diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25718.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25718.json index 024fe32b18e..0b21c7d70da 100644 --- a/CVE-2023/CVE-2023-257xx/CVE-2023-25718.json +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25718.json @@ -2,20 +2,13 @@ "id": "CVE-2023-25718", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-13T20:15:11.040", - "lastModified": "2024-11-21T07:49:59.913", + "lastModified": "2025-06-18T22:15:31.953", "vulnStatus": "Modified", - "cveTags": [ - { - "sourceIdentifier": "cve@mitre.org", - "tags": [ - "disputed" - ] - } - ], + "cveTags": [], "descriptions": [ { "lang": "en", - "value": "In ConnectWise Control through 22.9.10032 (formerly known as ScreenConnect), after an executable file is signed, additional instructions can be added without invalidating the signature, such as instructions that result in offering the end user a (different) attacker-controlled executable file. It is plausible that the end user may allow the download and execution of this file to proceed. There are ConnectWise Control configuration options that add mitigations. NOTE: this may overlap CVE-2023-25719. NOTE: the vendor's position is that this purported vulnerability represents a \"fundamental lack of understanding of Authenticode code signing behavior.\"" + "value": "In ConnectWise Control through 22.9.10032 (formerly known as ScreenConnect), after an executable file is signed, additional instructions can be added without invalidating the signature, such as instructions that result in offering the end user a (different) attacker-controlled executable file. It is plausible that the end user may allow the download and execution of this file to proceed. There are ConnectWise Control configuration options that add mitigations." }, { "lang": "es", @@ -84,6 +77,10 @@ "Not Applicable" ] }, + { + "url": "https://m.youtube.com/watch?v=fbNVUgmstSc&pp=0gcJCf0Ao7VqN5tD", + "source": "cve@mitre.org" + }, { "url": "https://www.connectwise.com", "source": "cve@mitre.org", diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25719.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25719.json index 33e3dfbb32b..a02377b9764 100644 --- a/CVE-2023/CVE-2023-257xx/CVE-2023-25719.json +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25719.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25719", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-13T20:15:11.110", - "lastModified": "2025-03-21T15:15:40.973", + "lastModified": "2025-06-18T22:15:32.900", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -108,6 +108,10 @@ "Third Party Advisory" ] }, + { + "url": "https://m.youtube.com/watch?v=fbNVUgmstSc&pp=0gcJCf0Ao7VqN5tD", + "source": "cve@mitre.org" + }, { "url": "https://www.connectwise.com", "source": "cve@mitre.org", diff --git a/CVE-2024/CVE-2024-456xx/CVE-2024-45673.json b/CVE-2024/CVE-2024-456xx/CVE-2024-45673.json index 40e6e3f3c50..1fc54cdfebb 100644 --- a/CVE-2024/CVE-2024-456xx/CVE-2024-45673.json +++ b/CVE-2024/CVE-2024-456xx/CVE-2024-45673.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45673", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-21T17:15:12.900", - "lastModified": "2025-02-21T18:15:18.163", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-18T23:36:20.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -81,10 +81,63 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:security_verify_bridge_directory_sync:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.0.1", + "versionEndIncluding": "1.0.12", + "matchCriteriaId": "BAEA73DA-1018-43D9-B4A2-3C971286ACF3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:security_verify_gateway_for_radius:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.0.1", + "versionEndIncluding": "1.0.11", + "matchCriteriaId": "C104C5D2-1CD7-4005-9064-43F296809673" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:security_verify_gateway_for_windows_login:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.0.1", + "versionEndIncluding": "1.0.10", + "matchCriteriaId": "901B7BA0-7493-403D-B0F2-57B1D1E340DE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7183801", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-530xx/CVE-2024-53011.json b/CVE-2024/CVE-2024-530xx/CVE-2024-53011.json index 422f129005c..b516566dfc1 100644 --- a/CVE-2024/CVE-2024-530xx/CVE-2024-53011.json +++ b/CVE-2024/CVE-2024-530xx/CVE-2024-53011.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53011", "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-03-03T11:15:13.080", - "lastModified": "2025-03-03T13:15:10.853", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-18T23:27:51.907", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,10 +61,2256 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59CB6F2F-7C95-498B-9F9E-728930FD24A7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_1_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "284E62AF-2E4D-4E82-AC9A-F27DA71735EF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1FEDF458-DEA7-42A1-A56D-E11250139545" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_2_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D5693438-0F20-47BB-BA32-7175C3152368" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_ar1_gen_1_platform_\\\"luna1\\\"_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C1717CFD-91F8-4E9E-9635-7A99C7BB540F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_ar1_gen_1_platform_\\\"luna1\\\":-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C85939F-869E-4228-B745-A29FD56B8A45" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82B82E87-F3F4-466F-A76B-C8809121FF6F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "419A132E-E42C-4395-B74B-788A39DF1D13" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*", + "matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:flight_rb5_5g_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD36089F-92DF-49EC-9C6F-4300E4903CB2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:flight_rb5_5g_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D19A754C-6900-4436-916D-F5361E0BC324" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "83B53119-1B2F-4978-B7F5-33B84BE73B68" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6FEBC0C5-CAA1-475C-96C2-B8D24B2E4536" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6564_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "00FE294D-4BE0-4436-9273-507E760884EC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6564:-:*:*:*:*:*:*:*", + "matchCriteriaId": "424CB795-58E5-43A4-A2EC-C563D93C5E72" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B59672A0-2FA6-46CC-B75A-C599B842AFB9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3847F4A5-90A5-4C84-B43F-0DDD81BD79CE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9B828AC8-4A01-4537-B2BD-8180C99F5C32" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*", + "matchCriteriaId": "66C16E1E-9D4A-4F20-B697-833FDCCA86FB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "828CFB37-76A6-4927-9D00-AF9A1C432DD6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11405993-5903-4716-B452-370281034B42" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8374DDB3-D484-4141-AE0C-42333D2721F6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "643EC76D-2836-48E6-81DA-78C4883C33CA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*", + "matchCriteriaId": "477F6529-4CE1-44FC-B6EE-D24D44C71AE7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "288F637F-22F8-47CF-B67F-C798A730A1BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D0996EA3-1C92-4933-BE34-9CF625E59FE7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6688aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AFBD264F-F24A-4CDD-B316-9514A61B91E7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6688aq:-:*:*:*:*:*:*:*", + "matchCriteriaId": "94CC5BC4-011D-4D2B-8891-97FBF61FD783" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0E23922D-C37F-476F-A623-4C1458A9156F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "646B241B-2971-4929-9FB6-7A4CBF801CBB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm8550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5654FFB5-9A89-4399-AFAB-0A26726DEC81" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9274_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9129A244-AB8C-4AA4-BFBB-37F84D66BD3E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9274:-:*:*:*:*:*:*:*", + "matchCriteriaId": "41F243A1-3C0B-4780-95BF-69A4E1A91F18" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs7230_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B92C311A-306B-43C9-ACBA-B1B390927C6A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs7230:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F68F9B33-6BA5-46E1-A370-547CDA626985" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs8155_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "487E7EA3-CE9C-4DB9-97D9-A74406C8BC9B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs8155:-:*:*:*:*:*:*:*", + "matchCriteriaId": "644A4FF4-1494-480B-BDBA-22CC13C4E8EF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFF23DDB-98A0-4343-ADD3-5AB9C2383E7E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5ACB8AFB-5B91-4AA1-BA3A-1AF0B3503080" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qmp1000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5298473D-8B34-42E6-BC32-69A3800972B4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qmp1000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A1CF44E-FFC2-4DCB-8DC2-46422D912448" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "97BB1EB7-D194-4FE2-B4F6-A7A52F344DDE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qrb5165n:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA2C90E7-0F3A-43BB-ABF7-63CEA7A85ADA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc5_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F357160-9EF0-4150-893B-746289C071AD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc5_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D3429F7D-C5C7-488E-8E32-518838C51621" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:robotics_rb5_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FCA73E75-F339-49BA-B1F6-619E4630DE92" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:robotics_rb5_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5DA6E940-1059-4EA2-8225-0F754FE9F50F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa4150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0DC99C0C-8AE3-4918-B91D-2C26990FE931" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa4150p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A558A868-1B67-48D2-8A94-FDEA7126FAE7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa4155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8D28764-EF4F-4FB3-B936-B42397450EFD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa4155p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7964A762-467B-47D7-865F-30D48A0AE47C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C66671C1-AE1A-44BE-9DB2-0B09FF4417DB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "74AA3929-3F80-4D54-B13A-9B070D5C03BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "054F77D6-FC66-4151-9005-DC7ECDB5C722" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8ED3F589-16D9-46A7-A539-C9862473EE0D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C40544E-B040-491C-8DF3-50225E70B50C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6155:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2DAC85C-CDC9-4784-A69A-147A2CE8A8B2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8DC40C14-3B2D-4E00-9E0F-86E6BDBF2D81" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0514D433-162C-4680-8912-721D19BE6201" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A71D74B0-0963-49FD-8E97-148C8993B263" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8145p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "910CBFA4-50F7-4C7A-B9B9-B88C8A919827" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69C1B02F-8D2D-42E7-B70D-41F4D9844FD1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FEACAA9-C061-4713-9A54-37D8BFC0B00B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F33EB594-B0D3-42F2-B1CA-B0E6C9D82C6B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*", + "matchCriteriaId": "50EF47E5-2875-412F-815D-44804BB3A739" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C8648B38-2597-401A-8F53-D582FA911569" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A01CD59B-8F21-4CD6-8A1A-7B37547A8715" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51BC0A66-493B-43BE-B51F-640BDF2FF32E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8DA4D12-7ABF-4A04-B44E-E1D68C8E58AB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sc8380xp_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "14E3FE58-7F1C-4F5C-B62D-0CF124E14AB2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sc8380xp:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFCB0BBA-3F81-4FCA-B3DE-190C46DA50DB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8475_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "73CB0B0B-8448-4961-85A3-BC32A8567A21" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8475:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E626A19A-DBE3-4DE9-90DA-FA3F883FF3CF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8509F3A3-A1CA-466B-9031-4146C36B9AF8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sg8275p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B1813AB7-44F5-476B-9533-536F5B2F26BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm6650_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3BB505DE-5B4A-4CFA-BA99-1307DBF96A43" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm6650:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39296E3C-4E0F-4B90-A3C0-CA9C9F74CBB6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7635_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "094197AC-0D25-480F-B797-06AC9842CD5C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7635:-:*:*:*:*:*:*:*", + "matchCriteriaId": "40AC736A-FEB8-49B3-8500-DB3339906C77" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7675_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "012C20A8-3F48-48DD-9A77-65C9CB1F6C30" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7675:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE992A86-36BC-40E3-8E96-6542560BE8EC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7675p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B46F132-4049-40D0-8351-C1C6FD2B47A0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7675p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1846514C-1F95-4568-98DE-C57214401841" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4CDD6A2-5A3C-4572-8CE1-2F102333BB79" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8550p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "699E5D17-6144-4F0A-8D52-1E8C83990E52" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8635_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "65865EE9-59C0-498F-A4C5-EC00D4642603" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8635:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE02AB51-6FB6-4727-999B-A7466CEDC534" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8635p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88F63D90-4BFC-4EFA-8B74-7A5027A7052D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8635p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "20EB529B-6B9F-464F-A98B-A8ABE0F01ADB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8650q_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CAA8D9D-0238-4223-8F7B-134ECBB6FA05" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8650q:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8A722B8-E1E4-43B4-8882-591CE8C5C166" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8735_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "167C1CC1-03F8-49B3-B460-FCA38644DA06" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8735:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D2E820B-1273-4E82-9D45-A4159AF3878C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8750_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "84641A8E-A93C-48C1-86AC-193951BA4D78" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8750:-:*:*:*:*:*:*:*", + "matchCriteriaId": "74169A4C-0247-4719-887E-BBFB36B04F07" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8750p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D8ABDBF-BABC-4219-8A18-BDFC8C826B1F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8750p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "685D81D0-7E95-4DBA-A05B-7C708A5DFDF0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB8FA32F-4690-4C5B-8968-474DA32FD0A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59BD8BEA-725A-4158-84BE-4AFD476ED03D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "60F5899C-BA8D-4B6B-BC61-F77B1EB64739" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_2_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D39AD7CE-A017-4D74-A348-9E4B08363799" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_3_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FAB6D60-1C03-4F85-B874-FF169402ED09" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_3_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C89A8D93-46DA-4547-A9F1-076FC0D5119D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_ar1_gen_1_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "53E5BBDA-C07D-42E2-9A34-EC1F6454CAA4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_ar1_gen_1_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0BB2408F-C768-4DD2-B834-B62E188D6CC2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5C1AB7D4-FB11-4020-A4A0-8F40D98C07F1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_ar2_gen_1_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB6053F0-5E34-458A-B084-078E4D4F4021" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ssg2115p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A146E52D-4AFC-47B4-920F-DAC76077DF25" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ssg2115p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2BA4BA00-C8D1-4DAC-8030-CB5EEC7D4591" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ssg2125p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA41907C-1CDE-42F3-B21D-5D53B2F06AF7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ssg2125p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EDC270A7-205C-41EB-A2E5-2A381A16BFBB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr1230p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE3236D6-0D01-4D05-B580-8888B99BAA5D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr1230p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E1753FC-F3CD-4B50-886D-8E16D9301A84" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD6444F6-A477-4B4C-8A09-C22C47CCE45B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2230p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F3E20681-4FC4-46E2-AF77-BCF03BC8E77E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2250p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "68A93ED1-F509-439E-AE7B-F0EC87AE759F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2250p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB5E2A98-EDD0-4298-911D-EC7527D5A424" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2330p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "568C5B08-AC42-48D3-8029-A65689EEBE75" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2330p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "56DD2B49-0A36-443C-BECB-4115E271A415" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1295D869-F4DD-4766-B4AA-3513752F43B4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B98784DC-3143-4D38-AD28-DBBDCCAB4272" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34143ABA-7D09-429F-A65C-3A33438BF62C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D56DFE3-5EF1-4B23-BBD5-0203FBF9CCEC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9378_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4CFDBB5B-0A4F-4032-874F-D2A7EF933FB0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9378:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D28A12D6-CC60-4BE9-ADEE-FAB58B05440F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1FA2EB9-416F-4D69-8786-386CC73978AE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "896F1C04-9957-440F-BF01-C3772CC3B3DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A90555EB-47A7-4717-92D5-35B561825F06" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "699056F6-1517-4F25-AE07-4FFCF6923B9F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4C023D2-6FF5-4FFC-B9F2-895979166580" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn6450_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1FAFC9FA-E6EF-44C5-BD50-2824C7711541" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn6450:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6F895CDD-F9BB-45AD-AE60-71F4549114A4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn6650_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93398092-AF7C-4F04-874C-7E5B4CF7AB00" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn6650:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7D242084-5844-4E43-8D7F-D2F8E3521F0C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn6755_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2BC386D9-3D2B-40FA-A2D9-199BB138F46A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn6755:-:*:*:*:*:*:*:*", + "matchCriteriaId": "133FFD9F-FA09-4801-939B-AD1D507BE5FE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn7750_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F0B2800F-B0A7-489E-BD70-B2EAAF45DE7A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn7750:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1AEA0D7B-F3F7-4A6F-B222-192412FEECD3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn7860_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2EB8794F-7998-424E-AF68-E4A4F9310F65" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn7860:-:*:*:*:*:*:*:*", + "matchCriteriaId": "799D69CE-3FCC-4B19-8B00-9AF38111D983" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn7861_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "57608D47-894C-4895-B4B3-4733D55D57DB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn7861:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FFD2C38-1A61-4BED-ABFA-DAE0C4B78620" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn7880_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "63735D33-9F09-4841-9FE0-0D9AB604BECF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn7880:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E826F765-4C2E-4319-BBC4-DEB02AAD783F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn7881_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D765C392-5F38-4E6A-9E88-59629E7A6911" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn7881:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FAE8F4F9-F692-4EC0-A3FE-2CDD681DCBFD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7ACAD26E-B79E-4659-91A5-D301281F7D36" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F0E46DA6-9494-4D92-A4AE-A272AF6ACCCC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA33DE15-C177-43B3-AD50-FF797753D12E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AE1A5841-5BCB-4033-ACB9-23F3FCA65309" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B47BF35-3AA0-4667-842E-19B0FE30BF3C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A071672-9405-4418-9141-35CEADBB65AF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB7CF473-8B25-4851-91F2-1BD693CCDC85" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "91E591F2-8F72-4A5A-9264-2742EB2DABDA" + } + ] + } + ] + } + ], "references": [ { "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2025-bulletin.html", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-549xx/CVE-2024-54961.json b/CVE-2024/CVE-2024-549xx/CVE-2024-54961.json index e6e1cf7bc1d..e0a473a899f 100644 --- a/CVE-2024/CVE-2024-549xx/CVE-2024-54961.json +++ b/CVE-2024/CVE-2024-549xx/CVE-2024-54961.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54961", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-20T18:15:25.593", - "lastModified": "2025-02-20T20:15:46.077", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-18T23:39:55.290", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nagios:nagios_xi:2024:r1.2.2:*:*:*:*:*:*", + "matchCriteriaId": "7FFC081E-728A-4643-A8DF-5CC8E94E7D78" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Sharpe-nl/CVEs/tree/main/CVE-2024-54961", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1403.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1403.json index f763c418cec..2e980a3e705 100644 --- a/CVE-2025/CVE-2025-14xx/CVE-2025-1403.json +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1403.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1403", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-21T17:15:13.437", - "lastModified": "2025-02-21T18:15:20.550", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-18T23:34:56.550", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -81,10 +81,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:qiskit:*:*:*:*:*:*:*:*", + "versionStartIncluding": "0.45.0", + "versionEndIncluding": "1.2.4", + "matchCriteriaId": "5CAEC3E9-9112-46A3-9957-DB282DF3AED1" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7183868", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22973.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22973.json index 2e6bbbeb9ee..13df31952b0 100644 --- a/CVE-2025/CVE-2025-229xx/CVE-2025-22973.json +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22973.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22973", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-20T23:15:12.120", - "lastModified": "2025-02-21T18:15:32.480", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-18T23:38:27.877", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:qibosoft:qibocms_x1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6A2BE41D-097A-4E9E-9862-D70BEF892278" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/202110420106/CVE/blob/master/CVE-2025-22973.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-35xx/CVE-2025-3509.json b/CVE-2025/CVE-2025-35xx/CVE-2025-3509.json index 0f7fc406e69..4ff3ff5e75e 100644 --- a/CVE-2025/CVE-2025-35xx/CVE-2025-3509.json +++ b/CVE-2025/CVE-2025-35xx/CVE-2025-3509.json @@ -2,13 +2,13 @@ "id": "CVE-2025-3509", "sourceIdentifier": "product-cna@github.com", "published": "2025-04-17T23:15:42.260", - "lastModified": "2025-04-21T14:23:45.950", + "lastModified": "2025-06-18T22:15:33.197", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A Remote Code Execution (RCE) vulnerability was identified in GitHub Enterprise Server that allowed attackers to execute arbitrary code by exploiting the pre-receive hook functionality, potentially leading to privilege escalation and system compromise. The vulnerability involves using dynamically allocated ports that become temporarily available, such as during a hot patch upgrade. This means the vulnerability is only exploitable during specific operational conditions, which limits the attack window. Exploitation required either site administrator permissions to enable and configure pre-receive hooks or a user with permissions to modify repositories containing pre-receive hooks where this functionality was already enabled. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.17 and was fixed in versions 3.16.2, 3.15.6, 3.14.11, 3.13.14. This vulnerability was reported via the GitHub Bug Bounty program." + "value": "A Remote Code Execution (RCE) vulnerability was identified in GitHub Enterprise Server that allowed attackers to execute arbitrary code by exploiting the pre-receive hook functionality, potentially leading to privilege escalation and system compromise. The vulnerability involves using dynamically allocated ports that become temporarily available, such as during a hot patch upgrade. This means the vulnerability is only exploitable during specific operational conditions, which limits the attack window. Exploitation required either site administrator permissions to enable and configure pre-receive hooks or a user with permissions to modify repositories containing pre-receive hooks where this functionality was already enabled. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.18 and was fixed in versions 3.17.1, 3.16.4, 3.15.8, 3.14.13, 3.13.16. This vulnerability was reported via the GitHub Bug Bounty program." }, { "lang": "es", @@ -75,19 +75,23 @@ ], "references": [ { - "url": "https://docs.github.com/en/enterprise-server@3.13/admin/release-notes#3.13.14", + "url": "https://docs.github.com/en/enterprise-server@3.13/admin/release-notes#3.13.16", "source": "product-cna@github.com" }, { - "url": "https://docs.github.com/en/enterprise-server@3.14/admin/release-notes#3.14.11", + "url": "https://docs.github.com/en/enterprise-server@3.14/admin/release-notes#3.14.13", "source": "product-cna@github.com" }, { - "url": "https://docs.github.com/en/enterprise-server@3.15/admin/release-notes#3.15.6", + "url": "https://docs.github.com/en/enterprise-server@3.15/admin/release-notes#3.15.8", "source": "product-cna@github.com" }, { - "url": "https://docs.github.com/en/enterprise-server@3.16/admin/release-notes#3.16.2", + "url": "https://docs.github.com/en/enterprise-server@3.16/admin/release-notes#3.16.4", + "source": "product-cna@github.com" + }, + { + "url": "https://docs.github.com/en/enterprise-server@3.17/admin/release-notes#3.17.1", "source": "product-cna@github.com" } ] diff --git a/CVE-2025/CVE-2025-495xx/CVE-2025-49590.json b/CVE-2025/CVE-2025-495xx/CVE-2025-49590.json new file mode 100644 index 00000000000..b10a01e3e90 --- /dev/null +++ b/CVE-2025/CVE-2025-495xx/CVE-2025-49590.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2025-49590", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-06-18T23:15:19.200", + "lastModified": "2025-06-18T23:15:19.200", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "CryptPad is a collaboration suite. Prior to version 2025.3.0, the \"Link Bouncer\" functionality attempts to filter javascript URIs to prevent Cross-Site Scripting (XSS), however this can be bypassed. There is an \"early allow\" code path that happens before the URI's protocol/scheme is checked, which a maliciously crafted URI can follow. This issue has been patched in version 2025.3.0." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 2.9, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "LOW", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-692" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/cryptpad/cryptpad/blob/15c81aa8ccb737a9a1167481f4a699af331364bb/www/bounce/main.js#L64-L95", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/cryptpad/cryptpad/commit/d5e4830ba104a4a442cb23aab5378b8565a95607", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/cryptpad/cryptpad/security/advisories/GHSA-vq9h-x3gr-v8rj", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-495xx/CVE-2025-49591.json b/CVE-2025/CVE-2025-495xx/CVE-2025-49591.json new file mode 100644 index 00000000000..e2161e0e7ab --- /dev/null +++ b/CVE-2025/CVE-2025-495xx/CVE-2025-49591.json @@ -0,0 +1,94 @@ +{ + "id": "CVE-2025-49591", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-06-18T23:15:19.403", + "lastModified": "2025-06-18T23:15:19.403", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "CryptPad is a collaboration suite. Prior to version 2025.3.0, enforcement of Two-Factor Authentication (2FA) in CryptPad can be trivially bypassed, due to weak implementation of access controls. An attacker that compromises a user's credentials can gain access to the victim's account, even if the victim has 2FA set up. This is due to 2FA not being enforced if the path parameter is not 44 characters long, which can be bypassed by simply URL encoding a single character in the path. This issue has been patched in version 2025.3.0." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + }, + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/cryptpad/cryptpad/blob/15c81aa8ccb737a9a1167481f4a699af331364bb/lib/http-worker.js#L356-L364", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/cryptpad/cryptpad/commit/0c5d4bbf5e5206d53470ea86a664fa2b703fb611", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/cryptpad/cryptpad/commit/f624f9d457d36040f57c7598d98a8b9461b79837", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/cryptpad/cryptpad/security/advisories/GHSA-xq5x-wgcm-3p33", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 57afa77b173..abfc1168c5e 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-18T22:00:21.548176+00:00 +2025-06-18T23:55:19.662525+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-06-18T21:12:24.433000+00:00 +2025-06-18T23:39:55.290000+00:00 ``` ### Last Data Feed Release @@ -33,35 +33,29 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -298666 +298668 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `2` -- [CVE-2025-26199](CVE-2025/CVE-2025-261xx/CVE-2025-26199.json) (`2025-06-18T20:15:19.667`) +- [CVE-2025-49590](CVE-2025/CVE-2025-495xx/CVE-2025-49590.json) (`2025-06-18T23:15:19.200`) +- [CVE-2025-49591](CVE-2025/CVE-2025-495xx/CVE-2025-49591.json) (`2025-06-18T23:15:19.403`) ### CVEs modified in the last Commit -Recently modified CVEs: `15` +Recently modified CVEs: `8` -- [CVE-2022-21505](CVE-2022/CVE-2022-215xx/CVE-2022-21505.json) (`2025-06-18T20:42:10.643`) -- [CVE-2024-1874](CVE-2024/CVE-2024-18xx/CVE-2024-1874.json) (`2025-06-18T21:12:24.433`) -- [CVE-2024-21058](CVE-2024/CVE-2024-210xx/CVE-2024-21058.json) (`2025-06-18T20:12:48.893`) -- [CVE-2024-21066](CVE-2024/CVE-2024-210xx/CVE-2024-21066.json) (`2025-06-18T20:13:03.920`) -- [CVE-2024-21095](CVE-2024/CVE-2024-210xx/CVE-2024-21095.json) (`2025-06-18T20:13:12.353`) -- [CVE-2024-21123](CVE-2024/CVE-2024-211xx/CVE-2024-21123.json) (`2025-06-18T20:22:51.080`) -- [CVE-2024-21126](CVE-2024/CVE-2024-211xx/CVE-2024-21126.json) (`2025-06-18T20:23:07.713`) -- [CVE-2024-21133](CVE-2024/CVE-2024-211xx/CVE-2024-21133.json) (`2025-06-18T20:26:31.293`) -- [CVE-2024-21174](CVE-2024/CVE-2024-211xx/CVE-2024-21174.json) (`2025-06-18T20:27:07.690`) -- [CVE-2024-21208](CVE-2024/CVE-2024-212xx/CVE-2024-21208.json) (`2025-06-18T20:27:14.790`) -- [CVE-2024-21210](CVE-2024/CVE-2024-212xx/CVE-2024-21210.json) (`2025-06-18T20:27:23.887`) -- [CVE-2024-2757](CVE-2024/CVE-2024-27xx/CVE-2024-2757.json) (`2025-06-18T21:11:40.787`) -- [CVE-2024-3096](CVE-2024/CVE-2024-30xx/CVE-2024-3096.json) (`2025-06-18T21:10:50.310`) -- [CVE-2025-3901](CVE-2025/CVE-2025-39xx/CVE-2025-3901.json) (`2025-06-18T21:01:42.313`) -- [CVE-2025-6192](CVE-2025/CVE-2025-61xx/CVE-2025-6192.json) (`2025-06-18T20:15:19.890`) +- [CVE-2023-25718](CVE-2023/CVE-2023-257xx/CVE-2023-25718.json) (`2025-06-18T22:15:31.953`) +- [CVE-2023-25719](CVE-2023/CVE-2023-257xx/CVE-2023-25719.json) (`2025-06-18T22:15:32.900`) +- [CVE-2024-45673](CVE-2024/CVE-2024-456xx/CVE-2024-45673.json) (`2025-06-18T23:36:20.167`) +- [CVE-2024-53011](CVE-2024/CVE-2024-530xx/CVE-2024-53011.json) (`2025-06-18T23:27:51.907`) +- [CVE-2024-54961](CVE-2024/CVE-2024-549xx/CVE-2024-54961.json) (`2025-06-18T23:39:55.290`) +- [CVE-2025-1403](CVE-2025/CVE-2025-14xx/CVE-2025-1403.json) (`2025-06-18T23:34:56.550`) +- [CVE-2025-22973](CVE-2025/CVE-2025-229xx/CVE-2025-22973.json) (`2025-06-18T23:38:27.877`) +- [CVE-2025-3509](CVE-2025/CVE-2025-35xx/CVE-2025-3509.json) (`2025-06-18T22:15:33.197`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 0c741891e5a..f2782c97d0b 100644 --- a/_state.csv +++ b/_state.csv @@ -191334,7 +191334,7 @@ CVE-2022-21499,0,0,dc5a0cc9d6ff643c0e342a2bf885d62e76dd299429c26e32065c68ce6261a CVE-2022-21500,0,0,d010502319a7fee7f42ee09fcb58cf300edf4758febf313f5b6709c020dd4fcd,2024-11-21T06:44:50.663000 CVE-2022-21503,0,0,12eb09629f001add44d68bf73e4712070b60afd8a4f021c25887f07bef89eca0,2024-11-21T06:44:50.790000 CVE-2022-21504,0,0,631a6577f7152e8333748d9581f5c978cd32d99bf75c5abb196c5da1248e14fa,2024-11-21T06:44:50.890000 -CVE-2022-21505,0,1,25dad046d9c47269ba05c1b10e0d6623b0cc2c42147534cf7d4e08f8cabc7397,2025-06-18T20:42:10.643000 +CVE-2022-21505,0,0,25dad046d9c47269ba05c1b10e0d6623b0cc2c42147534cf7d4e08f8cabc7397,2025-06-18T20:42:10.643000 CVE-2022-21508,0,0,e2eb6f33718526bb54590b8c6c28a056615cacc6c1a7482ca77f25144c906519,2024-11-21T06:44:50.990000 CVE-2022-21509,0,0,1ee00dc119bbbdc97f4643daf6334effe1ded197f2b4ca9700d80faf547e60b1,2024-11-21T06:44:51.110000 CVE-2022-2151,0,0,dc428bf8d4fba7305831503b816cb2b740b347356a4730407735e1dfb73a0612,2024-11-21T07:00:25.940000 @@ -221427,8 +221427,8 @@ CVE-2023-25714,0,0,30d1b3b8c2658a5d809246d435c81ddf2f9287a1f5b188d50271eb4a0e433 CVE-2023-25715,0,0,6d88ef667b64c52873b9245db5fa7fe78e16f2c79bc517d1f15a2686934c9956,2024-11-21T07:49:59.500000 CVE-2023-25716,0,0,6a68a371fb70c98c3f42445bc57863f0a9fc317dbcca5e2cf2d7a9605735c149,2024-11-21T07:49:59.620000 CVE-2023-25717,0,0,7ab45047ae291b9110620bf824e69b193b7f478cc5e4114d5ea36a12a4b0fe42,2025-03-10T20:48:20.863000 -CVE-2023-25718,0,0,f5451b83d0d2d17afcf3aeff2ebb8c713d359ad1eb925213a0b2737a383e0c42,2024-11-21T07:49:59.913000 -CVE-2023-25719,0,0,83c8d558c82caccb2a34f4938ee5570228195544428405c9ab7edfccdf4354ef,2025-03-21T15:15:40.973000 +CVE-2023-25718,0,1,cc8356e68a532592d775c24c87006dd197f0d5fa235dcf5d5a5430114eb11a09,2025-06-18T22:15:31.953000 +CVE-2023-25719,0,1,fc4f39771edda78244556047b067a46288412298b1ca6924e0ff9d3be74cad0f,2025-06-18T22:15:32.900000 CVE-2023-2572,0,0,ed886a16c7f1007ac7399c56e87342873576f715bc1e7094b3db9028c0821f2a,2025-01-08T17:15:11.603000 CVE-2023-25721,0,0,f81320c364560d2364a1f3ba19d0330f029ea11a50a94d0f9f6b4ead68d21d31,2025-02-19T19:15:13.430000 CVE-2023-25722,0,0,bca76e3911d579e248d877cdd35275de0ae46411c20589fc7ce57e1a3e928a08,2025-02-19T19:15:13.617000 @@ -249907,7 +249907,7 @@ CVE-2024-1870,0,0,9c2008e8e575f8c6fafb368e16ba9660bb3fd8a0b2c1440e7e5b4307c616f0 CVE-2024-1871,0,0,ee81c97983aa7443f5b5c8df7b73a58bc5b442ad6448ba9043e72031ddc435ff,2024-12-23T16:33:20.680000 CVE-2024-1872,0,0,ad000dac8ef2496ce597bea5013bb4d9bc4a26c36c7428589e16338d8f525adf,2024-11-21T08:51:29.627000 CVE-2024-1873,0,0,a265a1d37162e1ced49567600aa7a85cd5a363ca73d2786d74178f5bd173cc9d,2024-11-21T08:51:29.750000 -CVE-2024-1874,0,1,e6d9d264ee04b4dbfc614d65c79f37e98a46bc244185b32b74dca8bc15ad2405,2025-06-18T21:12:24.433000 +CVE-2024-1874,0,0,e6d9d264ee04b4dbfc614d65c79f37e98a46bc244185b32b74dca8bc15ad2405,2025-06-18T21:12:24.433000 CVE-2024-1875,0,0,a140e7b8d80a12ecd3c7b8d3466d943dc91530538d8f539967d80fef820d65e3,2024-12-10T19:56:33.457000 CVE-2024-1876,0,0,f31a8d538766443eced9d211f3d10dcb9b0c2b0c2072586c2628f31f1a105354,2024-12-23T16:33:32.957000 CVE-2024-1877,0,0,e0afe6ce9347a733b2a6b7844e9ec12e8c85bdd05eae60ef863db5db42ae2dd3,2024-12-23T16:32:19.787000 @@ -250937,7 +250937,7 @@ CVE-2024-21054,0,0,0397d46c1fdbcb060e67f675bda3d771437d58824e1eccb01ecce8c07064f CVE-2024-21055,0,0,82efca55d7127666f03c09688f36b67bc6bd22bbb87ecd48ff27b49229cf5b8f,2025-03-18T16:15:20.353000 CVE-2024-21056,0,0,b3cd8883597d5b020b20843f644dd494e35df9dc3ebaf9876d8f8890e4200173,2024-12-06T16:37:56.173000 CVE-2024-21057,0,0,9b1546f99ce05c6b25e65edc22936c9a217f133b8e51ac6ef8f53316bbca1b79,2025-04-09T16:09:09.343000 -CVE-2024-21058,0,1,f9d8aed9c42244b795a5b4abac78499d7be6c296be01947f9e49d5cdd8892738,2025-06-18T20:12:48.893000 +CVE-2024-21058,0,0,f9d8aed9c42244b795a5b4abac78499d7be6c296be01947f9e49d5cdd8892738,2025-06-18T20:12:48.893000 CVE-2024-21059,0,0,9fbc63d46842b408c97b1389d150d37dc323b6a4f510ba86a51e15cbe8aee096,2025-03-13T13:15:39.927000 CVE-2024-2106,0,0,bee09f9c38ccc38266876a20361607c0569f29d68a371a3d5dbc430987bb01a7,2025-01-22T19:48:46.947000 CVE-2024-21060,0,0,98dd4e50f42ac197fab603434cd47e6ff40eec93b787daec9e1fdb4dd3e21339,2025-04-09T16:09:23.223000 @@ -250946,7 +250946,7 @@ CVE-2024-21062,0,0,2fc56c71eb9af73fa42135e326d229dcdd8a094dcb6fb4b40ade110b298be CVE-2024-21063,0,0,8ea583391e0e5c17985043ddd92acbaac6ef25f4c3158e7d79fe6e408b125231,2025-05-08T14:18:51.417000 CVE-2024-21064,0,0,cf11a002d7bf7249bab7b0c48a9391dddd251878179bf9ba37301665565f830b,2025-05-08T14:20:14.803000 CVE-2024-21065,0,0,fa967ce66acc1cbd1cbcb011b72fb0bfc138ec90b348b482bfb9124b5de3e343,2025-05-08T14:20:28.353000 -CVE-2024-21066,0,1,6ca48b08aa92b1bee6d9cd67177e9c48866fb41f396acf6104842b5bf3c9fbbe,2025-06-18T20:13:03.920000 +CVE-2024-21066,0,0,6ca48b08aa92b1bee6d9cd67177e9c48866fb41f396acf6104842b5bf3c9fbbe,2025-06-18T20:13:03.920000 CVE-2024-21067,0,0,7f1fcc0ff46403643cf700f3eadbe24bd409c58d726fb7bdfd377dde9b0db154,2025-05-21T19:43:04.917000 CVE-2024-21068,0,0,22cb123e2b550308d0173e521466dd982631e5a97ed4a6d7bc6a3b636818cf7d,2024-12-06T19:22:57.927000 CVE-2024-21069,0,0,c9f01955133ee2d7d88ba224021b6a44140d5daf435c1f4f00ecf007d265c6fa,2024-12-06T19:04:31.867000 @@ -250978,7 +250978,7 @@ CVE-2024-21091,0,0,d8146129fa7875771ad501c6dfbd4182fc597bbed19746f1d810f34e96d03 CVE-2024-21092,0,0,84c82e95cc521a0259edd3db19d276b452db0b056d2396c76163e6f9e19e898b,2024-12-06T21:35:54.893000 CVE-2024-21093,0,0,a2f7827f8ee9a8cff5b9a924eb1511e5099becabdbc9c0f49da4f8bf1397fefa,2024-12-06T17:03:13.813000 CVE-2024-21094,0,0,f2fec1e39b3ad4962b42ed809a10caea303127efc796185b4384b148ba58c6df,2025-05-21T19:46:21.953000 -CVE-2024-21095,0,1,f8faace75de78eab03ec95b7ce0142035dd0f915e435b56e13ef141902f09c49,2025-06-18T20:13:12.353000 +CVE-2024-21095,0,0,f8faace75de78eab03ec95b7ce0142035dd0f915e435b56e13ef141902f09c49,2025-06-18T20:13:12.353000 CVE-2024-21096,0,0,700328c435fe7e0efc3a46639530e00f4d735944b038cc3f6d4f82ae469718bd,2024-12-06T21:35:01.160000 CVE-2024-21097,0,0,799d135c25dc4257f45e950777010e72c0906c1ff7b9c0c2b0344e2ff488f381,2024-12-06T21:34:11.057000 CVE-2024-21098,0,0,3b9f26852cd073a585052d12c11fb47a6b32adcaba23463f21effa5bf231e77f,2024-12-06T14:35:46.047000 @@ -251009,9 +251009,9 @@ CVE-2024-2112,0,0,4b7d4ddac6afee13ab01bae281f4dd6ec3a8ad71f7bb277f57617bf366b9e6 CVE-2024-21120,0,0,0f82e20c4db1e89de8535c02c74b1932d538ff2a3a5d5abe97b4e5b3f1cf1431,2025-05-21T19:43:15.643000 CVE-2024-21121,0,0,37a1b789c01f499f30b30eb3be861c510899fae815e435da478abb08206c9175,2025-03-27T15:15:49.563000 CVE-2024-21122,0,0,beefde489c552a222c10aa28ac8ff750c05edce0c1ad79373d4f0e97f1eb3f8d,2025-06-17T19:31:52.047000 -CVE-2024-21123,0,1,16597c20369ca9ed657290bb281fb640b525064c169c2858cae670e3ab51babb,2025-06-18T20:22:51.080000 +CVE-2024-21123,0,0,16597c20369ca9ed657290bb281fb640b525064c169c2858cae670e3ab51babb,2025-06-18T20:22:51.080000 CVE-2024-21125,0,0,00117d0141d6804dde4b4597f14611c8e7044a0c5819feb38f51feecde07623b,2024-11-21T08:53:49.880000 -CVE-2024-21126,0,1,d2f61baaf6ea66545e64fd4c97f78b3bd4e5e2f073f5ee5d2bcb91bdeb7e0e73,2025-06-18T20:23:07.713000 +CVE-2024-21126,0,0,d2f61baaf6ea66545e64fd4c97f78b3bd4e5e2f073f5ee5d2bcb91bdeb7e0e73,2025-06-18T20:23:07.713000 CVE-2024-21127,0,0,0f4bceb0018f80a2fe91cff50d1d0b53ac75e7654d63543477d039d14cace682,2025-04-10T18:54:43.840000 CVE-2024-21128,0,0,c44ce21bcf71e11ff9e2e9ab22f575108d4bc20f3947f33ecd47d655ee6afb21,2024-12-10T14:43:26.337000 CVE-2024-21129,0,0,2c8e0b13d98477ae37358534ebfbe5e2257d99408b758e7e4434d44c0dbb5bfb,2024-11-21T08:53:50.347000 @@ -251019,7 +251019,7 @@ CVE-2024-2113,0,0,41b0f96e76e93eed3cae2f2e72bba8a01135ef4b0a02f5dee08a2bd1781b5f CVE-2024-21130,0,0,953b3d66855b9e5113ec1f14b66a5b04303ba835a7af2d886fefa4b0416c4d6c,2025-03-26T15:15:48.783000 CVE-2024-21131,0,0,82ebda074f809a1a68064798e632b773ed1eb2575acf313c66d554be3faf5e3b,2024-12-05T22:02:52.553000 CVE-2024-21132,0,0,987a799b19a7e7bd596caec84e5104553b08a672468aa5d0c46b6c2bb08b9bea,2025-03-17T22:15:12.270000 -CVE-2024-21133,0,1,26f344468341ae4e6e9d1f8d1e29f0cce0f30624df83947dfff83171e0526219,2025-06-18T20:26:31.293000 +CVE-2024-21133,0,0,26f344468341ae4e6e9d1f8d1e29f0cce0f30624df83947dfff83171e0526219,2025-06-18T20:26:31.293000 CVE-2024-21134,0,0,dcbe5d92aa08c7bd192bd36994d01957334494a6a59b5ce1ce1359b992bacaff,2024-11-21T08:53:50.957000 CVE-2024-21135,0,0,c86e5c804add53084e4d35d6a12d09babfc79d7ef6ed692753959bd30b31e714,2024-11-21T08:53:51.100000 CVE-2024-21136,0,0,11d437b1fbb0adc0c217dc80c92b1eae0e20ed11722e054ee44786c83d8b64f1,2025-06-09T17:54:53.190000 @@ -251063,7 +251063,7 @@ CVE-2024-21170,0,0,36d3ccb648c24bcb8a4316c968fb01d1c7477a513721d71af5995cdf5d332 CVE-2024-21171,0,0,f7c7b2464793169be70ef08a9aa229f27d53c57d43a779f7aa962f7235c73d5c,2025-03-27T16:15:22.210000 CVE-2024-21172,0,0,ff5d0eda037e06e7f32897640b26e512b78468cde367840023f94016b9cff32b,2024-10-21T12:59:49.070000 CVE-2024-21173,0,0,0e8a609d96525ffbea3631f0bfa4081c3954cff8d4927f3ecefeaa4c7494a3a7,2025-03-24T20:15:17.280000 -CVE-2024-21174,0,1,3e824f8be7fbacdb6ad39fa27c7327b6cf9083565071dc5c031b5bf2ac05794e,2025-06-18T20:27:07.690000 +CVE-2024-21174,0,0,3e824f8be7fbacdb6ad39fa27c7327b6cf9083565071dc5c031b5bf2ac05794e,2025-06-18T20:27:07.690000 CVE-2024-21175,0,0,c88236c1bb2930477f7c69ea0f3b2f2d73e2162e94ce3c69441679c96586d096,2025-06-09T17:50:49.923000 CVE-2024-21176,0,0,e67fa4210999e42aabb0f353f1923af498dc2157a69a86cdbcbbc16b079f6b49,2024-11-21T08:53:55.950000 CVE-2024-21177,0,0,dffabc8739c0fef0114dd555257cc1d4e736eb0114a8e95a1d9555698fb73a8c,2025-03-13T14:15:20.593000 @@ -251097,10 +251097,10 @@ CVE-2024-21204,0,0,6e02d97c4802b20054f3c4f36b4262d4579d51c4dad414b899b7f47595986 CVE-2024-21205,0,0,e1826db3e18237be6dde03d7d4cc539b869d1360faa558be8561f743abd88176,2025-03-13T14:15:21.243000 CVE-2024-21206,0,0,7d6fd60e59ab0e1ece28b89bacd97a84c9e812aa28c26045ff093c2038d4d1a7,2024-10-31T13:35:04.520000 CVE-2024-21207,0,0,8943a78a85322e8f74ca9bb8757d973fc6062abdbe462a9e329a926ce38d871e,2025-03-13T14:15:21.393000 -CVE-2024-21208,0,1,96a0dfd3930260cb1ded2610d57bb643c42ac376ae3a0ee18e6cec14bc49e47c,2025-06-18T20:27:14.790000 +CVE-2024-21208,0,0,96a0dfd3930260cb1ded2610d57bb643c42ac376ae3a0ee18e6cec14bc49e47c,2025-06-18T20:27:14.790000 CVE-2024-21209,0,0,9f9125b2f59e97ee383b40b643ff87dbadc96541830a9dd6f1bb5908b73c9c56,2025-03-13T16:15:15.907000 CVE-2024-2121,0,0,3d94a919f7b0e6acce8710d588d2d02731d0a12998c900439ecd63fdd9aed2b0,2025-03-12T14:02:28.150000 -CVE-2024-21210,0,1,12ea0cb4de6f8d045569b7426fc081fa7dc08abb9a6dd56055d0a15863caf6bf,2025-06-18T20:27:23.887000 +CVE-2024-21210,0,0,12ea0cb4de6f8d045569b7426fc081fa7dc08abb9a6dd56055d0a15863caf6bf,2025-06-18T20:27:23.887000 CVE-2024-21211,0,0,7450553d876aab66d2c08552c24c3becd617abf0c62029e958ea979a55383cf9,2024-11-21T08:53:58.940000 CVE-2024-21212,0,0,d29d92389c9d77a58ca0325aad746e74f12422d262f6905127c7a317e4c0e657,2024-11-21T08:53:59.073000 CVE-2024-21213,0,0,a5796964efbcb86d96380462312ebbda60370c2a95ab19841d78a3b88db3f103,2024-10-16T20:43:51.853000 @@ -256105,7 +256105,7 @@ CVE-2024-27565,0,0,a3b38ad3cbec062b28bbaa8b020ffb17a64d4ab23e3a1af71e103df51fce5 CVE-2024-27567,0,0,657d583e4bf717cbd446c99d9464cf362560078109f21bcf791ee78fc86cd7d8,2025-04-30T11:24:35.913000 CVE-2024-27568,0,0,63eaff0d823d4aa90bd90229f4b7910e21410a2b51ca2379a4f3a541dfc25fb9,2025-04-30T11:25:24.113000 CVE-2024-27569,0,0,fdaf19b4684f0f321f2de3c1f992482f70a557e984ccc2a3178e60f53059d59a,2025-04-30T11:25:47.437000 -CVE-2024-2757,0,1,e31711cdb5727530131a2190c93943326092454b047b9ff5bc315f67a17bf66b,2025-06-18T21:11:40.787000 +CVE-2024-2757,0,0,e31711cdb5727530131a2190c93943326092454b047b9ff5bc315f67a17bf66b,2025-06-18T21:11:40.787000 CVE-2024-27570,0,0,72f871072cefa14795fcbd8ed71fa06ea099793a5f0662fed017971896a4507b,2025-04-30T12:25:03.213000 CVE-2024-27571,0,0,39e1e124c341cd4168ecf30639dd3480a51a059e81cfe3db5f24cbe80da90c31,2025-04-30T11:26:03.620000 CVE-2024-27572,0,0,3a11639b43d227027e00f6fc3f89aff940a03f6cf64d2cfc8ceb3a3dd996a32c,2025-04-30T11:26:49.620000 @@ -258599,7 +258599,7 @@ CVE-2024-30950,0,0,ece6dda16745c005f468a231df1243654886ab826b9231af9d99841e06c6e CVE-2024-30951,0,0,8816fa288dcd423eecbfbd1d91bd3dcea3b0699ff8ede203d26791740f8fb504,2025-06-10T15:37:30.170000 CVE-2024-30952,0,0,29254c769977b2a21104b7bc3b0a8b336663d1d5367ab8c3beaf574fad73c358,2025-03-21T21:15:35.300000 CVE-2024-30953,0,0,4a7e5400b8e5906b881b330f0b9fbeb133d6bed4fdcdd7823e19f9c53d690e4e,2024-11-21T09:12:38.263000 -CVE-2024-3096,0,1,6495a965ea8ad48523c31ec0c4e714f66abf81aac3e61ff2d5561f481a278134,2025-06-18T21:10:50.310000 +CVE-2024-3096,0,0,6495a965ea8ad48523c31ec0c4e714f66abf81aac3e61ff2d5561f481a278134,2025-06-18T21:10:50.310000 CVE-2024-30961,0,0,4221b589f508fe85a62a1249a5989843b3524e92e94cb70b49e4fc5b77a8008c,2024-12-18T17:18:39.090000 CVE-2024-30962,0,0,838f4eabd8279fa5458ee1cdf30504168223102a09ffc0612d19ab09174233b7,2025-01-09T17:15:12.600000 CVE-2024-30963,0,0,0a75db7f7140274e974f16bb11e9295573007a72d0cf023f502e16f4d5e423fc,2024-12-06T20:15:24.757000 @@ -270108,7 +270108,7 @@ CVE-2024-45663,0,0,f5982f696eb561ee89ceacd8a652ce2095dd2ab2ec4564026ad75a7cdf0b6 CVE-2024-4567,0,0,f9422c43c79efa82ea99c9dec60f6662a26312cd8fd4cf90d580aef590f63be3,2025-03-07T12:37:30.023000 CVE-2024-45670,0,0,884f280837c803b089861d2cd0800b5b952f4567c75753b35001e2a46ace7ee6,2024-11-16T00:24:57.203000 CVE-2024-45672,0,0,1f284c4606417b08ac2cd87243460783df32e665537ee9aa04c2649281078873,2025-01-23T18:15:30.057000 -CVE-2024-45673,0,0,e9142b96a11c2da6e8935b8ba85a49a6d6d905f4935db71884bc83f6e6ed47da,2025-02-21T18:15:18.163000 +CVE-2024-45673,0,1,29f2d7c32b4c17ca5b5341d16e6030d5c7734db3da16c157ef02bea198990643,2025-06-18T23:36:20.167000 CVE-2024-45674,0,0,5a8f07a024d33c4f56bbf8876244f6e043fca60be2177c862fb1271be54ef76b,2025-02-22T00:15:18.410000 CVE-2024-45676,0,0,eb22d41374a33aad487840972b05f99b6866c07ad3faeb5bebf20d811966d571,2024-12-11T03:21:10.387000 CVE-2024-45678,0,0,c75108ce7d77ba88a074d8ae6e0835493f724a0bc9c0b841e9bb922f4030ac54,2025-03-17T18:15:18.033000 @@ -275504,7 +275504,7 @@ CVE-2024-53007,0,0,7ba22a6b4032cf25f35c1ef00a1f90b930f980bf5515302c33e7724c5430a CVE-2024-53008,0,0,36a5b7477386f9a2d6dcbfd20d0c70ef83d1d8823020ec6fd4bce6966412829a,2024-11-28T03:15:16.363000 CVE-2024-5301,0,0,9944435231e4232deb9644b6756c62dd37aded32278d6910acfd86a9fca6bba1,2024-11-21T09:47:23.327000 CVE-2024-53010,0,0,e92ea489ea86ddb06142add3a7b47a2b4c77fd3f05e7b1a7bf67e9e564744128,2025-06-04T14:54:33.783000 -CVE-2024-53011,0,0,8885d6820d9fa99166d778d1ff2cdc4789fa799da837f9b38c8db6ecefd7561a,2025-03-03T13:15:10.853000 +CVE-2024-53011,0,1,9f543daf6d1032b8c529ba0691f6774574470a7477d429016cd467649e59ce57,2025-06-18T23:27:51.907000 CVE-2024-53012,0,0,950d19974b52359043aeababc59a313e37e644d350cda3a38725dd1bbdedcdb2,2025-03-06T17:11:00.953000 CVE-2024-53013,0,0,8d210c05dd1b64c6c47cfd00c65a0b73f17272a696913a123b948752a0ecd543,2025-06-04T14:54:33.783000 CVE-2024-53014,0,0,f46cf9621d7ec0ec27b269342393212a2ff98a2d1e4dee51da1f5926fb7a1566,2025-03-06T17:53:56.627000 @@ -276908,7 +276908,7 @@ CVE-2024-54958,0,0,05aa071d04d451a63fdeb28f8fd1c549b9935b77ac20404b5acdb6c9e76ec CVE-2024-54959,0,0,d1f45eb8b3595354ce21bb15fb93c0707cc7f656ec9206940bec23d402effbf4,2025-02-21T22:15:12.593000 CVE-2024-5496,0,0,9136fd74dd5c910c46896c769e58528b87587fcd9bbfc0ee678598fdc16fe0a5,2024-12-26T16:43:17.607000 CVE-2024-54960,0,0,8d367a9174beb59a3f0e906c9cbe8173c7e94403da4b6d1b3ef81ffe768eea4c,2025-02-20T20:15:45.927000 -CVE-2024-54961,0,0,4a9acc3a4139a36603ef245e373d97b54c97ac609675827c1c86e6a6b31cc330,2025-02-20T20:15:46.077000 +CVE-2024-54961,0,1,d01efa3a725b7b071feaa9038a3d2e643299d5c9a69e4d407f43d6af709bc320,2025-06-18T23:39:55.290000 CVE-2024-5497,0,0,3a56eddb971efbd0b60114afefb35325ddcc2425bb5133ac9d5e88b22eba20b7,2024-12-26T16:43:33.383000 CVE-2024-5498,0,0,9ecbba4511623233a33c3c81181005b0976c38a133da4d6811e96531fd97f158,2024-12-26T16:43:44.433000 CVE-2024-54982,0,0,f9ebf7280811fe14b802aa42d21c7712849d65d0c4fab1838b9c1493b6720970,2025-01-16T21:15:16.320000 @@ -283840,7 +283840,7 @@ CVE-2025-1399,0,0,e8485dd7af68ba8f2d01d51196b9d6a2f2dcf208ff563be9860baa305f6daa CVE-2025-1400,0,0,9f46a0258b2b238aeafb292dde4996586d32ba094d532a39f75891a9cb5fcf1e,2025-05-07T14:13:20.483000 CVE-2025-1401,0,0,133011ee6945168c3da00a99f9ab3febf4bfdf6bf9088c02ff1a91a5995f2e5b,2025-04-29T14:33:03.920000 CVE-2025-1402,0,0,c23c451cfa1d570fb16b3d38ae224aa085b42cdb084d4b1dbd67b0732fd42aba,2025-02-25T04:04:59.860000 -CVE-2025-1403,0,0,3ac2f8777209bcece27742649d8aad5302ca64fd9d65a9c5c98d12690c81a351,2025-02-21T18:15:20.550000 +CVE-2025-1403,0,1,c40087b1d9b18cf6d2fd48f22d1a8ca09df0153a80f3a47bf1e1d9b76fc33bdc,2025-06-18T23:34:56.550000 CVE-2025-1404,0,0,f39be30144b0a5fe80b4b94433169bbe79b568debe0e45a11fa0a8302ed0e64e,2025-03-01T12:15:34.310000 CVE-2025-1405,0,0,9d1939e7603fe8cd2a4a6b659e6149cd03308d08f69102d0905681145b4d879a,2025-03-06T17:57:54.597000 CVE-2025-1406,0,0,6fbc92715581c083383884df65716e311e7920e9986e87816bf21c4af15408ec,2025-02-25T03:38:24.303000 @@ -286560,7 +286560,7 @@ CVE-2025-22962,0,0,773f9192cf586f9a26d3c9055927917c829f6abfc86fb569ec71975a3edac CVE-2025-22963,0,0,12477de813cda7364e5796cbdb911aad8e18d4387dfeeba96b71ade7cc11ba78,2025-01-13T16:15:19.367000 CVE-2025-22964,0,0,6f4095b29312f46a36413a75c5449d4448cc7574209011a37c7cdb11e5f0802a,2025-02-03T19:15:14.207000 CVE-2025-22968,0,0,d0a75ffad23d4bf4fd1a2a7bd701b07084101823bc6e94fd7915fe64c67cfcd2,2025-05-21T16:21:44.280000 -CVE-2025-22973,0,0,2458bf21a2e06e5f72ca15e03b55d9b2d1daa586255c9db66b49755cb1921616,2025-02-21T18:15:32.480000 +CVE-2025-22973,0,1,ac6664ff93ee8bd28667fc4c4cb52a67fbb351c8a7bd7808b2174e7353b88f37,2025-06-18T23:38:27.877000 CVE-2025-22974,0,0,4185e79accf61de6fccd04dc583797f701c7a7868c89a08c56fe419709f832c0,2025-03-25T16:36:17.127000 CVE-2025-22976,0,0,34e44a1193299f2815c5773a405812b482572222a2b2eca4f8d55245112e8b61,2025-02-03T19:15:14.397000 CVE-2025-22978,0,0,a869979eb8846d055e51d4b0332046ec3bb48e7e906c85c4b44b4a923b3dfc63,2025-05-13T19:34:04.030000 @@ -288941,7 +288941,7 @@ CVE-2025-2618,0,0,63bd02cbfd5ba0e288b129e7bd983bd6ca33d6f95b39da0226dd70e9f09669 CVE-2025-26182,0,0,50bc93eea6be4a4f051a5cba8257a428d894f0c81b2a5095709deaa26b1aeef7,2025-03-05T19:15:39.023000 CVE-2025-2619,0,0,18af3aafa8c664c7de1b66b8583c98852f6acb6ad9851e1359fc3f2aaedd13b6,2025-03-26T18:46:06.633000 CVE-2025-26198,0,0,01510eb98589608a0060f55122186277493d1f7f082e9fbcd9e63ad38b2b88a0,2025-06-18T19:15:21.480000 -CVE-2025-26199,1,1,a7b12b082aab88f2d053389e40879fb84b19bb0d7a3a94869f639a62d6da4311,2025-06-18T20:15:19.667000 +CVE-2025-26199,0,0,a7b12b082aab88f2d053389e40879fb84b19bb0d7a3a94869f639a62d6da4311,2025-06-18T20:15:19.667000 CVE-2025-2620,0,0,f0e9af33caa755b383d285c4664095f43a558d2bbf2123041c5036dbcc8a885d,2025-03-26T18:44:24.017000 CVE-2025-26200,0,0,0247c7389855ce19670d2699ca70da06308bd521521dfb2744deca65ae3bf002,2025-05-01T16:52:41.387000 CVE-2025-26201,0,0,19cc0d8c975fa49352fb9ad1f8db6737d71edae986faba1d37ba48d4a441cec4,2025-02-24T18:15:21.047000 @@ -293696,7 +293696,7 @@ CVE-2025-3503,0,0,8d73ed34ec38f7a3fa46caf6863bc942845955658d4c73ee2f17e6ea13b905 CVE-2025-35036,0,0,8999fc2e6f0f347716ac95ecda1fad4f0e119637eb3d3b6b7486b65b8a53ad62,2025-06-04T14:54:33.783000 CVE-2025-3504,0,0,aa0bdb842e6d15cc15443745349224911fa493d95241cc6b8918b52272013f3a,2025-05-07T16:30:38.630000 CVE-2025-3506,0,0,2cb7dd6bbf56ec7a1271ba0855665acb3addde320f586d229e2ed1fc18ebe38d,2025-05-08T14:39:09.683000 -CVE-2025-3509,0,0,96ce11e8415b6fa7a6d814b563a660b77be726c43a7ecd1b450b2b36646bd53b,2025-04-21T14:23:45.950000 +CVE-2025-3509,0,1,59dfeef049b50d7f8ac0a0fdc9ad111deee128bea1190de29b989508fce45039,2025-06-18T22:15:33.197000 CVE-2025-3510,0,0,1b8ed8f812be63691dac933113d2a261e9d649bd0a63b491c4d9db6c3ce2c4a2,2025-05-06T15:19:30.527000 CVE-2025-3511,0,0,2581a75036be8d737bc9c5afcbd1a9fd25ea23392ab1ff727e244646bbc80fb2,2025-04-29T13:52:28.490000 CVE-2025-3512,0,0,20d5b7a0c651482d59ceef752919a6e419c7dc684bf79b235343ded68357dd77,2025-04-25T18:15:26.103000 @@ -294422,7 +294422,7 @@ CVE-2025-3897,0,0,a76833041004e7ae266165bf906a6eb79929fb700817c1b5afa0458a2a32ab CVE-2025-3898,0,0,6e4d143cf0a8346c1767f46993858f17e9d4ddb90e1f27684ddc007393c13d4c,2025-06-12T16:06:39.330000 CVE-2025-3899,0,0,df27694b26bec62e45e74f68b1546496900a299df13c55b149fdee0096a160e8,2025-06-12T16:06:39.330000 CVE-2025-3900,0,0,3cb866cc727a35600d2bfe9cf8d74ba6322ada476d2fd4be38ea4104d18a901f,2025-04-29T13:52:47.470000 -CVE-2025-3901,0,1,a57b57a1eca5459c414a5a42a575412a82bea89996f8cc32e5dde2036386e35e,2025-06-18T21:01:42.313000 +CVE-2025-3901,0,0,a57b57a1eca5459c414a5a42a575412a82bea89996f8cc32e5dde2036386e35e,2025-06-18T21:01:42.313000 CVE-2025-3902,0,0,132868ec40544d4688d185f811f121d81766bcd28b74a08868a655359eaf079a,2025-06-17T00:54:14.607000 CVE-2025-3903,0,0,6fd629d73b6d4872a7ffae56d6c3c0b7253c2c832af05b126210d15454d1d4cf,2025-04-29T13:52:47.470000 CVE-2025-3904,0,0,a15d72d0f1a0535bebf9df4e01b6cfc45c014de0879ce9d249803945f26fce3b,2025-04-29T13:52:47.470000 @@ -297731,6 +297731,8 @@ CVE-2025-49585,0,0,5bf4c40d67475101b94bdc46e2d5692603da18c9e7df40708e6ea162e9f61 CVE-2025-49586,0,0,2c3a3ffb465e48b26eb6217846164f4f9a6ce07e373f9efa6cf1228016e4468b,2025-06-16T12:32:18.840000 CVE-2025-49587,0,0,de5086ac381fd168ddf890ff4b6777f5711fd665730c37d4ee199139f966ae7d,2025-06-16T12:32:18.840000 CVE-2025-49589,0,0,4de9f02dd34b97b034101bec18a9814c3229a0f8edc0cf289468099913dab0e8,2025-06-16T12:32:18.840000 +CVE-2025-49590,1,1,d02c6f68b2408b9164502691436e2ff7dad8a8a8a34be335d4ee052b1ca56b13,2025-06-18T23:15:19.200000 +CVE-2025-49591,1,1,28f6d3018b9734805a1499f3feb0c242fc3749eb3d800735b2df7e9e13d4e56e,2025-06-18T23:15:19.403000 CVE-2025-49593,0,0,6d7381d4ff0f4b81807be7ac3e78832aa1c2958239dda39de56e3e5b443b96da,2025-06-18T13:46:52.973000 CVE-2025-49596,0,0,914f35572c3497727ef5bfdff2cd9e17d27812703e06d7a6c3496156238c7e41,2025-06-16T12:32:18.840000 CVE-2025-49597,0,0,31430be1a672877ef5712ae64cc63468a339d903aeb2a4d86bb312578783d5a4,2025-06-16T12:32:18.840000 @@ -298660,7 +298662,7 @@ CVE-2025-6173,0,0,23e038850d43236d4621d10e73cf52933a1cb24b90afe909374fc21dec3136 CVE-2025-6177,0,0,f708d677d17f57d89176eeab0f542a182dcbda72661cc0eb13a3bc38d1575fd3,2025-06-17T20:50:23.507000 CVE-2025-6179,0,0,ef3e1c0f37267be4950d18366a27dfd0b0e58f054fc3240188e66ee490b59e39,2025-06-17T20:50:23.507000 CVE-2025-6191,0,0,1d66c022235e6f498029fb06ec2f737313fd70ba7c4bc91aa6fed22ae8797044,2025-06-18T19:15:22.277000 -CVE-2025-6192,0,1,f7c99e4d30f3cfc09a6074cd44c1c587f2c3da2e22ffd0498ee4b10f33f9d044,2025-06-18T20:15:19.890000 +CVE-2025-6192,0,0,f7c99e4d30f3cfc09a6074cd44c1c587f2c3da2e22ffd0498ee4b10f33f9d044,2025-06-18T20:15:19.890000 CVE-2025-6196,0,0,a443edb8dad0601e0cbd1385e8a473b74e22417d0a97c7514592b470b58b5b60,2025-06-17T20:50:23.507000 CVE-2025-6199,0,0,8b74f0ab0d170aa7cc558f1e79481a7093394c0368bbc35b907707db4c26f548,2025-06-17T20:50:23.507000 CVE-2025-6220,0,0,5f7d83b19f9a74deb42015750f7b5335a45a31dba8653fadb3cf8eaf78a671be,2025-06-18T13:47:40.833000