Auto-Update: 2025-06-05T14:00:19.436224+00:00

This commit is contained in:
cad-safe-bot 2025-06-05 14:03:55 +00:00
parent 2a24d3eefe
commit 03553aeb5c
17 changed files with 1103 additions and 57 deletions

View File

@ -0,0 +1,45 @@
{
"id": "CVE-2011-10007",
"sourceIdentifier": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
"published": "2025-06-05T12:15:22.807",
"lastModified": "2025-06-05T12:15:22.807",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "File::Find::Rule through 0.34 for Perl is vulnerable to Arbitrary Code Execution when `grep()` encounters a crafted filename.\n\nA file handle is opened with the 2 argument form of `open()` allowing an attacker controlled filename to provide the MODE parameter to `open()`, turning the filename into a command to be executed.\n\nExample:\n\n$ mkdir /tmp/poc; echo > \"/tmp/poc/|id\"\n$ perl -MFile::Find::Rule \\\n\u00a0 \u00a0 -E 'File::Find::Rule->grep(\"foo\")->in(\"/tmp/poc\")'\nuid=1000(user) gid=1000(user) groups=1000(user),100(users)"
}
],
"metrics": {},
"weaknesses": [
{
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://github.com/richardc/perl-file-find-rule/commit/df58128bcee4c1da78c34d7f3fe1357e575ad56f.patch",
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e"
},
{
"url": "https://github.com/richardc/perl-file-find-rule/pull/4",
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e"
},
{
"url": "https://metacpan.org/release/RCLAMP/File-Find-Rule-0.34/source/lib/File/Find/Rule.pm#L423",
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e"
},
{
"url": "https://rt.cpan.org/Public/Bug/Display.html?id=64504",
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-18760", "id": "CVE-2018-18760",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2018-11-16T18:29:01.443", "published": "2018-11-16T18:29:01.443",
"lastModified": "2024-11-21T03:56:32.680", "lastModified": "2025-06-05T13:20:07.470",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -85,8 +85,8 @@
"cpeMatch": [ "cpeMatch": [
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:o:saltos:rhinos:3.0:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:saltos:rhinos:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "56F2C1C3-3349-424C-A8DF-EC74208263C2" "matchCriteriaId": "B698ADB6-6A56-4E91-BD08-2494058AD21A"
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13230", "id": "CVE-2024-13230",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2025-01-21T11:15:09.267", "published": "2025-01-21T11:15:09.267",
"lastModified": "2025-01-21T11:15:09.267", "lastModified": "2025-06-05T13:57:06.297",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -19,7 +19,7 @@
"cvssMetricV31": [ "cvssMetricV31": [
{ {
"source": "security@wordfence.com", "source": "security@wordfence.com",
"type": "Primary", "type": "Secondary",
"cvssData": { "cvssData": {
"version": "3.1", "version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
@ -51,18 +51,45 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:heateor:super_socializer:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "7.14.1",
"matchCriteriaId": "FCDE0536-6ACD-4854-AAA5-B239DDD35DBF"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://plugins.trac.wordpress.org/browser/super-socializer/trunk/super_socializer.php#L291", "url": "https://plugins.trac.wordpress.org/browser/super-socializer/trunk/super_socializer.php#L291",
"source": "security@wordfence.com" "source": "security@wordfence.com",
"tags": [
"Product"
]
}, },
{ {
"url": "https://plugins.trac.wordpress.org/changeset/3225440/", "url": "https://plugins.trac.wordpress.org/changeset/3225440/",
"source": "security@wordfence.com" "source": "security@wordfence.com",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4d7b2a7f-3c67-4df1-bb15-e7f4f0035953?source=cve", "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4d7b2a7f-3c67-4df1-bb15-e7f4f0035953?source=cve",
"source": "security@wordfence.com" "source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29296", "id": "CVE-2024-29296",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T15:16:05.033", "published": "2024-04-10T15:16:05.033",
"lastModified": "2024-11-21T09:07:55.420", "lastModified": "2025-06-05T13:51:40.593",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,22 +51,53 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:portainer:portainer:2.19.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F2EA041E-ED2F-4E11-B20E-853AF3EEA140"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "http://portainer.com", "url": "http://portainer.com",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Product"
]
}, },
{ {
"url": "https://github.com/ThaySolis/CVE-2024-29296", "url": "https://github.com/ThaySolis/CVE-2024-29296",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}, },
{ {
"url": "http://portainer.com", "url": "http://portainer.com",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
}, },
{ {
"url": "https://github.com/ThaySolis/CVE-2024-29296", "url": "https://github.com/ThaySolis/CVE-2024-29296",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-48069", "id": "CVE-2024-48069",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-11-19T18:15:21.257", "published": "2024-11-19T18:15:21.257",
"lastModified": "2024-11-21T17:15:18.473", "lastModified": "2025-06-05T13:54:55.510",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,14 +51,37 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:weaver:e-cology:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "076EC640-EC76-442F-968D-B46303DA4DF3"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://gist.github.com/CoinIsMoney/5dd555805e8f974630ced8a1df8182f1", "url": "https://gist.github.com/CoinIsMoney/5dd555805e8f974630ced8a1df8182f1",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://github.com/stuven1989/TemporaryGuild/blob/main/guild2.md", "url": "https://github.com/stuven1989/TemporaryGuild/blob/main/guild2.md",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Broken Link"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-48070", "id": "CVE-2024-48070",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-11-19T18:15:21.353", "published": "2024-11-19T18:15:21.353",
"lastModified": "2024-11-21T17:15:18.840", "lastModified": "2025-06-05T13:55:09.977",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,14 +51,37 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:weaver:e-cology:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "076EC640-EC76-442F-968D-B46303DA4DF3"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://gist.github.com/CoinIsMoney/ec863c35dfd05c7deea2afea11bf2446", "url": "https://gist.github.com/CoinIsMoney/ec863c35dfd05c7deea2afea11bf2446",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://github.com/stuven1989/TemporaryGuild/blob/main/files/exp2-eng.pdf", "url": "https://github.com/stuven1989/TemporaryGuild/blob/main/files/exp2-eng.pdf",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Broken Link"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-48072", "id": "CVE-2024-48072",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-11-19T18:15:21.437", "published": "2024-11-19T18:15:21.437",
"lastModified": "2024-11-21T17:15:19.497", "lastModified": "2025-06-05T13:58:30.280",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,14 +51,42 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:weaver:e-cology:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A5D2E594-94E1-4497-9CCE-6F5D1A50B242"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:weaver:e-cology:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "076EC640-EC76-442F-968D-B46303DA4DF3"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://gist.github.com/CoinIsMoney/8ca1f2bf2e0399724c698327f2da8579", "url": "https://gist.github.com/CoinIsMoney/8ca1f2bf2e0399724c698327f2da8579",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://github.com/stuven1989/TemporaryGuild/blob/main/files/exp-eng4.pdf", "url": "https://github.com/stuven1989/TemporaryGuild/blob/main/files/exp-eng4.pdf",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Broken Link"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5407", "id": "CVE-2024-5407",
"sourceIdentifier": "cve-coordination@incibe.es", "sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-05-27T13:15:08.573", "published": "2024-05-27T13:15:08.573",
"lastModified": "2025-06-04T18:17:43.547", "lastModified": "2025-06-05T13:23:10.207",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -80,8 +80,8 @@
"cpeMatch": [ "cpeMatch": [
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:o:saltos:rhinos:3.0-1190:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:saltos:rhinos:3.0:1190:*:*:*:*:*:*",
"matchCriteriaId": "8A7A3EC9-7E69-4B6C-B6CE-0AE828059329" "matchCriteriaId": "0F50878A-595E-4380-B02E-F6854EBA1C38"
} }
] ]
} }

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2025-5341",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-06-05T12:15:23.640",
"lastModified": "2025-06-05T12:15:23.640",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Forminator Forms \u2013 Contact Form, Payment Form & Custom Form Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018id' and 'data-size\u2019 parameters in all versions up to, and including, 1.44.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/forminator/tags/1.44.1/assets/forminator-ui/js/forminator-form.js#L985",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3306475",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/forminator/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/415bfddb-5223-439f-8a08-535f79631ff0?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-5656",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-05T12:15:23.850",
"lastModified": "2025-06-05T12:15:23.850",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in PHPGurukul Complaint Management System 2.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/edit-category.php. The manipulation of the argument description leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/f1rstb100d/myCVE/issues/45",
"source": "cna@vuldb.com"
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.311146",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.311146",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.589967",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-5657",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-05T12:15:24.053",
"lastModified": "2025-06-05T12:15:24.053",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in PHPGurukul Complaint Management System 2.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/manage-users.php. The manipulation of the argument uid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/f1rstb100d/myCVE/issues/46",
"source": "cna@vuldb.com"
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.311147",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.311147",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.589968",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-5658",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-05T13:15:21.717",
"lastModified": "2025-06-05T13:15:21.717",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in PHPGurukul Complaint Management System 2.0. Affected is an unknown function of the file /admin/updatecomplaint.php. The manipulation of the argument Status leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/f1rstb100d/myCVE/issues/47",
"source": "cna@vuldb.com"
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.311148",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.311148",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.589979",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-5659",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-05T13:15:21.907",
"lastModified": "2025-06-05T13:15:21.907",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in PHPGurukul Complaint Management System 2.0. Affected by this vulnerability is an unknown functionality of the file /user/profile.php. The manipulation of the argument pincode leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/f1rstb100d/myCVE/issues/48",
"source": "cna@vuldb.com"
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.311149",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.311149",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.589980",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-5660",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-05T13:15:22.123",
"lastModified": "2025-06-05T13:15:22.123",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in PHPGurukul Complaint Management System 2.0. Affected by this issue is some unknown functionality of the file /user/register-complaint.php. The manipulation of the argument noc leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/f1rstb100d/myCVE/issues/49",
"source": "cna@vuldb.com"
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.311150",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.311150",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.589981",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-5701",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-06-05T12:15:24.233",
"lastModified": "2025-06-05T12:15:24.233",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The HyperComments plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the hc_request_handler function in all versions up to, and including, 1.2.2. This makes it possible for unauthenticated attackers to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/hypercomments/trunk/hypercomments.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/07fd6bee-5b00-4fc1-9f7a-3857fd35c763?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2025-06-05T12:00:21.484429+00:00 2025-06-05T14:00:19.436224+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2025-06-05T11:15:22.313000+00:00 2025-06-05T13:58:30.280000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -33,26 +33,34 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
296564 296572
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `7` Recently added CVEs: `8`
- [CVE-2025-4568](CVE-2025/CVE-2025-45xx/CVE-2025-4568.json) (`2025-06-05T10:15:21.730`) - [CVE-2011-10007](CVE-2011/CVE-2011-100xx/CVE-2011-10007.json) (`2025-06-05T12:15:22.807`)
- [CVE-2025-5650](CVE-2025/CVE-2025-56xx/CVE-2025-5650.json) (`2025-06-05T10:15:23.020`) - [CVE-2025-5341](CVE-2025/CVE-2025-53xx/CVE-2025-5341.json) (`2025-06-05T12:15:23.640`)
- [CVE-2025-5651](CVE-2025/CVE-2025-56xx/CVE-2025-5651.json) (`2025-06-05T10:15:23.270`) - [CVE-2025-5656](CVE-2025/CVE-2025-56xx/CVE-2025-5656.json) (`2025-06-05T12:15:23.850`)
- [CVE-2025-5652](CVE-2025/CVE-2025-56xx/CVE-2025-5652.json) (`2025-06-05T10:15:23.477`) - [CVE-2025-5657](CVE-2025/CVE-2025-56xx/CVE-2025-5657.json) (`2025-06-05T12:15:24.053`)
- [CVE-2025-5653](CVE-2025/CVE-2025-56xx/CVE-2025-5653.json) (`2025-06-05T11:15:21.093`) - [CVE-2025-5658](CVE-2025/CVE-2025-56xx/CVE-2025-5658.json) (`2025-06-05T13:15:21.717`)
- [CVE-2025-5654](CVE-2025/CVE-2025-56xx/CVE-2025-5654.json) (`2025-06-05T11:15:22.133`) - [CVE-2025-5659](CVE-2025/CVE-2025-56xx/CVE-2025-5659.json) (`2025-06-05T13:15:21.907`)
- [CVE-2025-5655](CVE-2025/CVE-2025-56xx/CVE-2025-5655.json) (`2025-06-05T11:15:22.313`) - [CVE-2025-5660](CVE-2025/CVE-2025-56xx/CVE-2025-5660.json) (`2025-06-05T13:15:22.123`)
- [CVE-2025-5701](CVE-2025/CVE-2025-57xx/CVE-2025-5701.json) (`2025-06-05T12:15:24.233`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `0` Recently modified CVEs: `7`
- [CVE-2018-18760](CVE-2018/CVE-2018-187xx/CVE-2018-18760.json) (`2025-06-05T13:20:07.470`)
- [CVE-2024-13230](CVE-2024/CVE-2024-132xx/CVE-2024-13230.json) (`2025-06-05T13:57:06.297`)
- [CVE-2024-29296](CVE-2024/CVE-2024-292xx/CVE-2024-29296.json) (`2025-06-05T13:51:40.593`)
- [CVE-2024-48069](CVE-2024/CVE-2024-480xx/CVE-2024-48069.json) (`2025-06-05T13:54:55.510`)
- [CVE-2024-48070](CVE-2024/CVE-2024-480xx/CVE-2024-48070.json) (`2025-06-05T13:55:09.977`)
- [CVE-2024-48072](CVE-2024/CVE-2024-480xx/CVE-2024-48072.json) (`2025-06-05T13:58:30.280`)
- [CVE-2024-5407](CVE-2024/CVE-2024-54xx/CVE-2024-5407.json) (`2025-06-05T13:23:10.207`)
## Download and Usage ## Download and Usage

View File

@ -47847,6 +47847,7 @@ CVE-2011-10003,0,0,6412423cbcc1d2918013fc1df3cebbbcb3b7584426cce9ea1b9953240234b
CVE-2011-10004,0,0,ec3da51d090457791c200e7f71e78a08f52c2aec5e3aab2bdb5915aa68bee988,2024-11-21T01:25:17.503000 CVE-2011-10004,0,0,ec3da51d090457791c200e7f71e78a08f52c2aec5e3aab2bdb5915aa68bee988,2024-11-21T01:25:17.503000
CVE-2011-10005,0,0,627c8d48b59c9d04a5be3ca9721abb26f33a91af30259ed758e346cc8b2645eb,2024-11-21T01:25:17.667000 CVE-2011-10005,0,0,627c8d48b59c9d04a5be3ca9721abb26f33a91af30259ed758e346cc8b2645eb,2024-11-21T01:25:17.667000
CVE-2011-10006,0,0,dd734ea71adfdfffdfb5628f909ca34f56f35c648e0de9eca7d4ff5e5f1df3de,2025-04-11T12:51:20.457000 CVE-2011-10006,0,0,dd734ea71adfdfffdfb5628f909ca34f56f35c648e0de9eca7d4ff5e5f1df3de,2025-04-11T12:51:20.457000
CVE-2011-10007,1,1,de7ad2c970a65b6db556bbd680e2f135dc3511281dcef0a50ba85a61efffd0be,2025-06-05T12:15:22.807000
CVE-2011-1001,0,0,11839c7b8e84067f9cb7b0fb6341ae801683b41bcddc1fb61a0d4d9d0b6749f0,2025-04-11T00:51:21.963000 CVE-2011-1001,0,0,11839c7b8e84067f9cb7b0fb6341ae801683b41bcddc1fb61a0d4d9d0b6749f0,2025-04-11T00:51:21.963000
CVE-2011-1002,0,0,d33347c721e3b89d36f002b1fe6013c7e41d667ea328068299497443349dd1dd,2025-04-11T00:51:21.963000 CVE-2011-1002,0,0,d33347c721e3b89d36f002b1fe6013c7e41d667ea328068299497443349dd1dd,2025-04-11T00:51:21.963000
CVE-2011-1003,0,0,d7e1f3fe9a186593ca7a3a72b1b932ddf10706cfcc913dbcaa45bff48d214fa4,2025-04-11T00:51:21.963000 CVE-2011-1003,0,0,d7e1f3fe9a186593ca7a3a72b1b932ddf10706cfcc913dbcaa45bff48d214fa4,2025-04-11T00:51:21.963000
@ -118712,7 +118713,7 @@ CVE-2018-18757,0,0,5a8bb1d56ef7b0b0872fa6b739a72868d6611eb63ca184a4e10f1d3f03cc4
CVE-2018-18758,0,0,a4f6dfb075ef70ae9fa3d39ee1f0146a74f4cc36633cff8187ec7abb11fef23b,2024-11-21T03:56:32.350000 CVE-2018-18758,0,0,a4f6dfb075ef70ae9fa3d39ee1f0146a74f4cc36633cff8187ec7abb11fef23b,2024-11-21T03:56:32.350000
CVE-2018-18759,0,0,20ab09000007ea7f7dee0b8cce4fee6b4ac3ae57e712087891d4ab7ec4b69894,2024-11-21T03:56:32.507000 CVE-2018-18759,0,0,20ab09000007ea7f7dee0b8cce4fee6b4ac3ae57e712087891d4ab7ec4b69894,2024-11-21T03:56:32.507000
CVE-2018-1876,0,0,d59a0c99d4592a7b7df1cdb5647bc8af2fd2e90da124788af476184cf2d89191,2024-11-21T04:00:31.353000 CVE-2018-1876,0,0,d59a0c99d4592a7b7df1cdb5647bc8af2fd2e90da124788af476184cf2d89191,2024-11-21T04:00:31.353000
CVE-2018-18760,0,0,6d5eb804cff280d10ab819609330510c5e6718d6e088603a96aabb7d3629a554,2024-11-21T03:56:32.680000 CVE-2018-18760,0,1,1ca2a65038148d91774db4ca9288588a3ae8bd8bc9a92d41b39a70971b9d3a87,2025-06-05T13:20:07.470000
CVE-2018-18761,0,0,f5e26933267819c268b1e73646538dda14b47289896aa129f83ed7d2d6e76f8e,2024-11-21T03:56:32.840000 CVE-2018-18761,0,0,f5e26933267819c268b1e73646538dda14b47289896aa129f83ed7d2d6e76f8e,2024-11-21T03:56:32.840000
CVE-2018-18762,0,0,fee585f7eeb814388d81fbf959fb9adab7b0671444bcc17947e96608e1e7c440,2024-11-21T03:56:33.003000 CVE-2018-18762,0,0,fee585f7eeb814388d81fbf959fb9adab7b0671444bcc17947e96608e1e7c440,2024-11-21T03:56:33.003000
CVE-2018-18763,0,0,4296cd209d8b43eec7f6c082e2bdcf9dbbab439c0a0a0f11de9ec064405b04a3,2024-11-21T03:56:33.167000 CVE-2018-18763,0,0,4296cd209d8b43eec7f6c082e2bdcf9dbbab439c0a0a0f11de9ec064405b04a3,2024-11-21T03:56:33.167000
@ -248361,7 +248362,7 @@ CVE-2024-13227,0,0,c34ede3feb9dba7e466b356b6917ab16c078ee64224ad65ef9ea2ba00b4f2
CVE-2024-13228,0,0,779f2f74a9bc905ebc7eef41b4c9ea58c240c33e9c30e942ae24f12fe422a0ce,2025-05-26T02:31:47.207000 CVE-2024-13228,0,0,779f2f74a9bc905ebc7eef41b4c9ea58c240c33e9c30e942ae24f12fe422a0ce,2025-05-26T02:31:47.207000
CVE-2024-13229,0,0,537699d3a79de9fbc27e9b2746c3e5b03ecf899f1fa640e3c8fa1fd5bdf5f033,2025-02-24T17:07:33.247000 CVE-2024-13229,0,0,537699d3a79de9fbc27e9b2746c3e5b03ecf899f1fa640e3c8fa1fd5bdf5f033,2025-02-24T17:07:33.247000
CVE-2024-1323,0,0,4b7fa94b4154618460e40e6b98637f7cb2a430b6e413bf16925f79721ae6c94f,2025-01-16T19:29:54.047000 CVE-2024-1323,0,0,4b7fa94b4154618460e40e6b98637f7cb2a430b6e413bf16925f79721ae6c94f,2025-01-16T19:29:54.047000
CVE-2024-13230,0,0,fc93cdf67d3868b7b0c051174306027270b2a70b7d30a099eac273878a78d172,2025-01-21T11:15:09.267000 CVE-2024-13230,0,1,df14d5ca632c3c9144807674acdcbb7798c9dd392e86b3c5aa674aa121920631,2025-06-05T13:57:06.297000
CVE-2024-13231,0,0,9f4fa8c926846d1ab0b9e5607318e4d35e71d4238baf1d72a59148227e987120,2025-03-10T16:46:43.120000 CVE-2024-13231,0,0,9f4fa8c926846d1ab0b9e5607318e4d35e71d4238baf1d72a59148227e987120,2025-03-10T16:46:43.120000
CVE-2024-13232,0,0,b05d0e87ae9573e36e3d73d198ad6e01b170b2d0ea7928db216eed5795b9996b,2025-03-05T10:15:14.197000 CVE-2024-13232,0,0,b05d0e87ae9573e36e3d73d198ad6e01b170b2d0ea7928db216eed5795b9996b,2025-03-05T10:15:14.197000
CVE-2024-13234,0,0,4c493a769573d261245a83332615004948f6e06f366df55b9e6c3d12849e4b0c,2025-02-04T21:05:33.863000 CVE-2024-13234,0,0,4c493a769573d261245a83332615004948f6e06f366df55b9e6c3d12849e4b0c,2025-02-04T21:05:33.863000
@ -257057,7 +257058,7 @@ CVE-2024-2928,0,0,4f9d141452f84e180c0e1f09f7c8fd6e6fdfae447a1da31584938ee63d171e
CVE-2024-2929,0,0,4ab03801341de2f1465119f603393aeaba3d1ad5748ae5cae0a50616399524f7,2024-12-17T16:14:25.233000 CVE-2024-2929,0,0,4ab03801341de2f1465119f603393aeaba3d1ad5748ae5cae0a50616399524f7,2024-12-17T16:14:25.233000
CVE-2024-29291,0,0,011f8488ffac815fc965cf07e1d05d94882b32dd339c3222247d202650b0be1a,2024-11-21T09:07:55.147000 CVE-2024-29291,0,0,011f8488ffac815fc965cf07e1d05d94882b32dd339c3222247d202650b0be1a,2024-11-21T09:07:55.147000
CVE-2024-29292,0,0,00ea6bc4c302c327c3044fa68f8f423ad9fef8aef7e6a4e9a713883b77891c38,2024-11-27T17:15:10.383000 CVE-2024-29292,0,0,00ea6bc4c302c327c3044fa68f8f423ad9fef8aef7e6a4e9a713883b77891c38,2024-11-27T17:15:10.383000
CVE-2024-29296,0,0,35e7667e696c35f65ce86c5cde597a3f25a192ccfe25fb5b0e6928a23405beb9,2024-11-21T09:07:55.420000 CVE-2024-29296,0,1,54f1254f310be5bf75c2572db424ce6e6de29daec21b851de0020456874a3e49,2025-06-05T13:51:40.593000
CVE-2024-2930,0,0,14cb136c16b713686ac0e7c733b12a97b357d672ed4e51247fcf2729d66bc309,2025-02-18T17:00:05.117000 CVE-2024-2930,0,0,14cb136c16b713686ac0e7c733b12a97b357d672ed4e51247fcf2729d66bc309,2025-02-18T17:00:05.117000
CVE-2024-29301,0,0,fd1e20ff5af4f6b3bbf70573b4d531e64070d645c01a23f33aafa53774b8a2a0,2025-04-01T18:18:02.037000 CVE-2024-29301,0,0,fd1e20ff5af4f6b3bbf70573b4d531e64070d645c01a23f33aafa53774b8a2a0,2025-04-01T18:18:02.037000
CVE-2024-29302,0,0,decadb7e41fac363487d3af1f29b008ea387d906fbe32540667304e8b71337a6,2025-04-01T18:14:14.683000 CVE-2024-29302,0,0,decadb7e41fac363487d3af1f29b008ea387d906fbe32540667304e8b71337a6,2025-04-01T18:14:14.683000
@ -271546,11 +271547,11 @@ CVE-2024-4806,0,0,c24a2ce3dd8e70c6a1052478b7de9c33f0214d0df368bae6e15d075a67c1b5
CVE-2024-48061,0,0,db1f45afcc03afe157d352c0d9fbb97cfd43b1dda658e3066f3a4e4e154a6a5c,2025-05-28T20:56:46.417000 CVE-2024-48061,0,0,db1f45afcc03afe157d352c0d9fbb97cfd43b1dda658e3066f3a4e4e154a6a5c,2025-05-28T20:56:46.417000
CVE-2024-48063,0,0,1311bef9188533381cff027147693a2250e085aa33b35af9c6c94a58c93cde24,2025-01-09T18:15:29.013000 CVE-2024-48063,0,0,1311bef9188533381cff027147693a2250e085aa33b35af9c6c94a58c93cde24,2025-01-09T18:15:29.013000
CVE-2024-48068,0,0,bb6dc3535d4672a7bcb126cd1559794d6c1e87939838408c4a28db34964048a0,2024-11-21T19:15:10.450000 CVE-2024-48068,0,0,bb6dc3535d4672a7bcb126cd1559794d6c1e87939838408c4a28db34964048a0,2024-11-21T19:15:10.450000
CVE-2024-48069,0,0,baaae139997e6042b28563416cbe74cd20136468aeb5732b90dde5ae2d20a1ee,2024-11-21T17:15:18.473000 CVE-2024-48069,0,1,d2ae568d7d257425b67f6b6ada50ceedcd4fd5223bc5d44be02090f49e5e08b2,2025-06-05T13:54:55.510000
CVE-2024-4807,0,0,f4704fe37a7b08664cd9a9a385c05795bcf08bc8ad826fb3a9f92b084ca57898,2025-02-11T18:35:43.017000 CVE-2024-4807,0,0,f4704fe37a7b08664cd9a9a385c05795bcf08bc8ad826fb3a9f92b084ca57898,2025-02-11T18:35:43.017000
CVE-2024-48070,0,0,5e38b737786d41c05e50ae646a592e8dc866449f56b0635ed36d451449e481bf,2024-11-21T17:15:18.840000 CVE-2024-48070,0,1,7835c67f30761b2d2571c423ffec5bbe57357339033234f20b66d9c8cf92ac28,2025-06-05T13:55:09.977000
CVE-2024-48071,0,0,3cade52e98ecc60db2e1fc4b7454484a754d405ecc0275e169e1097d2ed4a778,2024-11-21T17:15:19.157000 CVE-2024-48071,0,0,3cade52e98ecc60db2e1fc4b7454484a754d405ecc0275e169e1097d2ed4a778,2024-11-21T17:15:19.157000
CVE-2024-48072,0,0,a71e26bd0f6a25110e76437966b5d2efaef50d28c1b3be50093b774c7098b0ee,2024-11-21T17:15:19.497000 CVE-2024-48072,0,1,cabfd90c7ac84343480e44251b39c1cf8177be6c708cd513fdf9252687e6cc0b,2025-06-05T13:58:30.280000
CVE-2024-48073,0,0,a0dd449974b738c26beb3021e27527834bf42533c9d1d0657f51f4262cbea909,2024-11-18T15:35:11.227000 CVE-2024-48073,0,0,a0dd449974b738c26beb3021e27527834bf42533c9d1d0657f51f4262cbea909,2024-11-18T15:35:11.227000
CVE-2024-48074,0,0,0022f007f2609f870f428c36c41da33f73f6c71aef6431214d976aaaeeda7e25,2025-05-17T02:14:47.187000 CVE-2024-48074,0,0,0022f007f2609f870f428c36c41da33f73f6c71aef6431214d976aaaeeda7e25,2025-05-17T02:14:47.187000
CVE-2024-48075,0,0,c750cfc63f2eb9e37fb6c605b4fffcddd3176068f4b6ccea67410855bd98fc08,2024-11-21T21:15:22.113000 CVE-2024-48075,0,0,c750cfc63f2eb9e37fb6c605b4fffcddd3176068f4b6ccea67410855bd98fc08,2024-11-21T21:15:22.113000
@ -275943,7 +275944,7 @@ CVE-2024-5405,0,0,8df36cd9ebb4aacfaea97c0ae9188e72e9768324f03849be72121f482af487
CVE-2024-54050,0,0,2117245d5163aca14bfa167fd753a6638e2e6177e64089ac7ec37bededfb843d,2025-01-15T17:54:55.630000 CVE-2024-54050,0,0,2117245d5163aca14bfa167fd753a6638e2e6177e64089ac7ec37bededfb843d,2025-01-15T17:54:55.630000
CVE-2024-54051,0,0,34da45d32f1e319fd64f791f2da26a1c2c6f5a7fbc9eaebe130aaa9b8ce90442,2025-01-15T17:55:22.203000 CVE-2024-54051,0,0,34da45d32f1e319fd64f791f2da26a1c2c6f5a7fbc9eaebe130aaa9b8ce90442,2025-01-15T17:55:22.203000
CVE-2024-5406,0,0,5db0f501f7c712d4bcce798425460b3472165eeef82fd225689429d234120e5b,2024-11-21T09:47:35.457000 CVE-2024-5406,0,0,5db0f501f7c712d4bcce798425460b3472165eeef82fd225689429d234120e5b,2024-11-21T09:47:35.457000
CVE-2024-5407,0,0,5011167e18a16536553012bfa33594066b6fc2710a432a4635054dec15e9468d,2025-06-04T18:17:43.547000 CVE-2024-5407,0,1,5c250d57b291b38d901392bfcc258199c4b6c520f3fc77396d529666871f6daa,2025-06-05T13:23:10.207000
CVE-2024-5408,0,0,ea1d75063220c7a1219304075c54841107d5625424848d2cc5a4d9201a0696fe,2024-11-21T09:47:35.690000 CVE-2024-5408,0,0,ea1d75063220c7a1219304075c54841107d5625424848d2cc5a4d9201a0696fe,2024-11-21T09:47:35.690000
CVE-2024-54082,0,0,65aa9ae45e1268a98d7772f17453032df41f59a165b23f820cdeaede4b477a68,2024-12-23T01:15:07.840000 CVE-2024-54082,0,0,65aa9ae45e1268a98d7772f17453032df41f59a165b23f820cdeaede4b477a68,2024-12-23T01:15:07.840000
CVE-2024-54083,0,0,5fd9cfa9d541ec1d140263f1195469b624b1e1b6173ea5643199f37a0fe69372,2024-12-16T08:15:05.317000 CVE-2024-54083,0,0,5fd9cfa9d541ec1d140263f1195469b624b1e1b6173ea5643199f37a0fe69372,2024-12-16T08:15:05.317000
@ -294721,7 +294722,7 @@ CVE-2025-45618,0,0,767ee00e764e7ef5bf5da280443f8f8ac155a067bd61e2227396cf4720a51
CVE-2025-4562,0,0,d2657f9e359abe15e16bbecb49ae9ba4428138285e1222df0d7e8c7358260e0e,2025-05-22T23:15:19.620000 CVE-2025-4562,0,0,d2657f9e359abe15e16bbecb49ae9ba4428138285e1222df0d7e8c7358260e0e,2025-05-22T23:15:19.620000
CVE-2025-4564,0,0,8d3f9720d908e446b737db8b900434db81b180dd53397ac7362129a7e91e5314,2025-05-16T14:43:26.160000 CVE-2025-4564,0,0,8d3f9720d908e446b737db8b900434db81b180dd53397ac7362129a7e91e5314,2025-05-16T14:43:26.160000
CVE-2025-4567,0,0,58147eb394708580d7afe585e734cf01dd405d0c4de5ce4464b448a64c2b1169,2025-06-04T14:54:33.783000 CVE-2025-4567,0,0,58147eb394708580d7afe585e734cf01dd405d0c4de5ce4464b448a64c2b1169,2025-06-04T14:54:33.783000
CVE-2025-4568,1,1,29804dbca17dc2cdb314f878db2d00cdd669a902429b3276afb628cea7658662,2025-06-05T10:15:21.730000 CVE-2025-4568,0,0,29804dbca17dc2cdb314f878db2d00cdd669a902429b3276afb628cea7658662,2025-06-05T10:15:21.730000
CVE-2025-4574,0,0,a936e70ea81d08570f1b370d85f904e33ed32b85014f55e350943da2afdfcfb5,2025-05-16T14:43:56.797000 CVE-2025-4574,0,0,a936e70ea81d08570f1b370d85f904e33ed32b85014f55e350943da2afdfcfb5,2025-05-16T14:43:56.797000
CVE-2025-45746,0,0,4f739c19260013516117a27de71915ddd8b481653d1fe15c253a574b15da0223,2025-05-21T14:15:31.553000 CVE-2025-45746,0,0,4f739c19260013516117a27de71915ddd8b481653d1fe15c253a574b15da0223,2025-05-21T14:15:31.553000
CVE-2025-4575,0,0,0624d6300232d42a9f90f1e62069c560ca8ea8d361bea47508069c55d62ec0b1,2025-05-23T15:55:02.040000 CVE-2025-4575,0,0,0624d6300232d42a9f90f1e62069c560ca8ea8d361bea47508069c55d62ec0b1,2025-05-23T15:55:02.040000
@ -296356,6 +296357,7 @@ CVE-2025-5331,0,0,6d6e63e0f8a1a491f6a38b24f4a10f691f644991827baf7d50b9fb0e398065
CVE-2025-5332,0,0,e1def175621c4e1d1942302bd613c0906cf0d988637a95edef4cbf91efd49e74,2025-06-04T15:37:02.583000 CVE-2025-5332,0,0,e1def175621c4e1d1942302bd613c0906cf0d988637a95edef4cbf91efd49e74,2025-06-04T15:37:02.583000
CVE-2025-5334,0,0,aae33d23bbf6c41c89830eb61bfdac6ed00173515e45aa173ca7510ab84466a1,2025-05-30T16:31:03.107000 CVE-2025-5334,0,0,aae33d23bbf6c41c89830eb61bfdac6ed00173515e45aa173ca7510ab84466a1,2025-05-30T16:31:03.107000
CVE-2025-5340,0,0,9b48da383be5dfbe2bc488480a2be183877451ec75241964210e2e3aad9a2ceb,2025-06-04T14:54:33.783000 CVE-2025-5340,0,0,9b48da383be5dfbe2bc488480a2be183877451ec75241964210e2e3aad9a2ceb,2025-06-04T14:54:33.783000
CVE-2025-5341,1,1,e7d474e1a4335c3052cbf76016245879096efb90380ff761f5ab2ce2dbe91d7f,2025-06-05T12:15:23.640000
CVE-2025-5356,0,0,21392522e07ca9a487f30a83cb437c3946fac9f76c3d7bf47bcf1046c70d9769,2025-06-02T17:32:17.397000 CVE-2025-5356,0,0,21392522e07ca9a487f30a83cb437c3946fac9f76c3d7bf47bcf1046c70d9769,2025-06-02T17:32:17.397000
CVE-2025-5357,0,0,6d225f1517736407e2a985f06fb943b8c693ee3a8fb797d8fef47d394fbcd075,2025-06-02T17:32:17.397000 CVE-2025-5357,0,0,6d225f1517736407e2a985f06fb943b8c693ee3a8fb797d8fef47d394fbcd075,2025-06-02T17:32:17.397000
CVE-2025-5358,0,0,db1fd286294db8040b1bdb4a6c8b2445c4920d6583d92ce80f74471f2c3e9ca3,2025-06-02T17:32:17.397000 CVE-2025-5358,0,0,db1fd286294db8040b1bdb4a6c8b2445c4920d6583d92ce80f74471f2c3e9ca3,2025-06-02T17:32:17.397000
@ -296554,12 +296556,18 @@ CVE-2025-5646,0,0,1c09e3ee4279bbb303f68b9f5ffb1ac47b840b242c88be0ecdb8280bcd0ebd
CVE-2025-5647,0,0,71bb7d14d0c12b1cdce5374f6e7f9b7e420d3be3ca525fe3c6817f62ae103604,2025-06-05T09:15:22.847000 CVE-2025-5647,0,0,71bb7d14d0c12b1cdce5374f6e7f9b7e420d3be3ca525fe3c6817f62ae103604,2025-06-05T09:15:22.847000
CVE-2025-5648,0,0,fbfbcda085b87e923a60877f0858ed1713cb4a263dbfefcc550392244e8b26f5,2025-06-05T09:15:23.123000 CVE-2025-5648,0,0,fbfbcda085b87e923a60877f0858ed1713cb4a263dbfefcc550392244e8b26f5,2025-06-05T09:15:23.123000
CVE-2025-5649,0,0,c5902840d6b6394c48c9775eda5452a9ca0d6c5bc764ed076171722caf945a02,2025-06-05T09:15:23.353000 CVE-2025-5649,0,0,c5902840d6b6394c48c9775eda5452a9ca0d6c5bc764ed076171722caf945a02,2025-06-05T09:15:23.353000
CVE-2025-5650,1,1,b2fcc16e9e2d67331d6225af628f2742cf989eb49709e012a985d5c2c9128015,2025-06-05T10:15:23.020000 CVE-2025-5650,0,0,b2fcc16e9e2d67331d6225af628f2742cf989eb49709e012a985d5c2c9128015,2025-06-05T10:15:23.020000
CVE-2025-5651,1,1,faaaae0c6ab7f44cada622ff689882dd1bf6e3d9d5455ef956229bd187c0c8e2,2025-06-05T10:15:23.270000 CVE-2025-5651,0,0,faaaae0c6ab7f44cada622ff689882dd1bf6e3d9d5455ef956229bd187c0c8e2,2025-06-05T10:15:23.270000
CVE-2025-5652,1,1,aa7cc3b3173f805c8726602c5a4f2758cf548e05d85c7daeef7cc865f6c5c669,2025-06-05T10:15:23.477000 CVE-2025-5652,0,0,aa7cc3b3173f805c8726602c5a4f2758cf548e05d85c7daeef7cc865f6c5c669,2025-06-05T10:15:23.477000
CVE-2025-5653,1,1,b830e3106d8341b72802bb4ce6673af8da2ad2a8b99006202e99812deb7cbe0c,2025-06-05T11:15:21.093000 CVE-2025-5653,0,0,b830e3106d8341b72802bb4ce6673af8da2ad2a8b99006202e99812deb7cbe0c,2025-06-05T11:15:21.093000
CVE-2025-5654,1,1,49e9d2a391c820529831583d942e6d45bb44650b0264404c2ba595a167d8623f,2025-06-05T11:15:22.133000 CVE-2025-5654,0,0,49e9d2a391c820529831583d942e6d45bb44650b0264404c2ba595a167d8623f,2025-06-05T11:15:22.133000
CVE-2025-5655,1,1,f89a2b4fde8513e5947db455187b5cb74296f432637dfa8bd45dbc068a0412da,2025-06-05T11:15:22.313000 CVE-2025-5655,0,0,f89a2b4fde8513e5947db455187b5cb74296f432637dfa8bd45dbc068a0412da,2025-06-05T11:15:22.313000
CVE-2025-5656,1,1,f9bdb941a86355c3b936040ab1d97169c1a66e5b96d66a2de589220466fe33b6,2025-06-05T12:15:23.850000
CVE-2025-5657,1,1,6161e951e969a957b84de52b7c73b226c865f00527b2bd9e9a50d9c946fad112,2025-06-05T12:15:24.053000
CVE-2025-5658,1,1,4d13dd96515aa619cb89a4eae95360988fbe1907dbbc7ff0c832d6947aeba50a,2025-06-05T13:15:21.717000
CVE-2025-5659,1,1,8e5de62ec0585263f6f198141686efb1789c3d8293de918cff6e3c6505bae876,2025-06-05T13:15:21.907000
CVE-2025-5660,1,1,42cd397a05a373b1aedd306ea6d88f40eb52308d62cfbf9f094c165fce7702d0,2025-06-05T13:15:22.123000
CVE-2025-5683,0,0,ba4cab8ac4a992f679318045c0972e1d1d7a83c5101ea31565eb781d5696d00a,2025-06-05T06:15:27.517000 CVE-2025-5683,0,0,ba4cab8ac4a992f679318045c0972e1d1d7a83c5101ea31565eb781d5696d00a,2025-06-05T06:15:27.517000
CVE-2025-5688,0,0,73bb641229fc7f0cc58d056bcd50b9204b2df12fec290a20f6d3344d9742580f,2025-06-04T17:15:29.330000 CVE-2025-5688,0,0,73bb641229fc7f0cc58d056bcd50b9204b2df12fec290a20f6d3344d9742580f,2025-06-04T17:15:29.330000
CVE-2025-5690,0,0,ac9502bdafeae675eb4593084c8644a2164e57d1b6a23446acd8173b20c2ef82,2025-06-04T22:15:26.470000 CVE-2025-5690,0,0,ac9502bdafeae675eb4593084c8644a2164e57d1b6a23446acd8173b20c2ef82,2025-06-04T22:15:26.470000
CVE-2025-5701,1,1,25dfd43bc0d8a99b1c1ad2c25933fffdc37face9a53fdc8c0d697535d26edf00,2025-06-05T12:15:24.233000

Can't render this file because it is too large.