diff --git a/CVE-2019/CVE-2019-168xx/CVE-2019-16869.json b/CVE-2019/CVE-2019-168xx/CVE-2019-16869.json index 8b52c8855fb..9a969f03c5f 100644 --- a/CVE-2019/CVE-2019-168xx/CVE-2019-16869.json +++ b/CVE-2019/CVE-2019-168xx/CVE-2019-16869.json @@ -2,7 +2,7 @@ "id": "CVE-2019-16869", "sourceIdentifier": "cve@mitre.org", "published": "2019-09-26T16:15:11.690", - "lastModified": "2024-11-21T04:31:14.483", + "lastModified": "2025-07-07T17:15:26.303", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -250,263 +250,267 @@ ] }, { - "url": "https://lists.apache.org/thread.html/0acadfb96176768caac79b404110df62d14d30aa9d53b6dbdb1407ac%40%3Cissues.spark.apache.org%3E", + "url": "https://github.com/poc-effectiveness/PoCAdaptation/tree/main/Adapted/CVE-2019-16869/5.0.0.Alpha1/exploit", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/19fed892608db1efe5a5ce14372137669ff639df0205323959af7de3%40%3Cdev.olingo.apache.org%3E", + "url": "https://lists.apache.org/thread.html/0acadfb96176768caac79b404110df62d14d30aa9d53b6dbdb1407ac@%3Cissues.spark.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/2494a2ac7f66af6e4646a4937b17972a4ec7cd3c7333c66ffd6c639d%40%3Cdev.zookeeper.apache.org%3E", + "url": "https://lists.apache.org/thread.html/19fed892608db1efe5a5ce14372137669ff639df0205323959af7de3@%3Cdev.olingo.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/2e1cf538b502713c2c42ffa46d81f4688edb5676eb55bd9fc4b4fed7%40%3Cissues.zookeeper.apache.org%3E", + "url": "https://lists.apache.org/thread.html/2494a2ac7f66af6e4646a4937b17972a4ec7cd3c7333c66ffd6c639d@%3Cdev.zookeeper.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/35961d1ae00849974353a932b4fef12ebce074541552eceefa04f1fd%40%3Cdev.olingo.apache.org%3E", + "url": "https://lists.apache.org/thread.html/2e1cf538b502713c2c42ffa46d81f4688edb5676eb55bd9fc4b4fed7@%3Cissues.zookeeper.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/37ed432b8eb35d8bd757f53783ec3e334bd51f514534432bea7f1c3d%40%3Cissues.zookeeper.apache.org%3E", + "url": "https://lists.apache.org/thread.html/35961d1ae00849974353a932b4fef12ebce074541552eceefa04f1fd@%3Cdev.olingo.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/380f6d2730603a2cd6b0a8bea9bcb21a86c199147e77e448c5f7390b%40%3Ccommits.zookeeper.apache.org%3E", + "url": "https://lists.apache.org/thread.html/37ed432b8eb35d8bd757f53783ec3e334bd51f514534432bea7f1c3d@%3Cissues.zookeeper.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/3e6d7aae1cca10257e3caf2d69b22f74c875f12a1314155af422569d%40%3Cdev.zookeeper.apache.org%3E", + "url": "https://lists.apache.org/thread.html/380f6d2730603a2cd6b0a8bea9bcb21a86c199147e77e448c5f7390b@%3Ccommits.zookeeper.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/51923a9ba513b2e816e02a9d1fd8aa6f12e3e4e99bbd9dc884bccbbe%40%3Cissues.spark.apache.org%3E", + "url": "https://lists.apache.org/thread.html/3e6d7aae1cca10257e3caf2d69b22f74c875f12a1314155af422569d@%3Cdev.zookeeper.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E", + "url": "https://lists.apache.org/thread.html/51923a9ba513b2e816e02a9d1fd8aa6f12e3e4e99bbd9dc884bccbbe@%3Cissues.spark.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/6063699b87b501ecca8dd3b0e82251bfc85f29363a9b46ac5ace80cf%40%3Cdev.olingo.apache.org%3E", + "url": "https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/64b10f49c68333aaecf00348c5670fe182e49fd60d45c4a3ab241f8b%40%3Cissues.spark.apache.org%3E", + "url": "https://lists.apache.org/thread.html/6063699b87b501ecca8dd3b0e82251bfc85f29363a9b46ac5ace80cf@%3Cdev.olingo.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/681493a2f9b63f5b468f741d88d1aa51b2cfcf7a1c5b74ea8c4343fb%40%3Cissues.spark.apache.org%3E", + "url": "https://lists.apache.org/thread.html/64b10f49c68333aaecf00348c5670fe182e49fd60d45c4a3ab241f8b@%3Cissues.spark.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/6e1e34c0d5635a987d595df9e532edac212307243bb1b49eead6d55b%40%3Cissues.zookeeper.apache.org%3E", + "url": "https://lists.apache.org/thread.html/681493a2f9b63f5b468f741d88d1aa51b2cfcf7a1c5b74ea8c4343fb@%3Cissues.spark.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/76540c8b0ed761bfa6c81fa28c13057f13a5448aed079d656f6a3c79%40%3Cissues.zookeeper.apache.org%3E", + "url": "https://lists.apache.org/thread.html/6e1e34c0d5635a987d595df9e532edac212307243bb1b49eead6d55b@%3Cissues.zookeeper.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/799eb85d67cbddc1851a3e63a07b55e95b2f44f1685225d38570ce89%40%3Cissues.spark.apache.org%3E", + "url": "https://lists.apache.org/thread.html/76540c8b0ed761bfa6c81fa28c13057f13a5448aed079d656f6a3c79@%3Cissues.zookeeper.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/860acce024d79837e963a51a42bab2cef8e8d017aad2b455ecd1dcf0%40%3Cissues.spark.apache.org%3E", + "url": "https://lists.apache.org/thread.html/799eb85d67cbddc1851a3e63a07b55e95b2f44f1685225d38570ce89@%3Cissues.spark.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/9128111213b7b734ffc85db08d8f789b00a85a7f241b708e55debbd0%40%3Cissues.zookeeper.apache.org%3E", + "url": "https://lists.apache.org/thread.html/860acce024d79837e963a51a42bab2cef8e8d017aad2b455ecd1dcf0@%3Cissues.spark.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E", + "url": "https://lists.apache.org/thread.html/9128111213b7b734ffc85db08d8f789b00a85a7f241b708e55debbd0@%3Cissues.zookeeper.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/a0f77c73af32cbe4ff0968bfcbbe80ae6361f3dccdd46f3177547266%40%3Cissues.zookeeper.apache.org%3E", + "url": "https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/af6e9c2d716868606523857a4cd7a5ee506e6d1710f5fb0d567ec030%40%3Cdev.olingo.apache.org%3E", + "url": "https://lists.apache.org/thread.html/a0f77c73af32cbe4ff0968bfcbbe80ae6361f3dccdd46f3177547266@%3Cissues.zookeeper.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E", + "url": "https://lists.apache.org/thread.html/af6e9c2d716868606523857a4cd7a5ee506e6d1710f5fb0d567ec030@%3Cdev.olingo.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/b264fa5801e87698e9f43f2b5585fbc5ebdc26c6f4aad861b258fb69%40%3Cdev.olingo.apache.org%3E", + "url": "https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/b2cd51795f938632c6f60a4c59d9e587fbacd7f7d0e0a3684850a30f%40%3Cissues.zookeeper.apache.org%3E", + "url": "https://lists.apache.org/thread.html/b264fa5801e87698e9f43f2b5585fbc5ebdc26c6f4aad861b258fb69@%3Cdev.olingo.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/b3dda6399a0ea2b647624b899fd330fca81834e41b13e3e11e1002d8%40%3Cdev.olingo.apache.org%3E", + "url": "https://lists.apache.org/thread.html/b2cd51795f938632c6f60a4c59d9e587fbacd7f7d0e0a3684850a30f@%3Cissues.zookeeper.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/b3ddeebbfaf8a288d7de8ab2611cf2609ab76b9809f0633248546b7c%40%3Cissues.spark.apache.org%3E", + "url": "https://lists.apache.org/thread.html/b3dda6399a0ea2b647624b899fd330fca81834e41b13e3e11e1002d8@%3Cdev.olingo.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/bdf7a5e597346a75d2d884ca48c767525e35137ad59d8f10b8fc943c%40%3Cdev.zookeeper.apache.org%3E", + "url": "https://lists.apache.org/thread.html/b3ddeebbfaf8a288d7de8ab2611cf2609ab76b9809f0633248546b7c@%3Cissues.spark.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/cbf6e6a04cb37e9320ad20e437df63beeab1755fc0761918ed5c5a6e%40%3Ccommits.zookeeper.apache.org%3E", + "url": "https://lists.apache.org/thread.html/bdf7a5e597346a75d2d884ca48c767525e35137ad59d8f10b8fc943c@%3Cdev.zookeeper.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/cf5aa087632ead838f8ac3a42e9837684e7afe6e0fcb7704e0c73bc0%40%3Ccommits.zookeeper.apache.org%3E", + "url": "https://lists.apache.org/thread.html/cbf6e6a04cb37e9320ad20e437df63beeab1755fc0761918ed5c5a6e@%3Ccommits.zookeeper.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/d14f721e0099b914daebe29bca199fde85d8354253be9d6d3d46507a%40%3Ccommits.cassandra.apache.org%3E", + "url": "https://lists.apache.org/thread.html/cf5aa087632ead838f8ac3a42e9837684e7afe6e0fcb7704e0c73bc0@%3Ccommits.zookeeper.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/d3eb0dbea75ef5c400bd49dfa1901ad50be606cca3cb29e0d01b6a54%40%3Cissues.zookeeper.apache.org%3E", + "url": "https://lists.apache.org/thread.html/d14f721e0099b914daebe29bca199fde85d8354253be9d6d3d46507a@%3Ccommits.cassandra.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/d7d530599dc7813056c712213e367b68cdf56fb5c9b73f864870bc4c%40%3Cdev.olingo.apache.org%3E", + "url": "https://lists.apache.org/thread.html/d3eb0dbea75ef5c400bd49dfa1901ad50be606cca3cb29e0d01b6a54@%3Cissues.zookeeper.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/e192fe8797c192679759ffa6b15e4d0806546945a41d8ebfbc6ee3ac%40%3Ccommits.tinkerpop.apache.org%3E", + "url": "https://lists.apache.org/thread.html/d7d530599dc7813056c712213e367b68cdf56fb5c9b73f864870bc4c@%3Cdev.olingo.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/e39931d7cdd17241e69a0a09a89d99d7435bcc59afee8a9628d67769%40%3Cdev.zookeeper.apache.org%3E", + "url": "https://lists.apache.org/thread.html/e192fe8797c192679759ffa6b15e4d0806546945a41d8ebfbc6ee3ac@%3Ccommits.tinkerpop.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/ee6faea9e542c0b90afd70297a9daa203e20d41aa2ac7fca6703662f%40%3Cissues.spark.apache.org%3E", + "url": "https://lists.apache.org/thread.html/e39931d7cdd17241e69a0a09a89d99d7435bcc59afee8a9628d67769@%3Cdev.zookeeper.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/f6c5ebfb018787c764f000362d59e4b231c0a36b6253aa866de8c64e%40%3Ccommits.cassandra.apache.org%3E", + "url": "https://lists.apache.org/thread.html/ee6faea9e542c0b90afd70297a9daa203e20d41aa2ac7fca6703662f@%3Cissues.spark.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E", + "url": "https://lists.apache.org/thread.html/f6c5ebfb018787c764f000362d59e4b231c0a36b6253aa866de8c64e@%3Ccommits.cassandra.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/r0aa8b28e76ec01c697b15e161e6797e88fc8d406ed762e253401106e%40%3Ccommits.camel.apache.org%3E", + "url": "https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/r0c3d49bfdbc62fd3915676433cc5899c5506d06da1c552ef1b7923a5%40%3Ccommon-issues.hadoop.apache.org%3E", + "url": "https://lists.apache.org/thread.html/r0aa8b28e76ec01c697b15e161e6797e88fc8d406ed762e253401106e@%3Ccommits.camel.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/r131e572d003914843552fa45c4398b9903fb74144986e8b107c0a3a7%40%3Ccommits.cassandra.apache.org%3E", + "url": "https://lists.apache.org/thread.html/r0c3d49bfdbc62fd3915676433cc5899c5506d06da1c552ef1b7923a5@%3Ccommon-issues.hadoop.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/r3225f7dfe6b8a37e800ecb8e31abd7ac6c4312dbd3223dd8139c37bb%40%3Ccommits.cassandra.apache.org%3E", + "url": "https://lists.apache.org/thread.html/r131e572d003914843552fa45c4398b9903fb74144986e8b107c0a3a7@%3Ccommits.cassandra.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/r4d3f1d3e333d9c2b2f6e6ae8ed8750d4de03410ac294bcd12c7eefa3%40%3Ccommits.cassandra.apache.org%3E", + "url": "https://lists.apache.org/thread.html/r3225f7dfe6b8a37e800ecb8e31abd7ac6c4312dbd3223dd8139c37bb@%3Ccommits.cassandra.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/r73c400ab66d79821dec9e3472f0e2c048d528672bdb0f8bf44d7cb1f%40%3Ccommits.cassandra.apache.org%3E", + "url": "https://lists.apache.org/thread.html/r4d3f1d3e333d9c2b2f6e6ae8ed8750d4de03410ac294bcd12c7eefa3@%3Ccommits.cassandra.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/r7790b9d99696d9eddce8a8c96f13bb68460984294ea6fea3800143e4%40%3Ccommits.pulsar.apache.org%3E", + "url": "https://lists.apache.org/thread.html/r73c400ab66d79821dec9e3472f0e2c048d528672bdb0f8bf44d7cb1f@%3Ccommits.cassandra.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/r831e0548fad736a98140d0b3b7dc575af0c50faea0b266434ba813cc%40%3Cdev.rocketmq.apache.org%3E", + "url": "https://lists.apache.org/thread.html/r7790b9d99696d9eddce8a8c96f13bb68460984294ea6fea3800143e4@%3Ccommits.pulsar.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/r832724df393a7ef25ca4c7c2eb83ad2d6c21c74569acda5233f9f1ec%40%3Ccommits.pulsar.apache.org%3E", + "url": "https://lists.apache.org/thread.html/r831e0548fad736a98140d0b3b7dc575af0c50faea0b266434ba813cc@%3Cdev.rocketmq.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/r8402d67fdfe9cf169f859d52a7670b28a08eff31e54b522cc1432532%40%3Ccommon-issues.hadoop.apache.org%3E", + "url": "https://lists.apache.org/thread.html/r832724df393a7ef25ca4c7c2eb83ad2d6c21c74569acda5233f9f1ec@%3Ccommits.pulsar.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/r86befa74c5cd1482c711134104aec339bf7ae879f2c4437d7ec477d4%40%3Ccommon-commits.hadoop.apache.org%3E", + "url": "https://lists.apache.org/thread.html/r8402d67fdfe9cf169f859d52a7670b28a08eff31e54b522cc1432532@%3Ccommon-issues.hadoop.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/r90030b0117490caed526e57271bf4d7f9b012091ac5083c895d16543%40%3Ccommon-issues.hadoop.apache.org%3E", + "url": "https://lists.apache.org/thread.html/r86befa74c5cd1482c711134104aec339bf7ae879f2c4437d7ec477d4@%3Ccommon-commits.hadoop.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/r959474dcf7f88565ed89f6252ca5a274419006cb71348f14764b183d%40%3Ccommits.cassandra.apache.org%3E", + "url": "https://lists.apache.org/thread.html/r90030b0117490caed526e57271bf4d7f9b012091ac5083c895d16543@%3Ccommon-issues.hadoop.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/raaac04b7567c554786132144bea3dcb72568edd410c1e6f0101742e7%40%3Cissues.flink.apache.org%3E", + "url": "https://lists.apache.org/thread.html/r959474dcf7f88565ed89f6252ca5a274419006cb71348f14764b183d@%3Ccommits.cassandra.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/rb25b42f666d2cac5e6e6b3f771faf60d1f1aa58073dcdd8db14edf8a%40%3Cdev.rocketmq.apache.org%3E", + "url": "https://lists.apache.org/thread.html/raaac04b7567c554786132144bea3dcb72568edd410c1e6f0101742e7@%3Cissues.flink.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/rb3361f6c6a5f834ad3db5e998c352760d393c0891b8d3bea90baa836%40%3Ccommon-issues.hadoop.apache.org%3E", + "url": "https://lists.apache.org/thread.html/rb25b42f666d2cac5e6e6b3f771faf60d1f1aa58073dcdd8db14edf8a@%3Cdev.rocketmq.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/rc7eb5634b71d284483e58665b22bf274a69bd184d9bd7ede52015d91%40%3Ccommon-issues.hadoop.apache.org%3E", + "url": "https://lists.apache.org/thread.html/rb3361f6c6a5f834ad3db5e998c352760d393c0891b8d3bea90baa836@%3Ccommon-issues.hadoop.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/rc8d554aad889d12b140d9fd7d2d6fc2e8716e9792f6f4e4b2cdc2d05%40%3Ccommits.cassandra.apache.org%3E", + "url": "https://lists.apache.org/thread.html/rc7eb5634b71d284483e58665b22bf274a69bd184d9bd7ede52015d91@%3Ccommon-issues.hadoop.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/rcb2c59428f34d4757702f9ae739a8795bda7bea97b857e708a9c62c6%40%3Ccommon-commits.hadoop.apache.org%3E", + "url": "https://lists.apache.org/thread.html/rc8d554aad889d12b140d9fd7d2d6fc2e8716e9792f6f4e4b2cdc2d05@%3Ccommits.cassandra.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/rcddf723a4b4117f8ed6042e9ac25e8c5110a617bab77694b61b14833%40%3Cdev.rocketmq.apache.org%3E", + "url": "https://lists.apache.org/thread.html/rcb2c59428f34d4757702f9ae739a8795bda7bea97b857e708a9c62c6@%3Ccommon-commits.hadoop.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26%40%3Ccommits.pulsar.apache.org%3E", + "url": "https://lists.apache.org/thread.html/rcddf723a4b4117f8ed6042e9ac25e8c5110a617bab77694b61b14833@%3Cdev.rocketmq.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/rdb69125652311d0c41f6066ff44072a3642cf33a4b5e3c4f9c1ec9c2%40%3Ccommits.pulsar.apache.org%3E", + "url": "https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/rdd5d243a5f8ed8b83c0104e321aa420e5e98792a95749e3c9a54c0b9%40%3Ccommon-commits.hadoop.apache.org%3E", + "url": "https://lists.apache.org/thread.html/rdb69125652311d0c41f6066ff44072a3642cf33a4b5e3c4f9c1ec9c2@%3Ccommits.pulsar.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/re0b78a3d0a4ba2cf9f4e14e1d05040bde9051d5c78071177186336c9%40%3Ccommon-issues.hadoop.apache.org%3E", + "url": "https://lists.apache.org/thread.html/rdd5d243a5f8ed8b83c0104e321aa420e5e98792a95749e3c9a54c0b9@%3Ccommon-commits.hadoop.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/re45ee9256d3233c31d78e59ee59c7dc841c7fbd83d0769285b41e948%40%3Ccommits.druid.apache.org%3E", + "url": "https://lists.apache.org/thread.html/re0b78a3d0a4ba2cf9f4e14e1d05040bde9051d5c78071177186336c9@%3Ccommon-issues.hadoop.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/re78eaef7d01ad65c370df30e45c686fffff00b37f7bfd78b26a08762%40%3Ccommon-issues.hadoop.apache.org%3E", + "url": "https://lists.apache.org/thread.html/re45ee9256d3233c31d78e59ee59c7dc841c7fbd83d0769285b41e948@%3Ccommits.druid.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/rf2bf8e2eb0a03227f5bc100b544113f8cafea01e887bb068e8d1fa41%40%3Ccommon-issues.hadoop.apache.org%3E", + "url": "https://lists.apache.org/thread.html/re78eaef7d01ad65c370df30e45c686fffff00b37f7bfd78b26a08762@%3Ccommon-issues.hadoop.apache.org%3E", "source": "cve@mitre.org" }, { - "url": "https://lists.apache.org/thread.html/rf5b2dfb7401666a19915f8eaef3ba9f5c3386e2066fcd2ae66e16a2f%40%3Cdev.flink.apache.org%3E", + "url": "https://lists.apache.org/thread.html/rf2bf8e2eb0a03227f5bc100b544113f8cafea01e887bb068e8d1fa41@%3Ccommon-issues.hadoop.apache.org%3E", + "source": "cve@mitre.org" + }, + { + "url": "https://lists.apache.org/thread.html/rf5b2dfb7401666a19915f8eaef3ba9f5c3386e2066fcd2ae66e16a2f@%3Cdev.flink.apache.org%3E", "source": "cve@mitre.org" }, { diff --git a/CVE-2020/CVE-2020-280xx/CVE-2020-28095.json b/CVE-2020/CVE-2020-280xx/CVE-2020-28095.json index bcde605a69f..9ff73016a25 100644 --- a/CVE-2020/CVE-2020-280xx/CVE-2020-28095.json +++ b/CVE-2020/CVE-2020-280xx/CVE-2020-28095.json @@ -2,8 +2,8 @@ "id": "CVE-2020-28095", "sourceIdentifier": "cve@mitre.org", "published": "2020-12-30T21:15:12.797", - "lastModified": "2024-11-21T05:22:21.310", - "vulnStatus": "Modified", + "lastModified": "2025-07-07T17:21:03.403", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -86,8 +86,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:tenda:ac1200_firmware:15.03.06.51_multi:*:*:*:*:*:*:*", - "matchCriteriaId": "9E65345E-8EED-482B-B870-D1B4109DB98F" + "criteria": "cpe:2.3:o:tenda:ac6_firmware:15.03.06.51:*:*:*:*:*:*:*", + "matchCriteriaId": "254F3947-1DC2-4F81-AECB-8BB28CAEA5F1" } ] }, @@ -97,8 +97,8 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:tenda:ac1200:ac6:*:*:*:*:*:*:*", - "matchCriteriaId": "B9834139-68C4-4F1E-A3E9-3A18D5899D3E" + "criteria": "cpe:2.3:h:tenda:ac6:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E382AD7E-1450-40FC-AE9D-698B491805F0" } ] } diff --git a/CVE-2021/CVE-2021-31xx/CVE-2021-3186.json b/CVE-2021/CVE-2021-31xx/CVE-2021-3186.json index da98482ef01..3d18d197c9e 100644 --- a/CVE-2021/CVE-2021-31xx/CVE-2021-3186.json +++ b/CVE-2021/CVE-2021-31xx/CVE-2021-3186.json @@ -2,8 +2,8 @@ "id": "CVE-2021-3186", "sourceIdentifier": "cve@mitre.org", "published": "2021-01-26T18:16:28.147", - "lastModified": "2024-11-21T06:21:05.777", - "vulnStatus": "Modified", + "lastModified": "2025-07-07T17:21:17.707", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -22,19 +22,19 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", - "baseScore": 6.1, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE" }, - "exploitabilityScore": 2.8, + "exploitabilityScore": 2.3, "impactScore": 2.7 } ], @@ -86,8 +86,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:tenda:ac1200_firmware:15.03.06.47_multi:*:*:*:*:*:*:*", - "matchCriteriaId": "ED8D69BB-E549-4993-8935-66A4AE0B3880" + "criteria": "cpe:2.3:o:tenda:ac5_firmware:15.03.06.47:*:*:*:*:*:*:*", + "matchCriteriaId": "2D94CA12-3FED-4730-B1B4-4F6AAA3AB17E" } ] }, @@ -97,8 +97,8 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:tenda:ac1200:ac5:*:*:*:*:*:*:*", - "matchCriteriaId": "7E9BE77D-A37D-4E54-8500-40E904CF04C6" + "criteria": "cpe:2.3:h:tenda:ac5:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0A74C4FD-76A0-4E7C-94E0-EC293F379DD2" } ] } diff --git a/CVE-2021/CVE-2021-44xx/CVE-2021-4457.json b/CVE-2021/CVE-2021-44xx/CVE-2021-4457.json index ad83c52f32f..75dd48c8112 100644 --- a/CVE-2021/CVE-2021-44xx/CVE-2021-4457.json +++ b/CVE-2021/CVE-2021-44xx/CVE-2021-4457.json @@ -2,8 +2,8 @@ "id": "CVE-2021-4457", "sourceIdentifier": "contact@wpscan.com", "published": "2025-06-25T15:15:21.100", - "lastModified": "2025-07-01T19:15:24.787", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T17:40:37.030", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:digitalzoomstudio:zoomsounds:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "6.05", + "matchCriteriaId": "5F201978-8D9D-4BA2-974C-8C0733F9087E" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/07259a61-8ba9-4dd0-8d52-cc1df389c0ad", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-512xx/CVE-2023-51232.json b/CVE-2023/CVE-2023-512xx/CVE-2023-51232.json index c7eff77dbfe..00f72668668 100644 --- a/CVE-2023/CVE-2023-512xx/CVE-2023-51232.json +++ b/CVE-2023/CVE-2023-512xx/CVE-2023-51232.json @@ -2,13 +2,13 @@ "id": "CVE-2023-51232", "sourceIdentifier": "cve@mitre.org", "published": "2025-07-07T14:15:23.140", - "lastModified": "2025-07-07T14:15:23.140", + "lastModified": "2025-07-07T16:15:21.693", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Directory Traversal vulnerability in dagster-webserver Dagster thru 1.0.3 allows remote attackers to obtain sensitive information via crafted request to the /logs endpoint. This may be restricted to certain file names that start with a dot ('.')." + "value": "Directory Traversal vulnerability in dagster-webserver Dagster thru 1.5.11 allows remote attackers to obtain sensitive information via crafted request to the /logs endpoint. This may be restricted to certain file names that start with a dot ('.')." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-110xx/CVE-2024-11089.json b/CVE-2024/CVE-2024-110xx/CVE-2024-11089.json index 83df0123810..84642bbad78 100644 --- a/CVE-2024/CVE-2024-110xx/CVE-2024-11089.json +++ b/CVE-2024/CVE-2024-110xx/CVE-2024-11089.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11089", "sourceIdentifier": "security@wordfence.com", "published": "2024-11-21T14:15:08.530", - "lastModified": "2024-11-21T15:15:21.500", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T16:03:33.517", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,14 +61,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tarassych:anonymous_restricted_content:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.6.6", + "matchCriteriaId": "30C21593-D38F-40CF-8333-FDBE9758AB56" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3191193/anonymous-restricted-content", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/95a01f44-2356-4ea4-b48e-80e3c6114efa?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1646.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1646.json index 73e4c753098..c24b8c7e9ed 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1646.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1646.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1646", "sourceIdentifier": "security@huntr.dev", "published": "2024-04-16T00:15:09.967", - "lastModified": "2024-11-21T08:50:59.783", + "lastModified": "2025-07-07T16:01:35.617", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -51,22 +51,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:parisneo:lollms-webui:*:*:*:*:*:*:*:*", + "versionEndExcluding": "9.3", + "matchCriteriaId": "2FCF4058-5BC4-451A-ACC7-FA8D4C261CAE" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/parisneo/lollms-webui/commit/02e829b5653a1aa5dbbe9413ec84f96caa1274e8", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/2f769c46-aa85-4ab8-8b08-fe791313b7ba", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/parisneo/lollms-webui/commit/02e829b5653a1aa5dbbe9413ec84f96caa1274e8", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/2f769c46-aa85-4ab8-8b08-fe791313b7ba", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25176.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25176.json new file mode 100644 index 00000000000..6759b85851e --- /dev/null +++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25176.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-25176", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-07-07T17:15:27.247", + "lastModified": "2025-07-07T17:15:27.247", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "LuaJIT through 2.1 has a stack-buffer-overflow in lj_strfmt_wfnum in lj_strfmt_num.c." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/pwnhacker0x18/cd75d01fc7c9b6c85c183fbe5353d276", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/LuaJIT/LuaJIT/commit/343ce0edaf3906a62022936175b2f5410024cbfc", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/LuaJIT/LuaJIT/issues/1149", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25177.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25177.json new file mode 100644 index 00000000000..ef1c895ece6 --- /dev/null +++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25177.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-25177", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-07-07T17:15:27.403", + "lastModified": "2025-07-07T17:15:27.403", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "LuaJIT through 2.1 has an unsinking of IR_FSTORE for NULL metatable, which leads to Denial of Service (DoS)." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/pwnhacker0x18/a73f560d79f2c3d4011d6c5a2676f04a", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/LuaJIT/LuaJIT/commit/85b4fed0b0353dd78c8c875c2f562d522a2b310f", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/LuaJIT/LuaJIT/issues/1147", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25178.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25178.json new file mode 100644 index 00000000000..8ef678ee62c --- /dev/null +++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25178.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-25178", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-07-07T17:15:27.527", + "lastModified": "2025-07-07T17:15:27.527", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "LuaJIT through 2.1 has an out-of-bounds read in the stack-overflow handler in lj_state.c" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/pwnhacker0x18/423b4292f301ab274b42d5ed6e0b87d8", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/LuaJIT/LuaJIT/commit/defe61a56751a0db5f00ff3ab7b8f45436ba74c8", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/LuaJIT/LuaJIT/issues/1152", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29028.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29028.json index 03d2e296584..23dc97be420 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29028.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29028.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29028", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-19T15:15:50.243", - "lastModified": "2024-11-21T09:07:24.313", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T16:03:50.147", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -51,22 +71,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:usememos:memos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "0.13.2", + "versionEndExcluding": "0.16.1", + "matchCriteriaId": "5859F707-F9A3-477B-8620-72D0932868F2" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/usememos/memos/commit/6ffc09d86a1302c384ef085aa70c7bddb3ce7ba9", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://securitylab.github.com/advisories/GHSL-2023-154_GHSL-2023-156_memos", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/usememos/memos/commit/6ffc09d86a1302c384ef085aa70c7bddb3ce7ba9", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://securitylab.github.com/advisories/GHSL-2023-154_GHSL-2023-156_memos", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29030.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29030.json index d84319d1033..e07255ce8a5 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29030.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29030.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29030", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-19T15:15:50.430", - "lastModified": "2024-11-21T09:07:24.583", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T16:05:52.817", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -51,30 +71,69 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:usememos:memos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "0.13.2", + "versionEndExcluding": "0.22.0", + "matchCriteriaId": "1BF6028C-D563-4A72-80B2-910AEA67A040" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/usememos/memos/blob/06dbd8731161245444f4b50f4f9ed267f7c3cf63/api/v1/resource.go#L83", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/usememos/memos/commit/bbd206e8930281eb040cc8c549641455892b9eb5", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://securitylab.github.com/advisories/GHSL-2023-154_GHSL-2023-156_memos/", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/usememos/memos/blob/06dbd8731161245444f4b50f4f9ed267f7c3cf63/api/v1/resource.go#L83", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://github.com/usememos/memos/commit/bbd206e8930281eb040cc8c549641455892b9eb5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://securitylab.github.com/advisories/GHSL-2023-154_GHSL-2023-156_memos/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-333xx/CVE-2024-33365.json b/CVE-2024/CVE-2024-333xx/CVE-2024-33365.json index 953f506ef39..c1f65c1303a 100644 --- a/CVE-2024/CVE-2024-333xx/CVE-2024-33365.json +++ b/CVE-2024/CVE-2024-333xx/CVE-2024-33365.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33365", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-29T17:15:10.947", - "lastModified": "2024-11-21T09:16:50.347", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T16:09:32.320", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,67 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac10_firmware:16.03.10.20:*:*:*:*:*:*:*", + "matchCriteriaId": "A19C486B-52A3-4C3E-851D-F349E8E0A706" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac10:4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "970AEBF4-2B32-4633-A75B-2D2C598C048D" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/johnathanhuutri/CVE_report/blob/master/CVE-2024-33365/README.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://hackmd.io/%40JohnathanHuuTri/rJNbEItJC", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/johnathanhuutri/CVE_report/blob/master/CVE-2024-33365/README.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://hackmd.io/%40JohnathanHuuTri/rJNbEItJC", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35285.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35285.json index 13cc514e333..b4a0bda41ef 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35285.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35285.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35285", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-21T21:15:05.307", - "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T17:55:18.673", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mitel:micollab:*:*:*:*:*:*:*:*", + "versionEndIncluding": "9.8.0.33", + "matchCriteriaId": "E7001BBF-C3BB-4219-BE0D-1444BE43DF9E" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-24-0013", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35286.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35286.json index 0929cab26a2..60b3d4b9c5c 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35286.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35286.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35286", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-21T21:15:05.367", - "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T17:55:27.693", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mitel:micollab:*:*:*:*:*:*:*:*", + "versionEndIncluding": "9.8.0.33", + "matchCriteriaId": "E7001BBF-C3BB-4219-BE0D-1444BE43DF9E" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-24-0014", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35287.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35287.json index 664be593548..465b3856201 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35287.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35287.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35287", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-21T21:15:05.450", - "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T17:55:48.843", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mitel:micollab:*:*:*:*:*:*:*:*", + "versionEndIncluding": "9.8.1.5", + "matchCriteriaId": "A86FB9E2-A0A9-45A4-86CD-073206E7E41C" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-24-0023", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35314.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35314.json index 69078ec3a5e..39b801651c3 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35314.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35314.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35314", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-21T21:15:05.533", - "lastModified": "2025-03-25T15:15:22.007", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T17:54:52.597", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,43 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mitel:micollab:*:*:*:*:*:*:*:*", + "versionEndIncluding": "9.7.1.110", + "matchCriteriaId": "00AF6EAC-B97B-468A-AE23-625321787BCA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mitel:mivoice_business_solution_virtual_instance:1.0.0.25:*:*:*:*:*:*:*", + "matchCriteriaId": "831F3CAF-72D0-497C-A5E1-AC09F660DB43" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.mitel.com/-/media/mitel/file/pdf/support/security-advisories/security-bulletin_24-0015-001-v3.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-24-0015", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35315.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35315.json index 896cc807975..5418a5a1768 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35315.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35315.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35315", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-21T21:15:05.613", - "lastModified": "2024-10-23T21:35:04.820", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T17:54:43.887", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,36 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mitel:micollab:*:*:*:*:*:*:*:*", + "versionEndIncluding": "9.7.1.110", + "matchCriteriaId": "00AF6EAC-B97B-468A-AE23-625321787BCA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mitel:mivoice_business_solution_virtual_instance:1.0.0.25:*:*:*:*:*:*:*", + "matchCriteriaId": "831F3CAF-72D0-497C-A5E1-AC09F660DB43" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-24-0016", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-400xx/CVE-2024-40084.json b/CVE-2024/CVE-2024-400xx/CVE-2024-40084.json index 71a414ec777..e082bdba467 100644 --- a/CVE-2024/CVE-2024-400xx/CVE-2024-40084.json +++ b/CVE-2024/CVE-2024-400xx/CVE-2024-40084.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40084", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-21T21:15:05.770", - "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T17:37:27.353", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,50 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:viloliving:vilo_5_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "5.16.1.33", + "matchCriteriaId": "EE511F6D-2988-4CC4-871A-35BFD35B593C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:viloliving:vilo_5:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C570CD02-826A-4682-8BB3-251011DD5C85" + } + ] + } + ] + } + ], "references": [ { "url": "http://vilo.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Not Applicable" + ] }, { "url": "https://github.com/byu-cybersecurity-research/vilo/blob/main/vulns/CVE-2024-40084.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-400xx/CVE-2024-40087.json b/CVE-2024/CVE-2024-400xx/CVE-2024-40087.json index 337262b7ecb..cab8fd8b999 100644 --- a/CVE-2024/CVE-2024-400xx/CVE-2024-40087.json +++ b/CVE-2024/CVE-2024-400xx/CVE-2024-40087.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40087", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-21T21:15:06.003", - "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T17:37:37.820", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,50 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:viloliving:vilo_5_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "5.16.1.33", + "matchCriteriaId": "EE511F6D-2988-4CC4-871A-35BFD35B593C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:viloliving:vilo_5:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C570CD02-826A-4682-8BB3-251011DD5C85" + } + ] + } + ] + } + ], "references": [ { "url": "http://vilo.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Not Applicable" + ] }, { "url": "https://github.com/byu-cybersecurity-research/vilo/blob/main/vulns/CVE-2024-40087.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-400xx/CVE-2024-40088.json b/CVE-2024/CVE-2024-400xx/CVE-2024-40088.json index e531009a54e..45e5ba97440 100644 --- a/CVE-2024/CVE-2024-400xx/CVE-2024-40088.json +++ b/CVE-2024/CVE-2024-400xx/CVE-2024-40088.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40088", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-21T21:15:06.080", - "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T17:37:43.360", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -55,14 +55,50 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:viloliving:vilo_5_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "5.16.1.33", + "matchCriteriaId": "EE511F6D-2988-4CC4-871A-35BFD35B593C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:viloliving:vilo_5:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C570CD02-826A-4682-8BB3-251011DD5C85" + } + ] + } + ] + } + ], "references": [ { "url": "http://vilo.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Not Applicable" + ] }, { "url": "https://github.com/byu-cybersecurity-research/vilo/blob/main/vulns/CVE-2024-40088.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-400xx/CVE-2024-40089.json b/CVE-2024/CVE-2024-400xx/CVE-2024-40089.json index 912d8b4a0b2..e8c0350c9c4 100644 --- a/CVE-2024/CVE-2024-400xx/CVE-2024-40089.json +++ b/CVE-2024/CVE-2024-400xx/CVE-2024-40089.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40089", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-21T21:15:06.150", - "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T17:37:50.703", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,50 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:viloliving:vilo_5_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "5.16.1.33", + "matchCriteriaId": "EE511F6D-2988-4CC4-871A-35BFD35B593C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:viloliving:vilo_5:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C570CD02-826A-4682-8BB3-251011DD5C85" + } + ] + } + ] + } + ], "references": [ { "url": "http://vilo.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Not Applicable" + ] }, { "url": "https://github.com/byu-cybersecurity-research/vilo/blob/main/vulns/CVE-2024-40089.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-400xx/CVE-2024-40090.json b/CVE-2024/CVE-2024-400xx/CVE-2024-40090.json index 7ad406f9492..43d32448463 100644 --- a/CVE-2024/CVE-2024-400xx/CVE-2024-40090.json +++ b/CVE-2024/CVE-2024-400xx/CVE-2024-40090.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40090", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-21T21:15:06.223", - "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T17:37:58.717", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,50 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:viloliving:vilo_5_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "5.16.1.33", + "matchCriteriaId": "EE511F6D-2988-4CC4-871A-35BFD35B593C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:viloliving:vilo_5:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C570CD02-826A-4682-8BB3-251011DD5C85" + } + ] + } + ] + } + ], "references": [ { "url": "http://vilo.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Not Applicable" + ] }, { "url": "https://github.com/byu-cybersecurity-research/vilo/blob/main/vulns/CVE-2024-40090.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40412.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40412.json index f0c71edf081..f907c5b718a 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40412.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40412.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40412", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-10T16:15:04.290", - "lastModified": "2024-11-21T09:31:03.587", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T16:20:02.940", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,63 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ax12_firmware:22.03.01.46:*:*:*:*:*:*:*", + "matchCriteriaId": "ACC5CA19-0A08-462F-A948-9D2338076B61" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ax12:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "19AB5CD4-69C7-4619-8A1B-34B70D738D34" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Feng-ZZ-pwn/IOT/blob/main/Tenda%20AX12/1/README.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://static.tenda.com.cn/tdcweb/download/uploadfile/AX12/V22.03.01.46.zip", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/Feng-ZZ-pwn/IOT/blob/main/Tenda%20AX12/1/README.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://static.tenda.com.cn/tdcweb/download/uploadfile/AX12/V22.03.01.46.zip", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40503.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40503.json index 40ae9d947ac..1e985fea25d 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40503.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40503.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40503", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-16T19:15:13.043", - "lastModified": "2024-11-21T09:31:12.497", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T16:32:08.337", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ax12_firmware:16.03.49.18_cn:*:*:*:*:*:*:*", + "matchCriteriaId": "B8FDC39E-1E9B-44A9-9ED1-7293A9D0DC7E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ax12:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AE639FC1-068D-4570-AD2A-1837C339B97A" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Mivik/8927ad100a638756e1fe214dd5fca5f9", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://gist.github.com/Mivik/8927ad100a638756e1fe214dd5fca5f9", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40515.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40515.json index adf7b707588..876972a2918 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40515.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40515.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40515", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-16T20:15:03.863", - "lastModified": "2024-11-21T09:31:14.117", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T16:11:28.260", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,49 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ax2_pro_firmware:16.03.29.48_cn:*:*:*:*:*:*:*", + "matchCriteriaId": "6201D2AA-8680-44B9-A373-118D34BE9BEB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ax2_pro:-:*:*:*:*:*:*:*", + "matchCriteriaId": "84565C91-1D83-4339-9185-5339DF177AD9" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/as-lky/410d6ae5c8ead88c2e0f5c641b2382ec", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://gist.github.com/as-lky/410d6ae5c8ead88c2e0f5c641b2382ec", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-464xx/CVE-2024-46450.json b/CVE-2024/CVE-2024-464xx/CVE-2024-46450.json index 0f29b72e6ad..c90d32b5de5 100644 --- a/CVE-2024/CVE-2024-464xx/CVE-2024-46450.json +++ b/CVE-2024/CVE-2024-464xx/CVE-2024-46450.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46450", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T22:15:39.840", - "lastModified": "2025-02-03T21:15:13.043", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T16:40:50.920", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,42 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac6_firmware:15.03.06.50:*:*:*:*:*:*:*", + "matchCriteriaId": "ED890D2E-3860-4E6E-A1D4-FC0031430884" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac6:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E382AD7E-1450-40FC-AE9D-698B491805F0" + } + ] + } + ] + } + ], "references": [ { "url": "https://pastebin.com/BXxTqsZk", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47189.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47189.json index 1db55fc79cb..a0a8d2f2aa2 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47189.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47189.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47189", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-21T20:15:14.697", - "lastModified": "2024-11-04T22:35:09.220", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T17:52:12.773", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mitel:micollab:*:*:*:*:*:*:*:*", + "versionEndIncluding": "9.8.1.201", + "matchCriteriaId": "C63877D5-7A76-4953-A3E1-A72CD7FD7AD6" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-misa-2024-0026", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-472xx/CVE-2024-47223.json b/CVE-2024/CVE-2024-472xx/CVE-2024-47223.json index 5ed812e6306..b3c440754ba 100644 --- a/CVE-2024/CVE-2024-472xx/CVE-2024-47223.json +++ b/CVE-2024/CVE-2024-472xx/CVE-2024-47223.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47223", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-21T20:15:14.770", - "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T17:52:15.770", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mitel:micollab:*:*:*:*:*:*:*:*", + "versionEndIncluding": "9.8.1.201", + "matchCriteriaId": "C63877D5-7A76-4953-A3E1-A72CD7FD7AD6" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-misa-2024-0028", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-479xx/CVE-2024-47912.json b/CVE-2024/CVE-2024-479xx/CVE-2024-47912.json index 8da7819098e..ea8074bed3c 100644 --- a/CVE-2024/CVE-2024-479xx/CVE-2024-47912.json +++ b/CVE-2024/CVE-2024-479xx/CVE-2024-47912.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47912", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-21T20:15:14.877", - "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T17:52:18.600", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mitel:micollab:*:*:*:*:*:*:*:*", + "versionEndIncluding": "9.8.1.201", + "matchCriteriaId": "C63877D5-7A76-4953-A3E1-A72CD7FD7AD6" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-misa-2024-0027", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-481xx/CVE-2024-48192.json b/CVE-2024/CVE-2024-481xx/CVE-2024-48192.json index d3244a2c51e..2aac96104c7 100644 --- a/CVE-2024/CVE-2024-481xx/CVE-2024-48192.json +++ b/CVE-2024/CVE-2024-481xx/CVE-2024-48192.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48192", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-17T17:15:12.380", - "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T16:20:38.143", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,43 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:g3_firmware:15.01.0.5\\(2848_755\\)_en:*:*:*:*:*:*:*", + "matchCriteriaId": "A9C78F40-AF20-48AE-84A4-49A08FD66451" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:g3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7A1B3B7C-2164-40B6-959A-188796737C16" + } + ] + } + ] + } + ], "references": [ { "url": "https://colorful-meadow-5b9.notion.site/G3_HardCode_vuln-6b5ae19473b745d7abe5e01b4529caf8?pvs=4", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48232.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48232.json index 96ddae8a199..6dfaff94017 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48232.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48232.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48232", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T21:15:04.170", - "lastModified": "2024-10-30T19:35:26.257", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T17:33:49.187", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mipjz_project:mipjz:5.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "E4AEA22F-BAAD-4FC2-B025-B0E93FD5F818" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/sansanyun/mipjz/issues/17", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48233.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48233.json index 12b777f7638..13b0cdbcb99 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48233.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48233.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48233", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T21:15:04.243", - "lastModified": "2024-10-30T19:35:27.360", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T17:33:29.767", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mipjz_project:mipjz:5.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "E4AEA22F-BAAD-4FC2-B025-B0E93FD5F818" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/sansanyun/mipjz/issues/16", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48270.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48270.json index abeced89c94..7a6f66f208c 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48270.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48270.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48270", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-01T14:15:06.953", - "lastModified": "2024-11-04T19:35:11.057", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T17:32:41.660", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:misstt123:oasys:1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "39BFE25A-F3E7-4A44-963A-532C30CF0C97" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/majic-banana/vulnerability/blob/main/POC/Verification%20Code%20Reuse--misstt123oasys.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/misstt123/oasys", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-485xx/CVE-2024-48597.json b/CVE-2024/CVE-2024-485xx/CVE-2024-48597.json index a5a7b4544a5..b4cb19c0d4a 100644 --- a/CVE-2024/CVE-2024-485xx/CVE-2024-48597.json +++ b/CVE-2024/CVE-2024-485xx/CVE-2024-48597.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48597", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-21T20:15:15.010", - "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T17:06:38.947", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:angeljudesuarez:online_clinic_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0F83E07A-EC1A-47DB-ACEE-279F60BD4F0A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/h1-wh0areu/bug_report/blob/main/online-clinic-management-system/SQLi-1.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4839.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4839.json index 6346f007947..603a8efffcc 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4839.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4839.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4839", "sourceIdentifier": "security@huntr.dev", "published": "2024-06-24T13:15:11.900", - "lastModified": "2024-11-21T09:43:42.800", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T17:31:29.717", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -51,14 +73,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lollms:lollms-webui:9.6:*:*:*:*:*:*:*", + "matchCriteriaId": "8161B4F7-AE3F-4A7D-9B47-131C1AA3EC6F" + } + ] + } + ] + } + ], "references": [ { "url": "https://huntr.com/bounties/dcfc5a07-0427-42b5-a623-8d943873d7ff", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://huntr.com/bounties/dcfc5a07-0427-42b5-a623-8d943873d7ff", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4841.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4841.json index 72601776e8f..2c18d05143d 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4841.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4841.json @@ -2,7 +2,7 @@ "id": "CVE-2024-4841", "sourceIdentifier": "security@huntr.dev", "published": "2024-06-23T15:15:09.233", - "lastModified": "2024-11-21T09:43:43.037", + "lastModified": "2025-07-07T17:23:31.907", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -51,14 +73,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:parisneo:lollms-webui:9.6:*:*:*:*:*:*:*", + "matchCriteriaId": "8A3CF797-E28D-4E5D-B025-383EED5EF2EB" + } + ] + } + ] + } + ], "references": [ { "url": "https://huntr.com/bounties/740dda3e-7104-4ccf-9ac4-8870e4d6d602", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://huntr.com/bounties/740dda3e-7104-4ccf-9ac4-8870e4d6d602", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-509xx/CVE-2024-50983.json b/CVE-2024/CVE-2024-509xx/CVE-2024-50983.json index 6ae832e49db..13e3e42027e 100644 --- a/CVE-2024/CVE-2024-509xx/CVE-2024-50983.json +++ b/CVE-2024/CVE-2024-509xx/CVE-2024-50983.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50983", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-15T22:15:15.907", - "lastModified": "2024-11-18T19:35:05.963", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T16:12:47.073", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:getflightpath:flightpath:7.5:*:*:*:*:*:*:*", + "matchCriteriaId": "FD6C90C7-D538-49AE-BD61-CC080FD89F7B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/redhotchilihacker1/CVE-Hunting/blob/master/CVE-2024-50983/README.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/swampopus/flightpath/blob/e713acf9f125af22cc68c2f5664c2869cd73616b/flightpath/CHANGELOG.txt#L4", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-509xx/CVE-2024-50986.json b/CVE-2024/CVE-2024-509xx/CVE-2024-50986.json index cad9a3fd7ea..adaa78e5c97 100644 --- a/CVE-2024/CVE-2024-509xx/CVE-2024-50986.json +++ b/CVE-2024/CVE-2024-509xx/CVE-2024-50986.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50986", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-15T15:15:07.773", - "lastModified": "2024-11-29T22:15:06.677", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T17:03:46.800", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:clementine-player:clementine:1.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "2DBB9203-382C-45BA-A8F5-8430EE7DACE5" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/clementine-player/Clementine", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/riftsandroses/CVE-2024-50986/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.clementine-player.org/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51091.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51091.json index c3838aaf2a0..867e2fa62e1 100644 --- a/CVE-2024/CVE-2024-510xx/CVE-2024-51091.json +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51091.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51091", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-03T18:15:29.523", - "lastModified": "2025-03-04T17:15:12.870", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T17:02:04.873", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:seajs:seajs:2.2.3:*:*:*:*:*:*:*", + "matchCriteriaId": "C6966BF9-F8A4-4D2C-96CD-EFE163F8256A" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/jackfromeast/176413c3bd73f825f7aeeb05e80e02a6", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://gist.github.com/jackfromeast/176413c3bd73f825f7aeeb05e80e02a6", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51459.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51459.json index 427c53c03d8..6a90ed11cd1 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51459.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51459.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51459", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-03-19T19:15:42.180", - "lastModified": "2025-03-19T19:15:42.180", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T16:58:53.093", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.5, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -51,10 +71,54 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:infosphere_information_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.7", + "versionEndExcluding": "11.7.1.136", + "matchCriteriaId": "7F1D1624-B6B9-4533-AAC5-6DF002160103" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E492C463-D76E-49B7-A4D4-3B499E422D89" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7185056", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51477.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51477.json index d0139c5699c..8c4d08fa778 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51477.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51477.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51477", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-03-29T00:15:23.950", - "lastModified": "2025-04-01T20:26:30.593", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T16:27:25.043", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -51,10 +71,54 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:infosphere_information_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.7", + "versionEndExcluding": "11.7.1", + "matchCriteriaId": "C8544C8A-580A-4A26-8731-0511ADC66F36" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E492C463-D76E-49B7-A4D4-3B499E422D89" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7185058", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-515xx/CVE-2024-51568.json b/CVE-2024/CVE-2024-515xx/CVE-2024-51568.json index 8cc079334a0..f63ce574b43 100644 --- a/CVE-2024/CVE-2024-515xx/CVE-2024-51568.json +++ b/CVE-2024/CVE-2024-515xx/CVE-2024-51568.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51568", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-29T23:15:04.520", - "lastModified": "2024-11-01T12:57:03.417", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T16:17:23.937", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -51,22 +71,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cyberpanel:cyberpanel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.3.5", + "matchCriteriaId": "1FA9BF50-1DBE-40E2-97A8-2B6102FEEFCA" + } + ] + } + ] + } + ], "references": [ { "url": "https://cwe.mitre.org/data/definitions/78.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://cyberpanel.net/KnowledgeBase/home/change-logs/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://cyberpanel.net/blog/cyberpanel-v2-3-5", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://dreyand.rs/code/review/2024/10/27/what-are-my-options-cyberpanel-v236-pre-auth-rce", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5125.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5125.json index 251811058cf..b2b626fc100 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5125.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5125.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5125", "sourceIdentifier": "security@huntr.dev", "published": "2024-11-14T18:15:26.760", - "lastModified": "2024-11-15T16:35:09.290", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T17:01:29.420", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -73,14 +73,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lollms:lollms-webui:9.6:*:*:*:*:*:*:*", + "matchCriteriaId": "8161B4F7-AE3F-4A7D-9B47-131C1AA3EC6F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/parisneo/lollms-webui/commit/9b0f6c4ad1b9a2cd3466dcefaa278df30feed67e", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/e6ae8cfd-9f8b-41df-a0cc-1e7a47416995", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-528xx/CVE-2024-52872.json b/CVE-2024/CVE-2024-528xx/CVE-2024-52872.json index 5d0aa096a9d..bbbe1e50346 100644 --- a/CVE-2024/CVE-2024-528xx/CVE-2024-52872.json +++ b/CVE-2024/CVE-2024-528xx/CVE-2024-52872.json @@ -2,8 +2,8 @@ "id": "CVE-2024-52872", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-17T04:15:04.047", - "lastModified": "2024-11-18T18:35:09.270", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T17:59:56.147", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,51 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:flagsmith:flagsmith:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.134.1", + "matchCriteriaId": "2867667E-9B13-4D92-8DB8-18EEECB277EF" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Flagsmith/flagsmith/compare/v2.134.0...v2.134.1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/Flagsmith/flagsmith/pull/4459", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-533xx/CVE-2024-53384.json b/CVE-2024/CVE-2024-533xx/CVE-2024-53384.json index 839970ad5ec..cafe11bd05f 100644 --- a/CVE-2024/CVE-2024-533xx/CVE-2024-53384.json +++ b/CVE-2024/CVE-2024-533xx/CVE-2024-53384.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53384", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-03T18:15:29.670", - "lastModified": "2025-03-05T19:15:37.560", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T17:58:38.380", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:egoist:tsup:8.3.4:*:*:*:*:node.js:*:*", + "matchCriteriaId": "4CE30A1E-3B45-4EAB-A29B-892012CE4DB7" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/jackfromeast/36f98bf7542d11835c883c1d175d9b92", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-533xx/CVE-2024-53387.json b/CVE-2024/CVE-2024-533xx/CVE-2024-53387.json index 1a0b09b661c..07420df5e35 100644 --- a/CVE-2024/CVE-2024-533xx/CVE-2024-53387.json +++ b/CVE-2024/CVE-2024-533xx/CVE-2024-53387.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53387", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-03T17:15:13.050", - "lastModified": "2025-03-04T17:15:13.043", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T17:56:33.610", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:umeditor_project:umeditor:1.2.3:*:*:*:*:*:*:*", + "matchCriteriaId": "C1F04C7A-824B-475C-8C31-A1690C472C3E" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/jackfromeast/d52c506113f33b8871d0e647411df894", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-533xx/CVE-2024-53388.json b/CVE-2024/CVE-2024-533xx/CVE-2024-53388.json index 2eabc4642e5..e1f052b4beb 100644 --- a/CVE-2024/CVE-2024-533xx/CVE-2024-53388.json +++ b/CVE-2024/CVE-2024-533xx/CVE-2024-53388.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53388", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-03T17:15:13.167", - "lastModified": "2025-03-04T17:15:13.217", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T17:55:50.930", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mavo:mavo:0.3.2:*:*:*:*:*:*:*", + "matchCriteriaId": "6A11209D-EE10-4015-A493-DBE09650AAE8" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/jackfromeast/a61a5429a97985e7ff4c1d39e339d5d8", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-536xx/CVE-2024-53619.json b/CVE-2024/CVE-2024-536xx/CVE-2024-53619.json index 35e9323c7d7..31e2097781e 100644 --- a/CVE-2024/CVE-2024-536xx/CVE-2024-53619.json +++ b/CVE-2024/CVE-2024-536xx/CVE-2024-53619.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53619", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-26T19:15:30.727", - "lastModified": "2024-11-26T20:15:33.880", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T17:54:54.130", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:spip:spip:4.3.3:*:*:*:*:*:*:*", + "matchCriteriaId": "B342AEDF-3D8E-4E98-BD3D-9904B0E0DB38" + } + ] + } + ] + } + ], "references": [ { "url": "https://grimthereaperteam.medium.com/spip-4-3-3-malicious-file-upload-xss-in-pdf-526c03bb1776", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-541xx/CVE-2024-54169.json b/CVE-2024/CVE-2024-541xx/CVE-2024-54169.json index 8b0cfeb954d..2918f0d5e52 100644 --- a/CVE-2024/CVE-2024-541xx/CVE-2024-54169.json +++ b/CVE-2024/CVE-2024-541xx/CVE-2024-54169.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54169", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-27T15:15:39.100", - "lastModified": "2025-02-27T15:15:39.100", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T17:52:04.707", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,47 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:entirex:11.1:*:*:*:*:*:*:*", + "matchCriteriaId": "371F5AF5-0001-42F2-9279-ED83FBE2C4C9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7184194", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-541xx/CVE-2024-54170.json b/CVE-2024/CVE-2024-541xx/CVE-2024-54170.json index 378bddf4bd5..5408d2d90aa 100644 --- a/CVE-2024/CVE-2024-541xx/CVE-2024-54170.json +++ b/CVE-2024/CVE-2024-541xx/CVE-2024-54170.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54170", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-27T15:15:39.240", - "lastModified": "2025-02-27T15:15:39.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T17:51:11.820", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,47 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:entirex:11.1:*:*:*:*:*:*:*", + "matchCriteriaId": "371F5AF5-0001-42F2-9279-ED83FBE2C4C9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7184194", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-541xx/CVE-2024-54171.json b/CVE-2024/CVE-2024-541xx/CVE-2024-54171.json index becce2d130a..8fba10d3b64 100644 --- a/CVE-2024/CVE-2024-541xx/CVE-2024-54171.json +++ b/CVE-2024/CVE-2024-541xx/CVE-2024-54171.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54171", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-06T21:15:21.453", - "lastModified": "2025-02-06T21:15:21.453", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T17:50:09.553", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,47 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:entirex:11.1:*:*:*:*:*:*:*", + "matchCriteriaId": "371F5AF5-0001-42F2-9279-ED83FBE2C4C9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7182693", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-549xx/CVE-2024-54957.json b/CVE-2024/CVE-2024-549xx/CVE-2024-54957.json index 6a899d89922..2b27a82c37e 100644 --- a/CVE-2024/CVE-2024-549xx/CVE-2024-54957.json +++ b/CVE-2024/CVE-2024-549xx/CVE-2024-54957.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54957", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T20:16:01.980", - "lastModified": "2025-03-03T16:15:38.450", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T17:49:10.313", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nagios:nagios_xi:2024:r1.2.2:*:*:*:*:*:*", + "matchCriteriaId": "7FFC081E-728A-4643-A8DF-5CC8E94E7D78" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Sharpe-nl/CVEs/tree/main/CVE-2024-54957", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.nagios.com/products/security/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-549xx/CVE-2024-54960.json b/CVE-2024/CVE-2024-549xx/CVE-2024-54960.json index b9105b9dff1..7a045c9cf19 100644 --- a/CVE-2024/CVE-2024-549xx/CVE-2024-54960.json +++ b/CVE-2024/CVE-2024-549xx/CVE-2024-54960.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54960", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-20T18:15:25.457", - "lastModified": "2025-02-20T20:15:45.927", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T17:46:10.793", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nagios:nagios_xi:2024:r1.2.2:*:*:*:*:*:*", + "matchCriteriaId": "7FFC081E-728A-4643-A8DF-5CC8E94E7D78" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Sharpe-nl/CVEs/tree/main/CVE-2024-54960", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-551xx/CVE-2024-55160.json b/CVE-2024/CVE-2024-551xx/CVE-2024-55160.json index 91271c28434..bcb7a67ca3b 100644 --- a/CVE-2024/CVE-2024-551xx/CVE-2024-55160.json +++ b/CVE-2024/CVE-2024-551xx/CVE-2024-55160.json @@ -2,8 +2,8 @@ "id": "CVE-2024-55160", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T21:15:37.213", - "lastModified": "2025-03-03T16:15:38.617", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T17:45:27.787", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,30 +51,69 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:g-fast:gfast:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2", + "versionEndIncluding": "3.2", + "matchCriteriaId": "1ECEF6B7-C9B7-4FFC-9810-5F493EC25E5C" + } + ] + } + ] + } + ], "references": [ { "url": "http://gfast.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://github.com/SuperDu1/CVE/issues/2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://github.com/tiger1103/gfast/blob/os-v3.2/api/v1/system/sys_oper_log.go#L35", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/tiger1103/gfast/blob/os-v3.2/internal/app/system/logic/sysOperLog/sys_oper_log.go#L121", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/tiger1103/gfast/tree/os-v3.2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/SuperDu1/CVE/issues/2", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6165.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6165.json index 7a05f9cdc35..27624a1c361 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6165.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6165.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6165", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-31T06:15:03.373", - "lastModified": "2024-08-01T14:00:13.553", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T16:08:08.900", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wanotifier:wanotifier:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.6.1", + "matchCriteriaId": "33874CB7-8A1A-41C5-9D07-7D3CD83151F8" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/b9e6648a-9d19-4e73-ad6c-f727802d8dd5/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8267.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8267.json index 7b6cb28b0e6..7b33ff28b28 100644 --- a/CVE-2024/CVE-2024-82xx/CVE-2024-8267.json +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8267.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8267", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-25T01:15:45.997", - "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T16:05:26.340", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -37,6 +37,26 @@ "exploitabilityScore": 3.1, "impactScore": 2.7 }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -81,26 +101,60 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:softlabbd:radio_player:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.0.79", + "matchCriteriaId": "F90F9FE8-B448-400F-A70C-DF3C5D221065" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/radio-player/trunk/block/class-block.php#L26", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3152379/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3152379/radio-player/trunk/block/class-block.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/radio-player/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product", + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/49581614-14a8-4450-8f83-d8d22a3feee9?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1351.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1351.json new file mode 100644 index 00000000000..e32fa24b4eb --- /dev/null +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1351.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-1351", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-07-07T17:15:27.693", + "lastModified": "2025-07-07T17:15:27.693", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Storage Virtualize 8.5, 8.6, and 8.7 products could allow a user to escalate their privileges to that of another user logging in at the same time due to a race condition in the login function." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7237157", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21199.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21199.json index 1385a1319c2..8233e107dcd 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21199.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21199.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21199", "sourceIdentifier": "secure@microsoft.com", "published": "2025-03-11T17:16:19.670", - "lastModified": "2025-03-11T17:16:19.670", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T17:18:36.070", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:azure_agent:*:*:*:*:*:backup:*:*", + "versionEndExcluding": "2.0.9940.0", + "matchCriteriaId": "10E372B1-99BC-4DBE-AC91-9D90969430B4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:azure_agent:*:*:*:*:*:site_recovery:*:*", + "versionEndExcluding": "9.30", + "matchCriteriaId": "B675A111-5EBD-4983-AEE9-6E23CF2F90FB" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21199", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24076.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24076.json index 7e4f5b8c254..5c9ce1c37ba 100644 --- a/CVE-2025/CVE-2025-240xx/CVE-2025-24076.json +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24076.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24076", "sourceIdentifier": "secure@microsoft.com", "published": "2025-03-11T17:16:30.480", - "lastModified": "2025-03-11T17:16:30.480", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T17:24:22.777", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.5039", + "matchCriteriaId": "0B27CE48-66A0-488B-A7B6-18A5A191AFDA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.5039", + "matchCriteriaId": "77DC7D9D-F85F-41B4-A944-D27B388A1157" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.3403", + "matchCriteriaId": "84168D48-1F68-4590-98BB-E926339D1A01" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.25398.1486", + "matchCriteriaId": "96046A7B-76A1-4DCF-AEA5-25344D37E492" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.3403", + "matchCriteriaId": "CF81B44C-8FF7-4C61-9974-3F98DA9D492C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24076", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24084.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24084.json index 6cfe89d1748..b421e6a765a 100644 --- a/CVE-2025/CVE-2025-240xx/CVE-2025-24084.json +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24084.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24084", "sourceIdentifier": "secure@microsoft.com", "published": "2025-03-11T17:16:33.523", - "lastModified": "2025-03-11T17:16:33.523", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T17:29:07.287", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,67 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.5039", + "matchCriteriaId": "0B27CE48-66A0-488B-A7B6-18A5A191AFDA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.5039", + "matchCriteriaId": "77DC7D9D-F85F-41B4-A944-D27B388A1157" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.26100.3403", + "matchCriteriaId": "B7ADF37E-1DD3-4539-8922-1E059955FEF1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.3403", + "matchCriteriaId": "E0A74D52-ABC0-4733-B892-F8688B6AEBA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3270", + "matchCriteriaId": "AAACC9C4-DDC5-4059-AFE3-A49DB2347A86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1486", + "matchCriteriaId": "EF423F8C-2E8A-46AB-BB2D-C416BF341F92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.3403", + "matchCriteriaId": "CF81B44C-8FF7-4C61-9974-3F98DA9D492C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24084", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24987.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24987.json index 78f9c31bcd0..6310a7d7334 100644 --- a/CVE-2025/CVE-2025-249xx/CVE-2025-24987.json +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24987.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24987", "sourceIdentifier": "secure@microsoft.com", "published": "2025-03-11T17:16:34.767", - "lastModified": "2025-03-11T17:16:34.767", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T17:33:06.623", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.7, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 } ] }, @@ -51,10 +71,146 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20947", + "matchCriteriaId": "6997DE6E-CBAD-4690-A68C-8F10E477DCC2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20947", + "matchCriteriaId": "3CBCF6D9-5085-473C-82F5-98BC246A9C4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7876", + "matchCriteriaId": "0CF0E174-4692-4AA3-B72E-12E73A1BDBE5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7876", + "matchCriteriaId": "340EF5F8-D4F5-4AD8-9D80-1DEC2F376BE5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.7009", + "matchCriteriaId": "67C8DCD7-90C4-431F-BD03-FDFDE170E748" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.7009", + "matchCriteriaId": "05169574-28AB-4E42-B3DE-710574BB1AD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5608", + "matchCriteriaId": "83256070-991F-404C-AE4C-CBB46166CA67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5608", + "matchCriteriaId": "A1F779E2-8536-4B06-A151-6115C9D88D29" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.5039", + "matchCriteriaId": "0B27CE48-66A0-488B-A7B6-18A5A191AFDA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.5039", + "matchCriteriaId": "77DC7D9D-F85F-41B4-A944-D27B388A1157" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.3403", + "matchCriteriaId": "84168D48-1F68-4590-98BB-E926339D1A01" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", + "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7876", + "matchCriteriaId": "C7610CDB-A02B-4C62-B17F-6DCE2B3DE4F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.7009", + "matchCriteriaId": "D271422D-A29F-4DBF-BF72-BCD90E393A5A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3328", + "matchCriteriaId": "C1426FF0-A402-4149-9F2B-0FA3CEB4BB5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1486", + "matchCriteriaId": "EF423F8C-2E8A-46AB-BB2D-C416BF341F92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.3403", + "matchCriteriaId": "CF81B44C-8FF7-4C61-9974-3F98DA9D492C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24987", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24988.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24988.json index b41c4ff6658..e4ab1ad18f6 100644 --- a/CVE-2025/CVE-2025-249xx/CVE-2025-24988.json +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24988.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24988", "sourceIdentifier": "secure@microsoft.com", "published": "2025-03-11T17:16:35.013", - "lastModified": "2025-03-11T17:16:35.013", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T17:34:42.237", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.7, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 } ] }, @@ -51,10 +71,146 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20947", + "matchCriteriaId": "6997DE6E-CBAD-4690-A68C-8F10E477DCC2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20947", + "matchCriteriaId": "3CBCF6D9-5085-473C-82F5-98BC246A9C4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7876", + "matchCriteriaId": "0CF0E174-4692-4AA3-B72E-12E73A1BDBE5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7876", + "matchCriteriaId": "340EF5F8-D4F5-4AD8-9D80-1DEC2F376BE5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.7009", + "matchCriteriaId": "67C8DCD7-90C4-431F-BD03-FDFDE170E748" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.7009", + "matchCriteriaId": "05169574-28AB-4E42-B3DE-710574BB1AD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5608", + "matchCriteriaId": "83256070-991F-404C-AE4C-CBB46166CA67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5608", + "matchCriteriaId": "A1F779E2-8536-4B06-A151-6115C9D88D29" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.5039", + "matchCriteriaId": "0B27CE48-66A0-488B-A7B6-18A5A191AFDA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.5039", + "matchCriteriaId": "77DC7D9D-F85F-41B4-A944-D27B388A1157" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.3403", + "matchCriteriaId": "84168D48-1F68-4590-98BB-E926339D1A01" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", + "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7876", + "matchCriteriaId": "C7610CDB-A02B-4C62-B17F-6DCE2B3DE4F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.7009", + "matchCriteriaId": "D271422D-A29F-4DBF-BF72-BCD90E393A5A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3328", + "matchCriteriaId": "C1426FF0-A402-4149-9F2B-0FA3CEB4BB5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1486", + "matchCriteriaId": "EF423F8C-2E8A-46AB-BB2D-C416BF341F92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.3403", + "matchCriteriaId": "CF81B44C-8FF7-4C61-9974-3F98DA9D492C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24988", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-259xx/CVE-2025-25905.json b/CVE-2025/CVE-2025-259xx/CVE-2025-25905.json index 1ca89d1311b..f7a5d6983bd 100644 --- a/CVE-2025/CVE-2025-259xx/CVE-2025-25905.json +++ b/CVE-2025/CVE-2025-259xx/CVE-2025-25905.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25905", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-25T16:15:26.173", - "lastModified": "2025-06-26T18:57:43.670", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T17:40:16.800", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:4pace:cadclick:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.13.0", + "matchCriteriaId": "4EFFCA00-9517-44B6-8C43-F9C818518348" + } + ] + } + ] + } + ], "references": [ { "url": "https://4pace.com/en/products/cadclick", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://medium.com/@mdjab3r/cve-2025-25905-ffff82c635f2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://support.cadclick.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26645.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26645.json index fed411c91e3..5d89e28b2ce 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26645.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26645.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26645", "sourceIdentifier": "secure@microsoft.com", "published": "2025-03-11T17:16:44.200", - "lastModified": "2025-03-11T17:16:44.200", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T17:48:56.897", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -55,10 +55,165 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20947", + "matchCriteriaId": "6997DE6E-CBAD-4690-A68C-8F10E477DCC2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20947", + "matchCriteriaId": "3CBCF6D9-5085-473C-82F5-98BC246A9C4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7876", + "matchCriteriaId": "0CF0E174-4692-4AA3-B72E-12E73A1BDBE5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7876", + "matchCriteriaId": "340EF5F8-D4F5-4AD8-9D80-1DEC2F376BE5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.7009", + "matchCriteriaId": "67C8DCD7-90C4-431F-BD03-FDFDE170E748" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.7009", + "matchCriteriaId": "05169574-28AB-4E42-B3DE-710574BB1AD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5608", + "matchCriteriaId": "83256070-991F-404C-AE4C-CBB46166CA67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5608", + "matchCriteriaId": "A1F779E2-8536-4B06-A151-6115C9D88D29" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.5039", + "matchCriteriaId": "0B27CE48-66A0-488B-A7B6-18A5A191AFDA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.5039", + "matchCriteriaId": "77DC7D9D-F85F-41B4-A944-D27B388A1157" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.3403", + "matchCriteriaId": "84168D48-1F68-4590-98BB-E926339D1A01" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", + "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7876", + "matchCriteriaId": "C7610CDB-A02B-4C62-B17F-6DCE2B3DE4F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "273EE4B9-8B53-4387-98C8-EC5D2558DB82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3270", + "matchCriteriaId": "AAACC9C4-DDC5-4059-AFE3-A49DB2347A86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartExcluding": "10.0.20348.3270", + "versionEndExcluding": "10.0.20348.3328", + "matchCriteriaId": "2569319C-B855-466E-B4A5-D5774DBBD516" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1486", + "matchCriteriaId": "EF423F8C-2E8A-46AB-BB2D-C416BF341F92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.3403", + "matchCriteriaId": "CF81B44C-8FF7-4C61-9974-3F98DA9D492C" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:remote_desktop:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "1.2.6017.0", + "matchCriteriaId": "F39323C4-C48F-4CAA-9E6B-31041B347686" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:windows_app:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "2.0.365.0", + "matchCriteriaId": "2569A07D-E2CC-4AC8-B2B1-BD6FBD576004" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26645", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26780.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26780.json new file mode 100644 index 00000000000..ca075272e80 --- /dev/null +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26780.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-26780", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-07-07T16:15:22.683", + "lastModified": "2025-07-07T16:15:22.683", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in L2 in Samsung Mobile Processor and Modem Exynos 2400 and Modem 5400. The lack of a length check leads to a Denial of Service via a malformed PDCP packet." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", + "source": "cve@mitre.org" + }, + { + "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-26780/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3044.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3044.json index c39d4ae7e54..2ceec5aa0aa 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3044.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3044.json @@ -2,7 +2,7 @@ "id": "CVE-2025-3044", "sourceIdentifier": "security@huntr.dev", "published": "2025-07-07T10:15:26.717", - "lastModified": "2025-07-07T10:15:26.717", + "lastModified": "2025-07-07T16:15:23.013", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -55,6 +55,10 @@ { "url": "https://huntr.com/bounties/80182c3a-876f-422f-8bac-38267e0345d6", "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/80182c3a-876f-422f-8bac-38267e0345d6", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-320xx/CVE-2025-32023.json b/CVE-2025/CVE-2025-320xx/CVE-2025-32023.json new file mode 100644 index 00000000000..105ab2a28a5 --- /dev/null +++ b/CVE-2025/CVE-2025-320xx/CVE-2025-32023.json @@ -0,0 +1,76 @@ +{ + "id": "CVE-2025-32023", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-07-07T16:15:22.830", + "lastModified": "2025-07-07T16:15:22.830", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote code execution. The bug likely affects all Redis versions with hyperloglog operations implemented. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing hyperloglog operations. This can be done using ACL to restrict HLL commands." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-680" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/redis/redis/commit/50188747cbfe43528d2719399a2a3c9599169445", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/redis/redis/releases/tag/6.2.19", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/redis/redis/releases/tag/7.2.10", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/redis/redis/releases/tag/7.4.5", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/redis/redis/releases/tag/8.0.3", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/redis/redis/security/advisories/GHSA-rp2m-q4j6-gr43", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-32xx/CVE-2025-3262.json b/CVE-2025/CVE-2025-32xx/CVE-2025-3262.json index edc8d12eb87..bfd00f8519c 100644 --- a/CVE-2025/CVE-2025-32xx/CVE-2025-3262.json +++ b/CVE-2025/CVE-2025-32xx/CVE-2025-3262.json @@ -2,7 +2,7 @@ "id": "CVE-2025-3262", "sourceIdentifier": "security@huntr.dev", "published": "2025-07-07T10:15:27.200", - "lastModified": "2025-07-07T10:15:27.200", + "lastModified": "2025-07-07T16:15:23.130", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -55,6 +55,10 @@ { "url": "https://huntr.com/bounties/ecf5ccc4-39e7-4fb3-b547-14a41d31a184", "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/ecf5ccc4-39e7-4fb3-b547-14a41d31a184", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-360xx/CVE-2025-36014.json b/CVE-2025/CVE-2025-360xx/CVE-2025-36014.json new file mode 100644 index 00000000000..d6a83843ea0 --- /dev/null +++ b/CVE-2025/CVE-2025-360xx/CVE-2025-36014.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-36014", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-07-07T17:15:27.890", + "lastModified": "2025-07-07T17:15:27.890", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Integration Bus for z/OS 10.1.0.0 through 10.1.0.5 is vulnerable to code injection by a privileged user with access to the IIB install directory." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.5, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7239003", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-439xx/CVE-2025-43931.json b/CVE-2025/CVE-2025-439xx/CVE-2025-43931.json new file mode 100644 index 00000000000..b6e500a9c1d --- /dev/null +++ b/CVE-2025/CVE-2025-439xx/CVE-2025-43931.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-43931", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-07-07T16:15:23.250", + "lastModified": "2025-07-07T16:15:23.250", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "flask-boilerplate through a170e7c allows account takeover via the password reset feature because SERVER_NAME is not configured and thus a reset depends on the Host HTTP header." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/BrookeYangRui/19fcc6c19df7bb4d8437476c609a6129", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/MaxHalford/flask-boilerplate/blob/a170e7cec605906801680567c4279b30ccd9630b/app/views/user.py#L103-L126", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-439xx/CVE-2025-43932.json b/CVE-2025/CVE-2025-439xx/CVE-2025-43932.json new file mode 100644 index 00000000000..3b6fe557a8d --- /dev/null +++ b/CVE-2025/CVE-2025-439xx/CVE-2025-43932.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-43932", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-07-07T16:15:23.380", + "lastModified": "2025-07-07T16:15:23.380", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "JobCenter through 7e7b0b2 allows account takeover via the password reset feature because SERVER_NAME is not configured and thus a reset depends on the Host HTTP header." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/guomaoqiu/JobCenter/blob/7e7b0b2f756d66bba7e592a6c8952c78a3573d9c/app/templates/auth/email/reset_password.txt", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/guomaoqiu/JobCenter/issues/18", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-439xx/CVE-2025-43933.json b/CVE-2025/CVE-2025-439xx/CVE-2025-43933.json new file mode 100644 index 00000000000..c2a2c609780 --- /dev/null +++ b/CVE-2025/CVE-2025-439xx/CVE-2025-43933.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-43933", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-07-07T16:15:23.513", + "lastModified": "2025-07-07T16:15:23.513", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "fblog through 983bede allows account takeover via the password reset feature because SERVER_NAME is not configured and thus a reset depends on the Host HTTP header." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/ghost123gg/fblog/blob/983bedec9f837a54ab2dfd358a9cb45504a2e709/app/templates/auth/email/resetPassword.html#L1-L8", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/ghost123gg/fblog/issues/5", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-450xx/CVE-2025-45065.json b/CVE-2025/CVE-2025-450xx/CVE-2025-45065.json new file mode 100644 index 00000000000..f81275e1969 --- /dev/null +++ b/CVE-2025/CVE-2025-450xx/CVE-2025-45065.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-45065", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-07-07T16:15:23.650", + "lastModified": "2025-07-07T16:15:23.650", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "employee record management system in php and mysql v1 was discovered to contain a SQL injection vulnerability via the loginerms.php endpoint." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://docs.google.com/document/d/1Sq08I_eKCY-YOmVOQPIEj4Ui2pW0gIgXHcqD9fcvR7M/edit?usp=sharing", + "source": "cve@mitre.org" + }, + { + "url": "https://medium.com/@shrutukapoor25/cve-2025-45065-b58a33e65860", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-454xx/CVE-2025-45479.json b/CVE-2025/CVE-2025-454xx/CVE-2025-45479.json new file mode 100644 index 00000000000..01fa2f12620 --- /dev/null +++ b/CVE-2025/CVE-2025-454xx/CVE-2025-45479.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-45479", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-07-07T16:15:23.780", + "lastModified": "2025-07-07T16:15:23.780", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insufficient security mechanisms for created containers in educoder challenges v1.0 allow attackers to execute arbitrary code via injecting crafted content into a container." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/YX-hueimie/CVE-Issues/blob/main/CVE-2025-45479.md", + "source": "cve@mitre.org" + }, + { + "url": "https://www.educoder.net/", + "source": "cve@mitre.org" + }, + { + "url": "https://www.educoder.net/shixuns/fb7qhjgz/challenges", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-467xx/CVE-2025-46733.json b/CVE-2025/CVE-2025-467xx/CVE-2025-46733.json index 71def6f4677..42465a58d22 100644 --- a/CVE-2025/CVE-2025-467xx/CVE-2025-46733.json +++ b/CVE-2025/CVE-2025-467xx/CVE-2025-46733.json @@ -2,13 +2,17 @@ "id": "CVE-2025-46733", "sourceIdentifier": "security-advisories@github.com", "published": "2025-07-04T14:15:33.217", - "lastModified": "2025-07-04T14:15:33.217", + "lastModified": "2025-07-07T17:15:28.197", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "OP-TEE is a Trusted Execution Environment (TEE) designed as companion to a non-secure Linux kernel running on Arm; Cortex-A cores using the TrustZone technology. In version 4.5.0, using a specially crafted tee-supplicant binary running in REE userspace, an attacker can trigger a panic in a TA that uses the libutee Secure Storage API. Many functions in libutee, specifically those which make up the Secure Storage API, will panic if a system call returns an unexpected return code. This behavior is mandated by the TEE Internal Core API specification. However, in OP-TEE\u2019s implementation, return codes of secure storage operations are passed through unsanitized from the REE tee-supplicant, through the Linux kernel tee-driver, through the OP-TEE kernel, back to libutee. Thus, an attacker with access to REE userspace, and the ability to stop tee-supplicant and replace it with their own process (generally trivial for a root user, and depending on the way permissions are set up, potentially available even to less privileged users) can run a malicious tee-supplicant process that responds to storage requests with unexpected response codes, triggering a panic in the requesting TA. This is particularly dangerous for TAs built with `TA_FLAG_SINGLE_INSTANCE` (corresponding to `gpd.ta.singleInstance` and `TA_FLAG_INSTANCE_KEEP_ALIVE` (corresponding to `gpd.ta.keepAlive`). The behavior of these TAs may depend on memory that is preserved between sessions, and the ability of an attacker to panic the TA and reload it with a clean memory space can compromise the behavior of those TAs. A critical example of this is the optee_ftpm TA. It uses the kept alive memory to hold PCR values, which crucially must be non-resettable. An attacker who can trigger a panic in the fTPM TA can reset the PCRs, and then extend them PCRs with whatever they choose, falsifying boot measurements, accessing sealed data, and potentially more. The impact of this issue depends significantly on the behavior of affected TAs. For some, it could manifest as a denial of service, while for others, like the fTPM TA, it can result in the disclosure of sensitive data. Anyone running the fTPM TA is affected, but similar attacks may be possible on other TAs that leverage the Secure Storage API. A fix is available in commit 941a58d78c99c4754fbd4ec3079ec9e1d596af8f." + }, + { + "lang": "es", + "value": "OP-TEE es un Entorno de Ejecuci\u00f3n Confiable (TEE) dise\u00f1ado para complementar un kernel Linux no seguro que se ejecuta en n\u00facleos Arm; los n\u00facleos Cortex-A utilizan la tecnolog\u00eda TrustZone. En la versi\u00f3n 4.5.0, mediante un binario tee-supplicant especialmente manipulado que se ejecuta en el espacio de usuario de REE, un atacante puede generar un p\u00e1nico en un TA que utiliza la API de Almacenamiento Seguro de libutee. Muchas funciones de libutee, en particular las que conforman la API de Almacenamiento Seguro, entrar\u00e1n en p\u00e1nico si una llamada al sistema devuelve un c\u00f3digo de retorno inesperado. Este comportamiento est\u00e1 estipulado por la especificaci\u00f3n de la API del N\u00facleo Interno de TEE. Sin embargo, en la implementaci\u00f3n de OP-TEE, los c\u00f3digos de retorno de las operaciones de almacenamiento seguro se transfieren sin sanear desde el tee-supplicant de REE, a trav\u00e9s del controlador tee del kernel de Linux, a trav\u00e9s del kernel de OP-TEE, de vuelta a libutee. De este modo, un atacante con acceso al espacio de usuario REE y la capacidad de detener tee-supplicant y reemplazarlo con su propio proceso (generalmente trivial para un usuario root y, dependiendo de la forma en que se configuren los permisos, potencialmente disponible incluso para usuarios menos privilegiados) puede ejecutar un proceso tee-supplicant malicioso que responde a las solicitudes de almacenamiento con c\u00f3digos de respuesta inesperados, lo que provoca p\u00e1nico en el TA solicitante. Esto es particularmente peligroso para los TA creados con `TA_FLAG_SINGLE_INSTANCE` (que corresponde a `gpd.ta.singleInstance` y `TA_FLAG_INSTANCE_KEEP_ALIVE` (que corresponde a `gpd.ta.keepAlive`). El comportamiento de estos TA puede depender de la memoria que se conserva entre sesiones, y la capacidad de un atacante de generar p\u00e1nico en el TA y recargarlo con un espacio de memoria limpio puede comprometer el comportamiento de esos TA. Un ejemplo cr\u00edtico de esto es el TA optee_ftpm. Utiliza la memoria viva mantenida para almacenar valores de PCR, que crucialmente deben ser no reiniciables. Un atacante que puede provocar un p\u00e1nico en el TA fTPM puede reiniciar los PCR y luego extenderlos con lo que elija, falsificando mediciones de arranque, accediendo a datos sellados y potencialmente m\u00e1s. El impacto de este problema depende significativamente del comportamiento de los TA afectados. Para algunos, podr\u00eda manifestarse como una denegaci\u00f3n de servicio, mientras que para otros, como el TA fTPM, Puede resultar en la divulgaci\u00f3n de datos confidenciales. Cualquier usuario de la TA fTPM se ve afectado, pero podr\u00edan producirse ataques similares en otras TA que utilizan la API de Almacenamiento Seguro. Hay una soluci\u00f3n disponible en el commit 941a58d78c99c4754fbd4ec3079ec9e1d596af8f." } ], "metrics": { @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -55,6 +59,10 @@ { "url": "https://github.com/OP-TEE/optee_os/security/advisories/GHSA-f35r-hm2m-p6c3", "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/OP-TEE/optee_os/security/advisories/GHSA-f35r-hm2m-p6c3", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-472xx/CVE-2025-47202.json b/CVE-2025/CVE-2025-472xx/CVE-2025-47202.json new file mode 100644 index 00000000000..dc587e4aa8f --- /dev/null +++ b/CVE-2025/CVE-2025-472xx/CVE-2025-47202.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-47202", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-07-07T16:15:23.943", + "lastModified": "2025-07-07T16:15:23.943", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In RRC in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 1580, 9110, W920, W930, W1000, Modem 5123, Modem 5300, and Modem 5400, the lack of a length check leads to out-of-bounds writes." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", + "source": "cve@mitre.org" + }, + { + "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-47202/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-483xx/CVE-2025-48367.json b/CVE-2025/CVE-2025-483xx/CVE-2025-48367.json new file mode 100644 index 00000000000..f842ee26e07 --- /dev/null +++ b/CVE-2025/CVE-2025-483xx/CVE-2025-48367.json @@ -0,0 +1,76 @@ +{ + "id": "CVE-2025-48367", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-07-07T16:15:24.063", + "lastModified": "2025-07-07T16:15:24.063", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Redis is an open source, in-memory database that persists on disk. An unauthenticated connection can cause repeated IP protocol errors, leading to client starvation and, ultimately, a denial of service. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/redis/redis/commit/bde62951accfc4bb0a516276fd0b4b307e140ce2", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/redis/redis/releases/tag/6.2.19", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/redis/redis/releases/tag/7.2.10", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/redis/redis/releases/tag/7.4.5", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/redis/redis/releases/tag/8.0.3", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/redis/redis/security/advisories/GHSA-4q32-c38c-pwgq", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-524xx/CVE-2025-52492.json b/CVE-2025/CVE-2025-524xx/CVE-2025-52492.json new file mode 100644 index 00000000000..4ed95d2a5eb --- /dev/null +++ b/CVE-2025/CVE-2025-524xx/CVE-2025-52492.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-52492", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-07-07T16:15:24.233", + "lastModified": "2025-07-07T16:15:24.233", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been discovered in the firmware of Paxton Paxton10 before 4.6 SR6. The firmware file, rootfs.tar.gz, contains hard-coded credentials for the Twilio API. A remote attacker who obtains a copy of the firmware can extract these credentials. This could allow the attacker to gain unauthorized access to the associated Twilio account, leading to information disclosure, potential service disruption, and unauthorized use of the Twilio services." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/jackcaplin/0dfb7ef428b8ade5de4396dd753cd894", + "source": "cve@mitre.org" + }, + { + "url": "https://paxton-access.co.uk", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-52xx/CVE-2025-5275.json b/CVE-2025/CVE-2025-52xx/CVE-2025-5275.json index 4c2cf0ddfd9..68205604c9d 100644 --- a/CVE-2025/CVE-2025-52xx/CVE-2025-5275.json +++ b/CVE-2025/CVE-2025-52xx/CVE-2025-5275.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5275", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-26T03:15:23.860", - "lastModified": "2025-06-26T18:57:43.670", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T16:05:45.690", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpbeginner:charitable:*:*:*:*:-:wordpress:*:*", + "versionEndExcluding": "1.8.6.2", + "matchCriteriaId": "21B0B881-56D7-48CE-B685-4EFE1DF4A056" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/charitable/tags/1.8.5.3/templates/form-fields/checkbox.php#L40", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/453d8918-32dc-43d6-8969-71f719536891?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-531xx/CVE-2025-53169.json b/CVE-2025/CVE-2025-531xx/CVE-2025-53169.json index 84f57ed34d6..bfb08f39e48 100644 --- a/CVE-2025/CVE-2025-531xx/CVE-2025-53169.json +++ b/CVE-2025/CVE-2025-531xx/CVE-2025-53169.json @@ -2,7 +2,7 @@ "id": "CVE-2025-53169", "sourceIdentifier": "psirt@huawei.com", "published": "2025-07-07T03:15:27.720", - "lastModified": "2025-07-07T03:15:27.720", + "lastModified": "2025-07-07T16:15:24.467", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -35,6 +35,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/7/", diff --git a/CVE-2025/CVE-2025-533xx/CVE-2025-53373.json b/CVE-2025/CVE-2025-533xx/CVE-2025-53373.json new file mode 100644 index 00000000000..d2135f7b37e --- /dev/null +++ b/CVE-2025/CVE-2025-533xx/CVE-2025-53373.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-53373", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-07-07T16:15:24.950", + "lastModified": "2025-07-07T16:15:24.950", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Natours is a Tour Booking API. The attacker can easily take over any victim account by injecting an attacker-controlled server domain in the Host header when requesting the /forgetpassword endpoint. This vulnerability is fixed with commit 7401793a8d9ed0f0c250c4e0ee2815d685d7a70b." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.9, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-640" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/ahmed-elgaml11/Natours/commit/7401793a8d9ed0f0c250c4e0ee2815d685d7a70b", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/ahmed-elgaml11/Natours/security/advisories/GHSA-8gmw-7p75-58qv", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-533xx/CVE-2025-53374.json b/CVE-2025/CVE-2025-533xx/CVE-2025-53374.json new file mode 100644 index 00000000000..9b99489a97f --- /dev/null +++ b/CVE-2025/CVE-2025-533xx/CVE-2025-53374.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2025-53374", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-07-07T16:15:25.113", + "lastModified": "2025-07-07T16:15:25.113", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dokploy is a self-hostable Platform as a Service (PaaS) that simplifies the deployment and management of applications and databases. An authenticated low-privileged account can retrieve detailed profile information about another users in the same organization by directly invoking user.one. The response discloses personally-identifiable information (PII) such as e-mail address, role, two-factor status, organization ID, and various account flags. The fix will be available in the v0.23.7." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 1.3, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "UNREPORTED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-359" + }, + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Dokploy/dokploy/commit/61cf426615a4aa095b150362526aa52f2d1ea115", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/Dokploy/dokploy/security/advisories/GHSA-fcq8-wv2q-f758", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-533xx/CVE-2025-53375.json b/CVE-2025/CVE-2025-533xx/CVE-2025-53375.json new file mode 100644 index 00000000000..2255fd7fa75 --- /dev/null +++ b/CVE-2025/CVE-2025-533xx/CVE-2025-53375.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-53375", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-07-07T16:15:25.317", + "lastModified": "2025-07-07T16:15:25.317", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dokploy is a self-hostable Platform as a Service (PaaS) that simplifies the deployment and management of applications and databases. An authenticated attacker can read any file that the Traefik process user can access (e.g., /etc/passwd, application source, environment variable files containing credentials and secrets). This may lead to full compromise of other services or lateral movement. This vulnerability is fixed in 0.23.7." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "UNREPORTED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Dokploy/dokploy/commit/e42f6bc61050cd438726921fced64477cbf8f8e6", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/Dokploy/dokploy/security/advisories/GHSA-vq94-qm94-mxp6", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-533xx/CVE-2025-53376.json b/CVE-2025/CVE-2025-533xx/CVE-2025-53376.json new file mode 100644 index 00000000000..1bb2ea7e04b --- /dev/null +++ b/CVE-2025/CVE-2025-533xx/CVE-2025-53376.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-53376", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-07-07T16:15:25.467", + "lastModified": "2025-07-07T16:15:25.467", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dokploy is a self-hostable Platform as a Service (PaaS) that simplifies the deployment and management of applications and databases. An authenticated, low-privileged user can run arbitrary OS commands on the Dokploy host. The tRPC procedure\ndocker.getContainersByAppNameMatch interpolates the attacker-supplied appName value into a Docker CLI call without sanitisation, enabling command injection under the Dokploy service account. This vulnerability is fixed in 0.23.7." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "UNREPORTED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Dokploy/dokploy/commit/fb5d2bd5b67322f1468e5e4d0d5abcf97517761c", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/Dokploy/dokploy/security/advisories/GHSA-m486-7pmj-8cmv", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-533xx/CVE-2025-53377.json b/CVE-2025/CVE-2025-533xx/CVE-2025-53377.json new file mode 100644 index 00000000000..15dac4369fb --- /dev/null +++ b/CVE-2025/CVE-2025-533xx/CVE-2025-53377.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-53377", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-07-07T17:15:29.097", + "lastModified": "2025-07-07T17:15:29.097", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "WeGIA is a web manager for charitable institutions. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the cadastro_dependente_pessoa_nova.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the id_funcionario parameter. This vulnerability is fixed in 3.4.3." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 2.0, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "ACTIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "LOW", + "subIntegrityImpact": "LOW", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/LabRedesCefetRJ/WeGIA/commit/8ab726c9f4d0fce7ad6c66640c3126f95f73ddd7", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-qgrq-qjq6-h6gj", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-534xx/CVE-2025-53487.json b/CVE-2025/CVE-2025-534xx/CVE-2025-53487.json new file mode 100644 index 00000000000..7851fb5f744 --- /dev/null +++ b/CVE-2025/CVE-2025-534xx/CVE-2025-53487.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2025-53487", + "sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc", + "published": "2025-07-07T16:15:25.623", + "lastModified": "2025-07-07T16:15:25.623", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The ApprovedRevs extension for MediaWiki is vulnerable to stored XSS in multiple locations where system messages are inserted into raw HTML without proper escaping. Attackers can exploit this by injecting JavaScript payloads via the uselang=x-xss language override, which causes crafted message keys to be rendered unescaped.\n\n\n\n\nThis issue affects Mediawiki - ApprovedRevs extension: from 1.39.X before 1.39.13, from 1.42.X before 1.42.7, from 1.43.X before 1.43.2." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://gerrit.wikimedia.org/r/q/Ifcab085111e7898da485a5e2ae287fee4e6d167b", + "source": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc" + }, + { + "url": "https://phabricator.wikimedia.org/T394383", + "source": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-534xx/CVE-2025-53491.json b/CVE-2025/CVE-2025-534xx/CVE-2025-53491.json new file mode 100644 index 00000000000..a969b506ba5 --- /dev/null +++ b/CVE-2025/CVE-2025-534xx/CVE-2025-53491.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2025-53491", + "sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc", + "published": "2025-07-07T17:15:29.267", + "lastModified": "2025-07-07T17:15:29.267", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Wikimedia Foundation Mediawiki - FlaggedRevs Extension allows Cross-Site Scripting (XSS).This issue affects Mediawiki - FlaggedRevs Extension: from 1.43.X before 1.43.2." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/FlaggedRevs/+/1165929", + "source": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc" + }, + { + "url": "https://phabricator.wikimedia.org/T394397", + "source": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-534xx/CVE-2025-53497.json b/CVE-2025/CVE-2025-534xx/CVE-2025-53497.json new file mode 100644 index 00000000000..bb2f82489ad --- /dev/null +++ b/CVE-2025/CVE-2025-534xx/CVE-2025-53497.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2025-53497", + "sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc", + "published": "2025-07-07T17:15:29.400", + "lastModified": "2025-07-07T17:15:29.400", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Wikimedia Foundation Mediawiki - RelatedArticles Extension allows Stored XSS.This issue affects Mediawiki - RelatedArticles Extension: from 1.43.X before 1.43.2." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/RelatedArticles/+/1166024", + "source": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc" + }, + { + "url": "https://phabricator.wikimedia.org/T396413", + "source": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-535xx/CVE-2025-53525.json b/CVE-2025/CVE-2025-535xx/CVE-2025-53525.json new file mode 100644 index 00000000000..4f85bbeb9c2 --- /dev/null +++ b/CVE-2025/CVE-2025-535xx/CVE-2025-53525.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-53525", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-07-07T17:15:29.530", + "lastModified": "2025-07-07T17:15:29.530", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "WeGIA is a web manager for charitable institutions. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the profile_familiar.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the id_dependente parameter. This vulnerability is fixed in 3.4.3." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 2.0, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "ACTIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "LOW", + "subIntegrityImpact": "LOW", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/LabRedesCefetRJ/WeGIA/commit/45695edc5ff7689f14efcfddb37e0323df34e184", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-982x-v58q-6qpj", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-535xx/CVE-2025-53526.json b/CVE-2025/CVE-2025-535xx/CVE-2025-53526.json new file mode 100644 index 00000000000..698c14a14e5 --- /dev/null +++ b/CVE-2025/CVE-2025-535xx/CVE-2025-53526.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-53526", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-07-07T17:15:29.690", + "lastModified": "2025-07-07T17:15:29.690", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "WeGIA is a web manager for charitable institutions. An XSS Injection vulnerability was identified in novo_memorando.php.\nAfter the memo was submitted, the vulnerability was confirmed by accessing listar_memorandos_antigos.php. Upon loading this page, the injected script was executed in the browser. This vulnerability is fixed in 3.4.3." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 2.0, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "ACTIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "LOW", + "subIntegrityImpact": "LOW", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/LabRedesCefetRJ/WeGIA/commit/f8cf5d0473334e6c28ea7f604da11ee2a7b419df", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-46fm-hx2r-69fg", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-535xx/CVE-2025-53527.json b/CVE-2025/CVE-2025-535xx/CVE-2025-53527.json new file mode 100644 index 00000000000..93da8d8a68a --- /dev/null +++ b/CVE-2025/CVE-2025-535xx/CVE-2025-53527.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-53527", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-07-07T17:15:29.860", + "lastModified": "2025-07-07T17:15:29.860", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "WeGIA is a web manager for charitable institutions. A Time-Based Blind SQL Injection vulnerability was discovered in the almox parameter of the /controle/relatorio_geracao.php endpoint. This issue allows attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration. This vulnerability is fixed in 3.4.1." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/LabRedesCefetRJ/WeGIA/commit/9de9a741d1d26ae76b2215a32660817d9bd452aa", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-43xw-c4g6-jgff", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-535xx/CVE-2025-53529.json b/CVE-2025/CVE-2025-535xx/CVE-2025-53529.json new file mode 100644 index 00000000000..fdf0f1d6ac6 --- /dev/null +++ b/CVE-2025/CVE-2025-535xx/CVE-2025-53529.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-53529", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-07-07T17:15:30.030", + "lastModified": "2025-07-07T17:15:30.030", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "WeGIA is a web manager for charitable institutions. An SQL Injection vulnerability was identified in the /html/funcionario/profile_funcionario.php endpoint. The id_funcionario parameter is not properly sanitized or validated before being used in a SQL query, allowing an unauthenticated attacker to inject arbitrary SQL commands. The vulnerability is fixed in 3.4.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/LabRedesCefetRJ/WeGIA/commit/0a061bcc5024937edd18ab3e65ccc8f38deb6957", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-rrj6-pj6w-8j2r", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-535xx/CVE-2025-53530.json b/CVE-2025/CVE-2025-535xx/CVE-2025-53530.json new file mode 100644 index 00000000000..87cd4fb0d4e --- /dev/null +++ b/CVE-2025/CVE-2025-535xx/CVE-2025-53530.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-53530", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-07-07T17:15:30.197", + "lastModified": "2025-07-07T17:15:30.197", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "WeGIA is a web manager for charitable institutions. The Wegia server has a vulnerability that allows excessively long HTTP GET requests to a specific URL. This issue arises from the lack of validation for the length of the errorstr parameter. Tests confirmed that the server processes URLs up to 8,142 characters, resulting in high resource consumption, elevated latency, timeouts, and read errors. This makes the server susceptible to Denial of Service (DoS) attacks. This vulnerability is fixed in 3.3.0." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-562r-xgj9-2r7p", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-535xx/CVE-2025-53531.json b/CVE-2025/CVE-2025-535xx/CVE-2025-53531.json new file mode 100644 index 00000000000..44433294c15 --- /dev/null +++ b/CVE-2025/CVE-2025-535xx/CVE-2025-53531.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-53531", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-07-07T17:15:30.363", + "lastModified": "2025-07-07T17:15:30.363", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "WeGIA is a web manager for charitable institutions. The Wegia server has a vulnerability that allows excessively long HTTP GET requests to a specific URL. This issue arises from the lack of validation for the length of the fid parameter. Tests confirmed that the server processes URLs up to 8,142 characters, resulting in high resource consumption, elevated latency, timeouts, and read errors. This makes the server susceptible to Denial of Service (DoS) attacks. This vulnerability is fixed in 3.3.0." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-4ffc-f23j-54m3", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-535xx/CVE-2025-53532.json b/CVE-2025/CVE-2025-535xx/CVE-2025-53532.json new file mode 100644 index 00000000000..d4db3a61a03 --- /dev/null +++ b/CVE-2025/CVE-2025-535xx/CVE-2025-53532.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-53532", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-07-07T17:15:30.533", + "lastModified": "2025-07-07T17:15:30.533", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "giscus is a commenting system powered by GitHub Discussions. A bug in giscus' discussions creation API allowed an unauthorized user to create discussions on any repository where giscus is installed. This affects the server-side part of giscus, which is provided via http://giscus.app or your own self-hosted service. This vulnerability is fixed by the c43af7806e65adfcf4d0feeebef76dc36c95cb9a and 4b9745fe1a326ce08d69f8a388331bc993d19389 commits." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/giscus/giscus/commit/4b9745fe1a326ce08d69f8a388331bc993d19389", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/giscus/giscus/commit/c43af7806e65adfcf4d0feeebef76dc36c95cb9a", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/giscus/giscus/security/advisories/GHSA-w6vg-v24f-4vm3", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5813.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5813.json index df6c6287697..e4a199559f3 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5813.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5813.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5813", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-26T03:15:24.800", - "lastModified": "2025-06-26T18:57:43.670", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T16:04:42.837", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:suhailahmad64:amazon_products_to_woocommerce:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.2.7", + "matchCriteriaId": "0DC397EF-BDEE-420B-A9EB-044427283169" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/import-products-to-wc/trunk/inc/functions.php#L266", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a0906540-46fc-4f76-9265-cb87c6340fad?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5929.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5929.json index d6da38b9a7f..cb8a3f38c02 100644 --- a/CVE-2025/CVE-2025-59xx/CVE-2025-5929.json +++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5929.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5929", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-26T03:15:24.953", - "lastModified": "2025-06-26T18:57:43.670", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T16:04:01.473", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zourbuth:the_countdown:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.0.1", + "matchCriteriaId": "C910F21D-5888-4AD8-9DF7-5977578D4864" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/the-countdown/tags/2.0.1/the-countdown.php#L95", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://wordpress.org/plugins/the-countdown/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product", + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/34578df8-661c-4c54-b06c-e1d787ca3c55?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5932.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5932.json index 12e8ba74304..fe548d0eb6f 100644 --- a/CVE-2025/CVE-2025-59xx/CVE-2025-5932.json +++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5932.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5932", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-26T03:15:25.110", - "lastModified": "2025-06-26T18:57:43.670", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T16:03:18.250", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:coolrunner:homerunner:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0.29", + "matchCriteriaId": "C307CDA2-7F38-4E71-A149-7B578715E860" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/homerunner-smartcheckout/tags/1.0.29/classes/class-settings.php#L319", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/36eaff34-50cd-4399-8314-19ae4f50d017?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-62xx/CVE-2025-6290.json b/CVE-2025/CVE-2025-62xx/CVE-2025-6290.json index 225c236b3f3..0b3ae22f4c5 100644 --- a/CVE-2025/CVE-2025-62xx/CVE-2025-6290.json +++ b/CVE-2025/CVE-2025-62xx/CVE-2025-6290.json @@ -2,8 +2,8 @@ "id": "CVE-2025-6290", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-26T02:15:22.733", - "lastModified": "2025-06-26T18:57:43.670", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T17:16:39.837", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:blakelong:tournament_bracket_generator:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0.0", + "matchCriteriaId": "6B0FDE73-B59B-420F-B856-E46A4DC85FEE" + } + ] + } + ] + } + ], "references": [ { "url": "https://wordpress.org/plugins/tournament-bracket-generator/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product", + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bdde01aa-2d38-4085-b11a-ef8633ee928a?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-63xx/CVE-2025-6378.json b/CVE-2025/CVE-2025-63xx/CVE-2025-6378.json index de4d8b06b2c..0f3d23803ac 100644 --- a/CVE-2025/CVE-2025-63xx/CVE-2025-6378.json +++ b/CVE-2025/CVE-2025-63xx/CVE-2025-6378.json @@ -2,8 +2,8 @@ "id": "CVE-2025-6378", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-26T02:15:22.887", - "lastModified": "2025-06-26T18:57:43.670", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T17:15:44.053", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:corporatezen:responsive_food_and_drink_menu:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.3", + "matchCriteriaId": "613287C3-884A-46EF-A806-3FFBFDAB231B" + } + ] + } + ] + } + ], "references": [ { "url": "https://wordpress.org/plugins/responsive-food-and-drink-menu/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product", + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/342ccae4-2e77-4a4f-963f-689b882eb7f0?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-63xx/CVE-2025-6383.json b/CVE-2025/CVE-2025-63xx/CVE-2025-6383.json index bccc362433c..d584cd3ed82 100644 --- a/CVE-2025/CVE-2025-63xx/CVE-2025-6383.json +++ b/CVE-2025/CVE-2025-63xx/CVE-2025-6383.json @@ -2,8 +2,8 @@ "id": "CVE-2025-6383", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-26T02:15:23.040", - "lastModified": "2025-06-26T18:57:43.670", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T17:15:05.383", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fmos:wp-photonav:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.2.2", + "matchCriteriaId": "421977B3-D627-4C04-A795-661809371F26" + } + ] + } + ] + } + ], "references": [ { "url": "https://wordpress.org/plugins/wp-photonav/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product", + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c07054e1-b6c9-4e70-aece-09f81bb418ef?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-66xx/CVE-2025-6658.json b/CVE-2025/CVE-2025-66xx/CVE-2025-6658.json index 6a934f1b2b3..7d535213a0a 100644 --- a/CVE-2025/CVE-2025-66xx/CVE-2025-6658.json +++ b/CVE-2025/CVE-2025-66xx/CVE-2025-6658.json @@ -2,8 +2,8 @@ "id": "CVE-2025-6658", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2025-06-25T22:15:23.597", - "lastModified": "2025-06-26T18:57:43.670", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T17:39:44.360", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pdf-xchange:pdf-tools:10.5.2.395:*:*:*:*:*:*:*", + "matchCriteriaId": "2BD9DF1A-4580-487C-B5CD-5CFEA9B9EFC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:10.5.2.395:*:*:*:*:*:*:*", + "matchCriteriaId": "38301DEE-CA79-48C7-9E8C-1EA9EDEFACD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_pro:10.5.2.395:*:*:*:*:*:*:*", + "matchCriteriaId": "2BF8A7ED-1520-4BCA-9AF4-7D7CE59458D3" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.pdf-xchange.com/support/security-bulletins.html", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-444/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-66xx/CVE-2025-6659.json b/CVE-2025/CVE-2025-66xx/CVE-2025-6659.json index f3940e02c5f..9106f60a253 100644 --- a/CVE-2025/CVE-2025-66xx/CVE-2025-6659.json +++ b/CVE-2025/CVE-2025-66xx/CVE-2025-6659.json @@ -2,8 +2,8 @@ "id": "CVE-2025-6659", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2025-06-25T22:15:23.740", - "lastModified": "2025-06-26T18:57:43.670", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T17:39:19.650", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pdf-xchange:pdf-tools:10.5.2.395:*:*:*:*:*:*:*", + "matchCriteriaId": "2BD9DF1A-4580-487C-B5CD-5CFEA9B9EFC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:10.5.2.395:*:*:*:*:*:*:*", + "matchCriteriaId": "38301DEE-CA79-48C7-9E8C-1EA9EDEFACD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_pro:10.5.2.395:*:*:*:*:*:*:*", + "matchCriteriaId": "2BF8A7ED-1520-4BCA-9AF4-7D7CE59458D3" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.pdf-xchange.com/support/security-bulletins.html", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-445/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-66xx/CVE-2025-6660.json b/CVE-2025/CVE-2025-66xx/CVE-2025-6660.json index 73b0420c0e9..1c9a95b4305 100644 --- a/CVE-2025/CVE-2025-66xx/CVE-2025-6660.json +++ b/CVE-2025/CVE-2025-66xx/CVE-2025-6660.json @@ -2,8 +2,8 @@ "id": "CVE-2025-6660", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2025-06-25T22:15:23.863", - "lastModified": "2025-06-26T18:57:43.670", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-07T17:37:13.450", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pdf-xchange:pdf-tools:10.5.2.395:*:*:*:*:*:*:*", + "matchCriteriaId": "2BD9DF1A-4580-487C-B5CD-5CFEA9B9EFC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:10.5.2.395:*:*:*:*:*:*:*", + "matchCriteriaId": "38301DEE-CA79-48C7-9E8C-1EA9EDEFACD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_pro:10.5.2.395:*:*:*:*:*:*:*", + "matchCriteriaId": "2BF8A7ED-1520-4BCA-9AF4-7D7CE59458D3" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.pdf-xchange.com/support/security-bulletins.html", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-443/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7057.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7057.json new file mode 100644 index 00000000000..783183bfe68 --- /dev/null +++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7057.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2025-7057", + "sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc", + "published": "2025-07-07T16:15:26.123", + "lastModified": "2025-07-07T16:15:26.123", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Wikimedia Foundation Mediawiki - Quiz Extension allows Stored XSS.This issue affects Mediawiki - Quiz Extension: from 1.39.X before 1.39.13, from 1.42.X before 1.42.7, from 1.43.X before 1.43.2." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Quiz/+/1166274", + "source": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc" + }, + { + "url": "https://phabricator.wikimedia.org/T394612", + "source": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7060.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7060.json index 2f889a950c2..987561fb2f5 100644 --- a/CVE-2025/CVE-2025-70xx/CVE-2025-7060.json +++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7060.json @@ -2,13 +2,17 @@ "id": "CVE-2025-7060", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-04T11:15:51.683", - "lastModified": "2025-07-04T11:15:51.683", + "lastModified": "2025-07-07T17:15:31.427", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Monitorr up to 1.7.6m. It has been classified as problematic. This affects an unknown part of the file assets/config/_installation/mkdbajax.php of the component Installer. The manipulation of the argument datadir leads to improper input validation. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Monitorr hasta la versi\u00f3n 1.7.6m. Se ha clasificado como problem\u00e1tica. Afecta a una parte desconocida del archivo assets/config/_installation/mkdbajax.php del componente Installer. La manipulaci\u00f3n del argumento datadir provoca una validaci\u00f3n de entrada incorrecta. Es posible iniciar el ataque de forma remota. Es un ataque de complejidad bastante alta. Parece dif\u00edcil de explotar. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -128,6 +132,10 @@ { "url": "https://vuldb.com/?submit.602080", "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.602080", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7061.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7061.json index 5ff9ed81cb9..bf04e057623 100644 --- a/CVE-2025/CVE-2025-70xx/CVE-2025-7061.json +++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7061.json @@ -2,13 +2,17 @@ "id": "CVE-2025-7061", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-04T13:15:25.987", - "lastModified": "2025-07-04T13:15:25.987", + "lastModified": "2025-07-07T17:15:31.597", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Intelbras InControl up to 2.21.60.9. It has been declared as problematic. This vulnerability affects unknown code of the file /v1/operador/. The manipulation leads to csv injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Intelbras InControl hasta la versi\u00f3n 2.21.60.9. Se ha declarado problem\u00e1tica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /v1/operador/. La manipulaci\u00f3n provoca la inyecci\u00f3n de CSV. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -132,6 +136,10 @@ { "url": "https://vuldb.com/?submit.600881", "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.600881", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7074.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7074.json index 42e298440d8..cdbde3cc8ff 100644 --- a/CVE-2025/CVE-2025-70xx/CVE-2025-7074.json +++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7074.json @@ -2,13 +2,17 @@ "id": "CVE-2025-7074", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-05T09:15:27.913", - "lastModified": "2025-07-05T09:15:27.913", + "lastModified": "2025-07-07T16:15:26.250", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic has been found in vercel hyper up to 3.4.1. This affects the function expand/braceExpand/ignoreMap of the file hyper/bin/rimraf-standalone.js. The manipulation leads to inefficient regular expression complexity. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como problem\u00e1tica en Vercel Hyper (hasta la versi\u00f3n 3.4.1). Esta afecta a la funci\u00f3n expand/braceExpand/ignoreMap del archivo hyper/bin/rimraf-standalone.js. La manipulaci\u00f3n genera una complejidad ineficiente en las expresiones regulares. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +140,10 @@ { "url": "https://vuldb.com/?submit.602353", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/vercel/hyper/issues/8098", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7075.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7075.json index 0f9e7ca9169..7394e48c281 100644 --- a/CVE-2025/CVE-2025-70xx/CVE-2025-7075.json +++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7075.json @@ -2,13 +2,17 @@ "id": "CVE-2025-7075", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-06T00:15:22.177", - "lastModified": "2025-07-06T00:15:22.177", + "lastModified": "2025-07-07T16:15:26.400", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in BlackVue Dashcam 590X up to 20250624. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /upload.cgi of the component HTTP Endpoint. The manipulation leads to unrestricted upload. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se detect\u00f3 una vulnerabilidad en BlackVue Dashcam 590X hasta la versi\u00f3n 20250624. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /upload.cgi del componente HTTP Endpoint. La manipulaci\u00f3n permite una carga sin restricciones. El ataque debe realizarse dentro de la red local. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta vulnerabilidad, pero no respondi\u00f3." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +140,10 @@ { "url": "https://vuldb.com/?submit.603301", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/geo-chen/BlackVue/blob/main/README.md#finding-1-unauthenticated-upload-endpoint-on-http", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7076.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7076.json index 7599d9fbf5d..f69f3a61159 100644 --- a/CVE-2025/CVE-2025-70xx/CVE-2025-7076.json +++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7076.json @@ -2,13 +2,17 @@ "id": "CVE-2025-7076", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-06T01:15:20.563", - "lastModified": "2025-07-06T01:15:20.563", + "lastModified": "2025-07-07T16:15:26.560", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in BlackVue Dashcam 590X up to 20250624. It has been rated as critical. Affected by this issue is some unknown functionality of the file /upload.cgi of the component Configuration Handler. The manipulation leads to improper access controls. The attack needs to be initiated within the local network. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en BlackVue Dashcam 590X hasta la versi\u00f3n 20250624. Se ha clasificado como cr\u00edtica. Este problema afecta a una funcionalidad desconocida del archivo /upload.cgi del componente \"Configuration Handler\". La manipulaci\u00f3n genera controles de acceso inadecuados. El ataque debe iniciarse dentro de la red local. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +140,10 @@ { "url": "https://vuldb.com/?submit.603305", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/geo-chen/BlackVue/blob/main/README.md#finding-2-unauthenticated-modifications-to-dashcam-configurations", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7077.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7077.json index f0178076e7b..85b1faa270d 100644 --- a/CVE-2025/CVE-2025-70xx/CVE-2025-7077.json +++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7077.json @@ -2,13 +2,17 @@ "id": "CVE-2025-7077", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-06T07:15:35.383", - "lastModified": "2025-07-06T07:15:35.383", + "lastModified": "2025-07-07T17:15:31.753", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in Shenzhen Libituo Technology LBT-T300-T310 up to 2.2.3.6. This affects the function config_3g_para of the file /appy.cgi. The manipulation of the argument username_3g/password_3g leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad cr\u00edtica en Shenzhen Libituo Technology LBT-T300-T310 (hasta la versi\u00f3n 2.2.3.6). Esta vulnerabilidad afecta a la funci\u00f3n config_3g_para del archivo /appy.cgi. La manipulaci\u00f3n del argumento username_3g/password_3g provoca un desbordamiento del b\u00fafer. Es posible iniciar el ataque en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Otros par\u00e1metros tambi\u00e9n podr\u00edan verse afectados. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +140,10 @@ { "url": "https://vuldb.com/?submit.603012", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/FLY200503/IoT-vul/tree/master/LBT-T300", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7078.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7078.json index 5970ae1503c..e8a52575831 100644 --- a/CVE-2025/CVE-2025-70xx/CVE-2025-7078.json +++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7078.json @@ -2,13 +2,17 @@ "id": "CVE-2025-7078", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-06T09:15:23.400", - "lastModified": "2025-07-06T09:15:23.400", + "lastModified": "2025-07-07T17:15:31.903", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic was found in 07FLYCMS, 07FLY-CMS and 07FlyCRM up to 1.3.9. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This product is published under multiple names. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se detect\u00f3 una vulnerabilidad clasificada como problem\u00e1tica en 07FLYCMS, 07FLY-CMS y 07FlyCRM hasta la versi\u00f3n 1.3.9. Esta vulnerabilidad afecta a c\u00f3digo desconocido. La manipulaci\u00f3n provoca cross-site request forgery. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Este producto se publica con varios nombres. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +140,10 @@ { "url": "https://vuldb.com/?submit.603552", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Excentique/yuxuan_mei/blob/main/07fly-crm_1.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7079.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7079.json index 7b57243d309..3c6fe538d04 100644 --- a/CVE-2025/CVE-2025-70xx/CVE-2025-7079.json +++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7079.json @@ -2,13 +2,17 @@ "id": "CVE-2025-7079", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-06T13:15:35.413", - "lastModified": "2025-07-06T13:15:35.413", + "lastModified": "2025-07-07T17:15:32.050", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, has been found in mao888 bluebell-plus up to 2.3.0. This issue affects some unknown processing of the file bluebell_backend/pkg/jwt/jwt.go of the component JWT Token Handler. The manipulation of the argument mySecret with the input bluebell-plus leads to use of hard-coded password. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como problem\u00e1tica en mao888 bluebell-plus hasta la versi\u00f3n 2.3.0. Este problema afecta a un procesamiento desconocido del archivo bluebell_backend/pkg/jwt/jwt.go del componente JWT Token Handler. La manipulaci\u00f3n del argumento mySecret con la entrada bluebell-plus da lugar al uso de una contrase\u00f1a predefinida. El ataque puede ejecutarse en remoto. Es un ataque de complejidad bastante alta. Parece dif\u00edcil de explotar. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +140,10 @@ { "url": "https://vuldb.com/?submit.603726", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/mao888/bluebell-plus/issues/35", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7083.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7083.json index 33e2f362e03..abf34390efb 100644 --- a/CVE-2025/CVE-2025-70xx/CVE-2025-7083.json +++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7083.json @@ -2,13 +2,17 @@ "id": "CVE-2025-7083", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-06T16:15:27.780", - "lastModified": "2025-07-06T16:15:27.780", + "lastModified": "2025-07-07T16:15:26.727", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Belkin F9K1122 1.00.33. It has been classified as critical. This affects the function mp of the file /goform/mp of the component webs. The manipulation of the argument command leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Belkin F9K1122 1.00.33. Se ha clasificado como cr\u00edtica. Afecta la funci\u00f3n mp del archivo /goform/mp del componente webs. La manipulaci\u00f3n del comando \"argument\" provoca la inyecci\u00f3n de comandos del sistema operativo. Es posible iniciar el ataque en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.603673", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/wudipjq/my_vuln/blob/main/Belkin/vuln_3/3.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7084.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7084.json index e17d8c0096d..e3fb82c3803 100644 --- a/CVE-2025/CVE-2025-70xx/CVE-2025-7084.json +++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7084.json @@ -2,13 +2,17 @@ "id": "CVE-2025-7084", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-06T16:15:28.447", - "lastModified": "2025-07-06T16:15:28.447", + "lastModified": "2025-07-07T16:15:26.873", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Belkin F9K1122 1.00.33. It has been declared as critical. This vulnerability affects the function formWpsStart of the file /goform/formWpsStart of the component webs. The manipulation of the argument pinCode leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Belkin F9K1122 1.00.33. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n formWpsStart del archivo /goform/formWpsStart del componente webs. La manipulaci\u00f3n del argumento pinCode provoca un desbordamiento del b\u00fafer basado en la pila. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.603674", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/wudipjq/my_vuln/blob/main/Belkin/vuln_4/4.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7085.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7085.json index 5d6869ea6cb..475247ac934 100644 --- a/CVE-2025/CVE-2025-70xx/CVE-2025-7085.json +++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7085.json @@ -2,13 +2,17 @@ "id": "CVE-2025-7085", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-06T17:15:23.197", - "lastModified": "2025-07-06T17:15:23.197", + "lastModified": "2025-07-07T16:15:27.007", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Belkin F9K1122 1.00.33. It has been rated as critical. This issue affects the function formiNICWpsStart of the file /goform/formiNICWpsStart of the component webs. The manipulation of the argument pinCode leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Belkin F9K1122 1.00.33. Se ha clasificado como cr\u00edtica. Este problema afecta a la funci\u00f3n formiNICWpsStart del archivo /goform/formiNICWpsStart del componente webs. La manipulaci\u00f3n del argumento pinCode provoca un desbordamiento del b\u00fafer basado en la pila. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.603694", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/wudipjq/my_vuln/blob/main/Belkin/vuln_5/5.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7087.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7087.json index bd008c85107..13504d6eaef 100644 --- a/CVE-2025/CVE-2025-70xx/CVE-2025-7087.json +++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7087.json @@ -2,13 +2,17 @@ "id": "CVE-2025-7087", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-06T18:15:21.863", - "lastModified": "2025-07-06T18:15:21.863", + "lastModified": "2025-07-07T16:15:27.140", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in Belkin F9K1122 1.00.33. Affected by this vulnerability is the function formL2TPSetup of the file /goform/formL2TPSetup of the component webs. The manipulation of the argument L2TPUserName leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se detect\u00f3 una vulnerabilidad cr\u00edtica en Belkin F9K1122 1.00.33. Esta vulnerabilidad afecta a la funci\u00f3n formL2TPSetup del archivo /goform/formL2TPSetup del componente webs. La manipulaci\u00f3n del argumento L2TPUserName provoca un desbordamiento del b\u00fafer basado en la pila. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.603696", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/wudipjq/my_vuln/blob/main/Belkin/vuln_7/7.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7088.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7088.json index d2ff5f3f9f3..3d95be52c40 100644 --- a/CVE-2025/CVE-2025-70xx/CVE-2025-7088.json +++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7088.json @@ -2,13 +2,17 @@ "id": "CVE-2025-7088", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-06T18:15:22.683", - "lastModified": "2025-07-06T18:15:22.683", + "lastModified": "2025-07-07T16:15:27.267", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in Belkin F9K1122 1.00.33. This affects the function formPPPoESetup of the file /goform/formPPPoESetup of the component webs. The manipulation of the argument pppUserName leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en Belkin F9K1122 1.00.33. Esta afecta a la funci\u00f3n formPPPoESetup del archivo /goform/formPPPoESetup del componente webs. La manipulaci\u00f3n del argumento pppUserName provoca un desbordamiento del b\u00fafer basado en la pila. Es posible iniciar el ataque en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.603697", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/wudipjq/my_vuln/blob/main/Belkin/vuln_8/8.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7089.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7089.json index d7e4dd84771..9258fe906da 100644 --- a/CVE-2025/CVE-2025-70xx/CVE-2025-7089.json +++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7089.json @@ -2,13 +2,17 @@ "id": "CVE-2025-7089", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-06T19:15:24.420", - "lastModified": "2025-07-06T19:15:24.420", + "lastModified": "2025-07-07T16:15:27.437", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Belkin F9K1122 1.00.33 and classified as critical. This issue affects the function formWanTcpipSetup of the file /goform/formWanTcpipSetup of the component webs. The manipulation of the argument pppUserName leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Belkin F9K1122 1.00.33, clasificada como cr\u00edtica. Este problema afecta a la funci\u00f3n formWanTcpipSetup del archivo /goform/formWanTcpipSetup del componente webs. La manipulaci\u00f3n del argumento pppUserName provoca un desbordamiento del b\u00fafer basado en la pila. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.603698", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/wudipjq/my_vuln/blob/main/Belkin/vuln_9/9.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7090.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7090.json index 023b9f86d4a..43eafb496b1 100644 --- a/CVE-2025/CVE-2025-70xx/CVE-2025-7090.json +++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7090.json @@ -2,13 +2,17 @@ "id": "CVE-2025-7090", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-06T19:15:24.693", - "lastModified": "2025-07-06T19:15:24.693", + "lastModified": "2025-07-07T16:15:27.590", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in Belkin F9K1122 1.00.33. Affected by this issue is the function formConnectionSetting of the file /goform/formConnectionSetting of the component webs. The manipulation of the argument max_Conn/timeOut leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en Belkin F9K1122 1.00.33. Este problema afecta a la funci\u00f3n formConnectionSetting del archivo /goform/formConnectionSetting del componente webs. La manipulaci\u00f3n del argumento max_Conn/timeOut provoca un desbordamiento del b\u00fafer basado en la pila. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.603699", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/wudipjq/my_vuln/blob/main/Belkin/vuln_10/10.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7091.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7091.json index e538b431245..eb92187d6c5 100644 --- a/CVE-2025/CVE-2025-70xx/CVE-2025-7091.json +++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7091.json @@ -2,13 +2,17 @@ "id": "CVE-2025-7091", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-06T20:15:23.800", - "lastModified": "2025-07-06T20:15:23.800", + "lastModified": "2025-07-07T16:15:27.727", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Belkin F9K1122 1.00.33. It has been classified as critical. Affected is the function formWlanMP of the file /goform/formWlanMP of the component webs. The manipulation of the argument ateFunc/ateGain/ateTxCount/ateChan/ateRate/ateMacID/e2pTxPower1/e2pTxPower2/e2pTxPower3/e2pTxPower4/e2pTxPower5/e2pTxPower6/e2pTxPower7/e2pTx2Power1/e2pTx2Power2/e2pTx2Power3/e2pTx2Power4/e2pTx2Power5/e2pTx2Power6/e2pTx2Power7/ateTxFreqOffset/ateMode/ateBW/ateAntenna/e2pTxFreqOffset/e2pTxPwDeltaB/e2pTxPwDeltaG/e2pTxPwDeltaMix/e2pTxPwDeltaN/readE2P leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Belkin F9K1122 1.00.33. Se ha clasificado como cr\u00edtica. La funci\u00f3n formWlanMP del archivo /goform/formWlanMP del componente webs se ve afectada. La manipulaci\u00f3n del argumento ateFunc/ateGain/ateTxCount/ateChan/ateRate/ateMacID/e2pTxPower1/e2pTxPower2/e2pTxPower3/e2pTxPower4/e2pTxPower5/e2pTxPower6/e2pTxPower7/e2pTx2Power1/e2pTx2Power2/e2pTx2Power3/e2pTx2Power4/e2pTx2Power5/e2pTx2Power6/e2pTx2Power7/ateTxFreqOffset/ateMode/ateBW/ateAntenna/e2pTxFreqOffset/e2pTxPwDeltaB/e2pTxPwDeltaG/e2pTxPwDeltaMix/e2pTxPwDeltaN/readE2P provoca un desbordamiento del b\u00fafer basado en la pila. Es posible lanzar el ataque en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.603700", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/wudipjq/my_vuln/blob/main/Belkin/vuln_11/11.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7092.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7092.json index b4834337040..6abe72764ca 100644 --- a/CVE-2025/CVE-2025-70xx/CVE-2025-7092.json +++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7092.json @@ -2,13 +2,17 @@ "id": "CVE-2025-7092", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-06T20:15:24.000", - "lastModified": "2025-07-06T20:15:24.000", + "lastModified": "2025-07-07T16:15:27.860", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in Belkin F9K1122 1.00.33 and classified as critical. This vulnerability affects the function formWlanSetupWPS of the file /goform/formWlanSetupWPS of the component webs. The manipulation of the argument wps_enrolee_pin/webpage leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en Belkin F9K1122 1.00.33, clasificada como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n formWlanSetupWPS del archivo /goform/formWlanSetupWPS del componente webs. La manipulaci\u00f3n del argumento wps_enrolee_pin/webpage provoca un desbordamiento del b\u00fafer basado en la pila. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.603701", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/wudipjq/my_vuln/blob/main/Belkin/vuln_12/12.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7093.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7093.json index 89694d56b9b..a5fc55645aa 100644 --- a/CVE-2025/CVE-2025-70xx/CVE-2025-7093.json +++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7093.json @@ -2,13 +2,17 @@ "id": "CVE-2025-7093", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-06T21:15:20.830", - "lastModified": "2025-07-06T21:15:20.830", + "lastModified": "2025-07-07T16:15:27.993", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Belkin F9K1122 1.00.33. It has been declared as critical. Affected by this vulnerability is the function formSetLanguage of the file /goform/formSetLanguage of the component webs. The manipulation of the argument webpage leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Belkin F9K1122 1.00.33. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n formSetLanguage del archivo /goform/formSetLanguage del componente webs. La manipulaci\u00f3n del argumento webpage provoca un desbordamiento del b\u00fafer basado en la pila. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.603710", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/wudipjq/my_vuln/blob/main/Belkin/vuln_13/13.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7094.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7094.json index 75970bfb4a0..7bd122f9ab8 100644 --- a/CVE-2025/CVE-2025-70xx/CVE-2025-7094.json +++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7094.json @@ -2,13 +2,17 @@ "id": "CVE-2025-7094", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-06T21:15:21.727", - "lastModified": "2025-07-06T21:15:21.727", + "lastModified": "2025-07-07T16:15:28.120", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Belkin F9K1122 1.00.33. It has been rated as critical. Affected by this issue is the function formBSSetSitesurvey of the file /goform/formBSSetSitesurvey of the component webs. The manipulation of the argument submit-url-ok leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Belkin F9K1122 1.00.33. Se ha clasificado como cr\u00edtica. Este problema afecta a la funci\u00f3n formBSSetSitesurvey del archivo /goform/formBSSetSitesurvey del componente webs. La manipulaci\u00f3n del argumento \"submit-url-ok\" provoca un desbordamiento del b\u00fafer basado en la pila. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.603711", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/wudipjq/my_vuln/blob/main/Belkin/vuln_14/14.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7095.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7095.json index 1c15126233f..1cc1d37c969 100644 --- a/CVE-2025/CVE-2025-70xx/CVE-2025-7095.json +++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7095.json @@ -2,7 +2,7 @@ "id": "CVE-2025-7095", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-06T22:15:24.090", - "lastModified": "2025-07-06T22:15:24.090", + "lastModified": "2025-07-07T16:15:28.253", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +136,10 @@ { "url": "https://vuldb.com/?submit.603712", "source": "cna@vuldb.com" + }, + { + "url": "https://drive.google.com/file/d/1qnWarYsTSc5_sV6o8ULv0LBvGfKKXPxn/view", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7096.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7096.json index 4ebf6b9508f..b741a6e2a49 100644 --- a/CVE-2025/CVE-2025-70xx/CVE-2025-7096.json +++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7096.json @@ -2,7 +2,7 @@ "id": "CVE-2025-7096", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-06T22:15:25.067", - "lastModified": "2025-07-06T22:15:25.067", + "lastModified": "2025-07-07T16:15:28.390", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +136,10 @@ { "url": "https://vuldb.com/?submit.603713", "source": "cna@vuldb.com" + }, + { + "url": "https://drive.google.com/file/d/1qnWarYsTSc5_sV6o8ULv0LBvGfKKXPxn/view", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7097.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7097.json index da6927bc207..281e0b9eb93 100644 --- a/CVE-2025/CVE-2025-70xx/CVE-2025-7097.json +++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7097.json @@ -2,7 +2,7 @@ "id": "CVE-2025-7097", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-06T23:15:21.960", - "lastModified": "2025-07-06T23:15:21.960", + "lastModified": "2025-07-07T16:15:28.527", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +136,10 @@ { "url": "https://vuldb.com/?submit.603714", "source": "cna@vuldb.com" + }, + { + "url": "https://drive.google.com/file/d/1qnWarYsTSc5_sV6o8ULv0LBvGfKKXPxn/view", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7098.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7098.json index 3c6a19985f9..35d3eb2e6dd 100644 --- a/CVE-2025/CVE-2025-70xx/CVE-2025-7098.json +++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7098.json @@ -2,7 +2,7 @@ "id": "CVE-2025-7098", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-06T23:15:22.143", - "lastModified": "2025-07-06T23:15:22.143", + "lastModified": "2025-07-07T16:15:28.647", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +136,10 @@ { "url": "https://vuldb.com/?submit.603716", "source": "cna@vuldb.com" + }, + { + "url": "https://drive.google.com/file/d/1qnWarYsTSc5_sV6o8ULv0LBvGfKKXPxn/view", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7099.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7099.json index 17258d47ff6..e0c7f691a1b 100644 --- a/CVE-2025/CVE-2025-70xx/CVE-2025-7099.json +++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7099.json @@ -2,7 +2,7 @@ "id": "CVE-2025-7099", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-07T00:15:22.513", - "lastModified": "2025-07-07T00:15:22.513", + "lastModified": "2025-07-07T16:15:28.783", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +136,10 @@ { "url": "https://vuldb.com/?submit.604310", "source": "cna@vuldb.com" + }, + { + "url": "https://note-hxlab.wetolink.com/share/cQGEOmctNARD", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7100.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7100.json index 73b1b5cc9b1..7d0305f07bb 100644 --- a/CVE-2025/CVE-2025-71xx/CVE-2025-7100.json +++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7100.json @@ -2,7 +2,7 @@ "id": "CVE-2025-7100", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-07T01:15:22.633", - "lastModified": "2025-07-07T01:15:22.633", + "lastModified": "2025-07-07T16:15:28.920", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +136,10 @@ { "url": "https://vuldb.com/?submit.604455", "source": "cna@vuldb.com" + }, + { + "url": "https://note-hxlab.wetolink.com/share/KLjaD7oBzCSp", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7101.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7101.json index a00f4f82f89..85f5c03869f 100644 --- a/CVE-2025/CVE-2025-71xx/CVE-2025-7101.json +++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7101.json @@ -2,7 +2,7 @@ "id": "CVE-2025-7101", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-07T01:15:23.450", - "lastModified": "2025-07-07T01:15:23.450", + "lastModified": "2025-07-07T16:15:29.047", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +136,10 @@ { "url": "https://vuldb.com/?submit.604323", "source": "cna@vuldb.com" + }, + { + "url": "https://note-hxlab.wetolink.com/share/6wemW8CnOMbu", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7102.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7102.json index 3a681f43dff..a1bd658b249 100644 --- a/CVE-2025/CVE-2025-71xx/CVE-2025-7102.json +++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7102.json @@ -2,7 +2,7 @@ "id": "CVE-2025-7102", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-07T01:15:23.637", - "lastModified": "2025-07-07T01:15:23.637", + "lastModified": "2025-07-07T16:15:29.177", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +136,10 @@ { "url": "https://vuldb.com/?submit.604401", "source": "cna@vuldb.com" + }, + { + "url": "https://note-hxlab.wetolink.com/share/sEjaSsXWRNz1", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7103.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7103.json index 8c33ad93667..befdaff1a99 100644 --- a/CVE-2025/CVE-2025-71xx/CVE-2025-7103.json +++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7103.json @@ -2,7 +2,7 @@ "id": "CVE-2025-7103", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-07T02:15:20.693", - "lastModified": "2025-07-07T02:15:20.693", + "lastModified": "2025-07-07T16:15:29.303", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -132,6 +132,10 @@ { "url": "https://vuldb.com/?submit.604403", "source": "cna@vuldb.com" + }, + { + "url": "https://note-hxlab.wetolink.com/share/gRI0WyQLQsmd", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7107.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7107.json index d7dfea2679c..655649af4f2 100644 --- a/CVE-2025/CVE-2025-71xx/CVE-2025-7107.json +++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7107.json @@ -2,7 +2,7 @@ "id": "CVE-2025-7107", "sourceIdentifier": "cna@vuldb.com", "published": "2025-07-07T03:15:30.363", - "lastModified": "2025-07-07T03:15:30.363", + "lastModified": "2025-07-07T16:15:29.440", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -144,6 +144,10 @@ { "url": "https://vuldb.com/?submit.601043", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/vri-report/reports/issues/2", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7134.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7134.json new file mode 100644 index 00000000000..72d44740edb --- /dev/null +++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7134.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-7134", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-07-07T16:15:29.800", + "lastModified": "2025-07-07T16:15:29.800", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in Campcodes Online Recruitment Management System 1.0. This vulnerability affects unknown code of the file /admin/ajax.php?action=delete_application. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/wyl091256/CVE/issues/21", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.315046", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.315046", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.605952", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.campcodes.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7135.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7135.json new file mode 100644 index 00000000000..20988ee577d --- /dev/null +++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7135.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-7135", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-07-07T16:15:30.080", + "lastModified": "2025-07-07T16:15:30.080", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in Campcodes Online Recruitment Management System 1.0. This issue affects some unknown processing of the file /admin/ajax.php?action=save_vacancy. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/wyl091256/CVE/issues/22", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.315047", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.315047", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.605953", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.campcodes.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7136.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7136.json new file mode 100644 index 00000000000..d632c577924 --- /dev/null +++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7136.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-7136", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-07-07T17:15:32.693", + "lastModified": "2025-07-07T17:15:32.693", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in Campcodes Online Recruitment Management System 1.0. Affected is an unknown function of the file /admin/view_vacancy.php. The manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/wyl091256/CVE/issues/23", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.315048", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.315048", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.605954", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.campcodes.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7137.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7137.json new file mode 100644 index 00000000000..608ccf266bf --- /dev/null +++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7137.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-7137", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-07-07T17:15:32.903", + "lastModified": "2025-07-07T17:15:32.903", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in SourceCodester Best Salon Management System 1.0. It has been classified as critical. This affects an unknown part of the file /panel/schedule-staff.php. The manipulation of the argument staff_id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Colorado-all/cve/blob/main/Best%20salon%20management%20system/SQL-22.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.315051", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.315051", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.605984", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.sourcecodester.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-72xx/CVE-2025-7259.json b/CVE-2025/CVE-2025-72xx/CVE-2025-7259.json new file mode 100644 index 00000000000..e935e01d4be --- /dev/null +++ b/CVE-2025/CVE-2025-72xx/CVE-2025-7259.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-7259", + "sourceIdentifier": "cna@mongodb.com", + "published": "2025-07-07T16:15:30.440", + "lastModified": "2025-07-07T16:15:30.440", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An authorized user can issue queries with duplicate _id fields, that leads to unexpected behavior in MongoDB Server, which may result to crash. This issue can only be triggered by authorized users and cause Denial of Service. This issue affects MongoDB Server v8.1 version 8.1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@mongodb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "cna@mongodb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] + } + ], + "references": [ + { + "url": "https://jira.mongodb.org/browse/SERVER-102693", + "source": "cna@mongodb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index ec6529af461..a5fd49ac845 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-07-07T16:00:12.331705+00:00 +2025-07-07T18:00:11.094997+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-07-07T15:58:13.457000+00:00 +2025-07-07T17:59:56.147000+00:00 ``` ### Last Data Feed Release @@ -33,69 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -300635 +300671 ``` ### CVEs added in the last Commit -Recently added CVEs: `31` +Recently added CVEs: `36` -- [CVE-2025-6712](CVE-2025/CVE-2025-67xx/CVE-2025-6712.json) (`2025-07-07T15:15:28.890`) -- [CVE-2025-6713](CVE-2025/CVE-2025-67xx/CVE-2025-6713.json) (`2025-07-07T15:15:29.090`) -- [CVE-2025-6714](CVE-2025/CVE-2025-67xx/CVE-2025-6714.json) (`2025-07-07T15:15:29.263`) -- [CVE-2025-6793](CVE-2025/CVE-2025-67xx/CVE-2025-6793.json) (`2025-07-07T15:15:29.637`) -- [CVE-2025-6794](CVE-2025/CVE-2025-67xx/CVE-2025-6794.json) (`2025-07-07T15:15:29.793`) -- [CVE-2025-6795](CVE-2025/CVE-2025-67xx/CVE-2025-6795.json) (`2025-07-07T15:15:29.967`) -- [CVE-2025-6796](CVE-2025/CVE-2025-67xx/CVE-2025-6796.json) (`2025-07-07T15:15:30.283`) -- [CVE-2025-6797](CVE-2025/CVE-2025-67xx/CVE-2025-6797.json) (`2025-07-07T15:15:30.430`) -- [CVE-2025-6798](CVE-2025/CVE-2025-67xx/CVE-2025-6798.json) (`2025-07-07T15:15:30.563`) -- [CVE-2025-6799](CVE-2025/CVE-2025-67xx/CVE-2025-6799.json) (`2025-07-07T15:15:30.710`) -- [CVE-2025-6800](CVE-2025/CVE-2025-68xx/CVE-2025-6800.json) (`2025-07-07T15:15:30.847`) -- [CVE-2025-6801](CVE-2025/CVE-2025-68xx/CVE-2025-6801.json) (`2025-07-07T15:15:30.987`) -- [CVE-2025-6802](CVE-2025/CVE-2025-68xx/CVE-2025-6802.json) (`2025-07-07T15:15:31.123`) -- [CVE-2025-6803](CVE-2025/CVE-2025-68xx/CVE-2025-6803.json) (`2025-07-07T15:15:31.270`) -- [CVE-2025-6804](CVE-2025/CVE-2025-68xx/CVE-2025-6804.json) (`2025-07-07T15:15:31.407`) -- [CVE-2025-6805](CVE-2025/CVE-2025-68xx/CVE-2025-6805.json) (`2025-07-07T15:15:31.557`) -- [CVE-2025-6806](CVE-2025/CVE-2025-68xx/CVE-2025-6806.json) (`2025-07-07T15:15:31.700`) -- [CVE-2025-6807](CVE-2025/CVE-2025-68xx/CVE-2025-6807.json) (`2025-07-07T15:15:31.860`) -- [CVE-2025-6810](CVE-2025/CVE-2025-68xx/CVE-2025-6810.json) (`2025-07-07T15:15:32.020`) -- [CVE-2025-6811](CVE-2025/CVE-2025-68xx/CVE-2025-6811.json) (`2025-07-07T15:15:32.173`) -- [CVE-2025-7056](CVE-2025/CVE-2025-70xx/CVE-2025-7056.json) (`2025-07-07T14:15:25.407`) -- [CVE-2025-7130](CVE-2025/CVE-2025-71xx/CVE-2025-7130.json) (`2025-07-07T14:15:26.497`) -- [CVE-2025-7131](CVE-2025/CVE-2025-71xx/CVE-2025-7131.json) (`2025-07-07T14:15:26.707`) -- [CVE-2025-7132](CVE-2025/CVE-2025-71xx/CVE-2025-7132.json) (`2025-07-07T15:15:32.937`) -- [CVE-2025-7133](CVE-2025/CVE-2025-71xx/CVE-2025-7133.json) (`2025-07-07T15:15:33.210`) +- [CVE-2025-45479](CVE-2025/CVE-2025-454xx/CVE-2025-45479.json) (`2025-07-07T16:15:23.780`) +- [CVE-2025-47202](CVE-2025/CVE-2025-472xx/CVE-2025-47202.json) (`2025-07-07T16:15:23.943`) +- [CVE-2025-48367](CVE-2025/CVE-2025-483xx/CVE-2025-48367.json) (`2025-07-07T16:15:24.063`) +- [CVE-2025-52492](CVE-2025/CVE-2025-524xx/CVE-2025-52492.json) (`2025-07-07T16:15:24.233`) +- [CVE-2025-53373](CVE-2025/CVE-2025-533xx/CVE-2025-53373.json) (`2025-07-07T16:15:24.950`) +- [CVE-2025-53374](CVE-2025/CVE-2025-533xx/CVE-2025-53374.json) (`2025-07-07T16:15:25.113`) +- [CVE-2025-53375](CVE-2025/CVE-2025-533xx/CVE-2025-53375.json) (`2025-07-07T16:15:25.317`) +- [CVE-2025-53376](CVE-2025/CVE-2025-533xx/CVE-2025-53376.json) (`2025-07-07T16:15:25.467`) +- [CVE-2025-53377](CVE-2025/CVE-2025-533xx/CVE-2025-53377.json) (`2025-07-07T17:15:29.097`) +- [CVE-2025-53487](CVE-2025/CVE-2025-534xx/CVE-2025-53487.json) (`2025-07-07T16:15:25.623`) +- [CVE-2025-53491](CVE-2025/CVE-2025-534xx/CVE-2025-53491.json) (`2025-07-07T17:15:29.267`) +- [CVE-2025-53497](CVE-2025/CVE-2025-534xx/CVE-2025-53497.json) (`2025-07-07T17:15:29.400`) +- [CVE-2025-53525](CVE-2025/CVE-2025-535xx/CVE-2025-53525.json) (`2025-07-07T17:15:29.530`) +- [CVE-2025-53526](CVE-2025/CVE-2025-535xx/CVE-2025-53526.json) (`2025-07-07T17:15:29.690`) +- [CVE-2025-53527](CVE-2025/CVE-2025-535xx/CVE-2025-53527.json) (`2025-07-07T17:15:29.860`) +- [CVE-2025-53529](CVE-2025/CVE-2025-535xx/CVE-2025-53529.json) (`2025-07-07T17:15:30.030`) +- [CVE-2025-53530](CVE-2025/CVE-2025-535xx/CVE-2025-53530.json) (`2025-07-07T17:15:30.197`) +- [CVE-2025-53531](CVE-2025/CVE-2025-535xx/CVE-2025-53531.json) (`2025-07-07T17:15:30.363`) +- [CVE-2025-53532](CVE-2025/CVE-2025-535xx/CVE-2025-53532.json) (`2025-07-07T17:15:30.533`) +- [CVE-2025-7057](CVE-2025/CVE-2025-70xx/CVE-2025-7057.json) (`2025-07-07T16:15:26.123`) +- [CVE-2025-7134](CVE-2025/CVE-2025-71xx/CVE-2025-7134.json) (`2025-07-07T16:15:29.800`) +- [CVE-2025-7135](CVE-2025/CVE-2025-71xx/CVE-2025-7135.json) (`2025-07-07T16:15:30.080`) +- [CVE-2025-7136](CVE-2025/CVE-2025-71xx/CVE-2025-7136.json) (`2025-07-07T17:15:32.693`) +- [CVE-2025-7137](CVE-2025/CVE-2025-71xx/CVE-2025-7137.json) (`2025-07-07T17:15:32.903`) +- [CVE-2025-7259](CVE-2025/CVE-2025-72xx/CVE-2025-7259.json) (`2025-07-07T16:15:30.440`) ### CVEs modified in the last Commit -Recently modified CVEs: `82` +Recently modified CVEs: `104` -- [CVE-2025-6755](CVE-2025/CVE-2025-67xx/CVE-2025-6755.json) (`2025-07-07T14:37:41.387`) -- [CVE-2025-6916](CVE-2025/CVE-2025-69xx/CVE-2025-6916.json) (`2025-07-07T14:41:39.973`) -- [CVE-2025-6917](CVE-2025/CVE-2025-69xx/CVE-2025-6917.json) (`2025-07-07T14:42:17.613`) -- [CVE-2025-6929](CVE-2025/CVE-2025-69xx/CVE-2025-6929.json) (`2025-07-07T14:46:35.950`) -- [CVE-2025-6930](CVE-2025/CVE-2025-69xx/CVE-2025-6930.json) (`2025-07-07T14:46:23.903`) -- [CVE-2025-6935](CVE-2025/CVE-2025-69xx/CVE-2025-6935.json) (`2025-07-07T14:46:10.930`) -- [CVE-2025-6936](CVE-2025/CVE-2025-69xx/CVE-2025-6936.json) (`2025-07-07T14:45:57.567`) -- [CVE-2025-6938](CVE-2025/CVE-2025-69xx/CVE-2025-6938.json) (`2025-07-07T14:41:30.903`) -- [CVE-2025-6939](CVE-2025/CVE-2025-69xx/CVE-2025-6939.json) (`2025-07-07T14:41:20.020`) -- [CVE-2025-6940](CVE-2025/CVE-2025-69xx/CVE-2025-6940.json) (`2025-07-07T14:41:12.100`) -- [CVE-2025-6953](CVE-2025/CVE-2025-69xx/CVE-2025-6953.json) (`2025-07-07T14:38:29.763`) -- [CVE-2025-6954](CVE-2025/CVE-2025-69xx/CVE-2025-6954.json) (`2025-07-07T14:38:45.247`) -- [CVE-2025-6955](CVE-2025/CVE-2025-69xx/CVE-2025-6955.json) (`2025-07-07T14:38:56.467`) -- [CVE-2025-6956](CVE-2025/CVE-2025-69xx/CVE-2025-6956.json) (`2025-07-07T14:39:16.537`) -- [CVE-2025-6957](CVE-2025/CVE-2025-69xx/CVE-2025-6957.json) (`2025-07-07T14:39:24.860`) -- [CVE-2025-6958](CVE-2025/CVE-2025-69xx/CVE-2025-6958.json) (`2025-07-07T14:39:36.240`) -- [CVE-2025-6959](CVE-2025/CVE-2025-69xx/CVE-2025-6959.json) (`2025-07-07T14:39:44.820`) -- [CVE-2025-6960](CVE-2025/CVE-2025-69xx/CVE-2025-6960.json) (`2025-07-07T14:39:53.557`) -- [CVE-2025-6961](CVE-2025/CVE-2025-69xx/CVE-2025-6961.json) (`2025-07-07T14:40:04.140`) -- [CVE-2025-6962](CVE-2025/CVE-2025-69xx/CVE-2025-6962.json) (`2025-07-07T14:40:21.120`) -- [CVE-2025-6963](CVE-2025/CVE-2025-69xx/CVE-2025-6963.json) (`2025-07-07T14:40:29.430`) -- [CVE-2025-7125](CVE-2025/CVE-2025-71xx/CVE-2025-7125.json) (`2025-07-07T14:15:25.823`) -- [CVE-2025-7126](CVE-2025/CVE-2025-71xx/CVE-2025-7126.json) (`2025-07-07T14:15:25.993`) -- [CVE-2025-7127](CVE-2025/CVE-2025-71xx/CVE-2025-7127.json) (`2025-07-07T14:15:26.130`) -- [CVE-2025-7128](CVE-2025/CVE-2025-71xx/CVE-2025-7128.json) (`2025-07-07T14:15:26.267`) +- [CVE-2025-7076](CVE-2025/CVE-2025-70xx/CVE-2025-7076.json) (`2025-07-07T16:15:26.560`) +- [CVE-2025-7077](CVE-2025/CVE-2025-70xx/CVE-2025-7077.json) (`2025-07-07T17:15:31.753`) +- [CVE-2025-7078](CVE-2025/CVE-2025-70xx/CVE-2025-7078.json) (`2025-07-07T17:15:31.903`) +- [CVE-2025-7079](CVE-2025/CVE-2025-70xx/CVE-2025-7079.json) (`2025-07-07T17:15:32.050`) +- [CVE-2025-7083](CVE-2025/CVE-2025-70xx/CVE-2025-7083.json) (`2025-07-07T16:15:26.727`) +- [CVE-2025-7084](CVE-2025/CVE-2025-70xx/CVE-2025-7084.json) (`2025-07-07T16:15:26.873`) +- [CVE-2025-7085](CVE-2025/CVE-2025-70xx/CVE-2025-7085.json) (`2025-07-07T16:15:27.007`) +- [CVE-2025-7087](CVE-2025/CVE-2025-70xx/CVE-2025-7087.json) (`2025-07-07T16:15:27.140`) +- [CVE-2025-7088](CVE-2025/CVE-2025-70xx/CVE-2025-7088.json) (`2025-07-07T16:15:27.267`) +- [CVE-2025-7089](CVE-2025/CVE-2025-70xx/CVE-2025-7089.json) (`2025-07-07T16:15:27.437`) +- [CVE-2025-7090](CVE-2025/CVE-2025-70xx/CVE-2025-7090.json) (`2025-07-07T16:15:27.590`) +- [CVE-2025-7091](CVE-2025/CVE-2025-70xx/CVE-2025-7091.json) (`2025-07-07T16:15:27.727`) +- [CVE-2025-7092](CVE-2025/CVE-2025-70xx/CVE-2025-7092.json) (`2025-07-07T16:15:27.860`) +- [CVE-2025-7093](CVE-2025/CVE-2025-70xx/CVE-2025-7093.json) (`2025-07-07T16:15:27.993`) +- [CVE-2025-7094](CVE-2025/CVE-2025-70xx/CVE-2025-7094.json) (`2025-07-07T16:15:28.120`) +- [CVE-2025-7095](CVE-2025/CVE-2025-70xx/CVE-2025-7095.json) (`2025-07-07T16:15:28.253`) +- [CVE-2025-7096](CVE-2025/CVE-2025-70xx/CVE-2025-7096.json) (`2025-07-07T16:15:28.390`) +- [CVE-2025-7097](CVE-2025/CVE-2025-70xx/CVE-2025-7097.json) (`2025-07-07T16:15:28.527`) +- [CVE-2025-7098](CVE-2025/CVE-2025-70xx/CVE-2025-7098.json) (`2025-07-07T16:15:28.647`) +- [CVE-2025-7099](CVE-2025/CVE-2025-70xx/CVE-2025-7099.json) (`2025-07-07T16:15:28.783`) +- [CVE-2025-7100](CVE-2025/CVE-2025-71xx/CVE-2025-7100.json) (`2025-07-07T16:15:28.920`) +- [CVE-2025-7101](CVE-2025/CVE-2025-71xx/CVE-2025-7101.json) (`2025-07-07T16:15:29.047`) +- [CVE-2025-7102](CVE-2025/CVE-2025-71xx/CVE-2025-7102.json) (`2025-07-07T16:15:29.177`) +- [CVE-2025-7103](CVE-2025/CVE-2025-71xx/CVE-2025-7103.json) (`2025-07-07T16:15:29.303`) +- [CVE-2025-7107](CVE-2025/CVE-2025-71xx/CVE-2025-7107.json) (`2025-07-07T16:15:29.440`) ## Download and Usage diff --git a/_state.csv b/_state.csv index b96e4fbf598..2b747b1fce7 100644 --- a/_state.csv +++ b/_state.csv @@ -128634,7 +128634,7 @@ CVE-2019-10215,0,0,0e9f6d247c9d593b24e46d48bdbcdf09223c2a30f5ab32dfeca0c6cf8e8ca CVE-2019-10216,0,0,35ed33da4b62f24abb10ebf8f37c589627a365502e243ba74bbbefbf6a7bc070,2024-11-21T04:18:40.523000 CVE-2019-10217,0,0,909110d2f208ab61b07acf90bc9223931b30c12625c2088ab0e0412468ee5188,2024-11-21T04:18:40.660000 CVE-2019-10218,0,0,35a73b14114b79da514d68f4fa1350d7988aec9de9185ededf85c426b5432458,2024-11-21T04:18:40.793000 -CVE-2019-10219,0,1,a7111b2a8a230bcaaaa7788e683b863fd1aff10908cba3963bc7c37dc9f75f99,2025-07-07T14:15:21.437000 +CVE-2019-10219,0,0,a7111b2a8a230bcaaaa7788e683b863fd1aff10908cba3963bc7c37dc9f75f99,2025-07-07T14:15:21.437000 CVE-2019-1022,0,0,a997bae2b4a2a745f9920ff5d578df415ee5d78b2678b6e921535234d4cc7266,2025-05-20T18:15:37.260000 CVE-2019-10220,0,0,646efa713eac9218852398d65d5f8f63fe5e80b3a86492e33758a941e162f8bc,2024-11-21T04:18:41.213000 CVE-2019-10221,0,0,39587dc2519f17427d40a6c7ae7a66485e07fbdb8a61c7819333cb8809907a7d,2024-11-21T04:18:41.350000 @@ -134724,7 +134724,7 @@ CVE-2019-16865,0,0,8ec5eddcfcfbc5d92f5e79b03deccb39e3b211eff6765ac5b404e39ac9364 CVE-2019-16866,0,0,f9cf4e267589c819fcea81ad91519c2bd7f250bc4a21893454c8eeeaba04d1df,2024-11-21T04:31:14.060000 CVE-2019-16867,0,0,f9c8990366987453c17182da5d9b796f7faee31577cde5937573a635e581eb7e,2024-11-21T04:31:14.210000 CVE-2019-16868,0,0,b5fca10e5fc26a3268fcb07cb7158b9994e4a10c3e002ec21135caac3cc2821d,2024-11-21T04:31:14.343000 -CVE-2019-16869,0,0,554ea80698e6e3f7ab35fe9e4455b643fb77b548ddb86e0c6a3536101461eb8d,2024-11-21T04:31:14.483000 +CVE-2019-16869,0,1,5a65e0a014f0b3e82b1eb0df01b91b76ad8d83be6b0e9fbacfa7a15148c6eda0,2025-07-07T17:15:26.303000 CVE-2019-1687,0,0,1d5d50ac2fdf07e6cecf3662b12e118a5213f32bfa7b86ee162548e8a837219e,2024-11-21T04:37:06.050000 CVE-2019-16871,0,0,72e531f14ea12b4e947d4b7f068534148c20018514b605ddc94d5cb9981b5e10,2024-11-21T04:31:14.783000 CVE-2019-16872,0,0,5f7665292e41b33fccc390ff1a336fc1e9de391606d522ab78d712d7b6b28e77,2024-11-21T04:31:14.930000 @@ -156915,7 +156915,7 @@ CVE-2020-28091,0,0,96d05bdca5d8dbfaa4895e035290c2ea8ffb399525e1b0840ca2ea30d8aaf CVE-2020-28092,0,0,dbb197e0b771acdf477a6b73dcd78ee5dc05e1d8008f793e5208ce5423923320,2024-11-21T05:22:20.713000 CVE-2020-28093,0,0,682e2d4fc730785b3d35077e78e53c16d9ea9f1cb9aff493752a6ca8e53ffe6e,2024-11-21T05:22:20.870000 CVE-2020-28094,0,0,18c75a85d3caa708e84f7f49b59fd0d357f9cbd058da22811f410d3b7465b312,2024-11-21T05:22:21.173000 -CVE-2020-28095,0,0,f3d6eb03a00d4791de75e3240cbec8fc34af0e1065d1b52b7b9fd0a78a451923,2024-11-21T05:22:21.310000 +CVE-2020-28095,0,1,72c01eb79757700314959ff329ce441e0bdd13a20684b000f7e8b4ff24d230eb,2025-07-07T17:21:03.403000 CVE-2020-28096,0,0,ccedc485bce021e64d0861fc0170dab6c8d927fc470105d462fa23c42cb7e9b9,2024-11-21T05:22:21.473000 CVE-2020-28097,0,0,a1003a554fc949e863a7a666e81115020b8484b2a39e952af6d0bd4bd0a9b46a,2024-11-21T05:22:21.650000 CVE-2020-2810,0,0,06f7d1b886c7bd0cae4280f119ecdaa0cca0c69795a6e56c0c320dbc1ca26d8c,2024-11-21T05:26:20.133000 @@ -176152,7 +176152,7 @@ CVE-2021-31856,0,0,e26f0ec93b73eec32bac4cad7dbf180adfcd06d9552ac2db9f10c8a3413d5 CVE-2021-31857,0,0,321a55ce12b04512dfec02b3c4fe662df127163dd638361fec3a3807290dd5c9,2024-11-21T06:06:22.123000 CVE-2021-31858,0,0,fb44a6ce3457b439876f1b96bce9cb4225c4e4b01d24ce4aabd6dba22fe3e3da,2024-11-21T06:06:22.270000 CVE-2021-31859,0,0,784fbadee83f46de576be26bb416877bf41e19aead60dc36fee86889308c25c2,2024-11-21T06:06:22.420000 -CVE-2021-3186,0,0,1e68774115e96c037b14e96dcaff1865430d37b9d62450ccd3a8f1ff114e0843,2024-11-21T06:21:05.777000 +CVE-2021-3186,0,1,a125152577a314506a4aa5b81b8a16e57f2ccef595d95d8603885e65b7326ed5,2025-07-07T17:21:17.707000 CVE-2021-31862,0,0,a5ee94bb91b15c6ac6829cedecb0ab177ff606b2b460c0d86e7ef11b5e2f342e,2024-11-21T06:06:22.557000 CVE-2021-31863,0,0,de4f97f8d3c955cb983c88ff431e1f789ad0a1e318e5ee458c279a0dee47024e,2024-11-21T06:06:22.713000 CVE-2021-31864,0,0,20bb85650b5263b1627d24d287e344be151c9e13bf83191d881f9c4d2a49d51f,2024-11-21T06:06:22.860000 @@ -185782,7 +185782,7 @@ CVE-2021-44566,0,0,8367b8601e6ba473b69a3463f05e1f0d00870c5f430690333ddf7252f0ee3 CVE-2021-44567,0,0,e3ecdbb38c6b2dcaafd27b4ea0660802da283cb80c4285bcbc2d607b88b0773a,2024-11-21T06:31:13.780000 CVE-2021-44568,0,0,c0df78d6a8982481ca5bb6deed4e82b9ed36249a377cfdf3963ff2c437ca5c32,2024-11-21T06:31:13.933000 CVE-2021-44569,0,0,5af89ff864bb4ea2396f1b9fbccc8f3dbc30e4161ff1631d0eb49cab60a17bc4,2023-11-07T03:39:40.107000 -CVE-2021-4457,0,0,174de7612f2a4c86178a4b4055de3d2a74fbc9283bdc7f69fc32eefdb01a8e68,2025-07-01T19:15:24.787000 +CVE-2021-4457,0,1,2a9922be2906d5a2859fdea7ea8099d5ec1539031b64a55c3a17e5e310bbbb68,2025-07-07T17:40:37.030000 CVE-2021-44570,0,0,628a7cefa5280238f64a63a441934d48bbed27fbb89b3168a4f967d167830ccf,2023-11-07T03:39:40.140000 CVE-2021-44571,0,0,02553f355eea65b59ee6322e1012377660a064c58c7407d561f1e30eccd2cc53,2023-11-07T03:39:40.173000 CVE-2021-44573,0,0,3688f7261d965206d5d19fcffb1fec457a2c2d079c27113869c5db85541eb436,2023-11-07T03:39:40.217000 @@ -235302,7 +235302,7 @@ CVE-2023-43281,0,0,ebe45e2e3821ee6b19db3209bb9aab9767c3ad829280e821fc110b430e9d7 CVE-2023-43284,0,0,6ed189a082f7d069a2a7ebde9cd81ade6c9c396f56edb92caf3dc1cc243e1695,2024-11-21T08:23:56.417000 CVE-2023-4329,0,0,2a5235852ef7f5c32e6b11c5e7ee41b8ffab780a1d69abfa0b48d3fe181cdb69,2024-11-21T08:34:52.060000 CVE-2023-43291,0,0,8b0566047e6dbb63661e81a8e2360f6e468f0a766b89a2e634a100ebff46734c,2024-11-21T08:23:56.643000 -CVE-2023-43292,0,1,fa08c92ca4b298c7c0e2e86c093c16337e68654970d72a89e83e87d4be7c471c,2025-07-07T15:52:46.397000 +CVE-2023-43292,0,0,fa08c92ca4b298c7c0e2e86c093c16337e68654970d72a89e83e87d4be7c471c,2025-07-07T15:52:46.397000 CVE-2023-43295,0,0,fa8902a8719120b63e28a8fa235e1af01f932806222a8bc4edcc617b84e77b41,2024-11-21T08:23:57.003000 CVE-2023-43297,0,0,aca07035678c447a5487d42bb14594886da8d6c6b27748a2299c528369d59448,2024-11-21T08:23:57.143000 CVE-2023-43298,0,0,6cef84fc03540ad6b787d355ac844bc2c8cf87f5a660b7ea0eb2c57c136bcb23,2024-11-21T08:23:57.297000 @@ -240939,7 +240939,7 @@ CVE-2023-51217,0,0,c572e9fc555b67fbd8bd65745c6358aa86fe459a87669ead1694c0f780150 CVE-2023-51219,0,0,ed9264b5d5bba3ce65d2752c3b1850f14b4fb39ad5d6f529328c2a51d4c8e38c,2025-02-19T21:15:14.533000 CVE-2023-5122,0,0,05cac3257f237d04df2bc4fc8a8899b5106568e4dbd1ff40b3c5537d8f10e59a,2025-02-13T18:15:55.023000 CVE-2023-5123,0,0,fbc607d8916f6087859cdc46bf56c313ed6143ddbafacb1cd001f30ba0eeb2fb,2024-11-21T08:41:06.523000 -CVE-2023-51232,1,1,102225308fae805fdda124b550414f90044f6f7a63245ade562c76ad7255f476,2025-07-07T14:15:23.140000 +CVE-2023-51232,0,1,05f8a15197f5ceaa106c52f09b60ee6a3a443657216a6fdcb3de638607571b02,2025-07-07T16:15:21.693000 CVE-2023-5124,0,0,4ae7f6d72e6f78b906157940196f4187fc84147c90874c38bcd29b0552e85a01,2025-05-22T18:15:31.467000 CVE-2023-51246,0,0,960fd793b1477fd8ef0b684daa2469cf1a3748c7b8a6e1e94349f13f7f5a7682,2025-06-16T19:15:25.843000 CVE-2023-5125,0,0,6f649fa8f5e8ab758347050d5c13f83daae1107df706ef0b699bd7df9523860b,2024-11-21T08:41:06.760000 @@ -246530,7 +246530,7 @@ CVE-2024-11085,0,0,997988ac78259b1ae8db8c6e9651c22f46fbbaea4f307171e6fff12e9b424 CVE-2024-11086,0,0,f4d7f35e95dad05e023fed49ac9e59da09a947f51bc79e0e10dc6b97e93d7482,2024-11-20T13:15:04.020000 CVE-2024-11087,0,0,e2fe7093d86622f551b217e3b2fb07f9de32adec7e3dcf2388d9405a65f8c4e6,2025-03-13T13:09:46.483000 CVE-2024-11088,0,0,f3b8a1597d15de7a0eedac2ad485a95581e90858e0a798f2ac37387e87407282,2025-04-05T00:35:39.907000 -CVE-2024-11089,0,0,3efb34837d2bb0f9abd40da0afebbd819667d00560b960db0f571195efdd7002,2024-11-21T15:15:21.500000 +CVE-2024-11089,0,1,6d83acfdb55e96888368a7ce0cd5d697fb19d9709d30980685554d7e0bfa2569,2025-07-07T16:03:33.517000 CVE-2024-1109,0,0,a7b1e71489d6774ecfe851782646b725fb9b27ab957ae0f8b7f311d63d7950f6,2024-11-21T08:49:48.980000 CVE-2024-11090,0,0,c176ccf3141a40259cf6c4995f025e29b8341ceb796ecba9c85f772827fb28cf,2025-02-04T20:03:08.833000 CVE-2024-11091,0,0,e10ed02b8c734f63bf38922634dd4d6feedd7afb3a001442202f3ae94b73b046,2024-11-26T09:15:05.263000 @@ -248767,7 +248767,7 @@ CVE-2024-13241,0,0,740c762ec41a3564e5b25d41ad79b60eee7d60c4528907c298d581480d7d1 CVE-2024-13242,0,0,3a63a81a0d079ca54f5ab845361803d9ab947192d597ff81b9c3179fb663cd20,2025-06-04T16:49:53.157000 CVE-2024-13243,0,0,04e6f6ca12ff3b756c2024aac8796653a4ac56155a661cef4dec4a3efb09c581,2025-06-04T16:50:44.397000 CVE-2024-13244,0,0,d8d035e862de938de3d38c06e9a7c505d05349e1595f6c99613f3fed9dccd7d9,2025-06-04T16:55:00.510000 -CVE-2024-13245,0,1,2fc1845a0db6f47de4a8909f11b83142569993a3261e770e9b9b8248320c636f,2025-07-07T15:03:15.680000 +CVE-2024-13245,0,0,2fc1845a0db6f47de4a8909f11b83142569993a3261e770e9b9b8248320c636f,2025-07-07T15:03:15.680000 CVE-2024-13246,0,0,e2e5bab59a6c15884fbe52bfedab11658d95808913321d17f2c5a48b93a330eb,2025-06-04T15:18:56.680000 CVE-2024-13247,0,0,5763c8eca91d6581f7a34ba68c328909b01db95fb893f130a64fab6883a80367,2025-06-04T15:23:03.783000 CVE-2024-13248,0,0,703b629b6343739a2b70b0425ba04c695159418ab4b84428642126d84919532e,2025-06-04T15:58:13.153000 @@ -249693,7 +249693,7 @@ CVE-2024-1565,0,0,00fc6a5125264a59a67555b8c8202352f41a7d44a1f5f9ff79d0346bf16d4f CVE-2024-1566,0,0,19229fee43d76a12f78941a8b8afe76459e8e587ee3503bc72482e098a960207,2025-02-28T03:21:16.857000 CVE-2024-1567,0,0,6cdbaee71c1770d77caf03403af77d158a420504c05e33f36e632e6fe2f3ce20,2025-01-08T20:47:46.820000 CVE-2024-1568,0,0,4660f06f13504a73ee731b062d7289c45d2cdd5ee8fbad08955ed262bed14189,2025-01-16T15:34:31.447000 -CVE-2024-1569,0,1,25123752746d0efe08084131704c7d7f2314c44f462deee6f31981fc51677018,2025-07-07T15:52:34.137000 +CVE-2024-1569,0,0,25123752746d0efe08084131704c7d7f2314c44f462deee6f31981fc51677018,2025-07-07T15:52:34.137000 CVE-2024-1570,0,0,25898391ded7988cd2da012ae2a7ccaf83daa0ac2ffc39f3073e6c6025585cb6,2025-01-22T16:31:46.067000 CVE-2024-1571,0,0,5fbb92daec88f02dd557173685a13ae9dad08ef3d0f0fb4831efff21414d8ed9,2025-02-27T14:55:18.610000 CVE-2024-1572,0,0,b4ce857b0ff0af4e37b6ac1a6b1ef432f3a1d613103d7692d173928e3f6c6559,2025-03-05T15:16:25.020000 @@ -249723,7 +249723,7 @@ CVE-2024-1597,0,0,01a8079ac18bdb625eb7773ebdf03a9502801e21db819c5420d46483d755d9 CVE-2024-1598,0,0,658346e9ddb00077c89c098f1dc70fe615aaf1be46069a7e9dd54964c2ceba3a,2024-11-21T08:50:54.990000 CVE-2024-1599,0,0,105f658bdb5d4f55673b9a4a91d4766e7759683398ba430d2b081d80ef821d99,2024-06-07T11:15:53.177000 CVE-2024-1600,0,0,7d59d99fe5f3ad3a94f279ee771a7fc04d258402b31857a9df738c456c929c64,2024-11-21T08:50:55.133000 -CVE-2024-1601,0,1,5ac9e7fc3e8b4b685c723971a3da0afb349e635fac531357bf385b6c479cc60b,2025-07-07T15:54:16.207000 +CVE-2024-1601,0,0,5ac9e7fc3e8b4b685c723971a3da0afb349e635fac531357bf385b6c479cc60b,2025-07-07T15:54:16.207000 CVE-2024-1602,0,0,34a2386ed02454215b2af3bd05cfb8c1f399ab5ae7cea39c8f9cb75d73452908,2024-11-21T08:50:55.387000 CVE-2024-1603,0,0,40e9d93a18e24bfe0aaa466babdd862b8c37692838e40cbdcde8e0e815d795d8,2025-01-24T18:22:44.423000 CVE-2024-1604,0,0,6948e42ad454d9c75129f2d535fc4eb245afdd1c22afff76e86465241e36fb86,2025-03-06T19:37:43.470000 @@ -249758,7 +249758,7 @@ CVE-2024-1642,0,0,5c60770c56776d98db3cb0c4200736ac332b1e4e39243af2306279f1b64001 CVE-2024-1643,0,0,23a51e500cbbb14eb0edb6213fdbe45992476107d29301a7ac00c541a3990120,2024-11-21T08:50:59.403000 CVE-2024-1644,0,0,2a0c9bedb7077c42744b0cff4622252c578909ba72cfa38faa02c26586371ff9,2024-12-31T14:30:42.993000 CVE-2024-1645,0,0,03699ee0a8ad7836aa080c25f42b206191e3cf9bd749532c452b30589acf9403,2025-01-21T21:12:54.303000 -CVE-2024-1646,0,0,abe56c780ab794a8468fc5216f48b098b51c55e261335524069db80b1cc231f6,2024-11-21T08:50:59.783000 +CVE-2024-1646,0,1,afc8e45b981439330d66ea6d4e8a96cbbc668d12b56b32a34e73934981379d05,2025-07-07T16:01:35.617000 CVE-2024-1647,0,0,c373ba175b16a4bef3a8e298c639db71164b41a8ac469cfa70044285c96ce97d,2025-02-12T17:03:00.353000 CVE-2024-1648,0,0,b91348c825803f4924bed51e23f6d8be2b4d2c53e5ba827f48a0f595bc391881,2025-02-12T17:02:43.703000 CVE-2024-1649,0,0,3995ef5fb459ded8b32a8890e4aedac63a2bb4749fed72dad67aa0191b67d631,2025-01-07T14:36:30.327000 @@ -249905,7 +249905,7 @@ CVE-2024-1792,0,0,5c91c39087a11a285932b6df2f786b9ee27b789c298d617daf628ee7a56719 CVE-2024-1793,0,0,1247321dd371ac163a2d163c7822069c7d100252b9c561f2f44a64adcc334d96,2024-11-21T08:51:20.010000 CVE-2024-1794,0,0,3f088b1fd94616444859b14a55400372064f248f46015ad0daa63ebd323d0a5b,2025-01-28T17:23:12.147000 CVE-2024-1795,0,0,5d11bf1b8dc2b5c0d5b4fc8d4df7bd6ebd06ec9fc982e70886676d8ffd994d14,2025-01-23T19:27:09.377000 -CVE-2024-1796,0,1,a2403f05827eb10729ce4782ab2140004e3f2c545725ee926e8a10b7cfef5fe6,2025-07-07T15:38:29.783000 +CVE-2024-1796,0,0,a2403f05827eb10729ce4782ab2140004e3f2c545725ee926e8a10b7cfef5fe6,2025-07-07T15:38:29.783000 CVE-2024-1797,0,0,375fa31d2830b492cd642c02bb9b7c1d18d21267bb0adc9a8b028d0c9d52d4dc,2025-03-05T15:15:28.940000 CVE-2024-1798,0,0,b61f537a4a5f0f1ad767fda3f9e18af7ae4f05fe2e34299e4b65a55d2e6cec08,2024-11-21T08:51:20.647000 CVE-2024-1799,0,0,f9b05aef34f051d66c559785b2000250f129f8480eabba8681740cc2ff082c4e,2025-02-04T20:59:34.903000 @@ -250347,7 +250347,7 @@ CVE-2024-20315,0,0,7d966db225cabf76c83361d4e7be47d53fbea678ec97467156623f2f786ce CVE-2024-20316,0,0,7252bea5b58c84da533634e80890ccb65b60a69c9abde262eec9778f8a0284b0,2024-11-21T08:52:21.410000 CVE-2024-20317,0,0,eaf23e759a474ec31e5746f40765d2208848b4ce62f012f188cd21e63e77368d,2024-10-03T17:58:40.703000 CVE-2024-20318,0,0,c4ba85965053ee7159e4722d567ee76802d2f3667e7ad75436ba0b81e59e65b2,2024-11-21T08:52:21.667000 -CVE-2024-20319,0,1,364e2ddeb438e1b5f791c3a1845944712a7d7eaef57eaf0f351617da6f6ce63b,2025-07-07T15:49:35.503000 +CVE-2024-20319,0,0,364e2ddeb438e1b5f791c3a1845944712a7d7eaef57eaf0f351617da6f6ce63b,2025-07-07T15:49:35.503000 CVE-2024-2032,0,0,13bd6b29bff7da5d4af0383a2f79e7f7c7633030fe333ad4bafae2604534bbc4,2024-11-21T09:08:53.180000 CVE-2024-20320,0,0,2f46b06370719cc80deb7a63ab7f9e68472355f61c5a52c6ab7045103549e170,2024-11-21T08:52:21.960000 CVE-2024-20321,0,0,f153f4ff6e1241721cd7fec8ab4f8520dca1379d972fd091d662401131f3003c,2024-11-21T08:52:22.093000 @@ -250724,7 +250724,7 @@ CVE-2024-20784,0,0,5176e4d20d9758fc7b2d594f508b3f9759b65271e4a3b75f56b1d0cc71e7b CVE-2024-20785,0,0,f99696a689a5cf411cf0bed24a7a8dbdd6ca8e7285e39b7b6000448d9b93f75e,2024-11-21T08:53:08.517000 CVE-2024-20787,0,0,bf4b19c9d6e02f9072349771cc8ca5d20e6ca70d0c497a2e87b80e64f1d925f8,2024-10-18T14:43:18.123000 CVE-2024-20789,0,0,b758cb5d94be3cc99a03028efc20fc4701f180d39d04f789664017af17511da0,2024-08-19T18:59:05.617000 -CVE-2024-2079,0,1,53bee8c1b5fc7cbfcbec9868771d2670e7ba1b7fad13212c7ff36f9281b663b0,2025-07-07T15:24:18.360000 +CVE-2024-2079,0,0,53bee8c1b5fc7cbfcbec9868771d2670e7ba1b7fad13212c7ff36f9281b663b0,2025-07-07T15:24:18.360000 CVE-2024-20790,0,0,1acd591435868a60de4e84fb05fe7145f29d6a4c6d06a1659debdb9f5d120760,2024-08-19T18:58:42.660000 CVE-2024-20791,0,0,ff320855f270ba18abdebdcf51606d71af2bc3846d864a96b3c8bd78d9dabc2d,2024-12-04T22:39:52.703000 CVE-2024-20792,0,0,5d630c3a2ffa950c78e8b2d3c10c2d72a3e3f9bae5c5f2b3c68391a875000152,2024-12-05T17:44:14.317000 @@ -252347,7 +252347,7 @@ CVE-2024-22475,0,0,b9326cef104e527ebece5a44b8410430ec6ba360374b1b63130781d3fcf25 CVE-2024-22476,0,0,f03934f35360b7025b245717a358830a1748bf912d6afda43db399901cec9280,2024-11-21T08:56:20.933000 CVE-2024-22477,0,0,b8509029d5ec6a4381b6e6bd33da7f50735c23e01284aa814f384a92dcb70695,2024-11-21T08:56:21.077000 CVE-2024-2248,0,0,128b03ee143838230434475acf9988ac8d0fdb2e64239ea0133c82e2fa239752,2024-11-21T09:09:20.790000 -CVE-2024-2249,0,1,95333bb1b71aa72d3bb1ee8aaee29b714f69e11a1d044c5270484f3e68c58d1c,2025-07-07T15:35:35.030000 +CVE-2024-2249,0,0,95333bb1b71aa72d3bb1ee8aaee29b714f69e11a1d044c5270484f3e68c58d1c,2025-07-07T15:35:35.030000 CVE-2024-22490,0,0,66a82b0e51a88056ee4e8dc9f25a0a6cdc86338bb5341bd044469b861097582d,2024-11-21T08:56:21.247000 CVE-2024-22491,0,0,ac7a14fe4c650b7e0be11f951792835ce9c63cbb77752479a49bd5fd2d244461,2025-06-05T17:15:27.837000 CVE-2024-22492,0,0,ed6de9697d3c906be7c158fd443e2bb6e676d19d1e729007bba5d9124eec42ed,2025-06-03T14:15:45.907000 @@ -254226,6 +254226,9 @@ CVE-2024-25169,0,0,99447ba0d35007c05de0bb325e4f626f2e771e1210f38989dc4b7d60408a0 CVE-2024-2517,0,0,295e66015290670d17656ff58cb1c4da5fc5fa5488e00738c41044e38528f829,2025-02-14T17:00:42.847000 CVE-2024-25170,0,0,4c56b2b9fe4a87cb80c5dee02642b875be800d1c7ec89e66c4b2e2df368f00c2,2025-04-28T13:45:09.357000 CVE-2024-25175,0,0,d202acf4b9d186a327285b02335009822d657110c4d7975ee8e4ed90ceea8ae1,2024-11-21T09:00:23.977000 +CVE-2024-25176,1,1,3836058f1755dacf2560d4d021be76bd175dc1f96054736856eb4b5eec23f313,2025-07-07T17:15:27.247000 +CVE-2024-25177,1,1,74f11d04f69d35694c6171a597a15c0c05fcbdfc9131bbb2d0b2e9bf0fc70f2d,2025-07-07T17:15:27.403000 +CVE-2024-25178,1,1,257402d2b1d3f477514e3ba0983fa7d32b3bad66e77d3a0b56b5e87d61b28714,2025-07-07T17:15:27.527000 CVE-2024-2518,0,0,218e6d38201830e4f08ae52d79ac56db7a7b552c444bda2da7a3568e50b7a7a6,2025-02-14T16:59:49.713000 CVE-2024-25180,0,0,6c4f9519ece96564cb8bbb38c56337d15b68729b9ea597b77e43cb8c48c7e78f,2025-05-13T14:46:15.803000 CVE-2024-25187,0,0,b5bdcba71ceb1efd4b7f3a75dfc46c9a93b6aa6414ead7bfb505e326018a4574,2025-06-10T00:46:34.737000 @@ -257220,10 +257223,10 @@ CVE-2024-29024,0,0,ce8b2e2cde3c04ad42badb051c3fc6cc3386c5bde2b110813cdb51094ac68 CVE-2024-29025,0,0,826ab2dee9dbde3794adb211f664391825224c08f96b9e8c5616c8f0479d1cc6,2024-11-21T09:07:23.890000 CVE-2024-29026,0,0,de9ec356ac90fd02f902d916cd7e0bc293b4028e1231d8a4fe9b0d606b6adad1,2024-11-21T09:07:24.033000 CVE-2024-29027,0,0,cad2c3e3075aa793ecd13d5a6db3c7104155fc1583df44e70e041ebc7f10c285,2024-11-21T09:07:24.170000 -CVE-2024-29028,0,0,95816bde6c02c098d975d0e45c8aa5b163487d79469bdad741acc03a98ff0853,2024-11-21T09:07:24.313000 +CVE-2024-29028,0,1,20040c9ccc9aaec3b7a541ca7fd05c1505a85f6b1996c5f0f01333c735202a20,2025-07-07T16:03:50.147000 CVE-2024-29029,0,0,79a14ecda4dc6dc09574b170d06c65a72f1bb1b8f0316fc9902a134d522b067a,2025-01-02T20:46:24.867000 CVE-2024-2903,0,0,d07796c3c57db604adb0c44d66e16393d3a06f7e1e65a8292fadfe10520655f2,2025-01-22T17:48:48.723000 -CVE-2024-29030,0,0,36cae85cf5bca7c639f952813f412cfc45c5e768c2ef757851904b673697885f,2024-11-21T09:07:24.583000 +CVE-2024-29030,0,1,d2a399f87e00215e6703e9cfe9e014d09d080fa6d4330040419d0aeafb2fede9,2025-07-07T16:05:52.817000 CVE-2024-29031,0,0,43885b264be637e71494b7988bfccd07c0c261c20bf20a201a9b30066be50cac,2024-11-21T09:07:24.720000 CVE-2024-29032,0,0,e4982184528b3910b9311a270985ad61418d068232bdcad658d089c012dde188,2024-11-21T09:07:24.850000 CVE-2024-29033,0,0,b30ff3b4288d6655f5f21132ae3c9d7becfaa96ec23d2d0ae74db6c2d1c1b5eb,2024-11-21T09:07:24.973000 @@ -260503,7 +260506,7 @@ CVE-2024-33343,0,0,22fb5c186b8d20e0cc219d731c244ca0c68959bc12ed1d8fe4f3825d48b5d CVE-2024-33344,0,0,bf00327a4fcb0c21f2e093ee7fe359acf13ba1003a255d1b4e7db47e9965c574,2025-05-21T12:51:29.240000 CVE-2024-33345,0,0,e7ccc46572f3bbb45109594f681596833d0779a1a7232cbdc0662850102d3d46,2025-05-21T12:54:39.047000 CVE-2024-33350,0,0,9b08d2c3a8fe3dd6854baef5a026d3d1e5b049ad043519c6fcd46d8cec17cda5,2025-04-16T18:46:24.537000 -CVE-2024-33365,0,0,18490739f9bd37694971bf6070f8f640cc2e23f069468d879c82d6d12b6dc365,2024-11-21T09:16:50.347000 +CVE-2024-33365,0,1,58d0e65ff4b9978f34ee1608b5d0b0055f7b3a2d370bdca800f834916402ce4b,2025-07-07T16:09:32.320000 CVE-2024-33368,0,0,3305443f72c5e000e2f0444a0fede63109a7b00783812d0da943cf4fe9e786e1,2024-09-30T12:45:57.823000 CVE-2024-33369,0,0,8c4fa221352414606a274ae58aa5ebeb3e759dc56b8fbe82f608c09de6edff9b,2024-09-30T12:45:57.823000 CVE-2024-3337,0,0,93fac470c900f6f8b15137cc4a36deefb5092aa95ff5568e01f2ecb87b3abff1,2025-01-28T18:10:03.600000 @@ -260517,7 +260520,7 @@ CVE-2024-33382,0,0,b4ac24854ce173c75dde5e52aabeb20ffc0298ad17cc3ec8f9bb87522b241 CVE-2024-33383,0,0,9e2463eece43dfbfa8aebdf8f9e3371f9f6b21092fdc0e5bdb17c240e8d27450,2024-11-21T09:16:52.190000 CVE-2024-33386,0,0,c23af1c70fc3fe9ca218109ad8c4c43c7494439d5db75fee98f7665b96d71dd5,2024-05-16T09:15:13.600000 CVE-2024-33393,0,0,872b4aa0a904714599d1fa07ba1eef93484c03f03e9e08026f73897def40d8e6,2024-11-21T09:16:52.440000 -CVE-2024-33394,0,1,f92b3f0ecd12184c02854b4ba2f750384a233fc012afb61e319318e23253464e,2025-07-07T15:40:23.880000 +CVE-2024-33394,0,0,f92b3f0ecd12184c02854b4ba2f750384a233fc012afb61e319318e23253464e,2025-07-07T15:40:23.880000 CVE-2024-33396,0,0,758482c561afb96e8cd21cad78bee3f71f1716de54e4d40e2bd67a69913405a3,2024-11-21T09:16:52.873000 CVE-2024-33398,0,0,f693756af9e888c9f97b3005d23bcebc5682d9c05380cb7652ef3a077acce816,2024-11-21T09:16:53.090000 CVE-2024-3340,0,0,9f0f8d69cde360730b32e17259bc7eaa4b8205ac840f5d7c4068ee98e055652a,2025-01-28T18:07:32.970000 @@ -261986,9 +261989,9 @@ CVE-2024-35281,0,0,25196804bb3a6597c76f975653eb848eefd7596334d2207cb8ac6e34cbf50 CVE-2024-35282,0,0,174e154b42e127fa67b7958222015b753e479a85266f575b2e2ca4b3057942d7,2024-09-20T19:44:17.557000 CVE-2024-35283,0,0,e4a16449ae7b170b40f36d8d072b68ce35769fa845e71aa3c36eaaa3a5559f15,2025-05-29T20:23:14.783000 CVE-2024-35284,0,0,d445a7b672d36f3e65782d541394ac34386db85d4c32066632be674677ed1d99,2025-05-29T20:22:05.600000 -CVE-2024-35285,0,0,2e524ea2f8cec65e288c8d1e00c738e31ffd812b627d244ab7ce17e9f3cdd46b,2024-10-23T15:12:34.673000 -CVE-2024-35286,0,0,ccc28024b68fbc1d3e260b66f2692345b21f8b5b9de1593566702b65adfaa242,2024-10-23T15:12:34.673000 -CVE-2024-35287,0,0,1294be356766935574db7e770ea6d9291f9a449b4562350fc8e03458134feffa,2024-10-23T15:12:34.673000 +CVE-2024-35285,0,1,60eaf79933a87dc13f13aa938e501335ab9111c8b6a040a092050dd996d99778,2025-07-07T17:55:18.673000 +CVE-2024-35286,0,1,d80a2d4887104d751ff2f1cfdd03de04fa58b890da66109072b5dfa68cb88b00,2025-07-07T17:55:27.693000 +CVE-2024-35287,0,1,e53e23ed40ff88fd7836da9797ddbf7aaf411c88ee7f71bb2ea2a4d8cb1687cd,2025-07-07T17:55:48.843000 CVE-2024-35288,0,0,ec4886f7dfe34acc93e9a9ae7b603c1c9549753fc5471e7bd452807dea5ee5fc,2024-11-21T09:20:05 CVE-2024-3529,0,0,e45f40786a9f50a253a2f5a2cac29d410f895d097c903a7af21fb70c0c21df98,2025-02-19T18:49:32.457000 CVE-2024-35291,0,0,68f25d86268f0841afdd1d14b56353ce2ee5e6517f604738d19dca536b9e9268,2024-11-21T09:20:05.267000 @@ -262014,8 +262017,8 @@ CVE-2024-3531,0,0,a0e1eb0b7231a600d9ce9fc396f7daae414339566e4ae65a072fcde5bc96c3 CVE-2024-35311,0,0,0a9884447508a8c4b5592bff8eaf170276b9abc20917003a90825427562ba7db,2024-11-21T17:15:13.347000 CVE-2024-35312,0,0,0e9eeec1fafa09527089df577b5dc429dcf629272eec2813de46dea048c289da,2024-11-21T09:20:07.750000 CVE-2024-35313,0,0,d7ebf6858eafae97d7c113aba66a7b84ca23ea65d28801b3b26242ab31d9b548,2025-03-27T15:15:52.663000 -CVE-2024-35314,0,0,5edf657ee55491685e6318eb1d6b1a8b80b8407f59c8adb655b43e37a91f5b2e,2025-03-25T15:15:22.007000 -CVE-2024-35315,0,0,9b4ada70dc030b43813f6be0e19a5522eefd321522d665951700003fcc123ef9,2024-10-23T21:35:04.820000 +CVE-2024-35314,0,1,ed196ac33f0d6b83227fe12cb0c389828425bb071734bdf66f618b65b8b35aa7,2025-07-07T17:54:52.597000 +CVE-2024-35315,0,1,58252d9eec9be85a3845b29c5fddee6e963314644b5dfb7abb341a7a7df5a25a,2025-07-07T17:54:43.887000 CVE-2024-3532,0,0,aa90e6de5f39fce3467cf8ea4e6d407f7f4c9faf5a26268e6eda962eb58b9405,2025-02-19T18:48:01.997000 CVE-2024-35324,0,0,8166b723d572a507e69999a7fabc1e3d6820a4afd3d64c81d9da56e0e7c1b5c8,2025-06-23T18:09:30.797000 CVE-2024-35325,0,0,073df6c9b920e39e00ae6bf411b4ce7fcbfdedf8b124ea4a78741a586d12ac92,2024-08-28T16:15:08.417000 @@ -265937,14 +265940,14 @@ CVE-2024-40074,0,0,a782a83c8abd9c2392be241178b32decbbff9cb8687cc352e4418c8728e75 CVE-2024-40075,0,0,696bebca65ab8531e554637eea9876932f9a084e6d9912735f3ae614eec7aa18,2024-12-02T18:15:10.760000 CVE-2024-4008,0,0,fb2d806ef2abb9abf3788fec7ed21d9b3c4b495ec50044c32ac89845e7ebb6d1,2024-11-21T09:42:01.397000 CVE-2024-40083,0,0,eeb4b20d71dd45aeea06c99bf0dca69f82a7d6d6c587c58cbaa9dd54e3c5ef4b,2024-10-23T15:12:34.673000 -CVE-2024-40084,0,0,e69e259e52eee1a0ff3743cadf49c721f8e17f72bbe24077686d0e5f4610b767,2024-10-23T15:12:34.673000 +CVE-2024-40084,0,1,0413ce04444a486512437a67c399b6b657557786dcbd3761877bd70217cef696,2025-07-07T17:37:27.353000 CVE-2024-40085,0,0,65012a5cf84f34692a471a5e3d02cc89c537c9f6e4d6a11026e6c0a7d7a874cf,2024-10-23T15:12:34.673000 CVE-2024-40086,0,0,59721de2a9eb842f68fdc99333245818c6abbbae4238c0b32b069b650dfa5593,2024-10-23T15:12:34.673000 -CVE-2024-40087,0,0,21e4fdadc6468b1c7ce7564f889d3554e65442ba3b2588203ec1da0e7e67c508,2024-10-23T15:12:34.673000 -CVE-2024-40088,0,0,c747e947fe458808dca56028605040801820f4eb6f3112083188568e104ac668,2024-10-23T15:12:34.673000 -CVE-2024-40089,0,0,a10a41796a3c19f95c0310b2f6276784f4448db34a17a64124810ba0010addaa,2024-10-23T15:12:34.673000 +CVE-2024-40087,0,1,6e28b807ce7c2e824f12a3fd71405e9a75509707aede52415fc6304d4c1603fb,2025-07-07T17:37:37.820000 +CVE-2024-40088,0,1,a9b4f16b05aab84e107d74e50d7d4496c83efce681e832b5bfbececbbfe13a42,2025-07-07T17:37:43.360000 +CVE-2024-40089,0,1,2afde035a77ac3073d1eae9026e51ff1313edeb4e89dbdf7f204e8b69f32fae2,2025-07-07T17:37:50.703000 CVE-2024-4009,0,0,e6fc13339a022439928a3b880ac5a3dca7408f486ac8d9399d6664d4873778fb,2025-03-27T21:15:49.760000 -CVE-2024-40090,0,0,7495caf0004f7fc53c88c7dd3fae3662c7d2ab5674c084f967e931efe0a49a34,2024-10-23T15:12:34.673000 +CVE-2024-40090,0,1,1685c9a272a850c072849401d708de0b8e3ba60cb39d0c5419bcd4e69f1f3601,2025-07-07T17:37:58.717000 CVE-2024-40091,0,0,f3d93af0641e75790d3cbd437b66864e1fd249a95d2ac6262212cda00cdcbbcd,2025-07-07T13:15:08.403000 CVE-2024-40094,0,0,9a4220a74ad0b1776bf22dd7bb76fc7ba6de66481703ba851cc70627616c9162,2024-11-21T09:30:56.560000 CVE-2024-40096,0,0,ddfa7ca435136672d3d80814997a8a213710af7ec0743a77fda4cc9742ddfaca,2024-10-28T21:35:13.063000 @@ -266018,7 +266021,7 @@ CVE-2024-40407,0,0,f81ba19be3cf00af421eb09f69aa8587454f8ab39e9fe9cb0cbd1323213f6 CVE-2024-40408,0,0,60bc4f3b5566ace213053d76a17a8a6901d6ecb382491a16020f9e2f6f1d5583,2025-05-01T14:24:20.470000 CVE-2024-4041,0,0,4e179d2ea919978cccd04192307c53a2ae4f10b56b59094ea72bf61ce67c888b,2024-11-21T09:42:05.187000 CVE-2024-40410,0,0,000bf12d2d77c41060e917b6d6f05f6e168ee7e32397fa8eabd3f7db924ad433,2025-05-01T14:24:27.933000 -CVE-2024-40412,0,0,c783967e6cae43bcbfcda49817e2084d98e18d22d38cac04e8a5e89eaff23c56,2024-11-21T09:31:03.587000 +CVE-2024-40412,0,1,30ea3d84de68f067c1583891c2833fe7cac51f54f0cc2d308a27c411059653cf,2025-07-07T16:20:02.940000 CVE-2024-40414,0,0,11183370d58e5a8bb7fa5360640a6b7b026670eed7e1034c8e745b426305041c,2024-11-21T09:31:03.780000 CVE-2024-40415,0,0,f1852a93d6fa3a248e3e662a3529c6ab41da55f4d88004cbbaed6bdc505463bb,2024-11-21T09:31:04 CVE-2024-40416,0,0,cc16137b74c6811e425364ba3eafc38d45a8e1d8fb1253d8f99edb608f10c013,2024-11-21T09:31:04.223000 @@ -266075,7 +266078,7 @@ CVE-2024-40495,0,0,1c9732481c995a3ecead089b39a64e9ee5c85132819c111045be77c58b372 CVE-2024-40498,0,0,87dac0a04dde5c7b7d6e4bba8f975c746a26b85fad012a6c4a30536ac112c101,2024-08-06T16:30:24.547000 CVE-2024-40500,0,0,6ef0dec3732dba29c28c16bc6e8be9cd17ef4cef498f58a8c690fd37b8dddb98,2024-08-21T16:05:32.603000 CVE-2024-40502,0,0,5fd097309234efbd685a228acc57952f88985a9747788f7654d14436f87cefa4,2025-05-16T12:47:39.530000 -CVE-2024-40503,0,0,1e2a0e67898bd546aaa17aa0dab679b117e2b85e8e1cca739bd5b3b769687563,2024-11-21T09:31:12.497000 +CVE-2024-40503,0,1,08597238257ac4e655faf193f5cf28fab08b490c0ee8f9ea7951a04c90993d35,2025-07-07T16:32:08.337000 CVE-2024-40505,0,0,87e75d54b5538956c68182bdbcec34a1bfef63c14a44a859fad3e784a3600d3d,2025-05-29T20:11:44.327000 CVE-2024-40506,0,0,0ba0366ef4f4e37d15187011b71b75da5a0876d156079bce2f68f642d2f631bf,2025-04-23T15:56:30.373000 CVE-2024-40507,0,0,af1244dc21c19ae37196dfe961c2bfaea4055357dce5bbe3c6a60c0e646b6d9d,2025-04-23T15:57:20.927000 @@ -266086,7 +266089,7 @@ CVE-2024-40511,0,0,79ff9dce7bed4fa953e10198578fb373fb2514dfdec284e5bc69f72bca279 CVE-2024-40512,0,0,3e1732294eec4e0653902443fef54e7922fb0b03561c2c80acb44a02aae0ec74,2025-04-23T15:56:48.783000 CVE-2024-40513,0,0,67c8ef3a8b60e9f7e7c4abbefb380dbf0a359919da4c1e7bd0c5910f01a661de,2025-02-03T15:15:17.040000 CVE-2024-40514,0,0,66e5abd13151d57b369b2394d8a1b3d7801d079b9a53630111fabe5275f004a6,2025-02-03T21:15:12.780000 -CVE-2024-40515,0,0,af03845ba2c80c47d6fbeef9679851885fbcbf95514510c682de0687c4bcd1ff,2024-11-21T09:31:14.117000 +CVE-2024-40515,0,1,b3ef9773ff55846345902c6e7da229a623d541a530151832d37eac5fb486c570,2025-07-07T16:11:28.260000 CVE-2024-40516,0,0,d4d687972653b472f242f6a074ac835c001043a1ab0dbc3ea72906e0b080dd33,2024-11-21T09:31:14.310000 CVE-2024-40518,0,0,bbf2d149d5fcc55b5b0dc1b47361a8364a7ddf49f79972030ac300284c5871b5,2024-11-21T09:31:14.500000 CVE-2024-40519,0,0,668b7175b2ea7fe6cfe549dc87421d7ccb0e17362f09aee79c8b63b97101e47b,2025-03-25T17:15:58.507000 @@ -270562,7 +270565,7 @@ CVE-2024-46441,0,0,228695ddcca85ab6755bc8a154549c980bf013ca49086460cfb0ab87ca194 CVE-2024-46442,0,0,5d34ebfc68b0e9b498265063d998a52d1a2b56b4b766741de6c5c955f52d52df,2024-12-11T15:15:10.250000 CVE-2024-46446,0,0,32498f8ed9e97dfaea9d9d29b52aff01ff427c37b0ae17db53d50ecbc649b2b9,2024-10-11T13:04:46.337000 CVE-2024-4645,0,0,db80714b6762777149c40221f4dac49c3e533500858abb6785ce5b6ec01284fd,2025-02-10T16:08:46.383000 -CVE-2024-46450,0,0,09a57f1960a06f995a906da0d94d0b0aa52a5dc49a713dd629ebc2086a1eccb9,2025-02-03T21:15:13.043000 +CVE-2024-46450,0,1,43c0c69eedab2150719640ca11b7ee2e48a0c7e362754d65c9bed2aba9524cdf,2025-07-07T16:40:50.920000 CVE-2024-46451,0,0,5691c8cee8fae2502da71b898418de27414898c09a161c995aa0a792f136951b,2024-09-17T14:35:31.353000 CVE-2024-46452,0,0,d1446e365f65348e0b0488da47e895c127d8370d418f4f72cf81704fbe1db9d9,2025-06-12T16:06:47.857000 CVE-2024-46453,0,0,c009601dd03b8846bd538ee01074ed3fbad568c27834afc2e6d2594196ef6a63,2025-03-13T16:15:22.980000 @@ -271211,7 +271214,7 @@ CVE-2024-47184,0,0,3b72465320d265a82c812291093e075d32bd3948f53cd6a3365705c393464 CVE-2024-47186,0,0,1039a0688cb9560c7d82adc792d3a716d95a43cbac9f45be613a5a794f15e795,2024-10-07T13:30:55.640000 CVE-2024-47187,0,0,bd6fd3fa1c84c338dd299c3a28a6a5562cd7c44590788c89b90b1885cebf32be,2024-10-22T13:48:59.893000 CVE-2024-47188,0,0,5a59cb871cbb3c74affe3dc66694baaa4c69210434afd08c848963135e97558d,2024-10-22T13:50:17.493000 -CVE-2024-47189,0,0,2df754ed0fdab784a91c7e304456dc9d03ab738e960d19b38c2a04e732708d00,2024-11-04T22:35:09.220000 +CVE-2024-47189,0,1,7460269e3f9de9e8cafab333cf859f6ac556281335feda329cbfe6caa1828cb1,2025-07-07T17:52:12.773000 CVE-2024-4719,0,0,d544c842531d4ecb0d33c9764028fd0f5797f63025ac47834920ec26df1ae7ea,2025-02-19T19:03:18.840000 CVE-2024-47190,0,0,40819c661c4ace8671882c9849c6b7e96e96638b5ffb0d6c1f311268d146ab74,2024-11-08T19:35:17.860000 CVE-2024-47191,0,0,8931a18420d43e304a3461682789339ad25e6278b3ea12df6b098416773487fc,2024-11-21T09:39:30.360000 @@ -271236,7 +271239,7 @@ CVE-2024-4722,0,0,f8a01d5cda394f95062bd0899a5b0ee759de21860c871ac98f32f3a90f8128 CVE-2024-47220,0,0,f3ac3c597af9e4605453ec7e5003d51d9fc5b1c12997e286134131bb5771e3d4,2025-01-09T18:15:28.837000 CVE-2024-47221,0,0,ad5f394b892b60bbd00529ce857218f4587aca66ed7d172df87e3d22b51af0ed,2025-03-19T16:15:28.600000 CVE-2024-47222,0,0,af35ec2b090f518b0dacc1cf6ad59f97af77926ea86cca3bbe8fde63fb5bf8c9,2025-03-18T21:15:30.377000 -CVE-2024-47223,0,0,c8723932f808242f2343a2abb7d098416fb4662ef496e16104ec78d98130b008,2024-10-23T15:12:34.673000 +CVE-2024-47223,0,1,318995ef5954b85ee3dac814b33a01b124b788350f2d432aadfc58f16c226007,2025-07-07T17:52:15.770000 CVE-2024-47224,0,0,d6e19c7b2d0feea5eb398cf6834597817b31f7f19c80ef01ddc9f10df502e488,2025-06-24T01:21:34.700000 CVE-2024-47226,0,0,c0138e86450c00655f37733293efcb457ba59b359e5a8aa33c24e761e24f0271,2025-06-30T14:50:07.543000 CVE-2024-47227,0,0,12cb3d637a00166b3cfe0c18fb70b19ea080bd614b4771496d6beb1981a88cc4,2025-03-25T15:15:22.737000 @@ -271882,7 +271885,7 @@ CVE-2024-47909,0,0,114aa268672736b24d218b508c70839e7abe1697ede83610908b9c3a6775a CVE-2024-4791,0,0,aa21c4639e6724eba05bf92d264947b88d3a7d0da19d77cdf870f11475064148,2024-11-21T09:43:37.137000 CVE-2024-47910,0,0,2b512b73d2b6b5c66fe1cf4c33853e3228b1071f06eada4fd9fbf32862f1d5d5,2024-10-07T19:37:43.677000 CVE-2024-47911,0,0,9da230739db9762f60b9328a7c487492879939e8c1f91c0f150a53ab317bef59,2024-10-07T19:37:44.613000 -CVE-2024-47912,0,0,8e6115d960802f1e1f2d2f3bb1edf993f16879283a0e7576ffef34586ee55f53,2024-10-23T15:12:34.673000 +CVE-2024-47912,0,1,e5fde046baf89a1b520a8ff812223f4f1e586d82e52aa2df79f284b2d58e7257,2025-07-07T17:52:18.600000 CVE-2024-47913,0,0,c28963fe042ac457b9c3e8a219910f1e7f2da3ee53652ed3f5fe314f8628a058,2025-06-17T15:54:48.687000 CVE-2024-47914,0,0,d45aeab404253ce96cfa100c7ced4195a1c3af09497362e0f731698d9e730204,2024-11-15T13:58:08.913000 CVE-2024-47915,0,0,9a22be8027040fe480da003180194741f42a15279e6f925652bfe19345653927,2024-11-15T13:58:08.913000 @@ -272039,7 +272042,7 @@ CVE-2024-4818,0,0,7eb9f87453466a82567333ba5bc5e47b162cdd22e1273603be23f63fb83da2 CVE-2024-48180,0,0,fdcd0adbd6e000b70b86c96463685b3f8e06e9e3d993eb287a59410e3231c0c2,2025-04-28T17:34:22.620000 CVE-2024-4819,0,0,357db78a10d6a847667b9ca0f576e976c5fe2a876dcd6731bb57683aeb2a6700,2025-02-20T18:16:52.500000 CVE-2024-48191,0,0,891da82bb90e17e441a3348db7f4fc7aa14613182eea58a3c9534533f1ae26f4,2025-05-27T20:36:14.867000 -CVE-2024-48192,0,0,f9aaaf8b8531b2bf2154e80b3a5567caa0701d51a14179740b594e7a89156dee,2024-10-18T12:52:33.507000 +CVE-2024-48192,0,1,53cd58ca40c6cb19566be746a2f4f1c34a22ab0466e5ff25b66fcaaded06b4a7,2025-07-07T16:20:38.143000 CVE-2024-48195,0,0,46bd0ed11438b91c65a0ab08c88c2751c6c87ae8f20bd1ba21a7c6dd8d685594,2025-04-17T18:41:10.263000 CVE-2024-48196,0,0,5506d16328a9358fe8030137b3875f490592d462ef7df78bf654c5785fcb842d,2025-04-18T01:15:07.877000 CVE-2024-48197,0,0,d53fa3eceab4030f7e30718c8734aeb7aff1c28297f2b64bd42e730bbc1a9c16,2025-01-02T20:16:04.827000 @@ -272066,8 +272069,8 @@ CVE-2024-48229,0,0,753695ef497a3b33ba510b0cc1abbfd97d1734ff029994a01afd3f86eaa36 CVE-2024-4823,0,0,7a94f4e2979011f7645f376909dacda84ba52f8c331da75e2c621bf9b82d3a17,2024-11-21T09:43:41.830000 CVE-2024-48230,0,0,b4098c1a1922ed9aedd74b2197ce0761cd26e416d9d284b7a22c6f89401cf374,2024-10-31T15:57:23.693000 CVE-2024-48231,0,0,b5293a7d07a11178cd414bf3d7963150b4062c9936cf95fe0229c0281e923474,2025-06-10T18:57:51.190000 -CVE-2024-48232,0,0,820b7d29815f6eca962159cc7640e3c1fb9a4bfd4bad7d6abcc028bff2dd7179,2024-10-30T19:35:26.257000 -CVE-2024-48233,0,0,bd4f66f199bc6569c9bb37ea2b5d64bf3e735ab8c8df79cec3d5f10e8213a9a2,2024-10-30T19:35:27.360000 +CVE-2024-48232,0,1,71233db0111dbb127ee706c07a256ba7ea030cb076543bf9ee9e29bc1dea1e2b,2025-07-07T17:33:49.187000 +CVE-2024-48233,0,1,4264e77a514d13f649599ed9d2d66c6a463d837015aeb31b59a7d3f318d86fdb,2025-07-07T17:33:29.767000 CVE-2024-48234,0,0,133ce6bfaf8a3bf889c4c8407c1ad16ff3c3f45f7ba5c6c0a5b225a8f849cca6,2024-10-29T19:35:19.743000 CVE-2024-48235,0,0,8dcbb2392eedb10bd7ee0d54ac1754b5d031b4301ad7734f3e2e88fee5e6138f,2025-04-18T01:08:54.923000 CVE-2024-48236,0,0,a306ae3290005fe8c7b91f3ff664955626ec01038296445d678f9b7fd1f4ca77,2025-04-18T01:09:16.277000 @@ -272088,7 +272091,7 @@ CVE-2024-48257,0,0,cb21fa2f5aa5cec88257372a8a9b3bfc27442c442914a925c8a1ad98e92f0 CVE-2024-48259,0,0,27d57441f5e255512dd27b1ad7033b8c28496077f68b02c9d9d034adb851c726,2025-05-02T19:51:32.137000 CVE-2024-4826,0,0,0ad9607cf643d67669379370b5225ee1765d5838f18f40962d8a83da4bbd049b,2024-11-21T09:43:42.160000 CVE-2024-48261,0,0,c50173bdf25e4741bc510b2698ace8c3db8c27162251f6faafaff8896241ef72,2024-10-14T15:15:14.130000 -CVE-2024-48270,0,0,bfe806ddabff39025ba886d5dfaa90fdc829ee164059f1d09162abe5cac19315,2024-11-04T19:35:11.057000 +CVE-2024-48270,0,1,994544e0a592473f4ad0cfa991fe01403f20c893ae6350aadd987b7c4c6d5d56,2025-07-07T17:32:41.660000 CVE-2024-48271,0,0,f7e5889adb865036a3cfddda02c4a9b7e483f83c838dcdfeee042df986079712,2025-05-07T16:06:25.257000 CVE-2024-48272,0,0,4e73894766bfd355c1a954418a277d7d9470418297c06291396b1589daf30b57,2025-05-07T15:50:21.857000 CVE-2024-48278,0,0,809b76f1153de7810326cf668dcd28c7e3645b99c11b47ecf4bb4d9ed523f589,2025-03-31T17:27:44.297000 @@ -272125,13 +272128,13 @@ CVE-2024-4836,0,0,b46eb66373ee9c7205dc4e47a376290cfcc14a21eeef8a54f2457394680abb CVE-2024-48360,0,0,cbd4648d52b533950f6314046c59ad57de3b6240a2f9e5b8c6da38285f01b0c3,2025-07-01T20:36:49.963000 CVE-2024-4837,0,0,bf6369bee9a6dfac96ce0733693f5a63eb4e5fe5734ee8dad577fcabd7825627,2025-01-16T17:05:52.440000 CVE-2024-4838,0,0,c0d63d16282dd18c836e8aa545fdb45b66bb486d6db7456648ee8a63dd42b02f,2024-11-21T09:43:42.687000 -CVE-2024-4839,0,0,c60dba9c07ffbe8066208864ec2a82610705742c558d6b5ecae5fded9c086e12,2024-11-21T09:43:42.800000 +CVE-2024-4839,0,1,5c2c0c1b0d9af100553b764a8d9040a57f39959d96ebaea1e853f307ecc1acca,2025-07-07T17:31:29.717000 CVE-2024-48392,0,0,1c11dce693d0ee4995c004b60cd37a77352c7b39b9fd83c1c36edbec976ad14d,2025-01-22T22:15:09.283000 CVE-2024-48394,0,0,ab598f0afbb7de333fec3d5bd1e566b529961ea669c70ac78db0c6bb8e75847f,2025-03-19T15:15:51.183000 CVE-2024-48396,0,0,02200ea69824b1ea09777c3c3c73e74f2ba131f00cf994b110bfdb34b8d358bb,2024-10-30T20:35:31.167000 CVE-2024-4840,0,0,55ccd5cd93de647439d058661ef78145ac46b40735b9afde6747455bb308fd17,2024-11-25T05:15:11.437000 CVE-2024-48406,0,0,29efd63958fab2009ed4fc9683ab93a6a59efd85a7c3925c93c76285d2372909,2024-12-04T17:15:14.693000 -CVE-2024-4841,0,0,7c2c6457f8f84100938eaab44f4f8d6ab8e1be3ea00ac7381efd2449cc8a0ce6,2024-11-21T09:43:43.037000 +CVE-2024-4841,0,1,321c83c7988b82a6510a5a6b602401173a4cff7f67fb04bbef01a856fc50743a,2025-07-07T17:23:31.907000 CVE-2024-48410,0,0,76acfbbba797fbded687285f1d6b7f4e69da30abbf2ce3a40c171e75e974afe7,2024-11-04T21:35:10.317000 CVE-2024-48411,0,0,5ba8131b11bb2988a2eb49fa3eefc8cdbecb398361070e12e74e9f6b82bf0708,2025-05-17T01:37:19.267000 CVE-2024-48415,0,0,bb9e3b97ff90d39743d554ba54d4e6857ce95f8c7a439d575dc2c98763652ebd,2024-11-26T20:29:57.070000 @@ -272208,7 +272211,7 @@ CVE-2024-4859,0,0,0aacc5a3cb0a14cb14387eee0566e83bcbb93f6f27bda5c3ac0cfa9bf28645 CVE-2024-48590,0,0,c1fb7fee313840b9946ffd07ba5820c5f32f653754b84cb9873ace739d5285bc,2025-04-01T20:20:06.210000 CVE-2024-48591,0,0,b7497a6dc142c36f1765ce32752bd4de9d80bdb7eae7383f5673c274f2a410f1,2025-04-01T20:19:00.520000 CVE-2024-48594,0,0,5f135b45ea59de6928082f16d56bd6a4819d646905df29cfd15125e3dd5b34ef,2025-05-06T21:09:59.893000 -CVE-2024-48597,0,0,3482ad4d485edde00fc700e56d11a213fdbf1da64dd05ceba2a4784312c4ba7b,2024-10-23T15:12:34.673000 +CVE-2024-48597,0,1,b4c1f209c0920f302ce39457dcdf7248f69fe562a5f7dada66a6f9cee34532e3,2025-07-07T17:06:38.947000 CVE-2024-4860,0,0,43edac6988670c251a3268565520d2147fd38eb2c203678751a12426c018f3e3,2025-03-25T17:50:50.723000 CVE-2024-48605,0,0,5cf16ecb0c12b2d510ecd90565f906c729f66381b22aa58921368411648c90af,2024-10-30T21:19:40.027000 CVE-2024-48615,0,0,f5f9bb8c105d2755748c3e011dfcc315b53b307e54e5fd5b718ebc4985a4437b,2025-04-14T14:36:30.827000 @@ -274140,8 +274143,8 @@ CVE-2024-50970,0,0,005b9cfdb666fafccf9685017c470e1f4ad62c968971429e123b34e3471fe CVE-2024-50971,0,0,77afcd79986cba8f12a7e9572d1034771d65a21f647c12ccb9e908ef03effb63,2024-11-18T20:35:06.803000 CVE-2024-50972,0,0,21e5546bb95752f941c18e08060cbef5d11278a933c99a9c9da3f0d36a7a737b,2024-11-18T20:35:07.643000 CVE-2024-5098,0,0,049b2a5a9c077e412ebabc8ea752b97be62f7e1e454b3c87fcfbccdd2ca25cd3,2025-02-10T14:28:19.707000 -CVE-2024-50983,0,0,0c21d1df876e596c94efd6e87b89969f928baad4487d57d1c8a6c55acc4ceeec,2024-11-18T19:35:05.963000 -CVE-2024-50986,0,0,7cee3b0d95c42309b0f6647dd5dd1c3cb932519f501940734c9b053872751281,2024-11-29T22:15:06.677000 +CVE-2024-50983,0,1,add525243e9b3532d4b718d479709f75d6b7aa8106426fea3a02d737f2c17b7c,2025-07-07T16:12:47.073000 +CVE-2024-50986,0,1,f51a22e8e5e942e090f2a30ebfde75866fd5abe713265f41e2a8ae30602fc3b6,2025-07-07T17:03:46.800000 CVE-2024-50989,0,0,3ea16f2258939ba7699d8ffffb9e162a7c1074b1287d37a29649ff27af039c77,2025-03-27T17:57:39.710000 CVE-2024-5099,0,0,bda83cfdd75817e519e801952603024ae976922692eea776b8a4faa211c011eb,2025-02-10T14:27:10.093000 CVE-2024-50990,0,0,bfd5aba686c1c3649f0b59341f8357525fe80b6226d5b955d61d8fd1797fcacf,2025-03-27T17:34:08.310000 @@ -274209,7 +274212,7 @@ CVE-2024-51075,0,0,24a9c25e3ffc707f200389e741ea19b266840c341bd7e1a60e2cb6faa61d8 CVE-2024-51076,0,0,e5e3ed6e47651290142238cae400834ab55b60425e57165275989efcabaab333,2024-11-04T13:41:48.267000 CVE-2024-5108,0,0,57c59d539f2a319fae7f8851fa16349876b7e1fdd1c260329171fc8a5805933c,2025-02-21T21:14:08.303000 CVE-2024-5109,0,0,201d22e49633dedbd9075bde70b198276469698b3f8d182c50744f61f285b69c,2025-02-21T20:22:51.190000 -CVE-2024-51091,0,0,8440b065ff66f64dee93c1039b7cd57cc255e1677405f434aa7426eb48033e04,2025-03-04T17:15:12.870000 +CVE-2024-51091,0,1,82c73876bab9373730e86c0d49065035db449495d838d5da053a2e59332462eb,2025-07-07T17:02:04.873000 CVE-2024-51093,0,0,a6898e879de35c8cf2e460ec5a84ae7f0123df10aa875737ef5d0e250287c851,2024-11-21T18:15:11.043000 CVE-2024-51094,0,0,428eba4d2b25aa4f0722ef2b3d4daef54792a17342b2b8a3a1bd37dc73e6ba77,2025-05-22T17:28:00.107000 CVE-2024-51099,0,0,055804974cb075da81ff16f9aa419bc0d59d2d99eaaaea2af3fdcca94267384f,2025-06-03T15:47:00.773000 @@ -274284,7 +274287,7 @@ CVE-2024-51246,0,0,6c6a8a3bf70a1f0d48e829069aaa9f9f71d29f8795b8b0a656425ecfe78ee CVE-2024-51247,0,0,84df72efade865149b7a5cb0c16a2ea2cfd4db8a44409135f633bee55bb9090d,2024-11-05T19:28:25.143000 CVE-2024-51248,0,0,ddbd453a60ca6e327bebeda41e92cde8cba857d9939f6e0b891ffcf938f71b0b,2024-11-05T19:28:29.730000 CVE-2024-51249,0,0,da67e050916eb35b08fb36d71c803c17b7a1c7765b7626c71adcdc46f8577ffd,2025-04-11T15:06:23.113000 -CVE-2024-5125,0,0,aeda6fcc5bf0db9c2e415c1f314b03ca715e526d65b10b2faa01feaee4936a60,2024-11-15T16:35:09.290000 +CVE-2024-5125,0,1,cc467419128aa42e908e0fb75cceeffd0aee75320d0d5edefece6b384a036e43,2025-07-07T17:01:29.420000 CVE-2024-51251,0,0,ab5ca4ac70ac9de0d1c6d75cc0664d65ca2807fa763ae19508822e5dc97da1cb,2025-04-10T15:53:16.070000 CVE-2024-51252,0,0,b2080de2d9dbbc52c2643e731f5f6e86da168e286456d073791a6e201f28aba4,2024-11-05T20:54:38.960000 CVE-2024-51253,0,0,5d46c51a58905db70108d494ce57e8a608eeaa3148d71ad6233f6f7838753f01,2025-04-10T15:53:09.263000 @@ -274373,7 +274376,7 @@ CVE-2024-51450,0,0,b24ea7b4369b0a65d966e21c7dc8a033d60cc44bff8cf30a91a024c498c7f CVE-2024-51453,0,0,4395f70576eb7db137440ca95681a0d2ecae5c59236ec197ae6f8a0cf35e41a3,2025-06-09T18:58:08.980000 CVE-2024-51456,0,0,3719dc3b9538c2e6bef598db1a27814959e82ec148d71f3910afc75f2585f309,2025-03-28T19:19:43.600000 CVE-2024-51457,0,0,0ecbf506964ce26877e8439aa4a3160d1450f6ed502906387cfebb224c3433bb,2025-02-18T20:15:21.160000 -CVE-2024-51459,0,0,ccd38113bb0ac7ceb3c4ebde458d3b26f74a7f952d7630bcaefb8260127887c1,2025-03-19T19:15:42.180000 +CVE-2024-51459,0,1,06beb5d67de68a5cb8bdb520e3394ef14a2f00814d165d4b8f73778d177b1ffe,2025-07-07T16:58:53.093000 CVE-2024-5146,0,0,5b449c1c90a12e7a7e9baafe2349df6bbeba71c937f98b023ebea1c53ce310af,2025-02-11T02:15:35.307000 CVE-2024-51460,0,0,df7bada56a61ae8e12a2e4d5be2899c3081302373c6923b3ae2a7f5e2e034bd4,2025-01-14T19:40:36.670000 CVE-2024-51461,0,0,4876f12da7901555341c0b584ea1abd3abac7ec3d8f7f415a970047d9bfbda24,2025-04-11T15:39:52.920000 @@ -274388,7 +274391,7 @@ CVE-2024-51471,0,0,d1fabbd389ed07f88438083abab4daf0fc4c0b3ce9d11260a2ff188a030a1 CVE-2024-51472,0,0,f33cd4a96827f69ba7062d06690d8c777e88c6b5bc6b82d81498957fbaad88e1,2025-06-20T18:09:43.640000 CVE-2024-51475,0,0,0d2172b69a6bc7db542afd1e2958e9264f2599ff4e6bf7e2f043416bbf357c7b,2025-06-04T20:02:45.390000 CVE-2024-51476,0,0,60d94814215175c301437be50b363df906a0a0e446e91badb985325a9fb5b1b8,2025-03-06T17:15:19.763000 -CVE-2024-51477,0,0,4bfad3cdfb58fac031055e61e25b1001ad8a343cfa1380284d0e8eeb003ad7e6,2025-04-01T20:26:30.593000 +CVE-2024-51477,0,1,f886f9547dee2ef85ca74a64bc5f334787c8a3a3eab12857ea8a863eab9c639d,2025-07-07T16:27:25.043000 CVE-2024-51478,0,0,b904281e1db865428519471567627e1e4dc01f23c87f6593a76d74f07db7dc8b,2025-05-09T14:06:43.383000 CVE-2024-51479,0,0,cb129c5fa9252110468d8449b172cda17bf48af7dcff3fe804fa3e07241cca0d,2024-12-17T19:15:06.697000 CVE-2024-5148,0,0,d2b54d7137c273a75070428849fc3feb5db38d172d02c5264b2f584a76d53d2a,2024-09-03T12:59:02.453000 @@ -274482,7 +274485,7 @@ CVE-2024-51564,0,0,bdb9006ab15c4ee7c4fb25779283d79e92f062ab5f40cfc70788576ecb6ba CVE-2024-51565,0,0,a7ddfdb609c02584d7a89c3915e0de70c86be13e9f8ef270589ef24614c5ec64,2024-11-26T21:15:08.097000 CVE-2024-51566,0,0,1fd52d54ba2a2afa1bd706d74deb2afeee5b314d5e4c8525c97ce6b09c31f06c,2024-11-26T21:15:08.313000 CVE-2024-51567,0,0,b4fe0cc4aa0e4033e15c94a29d624c9b7416a32ae46ce3c5d4b87b9b98a32187,2025-04-03T20:40:23.433000 -CVE-2024-51568,0,0,626f562abfddfe9c0c988e01dd6c94b63001acaad6f80e4023607fd1e9f99d68,2024-11-01T12:57:03.417000 +CVE-2024-51568,0,1,f46ec860bb589ef7735149c2e918ec4dfa90da8a22f1b6ce4c56cff942d0f1f8,2025-07-07T16:17:23.937000 CVE-2024-51569,0,0,2fdfb9be53f90cf85f709258ac71ba7b2b913a516789f2a03153bc18d2d8904c,2024-12-06T11:15:08.630000 CVE-2024-5157,0,0,75c6b8b24f558cd83ee042ce806213ad234e3fa3949f34a265920db4ddf858ca,2025-03-27T20:15:27.833000 CVE-2024-51570,0,0,7ef279fad1ecc643141c7d475972198d020bd7ffff6e7ce123a18cfe7a427865,2024-11-12T13:56:24.513000 @@ -275492,7 +275495,7 @@ CVE-2024-52869,0,0,2a92ec6b553074493fc0043efdb29377c72de8a63d0c9f3124f27e127eb07 CVE-2024-5287,0,0,566c0092592429f6a0f9cf1bb5d88729dcb3f5eae9340faa4d589fc4172ac4f8,2025-05-19T14:59:51.853000 CVE-2024-52870,0,0,1a3a6d971d4bd90b76dc72d1f20af849443ecb143b46e583f633f2d3b372f550,2025-01-17T22:15:28.663000 CVE-2024-52871,0,0,4fa0d907470e8546e7299ca1c4e9a9aae1dd1a776a6bcf870abc5653e4815ba9,2024-11-18T18:35:09.027000 -CVE-2024-52872,0,0,e845dd8813de912fcdd2994a0b9947cc6b19f66eb82f731e79c67a15a70872e4,2024-11-18T18:35:09.270000 +CVE-2024-52872,0,1,29b785e94dffa2b44b2e4b3ba8cdb8b37bcc558bd8e2d61033d3e3b50db516a2,2025-07-07T17:59:56.147000 CVE-2024-52874,0,0,52576182d175133e523562535334a82a7d49664c9e5655dd0c887880097a7116,2025-05-30T01:18:52.420000 CVE-2024-52875,0,0,1ac4526d2c044d382cc0f35ef9e40c2813ed4958da8686e71b5eb97bc5d89bd5,2025-01-31T08:15:07.827000 CVE-2024-52876,0,0,6fd21241a1a4f5f736d93e368fdcf08c204bdebd19eb249ace2fceb507212592,2024-11-18T17:35:08.900000 @@ -275942,10 +275945,10 @@ CVE-2024-53376,0,0,8911dbfc8997baa2a57cf32f34b4dcc9a56903a67bd0c4ffc9a41950a9065 CVE-2024-53379,0,0,2b6df428322956cd20e5c553031d5487355c33ab4cabbe810e5c3a60725bbc7b,2025-02-27T19:15:48.927000 CVE-2024-5338,0,0,2afe684191c73468eff383b7ca370b5770f74a1aec9a85ac89128ddd56eac957,2024-11-21T09:47:26.997000 CVE-2024-53382,0,0,34cf719787037e6f12d974bf13a6b542a722ed46c063f99e023d87bc4aaae973,2025-06-27T13:08:24.660000 -CVE-2024-53384,0,0,e57b3e958c134a101a861d9717cc9b114f227fbe9bc757f8630a7a49d84eb3ca,2025-03-05T19:15:37.560000 +CVE-2024-53384,0,1,61644d21913c0905da5cff4a670e36639370610a2bf93a08db97b4590868c9a5,2025-07-07T17:58:38.380000 CVE-2024-53386,0,0,1d32776607446a935905b3b40d9f1528e7152f399521604259f5f644821a3af6,2025-06-27T13:01:00.597000 -CVE-2024-53387,0,0,fdc54f8ffbfebb201fc14aec0880b09b68bfc53e899ede8ae90964c253610527,2025-03-04T17:15:13.043000 -CVE-2024-53388,0,0,62f1413ed946af62cc1b12785d520e1981588f3cbdfccc1c3cd0e56b0825b25e,2025-03-04T17:15:13.217000 +CVE-2024-53387,0,1,a1332e42ae480cea28a8ced85255fe6d1433d5c3837ffdc105699c6ad41cdf04,2025-07-07T17:56:33.610000 +CVE-2024-53388,0,1,70e4cca9984a16cbb02143eb63c97e9002afcbecdf3b408d26520fde562cc3c0,2025-07-07T17:55:50.930000 CVE-2024-5339,0,0,0d824fdd75ea0024ca1d8121d180fa88d48321696b6a589d7b7ff1cb4a42c3e7,2024-11-21T09:47:27.133000 CVE-2024-5340,0,0,ee38ec7c3eb1b237a6f1222e4c2d09975ad3132aecab39c527a9d8e3693c02d9,2024-11-21T09:47:27.263000 CVE-2024-53406,0,0,b1f1b6142b49109a951d8a2e0aa78a241840e3c12664585e2e415f03db147991,2025-04-03T16:40:40.567000 @@ -276034,7 +276037,7 @@ CVE-2024-5361,0,0,1143603818557694d3d084ae1806f240dd58df259ad7cc700805377daac7c9 CVE-2024-53614,0,0,e0f021daad18a863a0efc93b4705ca0ebff1779316d0f9947e46818dacd2e7b5,2024-12-04T17:15:15.310000 CVE-2024-53615,0,0,826b150a45003af8ee4c2b07765a8bd01ea4d6e79c525b1590d67c5050792e09,2025-02-06T15:15:14.707000 CVE-2024-53617,0,0,dd2ee5869a76723244988f189f5e4e219fcd77588c7888e87da2897c111b37d9,2024-12-02T20:15:07.710000 -CVE-2024-53619,0,0,3ac15534bd1ff9a39dc52eb6d61ff2d03f41babf638d62b6bc10e4b3c162aa3d,2024-11-26T20:15:33.880000 +CVE-2024-53619,0,1,7aa9902307401d32791404d8a53da622f3f8ec3e35b90595914aa1bf140b5fa9,2025-07-07T17:54:54.130000 CVE-2024-5362,0,0,65cc93fbb06de51acd392fcf91df16bbed3865e6bb98fea60125a3f2dc4dd426,2025-02-10T13:55:46.317000 CVE-2024-53620,0,0,a35829a7ebc3587d1854c8e8201a8b5316fe5a0ac7a6a5db1eaaada93174fc63,2025-07-03T00:32:56.547000 CVE-2024-53621,0,0,cee1ac7de1ef04bd9ec9f45d6898c38f18fe14041e987113fd0fedcc152e5082,2025-06-30T20:15:24.383000 @@ -276494,10 +276497,10 @@ CVE-2024-54158,0,0,8c6dc67958b420fa6c8d095b96806595ddd0e8ce477f8baa35f7cadb7e015 CVE-2024-54159,0,0,a6966b82b06dc6cc6ffe535670f7fe423d90e23d66a5791ea4c4b55b9827bb58,2024-12-03T15:15:12.097000 CVE-2024-5416,0,0,2cc8eb5abc95e0327999359a16ced825b9a25c50e0044d232fce1c6bda48c682,2024-09-26T14:37:59.290000 CVE-2024-54160,0,0,4df1c13c84c21e9aa7050ae9319fa9577473b95f44c8e77953e28575fc0cc4c7,2025-02-12T15:15:15.050000 -CVE-2024-54169,0,0,9ee21bffadd1c72dc32e439dda6035686a20c2349e0c21a7f33a5b1478be642c,2025-02-27T15:15:39.100000 +CVE-2024-54169,0,1,a920c8027c058d411c3da4de627088769457f0a4f91e87669a43051b5be51906,2025-07-07T17:52:04.707000 CVE-2024-5417,0,0,2c092c55b8a1a8c8890a1e4546beb75d8fbd37f20d02cbd8444692608bc2553d,2024-10-07T15:44:01.830000 -CVE-2024-54170,0,0,01c74b5cebf47dee9ffd22df54baa865e52cb486c8fc83eb4e43f112b92384ef,2025-02-27T15:15:39.240000 -CVE-2024-54171,0,0,3051e251725797756aa23624ed54cd9908d1a82ca0d5df8ddf25829d45330397,2025-02-06T21:15:21.453000 +CVE-2024-54170,0,1,d9bacdeaf174dc7a555fa463f4aeb06aaf201fbb2f1a7b85d9ac2adbeae5c4a8,2025-07-07T17:51:11.820000 +CVE-2024-54171,0,1,2360ac611b8ca7d7263cf5a2978759ff82d32f30880ae2415f1ecb7cfdcf0d3c,2025-07-07T17:50:09.553000 CVE-2024-54172,0,0,89b8cf2473aa1d00b65e0aad499d5269d148da59212888517d4b625d48cc59f2,2025-06-23T20:16:59.783000 CVE-2024-54173,0,0,aeb4bf587211b71aeccc6b5cd1518dde81918890bfbe72f41ce8080bb57e6159,2025-07-03T20:44:08.330000 CVE-2024-54175,0,0,ac0e271a7a86253c9d856e43e336a7196fed14605337f3e646841823ba1fb5bc,2025-06-20T15:32:46.470000 @@ -277011,11 +277014,11 @@ CVE-2024-5495,0,0,5042268a950e30bd3019e8943c12e21fd198069753506c20c0160553a125c7 CVE-2024-54951,0,0,5d19b9002b3d609d782a9b71d0927437769cc7cbd3c6535e97fd8da5cd4a41ad,2025-02-14T16:15:34.060000 CVE-2024-54952,0,0,3ba3cbe5abd29d54d060f58fc9f2a8729d0e932da40d3d524d3a592774828186,2025-06-30T14:46:38.763000 CVE-2024-54954,0,0,bd6322507b33dbf7676b3d047db7e71ad46212f09cfe0c196ceeabe7a1c0b796,2025-03-28T16:49:01.760000 -CVE-2024-54957,0,0,899387ef50cf72c6d8c215357f5ce70a7ea489933dd24bbd3bc1569d104ece3d,2025-03-03T16:15:38.450000 +CVE-2024-54957,0,1,a8efcd2499fe44336bcdcf763d9fff0dc11ee96f5b3c95ee964390e4d88ae0cb,2025-07-07T17:49:10.313000 CVE-2024-54958,0,0,6c28c9b95a783bcce554afb6345b860c78cf549b09f3836a1becfe83a94cd32b,2025-07-01T15:02:14.003000 CVE-2024-54959,0,0,ea16c13f658922f6adca5c7b8dd69c76dfac392156115d80703490aa64381d3b,2025-07-01T15:02:21.177000 CVE-2024-5496,0,0,9136fd74dd5c910c46896c769e58528b87587fcd9bbfc0ee678598fdc16fe0a5,2024-12-26T16:43:17.607000 -CVE-2024-54960,0,0,eefb6a50f3801a142947e038e967c386dd00beb2ea73b895557bf3a7cb94bfba,2025-02-20T20:15:45.927000 +CVE-2024-54960,0,1,5b06a371df5e62ce2a9cd277c6ee7c5b4926892187514bd0d544977c8d3d3a04,2025-07-07T17:46:10.793000 CVE-2024-54961,0,0,d01efa3a725b7b071feaa9038a3d2e643299d5c9a69e4d407f43d6af709bc320,2025-06-18T23:39:55.290000 CVE-2024-5497,0,0,3a56eddb971efbd0b60114afefb35325ddcc2425bb5133ac9d5e88b22eba20b7,2024-12-26T16:43:33.383000 CVE-2024-5498,0,0,9ecbba4511623233a33c3c81181005b0976c38a133da4d6811e96531fd97f158,2024-12-26T16:43:44.433000 @@ -277080,7 +277083,7 @@ CVE-2024-5515,0,0,5bb4882dfb8dda0d2b9d77cdb4d020aa61071f088ba71135c2e6a6ba264895 CVE-2024-55156,0,0,e2d73863f92a13ba5a7ea15c6a140f24237b8ed533ae9e6303c08294c1a030a9,2025-03-17T19:15:23.857000 CVE-2024-55159,0,0,21aaa8bd95a0dde8d49995a67c8bad2148c4551ae248303bff54a4cf35bde7ec,2025-03-12T19:15:36.810000 CVE-2024-5516,0,0,53a8740d8816a4f374dbafab0d6f56e07101f9c722cec44481a0939a29d32f86,2025-02-11T15:12:30.713000 -CVE-2024-55160,0,0,8feb026db662ebce93e5153a21bb4426c1e3edaa66e7a6deac8da6703f64e0fc,2025-03-03T16:15:38.617000 +CVE-2024-55160,0,1,afc909eda01409198aed0e5e505ce6c9b8075e5ed30824d96d6e5ec47f1dba80,2025-07-07T17:45:27.787000 CVE-2024-5517,0,0,0649d3ce188139588314050e04ab71370b87a60a630fa2c91cc99fab711ad292,2025-02-11T15:11:46.037000 CVE-2024-5518,0,0,48635f6128d0778d3463c751b2befd0ba0e27af3874d86d6f48c1dec7c9c6253,2025-02-11T15:10:47.877000 CVE-2024-55186,0,0,80cbe31f0c6c827f9fe1ea965ee9f035483ef81bd6d62228d42baa84cd806d8a,2024-12-20T21:15:08.850000 @@ -279246,7 +279249,7 @@ CVE-2024-6161,0,0,3c9c824cced0e59e1fa1f66499e0ea0aa00f4fb3d6b6beae4d94d0c930df5d CVE-2024-6162,0,0,0316a73f3d20ff1473772a9592a254fa07ac0f11c5d708a19fea6aa30a70e961,2024-11-29T12:15:07.840000 CVE-2024-6163,0,0,ad65bc0bbb983e944bc3286cfacfd764ac5ad764ba7d4b85154cd4e9eeb304c8,2024-11-21T09:49:05.690000 CVE-2024-6164,0,0,9c35421a747129a4a9579df5cca56f762fcc79420e2d9112cf0a7dd9dcae212b,2024-11-21T09:49:05.930000 -CVE-2024-6165,0,0,b46a517efcde477a0d388e00a4e0128e2df497f0257609a8235f0d3bc58027ee,2024-08-01T14:00:13.553000 +CVE-2024-6165,0,1,c336e3944d5b044e1a0e87387e2ee238e333a40938ad0b0b0aded1e0765d312f,2025-07-07T16:08:08.900000 CVE-2024-6166,0,0,a3fce64695faca4523ccbb01ae8206b13dcd15b1836592c5afd5cc66645c7ab7,2024-11-21T09:49:06.303000 CVE-2024-6167,0,0,7a944b2a5e446a6e8d667d9887fe6c269027fd0a363b001b9c2223c32b6e76ec,2024-11-21T09:49:06.433000 CVE-2024-6168,0,0,2897e888437d3297f1320d28eb54aeaca10e194efb76e65c3fa86ec61f89a137,2024-11-21T09:49:06.540000 @@ -281247,7 +281250,7 @@ CVE-2024-8262,0,0,42b8f1972558b216e69ca905aef3f5b10f75cb4de4f919f0b741d7d1682ba9 CVE-2024-8263,0,0,c30b2614165b38dd1e79b54ad73ee801cd690dec6dfd531970fbb0c695a6b519,2024-09-30T15:57:26.213000 CVE-2024-8264,0,0,2d0f7550734ab3870107734db176c89529f357d12409e5b5d0288029aba420c5,2024-10-17T14:06:39.420000 CVE-2024-8266,0,0,7f51b02f290727aff51f7eadea155b5c0e5946c8babbbc1d8d023ac984ce4386,2025-02-13T01:15:25.137000 -CVE-2024-8267,0,0,556bbf0e2f22fb3093c722ce766684973101a0bae906c0f19144ac1f44932697,2024-09-26T13:32:02.803000 +CVE-2024-8267,0,1,03061b3b205eda6f4193414449d9af832142eced916e627b3972a898b6614399,2025-07-07T16:05:26.340000 CVE-2024-8268,0,0,667bbb0a564872efad28005d51b7df0ba4f94a2bb52f2009f9be8e9b89ea509d,2024-09-26T16:15:31.053000 CVE-2024-8269,0,0,3a69bbb4a680b32b440288852bc11b13bca8a647993f102997182838c5072492,2024-09-18T15:20:44.553000 CVE-2024-8270,0,0,bdfea8865c481a7c5c334a135d347c37655cc538a90033000b7f8a37f0a98c39,2025-06-12T16:06:20.180000 @@ -283666,7 +283669,7 @@ CVE-2025-1026,0,0,d410d35a6aedcb834521ffa4bcd1a4033d4831a19e562f1f0395f14e9bb1d3 CVE-2025-1028,0,0,7d86a6dffcd03cc50ed664d1f7c2b2eb464439e0b7dbc2e8aafa1f3f61bb44bb,2025-02-05T04:15:06.543000 CVE-2025-1033,0,0,2e75efe90e6f1171f2647c05e9e04e4b8fe770c2058d21cdd9f3913a054e9c03,2025-06-12T16:36:24.740000 CVE-2025-1035,0,0,72fea0a2d80ae07fdc30e5739a98c27b4b9464bbe1b4b8593a6bca9675ecb8a3,2025-02-18T12:15:16.087000 -CVE-2025-1039,0,1,d228f9db535c2e54d02c1803b426d3cab5f94a31c5aa4842669c29dd400999ef,2025-07-07T15:58:13.457000 +CVE-2025-1039,0,0,d228f9db535c2e54d02c1803b426d3cab5f94a31c5aa4842669c29dd400999ef,2025-07-07T15:58:13.457000 CVE-2025-1040,0,0,f25cfb3c1b13ff20b39411a263a6cb29b50914a2189270974ec535f559ed5ac0,2025-04-01T20:19:55.317000 CVE-2025-1041,0,0,0d87ae84682d2f498d2baa10c2d8935c8e95f840fc7f05be7d4fe40a246c8d77,2025-06-12T16:06:39.330000 CVE-2025-1042,0,0,e4600eb751c0559414826534607894ec791f03e01157094495f2034b236d6aad,2025-02-12T15:15:16.230000 @@ -283933,6 +283936,7 @@ CVE-2025-1340,0,0,b9875780a16a13744dbcd5d844e8ca36a7e2aa268ada35546ad50497001d4e CVE-2025-1341,0,0,81c73205f91da4e4a53e62a4a3612a03f01d8a5a3578739a3ddcdc59f89bd9d8,2025-02-16T14:15:21.893000 CVE-2025-1348,0,0,ab815c71f3de914c23737b7e6739ab83b4fab2a0fb7fc5f61379af694b9ba8bc,2025-06-23T20:16:59.783000 CVE-2025-1349,0,0,4532668383d59e35fa5addba37fb3c13cae3bed698caa0eef3b8d64d3648b7e8,2025-06-23T20:16:59.783000 +CVE-2025-1351,1,1,841d0477a940f021cb657d587174eb9a74fc2b04476d30224d3384e629d52492,2025-07-07T17:15:27.693000 CVE-2025-1352,0,0,49ac14e9196cb2742d9d61507be651bb74f909d13564705f3ec967ee19bb4a5a,2025-02-16T15:15:09.133000 CVE-2025-1353,0,0,592b3b5fa0e656024e4607b02db6b1922da161f4886bf146bf25aacc925677e1,2025-02-26T08:13:23.443000 CVE-2025-1354,0,0,e55c21cbd1f75bac3c8a803805ffb3f723d0da78df46917ed4345de571306e58,2025-03-13T07:15:36.740000 @@ -285052,7 +285056,7 @@ CVE-2025-21193,0,0,f3dd779a9a437e46fb9f30ebcb1d8f684dbb5bb54fbad7b1b2971d455cbea CVE-2025-21194,0,0,43ed685fd879d1b6de619e74d4934972b256736e9b5e58bafe479eb8a25785f8,2025-02-11T18:15:30.820000 CVE-2025-21197,0,0,66b102defae9de16cf9ea6a44738bc561191b669b49be1710d12bc03001daa76,2025-04-09T20:03:01.577000 CVE-2025-21198,0,0,53f4f6f369d20143c35bfb3b5b8897af38e7b533edcc49e38792fe973cc138bb,2025-02-28T16:55:17.600000 -CVE-2025-21199,0,0,276a22a8720da9a2315cbc2cd3c12e2fb4e71c0ebdc7c7c4106dda2f01fb36b7,2025-03-11T17:16:19.670000 +CVE-2025-21199,0,1,32be12392657f1fce64554a663444e39b92ad4719ecdf86cbcea16756590db73,2025-07-07T17:18:36.070000 CVE-2025-2120,0,0,a20f68e8bef6072d576a22f2c65ab19ae6739ec0119cc148025accb76fc283b2,2025-05-28T20:27:55.277000 CVE-2025-21200,0,0,bed665fd252cfd79c02f5d4dae91a80a34e04b772a3708341c7356808fa5bc3c,2025-02-28T16:55:25.900000 CVE-2025-21201,0,0,8d16d2905177160db2b6032ff92e8d3931d8e334462a39af27f84ad6f44e497a,2025-02-28T16:55:31.473000 @@ -286298,7 +286302,7 @@ CVE-2025-22505,0,0,c16051b04eb145418bded72ca77be037cf9fee37f07ce6a67c59037e48b9c CVE-2025-22506,0,0,dd4f7e8cd5bba1f92d667c12097d46cfeb46c7441fe76fb524ad95b719119656,2025-01-13T14:15:11.127000 CVE-2025-22507,0,0,c94c1401c11ff9cd6e4f5b9836ac27c2be70ec71a54af6e374399078e6643932,2025-01-07T16:15:46.040000 CVE-2025-22508,0,0,5d8664a0aa0edd6273a6b83a3d209997381a4764cb066100315f48a722d20397,2025-01-09T16:16:27.433000 -CVE-2025-2251,0,1,d7a840e6d1c455e2c31e0c60aa7065e2396952b31559332948bbc00ca8f32273,2025-07-07T14:15:23.307000 +CVE-2025-2251,0,0,d7a840e6d1c455e2c31e0c60aa7065e2396952b31559332948bbc00ca8f32273,2025-07-07T14:15:23.307000 CVE-2025-22510,0,0,8cd09caaa1386b81418691abc835ea46a509fc6ea5bfc34f8e8072eb06430e1c,2025-01-09T16:16:27.590000 CVE-2025-22511,0,0,e63694e2e15e227a326b6b7e4e9fd05c2b9f3ab5d4ee2553e80b77cf618afe5b,2025-01-07T16:15:46.180000 CVE-2025-22512,0,0,4cedaa7556b030850a6c6378befcffe73cef9d1cc7a9b8b6aba772cc15bae404,2025-01-07T16:15:46.320000 @@ -287704,7 +287708,7 @@ CVE-2025-24036,0,0,fd3c57cd706b96e46ede143d602a78012ec65a6099cd7b40520437f8a49a1 CVE-2025-24039,0,0,4d28f6dbd3596cbed15c2148cda69ce9af433dfe231f6a88e6532d20d2b0a833,2025-07-02T17:13:40.477000 CVE-2025-24042,0,0,fa5b58e27d84985209c29bc9392bcb6eff9ea6341eb01b8f6fa6fcf07a3f654b,2025-07-02T17:15:25.457000 CVE-2025-24043,0,0,a697fb65957ffbe6fa91851709d398ccc8d0e39d07bc2945db79a70b7b50e980,2025-07-03T14:29:14.207000 -CVE-2025-24044,0,1,f262081496be4e93343ba12a27f6d533c94c22c7179dea4837118f8ae9b968c7,2025-07-07T15:29:46.383000 +CVE-2025-24044,0,0,f262081496be4e93343ba12a27f6d533c94c22c7179dea4837118f8ae9b968c7,2025-07-07T15:29:46.383000 CVE-2025-24045,0,0,6ebdc28100ecc6d82c503f108dad7c9baf1bc6f1007d2d0ca210c4c00dd59908,2025-07-03T14:37:47.237000 CVE-2025-24046,0,0,37afe72cd4713ee919746a914f5115f42d7108a1e27b6a1949e8f1b106d67574,2025-07-02T16:38:51.330000 CVE-2025-24048,0,0,6da0d8dc29719c7ef09c21b350ef4bbc71b3b129201a436a15c303684865e9d6,2025-07-02T14:23:54.260000 @@ -287731,11 +287735,11 @@ CVE-2025-24069,0,0,19556b6c7b436792770b31c579890806fce0d6ca59ec7f01c5bcdd49024be CVE-2025-2407,0,0,21e602e5f9293dc5b926b2bcd858886585bd73dfbdfdae3fd03d8f092b288eaa,2025-05-28T15:01:30.720000 CVE-2025-24070,0,0,3b2438db3d9bde03550b15f66ef9bbbeb06b8fdb0fc50c9b8ad59ce96b3ba31a,2025-07-02T14:25:46.603000 CVE-2025-24071,0,0,09beabf0ea1eacb8a241163bca8e597ef799b9a12e8eb51c6ed950024f448bd8,2025-07-03T13:23:25.997000 -CVE-2025-24072,0,1,a52a78d3ae833e9648f7e88535b48cff7f64e94d4411c4ace81db9b9841b1ec9,2025-07-07T15:42:51.150000 +CVE-2025-24072,0,0,a52a78d3ae833e9648f7e88535b48cff7f64e94d4411c4ace81db9b9841b1ec9,2025-07-07T15:42:51.150000 CVE-2025-24073,0,0,2ce950855e036572bdf1b5168b88753d44688143e458dda52f5120aabc24507f,2025-07-03T13:04:30.673000 CVE-2025-24074,0,0,38d354e07de68d8d5a67ed5389fddf6100244b9c13a1f7e2ee950a1c9961502c,2025-07-03T13:03:00.923000 CVE-2025-24075,0,0,e1439e99cd6e80b94161ca4c108bb44d05b9e2a54cd61fc6da56cb6014105352,2025-07-02T14:56:16.393000 -CVE-2025-24076,0,0,f4739209573c6aeab5d120d9e885beb26b37de30a5c9a86e684a9e7b23cbd4da,2025-03-11T17:16:30.480000 +CVE-2025-24076,0,1,c7ae39d6c267c2f3c979d7ad5c872c9caa67551b9cf6499a0afff8399c170cb9,2025-07-07T17:24:22.777000 CVE-2025-24077,0,0,cca3d2feb2cdd17f822fdf1dfacf11a69bcb2eefab6ee159cbd8498fa01cd4b1,2025-07-02T14:31:02.807000 CVE-2025-24078,0,0,1d0cda1b97e7a2ae3b4a189a987ccef713e0b429fa38837e2b3e0dcad91f48bc,2025-07-02T14:31:08.243000 CVE-2025-24079,0,0,89572583fb31c35d07d78f184e1e5217d2bdba0eb6577817e9bba5246a4bdd24,2025-07-02T14:29:29.767000 @@ -287744,7 +287748,7 @@ CVE-2025-24080,0,0,c882f4e1f083bb518c51e8366150ac884c934cf8e4904c738f6f0cf61b2b6 CVE-2025-24081,0,0,7cfcadf9c01e34a6647941d77caf002928eb582a112a438bbff6c9e6fc878da2,2025-07-02T14:56:21.300000 CVE-2025-24082,0,0,7830252df0a57f40d7fe48307b99da956d062a0556d95bf31379829319241f98,2025-07-02T14:55:48.740000 CVE-2025-24083,0,0,61d7191ecb1d0d110b37bdd46ac8757832cfceb79dcb29664ac5496b1637b590,2025-07-02T14:56:09.077000 -CVE-2025-24084,0,0,f058d1e20f5c6b7c15c152f1747fb860f30a387c6c033c3555e0fdb990d17dd4,2025-03-11T17:16:33.523000 +CVE-2025-24084,0,1,d9d8d0bc4d6e18bf566a146ada4555a34b0b6de02fa2c741a7b29ed5f05283a5,2025-07-07T17:29:07.287000 CVE-2025-24085,0,0,c110c1e5c7fcb91d09d7ebbeba87f90ad818d57e9db14cac177386dcf16b0e01,2025-03-21T21:01:31.620000 CVE-2025-24086,0,0,7c644e120cc41a291828171399048534e1e04b082ef7ed82ac204947bf2fab49,2025-02-05T15:15:21.750000 CVE-2025-24087,0,0,b6d09d2d8f9c9fb48f34374a1c228deecaf72eab2a92a63c6f3af02952b5c8f4,2025-02-05T15:15:21.923000 @@ -288522,8 +288526,8 @@ CVE-2025-24983,0,0,9c6db97dda1eb21ac3537226412af99f05d622f649970f86e9e8dea4e8a3f CVE-2025-24984,0,0,03a26ef5e2e083b8ec5eb86c5382c7f2a202ae89d04f9b4f5a0656245be71b86,2025-03-13T19:54:42.300000 CVE-2025-24985,0,0,f377c8abed64d4d05a40ebd7ed35ddd7af7085445808515e99f8096fa411b5da,2025-05-29T16:31:56.417000 CVE-2025-24986,0,0,e0bd8ccb9424922cc22cbf6b1018e09d2694bd5052f9fe35cfe8dc99ec0aa92d,2025-03-11T17:16:34.563000 -CVE-2025-24987,0,0,463eb55058d3a7c38a5706217b741be1e89693a881755a1e5c67c6641a4e6573,2025-03-11T17:16:34.767000 -CVE-2025-24988,0,0,fc7554eef1fe0c6fa0d06eca6830be12f6c608268e1c710ae11fb4a354077e47,2025-03-11T17:16:35.013000 +CVE-2025-24987,0,1,373e6d09a8ace8cb30dc3914cdcee279354e0dbcfd234bfd436136c7b019f8ea,2025-07-07T17:33:06.623000 +CVE-2025-24988,0,1,865dd4a39f1eb6bb96a45435a2ce453af1f63a7b4194a0e4d20de09f7b43a3a7,2025-07-07T17:34:42.237000 CVE-2025-24989,0,0,41bc3ff3ec452f1ed2e007691180803f1ca2c43c5c00d6d0ec8842763c09b177,2025-02-24T14:55:58.823000 CVE-2025-2499,0,0,3c8d6ce8948dad3f3862a248891318bfe8741eeb1c7c9fea64b2e5275865eed3,2025-07-02T17:32:56.357000 CVE-2025-24991,0,0,fe48f5f6f641cb4d1ca7b0630daabf291aff416faca79d51608df141b2093be8,2025-03-13T14:20:06.393000 @@ -289058,7 +289062,7 @@ CVE-2025-25899,0,0,49509dab92a7490493f015c3a421f3df20422695bc16604a21e744cd92c09 CVE-2025-2590,0,0,70d163597c6b54a9b221dbceb999e3dbfd19e4684bda0b9f31a9a118c1978471,2025-04-01T20:23:46.903000 CVE-2025-25900,0,0,197edac334969a36528e38515d8f1495b86f020e3a948095f19453a08a5759d8,2025-06-20T17:25:56.670000 CVE-2025-25901,0,0,dbbaa66456410cc814c13398a9419347a95d4c008549889e82c9e08064439afb,2025-02-20T15:15:14.380000 -CVE-2025-25905,0,0,08fbfbc60c49d905d5edbead2653f6e1d00b6817e7348b1c9c0ac3d88e980062,2025-06-26T18:57:43.670000 +CVE-2025-25905,0,1,b0a787f5b139b80b088a724e8b1aa55be810269b3432689062714e0a4e7eed91,2025-07-07T17:40:16.800000 CVE-2025-25907,0,0,681ab7723c80b1301377aa811feba7528ababa2c1485001b8f2409e876bfceb2,2025-05-21T18:13:13.207000 CVE-2025-25908,0,0,a81766b666c2964fee0c02555ee0c938dc13151d974c9b24e038826f4a0a2e05,2025-06-23T20:13:31.600000 CVE-2025-2591,0,0,ee87141e12ee943e529b8bb384fb8bdb2408b45f9dddbdaf93fe6f79882786ad,2025-03-21T14:15:16.853000 @@ -289441,7 +289445,7 @@ CVE-2025-26641,0,0,16463b8d53acc0019302efe014b81b523c0c693a2c48a9fca2c5424b2ae7d CVE-2025-26642,0,0,bf837ecee40a4311ebea354246882b93776a0ecc74c665f11233cba10a81abc8,2025-04-09T20:03:01.577000 CVE-2025-26643,0,0,fdd1c1937beffd124d32a1ceadd3f98e87693b9c4f7e4b7907e61b194eac7eb4,2025-03-13T17:34:08.587000 CVE-2025-26644,0,0,44e1044c4d0d3cbbd3aa2e16f8f67115b72a4d2eb3e727fc6fc7df1ede128e07,2025-04-09T20:03:01.577000 -CVE-2025-26645,0,0,6f83a8eae6e2972cb0c60cc382605a725bde9b4ff7bacb4245769e7ccd222ce6,2025-03-11T17:16:44.200000 +CVE-2025-26645,0,1,6b7294c76f03c6630fe2a160d3aa4389a2c90cf66a458647790ebd865abf627e,2025-07-07T17:48:56.897000 CVE-2025-26646,0,0,01ba4be88faf549065e64c38ef806b2a9e328aa52787c799d143a306de18756b,2025-05-16T14:43:56.797000 CVE-2025-26647,0,0,1ef576c1071d29897f8aaf9bf45cab19b8872572857364cde48ef6f1949b52c4,2025-04-11T20:15:17.143000 CVE-2025-26648,0,0,2ae669688c6e37a58ee66480fa32c225a6d2b5d0f845422b1a8e5f1785bb76ce,2025-04-09T20:03:01.577000 @@ -289559,6 +289563,7 @@ CVE-2025-26776,0,0,777b3d6f00f90c4800bb30405923ef1b3111a8007fa8cde8f118fda7de44f CVE-2025-26778,0,0,e6495d058014d07c9a16b9a09e04b5b2bc9bd02758320b8fd378f88f985b5aac,2025-02-17T12:15:29.417000 CVE-2025-26779,0,0,9024e341253b64921a65d75d7033e8e5a31f095d10dbb69b59e8edd506733722,2025-02-16T23:15:11.630000 CVE-2025-2678,0,0,21e043de7d99133c751a03cd3480d87cab1f4c4859861a7ef4f888b9aa8448ca,2025-06-04T15:46:43.063000 +CVE-2025-26780,1,1,e987fadfdc06199ec82ae54d5222c3e9d82f5acf79b752ad3fe9051427717ec3,2025-07-07T16:15:22.683000 CVE-2025-26783,0,0,092d46adf9a3a495bb9ae7bdea70708dc9e2b75c7e54b98486f2b7ae1421fc36,2025-07-01T15:00:29.100000 CVE-2025-26784,0,0,9b368b7303cb1dc1907afca1674220ceea8abfeed8648e6f0fe6b5f36f8681c4,2025-06-25T15:11:34.180000 CVE-2025-26785,0,0,a61358611e46e9acebc43670ee1699ab15072aa55a4b4f607bd41948bbd8c933,2025-06-25T15:08:42.323000 @@ -290926,7 +290931,7 @@ CVE-2025-2939,0,0,497c6664ae20f8a948b0f84db397226bb430fc8fce5024044cfda74ba98efd CVE-2025-29390,0,0,2af3ceeb0b0e4ec487468d0265cf4f9bf7105f9f26e650a3615e67390bc16783,2025-04-22T17:06:50.490000 CVE-2025-29391,0,0,3957a6f12658ba0f8a64a4509b31e9cff0f721c7269083a2c5583c8497158773,2025-04-22T17:02:50.427000 CVE-2025-29394,0,0,4090687a0b04adebceb5be059956dcab0a952bc601580bcce43cec2c0d6a13ba,2025-04-22T21:15:45.123000 -CVE-2025-2940,0,1,8318250fdd3e7f1c6f7f6350ed1b79c0e950bd5ee4965c102ddefc496a6c7ffb,2025-07-07T15:35:41.327000 +CVE-2025-2940,0,0,8318250fdd3e7f1c6f7f6350ed1b79c0e950bd5ee4965c102ddefc496a6c7ffb,2025-07-07T15:35:41.327000 CVE-2025-29401,0,0,8eec97c0e583ffcefa21d512d6bfedeb6f6fb577b1c7a15dc9fcb78fc87bec51,2025-06-16T18:49:10.790000 CVE-2025-29405,0,0,dbff6f02c7d3961c2ff49d86cdc612e92f920fa0a3d3e5bcc752c3341cc24474,2025-06-12T19:35:35.770000 CVE-2025-2941,0,0,2a30ba06bce9faeb159e65a42eddbce7a23fc7e73f8564bd02faf3032a157758,2025-04-07T14:17:50.220000 @@ -291244,7 +291249,7 @@ CVE-2025-30009,0,0,56d36e26d8a0e62094527a14afd01deebe91e7c426165fc2e72abb337b8d5 CVE-2025-3001,0,0,c56fdcbf5e052ab058262ff71b57ae7f28cf364fffa0ee20badae5c032cc3c4a,2025-05-29T15:53:31.340000 CVE-2025-30010,0,0,da2194370e7d45f099e9aeb4c7b8462fc4ad49873ecf7f3e2007c5edb7ea34e9,2025-05-13T19:35:25.503000 CVE-2025-30011,0,0,cf642d1e55654610407b0b90fa5c0ff30c766800c420522996148e846fa5f266,2025-05-13T19:35:25.503000 -CVE-2025-30012,0,1,9e49b47e23d03166a0a749261979d7a2048ae45cc04c7e13eb3d322eea6bca6c,2025-07-07T15:15:24.437000 +CVE-2025-30012,0,0,9e49b47e23d03166a0a749261979d7a2048ae45cc04c7e13eb3d322eea6bca6c,2025-07-07T15:15:24.437000 CVE-2025-30013,0,0,7932d8a85b9d770212454eee3b98c50b358df4b36d71db8888c54d58043de0d7,2025-04-08T18:13:53.347000 CVE-2025-30014,0,0,054d315989d45087bc8a7fd9952992c725b3784578faa4359fbd402f71c020de,2025-04-08T18:13:53.347000 CVE-2025-30015,0,0,1eb229a1f73e87f3b32a8ef5421619245cc21612830ccfd462f12595315a6145,2025-04-08T18:13:53.347000 @@ -291539,7 +291544,7 @@ CVE-2025-30436,0,0,157aafbe97a61fabf3b83b6046cff85de7b0e0356b70ebd32bc3b0b912532 CVE-2025-30437,0,0,0c24503326977574ab0f815363d5d51518a36fd46250ca4580863efffe2ff229,2025-04-04T19:33:46.400000 CVE-2025-30438,0,0,74656afde9b35f2b81392e23e2548ae49f2fb93278be9270035970969d725c46,2025-04-07T13:33:38.493000 CVE-2025-30439,0,0,da2ca7ddbba55c6600a20f55dae4819460d11b882f4097a091f5482180051fe6,2025-04-07T13:33:28.633000 -CVE-2025-3044,0,0,ff88ee139e3320a339b7b9119d7c7a119384af57bd5c9bf4e04db15a0ec69f5a,2025-07-07T10:15:26.717000 +CVE-2025-3044,0,1,054e2df9116165d2a7770e1ab93e182a77dbb721890f8b65253aa2476717166a,2025-07-07T16:15:23.013000 CVE-2025-30440,0,0,aa17715c0e9c198507565f90d517e1bf0a74ce622e9572e90458cb436f7c3146,2025-05-27T21:30:02.733000 CVE-2025-30441,0,0,0c04a93a6f174bf42d94b9b28150654c6cdebea87baad1c1bed2a17317c45cac,2025-04-04T19:40:24.640000 CVE-2025-30442,0,0,94b2fd018b3727c786e128b7d801c1ec933a7c10df3f3083321d38dbb3c0aa34,2025-05-27T13:58:18.607000 @@ -291560,7 +291565,7 @@ CVE-2025-30455,0,0,654cb21164007decaef072b7e27df68e3e39b483c4e2d8a2b7a776151d092 CVE-2025-30456,0,0,a4adbf3fb3bfda6c1ff7ac3e59f722d6890d88837b4dfbbcb9888cc15a9a477a,2025-04-04T18:13:02.067000 CVE-2025-30457,0,0,9931b57801603e5171d9b9131e7fbe4120bea818d45e3d4b53b5782cd0d5fd9e,2025-04-04T18:12:47.103000 CVE-2025-30458,0,0,d44cd0a8f35468ff3b2dcecdff85e9434b31c8f37fa6b8dfb1a82259a2d7a917,2025-04-04T18:12:42.757000 -CVE-2025-3046,0,1,2ee9fe3ccbca9e41626f3c0886e0dfe649a4a2f4b2076f41c25cb5b68d3890f6,2025-07-07T14:15:24.130000 +CVE-2025-3046,0,0,2ee9fe3ccbca9e41626f3c0886e0dfe649a4a2f4b2076f41c25cb5b68d3890f6,2025-07-07T14:15:24.130000 CVE-2025-30460,0,0,d80e5d42755983a665f916c748c78211e6afa7b0e15e1ebb79456909187cd900,2025-04-04T18:12:36.290000 CVE-2025-30461,0,0,902c186691796d41fb6442de848f3f6d1e6de072cdbd4e5592409d68df7c6d6d,2025-04-04T18:12:32.693000 CVE-2025-30462,0,0,4bdec634bf22dfe7000ec2114c1948d8376bfcc7de65e9822131d6f1494f76e3,2025-04-04T18:12:28.400000 @@ -292930,6 +292935,7 @@ CVE-2025-3202,0,0,b5df9a4f10b6a094526640bce151f74d263fe1512b1e3334f9249ec0e5e39a CVE-2025-32020,0,0,5b7d2613617c9ad4e941ba7e2b1cf1f147b7a3d7b6c82162fb86d6a3786c79d3,2025-04-08T18:13:53.347000 CVE-2025-32021,0,0,0e513bd1b52450f87228fc57cfca619da18fd53df0487a3d95000bd0dba6af44,2025-04-30T16:11:00.570000 CVE-2025-32022,0,0,2c4734d48bfcdb759fe8a332626cd5271dee9ff06dae75a69e5b82053e427691,2025-05-07T14:13:20.483000 +CVE-2025-32023,1,1,da3206793ef9e200f462773e3d40f38a3bc94dd75489d0dff1e0aa49b773dcdf,2025-07-07T16:15:22.830000 CVE-2025-32024,0,0,aaff324cba06ca8f03c4a4173bee9b2afa9dec13a6b5d5f449993fc4b6eea500,2025-04-08T18:13:53.347000 CVE-2025-32025,0,0,5b101f2fdaeb4bea12aa8eb2f822059db81531c623e382758e69fd88182cc8e2,2025-04-08T18:13:53.347000 CVE-2025-32026,0,0,a3f057cbd474338c495f1d95a560978a772ad4f2f87d9883afb826980afa64ff,2025-04-08T18:13:53.347000 @@ -292955,20 +292961,20 @@ CVE-2025-32052,0,0,e8a2b65d8c60fdeb4dbd3de3ad9e8739229ff48d730c8ed16e3bece6d4b0d CVE-2025-32053,0,0,24ef209073c1c4df6ed8faa35dd6fbd251fb8abca6a77504e03d509feab651c2,2025-05-29T07:15:24.020000 CVE-2025-32054,0,0,75e4d347927079956a9bc5ad92137deea99b9b15ced411f0baaff24ce0928a82,2025-04-07T14:18:34.453000 CVE-2025-3206,0,0,42d59949bcfd70f3ffd69cd102c160f0c7c28fb29a1f31fa69a71eb901f00492,2025-04-08T17:59:46.877000 -CVE-2025-32067,0,1,2d2a4f6b284bde6726a8b60e92d05ad1e200f3268cbd40cf06bed79e2574664d,2025-07-07T15:15:25.187000 -CVE-2025-32068,0,1,907d8291306eaec3168df3d663f48b5f8be99a14814a76ef0eb7fe8f8c89c3ad,2025-07-07T15:15:25.377000 -CVE-2025-32069,0,1,731fe90d6d24fdda6626287ab7cc9344082e6d8e42e930cd1def17ddbe7825dd,2025-07-07T14:15:23.480000 +CVE-2025-32067,0,0,2d2a4f6b284bde6726a8b60e92d05ad1e200f3268cbd40cf06bed79e2574664d,2025-07-07T15:15:25.187000 +CVE-2025-32068,0,0,907d8291306eaec3168df3d663f48b5f8be99a14814a76ef0eb7fe8f8c89c3ad,2025-07-07T15:15:25.377000 +CVE-2025-32069,0,0,731fe90d6d24fdda6626287ab7cc9344082e6d8e42e930cd1def17ddbe7825dd,2025-07-07T14:15:23.480000 CVE-2025-3207,0,0,8c4a43b2a497a8aa9c548fe0056155548a5ad115021163d0bb4670d8373f6166,2025-04-08T17:56:53.623000 -CVE-2025-32070,0,1,2c8fde6b4c9b15cfe8f5fc6f201d2eee55fc0e458673648b54062bdcf8af1e17,2025-07-07T15:15:25.553000 -CVE-2025-32071,0,1,e595aa98996fd033e08aa945805b656c93c701ca675635f2c7032288add349ce,2025-07-07T15:15:25.723000 +CVE-2025-32070,0,0,2c8fde6b4c9b15cfe8f5fc6f201d2eee55fc0e458673648b54062bdcf8af1e17,2025-07-07T15:15:25.553000 +CVE-2025-32071,0,0,e595aa98996fd033e08aa945805b656c93c701ca675635f2c7032288add349ce,2025-07-07T15:15:25.723000 CVE-2025-32072,0,0,6ccfa3d9a54d535e0fb378bc9ce1ec0349d72ce0fe087f8d4f02a8e3830a82b2,2025-04-15T18:39:43.697000 -CVE-2025-32073,0,1,ca687881dea8f78cddd2e60c7ac9648ab315a26791312e33bdf7cee743bddb10,2025-07-07T14:15:23.960000 -CVE-2025-32074,0,1,538380c2eed3ec56f40a5e37de81efa4c5416990a550f65c8f629e0dc017f22f,2025-07-07T15:15:25.887000 +CVE-2025-32073,0,0,ca687881dea8f78cddd2e60c7ac9648ab315a26791312e33bdf7cee743bddb10,2025-07-07T14:15:23.960000 +CVE-2025-32074,0,0,538380c2eed3ec56f40a5e37de81efa4c5416990a550f65c8f629e0dc017f22f,2025-07-07T15:15:25.887000 CVE-2025-32075,0,0,31d2eb7ccb6cc35b538e442b8f372bcf252c0075f73670376a5eedaee901d673,2025-04-15T18:39:43.697000 CVE-2025-32076,0,0,81554454dd56b21a319fcdb09148e9ba474ec43e47a79f24bf7f4caf1b688164,2025-04-15T18:39:43.697000 CVE-2025-32077,0,0,ddd3246084966d2726d565c32e3ebf2d538682b12947b93b1a37366f766aa849,2025-04-15T18:39:43.697000 CVE-2025-32078,0,0,9e72afbd3328ee63444024435615f43b1b792c3a3840dcfb7104a22fb91314d2,2025-04-15T18:39:43.697000 -CVE-2025-32079,0,1,3799f302333918e4fff219af165e858ca2b9a65389cbe99c4b14ffaa59464932,2025-07-07T15:15:26.050000 +CVE-2025-32079,0,0,3799f302333918e4fff219af165e858ca2b9a65389cbe99c4b14ffaa59464932,2025-07-07T15:15:26.050000 CVE-2025-3208,0,0,467c67ee8369e3212684108818f80d158b2f4485a63647368e73220138caff6d,2025-04-08T17:48:42.087000 CVE-2025-32080,0,0,476f6d5f06fbb960cd093fb065cf3625046fd24147d1c1820490adfc187e1786,2025-04-15T18:39:43.697000 CVE-2025-3209,0,0,67195a835acffe5135c80a3d8ad9cc228d886a4b156f30c4554a13ec4114273f,2025-05-28T16:07:37.803000 @@ -293445,7 +293451,7 @@ CVE-2025-32616,0,0,60896a25617451753658cf2cd6019c47ed9948e1a164f38e18b95e9ff8020 CVE-2025-32617,0,0,9661b5a949800c62844427fa5e646378c73c47d1848559445bcbac54968a81d7,2025-04-09T20:02:41.860000 CVE-2025-32618,0,0,3e2dffa868b047a20340a7319c6706a3dde352ae7874207c3d70a1597ad9a558,2025-04-11T15:39:52.920000 CVE-2025-32619,0,0,04b1be8036bf1c25a4e2653334fbdb6d637490b7f9c97555a40f71ef05d59815,2025-04-09T20:02:41.860000 -CVE-2025-3262,0,0,32c27c9140fd692993f9736af8b80e1d8d8040ba8bbf51a5105804fa07d78fe4,2025-07-07T10:15:27.200000 +CVE-2025-3262,0,1,4cf37fd67251af5aab958901ff1550a468cf52f9ab5315505a0721318b6e4aaa,2025-07-07T16:15:23.130000 CVE-2025-32620,0,0,752c95b518c1c86908f8276831e75f69148f83ddf678c09a4b2db5d818e0b6f5,2025-04-17T20:21:05.203000 CVE-2025-32621,0,0,9afac0f9430fb7aa06a88042a84e3d0fdf6ad0626a0d9442f17bea6025ffa1ae,2025-04-09T20:02:41.860000 CVE-2025-32622,0,0,bb20d6b1b3e9da9aafe09a3e0f7186f182c77219f6d53914ac058a6b3c0c79cc,2025-04-17T20:21:05.203000 @@ -293983,7 +293989,7 @@ CVE-2025-34063,0,0,fbf50ba1666892a680b7e726cc84b450cde981ed5af9e60f07742062b62bf CVE-2025-34064,0,0,eb471144a9811114d1d1834fe8327f3c07a293fa4bbcfab9e78da16542b662d1,2025-07-03T15:14:12.767000 CVE-2025-34065,0,0,762233c4bc609a107f1f738ebedd0822859ababd12ff079e6ecf16dd47916b06,2025-07-03T15:14:12.767000 CVE-2025-34066,0,0,2c06d01ac374300a98d11b7ee5bae93ae717dc7cda884e4925e02feac29af7e4,2025-07-03T15:14:12.767000 -CVE-2025-34067,0,1,f8d8e1e7a8bee7bd9093677cb611a2eea2850e36d09dd3e159bb4c151d643552,2025-07-07T15:15:26.333000 +CVE-2025-34067,0,0,f8d8e1e7a8bee7bd9093677cb611a2eea2850e36d09dd3e159bb4c151d643552,2025-07-07T15:15:26.333000 CVE-2025-34069,0,0,ee31f7d1821d4fa57d3447155d404510349ac34382b4d4a5a846f8f6e03ee595,2025-07-03T15:13:53.147000 CVE-2025-3407,0,0,e5cceac7b7d945db6bab90635fdc2ec04fc23eea7f5eaa5ff6a3dce8910502a2,2025-04-08T18:13:53.347000 CVE-2025-34070,0,0,6e8e2d0d83b2dfe7727596d3867b20718557c4d797b6ac69c10cf0c07a1822fd,2025-07-03T15:13:53.147000 @@ -294198,6 +294204,7 @@ CVE-2025-35995,0,0,a590f4d82a5b6a6ddf49e3e9ff3fcb9f7ad4db6e56f789349ace8583f960e CVE-2025-35996,0,0,a68f8bf3039aca0fabffa5365ae47dde1016d171f7f66e0132baceb8c4b864b9,2025-05-02T13:52:51.693000 CVE-2025-3600,0,0,47a182aceae637cff18719201ecd7c14c0d0c4582dbca569644569d4f36f4c83,2025-06-25T15:29:14.070000 CVE-2025-36004,0,0,a7606dc7f0db1d2572a7485d0d3bb38993c9f09ef8a130e8809723820465f823,2025-07-03T20:53:35.667000 +CVE-2025-36014,1,1,85b2676a7adfdc4890bc4f824af503ff9f79efc328dff2707d2236582b9ed5d8,2025-07-07T17:15:27.890000 CVE-2025-36016,0,0,af37919821fdd574b942ee9d20d1ecfb430b58097892e9a643523ecf7010f2dd,2025-06-23T20:16:21.633000 CVE-2025-3602,0,0,9dae34871a5aa21ddbebfa01b8417ba4c26394066febdada550c394e6505596c,2025-06-17T20:50:23.507000 CVE-2025-36026,0,0,af5d1cd39202bd9c522b391511525b9286e9d9645df4651893a8424afeeff6cc,2025-07-01T14:22:26.260000 @@ -296029,7 +296036,10 @@ CVE-2025-43925,0,0,5cbb409f553038693387337b241da0f0142b19c7ebb79197568d829b038e5 CVE-2025-43926,0,0,4d0844f61e8a4f3908e6525284978ee3dd3d8da4c86df34256626c5eb8824ebd,2025-06-12T16:44:04.490000 CVE-2025-43928,0,0,ada37df9b018408af843f1b1cc9151f6f5a494aafca776d997eba7b7d4788264,2025-04-24T16:00:50.257000 CVE-2025-43929,0,0,867435a167581ab99f3a2b85e0ea6073e3538639a37e0ae43a9f94228cfe9a85,2025-04-24T15:46:35.757000 -CVE-2025-43930,1,1,40719ce663d5093801d4c4c8db4d1a35179473361a2d3305b8bd947b7d91ca90,2025-07-07T15:15:26.733000 +CVE-2025-43930,0,0,40719ce663d5093801d4c4c8db4d1a35179473361a2d3305b8bd947b7d91ca90,2025-07-07T15:15:26.733000 +CVE-2025-43931,1,1,062dee84644016a965484838481d185219d384a01c018d9eb9198f7b3872c999,2025-07-07T16:15:23.250000 +CVE-2025-43932,1,1,3bf03e78b6a5b8776a71c4dc2354170cb4360162ed5efa14c00fc6dbf9c83a9d,2025-07-07T16:15:23.380000 +CVE-2025-43933,1,1,95697e9e665845d48349c495f48f7a6ec689392bb002a94ed8510e91fc2fb988,2025-07-07T16:15:23.513000 CVE-2025-43946,0,0,c567cb496d37f6e22b9596b552a09de1b07a7e7e527c7608b3f0bd1ce8e16534,2025-06-23T18:03:44.927000 CVE-2025-43947,0,0,a218c15b83c9a2c09ba597126a826cdb3cf5018f77547d94f85a505842a307eb,2025-06-23T17:59:17.940000 CVE-2025-43948,0,0,efd3931cdaeca2d3b1dbf5f3f44aee732afa37b700ca8822c69f897fc0f80984,2025-04-23T14:08:13.383000 @@ -296258,6 +296268,7 @@ CVE-2025-45042,0,0,e22830cb7bf04c3c2d82e6baefcc0ab2bba0906b03ab3d09def3ca7404c47 CVE-2025-4505,0,0,1d5d8bdff5bba4724931179b40e9fa7b3a85ddcafb19b02c09ec15b5af8bbb67,2025-05-16T13:36:25.113000 CVE-2025-45055,0,0,e5d1642005209a692bee6ae7046330e80677a4e4d42d7e617bd6fdcd6cd60a44,2025-06-25T20:24:56.750000 CVE-2025-4506,0,0,3568a707dd9c5fac6d63b0c6b8838d459b084b79c1362aa32745d2610deb51f5,2025-05-13T18:57:05.830000 +CVE-2025-45065,1,1,8c9659f3a8f77cd17cc0a9901f417013087870ee5a7e357f3c2eb6733e264347,2025-07-07T16:15:23.650000 CVE-2025-4507,0,0,33f4384ad7f5c6ae0814fbe9ad7d28d34a5df203f685c4d49210c635ef2aae7e,2025-05-13T18:56:22.283000 CVE-2025-4508,0,0,db75cb6eae1dbf24ca832411056b3b5c74810bdb70cc1a4953a84729f52cd4d0,2025-05-16T17:26:39.940000 CVE-2025-45080,0,0,06a0f2cf3a479da0a1242f0af19e11456b7516b7534ba880f3dcc032666fd851,2025-07-03T15:14:12.767000 @@ -296323,6 +296334,7 @@ CVE-2025-45471,0,0,175cebfb698d65801503c809b3aa892182068d5ca8c7cb75b47dca0205a19 CVE-2025-45472,0,0,2637a833bc8f30b44e037d16794888343f063d186f0716a0b1631b9011f38122,2025-05-23T16:15:25.777000 CVE-2025-45474,0,0,5a86947a5dcb30409703950db611fb972ad2af49b62606364ea6d0524ca2d928,2025-06-19T00:45:23.457000 CVE-2025-45475,0,0,7400d330caefeb635586e4a2df7792360a8bced766ed5816725e62dba811d485,2025-06-24T18:42:50.893000 +CVE-2025-45479,1,1,7828b1883f087d7a016d1e6ce375ad7d570a7bbb4a4ea52ec14074702d954ec4,2025-07-07T16:15:23.780000 CVE-2025-4548,0,0,a8fe2cea464a0b35dbac9350217055ae490f25b77738ddb03311a9902dfffcb3,2025-05-13T18:55:54.360000 CVE-2025-45487,0,0,ffb60bfe346afcb15249da2528ccd12c910ff9915205c63e38aaf38509c65e39,2025-05-13T20:19:05.490000 CVE-2025-45488,0,0,a4a677b217c9c59760c1fc85e8b2f493a1b1fd5df028087d0ead93cd4bfeadf3,2025-05-13T20:19:15.500000 @@ -296837,7 +296849,7 @@ CVE-2025-46729,0,0,3d8d59d25190133ac6496709f02425f4d1111f3c931af4f4025cae2f29ca9 CVE-2025-4673,0,0,8ebe6f381de46cbcd176f9bf2be0da1445d7f3d9c7d4ce0c61d2293f68e7bb9b,2025-06-12T16:06:20.180000 CVE-2025-46730,0,0,b778d0b5827610b109aca84c60c7db8a5c07cd79e4727d7833dbfa430226054a,2025-05-05T20:54:19.760000 CVE-2025-46731,0,0,740ae6cdf8e49828e45e818d257c44d2898d4000cadd73cc7ec4d28341cdaef9,2025-05-05T20:54:19.760000 -CVE-2025-46733,0,0,099537ce8d3fb7414dfb64880f3e8a4c253f103bb593c65ae3a0fb43bfd03c07,2025-07-04T14:15:33.217000 +CVE-2025-46733,0,1,ae2e7b11430a7cd4c06f8f05a7c7fd5e06d43fcc67b5e66240caff665548ea53,2025-07-07T17:15:28.197000 CVE-2025-46734,0,0,27cdefb7b43f54c218843044d524287f654bbf79b65207f62aa51f5ae27b4d71,2025-05-05T20:54:19.760000 CVE-2025-46735,0,0,2150630835f1e409644bdb468cff4c89fbabadc89939c20bcdd0b4d1b651714f,2025-05-07T14:13:20.483000 CVE-2025-46736,0,0,8694e287f5d10d35b9cac8cd30430efa86a726280e0c4502e53d2236462dc452,2025-05-07T14:13:20.483000 @@ -296900,7 +296912,7 @@ CVE-2025-46825,0,0,f6e19e0972bcdc3e07e3b278714d8ca339234e4196303b477705dd8fa2069 CVE-2025-46826,0,0,4ebfbc6d75263f85719c0d0d1d8f9b8909260efe5b13feb7916cc0e1f165cd73,2025-05-08T14:39:09.683000 CVE-2025-46827,0,0,c0b5f5a1083a579afc89b63dd048c6f49094a080ff2d7d40bacf27137a0cb51c,2025-05-08T14:39:09.683000 CVE-2025-46828,0,0,c01480db94cf65ce3b725fe936441741ecff9779a109d752a8503328ba9b24b2,2025-07-02T16:30:44.907000 -CVE-2025-4683,0,1,419bbf4ac0a58d7eea66fb949fc6b3ccb8ac08aa57f340453aef995c5131e3ac,2025-07-07T15:55:52.187000 +CVE-2025-4683,0,0,419bbf4ac0a58d7eea66fb949fc6b3ccb8ac08aa57f340453aef995c5131e3ac,2025-07-07T15:55:52.187000 CVE-2025-46833,0,0,c80dd4df89ed1d9904a340fdabec8ad2db7d55e381346ed4e99c9bf921e12b91,2025-05-12T17:32:52.810000 CVE-2025-46834,0,0,eb9d8380a75c8996d4d833628ec9b8597e1a106d35c070448419534197001bee,2025-05-16T14:42:18.700000 CVE-2025-46836,0,0,634901c54fe4e9e284ebde4bed08aa69fbb4913cece33372bea06dbd6a8c3913,2025-05-31T23:15:20.400000 @@ -297190,6 +297202,7 @@ CVE-2025-47181,0,0,aa11c9243cf9f21606fed813a8d7013ca1fc81a1699c797c7e93c8870c1ba CVE-2025-4719,0,0,8f45404e8c5e0b5372b6c6d3c18e425f04bef83b0b8978ee2807105e5fc3ce21,2025-05-28T14:26:35.423000 CVE-2025-4720,0,0,ab92b1fc5d01e1f35f68c76c8f5bceafc841c3ab0985f1035de502421e632bac,2025-05-27T14:13:08.100000 CVE-2025-47201,0,0,f7da15483f84676db296d7fc167792c339031bbfa11c378fcc7b75aaf9edeb30,2025-05-07T16:51:09.947000 +CVE-2025-47202,1,1,d95db89ee2675c9011712d80ce0270e53a0f128466dc557720d5340c9ed37f27,2025-07-07T16:15:23.943000 CVE-2025-47203,0,0,5affb412d65195e809b09967884d230d1db85b53ddc355815b9628e8d17b2453,2025-05-17T22:15:18.390000 CVE-2025-47204,0,0,1087581499a2135246bfaa4b4dda36ede5f4134f69e3bfd8a83443409525f3f7,2025-05-14T14:15:30.460000 CVE-2025-4721,0,0,5b12152a812ee0a8141ca92ad1ce07fe54f58122d1a25434c4f23dc9f9b473ec,2025-05-27T14:13:32.497000 @@ -297899,6 +297912,7 @@ CVE-2025-48346,0,0,df44a636fcb8a95eb1777f4620f7844fd80604e2a21bbe85a4714ec18fcfc CVE-2025-4835,0,0,2f5ad6229d5b9b413e04a81b59106e5a85fb8d33f4f22cdfba9946f94435c0a6,2025-05-23T15:50:01.543000 CVE-2025-4836,0,0,381a21f4fc668a982c9ea0d6a5f4b8a8152eb0ca75926c09f17075729aa073a9,2025-05-28T13:54:46.070000 CVE-2025-48366,0,0,c4b55aab61c20a48c9f4f35cfff88c4f001aac74c3c0fe509ce92338a5a73cf2,2025-05-30T01:17:53.250000 +CVE-2025-48367,1,1,776a8c467327faff393fab0252264a4197383d5cdcda42307ab5c3c2593dc511,2025-07-07T16:15:24.063000 CVE-2025-48368,0,0,7aa43beebddc67e05e855de1c853e16919a3051539d389fbfeaded768e9a7691,2025-05-30T01:17:44.430000 CVE-2025-48369,0,0,576d533c9ddbdbacc2f8abf33153567b9e0e45e4d6d1bb54beb34c6dbf2139f3,2025-05-30T01:17:25.770000 CVE-2025-4837,0,0,97165344a1aaa334dd7151b29efb73d1ce1ef6112299500e4f1c0dfe72af4861,2025-05-28T13:58:35.157000 @@ -298264,13 +298278,13 @@ CVE-2025-49162,0,0,30d8f0e974a690ba3faf665b7cd4695ab5fb985c2cad4bb0465fb4c9980fa CVE-2025-49163,0,0,643a72915169b3c81852832f164c7ce28984b32bf8cbac1ededba1c30e43e026,2025-06-04T14:54:33.783000 CVE-2025-49164,0,0,d5b91c5cc8e76d4adf3dda6a9132b65234dcdefc36da28ceddedfd5530304934,2025-06-04T14:54:33.783000 CVE-2025-4917,0,0,402a8702a0d07685076d8d3bbf70a58c8189448c063fea494a0fac6dd2626eee,2025-05-19T17:38:05.883000 -CVE-2025-49175,0,1,d39a5fbf0c6676b1caf24c6b8b51c95226eedd7bda47de23f13f42d850715e6d,2025-07-07T14:15:24.307000 -CVE-2025-49176,0,1,6dde39d9e0848cdc9ae68270ed9b2f610e0d192870c4e3c8ce8b0bbc3afb7121,2025-07-07T14:15:24.503000 +CVE-2025-49175,0,0,d39a5fbf0c6676b1caf24c6b8b51c95226eedd7bda47de23f13f42d850715e6d,2025-07-07T14:15:24.307000 +CVE-2025-49176,0,0,6dde39d9e0848cdc9ae68270ed9b2f610e0d192870c4e3c8ce8b0bbc3afb7121,2025-07-07T14:15:24.503000 CVE-2025-49177,0,0,2776354ba86cd7216ed2eee07d464dd343e2260aa14001f109fcd75b0e6568d1,2025-07-02T20:15:30.943000 -CVE-2025-49178,0,1,035d17eb26a8509e401cb9e884f5dfa9fda7f5159a6402a709e9745eeb67d8df,2025-07-07T15:15:26.997000 -CVE-2025-49179,0,1,95ba541aa9087c3cd0a3ce7a959c9b07d0a8e36d9d318f64cf7980a078ae53fe,2025-07-07T14:15:24.697000 +CVE-2025-49178,0,0,035d17eb26a8509e401cb9e884f5dfa9fda7f5159a6402a709e9745eeb67d8df,2025-07-07T15:15:26.997000 +CVE-2025-49179,0,0,95ba541aa9087c3cd0a3ce7a959c9b07d0a8e36d9d318f64cf7980a078ae53fe,2025-07-07T14:15:24.697000 CVE-2025-4918,0,0,ab4c079e1da6cd4dfa69cf1fcc57b5e852fcef00a973643da3dd71ab3f3ec47e,2025-05-28T14:05:35.853000 -CVE-2025-49180,0,1,1a304fd4cb9153097dc6567b46c4c2c83e652e586ed4ad22c00cba0c100c7088,2025-07-07T14:15:24.877000 +CVE-2025-49180,0,0,1a304fd4cb9153097dc6567b46c4c2c83e652e586ed4ad22c00cba0c100c7088,2025-07-07T14:15:24.877000 CVE-2025-49181,0,0,65f8ea01de63d019d8688de775c40b302b8c0b1e44c040e53e46324e69435218,2025-06-12T16:06:20.180000 CVE-2025-49182,0,0,8adc8833944dbbffb6c925bafc811eee2574582f2d7b7b09537e334080770141,2025-06-13T09:15:20.130000 CVE-2025-49183,0,0,c9c3ab65e477d8e9a4d5c9adaf45822d49f0873835d0971680386eb894e72562,2025-06-12T16:06:20.180000 @@ -298741,11 +298755,11 @@ CVE-2025-50202,0,0,8426382c587b31fdab442fa7dec19ab1134318b48a3d87dfe295363cdfb44 CVE-2025-50213,0,0,c5323703bbf7326a6340b0eb3f5fb04391afe081eef6d3bbddd434f9589ebc04,2025-06-26T18:58:14.280000 CVE-2025-5024,0,0,ccdd8a7db520a87487d39e567caff85e7e094c68165b88263d5456db37c53d13,2025-05-23T15:55:02.040000 CVE-2025-5025,0,0,d8851777e61365e1aa05e5e547ad31f1c257710ee925f9d10fb7d3665c7bb24a,2025-05-30T17:15:30.200000 -CVE-2025-50258,0,1,4e733a37ca27136b2ef93a2119db49ffed90448de5c8c9f307ac9db358663d12,2025-07-07T14:40:56.783000 +CVE-2025-50258,0,0,4e733a37ca27136b2ef93a2119db49ffed90448de5c8c9f307ac9db358663d12,2025-07-07T14:40:56.783000 CVE-2025-5026,0,0,d9b074ad09f171f2cc858535f05c167fb3f2b46a82934574183f725586b2f8f2,2025-06-07T23:15:21.897000 -CVE-2025-50260,0,1,e877cad1eafcdb71bb6633b0e38ab81bb935ffd76e56b76a42dff5db155c75e8,2025-07-07T14:40:49.823000 -CVE-2025-50262,0,1,9e3fb9c375f808e1589b885e2650ee259bab54d53854899cea2846d4278159f6,2025-07-07T14:40:41.973000 -CVE-2025-50263,0,1,9a0385d13df8ce3c521c6a086112fcdd650b210efc6cf28537de27131527a412,2025-07-07T14:40:36.470000 +CVE-2025-50260,0,0,e877cad1eafcdb71bb6633b0e38ab81bb935ffd76e56b76a42dff5db155c75e8,2025-07-07T14:40:49.823000 +CVE-2025-50262,0,0,9e3fb9c375f808e1589b885e2650ee259bab54d53854899cea2846d4278159f6,2025-07-07T14:40:41.973000 +CVE-2025-50263,0,0,9a0385d13df8ce3c521c6a086112fcdd650b210efc6cf28537de27131527a412,2025-07-07T14:40:36.470000 CVE-2025-5029,0,0,ecb9afcd5e588564920b0ea2535593ae37c1896d06cac3ff8323350bc3b94721,2025-05-21T20:24:58.133000 CVE-2025-5030,0,0,6d4b94a2a3e4b3835c2395db7b8595a9109a231f789fd318934411db49833ebf,2025-06-20T17:40:22.427000 CVE-2025-5031,0,0,5f2ab8d2bd00dbf44f07508d2176837c7f0d7e14295892849ea6ba136599d0aa,2025-05-21T20:24:58.133000 @@ -298777,7 +298791,7 @@ CVE-2025-5059,0,0,f8f742257ec34ff8db6f494385cd1222a7c04c23d48b685959ae7dfe1442b4 CVE-2025-5062,0,0,bb09b5c3154dbeb834d9f154b075fadf5acce7938c0b0ea58fb15d93688394c5,2025-05-23T15:55:02.040000 CVE-2025-5063,0,0,f89d1e7a792a9be447b4dad7ad769ed21886dcb2a4e32e410ca50ba1aa5a5fe4,2025-07-02T14:15:26.493000 CVE-2025-5064,0,0,87518e9ed6daee720522048748a5340f904ec1b27742821c54fbc97a801d9ec2,2025-05-29T15:51:09.800000 -CVE-2025-50641,0,1,5a561069ad44d5e644aadc4fe2dcb4fd7b9daec1324018e0ba4a0df9c5cd7679,2025-07-07T14:40:12.813000 +CVE-2025-50641,0,0,5a561069ad44d5e644aadc4fe2dcb4fd7b9daec1324018e0ba4a0df9c5cd7679,2025-07-07T14:40:12.813000 CVE-2025-5065,0,0,8fc53b66fe42da4959811ef54b22b91af2bd35c9f4f954731cade0848a818fac,2025-05-29T15:50:57.497000 CVE-2025-5066,0,0,c2e1df9fe6cae5990ac135a3976d91b02429d110b23d2797a3b2dababf03dd2d,2025-05-29T15:50:51.310000 CVE-2025-5067,0,0,cf2723dbc4b2f797991ebafc1c2cb069497cee2d74a6a84ebec9dcde1e0dd29e,2025-05-29T15:50:43.240000 @@ -298891,7 +298905,7 @@ CVE-2025-5185,0,0,38d3e8df6b4bf723f8b7c203881d74ed487013508bbfe062800873a9ef9389 CVE-2025-5186,0,0,f1c0dc9e00200ceb159990b282fc6fc2adc0cb5ea875d85c26223f5d5865c3f8,2025-05-28T18:15:33.550000 CVE-2025-5190,0,0,b83fcbe64867ed5f66064afe0985f0f8e1099ccb823b90fa56196e26e3f4bf39,2025-05-30T16:31:03.107000 CVE-2025-5192,0,0,60cab63e53de16bf0d2b760f814c5b69c2d153aa1edfa79d1c5ac599f5bf94f5,2025-06-06T14:07:28.330000 -CVE-2025-5194,0,1,4df3127e5af28c1f6bd0baf7cd26efd1d47e75f425ed5ccd61a737547926d6fd,2025-07-07T14:56:27.477000 +CVE-2025-5194,0,0,4df3127e5af28c1f6bd0baf7cd26efd1d47e75f425ed5ccd61a737547926d6fd,2025-07-07T14:56:27.477000 CVE-2025-5195,0,0,67ed4f2b8401a12100a4ab10d4477eb555cb25ae77229fa0c172cda09b715498,2025-06-12T16:06:20.180000 CVE-2025-5196,0,0,a98527e09df73de6eb2df0c8c04fdff9d0b688348f849426efb97dbb04e15b4f,2025-07-02T17:42:07.070000 CVE-2025-5198,0,0,c8124bf615d24cf9474c96b9bd6d16252727b696641a4975ae527719f7fa40f3,2025-06-19T00:08:12.993000 @@ -298970,6 +298984,7 @@ CVE-2025-52487,0,0,7cd2bd74a4137e25655cda69485a3b65bad2829b1fa25c7a60a65991a011a CVE-2025-52488,0,0,ca6b051d0da46d813959bb70c94307ecd22ce69e425b14627b87b7e8b19e660f,2025-06-23T20:16:21.633000 CVE-2025-5249,0,0,ed726cc2a905d079d3cf80f621868a312481896aae378521d98a1a546311541b,2025-06-24T15:55:43.913000 CVE-2025-52491,0,0,99c966bc69ba38206055f8764fa30ca2e2a41c8a1159f64533a7a568f1fc2e2c,2025-07-03T15:14:12.767000 +CVE-2025-52492,1,1,eef618f67ed864d86536961b6d55359d8ae01cd4f67a925c68554cd2e284ab6b,2025-07-07T16:15:24.233000 CVE-2025-52496,0,0,4cee518fde3e25c80f1351a75e210d5d21e0998bdf7348eaa3f0e008bde2b841,2025-07-04T15:15:22.633000 CVE-2025-52497,0,0,d6f8f28097d84977174cc14a8c767c7f5e958c1efaad80a86bc0ff509071c220,2025-07-04T15:15:22.787000 CVE-2025-5250,0,0,2a4bdc606e390fc951ba8f4ded6d97e8a69fbc9ec9574eb66322c159fbee23de,2025-06-10T15:12:33.010000 @@ -299031,7 +299046,7 @@ CVE-2025-52727,0,0,476ed505113a23aff77c5c6570fb8f496f28335fc67949f18ed6f5220203d CVE-2025-52729,0,0,0b274f7b391a2b3ca207455316eb5f5a18760bd16bb1ce17fa066170bf9eb025,2025-06-30T18:38:48.477000 CVE-2025-5273,0,0,7a172885547dbfa68292354132d6eab77847bfdd0e0f37bfe0a33c637c28685a,2025-05-29T14:29:50.247000 CVE-2025-52733,0,0,7b459b7ccea847e17c1de3d7bfd534831df085ed8c830c3122c8262c5439f0d8,2025-06-23T20:16:40.143000 -CVE-2025-5275,0,0,1111e82b7b6dc77d1cac7cf2ee0e8d803b0350c2cf6edbbdaaac22860ceb176b,2025-06-26T18:57:43.670000 +CVE-2025-5275,0,1,7318240c035e3165e0ef1bc99cf0989e0af69db842c9d78443bbde336329c1ab,2025-07-07T16:05:45.690000 CVE-2025-5276,0,0,39d67915dab7ad2300f3ccd3a288fcee1075e32b914c45ad140eb6b7725be52b,2025-05-29T14:29:50.247000 CVE-2025-5277,0,0,ba5aa3a145e9e2e34ac18c63e7fe60e94ac49ba4d7121cc0bc36eebe3309abbf,2025-05-28T15:01:30.720000 CVE-2025-52772,0,0,deb02b2d983c296f8b89a2559d4d4f189f1c6c676131c9feadcc246a08a5cc14,2025-06-23T20:16:40.143000 @@ -299173,7 +299188,7 @@ CVE-2025-53017,0,0,9fda84f4c77156bd2dad813030dce357816e607bdf90bd8c0d4b8d8e747fd CVE-2025-53018,0,0,fa70bf377212e387a583d52f53db45796e2ade4762255f1341ae34db65100639,2025-06-30T18:38:48.477000 CVE-2025-53021,0,0,584a1e62b4773d2708786899e601db1bd01845b28be4bfa47cabc53fd2adc922,2025-06-26T18:58:14.280000 CVE-2025-5303,0,0,546057fa156dd0bfd15529f37c8ab9dae75346583c1c67316386c3461de42474,2025-06-09T12:15:47.880000 -CVE-2025-5304,0,1,27c7f2edf9ea9d7b46be7f6eeec8234451bc5c2847f1212c43eda6372fcf7130,2025-07-07T14:47:29.020000 +CVE-2025-5304,0,0,27c7f2edf9ea9d7b46be7f6eeec8234451bc5c2847f1212c43eda6372fcf7130,2025-07-07T14:47:29.020000 CVE-2025-5306,0,0,f34be59a6b1e6be6e727751955efa7f722865a717bb3297f17420ade83207b9a,2025-06-30T18:38:48.477000 CVE-2025-5307,0,0,7244ff154b85c92ca09019f8de869bb0541c220b74776be3851e4cfba38a0ca8,2025-05-30T16:31:03.107000 CVE-2025-53073,0,0,dc72ce506142801c8b0cea2579e988f3f6c38bb40bb41e7362bf91b362c4103c,2025-06-26T18:58:14.280000 @@ -299215,7 +299230,7 @@ CVE-2025-53165,0,0,c18d3f0bac2527c4fc3c5949699939aade6fdfa1fc95f118b55a9226740ab CVE-2025-53166,0,0,009194b1e4d6b1b25c951d276d80052562e14b1709dfd02dd967ce379d64ab51,2025-06-27T04:15:55.620000 CVE-2025-53167,0,0,1937734cd16b07ca6c6bb5ee3354dff5421b0ebe365f12e74496b278bb03f2e4,2025-07-07T03:15:27.433000 CVE-2025-53168,0,0,cab6e8885db62effa659adbd77684a828e33d3b767750ef95c2e9c5de9a8c859,2025-07-07T03:15:27.577000 -CVE-2025-53169,0,0,ae29f532cfcbf505850de5ef6b86257b17d9c617ebd0bd564cdb576a7e00e1c0,2025-07-07T03:15:27.720000 +CVE-2025-53169,0,1,a25334063ce6044e1a59a838e9d1c42ecf35d87b6b53592627817bf160f62298,2025-07-07T16:15:24.467000 CVE-2025-53170,0,0,12c0fa5e61ccd9f1d3b447d72f3713699af5263eab763a344587a60fbdb817fa,2025-07-07T03:15:27.843000 CVE-2025-53171,0,0,74217308d7f5dead549093676595fbbbb97fd2c73c1c84309ff03f6074d4f19a,2025-07-07T03:15:27.990000 CVE-2025-53172,0,0,48bc9a7914ab14e230b31f0355c1be1d33fe11daad2336f543eb059b33850287,2025-07-07T03:15:28.133000 @@ -299317,7 +299332,7 @@ CVE-2025-53323,0,0,c4bb0bce8eaeeae0db595028fd06fce5fb3a56400cef98de937a1c28dbf5b CVE-2025-53325,0,0,8e3e8e26e4dbd5c8412e01ff791fe5a4fb9f0769d9c65e9c6d332a118a91ffa1,2025-06-30T18:38:48.477000 CVE-2025-53327,0,0,71efca1e67fedd0f62622f35091acee6852d8d1a47c1510c3872a11834b47c9f,2025-06-30T18:38:48.477000 CVE-2025-53329,0,0,7e2bcfdc4e5def99b30f12a3cca8edf3792d6624620d8d3d11051961618387f9,2025-06-30T18:38:23.493000 -CVE-2025-5333,0,1,a5cfe9bc43416139c5948b0658b230aa4b1b6bb1a416da21c3604602d79f0f9a,2025-07-07T14:15:25.123000 +CVE-2025-5333,0,0,a5cfe9bc43416139c5948b0658b230aa4b1b6bb1a416da21c3604602d79f0f9a,2025-07-07T14:15:25.123000 CVE-2025-53331,0,0,3c6f4df5d64c5323acf0dc09f4c211199c054593ee6f61a47e7d530f381128f8,2025-06-30T18:38:23.493000 CVE-2025-53332,0,0,1d1495d052af56b7272e2c60ea8f8145bc99cb12abd86dc191a9a1b907a375ef,2025-06-30T18:38:23.493000 CVE-2025-53336,0,0,ac84b14ec4ae1ec81f40af29b24196ef5a7cc4c376492c3cd8f1877425976982,2025-06-30T18:38:23.493000 @@ -299335,7 +299350,12 @@ CVE-2025-53368,0,0,8ed0564d8cf46952d4bd978ff260b3ab3c2d062c631e91fd75491562cf8b8 CVE-2025-53369,0,0,978cd4bc15d6a241f7ac5e5c9408aad89eab4d8653a44aadf47ef7a09be0430d,2025-07-03T20:15:23.737000 CVE-2025-5337,0,0,f5b214301a56cadaeebc0b9a86ddeaf885fbd4e9b8e681558e7ccfb718bae2b0,2025-06-16T12:32:18.840000 CVE-2025-53370,0,0,aed788d0ea7ad170f999fc911bf334c6a1d64a91c4cd0af267b7743b2c628e04,2025-07-03T20:15:23.893000 -CVE-2025-5338,0,1,c30ab7b546edbed44c74dbf146f1dd5ebab57290d2ab537dfdd55be58264d8a1,2025-07-07T15:00:22.017000 +CVE-2025-53373,1,1,5bdb5216a407e339b24a155af125a66528171fe2687b15f432ef8e83905905b6,2025-07-07T16:15:24.950000 +CVE-2025-53374,1,1,048614a745ae7e98f5321a32b66858d6e6101230ba932d75c053cf17ba95474a,2025-07-07T16:15:25.113000 +CVE-2025-53375,1,1,848890d1efe87764cc544f04fa066b455261f9ea61f69788716dddfa6fa591e5,2025-07-07T16:15:25.317000 +CVE-2025-53376,1,1,fc3afaaa04120e6e44ddb4595db6ad187159526aa9e92e3e7d46c6c8dd40e083,2025-07-07T16:15:25.467000 +CVE-2025-53377,1,1,e496263adfef21784d6329ded37f2d78cc2ff795a2b0a4930ed58aa9270fa435,2025-07-07T17:15:29.097000 +CVE-2025-5338,0,0,c30ab7b546edbed44c74dbf146f1dd5ebab57290d2ab537dfdd55be58264d8a1,2025-07-07T15:00:22.017000 CVE-2025-53380,0,0,778a4ed3b4b51402648379b0a66e0653fc3388939d52b44cfb536c593d391f6d,2025-06-28T03:15:24.373000 CVE-2025-53381,0,0,5bca2379c91be4fadf0c25a7392b9c1b3f109e154b7525c42492575516c349ca,2025-06-28T03:15:25.393000 CVE-2025-53382,0,0,4695e14174a7cc685cd3ded81df4de7cc22e0d73407b891865d54a432fde8f3b,2025-06-28T03:15:25.470000 @@ -299359,18 +299379,28 @@ CVE-2025-53482,0,0,5eba40710e02310ba1ecb93085ddc4dc0cc4fa5b62b8ed248a2bb7696c4ab CVE-2025-53483,0,0,b9bb55989c3fd3c1cf55d058e4583af35124f2974234424179c7e6a11dd9be9f,2025-07-04T18:15:22.790000 CVE-2025-53484,0,0,23699d3877e9948e53fca5253353cc14405051c565fc0e33dec2a42a78d9203f,2025-07-04T18:15:23.380000 CVE-2025-53485,0,0,759f453eaf0a8d3f91777cb43171b84b861d8c50e5a91c37b68da9a1356b0dc9,2025-07-04T18:15:23.497000 -CVE-2025-53486,1,1,ad56053207629d930298594dcbe03326d60c274db951c8ee10ae972ff3fb931c,2025-07-07T15:15:27.947000 +CVE-2025-53486,0,0,ad56053207629d930298594dcbe03326d60c274db951c8ee10ae972ff3fb931c,2025-07-07T15:15:27.947000 +CVE-2025-53487,1,1,b0d716fe554f39685fccaeb11ef651dde99f22afcc901386ba38d50852e642bb,2025-07-07T16:15:25.623000 CVE-2025-53489,0,0,6981ae59f9089d899baa26f7fb9cc354b1e92d611df463c8bd1c4326ac91dda6,2025-07-03T18:15:21.710000 CVE-2025-5349,0,0,b81f7b1d6a71754537d9828ea9d3acc620d8f1e6efc544e4ef89ee68669bb4b8,2025-06-17T20:50:23.507000 CVE-2025-53490,0,0,84b14ae3ef7cec574f36654197a8ce18c06c040a8aa9edf5f061ca9d2df445e9,2025-07-03T18:15:22 +CVE-2025-53491,1,1,cf038016bd9a32b49017e75ef69a23d4a433e4151e15f8aff562d026d93a2bc0,2025-07-07T17:15:29.267000 CVE-2025-53492,0,0,07f001f0a2f7c95ac8b92c2b5a1246aeb8bc752b3d49fd1f7521c3a7a3a64667,2025-07-03T16:15:23.957000 CVE-2025-53493,0,0,8ff8929aef43b08923f020bb2cb71110d90a8f67f30ed1d7a0b2012c8c2477af,2025-07-03T16:15:24.123000 CVE-2025-53494,0,0,208fc72eecce6b5a15d2bab2c5d282523f9dc3860f6acdfd211e204b9a94e60e,2025-07-03T15:13:53.147000 +CVE-2025-53497,1,1,d4f5399562bb13b4f6c1639c9a1df54e08f871ed04389bba3e71e9a7ab778028,2025-07-07T17:15:29.400000 CVE-2025-53500,0,0,3bdf9ba78f8c96e0759eb3bb04f287f9f94cbd8123f377eb631e7dd9af704f81,2025-07-03T18:15:22.140000 CVE-2025-53501,0,0,e900724eae230d86d7c7987a3ea7fc4bd597cb6f2ad1627c48d4045dca340177,2025-07-03T18:15:22.300000 CVE-2025-53502,0,0,e8e5fcaf2b9f6d631a41e244b192bdc7d0b428e116af040c9415b6e6f51e01e5,2025-07-03T18:15:22.530000 CVE-2025-5351,0,0,25fedbd9afa181a22c5b0bde3da57126f5b842bc3c3c6c6aea00f66ca5be6046,2025-07-04T09:15:37.100000 +CVE-2025-53525,1,1,869b92ac04941e0d732e60e45ae870dc45b6732c51121aa00157e0143d86bdb9,2025-07-07T17:15:29.530000 +CVE-2025-53526,1,1,15f4bcef895bfda41a67d129473276a303d467a50ec771c48d470974be81bd26,2025-07-07T17:15:29.690000 +CVE-2025-53527,1,1,44e8fa305214c47a0e6774e88baf44ed20d6f7cb216f5bb64708f11c98e18343,2025-07-07T17:15:29.860000 +CVE-2025-53529,1,1,ee15264f84fb4a53cd3983c75d5cb5c77dc3cc78199039df8407eff587a8d3aa,2025-07-07T17:15:30.030000 CVE-2025-5353,0,0,a9d9e9f405a59eeaccd7ee5466c700cdd9eae2ba20f2bc9c98c5c42953abdf75,2025-06-12T16:06:39.330000 +CVE-2025-53530,1,1,49d0eebeaa5fa94ebcbdd6ae93efe5b9624714e2a2ef763d283e5346a75b30e4,2025-07-07T17:15:30.197000 +CVE-2025-53531,1,1,8488530f5da80d00ba594bd8f7c1443ef7ccc9731dad5e36c752d31763c2f44b,2025-07-07T17:15:30.363000 +CVE-2025-53532,1,1,be98140475255b0b9f3d020610187a9a6fbc4c646496523c014b695bf9ed1dd7,2025-07-07T17:15:30.533000 CVE-2025-5356,0,0,230423e916dccb3eed4f4eea6b8b3a9d8afef34a102c6f9d5aed25dc46913046,2025-06-24T15:20:27.113000 CVE-2025-53566,0,0,d4d5c467031c7ed57831ee58fd68b40650318cd770c698d7b1795bc244a2e70b,2025-07-04T09:15:35.737000 CVE-2025-53568,0,0,bee3cadb56562067625e8db4627ad9a409d5227256f420415bcca74802f43a7d,2025-07-04T09:15:36.370000 @@ -299416,7 +299446,7 @@ CVE-2025-5388,0,0,a0253f0c3333e57e30f53ca748c2f786064d252af030391460f61763742994 CVE-2025-5389,0,0,260909efcc6b6b292bffdc65b5b0e9633781d0b5c8c5ea87a3dce1c6319b67ab,2025-06-02T17:32:17.397000 CVE-2025-5390,0,0,039345fdea46e1731d2841f7a4397db225f36b8f7cd62f23d1ae898d97067564,2025-06-02T17:32:17.397000 CVE-2025-5395,0,0,4adbdf3099b8b5dab4e4f6463ed756f4d425b2051f900904089759b88a3b79e9,2025-06-12T16:06:20.180000 -CVE-2025-5398,0,1,9195ace01e6f17d48b49ceba2edc541c15cd0bed70f8762954e659ebb09afae7,2025-07-07T15:31:31.283000 +CVE-2025-5398,0,0,9195ace01e6f17d48b49ceba2edc541c15cd0bed70f8762954e659ebb09afae7,2025-07-07T15:31:31.283000 CVE-2025-5399,0,0,0ecebfde69eb11c2808a3eee614685de2e5fb1417c4788dd2b728d39b531d7cf,2025-06-09T14:15:23.470000 CVE-2025-5400,0,0,7cd289b1f8796f433468abfa83e965b2ae8c6d02300bfc34aeb9a97484dcc2f7,2025-06-02T17:32:17.397000 CVE-2025-5401,0,0,7191cee0bc77ec5bd67bfc250972477b89f2f18db54f39596b26be9c1bb1595c,2025-06-02T17:32:17.397000 @@ -299753,7 +299783,7 @@ CVE-2025-5798,0,0,8b03aec99638c4fd5212301f04bb1a503506bf58d26bd5e5a5acb0c1110a52 CVE-2025-5799,0,0,50ad513413ffdd2c3157967aae0c57c4edcf2bbf0ff1ea794ba25c05cfcc425b,2025-06-09T19:07:59.197000 CVE-2025-5806,0,0,eced74af9a3bd847a96fe591b592713a189dcd85d66bd43936ab31bd4aa88aea,2025-06-09T12:15:47.880000 CVE-2025-5812,0,0,a8fa614eb185b909327a01b5dadc2a8b72103fb7810bcfabee505f3dccfda767,2025-06-26T18:57:43.670000 -CVE-2025-5813,0,0,f2657486cd57db331af63c5b8276df87eb36898a07fc13e7628f46ab5190c5d1,2025-06-26T18:57:43.670000 +CVE-2025-5813,0,1,cd46b62d3d908778d35675b466ba82ee8dd96b497366599fc4a9680ca39a9bec,2025-07-07T16:04:42.837000 CVE-2025-5814,0,0,a167867f53c6fadb9d3db3d4ef4e109f1fea46d1abeb35216542db72110fa696,2025-06-09T12:15:47.880000 CVE-2025-5815,0,0,3c63e526b28352a674f2d0faaef2707920143cb75a4277d3e7f975593f6cf816,2025-06-16T12:32:18.840000 CVE-2025-5817,0,0,79f77157f922272fdfd131fe6a4742fc78813ad09e6f90755d48481c7fc27a3d,2025-07-03T15:13:53.147000 @@ -299776,7 +299806,7 @@ CVE-2025-5838,0,0,35626c7c8e1d04fa7bdba348c0108b2c123b4d5d313bbcf8d5dd0d6177716b CVE-2025-5839,0,0,af2c1c6da3fb5a22931f1ffebd67420dd5150792d38533d6eb8686e18f591276,2025-06-09T19:07:34.470000 CVE-2025-5840,0,0,a1906b279632ca933a71469d14d9b22734a373c8dc4ebaee1a55c4351d13760a,2025-06-10T15:45:31.043000 CVE-2025-5841,0,0,f400ea2f8b46ebb92066563e7d4eaccd25056b8981da67e57e016f89e1a31dc6,2025-06-16T12:32:18.840000 -CVE-2025-5842,0,1,e34270d5535813532b218b2e0a190d340953f01febe70c33ec2aa6acf5499336,2025-07-07T14:58:39.873000 +CVE-2025-5842,0,0,e34270d5535813532b218b2e0a190d340953f01febe70c33ec2aa6acf5499336,2025-07-07T14:58:39.873000 CVE-2025-5846,0,0,b9dae5d78b058906eef82693476ed197d8158ba3f9251bdb3cbb82dffcfb1b46,2025-06-26T18:57:43.670000 CVE-2025-5847,0,0,72a670a977f930c072e82981d9be0647255328c3124df63dafd15061a72168a9,2025-06-09T19:04:55.580000 CVE-2025-5848,0,0,97a77699d44911bbc0f7dbb24d5b37ad7d0974431c5e2858413f0642987e5a7c,2025-06-09T19:04:50.113000 @@ -299855,17 +299885,17 @@ CVE-2025-5925,0,0,74cb0f740f96269546a558716b8983e19baddafe2aff8e369ed86d426f6297 CVE-2025-5926,0,0,d101bf01d3fcfe0cdb9553376422f17ca8d863b6b3e856d7675080f3ca9408fd,2025-06-16T12:32:18.840000 CVE-2025-5927,0,0,0c73989162ec688b3e537c5db5863dbd2ec2103b11b32c3e43eb90084da6cbc2,2025-06-26T18:57:43.670000 CVE-2025-5928,0,0,bf8e560b30d16961d3816817e86769462398f4dfd1c11ce3fc0a5a6f046bebeb,2025-06-16T12:32:18.840000 -CVE-2025-5929,0,0,f03ca91148b853264e8170ed4a9e14b5208d8d6251d19365b97f2edcbc28f6ec,2025-06-26T18:57:43.670000 +CVE-2025-5929,0,1,b716d721471a8e2b249626b1f9385a50183b8d247eeb60e850baf3fe11eb962c,2025-07-07T16:04:01.473000 CVE-2025-5930,0,0,f247db24f36bcbf2f7d81e18a82d068f64b444dc019b1b0b868d92f5ff3fa36b,2025-06-16T12:32:18.840000 -CVE-2025-5932,0,0,0009dc14d9687f01ac61ad8c792f85f427e8ff77fcfd5ce1a11be7237ed9592d,2025-06-26T18:57:43.670000 +CVE-2025-5932,0,1,2139f6b06237b79e72d4532bc8219346e6dc94ec5de4cc7ea77426914ccc3bb1,2025-07-07T16:03:18.250000 CVE-2025-5933,0,0,4ab1a4e0a3eb3d84beabd54254ef79ff81b64f59138d24e8a3ed5570a379ad13,2025-07-04T03:15:21.407000 CVE-2025-5934,0,0,2b04aea49be1b2e817d664c8d52ff126b146b95757a60bd9875f5715a4755cac,2025-06-20T13:11:11.560000 CVE-2025-5935,0,0,c15a5d20553ffc7a7c30ae68f0e5f38be384091a8a588ccb546a6d6a87a9c526,2025-06-12T16:06:39.330000 -CVE-2025-5936,0,1,5a2ef8dc5560fbcce6b1c9ab3c63719c3155e5810fde1167bb928311a7001c38,2025-07-07T15:55:10.410000 +CVE-2025-5936,0,0,5a2ef8dc5560fbcce6b1c9ab3c63719c3155e5810fde1167bb928311a7001c38,2025-07-07T15:55:10.410000 CVE-2025-5937,0,0,678b668d766cce97e58e68227b8831e6501ef3b8616f6f17f9a9a5ab301cf798,2025-06-30T18:38:23.493000 CVE-2025-5938,0,0,de6ba49470711279279f27a904465957f8293ec15c3176c20b2597289d4c7b40,2025-06-16T12:32:18.840000 CVE-2025-5939,0,0,fae4e42cb7ec096d2eda48ac42042deaadc4d81bda29462ec7008261e2cabbf5,2025-06-16T12:32:18.840000 -CVE-2025-5940,0,1,e934f4521d5519f04066b506472b3c339ac469931fdceb7d8db7faecdce1d721,2025-07-07T15:54:17.250000 +CVE-2025-5940,0,0,e934f4521d5519f04066b506472b3c339ac469931fdceb7d8db7faecdce1d721,2025-07-07T15:54:17.250000 CVE-2025-5943,0,0,35b1a03e31f4997e71998954ee281c02ada0936b00fc64cfacb7aa84cfa29429,2025-06-12T16:06:29.520000 CVE-2025-5944,0,0,1a1c644333bdf94ff9dcde8848ef64fb9536e723a97e87bb84c12c1453ce198f,2025-07-03T15:13:53.147000 CVE-2025-5945,0,0,c7e4d5fd43d260b09c3d268ba39649757ca6834ec123b67f85c953ef50c7c56d,2025-06-10T09:15:25.930000 @@ -299898,7 +299928,7 @@ CVE-2025-5982,0,0,d9487128b71b64381d82a652f7a1122df97e22510aec0c066c9d874bcd0cf9 CVE-2025-5984,0,0,9c065cc4f1bf71f29d217205fa1a3017b01589309492c87e21e29320e0443497,2025-06-17T20:34:36.177000 CVE-2025-5985,0,0,6bc7c20833bbb87d89e08ff2c433a1431f6002ad9972fe39c1f3aa9dac9d18ca,2025-06-17T20:34:19.473000 CVE-2025-5986,0,0,5cad509000c0831e557b68272b8d7dbc9b1f9f855a32309ac32da79f6d8d3b69,2025-07-02T16:07:00.620000 -CVE-2025-5987,1,1,a22b8db48a3bd06981dbec5d9a92427040d43e37d53d5bbb66b3d5f64b6c35ac,2025-07-07T15:15:28.180000 +CVE-2025-5987,0,0,a22b8db48a3bd06981dbec5d9a92427040d43e37d53d5bbb66b3d5f64b6c35ac,2025-07-07T15:15:28.180000 CVE-2025-5990,0,0,3b1aca804ea6c0f6e9294e1b2529898db8d219cf683bd44dfcf13644214951d4,2025-06-16T12:32:18.840000 CVE-2025-5991,0,0,2d56ef31c39d49ebda5cce54941d2d07bc366906f8f2e10ec12b1264a4709a15,2025-06-12T16:06:20.180000 CVE-2025-5995,0,0,e0a95e1875ad143ee49273c882884536a042b40281445da0f88771ec39f3e3b5,2025-06-30T18:39:09.973000 @@ -300037,9 +300067,9 @@ CVE-2025-6196,0,0,ebd0476f8627cd400d4a2990bf388e707195c795d8a7681502291e5ed83c18 CVE-2025-6199,0,0,27de73d7bdfbcb0d047107c059b4fb0beddf1f77ad32bc36681bc8884ca65c55,2025-06-17T20:50:23.507000 CVE-2025-6201,0,0,09953b11a7588a9edc2f3925b0cbb84add185ea803d7765dc4a2a786cd413a85,2025-06-23T20:16:59.783000 CVE-2025-6206,0,0,c66ee500876bc4abb021bb9d77aeda45e0e42d83e894cdd37485d8f28334b052,2025-06-26T18:58:14.280000 -CVE-2025-6209,0,1,4d194405f99de3505fed4fbc7baf9d82092f31b0c10e81656b4ad21d616433ac,2025-07-07T14:15:25.287000 +CVE-2025-6209,0,0,4d194405f99de3505fed4fbc7baf9d82092f31b0c10e81656b4ad21d616433ac,2025-07-07T14:15:25.287000 CVE-2025-6210,0,0,14d31ee2b00a58e0d63a7ab89552e4950b1424b800527d9bb45e7fdd7c86ee97,2025-07-07T10:15:29.040000 -CVE-2025-6212,0,1,94c0e0fc8f02bafef8bc84e19e2ea10848e097b196903fddf25d22a1310a929a,2025-07-07T14:57:39.777000 +CVE-2025-6212,0,0,94c0e0fc8f02bafef8bc84e19e2ea10848e097b196903fddf25d22a1310a929a,2025-07-07T14:57:39.777000 CVE-2025-6216,0,0,fa2fdcc5033cf3a1df6342a01f2acd273f87b99c1664b4ca0db573d99035212e,2025-06-23T20:16:21.633000 CVE-2025-6217,0,0,0d2c65c94d7cc4fabd9027df56e983345e1f33543f29c53f0c45cf319713d14d,2025-06-23T20:16:21.633000 CVE-2025-6218,0,0,0e265a89cc2a3bd08feb5d5cbdea0ea20f815a5e3a21352ce4021a3ae0596bec,2025-06-25T19:03:33.817000 @@ -300047,7 +300077,7 @@ CVE-2025-6220,0,0,70ba2b5176193b00d7c5791b5a8342d63e62622f52556ab6ab22db00bbc145 CVE-2025-6224,0,0,c2476a14c43ef31967d89288ff41b75746283c187c9c6cdc794d96fe44a26458,2025-07-03T15:14:12.767000 CVE-2025-6238,0,0,43536995b122e8c09fc85415169b6ce2705e742ae7515aa376619850727f57b7,2025-07-04T03:15:22.237000 CVE-2025-6240,0,0,ba4da5fd605eca3c919532cf0a8a1661ebda5a87c35d4010c4dddeaa23d93e9a,2025-06-23T20:16:59.783000 -CVE-2025-6252,0,1,04266fde32de91a19cd75afe711753a0e9f9154bece1418589e4e14bad3b2599,2025-07-07T14:51:20.410000 +CVE-2025-6252,0,0,04266fde32de91a19cd75afe711753a0e9f9154bece1418589e4e14bad3b2599,2025-07-07T14:51:20.410000 CVE-2025-6257,0,0,cc91b7557b526c88672e08add1b684bde89a65ab4dd7fa052a99a1c1c9c823b5,2025-06-23T20:16:40.143000 CVE-2025-6258,0,0,a4b6be5935c4432c7a129304f469494da82c625050798afddedddfa563a7fe1e,2025-06-26T18:57:43.670000 CVE-2025-6264,0,0,f32dcf95c634dc2f1ab86702d3943727ebae8018b2fa6b536fe8be4f7c817392,2025-06-23T20:16:40.143000 @@ -300074,7 +300104,7 @@ CVE-2025-6285,0,0,0f5e702030ae71dd658a22b122b4aed0ed12d1aae61fb46ec51e0841a0ec90 CVE-2025-6286,0,0,b7219a51a324575d8724ff4298827d1d2120856c9a6df23d680f1ea8dbfc94c7,2025-06-26T21:33:36.923000 CVE-2025-6287,0,0,c97270e78c42232e6181a1fc6418c4993fc08485bae7bc11e103b2bd3b0836b8,2025-06-26T21:30:45.290000 CVE-2025-6288,0,0,fa5bb2cf674608fadad9e3141e14760d75f6db2208fe52ae1ce80a76abaa33b6,2025-06-26T21:19:24.540000 -CVE-2025-6290,0,0,5697350f0d76229867c2b05cc4d473f595b9419163e886d1707dc9da549cec0f,2025-06-26T18:57:43.670000 +CVE-2025-6290,0,1,48ba9ddaba7effeee4a9c6928184d470f08294bc9085512bde08aac01c042136,2025-07-07T17:16:39.837000 CVE-2025-6291,0,0,dc1a968051b9db85759355228419cc46165b7a6778eb4ff9ec8664745bc75db4,2025-06-26T17:00:25.153000 CVE-2025-6292,0,0,950777517b48d376f4e9cfbb6475ca5763192a729885525f030e7df89973a74b,2025-06-26T17:25:51.993000 CVE-2025-6293,0,0,30342ac281aebc0a30969c59d523a1a3a2cc7a536dbaaadfbb8317c27c072af8,2025-06-26T17:22:14.003000 @@ -300126,7 +300156,7 @@ CVE-2025-6344,0,0,d4ebe8546071c6f599337efb2154e70f6fbd03816d527c4e2779e3b0d26229 CVE-2025-6345,0,0,1b5798d05acbe31185d3a8d445b94e6e0a51e88c4709410b91a47f5a38656aea,2025-06-26T14:46:30.147000 CVE-2025-6346,0,0,60adff065c15ee37ac94dab3cf86c7439ef9e78c708c480099857f05e535c99f,2025-06-26T14:44:35.813000 CVE-2025-6347,0,0,68909e05b74e3a85a84e8d098407141d213d8f8ff4f7c7fe8a59ef6ae69259d2,2025-06-23T20:16:21.633000 -CVE-2025-6350,0,1,a86ee8e77b19eb2905a6818fe7d360409130293abf6abafd272b9012f376c67f,2025-07-07T15:28:10.050000 +CVE-2025-6350,0,0,a86ee8e77b19eb2905a6818fe7d360409130293abf6abafd272b9012f376c67f,2025-07-07T15:28:10.050000 CVE-2025-6351,0,0,58d9ebbc99a1fb6475be804d7a4fe745e483538a102155a9e63fef3060dd4f15,2025-06-26T14:05:27.120000 CVE-2025-6352,0,0,9d15046a1965b14eb3ab7c9082bc02622d7ca5d63392e4ee8604e05d4ffdeda2,2025-06-26T13:50:10.427000 CVE-2025-6353,0,0,bb812aed6264256a395cbc5dc384dbc2a11cc2e52a251e0b3d62d5c5c30f63a7,2025-06-23T20:16:21.633000 @@ -300151,10 +300181,10 @@ CVE-2025-6372,0,0,57bd725e58155b22002b2fe27e5ef880df740adaf81477b1018fce26c7c218 CVE-2025-6373,0,0,fc3916a56b7bebb7f4afd8db9623b0c0b7ca6d04a407f196c28a44bfa23b9548,2025-06-25T20:10:16.027000 CVE-2025-6374,0,0,52c2a3762c3febff3f7133c40521ec4205f6d9bad96026808a9cc8ac3a049376,2025-06-25T20:10:23.920000 CVE-2025-6375,0,0,c5c7694dc72a40d77b42ca7bdac2085f0219ee2826ef00eb4a9804c963c5103e,2025-06-23T20:16:21.633000 -CVE-2025-6378,0,0,bc57167f4d084b13d0a8624359085de9bea79b02b58688a186bc74f5d9aa1841,2025-06-26T18:57:43.670000 -CVE-2025-6379,0,1,a573d0789f74e2940a233e26e5770bd43ee83276728b28e7918a6f6c0e9e28bc,2025-07-07T15:24:31.510000 -CVE-2025-6381,0,1,bcb772a2599dc7010241cc7bbab88371a6f4c6ca137948aff05aab6ef1ed3e85,2025-07-07T15:24:28.070000 -CVE-2025-6383,0,0,b46c3e86435c1dc7ff6465355979b367a1d819d4bbf46e0422c7cfd37cfbac42,2025-06-26T18:57:43.670000 +CVE-2025-6378,0,1,c9f832cbc4a58e4712b3be36fa473dbfb776e558d71ae65da6d05b8879aaf667,2025-07-07T17:15:44.053000 +CVE-2025-6379,0,0,a573d0789f74e2940a233e26e5770bd43ee83276728b28e7918a6f6c0e9e28bc,2025-07-07T15:24:31.510000 +CVE-2025-6381,0,0,bcb772a2599dc7010241cc7bbab88371a6f4c6ca137948aff05aab6ef1ed3e85,2025-07-07T15:24:28.070000 +CVE-2025-6383,0,1,cbad0deb6722e8c8c6599e2836abb6b9280c085acc8c5c7fa818af09adc4c75c,2025-07-07T17:15:05.383000 CVE-2025-6384,0,0,97aa0c1b3518730f2ff1ac0c6e40e6df53f12abb019ae8c41f191d17b86f6691,2025-06-23T20:16:40.143000 CVE-2025-6386,0,0,b2a078e22a659d4d88f448dea0064464b20c22ed2491c180557e36b6a04d2807,2025-07-07T10:15:29.187000 CVE-2025-6393,0,0,32247b5db96e134f65a8c77173062a4edd972dbb6c0ac396c8f0bf9ce435cde7,2025-06-23T20:16:21.633000 @@ -300215,8 +300245,8 @@ CVE-2025-6457,0,0,ec2a9dd42c1bcf669254ec6afca5da44ae8e8abdf8ae4d1d4071cff11bb8a6 CVE-2025-6458,0,0,083518c79650bb4c88fc42ff0fa6cfc761ce82844b15365e5e4b749048d96c50,2025-06-25T20:00:54.297000 CVE-2025-6459,0,0,ec80e632d35617718ab1b3c79c3fc295670d5c220c8a7e3649627f52ecd9be25,2025-07-03T15:13:53.147000 CVE-2025-6462,0,0,872e829ccb8cbbae6d126350e3997d71b9edc0ddf26c0961eeec2215d87d75c9,2025-06-30T18:38:23.493000 -CVE-2025-6463,0,1,e81d8f021da6b8c9b716bbee8f9b01e2e5056280dd82770aedf546ee5971feb2,2025-07-07T14:28:51.123000 -CVE-2025-6464,0,1,57a826213e944e28737944d653608fc09e5099c7124b5b98ecdfb0c135832466,2025-07-07T14:22:31.690000 +CVE-2025-6463,0,0,e81d8f021da6b8c9b716bbee8f9b01e2e5056280dd82770aedf546ee5971feb2,2025-07-07T14:28:51.123000 +CVE-2025-6464,0,0,57a826213e944e28737944d653608fc09e5099c7124b5b98ecdfb0c135832466,2025-07-07T14:22:31.690000 CVE-2025-6466,0,0,02dda139ebc87521cef69d237c47fae4cb16f9d5a4fcba111e2a9a76c60a2e10,2025-06-23T20:16:21.633000 CVE-2025-6467,0,0,2111c66db0969d1c41fc8564ca68139c60962dcd1f7bb6c000aa2a277af3863e,2025-06-27T16:30:42.310000 CVE-2025-6468,0,0,b609e6c1f1cb2cca716729822e4b5563b8a9898d707e405d1e94b0c4142dd708,2025-06-27T16:37:25.340000 @@ -300276,14 +300306,14 @@ CVE-2025-6533,0,0,492d887b9495cf568d73a9f91a4235f8d4b3302adbb98cd523caec1f71017f CVE-2025-6534,0,0,27dbfbc1ad88a7b2b9a2381731f87a7e228a23f139d2c856c6c4ef9c8c4f00da,2025-06-26T18:58:14.280000 CVE-2025-6535,0,0,3ec3c99c4450294264961f65a26d690a1af52c1d1f2140ee1766ea03af869a81,2025-06-26T18:58:14.280000 CVE-2025-6536,0,0,bd4abefc70387d924c3e572721c1a2fa7652203fc239516c5a7622b44e3bfb00,2025-06-26T18:58:14.280000 -CVE-2025-6537,0,1,35a059cab9fdc0c1b6f72e0502b21079436d69ae1ca92b73ceef2576f210013e,2025-07-07T15:03:23.390000 +CVE-2025-6537,0,0,35a059cab9fdc0c1b6f72e0502b21079436d69ae1ca92b73ceef2576f210013e,2025-07-07T15:03:23.390000 CVE-2025-6538,0,0,3175c9b7021ed00f6429d7f581183d15aca3ffac54df32136ede9c1c759734e9,2025-06-26T18:57:43.670000 -CVE-2025-6540,0,1,082438792186c440bf4ff42d97a1cb1ef2ee9a0b9d0da94f6ceb561b424c8589,2025-07-07T15:02:44.263000 +CVE-2025-6540,0,0,082438792186c440bf4ff42d97a1cb1ef2ee9a0b9d0da94f6ceb561b424c8589,2025-07-07T15:02:44.263000 CVE-2025-6543,0,0,614be473b1a9f0b696f8665a5ce20ebb99b6c34c213be6f11e91a24c2a2ce20d,2025-07-01T18:19:45.547000 CVE-2025-6545,0,0,232265ccc6fe056c6abf53601342de9afd636906f2fd3b22c8fe97e99accaff8,2025-06-23T20:16:21.633000 -CVE-2025-6546,0,1,20c09019fe66bae4cc490eb13bf7440432b4eb2d00e32caa0dd1d13ce9bfccc3,2025-07-07T15:02:09.700000 +CVE-2025-6546,0,0,20c09019fe66bae4cc490eb13bf7440432b4eb2d00e32caa0dd1d13ce9bfccc3,2025-07-07T15:02:09.700000 CVE-2025-6547,0,0,9faf016e4cd0d979f6fd378ab40d2ecc76b2956dd06a9026d16b0df65d7d2aad,2025-06-23T20:16:21.633000 -CVE-2025-6550,0,1,c0a691cea8a5ed699b0d12b82357599196c16b195f2af32ef4c55625a42b68d0,2025-07-07T15:38:38.413000 +CVE-2025-6550,0,0,c0a691cea8a5ed699b0d12b82357599196c16b195f2af32ef4c55625a42b68d0,2025-07-07T15:38:38.413000 CVE-2025-6551,0,0,eb31b65edf1928c67c505e9607a92d57f68bd5fa54806dd6c722d8ad4c081a2e,2025-06-26T18:58:14.280000 CVE-2025-6552,0,0,8717beff1ed0b4c67a4a3bc77f60be53e5be3c4b231cbc45b02cbdea4703f774,2025-06-26T18:58:14.280000 CVE-2025-6554,0,0,890362c519a4357d98514f62cd39fc9e4bb37403cd00a1b3ef610614d19dbf03,2025-07-03T14:36:33.257000 @@ -300349,12 +300379,12 @@ CVE-2025-6654,0,0,b4429ce2f21a922937e11f53d272f002d6937c2468bb12ed546a6be36f2838 CVE-2025-6655,0,0,933ab9292568937fb0e5b7a8d09d27e6b2226aeed92822029db58f7bd992c24e,2025-07-01T19:30:51.190000 CVE-2025-6656,0,0,52e245cdfc0a204176bcccfd50fbf2043ebd0230930a635f60c8e7751620c78c,2025-07-01T19:30:58.773000 CVE-2025-6657,0,0,b223a6df32efa2dc05cd3c969f1258662269b04768f6c3cdad072990db986e54,2025-07-01T19:31:08.080000 -CVE-2025-6658,0,0,6d558ff66d4bc29b20f7076f1ec7f3182464db0d0118fb90403cabfb388cc927,2025-06-26T18:57:43.670000 -CVE-2025-6659,0,0,d41961a633f80b309fb849547dcfae6030811893a2c8a6128867681af10b2203,2025-06-26T18:57:43.670000 -CVE-2025-6660,0,0,cd08cfe42079fe4fdd73cd9648a3c25d0ae80aa2dae93104afa5fa67738b6f21,2025-06-26T18:57:43.670000 +CVE-2025-6658,0,1,a6db5c14388768d319c10290fc341d5f70b5d67b14180851b177c41c1e672500,2025-07-07T17:39:44.360000 +CVE-2025-6659,0,1,b2432dcc4b5318b459306d075f65f7fe414d1aa89824597c8295bcd4f8f557f9,2025-07-07T17:39:19.650000 +CVE-2025-6660,0,1,e6ccd579035a2f0f32c58e538fe09d88a2651f044f4007f76581f8781f52099b,2025-07-07T17:37:13.450000 CVE-2025-6661,0,0,fd8b0d49c07db3c6a53b199ebdb73fdd4cb7b2ba605aa1b301d1aa8a4ccb614c,2025-07-01T19:16:39.160000 CVE-2025-6662,0,0,f2a3ee41e239004b48fa7d4e486cb8eda1d4f024ab4a2f1f6cd63d323901fd9a,2025-07-01T19:11:55.183000 -CVE-2025-6663,1,1,52fbcef2dccc108f1590caa9a9d32b98e0796918d2d07fe049f49d8e8110be67,2025-07-07T15:15:28.480000 +CVE-2025-6663,0,0,52fbcef2dccc108f1590caa9a9d32b98e0796918d2d07fe049f49d8e8110be67,2025-07-07T15:15:28.480000 CVE-2025-6664,0,0,255c7bbda244ee1c6cb8ea0927bfc65b2c2f80bee216e706a66f1a5aec92db63,2025-06-27T17:57:43.810000 CVE-2025-6665,0,0,819e0fbbba720c6c224657e5e3d234dfe09f50d6f19ea31a4a8557c46f9ecfaf,2025-06-27T17:56:25.200000 CVE-2025-6667,0,0,f7249d0ce2242cc1fb55502e78a9d1851a88aea1d56705388779a71c32d97776,2025-06-30T21:15:32.063000 @@ -300386,10 +300416,10 @@ CVE-2025-6706,0,0,f03487ea2f7d1a5732fb4f51e4ca2c790eb579835cfc91b9c45cdf286a45f5 CVE-2025-6707,0,0,14c73d68a98b746593e8bc174ab911da35592c0257c3e73af6fd070f01c8c9f2,2025-06-26T18:57:43.670000 CVE-2025-6709,0,0,ce3375defd141f50a441bec507fa56a57be29472c18c6330b419dc2bf776df80,2025-06-26T18:57:43.670000 CVE-2025-6710,0,0,e2944d7980958a37152e00cd92dce387f65d6a5085b6deeca1df15f1c33947ee,2025-06-26T18:57:43.670000 -CVE-2025-6711,1,1,e23f00487c2f45f5c18b9b7efa1b580ebdde913c361d92a48aab651df03a6eed,2025-07-07T15:15:28.703000 -CVE-2025-6712,1,1,acbeba7162b4ab2a700652aec7c48a9a7bffb6072514ccaa32e6b019baa4bc9e,2025-07-07T15:15:28.890000 -CVE-2025-6713,1,1,b3856304dd6e2d27a25ca90bd7d0af496913132f9cbb5e1aec5b36f0debb7c73,2025-07-07T15:15:29.090000 -CVE-2025-6714,1,1,607d4f1e621ae1879eb6567bd0b3b4e0e0f35bbb63f16c644ccee71d8a820c96,2025-07-07T15:15:29.263000 +CVE-2025-6711,0,0,e23f00487c2f45f5c18b9b7efa1b580ebdde913c361d92a48aab651df03a6eed,2025-07-07T15:15:28.703000 +CVE-2025-6712,0,0,acbeba7162b4ab2a700652aec7c48a9a7bffb6072514ccaa32e6b019baa4bc9e,2025-07-07T15:15:28.890000 +CVE-2025-6713,0,0,b3856304dd6e2d27a25ca90bd7d0af496913132f9cbb5e1aec5b36f0debb7c73,2025-07-07T15:15:29.090000 +CVE-2025-6714,0,0,607d4f1e621ae1879eb6567bd0b3b4e0e0f35bbb63f16c644ccee71d8a820c96,2025-07-07T15:15:29.263000 CVE-2025-6725,0,0,a2520bcd148ac768abbb97089f3d98d6281e55b56fe1591d0610425b8362a99d,2025-07-03T15:13:53.147000 CVE-2025-6729,0,0,456f32ebf7af6d6cbb448c2943d7146af2ab06fd22b170e760510c0f9f3c1283,2025-07-04T03:15:22.577000 CVE-2025-6731,0,0,372cdc09b88b76ae1a3439cacc26558b9d3793f6aabb288d1732baf08077c5eb,2025-06-30T18:38:48.477000 @@ -300407,7 +300437,7 @@ CVE-2025-6750,0,0,f1b454f50a80614e8eea516f2449d507837abfd24769c351c9d643bb9f9983 CVE-2025-6751,0,0,f11398ea423d0e1bd60158b3c52347b142c245928014796a2caf6272fb1781d8,2025-06-30T18:38:48.477000 CVE-2025-6752,0,0,d618339d30498ab434c65ab8e70ead8372a7351acdadb43706f579edd48b3cf3,2025-06-30T18:38:48.477000 CVE-2025-6753,0,0,3897c99aad9d809fc80328b995708f5bc4da9d5705cbec93e88e8647b45eee72,2025-06-30T18:38:48.477000 -CVE-2025-6755,0,1,2ed0f7f54c600ed4e147859a7a6dccd680b8f9e751ace8296b2fc7b8585c8e1d,2025-07-07T14:37:41.387000 +CVE-2025-6755,0,0,2ed0f7f54c600ed4e147859a7a6dccd680b8f9e751ace8296b2fc7b8585c8e1d,2025-07-07T14:37:41.387000 CVE-2025-6756,0,0,0cfdb95abe834ccf814ebb67236819ce98902f5c812431ef066dbba054d03826,2025-07-03T15:14:12.767000 CVE-2025-6761,0,0,e4aa62f203d4ba34beb7bc7552005e1ee7d628b1642e253cda9ca26ecfa6cb7f,2025-06-30T18:38:48.477000 CVE-2025-6762,0,0,75cd4b1572c25c8bfa181120ae91b7aedff91bf82d0f669f47b2f3f4fec5cad2,2025-06-30T18:38:48.477000 @@ -300427,23 +300457,23 @@ CVE-2025-6782,0,0,821695b2228a990404d5b6a0b3225461b5f1f8f75f4df0bfca16c9bf09f337 CVE-2025-6783,0,0,a8b17e099a3c12bd5674dedb676e1e9f3629c56e3d735bede6d3dc0fd6c3e32d,2025-07-04T03:15:23.077000 CVE-2025-6786,0,0,2c6b6cd89ffc7638f53aae175be76bd1ca753dbf9627ab89ce7cee614973d3fc,2025-07-04T03:15:23.237000 CVE-2025-6787,0,0,ac5669632f0e784ec656a74a94c9129ed904e0f16a44fee2fa3c0de6089296e2,2025-07-04T03:15:23.403000 -CVE-2025-6793,1,1,7c5be1eba4bb7ff8001061e18ff82440ad0da852d2ce63cb199c383241065121,2025-07-07T15:15:29.637000 -CVE-2025-6794,1,1,e4e4fa4f9fa1667788d0032f641bc7fda00ebe2f542efcebfd735eaaeb284d38,2025-07-07T15:15:29.793000 -CVE-2025-6795,1,1,fcd252622aa63286b28f77be9d79861da829c62169b1e1225aef62cb47e7e46c,2025-07-07T15:15:29.967000 -CVE-2025-6796,1,1,015cab5641f863cedddae1b208bf1619e5d6c25eb2bd4f80def59dcb6cd7246c,2025-07-07T15:15:30.283000 -CVE-2025-6797,1,1,d5e00a9cf3a5ddc9600e5f2b0371ff11abc8d438241132bb102c138a0392afc8,2025-07-07T15:15:30.430000 -CVE-2025-6798,1,1,ee78d011a8e87919416b0a4f03004a48bd1cdad2c777c4c86fcc4b2109459a77,2025-07-07T15:15:30.563000 -CVE-2025-6799,1,1,19fdc3c8ae904a6f1e3f8c6eb4f0c658de7fb7f0158d216cb0b974859d068b58,2025-07-07T15:15:30.710000 -CVE-2025-6800,1,1,22ab489015e46bebf343782e9522b885b0c25f0050ebfed615eac29c778cc107,2025-07-07T15:15:30.847000 -CVE-2025-6801,1,1,87cddc193f2a08842e67775d607c69c2a23e281456de58a21c5901047044bc1d,2025-07-07T15:15:30.987000 -CVE-2025-6802,1,1,d9a14b4c758a4685cb0875a75db22e42196f22fec656d7bcefbcba5d60307829,2025-07-07T15:15:31.123000 -CVE-2025-6803,1,1,b3e54e7fa9f721a8a861a0b9e6c0d067a804a108fb47523f53b884bb06ad0b67,2025-07-07T15:15:31.270000 -CVE-2025-6804,1,1,11af759a40be67017f75a9459620509c4c7665757a07e51753b8deec818dffbe,2025-07-07T15:15:31.407000 -CVE-2025-6805,1,1,28b124f6713bfab462f153b6fbfb81efddca9c1d5b20e38def590f40f0cecde0,2025-07-07T15:15:31.557000 -CVE-2025-6806,1,1,1a4b03057d67a8e497caf8f5a2c2dc2bf2f55cdcbebefc2cf28efe32290d1fee,2025-07-07T15:15:31.700000 -CVE-2025-6807,1,1,913f01f7c5751de3e757f05af4a8ddf5a3970a7f55a8781f61693c3f9e259419,2025-07-07T15:15:31.860000 -CVE-2025-6810,1,1,47fc82f705b090e00c1bc6cf05acad8ed1aba3ea0cc9b20c7eb5b735050663ee,2025-07-07T15:15:32.020000 -CVE-2025-6811,1,1,35201a18fdf838fa47c1f498c77b06a506a679dd0db8f84e13e3b8c6cce3c48f,2025-07-07T15:15:32.173000 +CVE-2025-6793,0,0,7c5be1eba4bb7ff8001061e18ff82440ad0da852d2ce63cb199c383241065121,2025-07-07T15:15:29.637000 +CVE-2025-6794,0,0,e4e4fa4f9fa1667788d0032f641bc7fda00ebe2f542efcebfd735eaaeb284d38,2025-07-07T15:15:29.793000 +CVE-2025-6795,0,0,fcd252622aa63286b28f77be9d79861da829c62169b1e1225aef62cb47e7e46c,2025-07-07T15:15:29.967000 +CVE-2025-6796,0,0,015cab5641f863cedddae1b208bf1619e5d6c25eb2bd4f80def59dcb6cd7246c,2025-07-07T15:15:30.283000 +CVE-2025-6797,0,0,d5e00a9cf3a5ddc9600e5f2b0371ff11abc8d438241132bb102c138a0392afc8,2025-07-07T15:15:30.430000 +CVE-2025-6798,0,0,ee78d011a8e87919416b0a4f03004a48bd1cdad2c777c4c86fcc4b2109459a77,2025-07-07T15:15:30.563000 +CVE-2025-6799,0,0,19fdc3c8ae904a6f1e3f8c6eb4f0c658de7fb7f0158d216cb0b974859d068b58,2025-07-07T15:15:30.710000 +CVE-2025-6800,0,0,22ab489015e46bebf343782e9522b885b0c25f0050ebfed615eac29c778cc107,2025-07-07T15:15:30.847000 +CVE-2025-6801,0,0,87cddc193f2a08842e67775d607c69c2a23e281456de58a21c5901047044bc1d,2025-07-07T15:15:30.987000 +CVE-2025-6802,0,0,d9a14b4c758a4685cb0875a75db22e42196f22fec656d7bcefbcba5d60307829,2025-07-07T15:15:31.123000 +CVE-2025-6803,0,0,b3e54e7fa9f721a8a861a0b9e6c0d067a804a108fb47523f53b884bb06ad0b67,2025-07-07T15:15:31.270000 +CVE-2025-6804,0,0,11af759a40be67017f75a9459620509c4c7665757a07e51753b8deec818dffbe,2025-07-07T15:15:31.407000 +CVE-2025-6805,0,0,28b124f6713bfab462f153b6fbfb81efddca9c1d5b20e38def590f40f0cecde0,2025-07-07T15:15:31.557000 +CVE-2025-6806,0,0,1a4b03057d67a8e497caf8f5a2c2dc2bf2f55cdcbebefc2cf28efe32290d1fee,2025-07-07T15:15:31.700000 +CVE-2025-6807,0,0,913f01f7c5751de3e757f05af4a8ddf5a3970a7f55a8781f61693c3f9e259419,2025-07-07T15:15:31.860000 +CVE-2025-6810,0,0,47fc82f705b090e00c1bc6cf05acad8ed1aba3ea0cc9b20c7eb5b735050663ee,2025-07-07T15:15:32.020000 +CVE-2025-6811,0,0,35201a18fdf838fa47c1f498c77b06a506a679dd0db8f84e13e3b8c6cce3c48f,2025-07-07T15:15:32.173000 CVE-2025-6814,0,0,cd522439232a66a54b2722ca889d57b343679ee6e9e888c8cab7fb06e5434dac,2025-07-04T03:15:23.580000 CVE-2025-6816,0,0,5e9e5e2b35582b9f79370f11aa6db1969ced2cc7c6592e7f435aaffb84197923,2025-07-01T17:32:51.163000 CVE-2025-6817,0,0,f566ef24b61618394adfc182824a9952f225ff540b64bfe9d61b2edac708b720,2025-07-01T17:30:53.610000 @@ -300534,79 +300564,80 @@ CVE-2025-6912,0,0,aafe2f1d57e34bcd61d1d6af6d9f3556c1a9bd30d2cce7652e792c5a761afd CVE-2025-6913,0,0,7750c03c4203b1432f3d319fff49c5e14ce077ae5a2f7ab4536d986f27c531f9,2025-06-30T18:38:23.493000 CVE-2025-6914,0,0,72ae2f778ea40ec5cb4e168e7e664d889353b94cf38cec572180254690881d9b,2025-06-30T18:38:23.493000 CVE-2025-6915,0,0,54af862d397d8eb9c33d58ee8f9a404d95253a2e8e2f58ad820d3c5ca44c87d1,2025-06-30T18:38:23.493000 -CVE-2025-6916,0,1,3ddb4b54a83fdfd89a9563fa673fced3928b7b90fa03b6e7407b43c77ee4d641,2025-07-07T14:41:39.973000 -CVE-2025-6917,0,1,6cd11cceca206c91d8d3b66086170825c6b2ae3c019cef6e0718141d30597e9d,2025-07-07T14:42:17.613000 +CVE-2025-6916,0,0,3ddb4b54a83fdfd89a9563fa673fced3928b7b90fa03b6e7407b43c77ee4d641,2025-07-07T14:41:39.973000 +CVE-2025-6917,0,0,6cd11cceca206c91d8d3b66086170825c6b2ae3c019cef6e0718141d30597e9d,2025-07-07T14:42:17.613000 CVE-2025-6920,0,0,92f153f201754cb01ae808c528460cedb35114cf4759cf0d03fac580d4198aee,2025-07-03T15:14:12.767000 CVE-2025-6925,0,0,23d66804026324f5cffe9dd2a037d5ec45183557a83e7c9567bd54f711f98138,2025-06-30T19:15:25.920000 CVE-2025-6926,0,0,6427da64a31c87959f0b90bc48cde9f58757abf9013765e48ad819f0d7ae3ead,2025-07-03T18:15:22.797000 -CVE-2025-6929,0,1,6413e6647749a4fe7bbfeb37e8c5d8bce2c4b4f4fdb0294336fcc95835f5b57c,2025-07-07T14:46:35.950000 -CVE-2025-6930,0,1,f5447838e9850f22f0ccaef5294e35a277657cb1a698f9d1d1f8ecc25ba5e027,2025-07-07T14:46:23.903000 +CVE-2025-6929,0,0,6413e6647749a4fe7bbfeb37e8c5d8bce2c4b4f4fdb0294336fcc95835f5b57c,2025-07-07T14:46:35.950000 +CVE-2025-6930,0,0,f5447838e9850f22f0ccaef5294e35a277657cb1a698f9d1d1f8ecc25ba5e027,2025-07-07T14:46:23.903000 CVE-2025-6931,0,0,ea2ff5a0469a3df9ef65d87bf71684c0690aa2650e532d6b10eadd6580773a20,2025-07-03T15:14:12.767000 CVE-2025-6932,0,0,c6910bcd3749797dff950329e63fee387fd8bd4cfbde90f1be79e2bbd4873171,2025-07-03T15:14:12.767000 CVE-2025-6934,0,0,0402b98cb80b1a5e760bb7bca4a3d60ffc6d77468e2d3de0390d2d97ef0c6eb2,2025-07-03T15:14:12.767000 -CVE-2025-6935,0,1,b3fadf20f3950bedcd120b43e9c37151d1fa8ee6006b9fa91707473cfca0dd57,2025-07-07T14:46:10.930000 -CVE-2025-6936,0,1,4b056c004f4634f7ad809e2381aef7f1051f5d22ebb172e0dfbad6b944759d23,2025-07-07T14:45:57.567000 +CVE-2025-6935,0,0,b3fadf20f3950bedcd120b43e9c37151d1fa8ee6006b9fa91707473cfca0dd57,2025-07-07T14:46:10.930000 +CVE-2025-6936,0,0,4b056c004f4634f7ad809e2381aef7f1051f5d22ebb172e0dfbad6b944759d23,2025-07-07T14:45:57.567000 CVE-2025-6937,0,0,861909df8e8c53e2feba2751d146804b6a31b522290272e89220504d63a5575a,2025-07-03T15:14:12.767000 -CVE-2025-6938,0,1,580275a162b0ae2150d043ac66db8e3897ae505eec6e4c31859d6e2625e7a9a2,2025-07-07T14:41:30.903000 -CVE-2025-6939,0,1,5308ec5e92166f2b8bfe7a8110beec54738af3cfc7b7ea0b88931ed3b123cd32,2025-07-07T14:41:20.020000 -CVE-2025-6940,0,1,bf5da5562f44dccd1466a99a2ea2d2d393b8a0540d67fb05df1f694fbf081644,2025-07-07T14:41:12.100000 +CVE-2025-6938,0,0,580275a162b0ae2150d043ac66db8e3897ae505eec6e4c31859d6e2625e7a9a2,2025-07-07T14:41:30.903000 +CVE-2025-6939,0,0,5308ec5e92166f2b8bfe7a8110beec54738af3cfc7b7ea0b88931ed3b123cd32,2025-07-07T14:41:20.020000 +CVE-2025-6940,0,0,bf5da5562f44dccd1466a99a2ea2d2d393b8a0540d67fb05df1f694fbf081644,2025-07-07T14:41:12.100000 CVE-2025-6942,0,0,ce17090e9af93141dbee0b9e4a07d73c52cfd336a45382f6ec1d10b523f6b0dd,2025-07-03T15:13:53.147000 CVE-2025-6943,0,0,5dcd978aca60bde8e7659603a9d3b22fafdd87d6a11934f15fec14a78f7c69d4,2025-07-03T15:13:53.147000 CVE-2025-6944,0,0,6d1c97c87df69857e609151c35ff1ba4da9f47c731949eb75447b8af0543adb0,2025-07-04T06:15:25.203000 CVE-2025-6951,0,0,5a3caa7d073f89ca081c6926241b422cc722827fe163f031d9790b1237798b83,2025-07-03T15:14:12.767000 CVE-2025-6952,0,0,709bf298cd3a7382a18a3723dc3d183c8c753d6d79ec97c33ee461f9719c03c2,2025-07-03T15:14:12.767000 -CVE-2025-6953,0,1,fdacae0d630bb6af09d824ad6fd187b2ac6c84ff40724304fdc55ee79e6e1077,2025-07-07T14:38:29.763000 -CVE-2025-6954,0,1,9ec2a4d089fbed4663adab469af7dd36f8ee41ec7c13b93528b7c0cf68204359,2025-07-07T14:38:45.247000 -CVE-2025-6955,0,1,0b07c073f98ef5ce4fcf1a50a573e2d752ebffac3a6de2542e4d8ed870eff7bc,2025-07-07T14:38:56.467000 -CVE-2025-6956,0,1,7d1ee93818f89e4b8aa11d645952ec619dd56fd343c8e84bf85bad67bd5e9425,2025-07-07T14:39:16.537000 -CVE-2025-6957,0,1,d43c1c1cc92f7d21e5ed8bdc9ffdb52b142a8e360ad5c2279978552f3adf45a6,2025-07-07T14:39:24.860000 -CVE-2025-6958,0,1,2db89adeea22b1639539034bc1f43b4eb969bfaa6f3e6d31fdba39ef55f208d8,2025-07-07T14:39:36.240000 -CVE-2025-6959,0,1,188427c4c06f228e7abdcb03d17bee570ef5ee3c3c91c9d00b565083f3a7cec8,2025-07-07T14:39:44.820000 -CVE-2025-6960,0,1,f267b66c02cdac1c8ce85dbc8f2a5c2f1982bd1f7a6624958926337b8bcbf700,2025-07-07T14:39:53.557000 -CVE-2025-6961,0,1,86911d453c9a6a116c781e665e12bb055c6c1dd460457b2abad560088ff88b0f,2025-07-07T14:40:04.140000 -CVE-2025-6962,0,1,f65c5ea7b99373b1a9855dc70c185d85075c1892627adaf80072b361308a0edf,2025-07-07T14:40:21.120000 -CVE-2025-6963,0,1,44275f505fd32e81e69bb52414baf1be8e373248b7ffe857a4b14d50be164bee,2025-07-07T14:40:29.430000 +CVE-2025-6953,0,0,fdacae0d630bb6af09d824ad6fd187b2ac6c84ff40724304fdc55ee79e6e1077,2025-07-07T14:38:29.763000 +CVE-2025-6954,0,0,9ec2a4d089fbed4663adab469af7dd36f8ee41ec7c13b93528b7c0cf68204359,2025-07-07T14:38:45.247000 +CVE-2025-6955,0,0,0b07c073f98ef5ce4fcf1a50a573e2d752ebffac3a6de2542e4d8ed870eff7bc,2025-07-07T14:38:56.467000 +CVE-2025-6956,0,0,7d1ee93818f89e4b8aa11d645952ec619dd56fd343c8e84bf85bad67bd5e9425,2025-07-07T14:39:16.537000 +CVE-2025-6957,0,0,d43c1c1cc92f7d21e5ed8bdc9ffdb52b142a8e360ad5c2279978552f3adf45a6,2025-07-07T14:39:24.860000 +CVE-2025-6958,0,0,2db89adeea22b1639539034bc1f43b4eb969bfaa6f3e6d31fdba39ef55f208d8,2025-07-07T14:39:36.240000 +CVE-2025-6959,0,0,188427c4c06f228e7abdcb03d17bee570ef5ee3c3c91c9d00b565083f3a7cec8,2025-07-07T14:39:44.820000 +CVE-2025-6960,0,0,f267b66c02cdac1c8ce85dbc8f2a5c2f1982bd1f7a6624958926337b8bcbf700,2025-07-07T14:39:53.557000 +CVE-2025-6961,0,0,86911d453c9a6a116c781e665e12bb055c6c1dd460457b2abad560088ff88b0f,2025-07-07T14:40:04.140000 +CVE-2025-6962,0,0,f65c5ea7b99373b1a9855dc70c185d85075c1892627adaf80072b361308a0edf,2025-07-07T14:40:21.120000 +CVE-2025-6963,0,0,44275f505fd32e81e69bb52414baf1be8e373248b7ffe857a4b14d50be164bee,2025-07-07T14:40:29.430000 CVE-2025-7046,0,0,94d36e6f9d9ceb20ef9426662a51fc4bc68475dc7a5b51164a5349a20b58da44,2025-07-04T03:15:23.743000 CVE-2025-7053,0,0,aefdef7d7c9e00127938c47f9611144c7ab1681161e44b641cf18dcf13c76e57,2025-07-04T03:15:23.917000 -CVE-2025-7056,1,1,887354ad4bf4ab3237edc71bf6f5ae1221a09a81ffa56c8607b24e19987ce81f,2025-07-07T15:15:32.377000 -CVE-2025-7060,0,0,91da01898395bdf026b99c0a46900d94a8a4f57665e6550c84b17fbf8659b9cf,2025-07-04T11:15:51.683000 -CVE-2025-7061,0,0,15674a6a6cc800d5a0b5940feb3e192f9e740b04c9aff814dfdb24e1d8ce91ae,2025-07-04T13:15:25.987000 +CVE-2025-7056,0,0,887354ad4bf4ab3237edc71bf6f5ae1221a09a81ffa56c8607b24e19987ce81f,2025-07-07T15:15:32.377000 +CVE-2025-7057,1,1,4b5546b880c174c527f21f9548d01d700439ce003d5b251650f79f5068ffbdbf,2025-07-07T16:15:26.123000 +CVE-2025-7060,0,1,ea887b65cf046ad6772dd0cd0e58df14fcbe6e15ef8a40aee1cd3998fc17ef43,2025-07-07T17:15:31.427000 +CVE-2025-7061,0,1,f6d414ab167114a6d5515c0d0e72116f8b1a04d4e9e4ff05f8b50036c19d1294,2025-07-07T17:15:31.597000 CVE-2025-7066,0,0,998f6b55a42342a8b0f4fda5076c6090356f0a52d1edd36c9bb39b315048f315,2025-07-04T12:15:35.740000 CVE-2025-7067,0,0,ef4baff7115bd21a0a6909e0c3045023f49e50286af658a7d9865083709da10c,2025-07-04T18:15:23.610000 CVE-2025-7068,0,0,39683738c2c7b611d3d7f7a9ea910628930e44658205b4c41e69f865d1b9010b,2025-07-04T21:15:23.770000 CVE-2025-7069,0,0,a8925f52082dbe5c58f7eabd312512eb1093b5a4e00cdea22b79df2980ac7481,2025-07-04T21:15:23.967000 CVE-2025-7070,0,0,5f1d750a5e8c3a8f6a22a3c4ba050db3b74a14614263bd616051bd77ed245d73,2025-07-04T22:15:22.450000 -CVE-2025-7074,0,0,17a3f0ba3ddd59bcaa881a4c58ffb1fd038264f365c60b06d4f0954ae7fd2a19,2025-07-05T09:15:27.913000 -CVE-2025-7075,0,0,f55145ea7b8b425f9a71256e9af22508bfcd7fe47fec2009f7e9ecaad13268b4,2025-07-06T00:15:22.177000 -CVE-2025-7076,0,0,12a886580faa52060fa14c3385e4efa8af2c70ae6539b826fcb69118c4e94272,2025-07-06T01:15:20.563000 -CVE-2025-7077,0,0,5cf46dd264f943652ab85c60911298ed73fd226440062423a149de6f68a6458a,2025-07-06T07:15:35.383000 -CVE-2025-7078,0,0,e3e01c0b85e9f338c256052c94d058110940bc0660a993bf3e6ba73a98ff97d2,2025-07-06T09:15:23.400000 -CVE-2025-7079,0,0,43780083ba860a15446c0a9f973e454650bc57514cce27eca914e9b45d58cf55,2025-07-06T13:15:35.413000 +CVE-2025-7074,0,1,2abfa6cbeb777bc51a43a1e220aee157241724a8d412c29b35af64d6af93ca58,2025-07-07T16:15:26.250000 +CVE-2025-7075,0,1,604dd4e6f1baafdd3532513d4d9a99f67848a2afc7a88556af0414101b5a60a0,2025-07-07T16:15:26.400000 +CVE-2025-7076,0,1,7d6d1108769b5364b947887b42cb483910d4aa93671881a610516f73fcccca1c,2025-07-07T16:15:26.560000 +CVE-2025-7077,0,1,f961cd5003da2c260ecba733871126530a276b9857f886deea93067aa9242657,2025-07-07T17:15:31.753000 +CVE-2025-7078,0,1,9432491095f4972e78c6f717ea9a22662d7eebc88226413425cc49f2538e83dd,2025-07-07T17:15:31.903000 +CVE-2025-7079,0,1,811a0dc618f8c4d6ff47615a566beb64b868137f4711024af45b27b51dbe22f6,2025-07-07T17:15:32.050000 CVE-2025-7080,0,0,637383681feddc007064d5c773e2ecdc2763a7e8819b7c75e7a8e6950cd8d0f2,2025-07-06T14:15:28.203000 CVE-2025-7081,0,0,6c8bd52e845482f1b88dc0cbdb6f78246c5bad3e6784ea061f1794a3c5302ff0,2025-07-06T14:15:28.413000 CVE-2025-7082,0,0,cca3e65ca63007e25bfeff7e6b685a6960407f03f55a50eb28c8d1eb6affdb8f,2025-07-06T14:15:28.607000 -CVE-2025-7083,0,0,f2c21b2d6ca80923ce9fb31d12a7d7390a9594179bc1349bf2323ce6886e2143,2025-07-06T16:15:27.780000 -CVE-2025-7084,0,0,40d64e718c08a3c75becb1fe73ce2d5654f96599c0b2f748b9e39676b04779af,2025-07-06T16:15:28.447000 -CVE-2025-7085,0,0,e6b5999ff0622fe18f88226ea6db953afafce16e0e9710d79487392476e3a667,2025-07-06T17:15:23.197000 +CVE-2025-7083,0,1,b0ff6aaac6129f8bae07cd12ba1aeaa7ac339e4cceec107ea989339c3ff7b485,2025-07-07T16:15:26.727000 +CVE-2025-7084,0,1,ba08b8701d5627b65b81b1344d3cc178ec32c00bf41d7a8601c61b15a75468b4,2025-07-07T16:15:26.873000 +CVE-2025-7085,0,1,e8f030e83fb961a1abc6b01bc320b8690660f88c6e399bba5b3285df5a9197fb,2025-07-07T16:15:27.007000 CVE-2025-7086,0,0,1f8b8e3721da07379f5a9594643da4c95c3ec4fee906e01834bd004fb513ebeb,2025-07-06T17:15:24.003000 -CVE-2025-7087,0,0,97a3e83918ea0feba857a30bb7cb917f8c206595c476b0e1c3be01a34216b4b7,2025-07-06T18:15:21.863000 -CVE-2025-7088,0,0,2965445bdf0d6653fa56c76ed46164c48e5c7d7927df18f705e538e5c30e4247,2025-07-06T18:15:22.683000 -CVE-2025-7089,0,0,6b42ae5c15eb8d2af1455df155a0e99f6dea969782986e6474289d38cc1006d9,2025-07-06T19:15:24.420000 -CVE-2025-7090,0,0,3d740b3aaeac4a3726ae5317e77911b30768db409d0f994882aee02e8f9337ce,2025-07-06T19:15:24.693000 -CVE-2025-7091,0,0,9ff8a94622a78c987292c304e477b63aa67159cf06a310c5df834c9f14cd4e02,2025-07-06T20:15:23.800000 -CVE-2025-7092,0,0,9038b8e78afac1611ac595ba1203c36b3ed6579074804efcd4d2d855363e18bb,2025-07-06T20:15:24 -CVE-2025-7093,0,0,1eb06f226774b5e2ec04482b03278b01077aa16f910ec7d6f9b337b25214f9d8,2025-07-06T21:15:20.830000 -CVE-2025-7094,0,0,e2e344ddfd27a95807ccc35b3b92b95a60930aa6693ada5f8dd05ab887987b1d,2025-07-06T21:15:21.727000 -CVE-2025-7095,0,0,2ebb72a4715e6eb12d17436eb92184585d7ab98159fab6306429afd4992c3910,2025-07-06T22:15:24.090000 -CVE-2025-7096,0,0,9c169e26103bce91b57255a825e068e9f9c54915d639ae83dcd918519a34242e,2025-07-06T22:15:25.067000 -CVE-2025-7097,0,0,2255c7655229413ea02dc268292b3acae5030769796cfe1e71eb3ee74f4792de,2025-07-06T23:15:21.960000 -CVE-2025-7098,0,0,8f49468278117de1ed5c75fa3637d31ddcf0ca51419c69480ba5fa36e70e3f70,2025-07-06T23:15:22.143000 -CVE-2025-7099,0,0,87949c56d00cec79cc0373a58db47ba591b2b1b501b545e23abf830cf698df0e,2025-07-07T00:15:22.513000 -CVE-2025-7100,0,0,e92939847949ee02dfeb59c915a785450288e223e3f32d0325d95d239ca36e74,2025-07-07T01:15:22.633000 -CVE-2025-7101,0,0,d395c3a0fc266fc49eb8cb7fe978a666e991ac39206772e4636794ddb43c8622,2025-07-07T01:15:23.450000 -CVE-2025-7102,0,0,dfff2f2f909d1d154a7f5b441a81cf174af9c1013ee6f30af2214c4e00eef044,2025-07-07T01:15:23.637000 -CVE-2025-7103,0,0,716bef8449b79d925583831231c07737d0af573cded30f031312863d99dc6e75,2025-07-07T02:15:20.693000 -CVE-2025-7107,0,0,a51dbc17f4d6b944bf3a2b33208d299fccd4801af400b67262c21925ba56cadd,2025-07-07T03:15:30.363000 +CVE-2025-7087,0,1,cef5ca4ba21a674fe8abae493974a59acfd3925ff07f03b7867cfa6dedd9db88,2025-07-07T16:15:27.140000 +CVE-2025-7088,0,1,cc28973767f16eb1d600530829b13c17d7dbb342aa6a2e56b27a4ca8b317f068,2025-07-07T16:15:27.267000 +CVE-2025-7089,0,1,26357a5fb79269f8506fd23797742bde07f0e742215a7238f39599d51916af98,2025-07-07T16:15:27.437000 +CVE-2025-7090,0,1,1e7fd911ea2e48a66d10013fed56fdf1940532f31273f79cf623746ddaff6e92,2025-07-07T16:15:27.590000 +CVE-2025-7091,0,1,f9b274bf7efd9299c1b005af1d60f813520defc71a7f271f18916f1c8d38f67f,2025-07-07T16:15:27.727000 +CVE-2025-7092,0,1,96c90a9ec7691d399e8c2c2b67ac61a6831904627b105c0124393edb6ec0b04d,2025-07-07T16:15:27.860000 +CVE-2025-7093,0,1,081cd9cea904d3af0894490d15c86408af4c22fcf698ffebb8b38488e5b5e83a,2025-07-07T16:15:27.993000 +CVE-2025-7094,0,1,b7e0818848a20834db3ee0200a35a1430be729b2b7c0f9a7bb3b2a8b8f26775c,2025-07-07T16:15:28.120000 +CVE-2025-7095,0,1,6a54a361346256c2ffe965825095524fd0e12ad3dfd9159eb592960673b87b0a,2025-07-07T16:15:28.253000 +CVE-2025-7096,0,1,18fb9ef889de0edf77804f792e67aa5f8e3017a5a8c60aef96a88a0067d52d8c,2025-07-07T16:15:28.390000 +CVE-2025-7097,0,1,5dd8c0c31d2c1494dff01d9b8f04a47fc9bb216a12358307c53ad0f4615f97c6,2025-07-07T16:15:28.527000 +CVE-2025-7098,0,1,1b2217223b82ba281ef588381f81252ba4e9aa1f7a336fa2f6b00faa46aa11eb,2025-07-07T16:15:28.647000 +CVE-2025-7099,0,1,d0ba6eede706334fb4fcb3178818ea896aa6c83baf94cc79e1c127731435fb97,2025-07-07T16:15:28.783000 +CVE-2025-7100,0,1,43d3b2382ef4676345e1255cd63907f50e001f45d740885d5a6fe76c85677e12,2025-07-07T16:15:28.920000 +CVE-2025-7101,0,1,4216e2bde5edab81bdf226355c1234027553b6aa035872e45faf94ab4fffed51,2025-07-07T16:15:29.047000 +CVE-2025-7102,0,1,0e758d228258d3c66a27511adaba25c96ca7ea38a452ff94858a88c4ccb378ab,2025-07-07T16:15:29.177000 +CVE-2025-7103,0,1,85f26d901ba27d81f6f625a39cdb80ea93ade2994bd0b5d0c6aa1c498d30aa3e,2025-07-07T16:15:29.303000 +CVE-2025-7107,0,1,ab72b7e78fbf89339e98329f6d1ace7a0e151530f1a2b8fa216d292f19401aad,2025-07-07T16:15:29.440000 CVE-2025-7108,0,0,353e8beef98a86d7bfdff1615dfedaa981808297131fa9f6ea783c47e8f130ff,2025-07-07T03:15:30.547000 CVE-2025-7109,0,0,5a0461fe092f685ba4d419f22522908f148069f52e91c15895d5bd37eef750d8,2025-07-07T03:15:30.730000 CVE-2025-7110,0,0,78e84cd184214c8de0a1ada602f4b00187384264313ccdbcb09a6e1337e3d331,2025-07-07T04:15:31.707000 @@ -300624,13 +300655,18 @@ CVE-2025-7121,0,0,f98592b90bae8673a1acf1562a82f201f4107122965f0fa7be2fd44e609ee9 CVE-2025-7122,0,0,adf256896ed5cbb8629aa9cde7fbd52d5f1bfa96f6bba07e9740464a39062f0c,2025-07-07T10:15:29.333000 CVE-2025-7123,0,0,d658a23f3c64568d145a25898383fe8c81303a99ce38c2feb3ec256ae1454ce8,2025-07-07T10:15:29.580000 CVE-2025-7124,0,0,522137e44a576022dd9df4ff44053e0ecc7e9aaf32ee911cb3298096b5ac7633,2025-07-07T11:15:51.483000 -CVE-2025-7125,0,1,59f93cf32a698e88cf044a3660694b286567d551d42af1e40f12df4e30bf0d62,2025-07-07T14:15:25.823000 -CVE-2025-7126,0,1,9726a8f94a9ad7a97e828a70599c64184ea3eee62b56521708a62559045fdaa3,2025-07-07T14:15:25.993000 -CVE-2025-7127,0,1,f6ff5bbf0ecaee432bb4da0dacc7537a0ba5630485a64999552e7e9360f181f7,2025-07-07T14:15:26.130000 -CVE-2025-7128,0,1,6874dcc162b213e4bfdbd4c99c0199c19b5bbcb7227926a078e1d6d257fe5189,2025-07-07T14:15:26.267000 +CVE-2025-7125,0,0,59f93cf32a698e88cf044a3660694b286567d551d42af1e40f12df4e30bf0d62,2025-07-07T14:15:25.823000 +CVE-2025-7126,0,0,9726a8f94a9ad7a97e828a70599c64184ea3eee62b56521708a62559045fdaa3,2025-07-07T14:15:25.993000 +CVE-2025-7127,0,0,f6ff5bbf0ecaee432bb4da0dacc7537a0ba5630485a64999552e7e9360f181f7,2025-07-07T14:15:26.130000 +CVE-2025-7128,0,0,6874dcc162b213e4bfdbd4c99c0199c19b5bbcb7227926a078e1d6d257fe5189,2025-07-07T14:15:26.267000 CVE-2025-7129,0,0,1ce081672d0ef0b0a36b71fe144638ccdb4a7560f34cdca6bd46c5edcd55c510,2025-07-07T13:15:29.627000 -CVE-2025-7130,1,1,a5f4c7f7f4ee94ae9b7e7be25febb0dc41851a88e92ec3e358a28f9463b9a26f,2025-07-07T14:15:26.497000 -CVE-2025-7131,1,1,aceed0620d47efbff01af24a13ffd8b2c55ea72678559fcbfa38c60669f71087,2025-07-07T14:15:26.707000 -CVE-2025-7132,1,1,dda6d41e0bd6fa85e316f1708480909a7fdb596dbee40ca861eadc372c400abf,2025-07-07T15:15:32.937000 -CVE-2025-7133,1,1,56734892909aeb9bce01be40fe5007a986cf1855b2bb1a92aea182b285c6104b,2025-07-07T15:15:33.210000 +CVE-2025-7130,0,0,a5f4c7f7f4ee94ae9b7e7be25febb0dc41851a88e92ec3e358a28f9463b9a26f,2025-07-07T14:15:26.497000 +CVE-2025-7131,0,0,aceed0620d47efbff01af24a13ffd8b2c55ea72678559fcbfa38c60669f71087,2025-07-07T14:15:26.707000 +CVE-2025-7132,0,0,dda6d41e0bd6fa85e316f1708480909a7fdb596dbee40ca861eadc372c400abf,2025-07-07T15:15:32.937000 +CVE-2025-7133,0,0,56734892909aeb9bce01be40fe5007a986cf1855b2bb1a92aea182b285c6104b,2025-07-07T15:15:33.210000 +CVE-2025-7134,1,1,8ab0e8d277d7b2f480ebe0b283bf88cc88a100a22503b8061bab0975ccce739b,2025-07-07T16:15:29.800000 +CVE-2025-7135,1,1,b6490bc04d06a22048a6dceb22f3451ef4ffc561024c90aa83a6ab386452ce2f,2025-07-07T16:15:30.080000 +CVE-2025-7136,1,1,949f44de95cc97e0635501d7a8d21b7af347f5fa18a5fab09e5ed082b5befdbe,2025-07-07T17:15:32.693000 +CVE-2025-7137,1,1,8cbf392339092f6caa3591a162fda6d83a6c6778a2bbde630a3700637af316bf,2025-07-07T17:15:32.903000 CVE-2025-7145,0,0,0431922fce794ebe2fb76c85f6a92686a8078a8927733582f3cad39cb892c9b6,2025-07-07T03:15:30.917000 +CVE-2025-7259,1,1,92aedb6a5e38fb030175a289364c754cf67f487a6a25e9d17c23717610f38507,2025-07-07T16:15:30.440000