", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-09T15:27:29.277", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,26 +144,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:campcodes:online_recruitment_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D9037ECC-11B2-4334-9E4B-0D5349E34D4A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/wyl091256/CVE/issues/23", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.315048", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.315048", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.605954", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.campcodes.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7137.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7137.json index 96cb4236d3d..5dee1e641b1 100644 --- a/CVE-2025/CVE-2025-71xx/CVE-2025-7137.json +++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7137.json @@ -2,8 +2,8 @@ "id": "CVE-2025-7137", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-07T17:15:32.903", - "lastModified": "2025-07-08T16:18:34.923", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-09T15:27:41.397", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,26 +144,61 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:best_salon_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "175D126C-7319-49AC-A493-3EF462408401" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Colorado-all/cve/blob/main/Best%20salon%20management%20system/SQL-22.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.315051", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.315051", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.605984", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7138.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7138.json index 5dda074eba9..602791ace9a 100644 --- a/CVE-2025/CVE-2025-71xx/CVE-2025-7138.json +++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7138.json @@ -2,8 +2,8 @@ "id": "CVE-2025-7138", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-07T18:15:29.603", - "lastModified": "2025-07-08T16:18:34.923", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-09T15:28:08.573", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,26 +144,61 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:best_salon_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "175D126C-7319-49AC-A493-3EF462408401" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Colorado-all/cve/blob/main/Best%20salon%20management%20system/SQL-23.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.315052", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.315052", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.605985", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7139.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7139.json index ae11c0abc14..13411400c0d 100644 --- a/CVE-2025/CVE-2025-71xx/CVE-2025-7139.json +++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7139.json @@ -2,8 +2,8 @@ "id": "CVE-2025-7139", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-07T18:15:29.793", - "lastModified": "2025-07-08T16:18:34.923", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-09T15:28:22.777", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -124,30 +144,69 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:best_salon_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "175D126C-7319-49AC-A493-3EF462408401" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Colorado-all/cve/blob/main/Best%20salon%20management%20system/xss-1.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.315053", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.315053", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.605986", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/Colorado-all/cve/blob/main/Best%20salon%20management%20system/xss-1.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7140.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7140.json index 1a1ab13d5ee..8510c12c82d 100644 --- a/CVE-2025/CVE-2025-71xx/CVE-2025-7140.json +++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7140.json @@ -2,8 +2,8 @@ "id": "CVE-2025-7140", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-07T19:15:24.160", - "lastModified": "2025-07-08T18:15:43.450", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T15:30:28.377", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -124,30 +144,69 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:best_salon_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "175D126C-7319-49AC-A493-3EF462408401" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Colorado-all/cve/blob/main/Best%20salon%20management%20system/xss-2.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.315054", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.315054", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.605987", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/Colorado-all/cve/blob/main/Best%20salon%20management%20system/xss-2.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7142.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7142.json index 198ffb13807..bde6a7b20a1 100644 --- a/CVE-2025/CVE-2025-71xx/CVE-2025-7142.json +++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7142.json @@ -2,8 +2,8 @@ "id": "CVE-2025-7142", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-07T20:15:28.787", - "lastModified": "2025-07-08T16:18:34.923", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T15:31:08.393", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -124,26 +144,61 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:best_salon_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "175D126C-7319-49AC-A493-3EF462408401" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Colorado-all/cve/blob/main/Best%20salon%20management%20system/xss-4.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.315056", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.315056", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.605989", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7143.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7143.json index 1c328b406b4..5cd323fede6 100644 --- a/CVE-2025/CVE-2025-71xx/CVE-2025-7143.json +++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7143.json @@ -2,8 +2,8 @@ "id": "CVE-2025-7143", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-07T20:15:28.973", - "lastModified": "2025-07-08T16:18:34.923", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T15:31:49.390", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -124,26 +144,61 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:best_salon_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "175D126C-7319-49AC-A493-3EF462408401" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Colorado-all/cve/blob/main/Best%20salon%20management%20system/xss-5.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.315057", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.315057", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.605990", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7144.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7144.json index 66667fe57da..a2d085ba0c2 100644 --- a/CVE-2025/CVE-2025-71xx/CVE-2025-7144.json +++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7144.json @@ -2,8 +2,8 @@ "id": "CVE-2025-7144", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-07T21:15:25.987", - "lastModified": "2025-07-08T16:18:34.923", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T15:32:29.227", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -124,26 +144,61 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:best_salon_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "175D126C-7319-49AC-A493-3EF462408401" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Colorado-all/cve/blob/main/Best%20salon%20management%20system/xss-6.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.315058", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.315058", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.605991", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7147.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7147.json index ba126ded66d..9767daf3a8a 100644 --- a/CVE-2025/CVE-2025-71xx/CVE-2025-7147.json +++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7147.json @@ -2,8 +2,8 @@ "id": "CVE-2025-7147", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-07T21:15:26.187", - "lastModified": "2025-07-08T16:18:34.923", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T15:32:50.693", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,26 +144,61 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:codeastro:patient_record_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8361BAE2-7E6B-4F41-AAF3-AF0B3E058A07" + } + ] + } + ] + } + ], "references": [ { "url": "https://codeastro.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/Vanshdhawan188/Patient-Record-Management-System-SQL/blob/main/Patient%20Record%20Management%20System.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.315085", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.315085", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.606026", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7148.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7148.json index 04c2e9247cf..198294cc380 100644 --- a/CVE-2025/CVE-2025-71xx/CVE-2025-7148.json +++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7148.json @@ -2,8 +2,8 @@ "id": "CVE-2025-7148", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-07T22:15:27.227", - "lastModified": "2025-07-08T16:18:34.923", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T15:33:05.130", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -124,26 +144,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:codeastro:simple_hospital_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4E3026A2-F4DC-4151-825E-6E576C978A87" + } + ] + } + ] + } + ], "references": [ { "url": "https://codeastro.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/Vanshdhawan188/Simple-Hospital-Management-System-in-Python-CodeAstro-Patients-Stored-XSS/blob/main/Simple%20Hospital%20Management%20System%20in%20Python%20CodeAstro%20Patients%20Stored%20XSS.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Mitigation", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.315086", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.315086", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.606043", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7187.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7187.json index 421c1e569de..4496e02d846 100644 --- a/CVE-2025/CVE-2025-71xx/CVE-2025-7187.json +++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7187.json @@ -2,13 +2,17 @@ "id": "CVE-2025-7187", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-08T17:16:06.057", - "lastModified": "2025-07-08T17:16:06.057", + "lastModified": "2025-07-09T14:15:33.580", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in code-projects Chat System 1.0. Affected is an unknown function of the file /user/fetch_member.php. The manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad cr\u00edtica en code-projects Chat System 1.0. Se ve afectada una funci\u00f3n desconocida del archivo /user/fetch_member.php. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.607196", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/LamentXU123/cve/blob/main/sql_fetch_member.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7190.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7190.json index 263724abc80..28e70008ddf 100644 --- a/CVE-2025/CVE-2025-71xx/CVE-2025-7190.json +++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7190.json @@ -2,13 +2,17 @@ "id": "CVE-2025-7190", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-08T19:15:43.943", - "lastModified": "2025-07-08T19:15:43.943", + "lastModified": "2025-07-09T14:15:33.733", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in code-projects Library Management System 2.0. This affects an unknown part of the file /admin/student_edit_photo.php. The manipulation of the argument photo leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en code-projects Library Management System 2.0. Esta afecta a una parte desconocida del archivo /admin/student_edit_photo.php. La manipulaci\u00f3n del argumento \"photo\" permite la carga sin restricciones. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.607202", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/y2xsec324/cve/issues/11", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7191.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7191.json index da048d7e7fd..5f4bd888dd9 100644 --- a/CVE-2025/CVE-2025-71xx/CVE-2025-7191.json +++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7191.json @@ -2,13 +2,17 @@ "id": "CVE-2025-7191", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-08T19:15:44.300", - "lastModified": "2025-07-08T19:15:44.300", + "lastModified": "2025-07-09T14:15:34.387", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in code-projects Student Enrollment System 1.0 and classified as critical. This vulnerability affects unknown code of the file /login.php. The manipulation of the argument Username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en code-projects Student Enrollment System 1.0, clasificada como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /login.php. La manipulaci\u00f3n del argumento \"Username\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.607216", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/yihaofuweng/cve/issues/11", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7192.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7192.json index 523f0a2cdf1..205bbf80ecd 100644 --- a/CVE-2025/CVE-2025-71xx/CVE-2025-7192.json +++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7192.json @@ -2,7 +2,7 @@ "id": "CVE-2025-7192", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-08T20:15:30.830", - "lastModified": "2025-07-08T20:15:30.830", + "lastModified": "2025-07-09T14:15:34.807", "vulnStatus": "Received", "cveTags": [ { @@ -16,6 +16,10 @@ { "lang": "en", "value": "A vulnerability was found in D-Link DIR-645 up to 1.05B01 and classified as critical. This issue affects the function ssdpcgi_main of the file /htdocs/cgibin of the component ssdpcgi. The manipulation leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en D-Link DIR-645 hasta la versi\u00f3n 1.05B01, clasificada como cr\u00edtica. Este problema afecta a la funci\u00f3n ssdpcgi_main del archivo /htdocs/cgibin del componente ssdpcgi. La manipulaci\u00f3n provoca la inyecci\u00f3n de comandos. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante." } ], "metrics": { @@ -66,7 +70,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -114,7 +118,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -147,6 +151,10 @@ { "url": "https://www.dlink.com/", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Thir0th/Thir0th-CVE/blob/main/D-Link%20DIR%E2%80%91645%20A1%20has%20a%20remote%20arbitrary%20command%20execution%20vulnerability%20in%20ssdpcgi.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7193.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7193.json index 544d4397239..5e85d886ae2 100644 --- a/CVE-2025/CVE-2025-71xx/CVE-2025-7193.json +++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7193.json @@ -2,13 +2,17 @@ "id": "CVE-2025-7193", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-08T20:15:31.040", - "lastModified": "2025-07-08T20:15:31.040", + "lastModified": "2025-07-09T14:15:34.957", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in itsourcecode Agri-Trading Online Shopping System up to 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/suppliercontroller.php. The manipulation of the argument supplier leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en itsourcecode Agri-Trading Online Shopping System (hasta la versi\u00f3n 1.0). Se ha clasificado como cr\u00edtica. Se ve afectada una funci\u00f3n desconocida del archivo /admin/suppliercontroller.php. La manipulaci\u00f3n del argumento \"supplier\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.607303", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Sp1d3rL1/CVE/issues/7", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7197.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7197.json index 1e75f045a46..653f5e796c4 100644 --- a/CVE-2025/CVE-2025-71xx/CVE-2025-7197.json +++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7197.json @@ -2,7 +2,7 @@ "id": "CVE-2025-7197", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-08T22:15:28.363", - "lastModified": "2025-07-08T22:15:28.363", + "lastModified": "2025-07-09T14:15:35.090", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +140,10 @@ { "url": "https://vuldb.com/?submit.607819", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/18889016001/cve/issues/1", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-72xx/CVE-2025-7200.json b/CVE-2025/CVE-2025-72xx/CVE-2025-7200.json index d26e2855b5d..7f29f1a4489 100644 --- a/CVE-2025/CVE-2025-72xx/CVE-2025-7200.json +++ b/CVE-2025/CVE-2025-72xx/CVE-2025-7200.json @@ -2,7 +2,7 @@ "id": "CVE-2025-7200", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-08T23:15:26.757", - "lastModified": "2025-07-08T23:15:26.757", + "lastModified": "2025-07-09T14:15:35.293", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +136,10 @@ { "url": "https://vuldb.com/?submit.607526", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/horytick/CVE/blob/main/SQL%20Injection%20Vulnerability%20in%20Pharmacy%20Management%20System.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-72xx/CVE-2025-7204.json b/CVE-2025/CVE-2025-72xx/CVE-2025-7204.json new file mode 100644 index 00000000000..2155bc74db5 --- /dev/null +++ b/CVE-2025/CVE-2025-72xx/CVE-2025-7204.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-7204", + "sourceIdentifier": "7d616e1a-3288-43b1-a0dd-0a65d3e70a49", + "published": "2025-07-09T15:15:25.283", + "lastModified": "2025-07-09T15:15:25.283", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In ConnectWise PSA versions older than 2025.9, a\nvulnerability exists where authenticated users could gain access to sensitive\nuser information. Specific API requests were found to return an overly verbose\nuser object, which included encrypted password hashes for other users.\nAuthenticated users could then retrieve these hashes.\u00a0\n\n\n\nAn\nattacker or privileged user could then use these exposed hashes to conduct\noffline brute-force or dictionary attacks. Such attacks could lead to\ncredential compromise, allowing unauthorized access to accounts, and\npotentially privilege escalation within the system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "7d616e1a-3288-43b1-a0dd-0a65d3e70a49", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "7d616e1a-3288-43b1-a0dd-0a65d3e70a49", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-201" + } + ] + } + ], + "references": [ + { + "url": "https://www.connectwise.com/company/trust/security-bulletins/connectwise-psa-2025.9-security-fix", + "source": "7d616e1a-3288-43b1-a0dd-0a65d3e70a49" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-72xx/CVE-2025-7206.json b/CVE-2025/CVE-2025-72xx/CVE-2025-7206.json index 36576877e11..7813d17596a 100644 --- a/CVE-2025/CVE-2025-72xx/CVE-2025-7206.json +++ b/CVE-2025/CVE-2025-72xx/CVE-2025-7206.json @@ -2,7 +2,7 @@ "id": "CVE-2025-7206", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-09T00:15:47.403", - "lastModified": "2025-07-09T00:15:47.403", + "lastModified": "2025-07-09T14:15:35.423", "vulnStatus": "Received", "cveTags": [ { @@ -66,7 +66,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -114,7 +114,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -147,6 +147,10 @@ { "url": "https://www.dlink.com/", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/i-Corner/cve/issues/2", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-72xx/CVE-2025-7207.json b/CVE-2025/CVE-2025-72xx/CVE-2025-7207.json index 68a11b1ce92..35ab452973f 100644 --- a/CVE-2025/CVE-2025-72xx/CVE-2025-7207.json +++ b/CVE-2025/CVE-2025-72xx/CVE-2025-7207.json @@ -2,7 +2,7 @@ "id": "CVE-2025-7207", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-09T01:15:50.380", - "lastModified": "2025-07-09T01:15:50.380", + "lastModified": "2025-07-09T14:15:35.563", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -148,6 +148,10 @@ { "url": "https://vuldb.com/?submit.607683", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/mruby/mruby/issues/6509", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/README.md b/README.md index df31d03eabd..9539854662a 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-07-09T14:00:13.202766+00:00 +2025-07-09T16:00:12.546512+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-07-09T13:59:24.027000+00:00 +2025-07-09T15:45:43.937000+00:00 ``` ### Last Data Feed Release @@ -33,45 +33,49 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -301218 +301223 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `5` -- [CVE-2025-6514](CVE-2025/CVE-2025-65xx/CVE-2025-6514.json) (`2025-07-09T13:15:24.213`) +- [CVE-2025-1112](CVE-2025/CVE-2025-11xx/CVE-2025-1112.json) (`2025-07-09T15:15:23.457`) +- [CVE-2025-2670](CVE-2025/CVE-2025-26xx/CVE-2025-2670.json) (`2025-07-09T15:15:24.370`) +- [CVE-2025-52364](CVE-2025/CVE-2025-523xx/CVE-2025-52364.json) (`2025-07-09T15:15:24.650`) +- [CVE-2025-53546](CVE-2025/CVE-2025-535xx/CVE-2025-53546.json) (`2025-07-09T15:15:24.787`) +- [CVE-2025-7204](CVE-2025/CVE-2025-72xx/CVE-2025-7204.json) (`2025-07-09T15:15:25.283`) ### CVEs modified in the last Commit -Recently modified CVEs: `47` +Recently modified CVEs: `103` -- [CVE-2025-47174](CVE-2025/CVE-2025-471xx/CVE-2025-47174.json) (`2025-07-09T13:26:22.917`) -- [CVE-2025-47175](CVE-2025/CVE-2025-471xx/CVE-2025-47175.json) (`2025-07-09T13:27:42.433`) -- [CVE-2025-47953](CVE-2025/CVE-2025-479xx/CVE-2025-47953.json) (`2025-07-09T13:32:18.977`) -- [CVE-2025-47957](CVE-2025/CVE-2025-479xx/CVE-2025-47957.json) (`2025-07-09T13:33:34.613`) -- [CVE-2025-6244](CVE-2025/CVE-2025-62xx/CVE-2025-6244.json) (`2025-07-09T13:52:15.010`) -- [CVE-2025-6743](CVE-2025/CVE-2025-67xx/CVE-2025-6743.json) (`2025-07-09T13:50:02.300`) -- [CVE-2025-6744](CVE-2025/CVE-2025-67xx/CVE-2025-6744.json) (`2025-07-09T13:47:24.530`) -- [CVE-2025-6746](CVE-2025/CVE-2025-67xx/CVE-2025-6746.json) (`2025-07-09T13:49:30.467`) -- [CVE-2025-7155](CVE-2025/CVE-2025-71xx/CVE-2025-7155.json) (`2025-07-09T13:52:30.290`) -- [CVE-2025-7157](CVE-2025/CVE-2025-71xx/CVE-2025-7157.json) (`2025-07-09T13:51:45.550`) -- [CVE-2025-7161](CVE-2025/CVE-2025-71xx/CVE-2025-7161.json) (`2025-07-09T13:51:35.800`) -- [CVE-2025-7162](CVE-2025/CVE-2025-71xx/CVE-2025-7162.json) (`2025-07-09T13:51:25.883`) -- [CVE-2025-7163](CVE-2025/CVE-2025-71xx/CVE-2025-7163.json) (`2025-07-09T13:51:12.683`) -- [CVE-2025-7166](CVE-2025/CVE-2025-71xx/CVE-2025-7166.json) (`2025-07-09T13:49:10.180`) -- [CVE-2025-7167](CVE-2025/CVE-2025-71xx/CVE-2025-7167.json) (`2025-07-09T13:48:57.267`) -- [CVE-2025-7168](CVE-2025/CVE-2025-71xx/CVE-2025-7168.json) (`2025-07-09T13:48:46.383`) -- [CVE-2025-7169](CVE-2025/CVE-2025-71xx/CVE-2025-7169.json) (`2025-07-09T13:48:29.663`) -- [CVE-2025-7170](CVE-2025/CVE-2025-71xx/CVE-2025-7170.json) (`2025-07-09T13:48:18.960`) -- [CVE-2025-7171](CVE-2025/CVE-2025-71xx/CVE-2025-7171.json) (`2025-07-09T13:48:04.440`) -- [CVE-2025-7172](CVE-2025/CVE-2025-71xx/CVE-2025-7172.json) (`2025-07-09T13:47:02.427`) -- [CVE-2025-7182](CVE-2025/CVE-2025-71xx/CVE-2025-7182.json) (`2025-07-09T13:46:44.460`) -- [CVE-2025-7183](CVE-2025/CVE-2025-71xx/CVE-2025-7183.json) (`2025-07-09T13:46:20.720`) -- [CVE-2025-7184](CVE-2025/CVE-2025-71xx/CVE-2025-7184.json) (`2025-07-09T13:46:00.560`) -- [CVE-2025-7185](CVE-2025/CVE-2025-71xx/CVE-2025-7185.json) (`2025-07-09T13:45:44.483`) -- [CVE-2025-7327](CVE-2025/CVE-2025-73xx/CVE-2025-7327.json) (`2025-07-09T13:50:56.863`) +- [CVE-2025-53513](CVE-2025/CVE-2025-535xx/CVE-2025-53513.json) (`2025-07-09T14:15:33.260`) +- [CVE-2025-6021](CVE-2025/CVE-2025-60xx/CVE-2025-6021.json) (`2025-07-09T14:15:33.413`) +- [CVE-2025-7030](CVE-2025/CVE-2025-70xx/CVE-2025-7030.json) (`2025-07-09T15:15:25.103`) +- [CVE-2025-7119](CVE-2025/CVE-2025-71xx/CVE-2025-7119.json) (`2025-07-09T15:26:56.123`) +- [CVE-2025-7134](CVE-2025/CVE-2025-71xx/CVE-2025-7134.json) (`2025-07-09T15:27:04.847`) +- [CVE-2025-7135](CVE-2025/CVE-2025-71xx/CVE-2025-7135.json) (`2025-07-09T15:27:19.667`) +- [CVE-2025-7136](CVE-2025/CVE-2025-71xx/CVE-2025-7136.json) (`2025-07-09T15:27:29.277`) +- [CVE-2025-7137](CVE-2025/CVE-2025-71xx/CVE-2025-7137.json) (`2025-07-09T15:27:41.397`) +- [CVE-2025-7138](CVE-2025/CVE-2025-71xx/CVE-2025-7138.json) (`2025-07-09T15:28:08.573`) +- [CVE-2025-7139](CVE-2025/CVE-2025-71xx/CVE-2025-7139.json) (`2025-07-09T15:28:22.777`) +- [CVE-2025-7140](CVE-2025/CVE-2025-71xx/CVE-2025-7140.json) (`2025-07-09T15:30:28.377`) +- [CVE-2025-7142](CVE-2025/CVE-2025-71xx/CVE-2025-7142.json) (`2025-07-09T15:31:08.393`) +- [CVE-2025-7143](CVE-2025/CVE-2025-71xx/CVE-2025-7143.json) (`2025-07-09T15:31:49.390`) +- [CVE-2025-7144](CVE-2025/CVE-2025-71xx/CVE-2025-7144.json) (`2025-07-09T15:32:29.227`) +- [CVE-2025-7147](CVE-2025/CVE-2025-71xx/CVE-2025-7147.json) (`2025-07-09T15:32:50.693`) +- [CVE-2025-7148](CVE-2025/CVE-2025-71xx/CVE-2025-7148.json) (`2025-07-09T15:33:05.130`) +- [CVE-2025-7187](CVE-2025/CVE-2025-71xx/CVE-2025-7187.json) (`2025-07-09T14:15:33.580`) +- [CVE-2025-7190](CVE-2025/CVE-2025-71xx/CVE-2025-7190.json) (`2025-07-09T14:15:33.733`) +- [CVE-2025-7191](CVE-2025/CVE-2025-71xx/CVE-2025-7191.json) (`2025-07-09T14:15:34.387`) +- [CVE-2025-7192](CVE-2025/CVE-2025-71xx/CVE-2025-7192.json) (`2025-07-09T14:15:34.807`) +- [CVE-2025-7193](CVE-2025/CVE-2025-71xx/CVE-2025-7193.json) (`2025-07-09T14:15:34.957`) +- [CVE-2025-7197](CVE-2025/CVE-2025-71xx/CVE-2025-7197.json) (`2025-07-09T14:15:35.090`) +- [CVE-2025-7200](CVE-2025/CVE-2025-72xx/CVE-2025-7200.json) (`2025-07-09T14:15:35.293`) +- [CVE-2025-7206](CVE-2025/CVE-2025-72xx/CVE-2025-7206.json) (`2025-07-09T14:15:35.423`) +- [CVE-2025-7207](CVE-2025/CVE-2025-72xx/CVE-2025-7207.json) (`2025-07-09T14:15:35.563`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 4bc29bdc0a9..779801fbdf9 100644 --- a/_state.csv +++ b/_state.csv @@ -140663,7 +140663,7 @@ CVE-2019-5414,0,0,0b6e623da7fa05cc02c9d4ae273975a56909dde7118ce987ea3ad6d32acc92 CVE-2019-5415,0,0,1e91a7c37cbce12d8b7111c2c34f6147cf14cd1ced6bddf7c149d21750872544,2024-11-21T04:44:53.557000 CVE-2019-5416,0,0,b100879971280c379ffe8a500bc78a0ea0baf7b8f5be094c6a408a9a239580ef,2024-11-21T04:44:53.667000 CVE-2019-5417,0,0,d98c5f7add52766fc7c3e142426b4ba800ad9d35719d2543c1e890dd9b2efb27,2024-11-21T04:44:53.777000 -CVE-2019-5418,0,0,0ca62e2a1a1492d82f32aebdb56b377303eb90309149976f1dcdcac5aea3164a,2025-07-08T01:00:02.203000 +CVE-2019-5418,0,1,721beb4f028c46cd1bf0ed61a5918b755de4b29508b7bbdc82ebbb548773ec92,2025-07-09T15:23:23.357000 CVE-2019-5419,0,0,2ac65527707212d60b559b1ed0c37c5ef3373d700a556d668634c4b4b1fe2523,2024-11-21T04:44:54.017000 CVE-2019-5420,0,0,f19b3724aa167883e4e4e56b2c5c938fcb345d2d81dc9479f43ac2289ffe0ce0,2024-11-21T04:44:54.150000 CVE-2019-5421,0,0,a858970ade7d911d7af83b8bcbd0976bda524681608de710f41e0feb41cc2376,2024-11-21T04:44:54.277000 @@ -144022,7 +144022,7 @@ CVE-2019-9616,0,0,a66344f9c3f4cda343b0f89c1932c7c323618ca0c5677bd95ae90978bdd96c CVE-2019-9617,0,0,b95d192402e6296f016c4d751164ca3cf0686290005bd89d09ee11437643981c,2024-11-21T04:51:58.763000 CVE-2019-9618,0,0,dfc826e406483085c59aa198a8cd6c3ac0f507e9de2603141a59077d821c0bc0,2024-11-21T04:51:58.900000 CVE-2019-9619,0,0,529d01e46fda23f944ae56887b327d92043af68907cc5438f833b6270706b398,2023-11-07T03:13:44.243000 -CVE-2019-9621,0,0,621e1d19c00a9e4cebb683612101386bde7ef8775dd41e0b53b56795c1ba5f31,2025-07-08T01:00:02.203000 +CVE-2019-9621,0,1,3df42a059fc9e5b406ef34fc56bc1602cb205bf3bddb6fabe1be3de8b687328c,2025-07-09T15:22:52.043000 CVE-2019-9622,0,0,a5313a359c697e81fe3f797489d45a2f1b7097f6e6cea15017862e84fe5fee4d,2024-11-21T04:51:59.223000 CVE-2019-9623,0,0,3c5698b655752a654204af8c8ad0713732eb40f37e01a957d6775d041ae21380,2024-11-21T04:51:59.367000 CVE-2019-9624,0,0,cea2615715668acccc818448dcb48e3ad579d43c3e890307bbe45eb64b410d05,2024-11-21T04:51:59.507000 @@ -225776,7 +225776,7 @@ CVE-2023-31066,0,0,067dee756dd43007fc91a3ae4d8fb3ce64928e1384b7f7142b45ee337f820 CVE-2023-31067,0,0,603a2d37eb96db09f200a786acb7784a8991116e116894bcf3b346437ef09f64,2024-11-21T08:01:21.043000 CVE-2023-31068,0,0,836f0de03055345401460a2850a3fee5346e0988942adc52c2cb6cfcc63f975e,2024-11-21T08:01:21.187000 CVE-2023-31069,0,0,d639030dc2049f9f745b1c4a8b8e0bdc82aa33071598555c69203eeb2b4064a8,2024-11-21T08:01:21.337000 -CVE-2023-3107,0,0,b3961aff73e5ed38b4862dbded57f0725f4074cb38f58123f861bfb5a8ecc430,2025-02-13T17:16:55.347000 +CVE-2023-3107,0,1,d4bf73df267c72571ff8d4d2a28feb06258bc13789e58a900e9c72b3720de617,2025-07-09T14:15:26.207000 CVE-2023-31071,0,0,ddff2c98a155ec92680d0914984bef786c8d8e2be6ca665bd240171b476e1221,2024-11-21T08:01:21.483000 CVE-2023-31072,0,0,e924c186ae67f34dba809b1a6a8df377d4fdbf6e0dd897083a025c316032c4a7,2024-11-21T08:01:21.600000 CVE-2023-31073,0,0,022b1106167f0e1af8fe833f03b13ccb344385228480dadf50e2521533274deb,2024-12-09T13:15:28.540000 @@ -228754,7 +228754,7 @@ CVE-2023-34867,0,0,d872eacd3a79936a24114ea3f5fbae16c925f5515098c538dbc7bbd6daf03 CVE-2023-34868,0,0,92b0ec0383014e453bbf7417e099295cbbcdf2d44918f01cec01543a8b0ae35a,2025-01-02T21:15:09.110000 CVE-2023-34869,0,0,2d9adb7a5a83bdfd361e6c52dc28b0a603bcbf433dad33be958254b4792bb51a,2024-11-21T08:07:39.570000 CVE-2023-3487,0,0,68f2d9850e4a5ab0061c1ce04bf451bb9af48b3d5b3f3bf94ac9eddc3348a24e,2024-11-21T08:17:22.477000 -CVE-2023-34872,0,0,0adcb375e7aa36bc0596627a447d8de773c7845691fd8f392ba85d807a7c3e19,2024-11-21T08:07:39.720000 +CVE-2023-34872,0,1,4c3e99dd818d070d9be08c0befe74b812ea0d6fea618fb609a7403927e1d3300,2025-07-09T14:15:24.977000 CVE-2023-34873,0,0,6880d47ef7f0c51df43e8d4462389c54f56ac8553353dc167e17c1751037438a,2025-05-28T14:58:52.920000 CVE-2023-34878,0,0,ea86c4db5a3e77a5246fafda26dae198da0f4de851f8eb67b527b8957eae0567,2025-01-02T21:15:09.313000 CVE-2023-3488,0,0,4bde9b57ee97203df6e9185639477e77d5c382a806f2cfaf3bedad47d8128a39,2024-11-21T08:17:22.633000 @@ -230556,7 +230556,7 @@ CVE-2023-37346,0,0,4b46519e74c6ce78919479aca8e477d65d8badbe96442293149e68684bc79 CVE-2023-37347,0,0,ad0e9b1a0fcd561262a39b3f2228a67ebb1ce62e4a56ed1f827138c09765f7c5,2024-11-21T08:11:33.057000 CVE-2023-37348,0,0,8c1a51f58428449abd323ddafc6a8f0a3f54589dbd9dfcc1029aa4d54a20955f,2024-11-21T08:11:33.187000 CVE-2023-37349,0,0,9168fcf2935ef2d6b0d217384ba6d83f7bd3693ee996d8215b56a134b6a0120c,2024-11-21T08:11:33.320000 -CVE-2023-3735,0,0,5e1ef720b1a7a0de99e8fefc7e706949ef3a1d7665893318f56ba1c3fd39ae61,2024-11-21T08:17:56.687000 +CVE-2023-3735,0,1,64d7c95e911a7cca70541da36f87e463d6b60b48b82da250241bac7dd60f6826,2025-07-09T14:15:26.490000 CVE-2023-37350,0,0,506828c5fa6cf267f21cd686909bc94d1827b996cd682cfba84bd5cfaf3da0e0,2024-11-21T08:11:33.450000 CVE-2023-37351,0,0,aadde45cdbcd48cb04d19457a0301f617dee029c3675b8fee45ddb0c54d7a092,2024-11-21T08:11:33.570000 CVE-2023-37352,0,0,9f7711793274e7f29ddcc34c2e06e18ad49e3725c19ebbab01e762278e0224b5,2024-11-21T08:11:33.707000 @@ -244189,7 +244189,7 @@ CVE-2023-6974,0,0,830e1bdefac5684396af5fe456fc01c33610c8677e7264eb032bae22b2e0dc CVE-2023-6975,0,0,7ca778a1d144582504f338c5505fd2bebfa3bac459593e53d8d68acec5a79542,2024-11-21T08:44:57.463000 CVE-2023-6976,0,0,101e371a42478234a5ad6cc41a6c57922fe3c023582fcf7a42531f3e52ff3803,2024-11-21T08:44:57.587000 CVE-2023-6977,0,0,b682f0b725f808277d1285dc1d1321ad4dad032e27e165427f6f8dcf4ddc5ec9,2024-11-21T08:44:57.717000 -CVE-2023-6978,0,1,d0b45839abc21bd4fe7cb49df36fa6949c3f82025413eb8e1f10f9bfa780e965,2025-07-09T13:27:55.630000 +CVE-2023-6978,0,0,d0b45839abc21bd4fe7cb49df36fa6949c3f82025413eb8e1f10f9bfa780e965,2025-07-09T13:27:55.630000 CVE-2023-6979,0,0,f9ea74177821de1d7dafa1e724d4f87909c168d837ac8c48cdc26c4138f45b6c,2024-11-21T08:44:57.850000 CVE-2023-6980,0,0,7ec27631f978614b79cfb2cd242dd6a9e1167c5e8c04e3949cc9c2f79817ef0e,2024-12-17T18:23:18.433000 CVE-2023-6981,0,0,f9532becf10c0ada5bbc774f24d6b259065b9498ec48eac4f2ce903fb819ae94,2024-12-17T18:23:16.780000 @@ -245599,7 +245599,7 @@ CVE-2024-10174,0,0,785a071e6368bc2088e4db78385725926f2a07259384fdc6bb75eccf5b5d7 CVE-2024-10175,0,0,9d6bfea3124cbe12dc8beb6acba51208007e696098af51abe0ae1ca1472cefb0,2024-11-27T07:15:07.020000 CVE-2024-10176,0,0,1de5b7d5d65c843af328510cd44a4854ad1f122b5f1e61c8537a88d779b02fab,2024-10-25T12:56:07.750000 CVE-2024-10177,0,0,5e7ad13ce4bc9b20ada91706797a1ac84252114dfb41c003c452005f96c1bccb,2024-11-21T13:57:24.187000 -CVE-2024-10178,0,1,286c6a4dcd15c122a19ed806461a2aff3c368045602ba176ebec61e1b8102cfc,2025-07-09T13:01:14.860000 +CVE-2024-10178,0,0,286c6a4dcd15c122a19ed806461a2aff3c368045602ba176ebec61e1b8102cfc,2025-07-09T13:01:14.860000 CVE-2024-10179,0,0,e31219e443b8105e83a558c695ee5d62a4b5d6afebacf71e0d60b38918b6b06e,2024-11-12T13:55:21.227000 CVE-2024-1018,0,0,1160c01b26db43309fb5a56f5ff21d3a018ca8bb8cc2a05bb1b1ad315ceb9aec,2024-11-21T08:49:36.513000 CVE-2024-10180,0,0,1ae1841bb90aa586e7842de633d0e3b1b6ffc4c030ed7c4a0bebebad2b1bfd99,2024-10-25T12:56:07.750000 @@ -245667,7 +245667,7 @@ CVE-2024-10241,0,0,fe3dcecfada7c3764490fec385526c423fea05ceb1d8cfae03a9be08ced79 CVE-2024-10243,0,0,39a36b1b943c4715e7ce65f2778e56fedcf2864fff992f402d679f52e1a6fa11,2025-07-05T23:15:22.680000 CVE-2024-10244,0,0,c570be30c23fbc6e7995cf67ed34b35599a5beb9baedbf7d9a73d4f6e186e7a5,2024-12-19T14:15:05.760000 CVE-2024-10245,0,0,5714c51fb85acb3984990d3d9b6159b31ef4484b309f1b36de23af150cc1fca1,2024-11-12T13:55:21.227000 -CVE-2024-10247,0,1,bc4e7156f83180421fbc06931bb5449719d72e3fc78514346952c27070d3390c,2025-07-09T12:57:29.990000 +CVE-2024-10247,0,0,bc4e7156f83180421fbc06931bb5449719d72e3fc78514346952c27070d3390c,2025-07-09T12:57:29.990000 CVE-2024-10249,0,0,582e1c1fc216d4d204cd105f0cce3f658d8bc16bb2117d21c7c98a720c0797d3,2025-02-11T02:15:33.147000 CVE-2024-10250,0,0,dce2ccadbd6e77d5f97f6e4ccb7b1ad74933eaf3de52e88abfac961c0db9fd4a,2024-10-25T16:37:32.777000 CVE-2024-10251,0,0,d0f18531c0f704e2c1c5ac31ed75dee8e4053fe9f93163da13999ad0d8735e1f,2024-12-13T19:35:52.440000 @@ -246227,7 +246227,7 @@ CVE-2024-10783,0,0,d046835d673244f5b2060228650346a120575ac3400a868e6245f24078812 CVE-2024-10784,0,0,e729d020d63933c826d85a8f7f322af726b78c24d4d527f7a2063ee6671b69cf,2025-02-28T22:54:24.420000 CVE-2024-10785,0,0,c44c7def2895dc1c6dc6cbe19a2fc42718f99a01882e8aafd0b061f4001962a7,2025-02-07T17:03:34.213000 CVE-2024-10786,0,0,ccc5097d72c9d28e3db11dc281f3f9385330979372f0eb8c07e82e1cc6da99f0,2024-11-18T17:11:17.393000 -CVE-2024-10787,0,1,ac5f5b6029487716ccff076b82e79615f0c52d6c6c869dcab3183ecc8f248825,2025-07-09T13:08:06.650000 +CVE-2024-10787,0,0,ac5f5b6029487716ccff076b82e79615f0c52d6c6c869dcab3183ecc8f248825,2025-07-09T13:08:06.650000 CVE-2024-10788,0,0,62788f949bca5d7e37cdb922f69d1fcd20199b1de5b86ec020525fca7a998fe6,2024-11-21T13:57:24.187000 CVE-2024-10789,0,0,a3fee710e57289747f3ee1108a198e26c266c5b961e00b751fa73a9ad18a8166,2025-01-16T04:15:08.127000 CVE-2024-1079,0,0,076f0d90756c2348b32c6cbe4a55fada41785208b845fa866d02741439c7a75a,2024-11-21T08:49:45.060000 @@ -246702,7 +246702,7 @@ CVE-2024-11248,0,0,400f732e1ca44fefea0e6ebd0e57418b256381117afce6f197b85be5bf093 CVE-2024-1125,0,0,4d0b5fc967895869908236f67000c1641c8e7f2139240de53289a37094eb178d,2025-01-15T21:23:06.507000 CVE-2024-11250,0,0,1d911eaa132e9450b36dc6c8a663ef95ec738de06fd7b57aac724c63248cb110,2024-12-10T17:22:10.547000 CVE-2024-11251,0,0,305bbf1592d4eaa4534e1c7e8c0a204d7446c058354be3d67d2a086abef32e2f,2024-11-18T17:11:56.587000 -CVE-2024-11252,0,1,38d1d49daa376e7a412070f5a3d416ebd98bfff341b77b18e6a6efd3558344b9,2025-07-09T13:54:32.730000 +CVE-2024-11252,0,0,38d1d49daa376e7a412070f5a3d416ebd98bfff341b77b18e6a6efd3558344b9,2025-07-09T13:54:32.730000 CVE-2024-11253,0,0,800c3473e77ce3788b2682006485f1120b039a0d8bb5577558aca6b688823012,2025-03-11T02:15:10.043000 CVE-2024-11254,0,0,d52cfffa50a2f714ffb3241f70d68750053b1626982e84d3b85b909f113195d5,2025-02-28T22:56:45.970000 CVE-2024-11256,0,0,1a837548036f49b724cb7ad582e9538d46d656e447bd851b0561c9868934299e,2024-11-19T21:49:04.790000 @@ -246917,7 +246917,7 @@ CVE-2024-1145,0,0,71ba2561916ff383446b1b9365376abadae467a3a4b7425691a59ca4e41768 CVE-2024-11450,0,0,d9225aed2ac8475bb91c6ace69e4cc88aaeb28d7907e757183e21dfd957a870f,2024-12-06T09:15:07.137000 CVE-2024-11451,0,0,1ae0af532d165e743ffcab70ed2c779554ae651574ede2e8a8329313fc3507ad,2024-12-07T02:15:18.117000 CVE-2024-11452,0,0,15ed0600d3f3cea8d39d0e8707b77d53dbb9f26e901dd48087d2f9e5ff636ba7,2025-01-16T04:15:08.287000 -CVE-2024-11453,0,1,2c7e8bb8ae49bec26c1c1c8e143898a8e5436be1d6d50fcd4f7e7d713d55c2c7,2025-07-09T13:51:21.420000 +CVE-2024-11453,0,0,2c7e8bb8ae49bec26c1c1c8e143898a8e5436be1d6d50fcd4f7e7d713d55c2c7,2025-07-09T13:51:21.420000 CVE-2024-11454,0,0,b8ddcad9ddb907fd9ba5dfef36a54bf87f919bcb34e7dd445b734c2c0f526697,2025-05-08T15:38:15.293000 CVE-2024-11455,0,0,2585d76118af0f8584c93ef70fec17184fe9addb803068b4dbf20f8e44717637,2024-11-21T13:57:24.187000 CVE-2024-11456,0,0,caed410cc4ff433ff7bd202facfe4d5c9fb8adc8fa56de727455be9f30014705,2024-11-21T13:57:24.187000 @@ -247386,7 +247386,7 @@ CVE-2024-11893,0,0,ab78f78c6e435c83f3f5f09a281780ac0636482d65ec96c7c75ce803df2c5 CVE-2024-11894,0,0,9e31b28fa56a41e12b82fdf98576d9a13777f5eed7b6c3fc1f71a85af109ef81,2024-12-14T05:15:10.227000 CVE-2024-11895,0,0,6ff552343322b3aae06291c698f7c9f591f6864604cedad87a6ad70b084caf4d,2025-02-21T15:36:37.803000 CVE-2024-11896,0,0,34f349ccc91bcf6d6c27bb81a454efc17924954cfa878d33ee370546a785a3f4,2024-12-24T09:15:05.663000 -CVE-2024-11897,0,1,40cbf96f154f80532f73f1f23c4c1a67254ea0507b56f93c00f3cd77f059b8c4,2025-07-09T13:39:44.247000 +CVE-2024-11897,0,0,40cbf96f154f80532f73f1f23c4c1a67254ea0507b56f93c00f3cd77f059b8c4,2025-07-09T13:39:44.247000 CVE-2024-11898,0,0,0f6ad726b08e6af4a59ca1afcf5ad663e20a18e103a55101aa1ad8acf0f6fe6b,2025-06-05T15:45:49.263000 CVE-2024-11899,0,0,5d13f312c32a92aa6341f1bb7b66fa2f7ec47b859ffdf36ce88c4618587da220,2025-01-07T04:15:07.350000 CVE-2024-1190,0,0,234a49a5e7705658abf0b6e88d111180ae34b962c9b1fcba39bd09bd939fee39,2024-11-21T08:49:59.993000 @@ -248580,7 +248580,7 @@ CVE-2024-13055,0,0,c8c2eec8d1c599dd9e99545ec3f23f82af6e7ffed7b8da116722ffbcd7885 CVE-2024-13056,0,0,0ee05ef5f45e861c43a23e9a08c2471878b99af9f1d925b5952cd4419278510e,2025-05-07T19:06:20.933000 CVE-2024-13057,0,0,0862c10777da12bd0755d23764b2a04f23442d277ef24f43fa0346ec4990c9d2,2025-05-07T19:06:50.503000 CVE-2024-13058,0,0,c5644ef89750856e75c92a38ebb4acb3842af03f9839dca175c3cdbf779a267c,2024-12-30T22:15:05.957000 -CVE-2024-13059,0,0,2d881063a2f558168a4ad177a9a31536f3417e4d6cd540b2c801f355fb5578a9,2025-02-11T00:15:28.563000 +CVE-2024-13059,0,1,d908cd57f338b2f6225aabc2a52de8a07671b3f1425d34319ed097c22d892be4,2025-07-09T15:11:29.243000 CVE-2024-1306,0,0,ede8dc4e824945d41665cf4179ae38d375e8419c5c16bdbc3ef3275fc6492272,2025-04-08T19:43:28.627000 CVE-2024-13060,0,0,561225c228feee6c3bb6945f5e9325390ceb56a82ae65031285458a06cd928fc,2025-04-01T20:34:17.010000 CVE-2024-13061,0,0,f0d229ddc53c34e4105e6b89d4e6cbe6fcae50e1fc38e3eb92bb7d84d07d1623,2025-01-02T02:15:19.897000 @@ -249642,13 +249642,13 @@ CVE-2024-1507,0,0,c3484eb348fc4bda677318dbf5f9db8435f9fd469134f1f05c3aa9f77013f0 CVE-2024-1508,0,0,fcb12e81603518991b3714d0146406aa3ba4165f2bbbda4d728b388f1cec3c33,2025-01-21T19:01:59.473000 CVE-2024-1509,0,0,fd6d3c73a61b901e32bfa7f747ec571a0c759eae41a33db8e8c96702965851fe,2025-02-28T22:15:38.573000 CVE-2024-1510,0,0,fc6bf8aaae38d5c45449b6d3b647fcd785ec0c1d72e1dd5e0b1f19b5969e8476,2025-02-04T21:00:07.557000 -CVE-2024-1511,0,0,67a4cb471169b32268dae2a1401f7e42671ec6c902629094a12ea7e80f83270f,2024-11-21T08:50:44.160000 +CVE-2024-1511,0,1,cc783a75d95839d08146aa5f10554e4a29352be29f3a5fcc345c011c717431fa,2025-07-09T14:08:00.500000 CVE-2024-1512,0,0,26a89e8ea4daeb69acb8ef0a5290d443e1fbb4f0997b4751a3c4b63986c14001,2024-12-18T17:23:15.360000 CVE-2024-1514,0,0,d48ad0f68b905db26eea1aa20744620a566afbd3308a47eaec63aadfb7f0edf5,2025-01-28T17:50:30.417000 CVE-2024-1515,0,0,a3add1da137a72880095a1615a74b53662a1751b21dec935a7c4b7d184dd4113,2024-02-16T18:15:07.820000 CVE-2024-1516,0,0,d7426e626f7cabc7f490134d20676919d65607359d8123909d0c7ffeaedf7492,2025-02-11T20:02:48.067000 CVE-2024-1519,0,0,ef8db52d6697b00e9b63b12b86b1ca9a8ef9f7b004809c241d596d1b84437d97,2025-01-22T16:38:11.330000 -CVE-2024-1520,0,0,306ec72c8597c8e80a8f5ff418895d7852ab28f47b5ee7a7651a55db22f0818e,2024-11-21T08:50:44.787000 +CVE-2024-1520,0,1,4d68fa5cfce634e5f693d0fff8cd98049b86fdc30db6702aea1034a5085b89c8,2025-07-09T14:14:56.047000 CVE-2024-1521,0,0,b9e9b7158ea19eb6e0d034a7fbba1cb55281ba560e9c40fc45dc77953ecba6be,2025-03-12T14:11:21.923000 CVE-2024-1522,0,0,ee298fdc80c04f91856f9b87b787630683be2fe9b1e8ef72005b49111333cc48,2025-06-30T18:56:13.953000 CVE-2024-1523,0,0,048eef54d080ea57df02f8070dee964acb62eadaded82c061ede59f9519607a2,2025-01-23T19:55:29.380000 @@ -249724,9 +249724,9 @@ CVE-2024-1596,0,0,d3ac46e8542021623a10cb9a7fcd7c0ff096d3382d6c4002ee880e3d788b39 CVE-2024-1597,0,0,01a8079ac18bdb625eb7773ebdf03a9502801e21db819c5420d46483d755d9fd,2025-06-12T16:15:21.557000 CVE-2024-1598,0,0,658346e9ddb00077c89c098f1dc70fe615aaf1be46069a7e9dd54964c2ceba3a,2024-11-21T08:50:54.990000 CVE-2024-1599,0,0,105f658bdb5d4f55673b9a4a91d4766e7759683398ba430d2b081d80ef821d99,2024-06-07T11:15:53.177000 -CVE-2024-1600,0,0,7d59d99fe5f3ad3a94f279ee771a7fc04d258402b31857a9df738c456c929c64,2024-11-21T08:50:55.133000 +CVE-2024-1600,0,1,11755e9c4fdf06c2b8dcae9a1c542a333cf5629a5868180aa3a717fce7db9310,2025-07-09T14:14:24.293000 CVE-2024-1601,0,0,5ac9e7fc3e8b4b685c723971a3da0afb349e635fac531357bf385b6c479cc60b,2025-07-07T15:54:16.207000 -CVE-2024-1602,0,0,34a2386ed02454215b2af3bd05cfb8c1f399ab5ae7cea39c8f9cb75d73452908,2024-11-21T08:50:55.387000 +CVE-2024-1602,0,1,eeb13f5dcc9ee54b4065acbfc0b9828bc86623d68c2f1ec01afd6a8017a3adec,2025-07-09T14:14:04.560000 CVE-2024-1603,0,0,40e9d93a18e24bfe0aaa466babdd862b8c37692838e40cbdcde8e0e815d795d8,2025-01-24T18:22:44.423000 CVE-2024-1604,0,0,6948e42ad454d9c75129f2d535fc4eb245afdd1c22afff76e86465241e36fb86,2025-03-06T19:37:43.470000 CVE-2024-1605,0,0,5a04c56bb880a03107a018c4fad8602e1dc834ac8f57bfb03ffc4f79cea975a3,2025-03-06T19:38:40.183000 @@ -251720,7 +251720,7 @@ CVE-2024-21774,0,0,9dbd9d2730674cbb6b04cd32f96f031daf4202c8c95abac61f10ac5023434 CVE-2024-21775,0,0,47f96747d440c6bdfc57b6dcff5e30996dbaa9514148a866fef0d4c01b291f4b,2024-11-26T16:34:43.767000 CVE-2024-21777,0,0,9d9da8fd426a048a07298737e57d1d9170bf2ffe1a77d8fcf54bf75758ed7581,2025-01-28T17:39:26.460000 CVE-2024-21778,0,0,253f2dd3bc0112951c08e71c3370ea10726979e1470a6565609d98589cb5f4e7,2024-11-21T08:54:59.287000 -CVE-2024-2178,0,0,bdb3497c5899f31362e18c9014569817deb02b83691cb09effe03af4ee467148,2024-11-21T09:09:11.810000 +CVE-2024-2178,0,1,7064063f86a41da756997a92609c6b7ec5109125a38e95bf8fffbe9c61ddc74d,2025-07-09T14:25:18.873000 CVE-2024-21780,0,0,138ccb581887ec471c5b8b540d59621fb0a3af4b2116ca8767f7fb0bd943babd,2025-06-16T19:15:30.280000 CVE-2024-21781,0,0,856fac6393857737a6307198b264a46445b2366b62e69e08f2d3fc1376fabafc,2024-09-16T18:03:16.707000 CVE-2024-21782,0,0,4f8de06e6743ebde6cbaf72bb6d23ba7f75e27332e901fc90d33b8bb8c66b736,2025-01-23T19:47:50.617000 @@ -252562,7 +252562,7 @@ CVE-2024-2298,0,0,a85fa7730d2df572068f0e46cf7b1543a1326e3663c97e6671307d8012f9d6 CVE-2024-22983,0,0,67421dae6881b52b66d1e595c4115b2166c7d5663fda6009d63d8fcdb069daa8,2025-05-02T19:49:55.307000 CVE-2024-22984,0,0,fc6f2532d62536f57f6959754844311196ea55b6a39fbf85c7d2f459ee5381d0,2024-02-07T20:15:49.320000 CVE-2024-22988,0,0,bf3cd2839e352a92648f411e63f2f1ff70c4419f0ad60b7025d2f24725ef57f6,2025-06-07T21:15:21.620000 -CVE-2024-2299,0,0,2169c0ac6118304adbed1a085ee0a5eb910ffbc08535d360130e1779bce8eccc,2024-11-21T09:09:27.393000 +CVE-2024-2299,0,1,2743e396c6f5397f94133fac57b8109def7aa5d61083c487ecd4f518a98598f8,2025-07-09T14:41:13.210000 CVE-2024-2300,0,0,c92a8f4bde6838d4ec64cad2649eead9a06ac17086996316734c20573aeb6bdf,2024-11-21T09:09:27.507000 CVE-2024-2301,0,0,64adce604b0bc27e42016cdb8242b23454751df3587b599cdf9bd5fd28acf7da,2025-03-14T01:15:38.990000 CVE-2024-2302,0,0,3757c6a84fc520895bf80274b44761fcda695347d86c62f50fa90e823b383df1,2025-02-07T17:05:52.550000 @@ -253063,7 +253063,7 @@ CVE-2024-23563,0,0,f9e9926719c593ac853dee4b0e48a00a8157c3f26978ae9e180340425e960 CVE-2024-2357,0,0,9db9e2d982cc7f87c4deab786615d4c2491074f7901aaf72f0e7eb4e46dabe0a,2024-11-21T09:09:35.103000 CVE-2024-23576,0,0,8e35fc14ff81553798c9705cb9280b119a1621315c5495a341840ffdf08fc150,2025-06-17T21:01:23.060000 CVE-2024-23579,0,0,d24661721a28ef998bb0b5017df483b369b29abcab71f13d97c35966d3d2cd62,2024-11-21T08:57:57.097000 -CVE-2024-2358,0,0,8d5139319e1a33332812be45ae17fa7f6689bf3762c6f9ae5a25c7470b7076c3,2024-11-21T09:09:35.293000 +CVE-2024-2358,0,1,9dd4139c3ce278534c8083b339862dc55e6ab50d6a5df45be70e31d2a406ad9a,2025-07-09T14:39:33.337000 CVE-2024-23580,0,0,e2d8f49128ef7d1415b2a7d9a431bfdde830ffd144297d5ffeec148119656551,2024-11-21T08:57:57.237000 CVE-2024-23583,0,0,d466b31bd822320b06edf9dbc1d34f95b8752ca4f50f2f6d9f32d574f76d068d,2024-11-21T08:57:57.370000 CVE-2024-23584,0,0,086e732a9729c9254a40a2efdcf274b8f5be7ce13440e21608cc18ba34ca8dcf,2025-03-13T14:15:22.607000 @@ -253089,7 +253089,7 @@ CVE-2024-23606,0,0,29997b26a92eb62ace56664ebd405775eb345e3afd91cb43cd5981d3cb444 CVE-2024-23607,0,0,3fec5058d10d6cf455674d1c6284bb37392a28907ec5aace1fd1b3a1426cb5d1,2025-01-24T16:03:56.080000 CVE-2024-23608,0,0,b87563f8115e279cbb94906ccf612309bd2ffbcdc77e02b36f7779df7165720d,2025-02-27T17:51:32.090000 CVE-2024-23609,0,0,1e22d5fa6970c67ad5ec1e4be7c6c1c34db78bce32a1097b89a3b24a7baa27b5,2025-02-27T18:11:32.143000 -CVE-2024-2361,0,0,347abd9d9a766ed7a5388325449564d0c82ed45214a4fe246d1ddd4b061e61a4,2024-11-21T09:09:35.667000 +CVE-2024-2361,0,1,c092848ab202969205411c137a95c5ba2a6307ba51c69e4c1bb02f7e63b11a09,2025-07-09T14:38:45.987000 CVE-2024-23610,0,0,5202d96635a2ac809a98a39464a43b990dbb29394e14857b8657db2e88a27599,2025-02-27T17:51:42.177000 CVE-2024-23611,0,0,89462df8ca38593d8d089af34e8f8755f4b0510c8457bd94577a5cf09a4d01b7,2025-02-27T17:51:47.873000 CVE-2024-23612,0,0,7a22dc0cd5f6f75c5ac108d2ec0d0c4087d8706936f19b5451d88d8250a9a8d3,2025-02-27T18:11:29.183000 @@ -253141,7 +253141,7 @@ CVE-2024-23656,0,0,6b2dd5e5fc67d8f7e730ac5a91f9bc97b62f72d1c70d7c62411d5aa72b24b CVE-2024-23657,0,0,af8dd4c9a54a228b51a3a7ea1ef8edba58b5bfd873984eb8ec483a5cb6984532,2024-09-20T12:49:35.743000 CVE-2024-23658,0,0,5335e0bfed7a3e1e945cd4842099e3db4366e8569f4b69b0eb6f64dcb84b357a,2025-05-06T13:54:11.390000 CVE-2024-23659,0,0,382ad5774e5a73cbca95bbcf40ad42080a17578fcb7fffe0f9c459eec5bccad3,2025-06-02T15:15:32.007000 -CVE-2024-2366,0,0,31d19fed8190d99872f3217e46bbaffbbc1616c226b57fa5b921eafd6983fdbc,2024-11-21T09:09:36.327000 +CVE-2024-2366,0,1,68257f0a6020960c7fd14c1be6757b363ff13c6c5eb643799ffc70681a267fc3,2025-07-09T14:37:53.760000 CVE-2024-23660,0,0,8c936ab42762b0a08627ef5d1b0305c46f54eadd46f69b2265ff096c6d65b427,2025-05-15T20:15:44.077000 CVE-2024-23662,0,0,fcb6a3236ea3e39380df6e19287e42e2832677f3aa97bcd1d15ed0addfd552f6,2024-12-11T19:11:44.790000 CVE-2024-23663,0,0,4115801077b89b088b225d11dd742f9500976c4f6b3e6ad1ae4e5eab6cc084e4,2024-11-21T08:58:07.203000 @@ -253399,7 +253399,7 @@ CVE-2024-23921,0,0,246aa32a66d0ebb871b2716794f7fbc6b25e2aa13fdbc6fc8699ef7052276 CVE-2024-23922,0,0,2d559582d23c0b1aa77c5c48b51f0b0c564ebc51a759834728fd4f27625943e0,2024-09-30T15:37:28.453000 CVE-2024-23923,0,0,2b299af07539c6b04589d5f4cb78313212c713b14e6f4111f325ca8810b2cf16,2024-10-03T18:07:35.977000 CVE-2024-23924,0,0,465231a82fd4648306cddbdcd0ef7925a0538a8b613742d6302b13e6441b1caf,2024-10-03T18:06:54.180000 -CVE-2024-23928,0,0,0daa30102a2c43f8bd414a1a452bc0e070d15ea2c9eff52842fc9af1711362ad,2025-07-01T14:15:31.630000 +CVE-2024-23928,0,1,d7ca595729f3e13bfc5952304aa56393a4db2fc32b8c70908be935106974a62b,2025-07-09T15:22:13.007000 CVE-2024-23929,0,0,9a151c7a0d9c55bfe7eb0761cda6b74649b74771b2e5ebf082ddb8b2395143ab,2025-07-01T14:15:32.070000 CVE-2024-2393,0,0,a6dfd218912d9fa2081f9e8e4dbad82b194581826a221f5ab7cc202e95dcce1f,2025-02-18T16:20:38.263000 CVE-2024-23930,0,0,4be99e296d922af7ae75de1b7d88869c7727d8c90581aa0fa22a8d8f6d3de19a,2025-06-30T18:15:23.490000 @@ -253746,7 +253746,7 @@ CVE-2024-24566,0,0,bdd754328dfa0c55c8dcf5ac320a21629725e842e54764a4ffc36532d5f70 CVE-2024-24567,0,0,18f30adc1f3edc368cb20b4126d7148723b64e7025cec69f45a2845b66ed87a2,2024-11-21T08:59:26.220000 CVE-2024-24568,0,0,769c7fcc42428eede9afeecc7cc9180dbc5746fad20dfdb07896e25105c8b100,2024-12-19T19:30:33.157000 CVE-2024-24569,0,0,49c2607f7934bcf6dba24687f63a76940987608943594eb3bbee3236783267b8,2024-11-21T08:59:26.477000 -CVE-2024-2457,0,1,f6d6bac959181a517f843d70f9a465a5b68f174c3f56988bb516a3ae31132a4b,2025-07-09T13:58:40.817000 +CVE-2024-2457,0,0,f6d6bac959181a517f843d70f9a465a5b68f174c3f56988bb516a3ae31132a4b,2025-07-09T13:58:40.817000 CVE-2024-24570,0,0,ce1e99b129a8a3879a6a387b79420bd69cbd370b5d8ba318c5c13f09353f8c07,2024-11-21T08:59:26.607000 CVE-2024-24571,0,0,4c7b16a8f4838908c824c8215d84ffabb8960e7f48979b28c45fd0c3202d6464,2024-11-21T08:59:26.740000 CVE-2024-24572,0,0,030d46c040e2c3fbe42329ab0345ae3c23f2e61a700934020eac36e58ebefd4a,2024-11-21T08:59:26.877000 @@ -258222,7 +258222,7 @@ CVE-2024-30327,0,0,e099b89dbd941f4949bca567b08d1e55e8e7cc20427c420e761d233d3cfc6 CVE-2024-30328,0,0,1c9395384a0940ed3b008df49a3508fc363f283e1bfc226c8776d37480edf7e2,2024-11-21T09:11:42.020000 CVE-2024-30329,0,0,8ee57fbab41f4293a3e12513ed81a887139621991de495198e165fec456838ed,2024-11-21T09:11:42.160000 CVE-2024-3033,0,0,1b8e02d84b89b7b89f55321d13194b84a08cf86778da3551a42de9338c38c8e7,2024-11-21T09:28:43.710000 -CVE-2024-30330,0,1,d1e4e25a1eeb1e5f69f733eabce8cff890864750d84789b1a727e85e42af0d7c,2025-07-09T13:42:06.550000 +CVE-2024-30330,0,0,d1e4e25a1eeb1e5f69f733eabce8cff890864750d84789b1a727e85e42af0d7c,2025-07-09T13:42:06.550000 CVE-2024-30331,0,0,c46a3954fa2db7fa82bb01909829239694ec25824569125cd1bdd6ea1cb40806,2024-11-21T09:11:42.450000 CVE-2024-30332,0,0,86e9c4b1f7305283e6be51bc00614ae7d892767a558e3d3e2101ccc40ca04b14,2024-11-21T09:11:42.597000 CVE-2024-30333,0,0,c97c8db7506ef18e690f6b188ca70b4242bc0cf3b5ab465c09f0416ba8016068,2024-11-21T09:11:42.743000 @@ -258234,13 +258234,13 @@ CVE-2024-30338,0,0,b91a634618a2dfa58da414fb669c25033009d4a414d4ccc4ed18190b8d611 CVE-2024-30339,0,0,b686d6af869460fd56f9f35233cfa54742dc766850ed569997f5911469b8cc5d,2024-11-21T09:11:43.567000 CVE-2024-3034,0,0,181dd2bb0ea6f949c24fb613c14082cc61a244a2fdb9e73f0cf6514586a98711,2024-11-21T09:28:43.873000 CVE-2024-30340,0,0,5a2c4060dcdd8564a656a2ab028c1dcb498580eb51d786c01cbac2de4a8f93a9,2024-11-21T09:11:43.690000 -CVE-2024-30341,0,1,34b3a8fedee2cf4950c08546043c2468a368393e0bce090af63575fccd0eb893,2025-07-09T13:38:29.957000 +CVE-2024-30341,0,0,34b3a8fedee2cf4950c08546043c2468a368393e0bce090af63575fccd0eb893,2025-07-09T13:38:29.957000 CVE-2024-30342,0,0,918d0c779236c7ae7a8e09e90578a6df0211ecff85ec7d2bc5ec35fa4e2c525f,2024-11-21T09:11:43.950000 CVE-2024-30343,0,0,6d7d30e0d095db99887767e757ba15f6f7744d9a9267abbe6afc4a900b0147ea,2024-11-21T09:11:44.077000 CVE-2024-30344,0,0,d3e299c0cc0a847c662f89c5a37a964a5d7007266b48fa81ec3e28e85291bd59,2024-11-21T09:11:44.200000 CVE-2024-30345,0,0,f5ac4ed28fd65aadb4e098d7b6dc9375a063c870e505abeba89f803249e4c6e1,2024-11-21T09:11:44.337000 CVE-2024-30346,0,0,3eec8d24e8de091376d7f587740d05ada1d51b84fca38e8a2563137debb24558,2024-11-21T09:11:44.470000 -CVE-2024-30347,0,1,ffacae3585357e8f09f16e5c10d70ed5b2a1a0be3a171fb318851f39c1c64629,2025-07-09T13:39:44.487000 +CVE-2024-30347,0,0,ffacae3585357e8f09f16e5c10d70ed5b2a1a0be3a171fb318851f39c1c64629,2025-07-09T13:39:44.487000 CVE-2024-30348,0,0,d22a1ae9da2d1acefe881ce1b47f6c7ce5dabcc963d127eed25471c082419a6c,2024-11-21T09:11:44.723000 CVE-2024-30349,0,0,61a3feb6d77505a64be8532e55d0b76384ac6af22df9cb9f7bb5b1c406bcd62a,2024-11-21T09:11:44.840000 CVE-2024-3035,0,0,0872576c5e1a7ab0b86339c36bb29f7267882a8c936f3f532e890970396fba74,2024-08-29T15:55:30.247000 @@ -258930,7 +258930,7 @@ CVE-2024-31256,0,0,592139096ac6eb09b1b90bd15d1594575bcc431d14fc5a331bf8509d765df CVE-2024-31257,0,0,2c6e4aa23b14797a7f60b7345ce1f46d2483b7df1db43515a016a63fcdab16c7,2024-11-21T09:13:08.600000 CVE-2024-31258,0,0,cc466215b36ef6ed283f064b8d1d6324482af4fb2281bfe3c773173225c55069,2024-11-21T09:13:08.710000 CVE-2024-31259,0,0,89a6d79d4614c63e76ccd8f27f698138b1755da137bd8bb9563a5beba636ea8e,2025-04-08T14:43:39.133000 -CVE-2024-3126,0,0,56cb4015104c846462fa3157899b5e392c7136688c11d206dc13d99417ad85b8,2024-11-21T09:28:57.510000 +CVE-2024-3126,0,1,1353fd03a33337a58b8c10910ea55497579056d01af6391950ab48fc0bf0da16,2025-07-09T14:36:46.093000 CVE-2024-31260,0,0,36b10777c4731890f00fa34c5315a1661327014554333de6381780911e9f3044,2025-02-07T19:04:19.687000 CVE-2024-31261,0,0,9a557f085fbf839854a0ecbae20545aee16945f812e1e3ca7c6c369a470e77e6,2024-11-26T15:53:19.327000 CVE-2024-31262,0,0,ec8d1162e19085f6993ae04312e4a5e1f6af3011d982639e04ff63e89122c36f,2024-11-21T09:13:09.157000 @@ -259793,7 +259793,7 @@ CVE-2024-32483,0,0,b30d6e0a3706a53dcfe036dfdf50108c32320dc8f8de91e271a9318984dbe CVE-2024-32484,0,0,7896b2cfd633e1dc14fe53779f321e78cba2d01b173f70e24cc07a477ecc39d0,2024-11-21T09:15:00.430000 CVE-2024-32485,0,0,5dd2433b981b99381f8c30987145683cdbb0f2f5a56842a7206bfe238590e7b1,2025-03-07T17:30:33.860000 CVE-2024-32487,0,0,c005a432be0412d1f21e6f700c98d601c9c108340f1ce108ad6f8085ec56937e,2025-06-17T20:58:12.907000 -CVE-2024-32488,0,0,38b4e443ef95ea420149b33b5b1e8f1fc9eb4c73891a48f8413e9cec32c971c5,2024-11-21T09:15:00.873000 +CVE-2024-32488,0,1,ad45018a5602c36cc942b55679c9d791f6eeeef189777b6d60fca17e0f2cc9d4,2025-07-09T14:52:10.653000 CVE-2024-32489,0,0,6d176608fd09aa1c0e1fd52c713dcf0781fbd134f4a0580677661424315058c9,2025-05-21T18:09:30.630000 CVE-2024-3249,0,0,dc4fb5cc53c1419243d3bcf85ea013a51969f9e3dddebec37260c1bebe4dd321,2024-11-21T09:29:14.560000 CVE-2024-32491,0,0,c9be22398b321ef29f28645b80b9d5d84c85ca95a4864acab1433154f218e6fa,2024-11-21T09:15:01.397000 @@ -259874,7 +259874,7 @@ CVE-2024-32564,0,0,3c01c3431545a02f9eb774616c0598060c77d661ea71518ff688a7c75f936 CVE-2024-32565,0,0,7dd81a464449b814394fd1cdbc9cb23fa58003fa8bbcfbaf2c78bc7b6d0ce6f7,2024-11-21T09:15:11.563000 CVE-2024-32566,0,0,278b7fdbf86df5e4af67f94eefdf109c16b34988e68f17f65480a161af0f5df5,2024-11-21T09:15:11.700000 CVE-2024-32567,0,0,625636cd04fc2d8de6ab89741fc7ed1de7ee0bb7886882810cb0630ca31b1437,2025-03-05T15:13:06.363000 -CVE-2024-32568,0,0,c46b110e0cf20ec211923366c955b66401d96fb6645ba987b981123ba2168a79,2024-11-21T09:15:11.960000 +CVE-2024-32568,0,1,0b2fa221e3a30da8e3719b9ba684433ad190477c51fc263d1f300c897ca82c6e,2025-07-09T14:56:18.497000 CVE-2024-32569,0,0,a9454b78d83009bb1146577e9f0f3c0fd07a0743e4f961159113b1ceff2d75b1,2024-11-21T09:15:12.080000 CVE-2024-3257,0,0,91c12471627ea0794231e375c28774fb4205725ef2011af0fb421d43a9d583c0,2025-02-10T23:04:32.190000 CVE-2024-32570,0,0,a9fd3f92bfea49dd7dbdcf524c5adf1f51f490aed3f76f9203382d2f08daa852,2024-11-21T09:15:12.220000 @@ -261248,7 +261248,7 @@ CVE-2024-34345,0,0,47baf8647a40a5d643cb034c9f205d972dd70341b1b5eb4bde44ea560d1ad CVE-2024-34346,0,0,b4d5d009ccbd0adb493172b6525286c6e00927027ff41daea728d00c7e5c3c19,2024-11-21T09:18:28.633000 CVE-2024-34347,0,0,585ef94b63b5bc34f592bbd8f9288009e39939e1915c7d8904445d5250706ef6,2025-06-10T16:15:34.867000 CVE-2024-34349,0,0,6ae5959e6f6ba907493ebae040c30daa791dfc7ece6644e5e5282b43c801ec7c,2024-11-21T09:18:28.893000 -CVE-2024-3435,0,0,d1579121b6f6af554f5fb954f2cbd6ea731080a83b51da76b6c6c85874a6fe4b,2024-11-21T09:29:36.027000 +CVE-2024-3435,0,1,303c8ac035334f1d46b54405ca1fca32ee88275aa9deb7e23cfa3e8cd4ea1cfa,2025-07-09T14:33:50.620000 CVE-2024-34350,0,0,6bf70fbd9fa7e778a24a4b66bc8f272fc21a47d33eb41231005b7e60a6449c36,2024-11-21T09:18:29.013000 CVE-2024-34351,0,0,1566104cdb11ecd50febbb16238073aa2aee91c794454edae6e612a385746906,2024-11-21T09:18:29.133000 CVE-2024-34352,0,0,0f5d3e915835d5fe7bc7b6eafd6ed0505321d2448a3bc9d02349fb410fcdb508,2025-02-07T02:44:20.557000 @@ -261875,7 +261875,7 @@ CVE-2024-3516,0,0,e2776c4b96607a539e829c62da729bc20871a2f36db35f9df9b224bd45404c CVE-2024-35160,0,0,318ce523570aa2a281e98ab12c2ca421a0d155ef6ca7820b4c93b91389e32554,2024-11-26T19:08:22.473000 CVE-2024-35161,0,0,74d1d58b7caf81c95e1ff919f262e1fd560e12cb383b56b749f45f557e6d48d2,2024-11-21T09:19:50.580000 CVE-2024-35162,0,0,cc3a1e9ad17185933b2ccd6c60215dad31a11f8c95ac23e34980d635d83969d3,2024-11-21T09:19:50.790000 -CVE-2024-35164,0,0,a353bf57847d22a0068ddf4f8aa9622b161adfa9260ea87349070eda5433b43a,2025-07-03T15:13:53.147000 +CVE-2024-35164,0,1,a436cb04d10acccd92e1a2bdc67bb4b870d79ab5c1db1553cacba992c81bcfe8,2025-07-09T15:24:36.757000 CVE-2024-35165,0,0,bd84a0514dff8a605dc50b54c16c9cc6171c010b56575dd659fe0b7e359e2106,2024-11-21T09:19:50.973000 CVE-2024-35166,0,0,d1835ec0ca0be1b8bc12d9f59963f8eba529b0ebb30a28b0b5b3c8a55caa5c7b,2025-04-15T20:56:04.463000 CVE-2024-35167,0,0,e5064a734cd85bead79713852f3cfa2fd0760b2cb38dd00c93badfc2953b79e2,2025-03-25T17:26:21.273000 @@ -263983,8 +263983,8 @@ CVE-2024-37658,0,0,6b7374fc5b74fd647703dbd5ac5288c17f414ec8a28587e793376e23cd640 CVE-2024-3766,0,0,5b1f97d45b8d13ab711b52176ff6a759c727cc812c4dd212fe3769d5cd7bfb0f,2024-11-21T09:30:21.280000 CVE-2024-37661,0,0,ee08e04759841bbf9e002e732331f80dee9de5ef526cd60e9627ae7db039d225,2025-06-06T17:09:35.177000 CVE-2024-37662,0,0,9fb609c29e351aae318bf190d1652757771b4257bef2c46e7c384208ed859872,2025-06-06T17:09:55.507000 -CVE-2024-37663,0,0,0350e1df46b9c03476a6921b27b5739d2a9a16e3abb310ac2c48fd9f451c04a6,2024-11-22T16:15:24.273000 -CVE-2024-37664,0,0,e6af7d2e65909320ac2e066c551b6342cf322fc988e4e028dd24fa51ad921593,2024-11-22T16:15:24.463000 +CVE-2024-37663,0,1,36b2c5ad1154995a08e9ecb81f295d593844a811e4196fc8ef869723ebcaa3c8,2025-07-09T15:13:50.520000 +CVE-2024-37664,0,1,6e40cf06055cb5eb40a9fa0141d1ddf9c9a462043dc1e3d74c7a52dfc9b5ad90,2025-07-09T15:05:21.807000 CVE-2024-37665,0,0,2cad5de31fe3539f14a7a59779bc1c1b41d67d74fef14da4545d1089f67dab75,2025-06-13T14:49:18.100000 CVE-2024-3767,0,0,b4ea3f0e16993e9f310cfbde1e62879723209ff6ca6fab1f3423f8b6c9db7f57,2025-05-30T12:15:19.907000 CVE-2024-37671,0,0,63a7bb054b9783dd1c7933bd57d4a8f7e2cfd8dd008993792ee8177e6854a803,2025-03-14T16:15:32.600000 @@ -264854,7 +264854,7 @@ CVE-2024-38653,0,0,e523aab1476ea94d5dabc706292fc0fd759279e8366cb1ac9b6db46f1b485 CVE-2024-38654,0,0,4f834b449c1be0488d03e56c2eb96f2263bd4a211be6cabc24937d886b2911cd,2025-06-27T18:45:18.467000 CVE-2024-38655,0,0,29c436e44863c39a5dfc6dd954a1facaa895c3b30b158e3848fb302efd23ea94,2025-06-27T18:43:22 CVE-2024-38656,0,0,e2eefc85d8c7b7f5971a46109448b68c074d1505a25992b3f5cf959084d375cb,2025-06-27T18:42:28.510000 -CVE-2024-38657,0,0,5969ba64c826194c270eb14e60190dd5a4d5593058d44e8e4e7f38507922a145,2025-02-21T16:15:32.340000 +CVE-2024-38657,0,1,8b5ff0c4bd91be25f548bdaaa9be977eb0d151502e41c93063ae32cecdb1e7be,2025-07-09T14:50:48.063000 CVE-2024-38658,0,0,e6ea9cd2600e863335625bfa75713e2218e611a3fa971502d028f479b505f7e3,2024-11-29T21:15:05.633000 CVE-2024-38659,0,0,82d734add9c8fe44d6c176df3c0f51f534c34dbe8895a35bd5c5151111066a4d,2024-11-21T09:26:34.527000 CVE-2024-3866,0,0,3d2e18514cb96e5078ab80a25332e4c14f82e4fa37ddfe53c6bf65150d31d746,2024-10-02T18:26:59.520000 @@ -265182,7 +265182,7 @@ CVE-2024-3911,0,0,654b04203a2f40565b15263d1f004365df42700519e1ffcff8b9969132d518 CVE-2024-39118,0,0,ccbf43121ce98dab74597a598046288eeb73591f855d10f3e9d14d6e82fee85e,2025-03-14T16:15:33.017000 CVE-2024-39119,0,0,799e7ec2bddebe2e1e9cf2622e74befcdb17abd7e8a74bd968b2c30bcc489f2a,2025-04-15T17:02:14.323000 CVE-2024-3912,0,0,fabd976a440994ac496ea45d2f56e7bd6af4672ef144fc30e8f8567bb4dbeee8,2024-11-21T09:30:41.027000 -CVE-2024-39123,0,0,e32c92be4f5077c8aa0233b570648e44530e38b36714b60ac01e6c6f9553d96f,2024-11-21T09:27:12.653000 +CVE-2024-39123,0,1,70420c14dda85a37d9cd8988b6963cc8b416ddffe3495bcbe507735301c0ae6f,2025-07-09T15:28:45.570000 CVE-2024-39124,0,0,b89a6ad01be86442200dfda8e2d9f478ea1466944e9cfcad7239db5ce8bf749e,2024-11-21T09:27:12.863000 CVE-2024-39125,0,0,57c9492a281c3f0343626ea4f499aaeec97b06fd70109718aede51734c1a630a,2025-03-19T18:15:21.150000 CVE-2024-39126,0,0,3e00a13d9ec0ad716808d0c796783b1d298b8407ef8fec7bd467b2bb174689fb,2025-03-13T14:15:28.767000 @@ -265919,7 +265919,7 @@ CVE-2024-39949,0,0,3e908f72ae3fbe72ff9935b6015bb941eb885a7dfb7d749bbc854003e3734 CVE-2024-3995,0,0,ce01a77d8f6e67c90bd74a5b7c4f92c0ab7335d05244df806075b432360bbf96,2024-11-21T09:30:52.337000 CVE-2024-39950,0,0,bd2e265d0d3e341db8fd3fcdb0bbe9322437d77857deea077eb316ac4c626513,2024-08-19T16:15:10.800000 CVE-2024-3996,0,0,bda19efa5aac8218ffc25499dbc89ae8cf67ed11c0eb942eafa95b82919c4b2d,2025-06-04T20:35:03.570000 -CVE-2024-39962,0,0,18be995ff0009937920dd593bea6658f42ff4d978a09f6bf2db82a79501ac931,2024-11-21T09:28:38.377000 +CVE-2024-39962,0,1,95e99a92e2a6ea9ee51034b9a2b66c5c9632cc8d9b9445742b3e8fd01ddb77b4,2025-07-09T15:30:52.603000 CVE-2024-39963,0,0,c548b05d5872bfe7f9233d0c964e3c3f6ead479dc9d409281df3fe06fdb7e8e3,2025-06-04T17:02:19.887000 CVE-2024-39967,0,0,b787112d6e3c19e663eb65e6241dc122dfdc8ebd8df2845fe1edd395c1285143,2025-02-03T15:15:16.897000 CVE-2024-3997,0,0,7bed76b9ee39972b59d25261e0cbf21df845ab85322f77b10b5c64b84406e3e1,2025-02-03T18:03:50.083000 @@ -266903,7 +266903,7 @@ CVE-2024-41593,0,0,4c655fb675e2e26beb224f3146b60f9a593776c70e4428cbb9b0d5eb10e9c CVE-2024-41594,0,0,0fa2ba762c2fbc09f3e5499bc08c98877b67fafe9367aa7a338ecace00d5bdc7,2025-03-19T16:15:26.387000 CVE-2024-41595,0,0,55147bb2c7f980be0e8dfce69050f7ac0e8d3bd44beedc81b56dc3a9145dbb12,2025-04-10T14:37:24.073000 CVE-2024-41596,0,0,4c9a2c20ad07ecda2ee244a2fc0a6001029f77098a96d1bb2f0e364c0927f005,2025-06-11T13:40:06.773000 -CVE-2024-41597,0,0,a49b6eef18fb421d23cc5cfab7745e5b82da0ab44f7103b03eb0520d660b4cb2,2024-11-21T09:32:49.140000 +CVE-2024-41597,0,1,e92e4d2f82e76d944241249578ee36733583e0c2c35bd07cdb2364ad9dc66eb7,2025-07-09T15:23:41.090000 CVE-2024-41599,0,0,19010d159a05e51c251b0e87e5efe7d7695f4c30ed161561b8ad7fb41917cdd4,2025-03-19T18:15:21.827000 CVE-2024-4160,0,0,77018d19c3c59babab69bb4c4bd714918ace7f45db9fbec548c4760db9a196a9,2025-03-21T19:16:41.813000 CVE-2024-41600,0,0,ce877fc02fce0f8726d8c027786c8b031fb6af6855d69b77809d4baa0014f48d,2025-03-18T21:15:29.290000 @@ -267961,7 +267961,7 @@ CVE-2024-4280,0,0,b3797ff2151727941d9c366b289b5d3e0b88350afb872404e2bdcfe0d71221 CVE-2024-4281,0,0,61e5371b0a3255e76472e43eacd6c1c0207d9397155487a12c704d61028dcc77,2025-02-03T18:53:40.487000 CVE-2024-42812,0,0,163e07a54ddac84e7821d0efc800bc7e7d10ae1d47903174af8c3b5ac8976f4b,2025-03-17T16:15:22.480000 CVE-2024-42813,0,0,2119a5446300b55b01cbc8690363dd581e30c8cf63a34d64b9ea09e65b66c986,2025-04-01T18:20:43.097000 -CVE-2024-42815,0,0,db1247bc55a5dd4030e0ea0d91dbf67e0274baa2f665b4b86c1206ecfc5bd025,2024-10-24T20:35:07.330000 +CVE-2024-42815,0,1,c41871bd8dcc2fa5800cda1515fef41268ce8dbbac075a0ef1476a928ed7a677,2025-07-09T14:47:20.853000 CVE-2024-42816,0,0,f48cdbf32ec6ef2592c0debfd370e60e5e7330faf2228d3c835601d4668d4327,2024-08-27T14:35:07.077000 CVE-2024-42818,0,0,bbf6360e7bfb7a58f7f9788c0da5c5644776ed691811c19b8a0e9e2b45223065,2024-08-26T19:10:18.890000 CVE-2024-4282,0,0,9ee51a18ffb379520bcc53c8edd07271ce8432ea86181cedc2883acfa32101a0,2025-02-15T00:15:13.370000 @@ -268220,7 +268220,7 @@ CVE-2024-43216,0,0,a4cfc87cc91471f1c53314fe2ae87e94528dffba2a5d6e3dd2f2d6ce13e84 CVE-2024-43217,0,0,91683d3d11d11cd740425ea271e0c5c427caf56aa2f4c99c9681c49e1f394be7,2024-08-13T12:58:25.437000 CVE-2024-43218,0,0,60da8557d97217818a5be371ccd1968a9a629a5b5933e98c96cbd4efb736051d,2024-08-13T12:58:25.437000 CVE-2024-43219,0,0,bc89c1a1e6ce307adcf92ae27635e024a9ced0b5d750954b55bcd81d6e935295,2024-11-05T22:15:21.147000 -CVE-2024-4322,0,0,9ccd3f239b29398b39b9039c2b42749181a2881fdff7166168eec682119af540,2024-11-21T09:42:37.400000 +CVE-2024-4322,0,1,3811972807019a3b09304d435796765222f848ec113cee36672bff1b51ff0300,2025-07-09T14:32:00.963000 CVE-2024-43220,0,0,6fc4c5a2beecfc898da202ac531cc4beeae681691a6c610098b50e829e3f574e,2025-03-06T16:23:35.603000 CVE-2024-43221,0,0,52bf4703a192c3b5d3768eaf3c73879eb2cdcf3e5ce777a1d149ec7c0bd8a2ed,2024-08-19T18:36:20.123000 CVE-2024-43222,0,0,1f6e84d11f305b7faaa7491a90db1bdda20110120892020a706a65b2aae73939,2024-12-20T13:15:20.887000 @@ -268263,7 +268263,7 @@ CVE-2024-43256,0,0,6bf9650cb360b6c007be4125cd2008d3d9eb1735103685a2f24865ab670ee CVE-2024-43257,0,0,58d1f66cff31abc7289ffcafd5d0c23d39b83bb4c3f280acc5d5d9ec9893933b,2024-09-12T21:09:58.707000 CVE-2024-43258,0,0,33590d36d8f797df351aae4e7483b7b66e5a30d4414005f94f89e3d23eb693fd,2024-09-12T21:11:46.190000 CVE-2024-43259,0,0,5039a09098944f3480ac340e6c1471129a6339cf811e435445aa084009580c80,2024-09-12T21:14:50.043000 -CVE-2024-4326,0,0,ab5eebe6253266da965fd16cb7a4d6c5c82726295fac52904a39938f77d34515,2024-11-21T09:42:37.887000 +CVE-2024-4326,0,1,a1831f63c20a0e6a15768641dc0668d749ee3fda06b9835523a7eaadfd0ce343,2025-07-09T14:29:46.210000 CVE-2024-43260,0,0,607c611977c6a243d49a38c7318708a7a4c57ea896d1acd81480e6e7d5a7d859,2024-11-01T20:24:53.730000 CVE-2024-43261,0,0,a6b3bf3ccfa05bf83fe4896972bee03016cee2988c5914afef89266d96f458de,2024-08-19T18:36:07.297000 CVE-2024-43262,0,0,67fd045b085087002ab7b4b6a32e66f6e2bb9ae51bd9fd89f56145b1e9ac3b1a,2024-08-19T12:59:59.177000 @@ -268307,7 +268307,7 @@ CVE-2024-43296,0,0,fdbbf3bed9fc7cd4880bf50b0f6510fcbf7f0f9c21cecea2620e1ed004a43 CVE-2024-43297,0,0,253ab3e11ad0615e468688c861a9246246a03ebf384c7f42387f55106ea87a78,2024-11-13T01:19:15.837000 CVE-2024-43298,0,0,75ca76e29fa81e9c80cb0440785667f4d0373828bc5b5475de528bf77f298daf,2024-11-13T01:19:00.477000 CVE-2024-43299,0,0,f3ffbfa753f28be116699b6ca0568db8e5250c244e2a5330e0abd09b6f50328a,2024-09-12T21:23:30.647000 -CVE-2024-4330,0,0,3297e4cbdb164b0f7f2adcf114e0803187b31c2e8273bad25b5873d75046bcf2,2024-11-21T09:42:38.397000 +CVE-2024-4330,0,1,2e6a67ee0b6bab721d39bd106a3532ab8b1276339c13544c2dca92cc30457db7,2025-07-09T14:27:48.867000 CVE-2024-43300,0,0,75c9a8b2d238d9cab08f410484f7da41745998025cff71fbfeea803347300474,2024-10-22T15:35:24.050000 CVE-2024-43301,0,0,aa76f6fbde52ce3291341ffba7f2d98ed66fd54c916fcbbb420fa731de750dc1,2025-01-23T15:22:55.803000 CVE-2024-43302,0,0,44315c5d32383f0113d45ca429d79ac6dd7e95eb518218abf2b5482a33567a34,2024-11-13T01:18:45.093000 @@ -269574,7 +269574,7 @@ CVE-2024-44976,0,0,23f1e6ea028d969149b0644f38d2a09f007ee75f05d415bc6f58236655d7e CVE-2024-44977,0,0,6f4c704b6a45aa3af55978cd051d3bc0abd3b89158eceb2917579317c9694517,2024-10-10T17:47:59.593000 CVE-2024-44978,0,0,c03d150793e191e95e94b085b830416e966a74b4d801c045998940c420d28eaf,2024-09-10T16:51:19.813000 CVE-2024-44979,0,0,e7199f1083a26685367f42e5cc8860d062d8a5cdd4f2a840925396b0cb8e244a,2024-10-10T17:44:36.417000 -CVE-2024-4498,0,0,04eb3fb10e79f9795c4b980f3d85234d00fe99e2fc3a1fe8c904423531163e23,2024-11-21T09:42:57.323000 +CVE-2024-4498,0,1,5cffa58739461880ec23ec8296620000bb62df3d7cb7c5bd43261a642674f734,2025-07-09T14:24:04.403000 CVE-2024-44980,0,0,b8b265fdba264e1d6971ccc25b4be7390259e475d9b6799f1582593af5b6a6e7,2024-10-10T17:42:53.433000 CVE-2024-44981,0,0,e68c0d244da797845a719da94f33a7f4ecc3006a97c7d0f8555e0e46ddcf0fd2,2024-09-05T17:54:19.377000 CVE-2024-44982,0,0,f87495281a2132ff2a8d8eaf7734a1f988ff3d5f5a78ef81ff3eae8734c465e9,2024-10-10T17:09:54.350000 @@ -272258,7 +272258,7 @@ CVE-2024-48659,0,0,a4994eec5cde2ff529af4c431e21090733a1ede66f6e8603b23cda70d71a8 CVE-2024-4866,0,0,5804f9dd85942eb123fae31e9b136de08ead87cfbe5635e441421f6859244737,2025-02-03T15:19:33.037000 CVE-2024-48662,0,0,5e7e804fb91017f2c344490c3199a2f2983edb43783cebef02967a1b37c1fa96,2025-01-28T20:15:50.727000 CVE-2024-4868,0,0,3a702d800934f1c705b4227281b3c66c8289f779d8e4537a1a3de6c882aba372,2025-02-05T15:22:38.637000 -CVE-2024-4869,0,0,a498392e92d4315a3c1a63f0751024c8b7def437eeab49123db178ff4b1bb7ed,2024-11-21T09:43:45.670000 +CVE-2024-4869,0,1,ff405d25497cf6e481729ba6e2ec60475d889afa4d03b1a6ea03efd07a8a3923,2025-07-09T15:13:14.877000 CVE-2024-48694,0,0,faeae9ab327b97202e086aff921470e6b984670cc294f1289742129b482c0fbd,2024-11-21T17:15:20.110000 CVE-2024-4870,0,0,0ea27412573995f30563e69813626323b1c481b1ce23f80a057c978dadba8008,2024-11-21T09:43:45.780000 CVE-2024-48700,0,0,77172939a7779f121186435bac7dd16fc357a432a150b3148e465000d565b423,2025-06-17T15:40:35.690000 @@ -272461,7 +272461,7 @@ CVE-2024-48963,0,0,737e614bee9314c4a6ac5624e4a5bfbbd6abbcf0f740727bf36571635ccd9 CVE-2024-48964,0,0,db84c95556c418aff7c0650a4e8cd8667dfaaae358778e2071a2ccb16dfb99ec,2024-10-30T13:46:31.657000 CVE-2024-48966,0,0,05e26d00cac456aad3a3a081f53c8361e8916a46eb45ac1d479eb8fbd9ec1d2d,2024-11-15T13:58:08.913000 CVE-2024-48967,0,0,e9b6805433dbcffdf062470af7de439e75a0d0f0637d2d077f8b0cac8283698a,2024-11-15T13:58:08.913000 -CVE-2024-4897,0,0,42c0390e03e3bace21543dde352e5fc324ce97ff32db5419b28ed601b9e60267,2024-11-21T09:43:49.010000 +CVE-2024-4897,0,1,7c97bd2f3569123f8b90f6dbb72f71c2122c8707ce98e7fb333c28d5348a4b94,2025-07-09T14:22:10.363000 CVE-2024-48970,0,0,53bc8a7a1fceb90b393d48bdbbf560dfc7d2fddef2aab7d7928328839a5c9bb5,2024-11-15T13:58:08.913000 CVE-2024-48971,0,0,bf8e1150b147d2330330cd8aca7c03ab4d3b6dc242df4fcf2fe2c174c8ee22d3,2024-11-15T13:58:08.913000 CVE-2024-48973,0,0,97860b07ee2ac1ece14cc9f8704a57240cf4e33b287970a0e3087ea86d33e029,2024-11-15T13:58:08.913000 @@ -278485,7 +278485,7 @@ CVE-2024-57601,0,0,d978ee2acd4111ee755bc6d199e0b7a5b30d82c722a815c1a28b244c80787 CVE-2024-57602,0,0,226d91ed331e63f738fd3b8b845736eb5a7fc570a3a123d5ea996b5176962aac,2025-03-18T16:15:25.597000 CVE-2024-57603,0,0,8a9645debea5f521afc44c4af7ccadfc073cca6b3e81dc82e702421273405f96,2025-06-06T17:53:07.037000 CVE-2024-57604,0,0,9e7671c8762e3f19760ed992a9c62647cd7a36bacd45d15f952664f88ca86047,2025-06-06T17:57:47.273000 -CVE-2024-57605,0,0,2477885b789546a07ffd54aeb72568911b03b81c5017a998f5eda192e3de5fdd,2025-03-19T15:15:52.740000 +CVE-2024-57605,0,1,0eb27fba6a99c1ad81a724600cc9c7bc0b0dfa306f7941549e28d0edbe5ce676,2025-07-09T15:03:30.957000 CVE-2024-57606,0,0,88fff29b8b35a01ed272a18dce87c845eb952014b7761d37d399b66c213e66c6,2025-03-22T14:15:16.170000 CVE-2024-57608,0,0,f13d7092b69ab1bb8b9d9e29e8d71dd51ba622da797972897165fa9f6e4af609,2025-02-25T21:15:17.440000 CVE-2024-57609,0,0,7e89dbfffc522c22f84645f0c7d618897ea46d1866f82abe6573f3d9437ce18a,2025-02-10T22:15:36.660000 @@ -278760,7 +278760,7 @@ CVE-2024-57965,0,0,1ec783f88325ed02c1810413dbff411d8a59c49db780f7d0fa48c58005555 CVE-2024-57966,0,0,61d2b5fd5d958d136f7dd40b4676334560812ee79ee948ded13f78b89db9e1c9,2025-02-09T05:15:32.883000 CVE-2024-57967,0,0,8fee44e6eb84e9ffdf47037f396d369451745de427e458c886fbbf4f38d70d65,2025-02-03T18:15:37.853000 CVE-2024-57968,0,0,97c5f494209b553a7a0406b2f1734c4091c8671f93c04e3aa2cb5733fd97c3d6,2025-03-13T14:31:46.370000 -CVE-2024-57969,0,0,f1ef8fc1836dcb00402c9e5a9eb84260d26f0766f8b08195ccc8b3f2f3253187,2025-02-14T07:15:32.340000 +CVE-2024-57969,0,1,258bc340fa0fac8bffa4342142e4b4622dea1e9190a625b39bdf24744afb7a90,2025-07-09T15:00:03.157000 CVE-2024-57970,0,0,4db4cc3cdc42f255941d980da801a4e2e9f8b4ba6d1c25a10de778120606a2ba,2025-02-18T17:15:19.130000 CVE-2024-57971,0,0,9a7dadacd0c8414a8ee3b8d8fbb0213c9adb4030a464404aba1a52243edd7291,2025-03-21T14:15:15.810000 CVE-2024-57972,0,0,8b4e87a5d3d1cf75a13b39d238e09e32d7e41cbd27a8686b9f1267a5b821666b,2025-03-07T18:15:45.673000 @@ -279349,7 +279349,7 @@ CVE-2024-6246,0,0,ed6f829c53f738955a5230c2d751323578609360c46a7c7a0425e040c58ace CVE-2024-6247,0,0,8402a77aea0d1c63426b28b33a9e4e5184f7b683a452f9dac73af2afc5b24097,2024-11-22T20:15:11.663000 CVE-2024-6248,0,0,52141d91433e361584ad421258e266b28e1a86525443d406b3e7306d60cc7a7d,2024-11-22T20:15:11.783000 CVE-2024-6249,0,0,bb5630ed50252158080715b54452c79bb3b8df5ffc37b40fca9d5b7a0a4e818c,2024-11-22T20:15:11.900000 -CVE-2024-6250,0,0,c793f5f57d1bef5a89f0ac227cd3a3fec6c1bd507e0164b5e99dc5259a5a0d24,2024-11-21T09:49:16.530000 +CVE-2024-6250,0,1,26084257c6756e72c6e1e2f8a16c7e44d37269465ed3b46c885218f6dfb418d5,2025-07-09T14:23:34.807000 CVE-2024-6251,0,0,9498c32681e9a34bd32cb343819aa9d9080d48129ad2fb707bcb97cfc515d94f,2024-11-21T09:49:16.657000 CVE-2024-6252,0,0,d6aade04b76abc08072f1b979adea8a8da50e2b56fe59c5fbc009a561bd28558,2024-11-21T09:49:16.820000 CVE-2024-6253,0,0,b2d134d4103ffe6238aa672eced742a772b201e719555dcf154f2eafce9b2a12,2024-11-21T09:49:16.977000 @@ -279493,7 +279493,7 @@ CVE-2024-6390,0,0,e77181fa254c64b82a508ff014b9e824ea740dd6223e203717fb624301944f CVE-2024-6391,0,0,170666d5ac46c441c3231a73dd8199dff199e8d781e611d9f163aebb1ceb1ce3,2024-11-21T09:49:33.850000 CVE-2024-6392,0,0,36e4666a41f8ae603d4a4e9d6e2055423bfd3ce9426341de5b4cc157e8a42494,2024-11-21T09:49:33.967000 CVE-2024-6393,0,0,0ecfa1307884486a8815a0ce15547118b579ed9ce4c752d8d316c1d999d6922c,2025-05-15T15:36:18.983000 -CVE-2024-6394,0,0,05bd9f8b016c906577dd266a8ca40e9ffa02684227bc7ccbe91dd0eab465619f,2024-09-30T12:45:57.823000 +CVE-2024-6394,0,1,8e3385f64b32d7a906d814ce1da9a31d63af334100223071f11a42bfb96f9136,2025-07-09T14:18:48.220000 CVE-2024-6395,0,0,07caea7e4dc36cf335ea258133aad5447d124cf34c5e65a45bab8785f929ff6e,2024-11-21T09:49:34.207000 CVE-2024-6396,0,0,f72e0ab42ebcb61c1f3a4977d8572179c658608377ead8be5ee26fd7d9388bc4,2024-11-21T09:49:34.363000 CVE-2024-6397,0,0,c67cd1ab4732432c2489a9ded7d3757b1cd4feae04e09854b785b1535174a537,2024-11-21T09:49:34.490000 @@ -279542,7 +279542,7 @@ CVE-2024-6444,0,0,41f26c5ae69ef63d7a5b6b49604b236b93d16ad5f59a0cf359ecb4b7b3dd30 CVE-2024-6445,0,0,b00038e6b01f92d2a7463e943bb4db6c40793528c3811ac86abccaad0a86f31f,2024-09-12T16:14:51.480000 CVE-2024-6446,0,0,7ad589d4b073478880ec0471969f01ae69ae5ccc77d2f72d4b4a41b34e7b33cd,2024-11-21T09:49:40.260000 CVE-2024-6447,0,0,f8f4a357ad12ba3c46211c83bf19bb184475f5d495a5c187863d2e59f06ebca5,2024-11-21T09:49:40.390000 -CVE-2024-6448,0,0,ad17b263b3e44520fcf013266e0242b25565763f1f56a91d50f3049ac1dec7d0,2024-08-28T12:57:27.610000 +CVE-2024-6448,0,1,c6145c33673e38a176499e7c6108564fd760c58fce677c7632f9b2e7bc339172,2025-07-09T14:42:18.463000 CVE-2024-6449,0,0,f58cf094471514f99268eaa65edeb4789e43e09af74cf7cabbd21d37a3733760,2024-09-12T15:32:19.680000 CVE-2024-6450,0,0,2ecb149678709cb308b5a975dd25d60197945b0869963696ddf18dac76eb4839,2024-09-12T15:42:45.430000 CVE-2024-6451,0,0,f0dfa2ed8e1a741b63c28508081f75deca5be4dcd5de1a1f392a9323b00fc9dd,2025-05-27T21:05:27.360000 @@ -282684,7 +282684,7 @@ CVE-2024-9765,0,0,826bc1daa895b586976c3b0843d4b6d5d298b0f39433839148a66d87aa0d49 CVE-2024-9766,0,0,ca54e388f5e39d65d186b1353f0fee1774dfd3f91419e0817c5f513c5a6a7c7d,2024-11-26T15:10:00.193000 CVE-2024-9767,0,0,80d36f7190a9ee1712fc0bac7af287f8aeae0caf94e9c8386dc03bfd7eb71fb3,2024-11-26T20:57:03.197000 CVE-2024-9768,0,0,904cffc60d5e826fadde1f9279bf1637d0038b817b76c6a013f678cc172cfc96,2024-11-26T17:14:14.327000 -CVE-2024-9769,0,1,e74e32edf5238594e48fec25c58c948a15f2501006f5af8941da2e65fdb1935f,2025-07-09T12:53:53.773000 +CVE-2024-9769,0,0,e74e32edf5238594e48fec25c58c948a15f2501006f5af8941da2e65fdb1935f,2025-07-09T12:53:53.773000 CVE-2024-9770,0,0,2cda7fd9f75f6fca68ce4613475fd0459088c1fdf758f04df90f573f49958a4a,2025-04-29T17:24:12.513000 CVE-2024-9771,0,0,c4db8b5b9039c31870b9e5c967bf09c59bc08103ce26ea070cf98b2c64b01f54,2025-04-29T21:09:36.480000 CVE-2024-9772,0,0,00de6e2212e38deec5d85dcbb0fb26ecbb8065a78c6c2a56178e317ffc908e8d,2024-11-25T20:03:01.613000 @@ -282826,7 +282826,7 @@ CVE-2024-9915,0,0,aa2e2601696b7761a7ecb90d243665febdcd0d721d40182de0f40eabf69db2 CVE-2024-9916,0,0,a80a0796d5c18c2eab8fba677c434636f6e2fdb8688893603dd86a04952f25b1,2024-10-16T22:11:04.453000 CVE-2024-9917,0,0,9b5e62cca4bf9d88a90f8a5a7a91d797698fb1341408fe27775560a10f1ea6ae,2024-10-19T00:49:07.090000 CVE-2024-9918,0,0,e5ce1210eba583c136f5f2c21cc7a5ff5a12006f0105e6d70b655141d6b09c94,2024-10-19T00:47:15.957000 -CVE-2024-9919,0,0,a66194b5ac52119e32bdc1bc0ccfbb2930858be153546f9c97b3ec790676b423,2025-03-20T10:15:50.660000 +CVE-2024-9919,0,1,26c0aae2b30858fee765bfe0c4688922841232acefa0592b42c57b4a55b78b5a,2025-07-09T14:17:49.673000 CVE-2024-9920,0,0,82051ec08462de946f006f5850efeacbde8de8e78c53884f6eb270c92bd067a5,2025-04-03T18:02:58.177000 CVE-2024-9921,0,0,41729537f7c16896e42fbc2371d0383a9aeeda0d7cb805b3e801789b2f8fad23,2024-10-24T13:19:24.920000 CVE-2024-9922,0,0,da50c26d792345ff1c94eacdad95ed7a5d94f0c1d5e606886e8469b779eb90c4,2024-10-24T13:21:53.853000 @@ -283757,6 +283757,7 @@ CVE-2025-1106,0,0,47c644d1ab987b500216cbc43a8c7d13755fe450a73c23231fe84bf5aa3934 CVE-2025-1107,0,0,88a8719351346afa69c0eb84e5c94d3ac98eeae345d66ccbfb838f179b4a14fd,2025-02-07T14:15:48.343000 CVE-2025-1108,0,0,70b44a68f944b132ac1602e83624e59a01ee9e1d6bf1d641646c3c0fbcfd3886,2025-02-07T14:15:48.530000 CVE-2025-1110,0,0,2291116d7cc409d0a664cfdf01ddc9cb56678f5a0b0c86cb731696a9bfe3e180,2025-05-29T15:58:34.830000 +CVE-2025-1112,1,1,e37193bf410673a0c297078bbfbd8eb3a2472019becacc17d031afbb0db3f2d5,2025-07-09T15:15:23.457000 CVE-2025-1113,0,0,e1507e6d2bb810ac6657444d8f9429eef67e835f41d00085c329df7f95fe9d83,2025-02-07T23:15:14.727000 CVE-2025-1114,0,0,1aab463ea4d612044dc773cc9795103f2bbcb389dfd8fb57b791fe9e7ed899d4,2025-06-20T17:00:30.050000 CVE-2025-1115,0,0,30d7245a282f9be9cd5e268e84a047b532c6864c57222cb265a909087aa7d476,2025-02-16T09:15:08.897000 @@ -288922,7 +288923,7 @@ CVE-2025-25372,0,0,240bc71dd84dfac32c47fb199d651cb3e67f8af768bdc10c675ee6797857f CVE-2025-25373,0,0,7f9cc4bb8a04940c64da7bfce879c64ec9344a6a2eb58612061267ebdfad05e3,2025-04-03T15:24:00.740000 CVE-2025-25374,0,0,6859cbf8bd398e89829e2307cc6a606a243043acfaf50291bd1cd1d34c1583c4,2025-04-01T18:46:33.137000 CVE-2025-25379,0,0,12e940536872ecb4b346a5af416b1ea7c2c4be1f615da3c7fe51934862dd7ad8,2025-04-15T20:10:40.157000 -CVE-2025-2538,0,0,7eb1ab6c92644f739221ddc3d061f1be7805eee13ac3c3d30ea5dbe030045c14,2025-04-01T14:15:33.303000 +CVE-2025-2538,0,1,654f111ad7f954abbbf89fc52344b8f6859cec17f72852c939f3af2e5680c4be,2025-07-09T15:15:24.227000 CVE-2025-25381,0,0,98993479fbad247c0a645016b4d364f3055a4b0ab28a945432dc14f688f0a955,2025-03-12T14:15:15.923000 CVE-2025-25382,0,0,62124cda5bc99f3b7d575adf15942743d0e5ed87cf3b394264403f3512005648,2025-06-23T19:49:27.087000 CVE-2025-25387,0,0,8b1f30ada278980cff112366182e1045802ec3725274b1349a46d716a755f43a,2025-03-28T18:34:59.223000 @@ -289097,7 +289098,7 @@ CVE-2025-25768,0,0,144de6a82436863c4ea31bb6abbbc08daf5c7c5f8f3b7d077640959e2f240 CVE-2025-25769,0,0,fe50ca46f9d7f1df8c92164ff5c574fd0b6420f9452c06e3d38d027c3dde7d66,2025-03-28T20:08:22.980000 CVE-2025-2577,0,0,b42cdd709191575ce088ec06e1554e25be2db50148fe53b9714dad89d20df02b,2025-03-22T12:15:27.013000 CVE-2025-25770,0,0,97e9cbcf9f5eb368db8f03cd6097bc99f8f3fab4a945a4e034edb2a9ce72dba7,2025-03-28T20:07:33.183000 -CVE-2025-25772,0,0,88d8c7db71705e39880e64e5b4f43eef2b54271853b1421821a3064ae684e6b7,2025-02-21T22:15:12.813000 +CVE-2025-25772,0,1,565e1c0d814f7beea92a9904c2edb21f023f606104036711438121e6d0fe0948,2025-07-09T14:43:22.090000 CVE-2025-25774,0,0,715f87db650e32795f53d8d9014191af2cee3867d3c10f2db457b2d92092311c,2025-04-29T15:04:59.313000 CVE-2025-25775,0,0,69db3435bd7f8481431bd15ef1cbd9cef00c1d1f55266b46c286faf8d9dd40f0,2025-05-28T19:08:32.613000 CVE-2025-25776,0,0,b9f8f0717dec792c29fb01490e3c7f5487f1440f84c36a027e38ef28780baf8a,2025-04-30T18:58:22.110000 @@ -289180,7 +289181,7 @@ CVE-2025-25950,0,0,eb71d41bd11581f3b5f02001435cae6a4b0535669794809ebd6a5a2368871 CVE-2025-25951,0,0,12b5af7308eb530405634af2900e033dd73f971ac1294c8e4a5751d529e6f0d8,2025-06-27T14:03:44.713000 CVE-2025-25952,0,0,0fbdc7d96d1ff25a6c2b81e89451e899b7790d6675a2b30bd44620b218a66198,2025-06-27T13:56:41.940000 CVE-2025-25953,0,0,123d08679da36c298adac70f243ee329df294bea6076e9e771199578ef1555ef,2025-06-27T13:41:19.777000 -CVE-2025-25957,0,0,bdeb096579fde4b22497632e2e427e2b532b3393c4ed4744ec746ef104f6ef19,2025-02-21T15:15:13.067000 +CVE-2025-25957,0,1,d3db944904af1c12318cf9e94129567187cb8f1c9325bce8a3cb1f0a8e724b0e,2025-07-09T14:52:36.587000 CVE-2025-25958,0,0,177c6eb34465ffc8aac17021df235670914f868dfddc4be469bb5e241da9eab3,2025-04-22T13:09:31.147000 CVE-2025-2596,0,0,95591cddf94618143e623a63fbb26d2f99203e6a4b78fbe2714bba0e0a1ddf6a,2025-03-27T16:45:27.850000 CVE-2025-25960,0,0,479d12f427b04800342d6481b780b7a5628b65f78b0f2b5e249fb2ad41b1c9f5,2025-04-22T13:09:06.197000 @@ -289226,7 +289227,7 @@ CVE-2025-2605,0,0,6f360b4675700e17a3c34a10d190011b0da673ff70661152c79982d87d6df8 CVE-2025-26054,0,0,7af97027ebd841f2944a0f16c23d07f8150f5fc7449aca0f5ece9086fab14196,2025-04-02T15:15:58.170000 CVE-2025-26055,0,0,7517d1d36429deae562bd8473305c366d152cbf30a37d4cc36a8d0384717f03b,2025-04-14T18:15:28.427000 CVE-2025-26056,0,0,22307cccd8e7831aaf1eca3f1fecf0a9d85074aa34ef8668ee4f3a447050e8cd,2025-04-14T18:15:28.560000 -CVE-2025-26058,0,0,2d180031684a0c224960a904002f952a2dca9522e024b17d27de1ab17323f33f,2025-02-19T21:15:15.920000 +CVE-2025-26058,0,1,50989e433e37c35470f198a2b30af0ef907009655ff43dc1bb73e60805f26a6d,2025-07-09T14:54:04.937000 CVE-2025-2606,0,0,d9fe488f09bc625c70aaf60de073d024cf32c1c5559a60ae2ea832f43368f5d4,2025-04-01T20:23:34.950000 CVE-2025-2607,0,0,ea39a635d57ac49d7a31a70d534f5af560e3e3d78a75679954fc5294ace5f00e,2025-04-01T20:15:25.810000 CVE-2025-26074,0,0,b29fe1e75a5ccf4d89b39e7434a7dea5e507db5c3f2a050dc3e9d2daa7156478,2025-06-30T19:15:22.920000 @@ -289559,17 +289560,17 @@ CVE-2025-26664,0,0,eae6c8bb16d2d53847a88b2ea71e817a503761459e41bc88ca4db52608c47 CVE-2025-26665,0,0,994f6c601203fd3e63b8b3c95bc5bb330c93a0c66584bfbf77485c94d6da1672,2025-04-09T20:03:01.577000 CVE-2025-26666,0,0,94f37e5f5af4a9e4f50f4619c52fce020e0ce3d1e45a15230b3a62b8fc7bb028,2025-04-09T20:03:01.577000 CVE-2025-26667,0,0,dd5b544a7b8d096cd6ec6c916b8cb5fe7e454f0ac2efb8a67216cdbf93f43f18,2025-04-09T20:03:01.577000 -CVE-2025-26668,0,0,5f3ca28c7afaaa8fa239b50177fa291bef6591936bcea8b1c33ba56883ed1b09,2025-04-09T20:03:01.577000 -CVE-2025-26669,0,0,9abf76e87210407da73e1c07ad9e09844b31612bb32058340f3a8ab2932a077d,2025-04-09T20:03:01.577000 -CVE-2025-26670,0,0,208bd023a71bb0c53a95e22c1fe47a557f9999468287bed2eebe6edb3bcd8631,2025-04-09T20:03:01.577000 -CVE-2025-26671,0,0,d5abf45e122d81a9a18efe916e829bbf5ff3c8e9281d027bd4f5946e582a7aac,2025-04-09T20:03:01.577000 -CVE-2025-26672,0,0,96fc833bd368b582a58a4c801c6869823a5428b2e26992601669497fa005197c,2025-04-09T20:03:01.577000 +CVE-2025-26668,0,1,39e1a40257af87e0bfd69c2a6aeb4e28646862cd39df138e47b456ac7f4dd40b,2025-07-09T14:14:33.413000 +CVE-2025-26669,0,1,4f704bac843e172ed6ed05a29d866cdf38e4ac94e24b5951bcbdf973b26c3832,2025-07-09T14:14:09.890000 +CVE-2025-26670,0,1,7fe36805c7b7434f4ee09fccace0739358158224bdd29ec5fc447edb55df0748,2025-07-09T14:12:36.960000 +CVE-2025-26671,0,1,9d908a3397887951749aae5254725b395f437628a0d12c647176c4410afc9073,2025-07-09T14:11:44.377000 +CVE-2025-26672,0,1,e7098724d18359e3112db10d31c1d5ecc6d52946d08713f3ed616e60a8727edb,2025-07-09T14:10:52.523000 CVE-2025-26673,0,0,9621623112794a445bffee4a99f0f5bc80611a9773b94d0d8da1df41e9a8f132,2025-04-09T20:03:01.577000 -CVE-2025-26674,0,0,121b506975236713e65ac233556b4f8ade8ecb5207bd000b69f3c7214ae66d1f,2025-04-09T20:03:01.577000 -CVE-2025-26675,0,0,872813ba118d6fda82caa0e972c6b3362d3e40066736d18c7c78c33043d6b31b,2025-04-09T20:03:01.577000 -CVE-2025-26676,0,0,85d42c6c8e3202eba1a092a6fbaafa7e117dab707a2be08170d67eb5999bc1f8,2025-04-09T20:03:01.577000 +CVE-2025-26674,0,1,f9b8afe5b3454e1888b6f78303fecf254ae5b72b2da138fc5cc2e4687e7e8bff,2025-07-09T14:24:32.313000 +CVE-2025-26675,0,1,d9617a86b35a9036bba2ca559d4452ddeebc6c830350699b8e50615df1b5e174,2025-07-09T14:23:49.987000 +CVE-2025-26676,0,1,b292b7cbb96e039085148442a7d654c3b127a1a3ca3cfe11087aa1b5ebdace4a,2025-07-09T14:17:34.547000 CVE-2025-26677,0,0,bc390d4c4626bd2d83eae24a6a06824d034894f8ed757b98c01bf35a1b490606,2025-05-19T18:23:01.177000 -CVE-2025-26678,0,0,b18811f024bd6c2043fcef8d33be7b3a003614f02a7fe9657be5e777ddb7ab21,2025-04-09T20:03:01.577000 +CVE-2025-26678,0,1,214e9fc5733a208594547ad6c0f2e1a560b7bc1372fcd8a8dd6389579d235b7f,2025-07-09T14:16:36.630000 CVE-2025-26679,0,0,6b54dfade6da1f42f2dcb8c9bfc7b9f9bf9cf876eb52d11b3c93b9d7cb8577e6,2025-04-09T20:03:01.577000 CVE-2025-26680,0,0,303dfe0ed2261ae6981f0bed8e21d72d43703d864b3a59a8605fff38baefb3b8,2025-04-09T20:03:01.577000 CVE-2025-26681,0,0,6ed2afc2ac5f4aa4880affd4c91284c681fa4b0c0179703c0c63c342c99779a4,2025-04-09T20:03:01.577000 @@ -289588,6 +289589,7 @@ CVE-2025-26695,0,0,f077e716806e3aa11572737cbb762272530f7e8504d9bb6d9406f576cc783 CVE-2025-26696,0,0,b9658e1d3c0f3dd4003407283a716267ae4de824c8808025c4c0cd47206d44f0,2025-04-03T13:30:33.593000 CVE-2025-26698,0,0,02e1c85350f9590f950db8be3fe5f72c9485333903c0f224a4be86e1fd66bec5,2025-02-26T13:15:41.983000 CVE-2025-26699,0,0,3d07dd4adaf6ec2081703756468d2a6a16a920644c974700ce9ab8caf4058eba,2025-03-19T20:15:19.543000 +CVE-2025-2670,1,1,37a034e3dec3e5f3c738fff54f35faf8e21bde9c8b603cfa0eb9f83522bf2c51,2025-07-09T15:15:24.370000 CVE-2025-26700,0,0,6e3b394d53337ab4fe903b88ec563a5f9fa1519ac62684b203abb3bd4f953337,2025-02-17T03:15:09.750000 CVE-2025-26701,0,0,89b8b735021c8ba1b57a31289c67376fd76e788ad77a06946ec19e6114a95335,2025-03-11T18:15:33.210000 CVE-2025-26702,0,0,1839f93bfb7ace4325903035b3bb74add19b6f08607cfe0196f58c5d53bcb05c,2025-03-19T14:08:01.357000 @@ -289703,7 +289705,7 @@ CVE-2025-26873,0,0,d2be4af17ab93dc9a3e4061603b533262f8b353a47175752e1a9e3abd4a4b CVE-2025-26874,0,0,3906c541d3c2328f17b778a284f8d8b03cca5035667b064d99481ac9bbf55d5c,2025-03-28T18:11:40.180000 CVE-2025-26875,0,0,1eb25a80831e545b4298e6aed92aca9e86c317dc16ff78bda859574fde302510,2025-03-15T22:15:13.690000 CVE-2025-26876,0,0,684f7a7019e1ec0a8365c1fd8b8ec9cf15327b5b9ed01836c80ba8ecb2aa9b83,2025-07-01T10:48:11.703000 -CVE-2025-26877,0,0,9466398b90eeea5fd4387acb527e3bee14979bd3ed96ce2017dc265b3449ccf4,2025-02-25T15:15:24.380000 +CVE-2025-26877,0,1,0fdf848446d0f5f766c4dd0a09eaf98d6a91eb641bb9220928d41b9ca7770f6d,2025-07-09T14:40:53.830000 CVE-2025-26878,0,0,b83c78001aed3b72257afa473beed64325520c746080d9d4c55fc0721207cb83,2025-02-25T15:15:24.560000 CVE-2025-26879,0,0,ff13b8336e93c3c4112258e1261f28d97f76ce67ffc3e5951e1c9eced4ea0dc7,2025-03-03T14:15:56.213000 CVE-2025-2688,0,0,df9fbd881c0903a7e1840c86191135c0e3ef5a103499e72c1374800ca40be24a,2025-07-02T18:03:25.497000 @@ -290454,10 +290456,10 @@ CVE-2025-27740,0,0,313b9d0840d38fd5087e63d16bf4b7854586d24714c98679060955566a3e4 CVE-2025-27741,0,0,fd7f8134e8f4c1eb6fc25b10a06e479ace39868dc26364eb34d948ecc7cbc543,2025-04-09T20:03:01.577000 CVE-2025-27742,0,0,a691b3f15bd69a117dbd0df289ed5e390534334837dbd9600c5d1a16121daf1b,2025-04-09T20:03:01.577000 CVE-2025-27743,0,0,c64c4f666d7a848442ad2978866f90dc39ebf4c69b0d6ff231043f160659ea1d,2025-04-09T20:03:01.577000 -CVE-2025-27744,0,1,a6af953d3dc33e49bd071af2cc99f6bbf2eb214ae178215dcba99311f9af8755,2025-07-09T13:54:08.173000 -CVE-2025-27745,0,1,6a24e20c6ec256de81a1f432b9eca4b3cba79343c54a2741448de086341ab732,2025-07-09T13:55:46.227000 -CVE-2025-27746,0,1,debddb17cade22afacff473819c883677323f7349de78bade273f59582f04263,2025-07-09T13:57:52.340000 -CVE-2025-27747,0,1,3b87b5510979c68a8fa7da811bb8dac3997b27ce066020f697faf83a6b0aef7e,2025-07-09T13:59:24.027000 +CVE-2025-27744,0,0,a6af953d3dc33e49bd071af2cc99f6bbf2eb214ae178215dcba99311f9af8755,2025-07-09T13:54:08.173000 +CVE-2025-27745,0,0,6a24e20c6ec256de81a1f432b9eca4b3cba79343c54a2741448de086341ab732,2025-07-09T13:55:46.227000 +CVE-2025-27746,0,0,debddb17cade22afacff473819c883677323f7349de78bade273f59582f04263,2025-07-09T13:57:52.340000 +CVE-2025-27747,0,0,3b87b5510979c68a8fa7da811bb8dac3997b27ce066020f697faf83a6b0aef7e,2025-07-09T13:59:24.027000 CVE-2025-27748,0,0,82bf5c64a18dd71a8f4aad790f3dda65c3c90a6fc5838c6438426efcfa04e24b,2025-04-09T20:03:01.577000 CVE-2025-27749,0,0,0c4821c505d52e95028439142d4b969a83137b515cffc7351cdfa2b9360b3496,2025-04-09T20:03:01.577000 CVE-2025-2775,0,0,e3985943c146fec7ab00dbdd108c82b06671f3cbec3541352231cdc93eeab584,2025-06-27T15:15:25.843000 @@ -291635,12 +291637,12 @@ CVE-2025-30406,0,0,51db6be098d64837005d45fe4610c9b1d0c7620f15fc2620b87328ad3b947 CVE-2025-30407,0,0,5398c42f506ff0cf746668f38c343a54dfb5c3e8151c8cfb451ea4e82909416d,2025-03-27T16:45:27.850000 CVE-2025-30408,0,0,c46f2a921717ac22e3b71d54e7d86c5873aa6444534e1d413014b6e91fe9524f,2025-06-04T14:15:28.420000 CVE-2025-30409,0,0,ffcec7ca8527166f636901bf55b40476a7045f7049fdff6f862152cd4a0c855e,2025-04-29T13:52:47.470000 -CVE-2025-3041,0,0,d5b21b6b78f2a401c9e8e108885b1916a2f3aafca95b7fffa55c4525e86b27e1,2025-04-01T20:26:11.547000 +CVE-2025-3041,0,1,8a36be54590bd4607d0b1ab78a31d27d68b81c6e66f9ddfb8e94d4ddeb19e27c,2025-07-09T15:45:43.937000 CVE-2025-30415,0,0,0dda05c81624c9e4852b1e34ffe1c81b4f20f383ea2d938987f3a8415d08ffb7,2025-06-04T14:54:33.783000 CVE-2025-30417,0,0,fc12b9a39bd4ea35089b458c7e35708d689f039d406a8ac724d2823069bc5d0d,2025-05-20T15:52:33.193000 CVE-2025-30418,0,0,c869c34b60256dd02b3302e7e1152866851bf6fea18ac0f8f935e7bec98ade6e,2025-05-20T15:51:04.833000 CVE-2025-30419,0,0,9f19aa64262f2b9ac9049cf86acaaf123bfdbd1b1bb2dd1fac4010e65cfb2dcd,2025-05-20T15:49:39.510000 -CVE-2025-3042,0,0,670ae0eb437b93f09d8021319b85476af0f31022941a26149d0aeb898aac3fc2,2025-04-01T20:26:11.547000 +CVE-2025-3042,0,1,968a43e087779e17f0eaad831027e798c4f819dce42edf4d6b8f95000e1ae302,2025-07-09T15:38:08.457000 CVE-2025-30420,0,0,1f103285e4843606d997c2995ccd88b9b7437442ba87080e8b0537e0a4f3427d,2025-05-20T15:46:04.677000 CVE-2025-30421,0,0,8404d4988aec83cbf77359476cd1ce9603da3bb1a5007b11bfba47a26e9d7293,2025-05-20T15:45:09.103000 CVE-2025-30422,0,0,2d73ab1e0f2d825fb5619750c36b1098447677f7924c9813e9480bfd411aa13d,2025-05-12T19:41:01.360000 @@ -293669,7 +293671,7 @@ CVE-2025-32713,0,0,41780eb28e7d5373ff6da17b7137e0137f52a097bde95b905cab3bb04a404 CVE-2025-32714,0,0,df813f4615cc3d2704542582d1b770fb87d75e18a3322571615ee43ec866e13e,2025-06-12T16:06:39.330000 CVE-2025-32715,0,0,d3bb82570cfd99f6000d98e5821e69e0b0e182ee8729f896626bf66824fdcc25,2025-07-07T18:26:25.580000 CVE-2025-32716,0,0,91c9640e2d7e8d9358387ecda29da45af9428878abc1beb58e68bec29725a7ab,2025-06-12T16:06:39.330000 -CVE-2025-32717,0,1,93a2b9911f4830e3087e0184e1057390fedbfa6b6a79387f4c01ca9fbb08e8c6,2025-07-09T13:52:32.990000 +CVE-2025-32717,0,0,93a2b9911f4830e3087e0184e1057390fedbfa6b6a79387f4c01ca9fbb08e8c6,2025-07-09T13:52:32.990000 CVE-2025-32718,0,0,94f30c6a9dccffb0ca6be7f590a8c89f73388b98ddffac8ad23eb1be54bbcb44,2025-06-12T16:06:39.330000 CVE-2025-32719,0,0,bc34cd1e14a931ed2c758c2af5afa6c291a6ea5edf2ac3d05802dfbf2a8d511f,2025-07-08T16:19:14.697000 CVE-2025-3272,0,0,c60fd5482e862c50b349cbd37632283d483289fdec77619757f54ad2125c58ec,2025-05-08T14:39:09.683000 @@ -294454,7 +294456,7 @@ CVE-2025-3696,0,0,7fdb9b0cabe429a7d591b9514cc5a2b8602875f81b912338d2415db3302af1 CVE-2025-3697,0,0,016a36f864524accbafaf295ad97be566b6d7d71f4f9f5814923e821cb7e35f1,2025-05-14T21:05:11.930000 CVE-2025-3698,0,0,3410d174ae31c43abb68f418121b89dca3911c4e48575a9281b05507afa201de,2025-04-23T16:25:56.830000 CVE-2025-3699,0,0,d02a1cd04c24f3e630d7aa0838897d4c7fa576fd6ceb0be9ab7fddd90a36396b,2025-06-30T18:38:48.477000 -CVE-2025-3702,0,0,6c9d3b4be22efb62cccd37cd7e92146e02fd0e412dcd144b7f19d652d3921939,2025-07-03T15:13:53.147000 +CVE-2025-3702,0,1,f7ef9d8d8b5f8b4e762e651abc6f7b354ef6bccb45b951e3f574f8163a42bf19,2025-07-09T15:26:35.943000 CVE-2025-3704,0,0,fa4a3eb7f97cc05cb29111ef6884110e54a213e5cd6aeb5d02530af4ecd14db2,2025-05-28T15:01:30.720000 CVE-2025-3705,0,0,f12e50798d4ff5f145c856ecf9ecdbf07366688011acaf939932f5c09169a4d4,2025-07-08T16:18:34.923000 CVE-2025-3706,0,0,af36967002cae35edc22a037b5e4639098ca61a00f66dc40237f6cb847234a6c,2025-04-29T13:52:10.697000 @@ -297024,7 +297026,7 @@ CVE-2025-46634,0,0,adbdc53bb91ce45c108dfae363ac172a5467f9ef6b9ad8bfd5e234ff22520 CVE-2025-46635,0,0,c81a16a7aac883be5eb8baced44885a6963efe19158222244e53c4c42c8380a1,2025-05-27T14:18:12.740000 CVE-2025-4664,0,0,d4044bce681082456ae2ed2a3baaa6f65e61937d9e24855cf4b96203efa26903,2025-06-06T01:00:02.617000 CVE-2025-46646,0,0,af70cd637f7e4a86250852ca6ab0f9700c2c92e88ef676964700053f516200e9,2025-06-23T18:36:04.753000 -CVE-2025-46647,0,0,ad8a8666d50828f15894c8063182aee5a21535947fd080fcbf051358982aafab,2025-07-03T15:13:53.147000 +CVE-2025-46647,0,1,7fc45d624f48e7716f7f62a322656067023a62605e6d462d55592de511cd66f1,2025-07-09T15:25:56.260000 CVE-2025-46652,0,0,9d812ecaad689bd29eeb08cd6e51fc2313308ed71660c22dce020d578677f79a,2025-04-29T13:52:10.697000 CVE-2025-46653,0,0,3b6009fc3a51ec55453aaec5d1f7a19d2114d1ff8e2f811535a6f418b5dab168,2025-04-29T16:15:37.150000 CVE-2025-46654,0,0,0aa14c4ea6fe1b19c5c6aa8b1b364a4f4f00114d15c5d807117da3c6c36c9dc8,2025-06-16T21:00:11.573000 @@ -297429,21 +297431,21 @@ CVE-2025-47159,0,0,c77623cd41d9d2ae5218502eb399cdb493dfc8432a75b9b6080f90774133e CVE-2025-4716,0,0,dada52e8c94f58b9450b0b4a9bdb43e377412a57e7caa3e8191e329a90a55c88,2025-05-27T14:11:12.623000 CVE-2025-47160,0,0,a0673bfc3377f6149f8100847033ce8edcd97adbbe55dd8bae4d51e9d9ba5734,2025-06-12T16:06:39.330000 CVE-2025-47161,0,0,b68b6000e33589ce1a4cd207bf8a4eaa6d5ee09a184dce990cf542f1a7590a6e,2025-07-08T16:15:57.937000 -CVE-2025-47162,0,0,394a92160bf2a8cb9c2786cfe2bbc04322d831934a516fc7b7331a5b8fc613f9,2025-06-12T16:06:39.330000 -CVE-2025-47163,0,0,344f56604a4e5da53d1a7da50659c1824bee236748150398c9d878ca496ca6de,2025-06-12T16:06:39.330000 -CVE-2025-47164,0,0,93a9eacc3af6e4faa9a4312187d7d9803de41e8cba858f424de197ac7e101f4c,2025-06-12T16:06:39.330000 -CVE-2025-47165,0,0,b371d337a27d76ff4662f0686f3ce2d6ca60a1a3feccde883da7f3f6cae13069,2025-06-12T16:06:39.330000 -CVE-2025-47166,0,0,6ea1c8010961973220afb3635f3796ec3aa85e5f06165a5db992ce66b53b5fd0,2025-06-12T16:06:39.330000 -CVE-2025-47167,0,0,29de3852f00f863006de27717576f132df92b37e84ecdd8770dc5f03dda2ffaf,2025-06-12T16:06:39.330000 -CVE-2025-47168,0,0,d933a7873d816ce729ee88a02892ada3e12721ec20b0b297d57c392984ed768d,2025-06-12T16:06:39.330000 -CVE-2025-47169,0,1,5fca5c4ba381689d1a038a8878ff48459d1ac121f565b24fad448388df6a402c,2025-07-09T13:22:51.720000 +CVE-2025-47162,0,1,c88bc44958ac4a48c3a7f45ff97c0d36bc04fb991f1f57d8fb5572f9d8209bbd,2025-07-09T14:00:13.640000 +CVE-2025-47163,0,1,7a1dc9e92319eda7d8b55d59407de86f1760443f71604e18063637cb292fdf6e,2025-07-09T14:00:48.633000 +CVE-2025-47164,0,1,2d95480995ecd2a6d46c51499c31c2e3ce3856cf8623a2faa6b4d01aea10e49c,2025-07-09T14:01:20.687000 +CVE-2025-47165,0,1,3c58e7f8b2769b18d8069f781cf1e80876cce82038d556f0e71cb5fea9e7b7b5,2025-07-09T14:02:09.283000 +CVE-2025-47166,0,1,9929ade1fe1ca95410567ca00de12e23f96ac9a3d848c4405906881155764876,2025-07-09T14:02:40.430000 +CVE-2025-47167,0,1,60ad0fd559998744e381c1386516b012af89cb65bea1e98af0ee6ada3da21de7,2025-07-09T14:05:38.950000 +CVE-2025-47168,0,1,1fb081c272d8ef654fd3064fda0a8ffe622cbb699ee8d258141081312cd98d3f,2025-07-09T14:06:45.143000 +CVE-2025-47169,0,0,5fca5c4ba381689d1a038a8878ff48459d1ac121f565b24fad448388df6a402c,2025-07-09T13:22:51.720000 CVE-2025-4717,0,0,8c6b554a91b9553dc985101123e9c85f09c9107cefc0850929b2446d4f2963c3,2025-05-27T19:51:44.153000 -CVE-2025-47170,0,1,0bc85f7c652c16f9594da2ca5c1409666082a7133ee61f85f4617fd170b03248,2025-07-09T13:23:52.367000 -CVE-2025-47171,0,1,0fef567307600966a1887ab3a6b2ec772bca80656acd857a6f2770f8b60f0318,2025-07-09T13:24:21.797000 -CVE-2025-47172,0,1,1c0b50aef76b05c2b3d214e037bda0dd0eff093c1d6ea04bb220fe10d7d39610,2025-07-09T13:25:03.740000 -CVE-2025-47173,0,1,b6094d21a1aab169ad594881f4fd1921138beeb6e91af66095dd995bd29d2bd4,2025-07-09T13:26:00.890000 -CVE-2025-47174,0,1,f8f7f94ce71e2d5f495c1c63f0038fe4f27aadd724d01809756abf22c5ef3434,2025-07-09T13:26:22.917000 -CVE-2025-47175,0,1,7de552066b70205e6375bede7fdd709c7bde372994a82fbb276fc1ed9fc038a7,2025-07-09T13:27:42.433000 +CVE-2025-47170,0,0,0bc85f7c652c16f9594da2ca5c1409666082a7133ee61f85f4617fd170b03248,2025-07-09T13:23:52.367000 +CVE-2025-47171,0,0,0fef567307600966a1887ab3a6b2ec772bca80656acd857a6f2770f8b60f0318,2025-07-09T13:24:21.797000 +CVE-2025-47172,0,0,1c0b50aef76b05c2b3d214e037bda0dd0eff093c1d6ea04bb220fe10d7d39610,2025-07-09T13:25:03.740000 +CVE-2025-47173,0,0,b6094d21a1aab169ad594881f4fd1921138beeb6e91af66095dd995bd29d2bd4,2025-07-09T13:26:00.890000 +CVE-2025-47174,0,0,f8f7f94ce71e2d5f495c1c63f0038fe4f27aadd724d01809756abf22c5ef3434,2025-07-09T13:26:22.917000 +CVE-2025-47175,0,0,7de552066b70205e6375bede7fdd709c7bde372994a82fbb276fc1ed9fc038a7,2025-07-09T13:27:42.433000 CVE-2025-47176,0,0,d5024465ca52874cf0a4883f1ede98b76c7f64792ce8de66ef4e198a8bb58837,2025-07-01T16:50:53.030000 CVE-2025-47178,0,0,8e44ef7ef256cba14bbdda66aa467977a8c2b1063b0acdd0730748e970af18fa,2025-07-08T17:15:36.937000 CVE-2025-4718,0,0,e197120a33051d36a3bdf1b0305cf7de5c5f5941a30eaf0eb2f8e25b8c33d5d8,2025-05-28T14:26:27.280000 @@ -297953,10 +297955,10 @@ CVE-2025-4795,0,0,3fd0e28eaafb548c1d9f9e6a41da631ae960e10221f6f4901b1a5e253e1ad7 CVE-2025-47950,0,0,4b0b13462648502a1d9e9c65a1a516635c319d24d84102d181b2a27357de0e4c,2025-06-09T12:15:47.880000 CVE-2025-47951,0,0,7133fbcec50990a36216ec42cdd458a8795e9a1d7a9b24aeb959c36e81c0b768,2025-06-17T20:50:23.507000 CVE-2025-47952,0,0,98063020cb9f5c2b480f0cb92a50eeedaf8c49e542ef7ba3da076028de108162,2025-05-30T16:31:03.107000 -CVE-2025-47953,0,1,42823c1bd1cb3436af88d82160307a590a30bf556f9e5d6ca00fa5feba5a105c,2025-07-09T13:32:18.977000 +CVE-2025-47953,0,0,42823c1bd1cb3436af88d82160307a590a30bf556f9e5d6ca00fa5feba5a105c,2025-07-09T13:32:18.977000 CVE-2025-47955,0,0,113d869757e95947826b24601aee67227ff1964ff840584986997ad0a52ce76b,2025-06-12T16:06:29.520000 CVE-2025-47956,0,0,4cfbb5c80414a8087e31896e372b9fd004884a02d7d93ff8e8c0afdf43efb67c,2025-06-12T16:06:29.520000 -CVE-2025-47957,0,1,fb51a61849e89bb2fe561f916780c027575766d1beba517bae864ddb549c83a4,2025-07-09T13:33:34.613000 +CVE-2025-47957,0,0,fb51a61849e89bb2fe561f916780c027575766d1beba517bae864ddb549c83a4,2025-07-09T13:33:34.613000 CVE-2025-47959,0,0,0fbc344af7988c6894e76b48842d48c9ca915a33b285f343b6a8f1686805800c,2025-06-16T12:32:18.840000 CVE-2025-47962,0,0,64809dd00f9d5b807d7efd01d36b41cab6d31f95db8109d1860d103458dc1142,2025-06-12T16:06:29.520000 CVE-2025-47966,0,0,6a6afa232c1f0d52c775fe5438f2a5af5e3f92fc5beb02f863c1334d297f5394,2025-07-08T16:26:34.813000 @@ -298242,15 +298244,15 @@ CVE-2025-48447,0,0,f1064a55c619ba121930a53f8ef33a80015883f6e69dc2f6e30ce6674f9bd CVE-2025-48448,0,0,d45e98596ff7c4bfe1172c4147c3bf90df1269483f2072c8e1e6cb8ccc1b62bf,2025-06-20T13:06:18.167000 CVE-2025-4845,0,0,5d1b81810c6ca4083e9e97cb1e8cb24890cd9aa68161fff1d9a41ed5b829a66e,2025-06-04T20:11:09.500000 CVE-2025-4846,0,0,567ea58beeefb674198c2f090a4debb893b74f8f25c0b605e548238fa1a18edc,2025-05-19T13:35:20.460000 -CVE-2025-48461,0,0,5dc0135bc1c8645b2bb89ceec30bb5c293123dae8989e102698ca347eddd51d4,2025-06-26T18:58:14.280000 -CVE-2025-48462,0,0,8d72eb9dc6bf359b888051f186f1402565d65e4c2e36376ba078608888207631,2025-06-26T18:58:14.280000 -CVE-2025-48463,0,0,7cdf52f77eb3317901d4eb08dce823bf2609f8867f2c62c6faceb02f03ff2ffa,2025-06-26T18:58:14.280000 -CVE-2025-48466,0,0,172cdcce5d8e2ac3797d1d0ccdc4b4ce5dd23c8d1757497733143cd79bc4b168,2025-06-26T18:58:14.280000 -CVE-2025-48467,0,0,67e9644a532ae6b0f7ec0852084b0156b7e64097fe986a70501af02a30845917,2025-06-26T18:58:14.280000 -CVE-2025-48468,0,0,cf00d0c5ed9342f688e1574c46275c48c57327408c44396315a8234346e0f507,2025-06-26T18:58:14.280000 -CVE-2025-48469,0,0,50af1de554ccf560ab59f931c55ab9ae7b27a6ed870757380cdc5df9fa5e3ea7,2025-06-26T18:58:14.280000 +CVE-2025-48461,0,1,616a7555fde1ac1519f232fd22c447480953c4448be70421f70d795a6db27bd6,2025-07-09T15:02:51.153000 +CVE-2025-48462,0,1,f12add5cb8de94d02a9d6c666561b25dddbaa165a7da8da72f1e9c3c9803d58b,2025-07-09T15:03:03.620000 +CVE-2025-48463,0,1,8420eef8a41148f7b06ba753a82d4ba73102c77bf9c2e745d46dfb8a87c07ad3,2025-07-09T15:03:14.890000 +CVE-2025-48466,0,1,a9114537be0afe414024f3d3411301a352ecaf21e8387a4fa090a8fa9c8a78a3,2025-07-09T15:04:12.913000 +CVE-2025-48467,0,1,2525c24fb54c56f3e62bc580e1daff344a75e80c1fb2c0d91f1f709ee5e90685,2025-07-09T15:20:17.210000 +CVE-2025-48468,0,1,9f1f59e9e95daf29c17991e81ea4247869b6107f2f28a3d6d89d57b5fb23117a,2025-07-09T15:20:29.410000 +CVE-2025-48469,0,1,26e53c522bd975336c92765f760599f4510a60d722b59e879c59928669e429a3,2025-07-09T15:21:28.920000 CVE-2025-4847,0,0,6fb9786d7d0457ea8b5c8f209062b29242bda3291cd69f18d9d7b36a0b0e46d5,2025-06-04T20:11:01.580000 -CVE-2025-48470,0,0,f890377764600dab71181a6f0ecbefe9ecd518b05e83fb7d5f3fd2c0ce3df25a,2025-06-26T18:58:14.280000 +CVE-2025-48470,0,1,5a2920dbee9b52cc886ba0770d69c550e8d58bf766a150b448cce57bfab73a4c,2025-07-09T15:21:40.570000 CVE-2025-48471,0,0,25591a47ceebc9413e1a4bcc266afa32d48e14080e918a48e442eef7eb535038,2025-06-10T15:13:08.177000 CVE-2025-48472,0,0,0c03c2da2260304575e0e5d7114e8a1cf6004a3b1aff992137a8bc3deefc4ba5,2025-06-10T15:13:16.167000 CVE-2025-48473,0,0,ec410f3af4b106ef605e8f12a80667c5f80415d0a4d4114d09bff1af6fc9bba8,2025-05-30T16:31:03.107000 @@ -298375,7 +298377,7 @@ CVE-2025-4882,0,0,9ae533a1d17c0bc7b22051d58510b828885d48326cbc794d7bf23ceba43e10 CVE-2025-48820,0,0,2e74f9f8b2d9ed11788b951bc950b24854e2b9893f9159467cb30595952cb6d6,2025-07-08T17:15:46.933000 CVE-2025-48821,0,0,1a4d95f816f2f2758b65238f9bdb04ca33836aa135fc96eef6e93d6113635de8,2025-07-08T17:15:47.143000 CVE-2025-48822,0,0,2d5b55fe88eef162906b8c5adfa17341149d03e7f5fff0103a19782e06fdedfc,2025-07-08T17:15:47.363000 -CVE-2025-48823,0,0,d34eb7a41dc7225b081e7e5b123d9aeebbd61fd7cf98f64876707e9f8f0e8621,2025-07-08T17:15:47.580000 +CVE-2025-48823,0,1,c8bd2c657cedafa119bef2c637aef832682593ac8178cc16fdb5a48a9dceb3e5,2025-07-09T14:15:29.097000 CVE-2025-48824,0,0,1dd7dea5e40a16323be3275b42e67674f077489ab06ffc014fc46067b7aff78c,2025-07-08T17:15:47.777000 CVE-2025-48825,0,0,449f974167a8b96d483685583b54c55bf8ad97d04b0702624b6d7ca85c1f9103,2025-06-16T12:32:18.840000 CVE-2025-48827,0,0,e2e79ef6a8629053e66e0020881c95eca4862508fcd8019d12aa8f7c12118ad4,2025-06-25T16:46:46.703000 @@ -298971,9 +298973,9 @@ CVE-2025-49790,0,0,19441b917db064868ddb97a490f821b21556af4e0ee9956e7ae01ddfacf18 CVE-2025-49791,0,0,c8405bee0682e54627b1129d1bbc31f4fc38b15adb607d01d4c489d218bdf982,2025-06-11T03:15:22.527000 CVE-2025-49792,0,0,92d32f298ce5eac66a29fd03922b03d39deb71f8c19e93f3b95048029b8b5bce,2025-06-11T03:15:22.587000 CVE-2025-49793,0,0,25d57e0b9df99cf6003be5aeef6975cbd58104035f2746b28b6910725b1e9c25,2025-06-11T03:15:22.650000 -CVE-2025-49794,0,0,62d36e492759716b9ec6494fdfac65391695353296c163c6913822f33f87da91,2025-07-09T03:15:29.003000 +CVE-2025-49794,0,1,2258986b24b346a1cb58bdfcb553ac2fa44f275de1516d8bc0ae7c30d38fd87a,2025-07-09T14:15:32.797000 CVE-2025-49795,0,0,fca68b5398456a725e75b66c70f0fa0f5a37792c13cdf789ac2c8de7e8dd89ef,2025-07-09T03:15:30.183000 -CVE-2025-49796,0,0,8f890a50bf655ccafa6a9b5c9f91eb4aac110e70cc3e356521c2fdc4dfa99928,2025-07-09T03:15:30.307000 +CVE-2025-49796,0,1,43edda9a13bec15dcc4080b30e2733145d8e3e4ea5d066116c0ab1cc620306ac,2025-07-09T14:15:32.927000 CVE-2025-49797,0,0,13aa17d1b7e46eec0802f65578a147baeb08c4d0e59385ea616f044fa893e802,2025-06-26T18:57:43.670000 CVE-2025-4980,0,0,b34e85986066032f97fe34d8a927fed77ce8edee3293780d83eab3188141a736,2025-06-12T16:21:08.950000 CVE-2025-49809,0,0,b16c5e54bd1815993f52b68644f79c44960509f537651d677fe921a69a587937,2025-07-08T16:18:53.607000 @@ -299353,6 +299355,7 @@ CVE-2025-5233,0,0,6ecf1c2c649b0793b0fa703353d52d82c83e36cf0edf8150a0b10fa91cf509 CVE-2025-5234,0,0,90da3fe9f529e2410772f8005026a2e49f18f6164397a33d7c7ed33476b3bcb0,2025-06-23T20:16:59.783000 CVE-2025-5235,0,0,9f99135aac66ddf72cbc0dbdd83c4db7648e86e689f203314291273a812d09e8,2025-06-04T18:29:21.090000 CVE-2025-5236,0,0,21b3f9a42248749cfd7dac46ffac19b1b1d972c6879013b8f47a703a60b1c09a,2025-06-04T18:30:22.220000 +CVE-2025-52364,1,1,08e9e6847bf47a8d35ca2102aab5d34d908578e9010a0bae54f8bd1454a5f63d,2025-07-09T15:15:24.650000 CVE-2025-5237,0,0,908366c4316ddadbb21a5bf615748f21dc3d5af688b69c0cf4ce305efec5d0f6,2025-06-18T13:46:52.973000 CVE-2025-5238,0,0,2ea3b090ffb1e48b08d0ca2fe3294d59ed4285a1a902a2dd2038828fbe982e10,2025-06-16T12:32:18.840000 CVE-2025-5239,0,0,6516f1b341ac369c2f899c8884ddf4fbc36f529a71c6c5c2406c9cd11f9a2a1d,2025-06-06T14:06:58.193000 @@ -299590,7 +299593,7 @@ CVE-2025-5301,0,0,172c3938c2a9928b9f8edd9f7241e7981b7b3a36108e0e0149558a51f65a15 CVE-2025-53013,0,0,fbddbd3d16ce057122aa052ff33047be6dcbaf0581a6787dbc5224b72c1a826c,2025-06-26T18:57:43.670000 CVE-2025-53017,0,0,9fda84f4c77156bd2dad813030dce357816e607bdf90bd8c0d4b8d8e747fd82f,2025-06-30T16:15:24.203000 CVE-2025-53018,0,0,fa70bf377212e387a583d52f53db45796e2ade4762255f1341ae34db65100639,2025-06-30T18:38:48.477000 -CVE-2025-53021,0,0,584a1e62b4773d2708786899e601db1bd01845b28be4bfa47cabc53fd2adc922,2025-06-26T18:58:14.280000 +CVE-2025-53021,0,1,f5d12f72a3319bb2aaad1b40e6a585e926c2b3a57436f0813667f6f5e29a0a57,2025-07-09T15:23:31.237000 CVE-2025-5303,0,0,546057fa156dd0bfd15529f37c8ab9dae75346583c1c67316386c3461de42474,2025-06-09T12:15:47.880000 CVE-2025-5304,0,0,27c7f2edf9ea9d7b46be7f6eeec8234451bc5c2847f1212c43eda6372fcf7130,2025-07-07T14:47:29.020000 CVE-2025-5306,0,0,f34be59a6b1e6be6e727751955efa7f722865a717bb3297f17420ade83207b9a,2025-06-30T18:38:48.477000 @@ -299744,7 +299747,7 @@ CVE-2025-53338,0,0,69ee0c5b640fcd72e43f5a3a6d7505b4ccd5499b6d733162f15f39655cb80 CVE-2025-53339,0,0,955bc6b5359aed429b44d347615d0e1318a1b809ec1e3579e3ed2353be810e81,2025-06-30T18:38:23.493000 CVE-2025-5334,0,0,fb14475e980fb397de4901b9efdcaa30993615e4c74780c0502ee0c491e8e5cb,2025-07-02T17:31:56.563000 CVE-2025-5335,0,0,5abfb5e74bc6ec2f8ed9b95f56ffcbd4f93dcd183997df85e24502ad95934637,2025-06-12T16:06:39.330000 -CVE-2025-53355,0,0,8d35bab09217d655776045296c71bfb70dc5971d57f3d2661db16dadac0d3714,2025-07-08T21:15:28.120000 +CVE-2025-53355,0,1,8390becd529af926033e8b88fbfa2682d59780af100ff254ef4a77179e8e9a00,2025-07-09T14:15:33.143000 CVE-2025-53358,0,0,3d97a4954e653a509d4005c71cf64fbb269b7293bb5ffaddd5ae485b7c74944b,2025-07-03T15:13:53.147000 CVE-2025-53359,0,0,45ed40db77640f47ba583ca32d5c60d80ffbacd98c4463b392cad98fdcfa3117,2025-07-03T15:13:53.147000 CVE-2025-5336,0,0,51ebbfc8a6c001d043ad92fbb70974a3ccedacbc8290bd5643cc8faeb9732c02,2025-06-16T12:32:18.840000 @@ -299808,7 +299811,7 @@ CVE-2025-53501,0,0,ccac602c786f22315db263303b00facd2536cbcd4bbc6d4d87bf200450bbd CVE-2025-53502,0,0,5a7035089ea6976dad62bf0b0d470894d525c57cb053c618d3c57707f23fd14d,2025-07-08T16:19:11.700000 CVE-2025-5351,0,0,f43512958c8933de764a4ba1958227010145e98ab3795163cb96e1ef5703ab9a,2025-07-08T16:18:53.607000 CVE-2025-53512,0,0,a24e125986f376aa4b2de09e043e98c10232bbf91c969785ec7c86183a3eda21,2025-07-08T17:16:04.400000 -CVE-2025-53513,0,0,1e2911fee28cd16f32206768aeea2bde21a90f137c2dba4728eae79a94165bc7,2025-07-08T17:16:04.593000 +CVE-2025-53513,0,1,85b6507acec30afc97356a757f5fe4f2cda035eec8b0d3a03d546d2acc72bdd8,2025-07-09T14:15:33.260000 CVE-2025-53525,0,0,ecb1b185ddf06f2c312418a38923082474429904dabaf45dd2a82528f32361d1,2025-07-08T16:18:34.923000 CVE-2025-53526,0,0,34ec2de203860d01ce87feab99bf245ecb39d9ddc32e3c0344a4a1247102c9b8,2025-07-08T16:18:34.923000 CVE-2025-53527,0,0,2d6656d529ffeffb41e4c33d89a2d6a1959d28485ab22436b624c66de48dcceb,2025-07-08T16:18:34.923000 @@ -299823,6 +299826,7 @@ CVE-2025-53539,0,0,5db39fcd0a7210d0be83b7c2d14e7c8ed3f3b273c7210a57205be51f0a6b1 CVE-2025-53540,0,0,68f0d19008b8f949cf7cbae53e1f6ef67fca39bb0fc5628cd655d505d311b69c,2025-07-08T16:18:34.923000 CVE-2025-53543,0,0,da4e1b5cf6cb8007cd6dfd1396fc489f3840d88a4e59fc523fdbc4c83d5fc208,2025-07-08T16:18:34.923000 CVE-2025-53545,0,0,ef3d0455098abbefc8b277f85bd071e32e2b46fb49dca2b74733aee634f2df15,2025-07-08T16:18:14.207000 +CVE-2025-53546,1,1,9fc54f019bccaf0fab89e92436e73264016c274b698eb6c2512b5b15181af278,2025-07-09T15:15:24.787000 CVE-2025-53547,0,0,0603f19d53a4e8e1ee41784cd64f1b6377de65c88b39bed5a19368f091eb7c70,2025-07-08T22:15:27.897000 CVE-2025-5356,0,0,230423e916dccb3eed4f4eea6b8b3a9d8afef34a102c6f9d5aed25dc46913046,2025-06-24T15:20:27.113000 CVE-2025-53566,0,0,454fc69172044556d46b17e70adb6745e5c6362d217f0ee325fd72c5ff2824d8,2025-07-08T16:18:53.607000 @@ -300391,7 +300395,7 @@ CVE-2025-6012,0,0,26f2f66d87f45d6aa756cc004552cfa11ed42d44708395d664a6658fe8d21b CVE-2025-6017,0,0,cdf296e1429037cbf00bd284008bfaf96f2ac3ba0f0da1dc4e6958978cbc6e8e,2025-07-03T15:13:53.147000 CVE-2025-6019,0,0,5477ec15a82be0c2a93ed9a3473af3a8dab5cb2afdbbfee75cdeb137fdc5af5e,2025-06-30T03:15:25.990000 CVE-2025-6020,0,0,d93c7b29d895d9b8150932df3a20e117e2c9d41feac2f952996e06083758c92f,2025-07-07T08:15:25.460000 -CVE-2025-6021,0,0,f8747c3aa7559b7509803251a9dbc8793378d0bdf809f55231fe33e246b5b528,2025-07-09T03:15:30.930000 +CVE-2025-6021,0,1,7068482937d1f7821bd6021706fd86f2f9cfe7dee3ae94c146ed8914d65f875e,2025-07-09T14:15:33.413000 CVE-2025-6022,0,0,673713355118472c1ebaabd5c5e4854e0f9320e04b049cdd5cc68d5d0f25f012,2025-07-05T23:15:26.353000 CVE-2025-6029,0,0,e9108be7e98d0780991a9dbc9771d79381463de686ea76ad25b1212ca465841e,2025-06-16T12:32:18.840000 CVE-2025-6030,0,0,e2d083f85b4980fab673be25fe64ff6c58fe5f2e84e15893b8c80d92f1561a4f,2025-06-16T12:32:18.840000 @@ -300524,7 +300528,7 @@ CVE-2025-6220,0,0,70ba2b5176193b00d7c5791b5a8342d63e62622f52556ab6ab22db00bbc145 CVE-2025-6224,0,0,c2476a14c43ef31967d89288ff41b75746283c187c9c6cdc794d96fe44a26458,2025-07-03T15:14:12.767000 CVE-2025-6238,0,0,70e8544f27b2c647ed75133c57e9501fbdebb41e79fc43e2c23c74ed4d734482,2025-07-08T16:18:53.607000 CVE-2025-6240,0,0,ba4da5fd605eca3c919532cf0a8a1661ebda5a87c35d4010c4dddeaa23d93e9a,2025-06-23T20:16:59.783000 -CVE-2025-6244,0,1,964622be99b8929ae714b5f1186a8bb5aa1dacdc93d9c545b15c83bc6ba93e76,2025-07-09T13:52:15.010000 +CVE-2025-6244,0,0,964622be99b8929ae714b5f1186a8bb5aa1dacdc93d9c545b15c83bc6ba93e76,2025-07-09T13:52:15.010000 CVE-2025-6252,0,0,04266fde32de91a19cd75afe711753a0e9f9154bece1418589e4e14bad3b2599,2025-07-07T14:51:20.410000 CVE-2025-6257,0,0,cc91b7557b526c88672e08add1b684bde89a65ab4dd7fa052a99a1c1c9c823b5,2025-06-23T20:16:40.143000 CVE-2025-6258,0,0,a4b6be5935c4432c7a129304f469494da82c625050798afddedddfa563a7fe1e,2025-06-26T18:57:43.670000 @@ -300736,7 +300740,7 @@ CVE-2025-6510,0,0,ecc037166accb7dfaea1f8cddba19c00d128613c27cb3d67530ed0cb4ac38e CVE-2025-6511,0,0,bb6b2f27850e5104aad4911b5fffd73474270d0ddc86c27cd6de479789e3773b,2025-06-23T20:16:21.633000 CVE-2025-6512,0,0,fafc14028fc8e6d0cf5d1c26ecddf3f178d4b119f094c564dc999ae28df07a2c,2025-06-23T20:16:21.633000 CVE-2025-6513,0,0,31aa7f858e5f0036c4b8df8555240c1143a48501c8ecdc51eff54ca1e5b97fde,2025-06-23T20:16:21.633000 -CVE-2025-6514,1,1,e4629d7f1b219fc8f16c56aa24133a0dfa476b947d7fd622927c53e9b355e742,2025-07-09T13:15:24.213000 +CVE-2025-6514,0,0,e4629d7f1b219fc8f16c56aa24133a0dfa476b947d7fd622927c53e9b355e742,2025-07-09T13:15:24.213000 CVE-2025-6516,0,0,ac0b558987c235b3e9cca99c9b3e31ea02676d4ebf55b1f2d4bc9503aa512a0c,2025-06-26T12:25:51.530000 CVE-2025-6517,0,0,35238b9f7d60a32ec32d1174777d4c0183c9bc8921be1d8a1d780cc1a4b1b372,2025-06-24T14:15:31.093000 CVE-2025-6518,0,0,6e06f95a85f576b17be34b0e1435fc48fb393f541a6c1c045c14a95dd53636d7,2025-06-23T20:16:21.633000 @@ -300882,9 +300886,9 @@ CVE-2025-6738,0,0,3259930ec98b59546eeaeace9fb84641bae60a8fe1ea462b5fb5b4147d4fd6 CVE-2025-6739,0,0,296b68698d678885796e02fdcabfa1fd4cd82d98ac6928cc81223bf01ab4af40,2025-07-08T16:18:53.607000 CVE-2025-6740,0,0,f2a5c7930b3c8f30608fd6048a089234b7bc7d41c3644daae934f36b331998ef,2025-07-08T16:18:53.607000 CVE-2025-6742,0,0,70ebab8f62d28c9bc95f30af06715a9fdc3e5b4d92e32130a6975741ce67833d,2025-07-09T06:15:25.220000 -CVE-2025-6743,0,1,746d3ce604d9ed4a0671ebeda18bc9e9bbdffb1eeb125eeb4acda17da87a52c8,2025-07-09T13:50:02.300000 -CVE-2025-6744,0,1,6688b962538f4716e23e1eb3e778dc262a7f5c1dc531e7f865d83f3f66fc6812,2025-07-09T13:47:24.530000 -CVE-2025-6746,0,1,32f8c5e5ba77fc8ddd5b1beaf247cdd89a56df3bbcfc519d3b41471d430fc5e4,2025-07-09T13:49:30.467000 +CVE-2025-6743,0,0,746d3ce604d9ed4a0671ebeda18bc9e9bbdffb1eeb125eeb4acda17da87a52c8,2025-07-09T13:50:02.300000 +CVE-2025-6744,0,0,6688b962538f4716e23e1eb3e778dc262a7f5c1dc531e7f865d83f3f66fc6812,2025-07-09T13:47:24.530000 +CVE-2025-6746,0,0,32f8c5e5ba77fc8ddd5b1beaf247cdd89a56df3bbcfc519d3b41471d430fc5e4,2025-07-09T13:49:30.467000 CVE-2025-6748,0,0,7f8f18ce472108822cda61d00f4ec9b1169d30c9d958ea970ce7bf174900b6ff,2025-06-30T18:38:48.477000 CVE-2025-6749,0,0,d1c491f56475f9982f91a0af7dbfe7ca7d1db32da1110cdac506d65ba7fc1676,2025-06-30T18:38:48.477000 CVE-2025-6750,0,0,f1b454f50a80614e8eea516f2449d507837abfd24769c351c9d643bb9f9983b5,2025-07-01T17:44:05.567000 @@ -301055,7 +301059,7 @@ CVE-2025-6962,0,0,f65c5ea7b99373b1a9855dc70c185d85075c1892627adaf80072b361308a0e CVE-2025-6963,0,0,44275f505fd32e81e69bb52414baf1be8e373248b7ffe857a4b14d50be164bee,2025-07-07T14:40:29.430000 CVE-2025-6995,0,0,7b13a5a39a513866404553a42360b13c7cd18804a396552daf573ce610d37414,2025-07-08T16:18:14.207000 CVE-2025-6996,0,0,bb768e06b01467d03128b27855e07bfbcba0271eecc64a64b2276cf474cfed86,2025-07-08T16:18:14.207000 -CVE-2025-7030,0,0,52e23f1ceb13513064982b9c04a299b3420b12b28bdc1364165ec4105339fedf,2025-07-08T21:15:28.773000 +CVE-2025-7030,0,1,bff430677fa5f07d6e553d8b3a817a51b472f2404c3eeedd700cbab9aa8db484,2025-07-09T15:15:25.103000 CVE-2025-7031,0,0,87dcf3ead2d6e93587306ac125db0b07ac03ac33faf58797d3a3b1839c361f89,2025-07-08T21:15:28.907000 CVE-2025-7037,0,0,b07b90cf71f9637ef298c4a50f0e88d414ddf0e08711f7a76696405dc6fcd56c,2025-07-08T16:18:14.207000 CVE-2025-7046,0,0,59780b11937d03ed4ccc5b0e229eb16ce78f2772f010122dcf4771e66748fb6e,2025-07-08T16:18:53.607000 @@ -301112,7 +301116,7 @@ CVE-2025-7115,0,0,d1360db2a7d019943dec40b4ae1cd274cf31f932a5bcc6517b1438f7946e01 CVE-2025-7116,0,0,3b84cbe6de82588af2701d62d5be2ae7f7b714d0505d729be945f7ffa04b2d20,2025-07-08T16:18:34.923000 CVE-2025-7117,0,0,f773227bbe8bdfda9177d212e29d113f4396a5f47c7935d1c0208c86e6cd989c,2025-07-08T16:18:34.923000 CVE-2025-7118,0,0,0d52f5a0875b5a0f638ef7151fbd2460a1631010329160b8f7e16f32240543c7,2025-07-08T16:18:34.923000 -CVE-2025-7119,0,0,ed6e8efc4eb4aa5119baee595e39b064334638459b5f4c9fb12c608fa9f0d88d,2025-07-08T16:18:34.923000 +CVE-2025-7119,0,1,1a0345080022790fbd188c772de33d8337e523b91f81a88b62475f8013358aef,2025-07-09T15:26:56.123000 CVE-2025-7120,0,0,93c7c5877402f5a2f60433d207415dfe8e59029219d3ec7581b4c3048f517ec5,2025-07-08T18:32:24.210000 CVE-2025-7121,0,0,85d1b35564b6a8b1850b40a4701e75a2ba1d273d47d163accc0db23ee8ebb2a0,2025-07-08T18:29:57.147000 CVE-2025-7122,0,0,d17425333f1b0746a2f16fe6c80480eb2789695b7f9f4b2f68ea923f1dd8e655,2025-07-08T18:29:46.427000 @@ -301127,45 +301131,45 @@ CVE-2025-7130,0,0,cd080878d50a88f334d58b1de0694972ebba0c153a9b10ece68c5a033926cd CVE-2025-7131,0,0,4ef5a7aae4241220ef5f63967c91d442948bebe87a849987817d0c01640cc53a,2025-07-08T18:28:00.197000 CVE-2025-7132,0,0,1de3d4d5a5a0e375d364db3860b3b02480b54961a3c10d12fda7290bc1fa8ce3,2025-07-08T18:15:38.643000 CVE-2025-7133,0,0,991588cc9d893d0cdf1192072b00aa651521418de82987d3411555ff8ddb6ff2,2025-07-08T16:18:34.923000 -CVE-2025-7134,0,0,f8a98630eb68e1197d3efbf13b0cc44fd1216fc8162ce3eff1c1f2c42885e72c,2025-07-08T16:18:34.923000 -CVE-2025-7135,0,0,41e1371001b0c9ef44085404a200e473649f01c3deac2b86a0172c6dbc4db2b0,2025-07-08T16:18:34.923000 -CVE-2025-7136,0,0,45646fd785818c71a478aed83adf45c1a4cb565720937384a9a078d615616dc5,2025-07-08T16:18:34.923000 -CVE-2025-7137,0,0,8983e1bf8f43863ce4f3f3d6f23024ad00aebb51f44c9e8edbd10012f2c687aa,2025-07-08T16:18:34.923000 -CVE-2025-7138,0,0,ae8525b701f55d58f0bde6f3ef93def87c220f38764214ee2dec062f5e03c07e,2025-07-08T16:18:34.923000 -CVE-2025-7139,0,0,5974606ad6695b4cd0807fe600a627598e553b510292b30a15346a03a3610524,2025-07-08T16:18:34.923000 -CVE-2025-7140,0,0,ee3691bb6ac580bef84ba0971b5805e89c3455f8695d9cd83c6ff4b04d4a70e3,2025-07-08T18:15:43.450000 +CVE-2025-7134,0,1,2608d7607bd7b01f10bc88c3073ab49670bbfa540e7dcb2444e029dd1213b252,2025-07-09T15:27:04.847000 +CVE-2025-7135,0,1,44e3f2fd26c7cdf0bfc28251d0b5c984b577a155d7d936e926b7042e86f6e394,2025-07-09T15:27:19.667000 +CVE-2025-7136,0,1,47804a8d86551f487b1dcefae09f06fdf8ea94797a7d922fbf71b5b33bda4efa,2025-07-09T15:27:29.277000 +CVE-2025-7137,0,1,830da746190eb73a119cfa0d3bf87209fbd28217e39bdbe37d588e738496adf7,2025-07-09T15:27:41.397000 +CVE-2025-7138,0,1,009536f854fe66b4bd9a26b9afe18fffb253bee6fee7c12efab5427dfc393c3b,2025-07-09T15:28:08.573000 +CVE-2025-7139,0,1,a3e51d6c34c792c55125ff133a814a4a5fc83b3fbdd39f9df860aaf682b9eb8c,2025-07-09T15:28:22.777000 +CVE-2025-7140,0,1,eaa6904933a22278855fd2a08dc7eeb7daaacbea69873a260a83bef8316e9e16,2025-07-09T15:30:28.377000 CVE-2025-7141,0,0,91bf30706d80178a64d73ad4398d761f9bfe48a3924768f5bbdc2462c5938cca,2025-07-08T16:18:34.923000 -CVE-2025-7142,0,0,f3c4612d75128afaaec302137d96e08fc71bd22932973c9685675017b248699e,2025-07-08T16:18:34.923000 -CVE-2025-7143,0,0,d46fdb4db53a461dacbcdd92c4ff8e70d63a184f1ab1012d00779e40a993a88f,2025-07-08T16:18:34.923000 -CVE-2025-7144,0,0,4a838bc9443f9954fd5ce07bebfa826af44107cd2c0151d98ec8a4f8643ffe1f,2025-07-08T16:18:34.923000 +CVE-2025-7142,0,1,61297cb1dc7a59000cab36f3bfea744f099d8f67d95993200d2299ad39d4e789,2025-07-09T15:31:08.393000 +CVE-2025-7143,0,1,b1752d5ba61b4d9af4c01acb28c2e4ccf90c39a796c83da7c84a80a3885cce36,2025-07-09T15:31:49.390000 +CVE-2025-7144,0,1,d770fa0800d794cc7d43253a8dd51d8c7b5a214ef6c9124dbbfceef4dfa32f1c,2025-07-09T15:32:29.227000 CVE-2025-7145,0,0,f23a6abe9ee91bf327047a5646fd46bd6ebe3d3fd2e0c356723d58f28175eb7c,2025-07-08T16:18:34.923000 CVE-2025-7146,0,0,638c7729a530d780a31a04422b11c82b6d91f8fa46f4f9240650edec94b5621f,2025-07-08T16:18:14.207000 -CVE-2025-7147,0,0,021f03d37684dbb6aa814091861efc10cfc4822508e3b0431afdb9a262daa57a,2025-07-08T16:18:34.923000 -CVE-2025-7148,0,0,004c748c2eb135aa459011e3f784e052707494e929bdf0250b572031d5537c4f,2025-07-08T16:18:34.923000 +CVE-2025-7147,0,1,743ca355c95d165c25224971e4e14321e3b4bdcc9d5221d93b274d53899c26e3,2025-07-09T15:32:50.693000 +CVE-2025-7148,0,1,a7f8448d5a95846314d608fe7c974c3f95d929cea78af80e8438367394184bbc,2025-07-09T15:33:05.130000 CVE-2025-7149,0,0,8a7428714c1fa4042d2489510219db7fdc31ced77d47276f84ee86cf4e6153cb,2025-07-08T19:18:56.090000 CVE-2025-7150,0,0,2843258b530da5e94783f30abf3db730206add33e73848122056dfa6669b7683,2025-07-08T19:18:47.723000 CVE-2025-7151,0,0,3732f760fcd97a08fc983c3e6f1e93a25032e50bb4de4e9ecf4b4932b5afb19c,2025-07-08T19:18:20.233000 CVE-2025-7152,0,0,8c602f26520d44c90a3bf2f83a70f0be1e2aaff9557fe0bde02b82eb0c6ecaa3,2025-07-08T19:13:54.260000 CVE-2025-7153,0,0,fe10815e79f0fe609c213bce8aabdaa93cce4b6ae0958e19d2bf8a5552e217cb,2025-07-08T19:07:03.017000 CVE-2025-7154,0,0,2299aa206bbc4f8d93f86128263120c257f2298fc6125efe3203f9afed36f50c,2025-07-08T17:16:04.893000 -CVE-2025-7155,0,1,f02c422f41355a44ea042408654ca6ce8a451680b984bacbbaead4b3e43e686d,2025-07-09T13:52:30.290000 +CVE-2025-7155,0,0,f02c422f41355a44ea042408654ca6ce8a451680b984bacbbaead4b3e43e686d,2025-07-09T13:52:30.290000 CVE-2025-7156,0,0,c9f9f5ddb7fd9ddfb4311cb647b3794a82654b2d90d22e935c7083c26b3f936d,2025-07-08T16:18:14.207000 -CVE-2025-7157,0,1,96ac6b608d6b300c3b27b72eb20578ef8c5b88ed2a210272ba6b442e9a8c967e,2025-07-09T13:51:45.550000 +CVE-2025-7157,0,0,96ac6b608d6b300c3b27b72eb20578ef8c5b88ed2a210272ba6b442e9a8c967e,2025-07-09T13:51:45.550000 CVE-2025-7158,0,0,17b4a589bb3086fe76bf0d9328b0eb95a4c93a36a41f0bb7fcf20658389a1a3d,2025-07-08T16:18:14.207000 CVE-2025-7159,0,0,c9b13860e0a629efde4384a514f8367f9fbea3766bde841e50cbc5fba7bf22d2,2025-07-08T16:18:14.207000 CVE-2025-7160,0,0,0a96e36e0df846848d7566ff5ef62a9c77366ba93d07032d813cc997f581cd40,2025-07-08T16:18:14.207000 -CVE-2025-7161,0,1,c430892b3ffe17ca03b6a6a5312ccce80090cc32ea6be2e72d9c4832c3f04dad,2025-07-09T13:51:35.800000 -CVE-2025-7162,0,1,c96d38d890ead388bddd1a879b0b0997819f9ab8ac87eb6ad6d6e5d97b6aad72,2025-07-09T13:51:25.883000 -CVE-2025-7163,0,1,212b6f27aefd92a842081a45898250e16ead2af6fbae7badfba6974c4be68db5,2025-07-09T13:51:12.683000 +CVE-2025-7161,0,0,c430892b3ffe17ca03b6a6a5312ccce80090cc32ea6be2e72d9c4832c3f04dad,2025-07-09T13:51:35.800000 +CVE-2025-7162,0,0,c96d38d890ead388bddd1a879b0b0997819f9ab8ac87eb6ad6d6e5d97b6aad72,2025-07-09T13:51:25.883000 +CVE-2025-7163,0,0,212b6f27aefd92a842081a45898250e16ead2af6fbae7badfba6974c4be68db5,2025-07-09T13:51:12.683000 CVE-2025-7164,0,0,0a3f306d8332fc6badec6fe7bd069d6887b9a4b009126806a3d69c78cbc5e44b,2025-07-08T19:19:05.190000 CVE-2025-7165,0,0,dd8b42eb9c5811489db443554fc0c7de5e4ad32152cf2087c80f5c16200da11e,2025-07-08T19:19:10.427000 -CVE-2025-7166,0,1,e03bdb7c12c00701bfa934ab47701d56afffdbb6bf89dca9122ef27f691dbf5f,2025-07-09T13:49:10.180000 -CVE-2025-7167,0,1,36de1773270c7ddad2c49a53108cba83f157eacdef6076347f742e2b7616a75d,2025-07-09T13:48:57.267000 -CVE-2025-7168,0,1,3b66c921d1a7c1f24108594624184b2d34d7bd6e055c3c7bc513a72c6c02f54d,2025-07-09T13:48:46.383000 -CVE-2025-7169,0,1,599f86745e8c0fe3603d538266f93545d22b7099d8494265f23ab43bf6577f84,2025-07-09T13:48:29.663000 -CVE-2025-7170,0,1,e7074c062ca041e13ef32be240b37d08f1967d83843fc4a53eaa17cde92d0e94,2025-07-09T13:48:18.960000 -CVE-2025-7171,0,1,a044eb9593a5a231c85b81f578841a86d682acf18dbcc5030d3c935f5db4d8be,2025-07-09T13:48:04.440000 -CVE-2025-7172,0,1,cc34db53f481ea62ac7ea4700a1304806929243416d193a9e3313d8237beaf76,2025-07-09T13:47:02.427000 +CVE-2025-7166,0,0,e03bdb7c12c00701bfa934ab47701d56afffdbb6bf89dca9122ef27f691dbf5f,2025-07-09T13:49:10.180000 +CVE-2025-7167,0,0,36de1773270c7ddad2c49a53108cba83f157eacdef6076347f742e2b7616a75d,2025-07-09T13:48:57.267000 +CVE-2025-7168,0,0,3b66c921d1a7c1f24108594624184b2d34d7bd6e055c3c7bc513a72c6c02f54d,2025-07-09T13:48:46.383000 +CVE-2025-7169,0,0,599f86745e8c0fe3603d538266f93545d22b7099d8494265f23ab43bf6577f84,2025-07-09T13:48:29.663000 +CVE-2025-7170,0,0,e7074c062ca041e13ef32be240b37d08f1967d83843fc4a53eaa17cde92d0e94,2025-07-09T13:48:18.960000 +CVE-2025-7171,0,0,a044eb9593a5a231c85b81f578841a86d682acf18dbcc5030d3c935f5db4d8be,2025-07-09T13:48:04.440000 +CVE-2025-7172,0,0,cc34db53f481ea62ac7ea4700a1304806929243416d193a9e3313d8237beaf76,2025-07-09T13:47:02.427000 CVE-2025-7173,0,0,bfd17da7d6331fce3ec2a695d283ea7ca375ee439f983b917058c769fb410cde,2025-07-08T18:15:21.147000 CVE-2025-7174,0,0,3bd53b4358c3350906c892b443ef49c409c23d00181cdbe3890c920664870d71,2025-07-08T19:19:16.303000 CVE-2025-7175,0,0,370466751731a19aca025067fde38f357abebb527536a8357d8b896fb4fbbd1d,2025-07-08T19:19:24.460000 @@ -301175,26 +301179,27 @@ CVE-2025-7178,0,0,ab713ac24bc7f779767846e0ef563381651f50ae02ea5009f8d9c349711ed3 CVE-2025-7179,0,0,d4ba849acef065f57ca446bf1b37f6994f2176aedc5036f051c1143d20039bd9,2025-07-08T19:37:32.997000 CVE-2025-7180,0,0,7c862ba38b3226fe33a6b6416310536ef07fb1f72ca6b726e721beda890b9036,2025-07-08T19:41:32.147000 CVE-2025-7181,0,0,4b7f7e93e31e58b0b53f99ec28393fb88276b22db4344c11fb59060b6da894b4,2025-07-08T19:40:53.907000 -CVE-2025-7182,0,1,27f3e7fc252c14614a9e15f8bfb4733df65265799a6a626c5197c6dd1022fa22,2025-07-09T13:46:44.460000 -CVE-2025-7183,0,1,2e9054137afbb79f8f08efd446c54e0a9ec12e7bc8c6c165203ce9152268184f,2025-07-09T13:46:20.720000 -CVE-2025-7184,0,1,b854c91053d635b8769e48c84c44184781c892629b63bcab65229455bc0796ce,2025-07-09T13:46:00.560000 -CVE-2025-7185,0,1,499d40fc9abcbf220da25c60b918d5b84a6ae8a2d10df3f8c2c19408d063cadf,2025-07-09T13:45:44.483000 +CVE-2025-7182,0,0,27f3e7fc252c14614a9e15f8bfb4733df65265799a6a626c5197c6dd1022fa22,2025-07-09T13:46:44.460000 +CVE-2025-7183,0,0,2e9054137afbb79f8f08efd446c54e0a9ec12e7bc8c6c165203ce9152268184f,2025-07-09T13:46:20.720000 +CVE-2025-7184,0,0,b854c91053d635b8769e48c84c44184781c892629b63bcab65229455bc0796ce,2025-07-09T13:46:00.560000 +CVE-2025-7185,0,0,499d40fc9abcbf220da25c60b918d5b84a6ae8a2d10df3f8c2c19408d063cadf,2025-07-09T13:45:44.483000 CVE-2025-7186,0,0,3e6decafa53bdd3c2b6eb7bcfd93b74d01c2d323b5f7694cb6fa567d6e716537,2025-07-08T17:16:05.833000 -CVE-2025-7187,0,0,c62bae007d51dfb9ccba8b5f7344f3ff8a6b9f74d232eb4fcb14b6aad63a7b13,2025-07-08T17:16:06.057000 +CVE-2025-7187,0,1,8bbad9ccc6e7c434d26547e5991994e3d5f282fe278015bf7bf7cd9d6536894c,2025-07-09T14:15:33.580000 CVE-2025-7188,0,0,4c3d913ed14de1eb57706a8dc50d9a2e698e5e43a5bc5bbfb22fa6bad237b8e1,2025-07-08T18:15:45.063000 CVE-2025-7189,0,0,8f84df0755649db6f2e8f138025fbb73232ebd734527af4887f6a4f01e491132,2025-07-08T18:15:46.273000 -CVE-2025-7190,0,0,75c864e411e3c9537f814458631c6d27ebf0955383e9bfa84c59e49ab369e25a,2025-07-08T19:15:43.943000 -CVE-2025-7191,0,0,19c40554d9df3cc04931ac06e93e1a6ee08ad5c50b064f50507dda485184ff15,2025-07-08T19:15:44.300000 -CVE-2025-7192,0,0,de4d47a0d0caa10b6c32236d74c1d4049c224edd4b9b94b80df4ea7f27bcee6c,2025-07-08T20:15:30.830000 -CVE-2025-7193,0,0,f202b853246642291a3c8d27f1f56b984eeeb382277fb4f6adffa903a81e9b64,2025-07-08T20:15:31.040000 +CVE-2025-7190,0,1,270f35d5605ad2c3150b65b589591ea210a0186fe5f78d2f798e2aca3262b99e,2025-07-09T14:15:33.733000 +CVE-2025-7191,0,1,750808efb0f1662989412ae25c6bcbb008636319afa7240c4c00418a11a781a4,2025-07-09T14:15:34.387000 +CVE-2025-7192,0,1,70e93f45b32ddbbce5ed883aa663b439e1bb2c05e5bba707692589a41da716fe,2025-07-09T14:15:34.807000 +CVE-2025-7193,0,1,f03fee244c58f30c6867aae0d4795324781dd8173a010a00b5068237bc275f5c,2025-07-09T14:15:34.957000 CVE-2025-7194,0,0,956d41a4e60bb5a9737889fb6a500ad51794228786e32e4107fa56bdc9b0f253,2025-07-08T21:15:29.763000 CVE-2025-7196,0,0,fde145ca1c98c14c42a9e29e593cd8de99d5b874d9c2e3ed2c7b27f4033299ef,2025-07-08T21:15:29.963000 -CVE-2025-7197,0,0,d7ef2bbbca6a098b30626d655580ae51f3bb02749fdfc95787b7456aca1ba445,2025-07-08T22:15:28.363000 +CVE-2025-7197,0,1,2f9bf1ad2d5599f985067eb7d9764f0a55af7831692fa47aca55c03a6f2b7367,2025-07-09T14:15:35.090000 CVE-2025-7198,0,0,63b79c707b5bfce7c46214c79d7862e8376d7eb74cbc05a4724b43eff8a718c0,2025-07-08T22:15:28.563000 CVE-2025-7199,0,0,b0a8250b4d336e166905e4bc2ac946445847a87b58bca02c2f72af4f009a69fd,2025-07-08T23:15:26.547000 -CVE-2025-7200,0,0,3128d4b4efd12d5fee611c128232b2629be04d055967f1d11cd5875056d136cd,2025-07-08T23:15:26.757000 -CVE-2025-7206,0,0,3ca17ff02cbcfbf4464d887bbb10d8cfa775adf269cb6b0b330fc51f6d653020,2025-07-09T00:15:47.403000 -CVE-2025-7207,0,0,6915b9fee1744d2962d1c9521b50eebd0824e683c1233cf9508260238a35c249,2025-07-09T01:15:50.380000 +CVE-2025-7200,0,1,4be8e8f820a6db5c303decdf0c215d0ad2e126beaebc6aadde2e1008e2e7ad43,2025-07-09T14:15:35.293000 +CVE-2025-7204,1,1,3810f2e0f65263c015014395717ac30dcc2cdc8f81095b60a0e8ac56658dbbe8,2025-07-09T15:15:25.283000 +CVE-2025-7206,0,1,c7fae2828ecc87fc9f422b6ddc9b303eab2adf7802281ed9e7318f54373c8fb1,2025-07-09T14:15:35.423000 +CVE-2025-7207,0,1,610094a0c2194d74d891176b5500b20364d3d6d658378fcdd2864d59581e089e,2025-07-09T14:15:35.563000 CVE-2025-7208,0,0,fe45ae0a0d55cd4756a2f02bc446bcdfbdb5609d538ddc0bf13c783d1187bde9,2025-07-09T01:15:50.573000 CVE-2025-7209,0,0,43dd99e89031e3f7af044860d9a47ac87e1766c4bfb07261d7005685e1c94222,2025-07-09T01:15:50.773000 CVE-2025-7210,0,0,aeeac7ae623f4b512d19df80d7f8428998c67d9985df2070621e51847f9a9265,2025-07-09T02:15:22.460000 @@ -301210,7 +301215,7 @@ CVE-2025-7219,0,0,637f35d33192cb5f26f73a10f6fffa40432d1ad04e43df3a6124235b5321fb CVE-2025-7220,0,0,35112cf9c491a042ef82268423381a63063e765f0718854eb05b924a765fe1e9,2025-07-09T07:15:24.263000 CVE-2025-7259,0,0,8fd7864e8f7fb6c249652178c4014f15a5857d3e35a24f0168719b78d426bcb5,2025-07-08T16:18:34.923000 CVE-2025-7326,0,0,7483fa577d73a18bc380df3b53d59526c96cf483de8c4617271f38405405a76d,2025-07-08T16:18:14.207000 -CVE-2025-7327,0,1,fea7e66755f3c8a72d9b59756b834e193683b58fa561ae04239b17c903ff1b30,2025-07-09T13:50:56.863000 +CVE-2025-7327,0,0,fea7e66755f3c8a72d9b59756b834e193683b58fa561ae04239b17c903ff1b30,2025-07-09T13:50:56.863000 CVE-2025-7345,0,0,709d673764fade726ba1b32ba85eb2d6d1b0153f73ca57ae2bf2d3e2cf0ce508,2025-07-09T08:15:25.153000 CVE-2025-7346,0,0,0fee3d68122e9af468e47512e4d9d848586d1a84e0ff7cd695bcb12ab8e33bea,2025-07-08T16:18:14.207000 CVE-2025-7362,0,0,02130a85c1c6d05a11bb14ef506a7d903b4fe58c8e7f8a6897a5073d63357426,2025-07-08T18:15:46.797000