diff --git a/CVE-2023/CVE-2023-470xx/CVE-2023-47031.json b/CVE-2023/CVE-2023-470xx/CVE-2023-47031.json new file mode 100644 index 00000000000..4f05bc8eca9 --- /dev/null +++ b/CVE-2023/CVE-2023-470xx/CVE-2023-47031.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2023-47031", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-06-23T17:15:27.313", + "lastModified": "2025-06-23T17:15:27.313", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in NCR Terminal Handler v.1.5.1 allows a remote attacker to escalate privileges via a crafted POST request to the grantRolesToUsers, grantRolesToGroups, and grantRolesToOrganization SOAP API component." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://ncr.com", + "source": "cve@mitre.org" + }, + { + "url": "http://terminal.com", + "source": "cve@mitre.org" + }, + { + "url": "https://drive.google.com/file/d/1f9riw_seicV9MB7pRQJFY-8voxkW8ZYH/view?usp=sharing", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-470xx/CVE-2023-47032.json b/CVE-2023/CVE-2023-470xx/CVE-2023-47032.json new file mode 100644 index 00000000000..ef20e9540b4 --- /dev/null +++ b/CVE-2023/CVE-2023-470xx/CVE-2023-47032.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2023-47032", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-06-23T16:15:23.920", + "lastModified": "2025-06-23T16:15:23.920", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Password Vulnerability in NCR Terminal Handler v.1.5.1 allows a remote attacker to execute arbitrary code via a crafted script to the UserService SOAP API function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://drive.google.com/file/d/1rTKc2nxEc40VTItJiJ9moZ5VrHG3xQuj/view?usp=sharing", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/pwahba/cve-research/blob/main/CVE-2023-47032/CVE-2023-47032.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-472xx/CVE-2023-47294.json b/CVE-2023/CVE-2023-472xx/CVE-2023-47294.json new file mode 100644 index 00000000000..c59b850f575 --- /dev/null +++ b/CVE-2023/CVE-2023-472xx/CVE-2023-47294.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2023-47294", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-06-23T16:15:24.493", + "lastModified": "2025-06-23T16:15:24.493", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in NCR Terminal Handler v1.5.1 allows low-level privileged authenticated attackers to arbitrarily deactivate, lock, and delete user accounts via a crafted session cookie." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://drive.google.com/file/d/1owG3_2oVpoCb34Mb7nCYZNrjW8cFxpzN/view?usp=sharing", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/pwahba/cve-research/blob/main/CVE-2023-47294/CVE-2023-47294.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-472xx/CVE-2023-47295.json b/CVE-2023/CVE-2023-472xx/CVE-2023-47295.json new file mode 100644 index 00000000000..5bdae31c00b --- /dev/null +++ b/CVE-2023/CVE-2023-472xx/CVE-2023-47295.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2023-47295", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-06-23T16:15:24.623", + "lastModified": "2025-06-23T16:15:24.623", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A CSV injection vulnerability in NCR Terminal Handler v1.5.1 allows attackers to execute arbitrary commands via injecting a crafted payload into any text field that accepts strings." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://drive.google.com/file/d/14uldfUpLRIc-NfHiUco0ja-ZiF0MazGA/view?usp=sharing", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/pwahba/cve-research/blob/main/CVE-2023-47295/CVE-2023-47295.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-504xx/CVE-2023-50450.json b/CVE-2023/CVE-2023-504xx/CVE-2023-50450.json new file mode 100644 index 00000000000..1a68c975dab --- /dev/null +++ b/CVE-2023/CVE-2023-504xx/CVE-2023-50450.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2023-50450", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-06-23T16:15:24.743", + "lastModified": "2025-06-23T16:15:24.743", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Sensopart VISOR Vision Sensors before 2.10.0.2 allows local users to perform unspecified actions with elevated privileges." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://code-white.com/public-vulnerability-list/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45208.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45208.json index 2ec4ae09c83..baf923fa0ae 100644 --- a/CVE-2024/CVE-2024-452xx/CVE-2024-45208.json +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45208.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Versa Director SD-WAN orchestration platform which makes use of Cisco NCS application service. Active and Standby Directors communicate over TCP ports 4566 and 4570 to exchange High Availability (HA) information using a shared password. Affected versions of Versa Director bound to these ports on all interfaces. An attacker that can access the Versa Director could access the NCS service on port 4566 and exploit it to perform unauthorized administrative actions and perform remote code execution. Customers are recommended to follow the hardening guide.\r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers." + }, + { + "lang": "es", + "value": "La plataforma de orquestaci\u00f3n SD-WAN Versa Director utiliza el servicio de aplicaciones Cisco NCS. Los directores activos y en espera se comunican a trav\u00e9s de los puertos TCP 4566 y 4570 para intercambiar informaci\u00f3n de alta disponibilidad (HA) mediante una contrase\u00f1a compartida. Las versiones afectadas de Versa Director est\u00e1n vinculadas a estos puertos en todas las interfaces. Un atacante que acceda a Versa Director podr\u00eda acceder al servicio NCS en el puerto 4566 y explotarlo para realizar acciones administrativas no autorizadas y ejecutar c\u00f3digo remoto. Se recomienda a los clientes seguir la gu\u00eda de refuerzo. Versa Networks no tiene constancia de ning\u00fan caso reportado de explotaci\u00f3n de esta vulnerabilidad. Investigadores de seguridad externos han publicado una prueba de concepto de esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21550.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21550.json index 6dfa9dcc8b6..21618d05bcc 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21550.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21550.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21550", "sourceIdentifier": "secalert_us@oracle.com", "published": "2025-01-21T21:15:21.510", - "lastModified": "2025-06-23T15:25:05.683", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-13T15:15:51.980", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -51,40 +51,10 @@ ] } ], - "configurations": [ - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.0.8.1:*:*:*:*:*:*:*", - "matchCriteriaId": "3BBB9F8E-7374-4426-A269-FB669644538F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.1.2.7:*:*:*:*:*:*:*", - "matchCriteriaId": "C28D8453-2E02-43C3-8998-8B694F4B7505" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.1.2.8:*:*:*:*:*:*:*", - "matchCriteriaId": "49BE74EB-7D30-47FF-B1BD-21A57CD091B1" - } - ] - } - ] - } - ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujan2025.html", - "source": "secalert_us@oracle.com", - "tags": [ - "Vendor Advisory" - ] + "source": "secalert_us@oracle.com" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23121.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23121.json index 6ed9528e2d4..1d7b4d8a792 100644 --- a/CVE-2025/CVE-2025-231xx/CVE-2025-23121.json +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23121.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability allowing remote code execution (RCE) on the Backup Server by an authenticated domain user" + }, + { + "lang": "es", + "value": "Una vulnerabilidad que permite la ejecuci\u00f3n remota de c\u00f3digo (RCE) en el servidor de respaldo por parte de un usuario de dominio autenticado" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23168.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23168.json index 0312d7f0670..b8e1971b6d7 100644 --- a/CVE-2025/CVE-2025-231xx/CVE-2025-23168.json +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23168.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Versa Director SD-WAN orchestration platform implements Two-Factor Authentication (2FA) using One-Time Passcodes (OTP) delivered via email or SMS. Versa Director accepts untrusted user input when dispatching 2FA codes, allowing an attacker who knows a valid username and password to redirect the OTP delivery (SMS/email) to their own device. OTP/TOTP codes are not invalidated after use, enabling reuse by an attacker who has previously intercepted or obtained a valid code. In addition, the 2FA system does not adequately restrict the number or frequency of login attempts. The OTP values are generated from a relatively small keyspace, making brute-force attacks more feasible. \r\n\r\nExploitation Status: \r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \r\n\r\nWorkarounds or Mitigation: \r\n\r\nVersa recommends that Director be upgraded to one of the remediated software versions." + }, + { + "lang": "es", + "value": "La plataforma de orquestaci\u00f3n SD-WAN Versa Director implementa la autenticaci\u00f3n de dos factores (2FA) mediante c\u00f3digos de acceso de un solo uso (OTP) enviados por correo electr\u00f3nico o SMS. Versa Director acepta la entrada de usuarios no confiables al enviar c\u00f3digos 2FA, lo que permite a un atacante que conoce un nombre de usuario y una contrase\u00f1a v\u00e1lidos redirigir el env\u00edo de OTP (SMS/correo electr\u00f3nico) a su propio dispositivo. Los c\u00f3digos OTP/TOTP no se invalidan despu\u00e9s de su uso, lo que permite su reutilizaci\u00f3n por un atacante que haya interceptado u obtenido previamente un c\u00f3digo v\u00e1lido. Adem\u00e1s, el sistema 2FA no restringe adecuadamente el n\u00famero ni la frecuencia de los intentos de inicio de sesi\u00f3n. Los valores OTP se generan a partir de un espacio de claves relativamente peque\u00f1o, lo que facilita los ataques de fuerza bruta. Estado de explotaci\u00f3n: Versa Networks no tiene conocimiento de ning\u00fan caso reportado de explotaci\u00f3n de esta vulnerabilidad. Investigadores de seguridad externos han divulgado una prueba de concepto para esta vulnerabilidad. Soluciones alternativas o mitigaci\u00f3n: Versa recomienda actualizar Director a una de las versiones de software corregidas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23169.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23169.json index c1502b5666e..ea08fbf767a 100644 --- a/CVE-2025/CVE-2025-231xx/CVE-2025-23169.json +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23169.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Versa Director SD-WAN orchestration platform allows customization of the user interface, including the header, footer, and logo. However, the input provided for these customizations is not properly validated or sanitized, allowing a malicious user to inject and store cross-site scripting (XSS) payloads. \r\n\r\nExploitation Status: \r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \r\n\r\nWorkarounds or Mitigation: \r\n\r\nThere are no workarounds to disable the GUI option. Versa recommends that Director be upgraded to one of the remediated software versions." + }, + { + "lang": "es", + "value": "La plataforma de orquestaci\u00f3n Versa Director SD-WAN permite personalizar la interfaz de usuario, incluyendo el encabezado, el pie de p\u00e1gina y el logotipo. Sin embargo, la informaci\u00f3n proporcionada para estas personalizaciones no se valida ni se depura adecuadamente, lo que permite que un usuario malintencionado inyecte y almacene cargas \u00fatiles de Cross-site Scripting (XSS). Estado de explotaci\u00f3n: Versa Networks no tiene constancia de ning\u00fan caso de explotaci\u00f3n de esta vulnerabilidad. Investigadores de seguridad externos han divulgado una prueba de concepto para esta vulnerabilidad. Soluciones alternativas o mitigaci\u00f3n: No existen soluciones alternativas para desactivar la opci\u00f3n de la interfaz gr\u00e1fica de usuario. Versa recomienda actualizar Director a una de las versiones de software corregidas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23170.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23170.json index cce2a6fb573..02c962d4344 100644 --- a/CVE-2025/CVE-2025-231xx/CVE-2025-23170.json +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23170.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Versa Director SD-WAN orchestration platform includes functionality to initiate SSH sessions to remote CPEs and the Director shell via Shell-In-A-Box. The underlying Python script, shell-connect.py, is vulnerable to command injection through the user argument. This allows an attacker to execute arbitrary commands on the system. \r\n\r\nExploitation Status: \r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \r\n\r\nWorkarounds or Mitigation: \r\n\r\nThere are no workarounds to disable the GUI option. Versa recommends that Director be upgraded to one of the remediated software versions." + }, + { + "lang": "es", + "value": "La plataforma de orquestaci\u00f3n Versa Director SD-WAN incluye la funcionalidad para iniciar sesiones SSH con CPE remotos y el shell de Director mediante Shell-In-A-Box. El script de Python subyacente, shell-connect.py, es vulnerable a la inyecci\u00f3n de comandos mediante el argumento de usuario. Esto permite a un atacante ejecutar comandos arbitrarios en el sistema. Estado de explotaci\u00f3n: Versa Networks no tiene constancia de ning\u00fan caso reportado de explotaci\u00f3n de esta vulnerabilidad. Investigadores de seguridad externos han divulgado una prueba de concepto para esta vulnerabilidad. Soluciones alternativas o mitigaci\u00f3n: No existen soluciones alternativas para deshabilitar la opci\u00f3n de la interfaz gr\u00e1fica de usuario. Versa recomienda actualizar Director a una de las versiones de software corregidas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23171.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23171.json index 9e837d1ba64..1bd57c7c2d1 100644 --- a/CVE-2025/CVE-2025-231xx/CVE-2025-23171.json +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23171.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Versa Director SD-WAN orchestration platform provides an option to upload various types of files. The Versa Director does not correctly limit file upload permissions. The UI appears not to allow file uploads but uploads still succeed. In addition, the Versa Director discloses the full filename of uploaded temporary files, including the UUID prefix. Insecure UCPE image upload in Versa Director allows an authenticated attacker to upload a webshell. \r\n\r\nExploitation Status: \r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \r\n\r\nWorkarounds or Mitigation: \r\n\r\nThere are no workarounds to disable the GUI option. Versa recommends that Director be upgraded to one of the remediated software versions." + }, + { + "lang": "es", + "value": "La plataforma de orquestaci\u00f3n Versa Director SD-WAN ofrece la opci\u00f3n de cargar varios tipos de archivos. Versa Director no limita correctamente los permisos de carga de archivos. La interfaz de usuario parece no permitir la carga de archivos, pero aun as\u00ed se carga correctamente. Adem\u00e1s, Versa Director revela el nombre completo de los archivos temporales cargados, incluido el prefijo UUID. La carga insegura de im\u00e1genes UCPE en Versa Director permite que un atacante autenticado cargue un webshell. Estado de explotaci\u00f3n: Versa Networks no tiene constancia de ning\u00fan caso reportado de explotaci\u00f3n de esta vulnerabilidad. Investigadores de seguridad externos han divulgado una prueba de concepto para esta vulnerabilidad. Soluciones alternativas o mitigaci\u00f3n: No existen soluciones alternativas para deshabilitar la opci\u00f3n de la interfaz gr\u00e1fica de usuario. Versa recomienda actualizar Director a una de las versiones de software corregidas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23172.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23172.json index c6e1f99debb..3e4a02edcc8 100644 --- a/CVE-2025/CVE-2025-231xx/CVE-2025-23172.json +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23172.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Versa Director SD-WAN orchestration platform includes a Webhook feature for sending notifications to external HTTP endpoints. However, the \"Add Webhook\" and \"Test Webhook\" functionalities can be abused by an authenticated user to send crafted HTTP requests to localhost. This can be leveraged to execute commands on behalf of the versa user, who has sudo privileges, potentially leading to privilege escalation or remote code execution. \r\n \r\nExploitation Status: \r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \r\n\r\nWorkarounds or Mitigation: \r\n\r\nThere are no workarounds to disable the GUI option. Versa recommends that Director be upgraded to one of the remediated software versions." + }, + { + "lang": "es", + "value": "La plataforma de orquestaci\u00f3n Versa Director SD-WAN incluye una funci\u00f3n de webhook para enviar notificaciones a endpoints HTTP externos. Sin embargo, un usuario autenticado puede abusar de las funciones \"A\u00f1adir webhook\" y \"Probar webhook\" para enviar solicitudes HTTP manipuladas al host local. Esto puede aprovecharse para ejecutar comandos en nombre del usuario de Versa, que tiene privilegios de sudo, lo que podr\u00eda provocar una escalada de privilegios o la ejecuci\u00f3n remota de c\u00f3digo. Estado de explotaci\u00f3n: Versa Networks no tiene constancia de ning\u00fan caso reportado de explotaci\u00f3n de esta vulnerabilidad. Investigadores de seguridad externos han divulgado una prueba de concepto para esta vulnerabilidad. Soluciones alternativas o mitigaci\u00f3n: No existen soluciones alternativas para deshabilitar la opci\u00f3n de la interfaz gr\u00e1fica de usuario (GUI). Versa recomienda actualizar Director a una de las versiones de software corregidas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23173.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23173.json index e7c3e1843bc..d50a2d19e55 100644 --- a/CVE-2025/CVE-2025-231xx/CVE-2025-23173.json +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23173.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Versa Director SD-WAN orchestration platform provides direct web-based access to uCPE virtual machines through the Director GUI. By default, the websockify service is exposed on port 6080 and accessible from the internet. This exposure introduces significant risk, as websockify has known weaknesses that can be exploited, potentially leading to remote code execution. \r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \r\n\r\nWorkarounds or Mitigation: \r\n\r\nRestrict access to TCP port 6080 if uCPE console access is not necessary. Versa recommends that Director be upgraded to one of the remediated software versions." + }, + { + "lang": "es", + "value": "La plataforma de orquestaci\u00f3n Versa Director SD-WAN proporciona acceso web directo a las m\u00e1quinas virtuales uCPE a trav\u00e9s de la interfaz gr\u00e1fica de Director. De forma predeterminada, el servicio websockify est\u00e1 expuesto en el puerto 6080 y es accesible desde internet. Esta exposici\u00f3n supone un riesgo significativo, ya que websockify presenta vulnerabilidades conocidas que pueden explotarse, lo que podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo. Versa Networks no tiene constancia de ning\u00fan caso reportado de explotaci\u00f3n de esta vulnerabilidad. Investigadores de seguridad externos han publicado una prueba de concepto de esta vulnerabilidad. Soluciones alternativas o mitigaci\u00f3n: Restrinja el acceso al puerto TCP 6080 si no necesita acceder a la consola uCPE. Versa recomienda actualizar Director a una de las versiones de software corregidas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24286.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24286.json index 7d5f15b5b29..60316ef3914 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24286.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24286.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability allowing an authenticated user with the Backup Operator role to modify backup jobs, which could execute arbitrary code." + }, + { + "lang": "es", + "value": "Una vulnerabilidad que permite a un usuario autenticado con el rol de Operador de respaldo modificar trabajos de respaldo, lo que podr\u00eda ejecutar c\u00f3digo arbitrario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24287.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24287.json index eb8528a886a..1a11faca593 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24287.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24287.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability allowing local system users to modify directory contents, allowing for arbitrary code execution on the local system with elevated permissions." + }, + { + "lang": "es", + "value": "Una vulnerabilidad que permite a los usuarios del sistema local modificar el contenido del directorio, lo que permite la ejecuci\u00f3n de c\u00f3digo arbitrario en el sistema local con permisos elevados." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24288.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24288.json index 86f33b659a1..d38b99061d2 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24288.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24288.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Versa Director software exposes a number of services by default and allow attackers an easy foothold due to default credentials and multiple accounts (most with sudo access) that utilize the same default credentials. By default, Versa director exposes ssh and postgres to the internet, alongside a host of other services.\r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \r\n\r\nWorkarounds or Mitigation: \r\n\r\nVersa recommends the following security controls:\r\n\r\n1) Change default passwords to complex passwords\r\n2) Passwords must be complex with at least 8 characters that comprise of upper case, and lower case alphabets, as well as at at least one digit, and one special character\r\n3) Passwords must be changed at least every 90 days\r\n4) Password change history is checked to ensure that the at least the last 5 passwords must be used when changing password.\r\n5) Review and audit logs for all authentication attempts to check for unauthorized/suspicious login attempts and enforce remediation steps." + }, + { + "lang": "es", + "value": "El software Versa Director expone varios servicios por defecto y facilita el acceso a los atacantes gracias a las credenciales predeterminadas y a varias cuentas (la mayor\u00eda con acceso sudo) que utilizan las mismas credenciales predeterminadas. Por defecto, Versa Director expone SSH y Postgres a internet, junto con otros servicios. Versa Networks no tiene constancia de ning\u00fan caso reportado de explotaci\u00f3n de esta vulnerabilidad. Investigadores de seguridad externos han divulgado una prueba de concepto de esta vulnerabilidad. Soluciones alternativas o mitigaci\u00f3n: Versa recomienda los siguientes controles de seguridad: 1) Cambiar las contrase\u00f1as predeterminadas por contrase\u00f1as complejas. 2) Las contrase\u00f1as deben ser complejas, con al menos 8 caracteres (may\u00fasculas y min\u00fasculas), adem\u00e1s de al menos un d\u00edgito y un car\u00e1cter especial. 3) Las contrase\u00f1as deben cambiarse al menos cada 90 d\u00edas. 4) Se revisa el historial de cambios de contrase\u00f1a para garantizar que se utilicen al menos las \u00faltimas 5 contrase\u00f1as al cambiarlas. 5) Revisar y auditar los registros de todos los intentos de autenticaci\u00f3n para detectar intentos de inicio de sesi\u00f3n no autorizados o sospechosos y aplicar medidas correctivas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24291.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24291.json index 9403b5f0796..65b3af73ede 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24291.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24291.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Versa Director SD-WAN orchestration platform provides functionality to upload various types of files. However, the Java code handling file uploads contains an argument injection vulnerability. By appending additional arguments to the file name, an attacker can bypass MIME type validation, allowing the upload of arbitrary file types. This flaw can be exploited to place a malicious file on disk. \r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \r\n\r\nThere are no workarounds to disable the GUI option. Versa recommends that Director be upgraded to one of the remediated software versions." + }, + { + "lang": "es", + "value": "La plataforma de orquestaci\u00f3n Versa Director SD-WAN permite cargar diversos tipos de archivos. Sin embargo, el c\u00f3digo Java que gestiona la carga de archivos contiene una vulnerabilidad de inyecci\u00f3n de argumentos. Al a\u00f1adir argumentos adicionales al nombre del archivo, un atacante puede eludir la validaci\u00f3n de tipo MIME, lo que permite cargar archivos de cualquier tipo. Esta vulnerabilidad puede explotarse para almacenar un archivo malicioso en el disco. Versa Networks no tiene constancia de ning\u00fan caso reportado de explotaci\u00f3n de esta vulnerabilidad. Investigadores de seguridad externos han divulgado una prueba de concepto de esta vulnerabilidad. No existen soluciones alternativas para desactivar la opci\u00f3n de interfaz gr\u00e1fica de usuario (GUI). Versa recomienda actualizar Director a una de las versiones de software corregidas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-439xx/CVE-2025-43947.json b/CVE-2025/CVE-2025-439xx/CVE-2025-43947.json index e44eee2b9d2..4e79a373c9e 100644 --- a/CVE-2025/CVE-2025-439xx/CVE-2025-43947.json +++ b/CVE-2025/CVE-2025-439xx/CVE-2025-43947.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-04-22T18:16:01.170", "lastModified": "2025-04-23T14:08:13.383", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-45xx/CVE-2025-4563.json b/CVE-2025/CVE-2025-45xx/CVE-2025-4563.json new file mode 100644 index 00000000000..d145190ea42 --- /dev/null +++ b/CVE-2025/CVE-2025-45xx/CVE-2025-4563.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-4563", + "sourceIdentifier": "jordan@liggitt.net", + "published": "2025-06-23T16:15:27.350", + "lastModified": "2025-06-23T16:15:27.350", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability exists in the NodeRestriction admission controller where nodes can bypass dynamic resource allocation authorization checks. When the DynamicResourceAllocation feature gate is enabled, the controller properly validates resource claim statuses during pod status updates but fails to perform equivalent validation during pod creation. This allows a compromised node to create mirror pods that access unauthorized dynamic resources, potentially leading to privilege escalation." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "jordan@liggitt.net", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 2.7, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "jordan@liggitt.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/kubernetes/kubernetes/issues/132151", + "source": "jordan@liggitt.net" + }, + { + "url": "https://groups.google.com/g/kubernetes-security-announce/c/Zv84LMRuvMQ", + "source": "jordan@liggitt.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-500xx/CVE-2025-50054.json b/CVE-2025/CVE-2025-500xx/CVE-2025-50054.json index 73d29cd325a..10c564e64d8 100644 --- a/CVE-2025/CVE-2025-500xx/CVE-2025-50054.json +++ b/CVE-2025/CVE-2025-500xx/CVE-2025-50054.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Buffer overflow in OpenVPN ovpn-dco-win version 1.3.0 and earlier and version 2.5.8 and earlier allows a local user process to send a too large control message buffer to the kernel driver resulting in a system crash" + }, + { + "lang": "es", + "value": "El desbordamiento de b\u00fafer en OpenVPN ovpn-dco-win versi\u00f3n 1.3.0 y anteriores y versi\u00f3n 2.5.8 y anteriores permite que un proceso de usuario local env\u00ede un b\u00fafer de mensaje de control demasiado grande al controlador del kernel, lo que provoca un bloqueo del sistema." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-529xx/CVE-2025-52968.json b/CVE-2025/CVE-2025-529xx/CVE-2025-52968.json index a487e5258c0..d697086c525 100644 --- a/CVE-2025/CVE-2025-529xx/CVE-2025-52968.json +++ b/CVE-2025/CVE-2025-529xx/CVE-2025-52968.json @@ -2,7 +2,7 @@ "id": "CVE-2025-52968", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-23T15:15:29.350", - "lastModified": "2025-06-23T15:15:29.350", + "lastModified": "2025-06-23T17:15:30.990", "vulnStatus": "Received", "cveTags": [ { @@ -15,7 +15,7 @@ "descriptions": [ { "lang": "en", - "value": "xdg-open in xdg-utils through 1.2.1 can send requests containing SameSite=Strict cookies, which can facilitate CSRF. NOTE: this is disputed because integrations of xdg-open typically do not provide information about whether the xdg-open command and arguments were manually entered by a user, or whether they were the result of a navigation from content in an untrusted origin." + "value": "xdg-open in xdg-utils through 1.2.1 can send requests containing SameSite=Strict cookies, which can facilitate CSRF. (For example, xdg-open could be modified to, by default, associate x-scheme-handler/https with the execution of a browser with command-line options that arrange for an empty cookie store, although this would add substantial complexity, and would not be considered a desirable or expected behavior by all users.) NOTE: this is disputed because integrations of xdg-open typically do not provide information about whether the xdg-open command and arguments were manually entered by a user, or whether they were the result of a navigation from content in an untrusted origin." } ], "metrics": { @@ -45,7 +45,7 @@ "weaknesses": [ { "source": "cve@mitre.org", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-529xx/CVE-2025-52969.json b/CVE-2025/CVE-2025-529xx/CVE-2025-52969.json new file mode 100644 index 00000000000..248ee32c3d5 --- /dev/null +++ b/CVE-2025/CVE-2025-529xx/CVE-2025-52969.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2025-52969", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-06-23T17:15:31.137", + "lastModified": "2025-06-23T17:15:31.137", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "ClickHouse 25.7.1.557 allows low-privileged users to execute shell commands by querying existing Executable() tables created by higher-privileged users. Although the CREATE TABLE privilege is restricted, there is no access control preventing low-privileged users from invoking Executable tables already present in the system. If an attacker can influence the contents of the script referenced by the Executable() engine through writable paths, they may execute controlled commands in the context of the ClickHouse server, leading to privilege escalation and unauthorized code execution. NOTE: the Supplier's position is that these types of executions by low-privileged users are the expected behavior." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N", + "baseScore": 2.8, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.1, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-420" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/skraft9/clickhouse-security-research", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-63xx/CVE-2025-6353.json b/CVE-2025/CVE-2025-63xx/CVE-2025-6353.json index 5297ea39d19..d0a3b0f3a60 100644 --- a/CVE-2025/CVE-2025-63xx/CVE-2025-6353.json +++ b/CVE-2025/CVE-2025-63xx/CVE-2025-6353.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6353", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-20T17:15:41.737", - "lastModified": "2025-06-20T17:15:41.737", + "lastModified": "2025-06-23T16:15:28.043", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic was found in code-projects Responsive Blog 1.0. Affected by this vulnerability is an unknown functionality of the file /search.php. The manipulation of the argument keyword leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como problem\u00e1tica en code-projects Responsive Blog 1.0. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /search.php. La manipulaci\u00f3n de la palabra clave \"argument\" provoca ataques de cross site scripting. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -144,6 +148,10 @@ { "url": "https://vuldb.com/?submit.597260", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/asd1238525/cve/blob/main/xss2.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-63xx/CVE-2025-6354.json b/CVE-2025/CVE-2025-63xx/CVE-2025-6354.json index 2ca55a8b010..80e67fb27a9 100644 --- a/CVE-2025/CVE-2025-63xx/CVE-2025-6354.json +++ b/CVE-2025/CVE-2025-63xx/CVE-2025-6354.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6354", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-20T17:15:41.977", - "lastModified": "2025-06-20T17:15:41.977", + "lastModified": "2025-06-23T16:15:28.183", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in code-projects Online Shoe Store 1.0. Affected by this issue is some unknown functionality of the file /function/customer_signup.php. The manipulation of the argument email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en code-projects Online Shoe Store 1.0. Este problema afecta a una funcionalidad desconocida del archivo /function/customer_signup.php. La manipulaci\u00f3n del argumento \"email\" provoca una inyecci\u00f3n SQL. El ataque podr\u00eda ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.597283", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/AlbaDove/cve/issues/1", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-63xx/CVE-2025-6355.json b/CVE-2025/CVE-2025-63xx/CVE-2025-6355.json index facd4974e96..acd19c4ac34 100644 --- a/CVE-2025/CVE-2025-63xx/CVE-2025-6355.json +++ b/CVE-2025/CVE-2025-63xx/CVE-2025-6355.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6355", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-20T17:15:42.217", - "lastModified": "2025-06-20T17:15:42.217", + "lastModified": "2025-06-23T16:15:28.320", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in SourceCodester Online Hotel Reservation System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/execeditroom.php. The manipulation of the argument userid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en SourceCodester Online Hotel Reservation System 1.0, clasificada como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /admin/execeditroom.php. La manipulaci\u00f3n del argumento `userid` provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://www.sourcecodester.com/", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/rom4j/cve/issues/15", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-63xx/CVE-2025-6356.json b/CVE-2025/CVE-2025-63xx/CVE-2025-6356.json index ac576e30670..2af6c1a6ced 100644 --- a/CVE-2025/CVE-2025-63xx/CVE-2025-6356.json +++ b/CVE-2025/CVE-2025-63xx/CVE-2025-6356.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6356", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-20T18:15:29.280", - "lastModified": "2025-06-20T18:15:29.280", + "lastModified": "2025-06-23T16:15:28.447", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in code-projects Simple Pizza Ordering System 1.0 and classified as critical. This issue affects some unknown processing of the file /addmem.php. The manipulation leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en code-projects Simple Pizza Ordering System 1.0, clasificada como cr\u00edtica. Este problema afecta a un procesamiento desconocido del archivo /addmem.php. La manipulaci\u00f3n provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.597297", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/rom4j/cve/issues/14", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-63xx/CVE-2025-6358.json b/CVE-2025/CVE-2025-63xx/CVE-2025-6358.json index af866e24d73..27d3ea42422 100644 --- a/CVE-2025/CVE-2025-63xx/CVE-2025-6358.json +++ b/CVE-2025/CVE-2025-63xx/CVE-2025-6358.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6358", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-20T18:15:29.660", - "lastModified": "2025-06-20T18:15:29.660", + "lastModified": "2025-06-23T16:15:28.577", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in code-projects Simple Pizza Ordering System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /saveorder.php. The manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en code-projects Simple Pizza Ordering System 1.0. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /saveorder.php. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.597299", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/rom4j/cve/issues/12", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-63xx/CVE-2025-6359.json b/CVE-2025/CVE-2025-63xx/CVE-2025-6359.json index 0677f392b94..2dc515daec2 100644 --- a/CVE-2025/CVE-2025-63xx/CVE-2025-6359.json +++ b/CVE-2025/CVE-2025-63xx/CVE-2025-6359.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6359", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-20T19:15:37.803", - "lastModified": "2025-06-20T19:15:37.803", + "lastModified": "2025-06-23T16:15:28.707", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in code-projects Simple Pizza Ordering System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /cashconfirm.php. The manipulation of the argument transactioncode leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en code-projects Simple Pizza Ordering System 1.0. Se ha clasificado como cr\u00edtica. Este problema afecta a una funcionalidad desconocida del archivo /cashconfirm.php. La manipulaci\u00f3n del argumento transactioncode provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. " } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.597300", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/rom4j/cve/issues/11", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-63xx/CVE-2025-6363.json b/CVE-2025/CVE-2025-63xx/CVE-2025-6363.json index 5f5d38dfd78..b9c7888bc4c 100644 --- a/CVE-2025/CVE-2025-63xx/CVE-2025-6363.json +++ b/CVE-2025/CVE-2025-63xx/CVE-2025-6363.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6363", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-20T20:15:35.003", - "lastModified": "2025-06-20T20:15:35.003", + "lastModified": "2025-06-23T16:15:28.830", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in code-projects Simple Pizza Ordering System 1.0. Affected is an unknown function of the file /adding-exec.php. The manipulation of the argument ingname leads to sql injection. It is possible to launch the attack remotely." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en code-projects Simple Pizza Ordering System 1.0. Se ve afectada una funci\u00f3n desconocida del archivo /adding-exec.php. La manipulaci\u00f3n del argumento ingname provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.597304", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/rom4j/cve/issues/7", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-63xx/CVE-2025-6364.json b/CVE-2025/CVE-2025-63xx/CVE-2025-6364.json index 66edece0d2a..16a4f3d7f75 100644 --- a/CVE-2025/CVE-2025-63xx/CVE-2025-6364.json +++ b/CVE-2025/CVE-2025-63xx/CVE-2025-6364.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6364", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-20T21:15:22.957", - "lastModified": "2025-06-20T21:15:22.957", + "lastModified": "2025-06-23T16:15:28.960", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in code-projects Simple Pizza Ordering System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /adduser-exec.php. The manipulation of the argument Username leads to sql injection. The attack can be launched remotely." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en code-projects Simple Pizza Ordering System 1.0, clasificada como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /adduser-exec.php. La manipulaci\u00f3n del argumento \"Username\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.597305", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/rom4j/cve/issues/6", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-63xx/CVE-2025-6365.json b/CVE-2025/CVE-2025-63xx/CVE-2025-6365.json index 8bbbd34d4e9..1604ab823ef 100644 --- a/CVE-2025/CVE-2025-63xx/CVE-2025-6365.json +++ b/CVE-2025/CVE-2025-63xx/CVE-2025-6365.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6365", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-20T21:15:23.140", - "lastModified": "2025-06-20T21:15:23.140", + "lastModified": "2025-06-23T16:15:29.093", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in HobbesOSR Kitten up to c4f8b7c3158983d1020af432be1b417b28686736 and classified as critical. Affected by this issue is the function set_pte_at in the library /include/arch-arm64/pgtable.h. The manipulation leads to resource consumption. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en HobbesOSR Kitten hasta c4f8b7c3158983d1020af432be1b417b28686736, clasificada como cr\u00edtica. Este problema afecta a la funci\u00f3n set_pte_at de la librer\u00eda /include/arch-arm64/pgtable.h. Esta manipulaci\u00f3n consume recursos. Este producto utiliza la entrega continua con versiones continuas. Por lo tanto, no se dispone de detalles de las versiones afectadas ni de las versiones actualizadas." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +140,10 @@ { "url": "https://vuldb.com/?submit.597382", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/HobbesOSR/kitten/issues/17", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-63xx/CVE-2025-6367.json b/CVE-2025/CVE-2025-63xx/CVE-2025-6367.json index 2080913387e..42968abc10e 100644 --- a/CVE-2025/CVE-2025-63xx/CVE-2025-6367.json +++ b/CVE-2025/CVE-2025-63xx/CVE-2025-6367.json @@ -2,7 +2,7 @@ "id": "CVE-2025-6367", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-20T21:15:23.327", - "lastModified": "2025-06-20T21:15:23.327", + "lastModified": "2025-06-23T16:15:29.233", "vulnStatus": "Received", "cveTags": [ { @@ -16,6 +16,10 @@ { "lang": "en", "value": "A vulnerability was found in D-Link DIR-619L 2.06B01. It has been declared as critical. This vulnerability affects unknown code of the file /goform/formSetDomainFilter. The manipulation of the argument curTime/sched_name_%d/url_%d leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en D-Link DIR-619L 2.06B01. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /goform/formSetDomainFilter. La manipulaci\u00f3n del argumento curTime/sched_name_%d/url_%d provoca un desbordamiento del b\u00fafer basado en la pila. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante." } ], "metrics": { @@ -66,7 +70,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -114,7 +118,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -147,6 +151,10 @@ { "url": "https://www.dlink.com/", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-63xx/CVE-2025-6372.json b/CVE-2025/CVE-2025-63xx/CVE-2025-6372.json index 09c67ef6b83..d02e2d07cf8 100644 --- a/CVE-2025/CVE-2025-63xx/CVE-2025-6372.json +++ b/CVE-2025/CVE-2025-63xx/CVE-2025-6372.json @@ -2,7 +2,7 @@ "id": "CVE-2025-6372", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-20T23:15:20.077", - "lastModified": "2025-06-20T23:15:20.077", + "lastModified": "2025-06-23T16:15:29.363", "vulnStatus": "Received", "cveTags": [ { @@ -16,6 +16,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in D-Link DIR-619L 2.06B01. This affects the function formSetWizard1 of the file /goform/formSetWizard1. The manipulation of the argument curTime leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en D-Link DIR-619L 2.06B01. Esta afecta a la funci\u00f3n formSetWizard1 del archivo /goform/formSetWizard1. La manipulaci\u00f3n del argumento curTime provoca un desbordamiento del b\u00fafer en la pila. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante." } ], "metrics": { @@ -66,7 +70,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -114,7 +118,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -147,6 +151,10 @@ { "url": "https://www.dlink.com/", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-65xx/CVE-2025-6509.json b/CVE-2025/CVE-2025-65xx/CVE-2025-6509.json new file mode 100644 index 00000000000..1c9abe6fabc --- /dev/null +++ b/CVE-2025/CVE-2025-65xx/CVE-2025-6509.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-6509", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-23T16:15:29.560", + "lastModified": "2025-06-23T16:15:29.560", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in seaswalker spring-analysis up to 4379cce848af96997a9d7ef91d594aa129be8d71. It has been declared as problematic. Affected by this vulnerability is the function echo of the file /src/main/java/controller/SimpleController.java. The manipulation of the argument Name leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250609-01/report.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250609-01/report.md#steps-to-reproduce", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.313621", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.313621", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.592962", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-65xx/CVE-2025-6510.json b/CVE-2025/CVE-2025-65xx/CVE-2025-6510.json new file mode 100644 index 00000000000..671df3532b5 --- /dev/null +++ b/CVE-2025/CVE-2025-65xx/CVE-2025-6510.json @@ -0,0 +1,153 @@ +{ + "id": "CVE-2025-6510", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-23T16:15:29.770", + "lastModified": "2025-06-23T16:15:29.770", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Netgear EX6100 1.0.2.28_1.1.138. It has been rated as critical. Affected by this issue is the function sub_415EF8. The manipulation leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear#poc", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.313622", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.313622", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.593678", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.595995", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.netgear.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-65xx/CVE-2025-6511.json b/CVE-2025/CVE-2025-65xx/CVE-2025-6511.json new file mode 100644 index 00000000000..c47c2d486fc --- /dev/null +++ b/CVE-2025/CVE-2025-65xx/CVE-2025-6511.json @@ -0,0 +1,153 @@ +{ + "id": "CVE-2025-6511", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-23T17:15:32.347", + "lastModified": "2025-06-23T17:15:32.347", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in Netgear EX6150 1.0.0.46_1.0.76. This affects the function sub_410090. The manipulation leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear#poc", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.313623", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.313623", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.595999", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.596008", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.netgear.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-65xx/CVE-2025-6516.json b/CVE-2025/CVE-2025-65xx/CVE-2025-6516.json new file mode 100644 index 00000000000..aea9c6895fc --- /dev/null +++ b/CVE-2025/CVE-2025-65xx/CVE-2025-6516.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-6516", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-23T17:15:32.550", + "lastModified": "2025-06-23T17:15:32.550", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in HDF5 up to 1.14.6 and classified as critical. This vulnerability affects the function H5F_addr_decode_len of the file /hdf5/src/H5Fint.c. The manipulation leads to heap-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 4.3, + "accessVector": "LOCAL", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 3.1, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/HDFGroup/hdf5/issues/5581", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/user-attachments/files/20626851/reproduce.tar.gz", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.313636", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.313636", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.592589", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 5500d093ded..02fc6b62a46 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-23T16:00:28.688260+00:00 +2025-06-23T18:00:26.982876+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-06-23T15:25:05.683000+00:00 +2025-06-23T17:15:32.550000+00:00 ``` ### Last Data Feed Release @@ -33,59 +33,55 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -299091 +299102 ``` ### CVEs added in the last Commit -Recently added CVEs: `15` +Recently added CVEs: `11` -- [CVE-2023-47297](CVE-2023/CVE-2023-472xx/CVE-2023-47297.json) (`2025-06-23T15:15:25.940`) -- [CVE-2023-47298](CVE-2023/CVE-2023-472xx/CVE-2023-47298.json) (`2025-06-23T15:15:26.700`) -- [CVE-2023-48978](CVE-2023/CVE-2023-489xx/CVE-2023-48978.json) (`2025-06-23T15:15:26.890`) -- [CVE-2025-2171](CVE-2025/CVE-2025-21xx/CVE-2025-2171.json) (`2025-06-23T14:15:26.437`) -- [CVE-2025-2172](CVE-2025/CVE-2025-21xx/CVE-2025-2172.json) (`2025-06-23T14:15:26.607`) -- [CVE-2025-46101](CVE-2025/CVE-2025-461xx/CVE-2025-46101.json) (`2025-06-23T15:15:27.793`) -- [CVE-2025-48700](CVE-2025/CVE-2025-487xx/CVE-2025-48700.json) (`2025-06-23T15:15:27.930`) -- [CVE-2025-52542](CVE-2025/CVE-2025-525xx/CVE-2025-52542.json) (`2025-06-23T14:15:26.753`) -- [CVE-2025-52875](CVE-2025/CVE-2025-528xx/CVE-2025-52875.json) (`2025-06-23T15:15:28.260`) -- [CVE-2025-52876](CVE-2025/CVE-2025-528xx/CVE-2025-52876.json) (`2025-06-23T15:15:28.447`) -- [CVE-2025-52877](CVE-2025/CVE-2025-528xx/CVE-2025-52877.json) (`2025-06-23T15:15:28.603`) -- [CVE-2025-52878](CVE-2025/CVE-2025-528xx/CVE-2025-52878.json) (`2025-06-23T15:15:28.770`) -- [CVE-2025-52879](CVE-2025/CVE-2025-528xx/CVE-2025-52879.json) (`2025-06-23T15:15:28.933`) -- [CVE-2025-52967](CVE-2025/CVE-2025-529xx/CVE-2025-52967.json) (`2025-06-23T15:15:29.163`) -- [CVE-2025-52968](CVE-2025/CVE-2025-529xx/CVE-2025-52968.json) (`2025-06-23T15:15:29.350`) +- [CVE-2023-47031](CVE-2023/CVE-2023-470xx/CVE-2023-47031.json) (`2025-06-23T17:15:27.313`) +- [CVE-2023-47032](CVE-2023/CVE-2023-470xx/CVE-2023-47032.json) (`2025-06-23T16:15:23.920`) +- [CVE-2023-47294](CVE-2023/CVE-2023-472xx/CVE-2023-47294.json) (`2025-06-23T16:15:24.493`) +- [CVE-2023-47295](CVE-2023/CVE-2023-472xx/CVE-2023-47295.json) (`2025-06-23T16:15:24.623`) +- [CVE-2023-50450](CVE-2023/CVE-2023-504xx/CVE-2023-50450.json) (`2025-06-23T16:15:24.743`) +- [CVE-2025-4563](CVE-2025/CVE-2025-45xx/CVE-2025-4563.json) (`2025-06-23T16:15:27.350`) +- [CVE-2025-52969](CVE-2025/CVE-2025-529xx/CVE-2025-52969.json) (`2025-06-23T17:15:31.137`) +- [CVE-2025-6509](CVE-2025/CVE-2025-65xx/CVE-2025-6509.json) (`2025-06-23T16:15:29.560`) +- [CVE-2025-6510](CVE-2025/CVE-2025-65xx/CVE-2025-6510.json) (`2025-06-23T16:15:29.770`) +- [CVE-2025-6511](CVE-2025/CVE-2025-65xx/CVE-2025-6511.json) (`2025-06-23T17:15:32.347`) +- [CVE-2025-6516](CVE-2025/CVE-2025-65xx/CVE-2025-6516.json) (`2025-06-23T17:15:32.550`) ### CVEs modified in the last Commit -Recently modified CVEs: `95` +Recently modified CVEs: `27` -- [CVE-2025-6406](CVE-2025/CVE-2025-64xx/CVE-2025-6406.json) (`2025-06-23T15:15:31.280`) -- [CVE-2025-6407](CVE-2025/CVE-2025-64xx/CVE-2025-6407.json) (`2025-06-23T15:15:31.400`) -- [CVE-2025-6408](CVE-2025/CVE-2025-64xx/CVE-2025-6408.json) (`2025-06-23T15:15:31.527`) -- [CVE-2025-6413](CVE-2025/CVE-2025-64xx/CVE-2025-6413.json) (`2025-06-23T15:15:31.657`) -- [CVE-2025-6414](CVE-2025/CVE-2025-64xx/CVE-2025-6414.json) (`2025-06-23T15:15:31.800`) -- [CVE-2025-6415](CVE-2025/CVE-2025-64xx/CVE-2025-6415.json) (`2025-06-23T15:15:31.930`) -- [CVE-2025-6416](CVE-2025/CVE-2025-64xx/CVE-2025-6416.json) (`2025-06-23T15:15:32.057`) -- [CVE-2025-6417](CVE-2025/CVE-2025-64xx/CVE-2025-6417.json) (`2025-06-23T15:15:32.183`) -- [CVE-2025-6418](CVE-2025/CVE-2025-64xx/CVE-2025-6418.json) (`2025-06-23T15:15:32.307`) -- [CVE-2025-6419](CVE-2025/CVE-2025-64xx/CVE-2025-6419.json) (`2025-06-23T15:15:32.433`) -- [CVE-2025-6420](CVE-2025/CVE-2025-64xx/CVE-2025-6420.json) (`2025-06-23T15:15:32.560`) -- [CVE-2025-6421](CVE-2025/CVE-2025-64xx/CVE-2025-6421.json) (`2025-06-23T15:15:32.680`) -- [CVE-2025-6452](CVE-2025/CVE-2025-64xx/CVE-2025-6452.json) (`2025-06-23T15:15:32.813`) -- [CVE-2025-6453](CVE-2025/CVE-2025-64xx/CVE-2025-6453.json) (`2025-06-23T15:15:32.937`) -- [CVE-2025-6455](CVE-2025/CVE-2025-64xx/CVE-2025-6455.json) (`2025-06-23T15:15:33.073`) -- [CVE-2025-6456](CVE-2025/CVE-2025-64xx/CVE-2025-6456.json) (`2025-06-23T15:15:33.230`) -- [CVE-2025-6457](CVE-2025/CVE-2025-64xx/CVE-2025-6457.json) (`2025-06-23T15:15:33.357`) -- [CVE-2025-6458](CVE-2025/CVE-2025-64xx/CVE-2025-6458.json) (`2025-06-23T15:15:33.497`) -- [CVE-2025-6466](CVE-2025/CVE-2025-64xx/CVE-2025-6466.json) (`2025-06-23T15:15:34.440`) -- [CVE-2025-6467](CVE-2025/CVE-2025-64xx/CVE-2025-6467.json) (`2025-06-23T14:15:27.473`) -- [CVE-2025-6477](CVE-2025/CVE-2025-64xx/CVE-2025-6477.json) (`2025-06-23T14:15:28.330`) -- [CVE-2025-6498](CVE-2025/CVE-2025-64xx/CVE-2025-6498.json) (`2025-06-23T14:15:28.950`) -- [CVE-2025-6499](CVE-2025/CVE-2025-64xx/CVE-2025-6499.json) (`2025-06-23T14:15:29.077`) -- [CVE-2025-6500](CVE-2025/CVE-2025-65xx/CVE-2025-6500.json) (`2025-06-23T14:15:29.207`) -- [CVE-2025-6501](CVE-2025/CVE-2025-65xx/CVE-2025-6501.json) (`2025-06-23T14:15:29.337`) +- [CVE-2025-23121](CVE-2025/CVE-2025-231xx/CVE-2025-23121.json) (`2025-06-19T00:15:21.260`) +- [CVE-2025-23168](CVE-2025/CVE-2025-231xx/CVE-2025-23168.json) (`2025-06-19T00:15:21.377`) +- [CVE-2025-23169](CVE-2025/CVE-2025-231xx/CVE-2025-23169.json) (`2025-06-19T00:15:21.497`) +- [CVE-2025-23170](CVE-2025/CVE-2025-231xx/CVE-2025-23170.json) (`2025-06-19T00:15:21.620`) +- [CVE-2025-23171](CVE-2025/CVE-2025-231xx/CVE-2025-23171.json) (`2025-06-19T00:15:21.743`) +- [CVE-2025-23172](CVE-2025/CVE-2025-231xx/CVE-2025-23172.json) (`2025-06-19T00:15:21.857`) +- [CVE-2025-23173](CVE-2025/CVE-2025-231xx/CVE-2025-23173.json) (`2025-06-19T00:15:21.977`) +- [CVE-2025-24286](CVE-2025/CVE-2025-242xx/CVE-2025-24286.json) (`2025-06-19T00:15:22.093`) +- [CVE-2025-24287](CVE-2025/CVE-2025-242xx/CVE-2025-24287.json) (`2025-06-19T00:15:22.207`) +- [CVE-2025-24288](CVE-2025/CVE-2025-242xx/CVE-2025-24288.json) (`2025-06-19T00:15:22.323`) +- [CVE-2025-24291](CVE-2025/CVE-2025-242xx/CVE-2025-24291.json) (`2025-06-19T00:15:22.437`) +- [CVE-2025-43947](CVE-2025/CVE-2025-439xx/CVE-2025-43947.json) (`2025-04-23T14:08:13.383`) +- [CVE-2025-50054](CVE-2025/CVE-2025-500xx/CVE-2025-50054.json) (`2025-06-20T07:15:26.367`) +- [CVE-2025-52968](CVE-2025/CVE-2025-529xx/CVE-2025-52968.json) (`2025-06-23T17:15:30.990`) +- [CVE-2025-6353](CVE-2025/CVE-2025-63xx/CVE-2025-6353.json) (`2025-06-23T16:15:28.043`) +- [CVE-2025-6354](CVE-2025/CVE-2025-63xx/CVE-2025-6354.json) (`2025-06-23T16:15:28.183`) +- [CVE-2025-6355](CVE-2025/CVE-2025-63xx/CVE-2025-6355.json) (`2025-06-23T16:15:28.320`) +- [CVE-2025-6356](CVE-2025/CVE-2025-63xx/CVE-2025-6356.json) (`2025-06-23T16:15:28.447`) +- [CVE-2025-6358](CVE-2025/CVE-2025-63xx/CVE-2025-6358.json) (`2025-06-23T16:15:28.577`) +- [CVE-2025-6359](CVE-2025/CVE-2025-63xx/CVE-2025-6359.json) (`2025-06-23T16:15:28.707`) +- [CVE-2025-6363](CVE-2025/CVE-2025-63xx/CVE-2025-6363.json) (`2025-06-23T16:15:28.830`) +- [CVE-2025-6364](CVE-2025/CVE-2025-63xx/CVE-2025-6364.json) (`2025-06-23T16:15:28.960`) +- [CVE-2025-6365](CVE-2025/CVE-2025-63xx/CVE-2025-6365.json) (`2025-06-23T16:15:29.093`) +- [CVE-2025-6367](CVE-2025/CVE-2025-63xx/CVE-2025-6367.json) (`2025-06-23T16:15:29.233`) +- [CVE-2025-6372](CVE-2025/CVE-2025-63xx/CVE-2025-6372.json) (`2025-06-23T16:15:29.363`) ## Download and Usage diff --git a/_state.csv b/_state.csv index ce0b067f550..6daadea1078 100644 --- a/_state.csv +++ b/_state.csv @@ -138435,7 +138435,7 @@ CVE-2019-2479,0,0,e0c7a602157a3a3233e2924456cab0b3e874e1a14c59e46b40d40a581b865b CVE-2019-2480,0,0,6eea42436df236a96df3c2182dde88be080c2d91d3678fb57a7c2f7ad95e7702,2024-11-21T04:40:57.403000 CVE-2019-2481,0,0,2c7f842fe90c4c9c7c6cf8044eaff1b070218ab2ebd7b7b65afbfc4acbbc5150,2024-11-21T04:40:57.523000 CVE-2019-2482,0,0,60afa5b90bf8c3578bc6106e4f975267fcbb563b3067e9521d1bdccda2a87afd,2024-11-21T04:40:57.660000 -CVE-2019-2483,0,1,188ec2ef5d16f6941794dea2b1c3928f0252c43dadd311428b3a69b6703d371a,2025-06-23T15:21:09.487000 +CVE-2019-2483,0,0,188ec2ef5d16f6941794dea2b1c3928f0252c43dadd311428b3a69b6703d371a,2025-06-23T15:21:09.487000 CVE-2019-2484,0,0,a7715493c3547f6d9e809f816d1813c2921c76b2c7dc1546f30b1b68849ed9de,2024-11-21T04:40:57.780000 CVE-2019-2485,0,0,76d018af106f8af9fdc20711cbfe38a23bc7f9c5c4b44cb18c66175ee6e482c3,2024-11-21T04:40:57.893000 CVE-2019-2486,0,0,4d94fca994706eacfa9aa52f25dc23c95c1e49d831e7a7b89436c2cc7cb6710b,2024-11-21T04:40:58.017000 @@ -237901,6 +237901,8 @@ CVE-2023-47022,0,0,73d82f89852a7fe6d598baa6e948b789fe12b29f69f371d14a570d87cb620 CVE-2023-47024,0,0,c125fb103042924f5281e92be53a4da5c6431c794e2412cda8329c78f5f25120,2025-06-17T17:15:31.783000 CVE-2023-47025,0,0,66fd4d735d74f56390288fda0ceba4f40992fc464fda52a22d2276e16b06cc2e,2024-11-21T08:29:38.117000 CVE-2023-4703,0,0,a6d5e78e1192a3e0f4c01547c7f4ce3e0b04c7358d175d4096197c6b6119861c,2025-06-20T17:15:34.147000 +CVE-2023-47031,1,1,a8e93fd51520b4974986e0b69c7c4ddc9e00a730f0784dd85cdf7e2d377ab9fe,2025-06-23T17:15:27.313000 +CVE-2023-47032,1,1,88713d4ca136a466d014f7b97f26f67b61fc67d85e63960eae1c5bf38e727a10,2025-06-23T16:15:23.920000 CVE-2023-47033,0,0,617818e306c20ade59924bf4bbac6b004808fa5a2cfbab4ec0f03a5ee1b8b8ca,2025-05-30T15:15:23.810000 CVE-2023-47034,0,0,6a1f244f30344c3a3a74d180948a6a04b3859761d9cd9932f89f0d7068dfd697,2024-11-21T08:29:38.427000 CVE-2023-47035,0,0,81ca6ef6853b599b11605e195d2498aff6e67a10accc5ef3988bd57869c19cef,2025-05-30T15:15:24.013000 @@ -238131,8 +238133,10 @@ CVE-2023-4728,0,0,c339ab5d87c7af4ab30b66d47f7562aee044b141169095045add07af35952c CVE-2023-47282,0,0,93bba9396c0f58046a2b076dfea038b721d5ee4b96d78dc125aa534f53adb836,2024-11-21T08:30:07.197000 CVE-2023-47283,0,0,6caec9eee746cdac4ea27e9ab2b0209b5ee8c2d3553a8d29b97a8533862b9ad7,2024-11-21T08:30:07.433000 CVE-2023-4729,0,0,f77231c363b30e96bfc2db8cebd3839401370fbb7b50252d996e4c9ee1c2023f,2025-01-15T16:31:19.903000 -CVE-2023-47297,1,1,bbc46bc58ac1926acbf94fee7d212b14084705214e921a768d0e141589037753,2025-06-23T15:15:25.940000 -CVE-2023-47298,1,1,9592c320400df1379afbda3cccc4c0739e5987b5988942cfee940d4537d295e3,2025-06-23T15:15:26.700000 +CVE-2023-47294,1,1,d8554dad4af058ac7998498e3eedba8cdbc3a03f6ba24980226a84f041a77ee1,2025-06-23T16:15:24.493000 +CVE-2023-47295,1,1,c0f92ae71b07a596eeb84a282b19c906d3be5203af9c2dd26e2f399bd7b5deb9,2025-06-23T16:15:24.623000 +CVE-2023-47297,0,0,bbc46bc58ac1926acbf94fee7d212b14084705214e921a768d0e141589037753,2025-06-23T15:15:25.940000 +CVE-2023-47298,0,0,9592c320400df1379afbda3cccc4c0739e5987b5988942cfee940d4537d295e3,2025-06-23T15:15:26.700000 CVE-2023-4730,0,0,f9bd47caac18f229be27cadc18d87104be690bdb4cd5c89d5981d2f7932f458a,2024-08-19T13:00:23.117000 CVE-2023-47304,0,0,db46d98bf37576c1ea41928ed0e02027d39d0face4fca78440b8bb53d0e89930,2024-11-21T08:30:07.553000 CVE-2023-47307,0,0,112c4fcd2316630545c0b8214cf0e27b8ce26f6bb0e9c99277c68ca8f2b8777e,2024-11-21T08:30:07.700000 @@ -239415,7 +239419,7 @@ CVE-2023-48966,0,0,c88c2027c13e6fd2aaa41bb08a633ab1482cdd3b1061751f9ee7fc5ae02c4 CVE-2023-48967,0,0,1cd351e34d0367ca1f2c697aa81b0efac29357ca75fe471f5d64e2558fda969d,2024-11-21T08:32:40.463000 CVE-2023-4897,0,0,07a390e0b63403258ae68e36ca13ea1f5f83204b2e2ad36e8736ce5043b6943d,2024-11-21T08:36:12.803000 CVE-2023-48974,0,0,e5c2b099db521bf37d9fbf8a5d47d0a5c7f75b442894bf87ae88502412b1de09,2025-06-17T16:15:24.747000 -CVE-2023-48978,1,1,4f3036d1d6e93e4a5c04bc12686605e2756472c9169b822786ca695526c6e352,2025-06-23T15:15:26.890000 +CVE-2023-48978,0,0,4f3036d1d6e93e4a5c04bc12686605e2756472c9169b822786ca695526c6e352,2025-06-23T15:15:26.890000 CVE-2023-4898,0,0,f47d5fad93de142b0e520dbe68d4d69341d7e4d308a26e168d2cf20373685375,2024-11-21T08:36:12.940000 CVE-2023-48985,0,0,6085ceaceb9bc984350ad484b7164b84ca1f82a570dc5327d198eae93291cec3,2025-03-19T15:15:45.800000 CVE-2023-48986,0,0,ff6e6738309e970dc01f18950378d453c2d15ac175ea278c464f5c9442a4fb5e,2025-03-20T14:15:16.100000 @@ -240470,6 +240474,7 @@ CVE-2023-50447,0,0,3b21483f93a61c36d17c54e0e41c9704319aa4bb30ed9f5f7c0bbdda96e01 CVE-2023-50448,0,0,1356900f30989b11a427d95591f2fc88232d31d851bd0fac96eb18865bdb0f57,2024-11-21T08:37:01.203000 CVE-2023-50449,0,0,ba270c267a15999c5436411e78a8d97ec1196d3bb1ec0bc251b111bb6e5f871a,2024-11-21T08:37:01.360000 CVE-2023-5045,0,0,79d8cf6ee5e9a4b50139a237bce749eaaf7a601766908d94e71febe8668c11b0,2024-11-21T08:40:57.920000 +CVE-2023-50450,1,1,867f50ca34f4d8ba1ae4eaf000c11978a0190ed0a8351ab251387cb32cfdee12,2025-06-23T16:15:24.743000 CVE-2023-50453,0,0,76d310904c175d9636c853af62d4f3f3ad8ffd78a8288d3d4c4903fddbeede50,2024-11-21T08:37:01.517000 CVE-2023-50454,0,0,bfaedf03326a6acc4075b380331bfd96efd576ce55b3819a4e641140e3d7172a,2024-11-21T08:37:01.673000 CVE-2023-50455,0,0,cf36f17a14a454b579fdc438155082da9fe3202a2d2238909649381efcfac5b3,2024-11-21T08:37:01.837000 @@ -251102,7 +251107,7 @@ CVE-2024-21202,0,0,a82724b3e343bc702e27e8d6ce800a916f4b3f0e013f2e090965b5628d482 CVE-2024-21203,0,0,479844f4f758f4b28553f6669f6d21014910b665e890542aa411088e0f38c63f,2025-03-13T14:15:21.097000 CVE-2024-21204,0,0,6e02d97c4802b20054f3c4f36b4262d4579d51c4dad414b899b7f47595986f74,2025-03-13T17:15:27.480000 CVE-2024-21205,0,0,e1826db3e18237be6dde03d7d4cc539b869d1360faa558be8561f743abd88176,2025-03-13T14:15:21.243000 -CVE-2024-21206,0,1,5b3a3f55f1e6e545de7db76a69922b7ae6c94d3fb1466d27fe145646e96fd1ec,2025-06-23T15:20:13.090000 +CVE-2024-21206,0,0,5b3a3f55f1e6e545de7db76a69922b7ae6c94d3fb1466d27fe145646e96fd1ec,2025-06-23T15:20:13.090000 CVE-2024-21207,0,0,8943a78a85322e8f74ca9bb8757d973fc6062abdbe462a9e329a926ce38d871e,2025-03-13T14:15:21.393000 CVE-2024-21208,0,0,96a0dfd3930260cb1ded2610d57bb643c42ac376ae3a0ee18e6cec14bc49e47c,2025-06-18T20:27:14.790000 CVE-2024-21209,0,0,9f9125b2f59e97ee383b40b643ff87dbadc96541830a9dd6f1bb5908b73c9c56,2025-03-13T16:15:15.907000 @@ -252359,7 +252364,7 @@ CVE-2024-22648,0,0,bf371e82e6b8ba69838a85189fd7c617dc96a67937ae928aae96b0e09af69 CVE-2024-2265,0,0,2d9e3f6a8940d91c300a26e60fbafd657c57a52b99326912de499462a5a33db6,2025-03-11T16:53:59.010000 CVE-2024-22651,0,0,e469381682c5eb450c79d9b6a70a064ab830cecb8e16bcfbc6f7459206453c7f,2024-11-21T08:56:32.580000 CVE-2024-22653,0,0,9327c4eeb2944373f4b4615e203889d4d97ef3692e8a64646c097e9e2e698468,2025-06-18T23:57:03.917000 -CVE-2024-22654,0,1,b5f28c7505e5161dc090323e656849833aaca3354ed25a0241d10af1c9ac0770,2025-06-23T14:42:44.127000 +CVE-2024-22654,0,0,b5f28c7505e5161dc090323e656849833aaca3354ed25a0241d10af1c9ac0770,2025-06-23T14:42:44.127000 CVE-2024-2266,0,0,95d5ae8a3d9367be388b5604e19ba904305ae510fd4151f2cfa0ff7fb43bf84e,2025-03-11T16:53:46.840000 CVE-2024-22660,0,0,2311a8f71be31bc2d8e245fbbdb3d3cc97a05fbb5d0aad28b28032e7f069aa6a,2024-11-21T08:56:32.850000 CVE-2024-22662,0,0,d4858e76cafd8f287aa01b60da8f3daccb222e3defcae1979c4c8e9edd2bdc30,2024-11-21T08:56:33.027000 @@ -267710,7 +267715,7 @@ CVE-2024-42556,0,0,ac1b4152bf99bca20ae35623d62f61452a39fb306fbbee858a0a5374f0e4f CVE-2024-42557,0,0,b692a3b0466194a416876ee66549e1bd8b2c7e51a5c1228110019b0c078e3135,2025-06-05T20:18:43.920000 CVE-2024-42558,0,0,ddd5492e2b52bc68def78917541ff4f0fd5129fe9226419b3f94cbbe242b143c,2025-06-05T20:18:30.253000 CVE-2024-42559,0,0,f7187969dab6ad6558e1754351d11efdd6752164963d45cc6208ae6834946dcc,2024-08-20T19:35:10.850000 -CVE-2024-4256,0,1,56904d042cfcc221e9be33135d7de9b9558ad7f73caf11075c2a329d49e0946a,2025-06-23T15:07:20.147000 +CVE-2024-4256,0,0,56904d042cfcc221e9be33135d7de9b9558ad7f73caf11075c2a329d49e0946a,2025-06-23T15:07:20.147000 CVE-2024-42560,0,0,d8e63dfccffe358d8f5f12e10d5c3bdb3d80b3adec563f71c08b10512ad5a438,2025-06-05T20:18:17.887000 CVE-2024-42561,0,0,d70955b1d40eb54377d8e12e382907c01dc23b672669cb749222161095d7676d,2025-06-05T20:18:01.470000 CVE-2024-42562,0,0,4d5f095c6cbd840b865bd2919364e7e80c3562dd9684dd1b1a5a56be9c16cd36,2025-06-05T20:17:49.820000 @@ -269713,7 +269718,7 @@ CVE-2024-45204,0,0,c17d724ab71326993fc885d0d9808c0b2eaae94c47b7923f22dde16d2eff6 CVE-2024-45205,0,0,a10f061421a2a3424e1b6c374ce4a524c46fcb2bdda2afd1dfd63ddbb6391abd,2024-12-04T17:15:14.330000 CVE-2024-45206,0,0,d9e968acf0dd8b42fc18894be4d96b31b86b907e5133e5110d37345500c02d41,2025-03-13T19:15:48.013000 CVE-2024-45207,0,0,c6ee04eede270568245ffcec461ab781dd5d887b6f188268b86eaa3a09be9e39,2024-12-04T16:15:25.580000 -CVE-2024-45208,0,0,7215a369507849f231782490b34d0cc67523c6bd551d9fefc6a31e8c75e86c05,2025-06-19T00:15:21.097000 +CVE-2024-45208,0,1,256de394a286effeb23e2b86009f8754ccf8a94ed80f865cd5be862bae035361,2025-06-19T00:15:21.097000 CVE-2024-4521,0,0,4a1a789411022da9e12743f86f636c858525a8f77c0a3180e65a51191dfff476,2025-02-19T18:01:20.563000 CVE-2024-45216,0,0,0c858a01ee35c91ac1e5a46b34b1bd78a3671b8c7c394b48bf0907856ecc77c6,2024-11-21T09:37:28.690000 CVE-2024-45217,0,0,6810c24892f2494e2f2c08a71fcaf1b8b72831c7bb6f78dcca7b6cc985b451a7,2024-11-21T09:37:28.897000 @@ -272196,7 +272201,7 @@ CVE-2024-48758,0,0,c09d45b53d733862ccc897703fc7912f82231522c6286fcce4bbe3e958aaf CVE-2024-4876,0,0,65d8065cbe56070f462c8629050b655fbc478bb065b4ab8ba51acd1e3033dac7,2025-01-24T13:44:58.993000 CVE-2024-48760,0,0,c9b65d5513092443fa283195a16f32efdb1113d6591583c1dbffd494c29d665e,2025-06-06T15:40:58.640000 CVE-2024-48761,0,0,1f5cd512aaf966e4ccb5e27fcd626f0bc8944acedd5c7d09423e312b2b471403,2025-05-23T15:26:18.807000 -CVE-2024-48766,0,1,e39ed20bafa07adf6686698f28b3f9379175cabb32d358913bf8f98cf8307264,2025-06-23T14:59:36.530000 +CVE-2024-48766,0,0,e39ed20bafa07adf6686698f28b3f9379175cabb32d358913bf8f98cf8307264,2025-06-23T14:59:36.530000 CVE-2024-48768,0,0,20dc94e5053f6f0d8d7caf706bf6fcb813042430158ff64dc7ecde51efb03a2d,2024-10-15T21:35:32.950000 CVE-2024-48769,0,0,881e0b4b29e63d860dc80c7571762519af749fe3f9ba6f317c2855a4a66d7008,2024-10-15T19:35:39.423000 CVE-2024-4877,0,0,8ee4a62119f4539bb72579c9037b385657424188b9828b8e94e3040efd347d3a,2025-04-29T19:45:07.223000 @@ -274368,7 +274373,7 @@ CVE-2024-51530,0,0,7cd040cc53d7ba42e6f6d453f4d18993a534b39a2754ee99e99110d754af3 CVE-2024-51532,0,0,2d809e858826663dfe9250848bf54d1d67a303ccaea30e096202fdbcd858496e,2025-01-29T21:06:51.663000 CVE-2024-51534,0,0,119c8ca4d836cf97fc773cbb645e954f693ae364266f1264b856ae256ade04e3,2025-02-07T19:58:25.567000 CVE-2024-51539,0,0,b1af50f63ad59511e4a92be40db02a7d120fd35939f783b0ad1dc1ad8e6b0102,2025-02-25T14:15:31.153000 -CVE-2024-5154,0,1,9f3086a91e7d0f61e04cc464c2ac0ea5eaf14623ec838410d0539c97fd02a63e,2025-06-23T14:15:26.073000 +CVE-2024-5154,0,0,9f3086a91e7d0f61e04cc464c2ac0ea5eaf14623ec838410d0539c97fd02a63e,2025-06-23T14:15:26.073000 CVE-2024-51540,0,0,96d82dbba2ebe404a1a2ea6174b3264f3b486447b0ab540d34ad70a82a5fc066,2025-01-21T21:30:52.310000 CVE-2024-51541,0,0,6701a109dfadee0bf9df2ae076263677d2273867a4cd8d4999c49830cdf3286f,2025-02-27T17:18:41.483000 CVE-2024-51542,0,0,51af5b7f493e16046a0353b6dff1f03aa6634aedd1a41c0133f8ad01785b2f85,2025-04-10T19:42:05.967000 @@ -274780,7 +274785,7 @@ CVE-2024-51926,0,0,3af7d3be4c078e7a2de285bfa5deb879d2e999b541df90a9975702e0878d6 CVE-2024-51927,0,0,106ca5e27a288e356fd6a7e911b64c6dfd5b7ba7258e70ff09080ea37925fb43,2024-11-19T21:56:45.533000 CVE-2024-51928,0,0,906f674464392bc223ac1e1b1f01be2b3080856baabf09c25d67edd7c45b67c3,2024-11-19T21:56:45.533000 CVE-2024-51929,0,0,cb4911d106197ddce6c702f19e318e44410a8bbb68de3fb535dfd76509b3dbdb,2024-11-19T21:56:45.533000 -CVE-2024-5193,0,1,ada3fbebfaa0bf71e803ea79382652bd82216c98f085d92a28d242464f32570c,2025-06-23T15:07:25.363000 +CVE-2024-5193,0,0,ada3fbebfaa0bf71e803ea79382652bd82216c98f085d92a28d242464f32570c,2025-06-23T15:07:25.363000 CVE-2024-51930,0,0,6a6f30179b2f818a5fbde14015f3085c671c58bd758c9148a860135e38246cda,2024-11-19T21:56:45.533000 CVE-2024-51931,0,0,f1806da64751fc947a9be6b715414a5533bb8bd4b1043efa5b37487df572a9bc,2024-11-19T21:56:45.533000 CVE-2024-51932,0,0,55673a62a416277babc704dc3092cc11640b7d2ab527b4db9563155a69c67e6a,2024-11-19T21:56:45.533000 @@ -276840,7 +276845,7 @@ CVE-2024-54767,0,0,8c4bab4764e9a141ba548ee86cbb68266367c0b9186821635463f547e3a12 CVE-2024-54772,0,0,91a3697268affbf0eb80fdd37decc58bf196ba083d66dc0e72ebb567f63733a6,2025-02-24T16:15:12.213000 CVE-2024-54774,0,0,f4729f792bb626d0ad63a36553265557f43246eb9e15e58f6f629c134348456d,2025-04-21T17:00:56.877000 CVE-2024-54775,0,0,03de079a7c10eead9e4af05c09468a6683068e1ea25d6b843a97d0b7fa560373,2025-04-22T15:46:43.310000 -CVE-2024-54779,0,1,0f2e3f4d67ddf5fdef30e273f194ac7d1055ab45d5be390367bd1f63c0a8c033,2025-06-23T14:51:38.127000 +CVE-2024-54779,0,0,0f2e3f4d67ddf5fdef30e273f194ac7d1055ab45d5be390367bd1f63c0a8c033,2025-06-23T14:51:38.127000 CVE-2024-5478,0,0,db0e3beae9848430f36a4effd5045d24657a32915031caa2ccdcaa2667957312,2024-11-21T09:47:45.637000 CVE-2024-54780,0,0,97aeac9148437d0ba8a5fd67ab0a34cd99c35df10abeb3e7cb7208a15fc9f6c4,2025-06-13T13:03:51.367000 CVE-2024-5479,0,0,f92bceb83a5a9014c15956c2e58b8be8249c2eaaa0c8984e346563da1cce7cef,2024-11-21T09:47:45.750000 @@ -278231,7 +278236,7 @@ CVE-2024-57261,0,0,26a9b2d5b7ff5b622e87fcd3863f1f802b79a7b6bbd571d956e44c1603185 CVE-2024-57262,0,0,9fe2f40763eda4120983592ae7a5e38429477dc711d137d5de6a923fed11e57b,2025-02-19T02:15:08.677000 CVE-2024-5727,0,0,fa88f56a97866359bbc0b65df783d5b0244efde0cef8aa399c3e096ccc969a63,2025-05-19T20:47:23.443000 CVE-2024-57272,0,0,dbc324cdb83c481b4de69dd5fc8cc4b86ee368b27cc30cc7365a1b8df8dc0a02,2025-01-28T20:15:54.870000 -CVE-2024-57273,0,1,42528cdfe2635b7b90df075849cf292a0caf64eda2c4e5c47fd4162c44013aec,2025-06-23T14:50:34.313000 +CVE-2024-57273,0,0,42528cdfe2635b7b90df075849cf292a0caf64eda2c4e5c47fd4162c44013aec,2025-06-23T14:50:34.313000 CVE-2024-57276,0,0,21b620c07e0e3337064dc5d61a9e1c6b46709ad965f39dbfecad11193ff5bb9d,2025-01-30T22:15:09.297000 CVE-2024-57277,0,0,bb68fea6cbebd0a104ef91fc94412518559f48ccb229cfa7844f6afcc432f01f,2025-02-05T17:15:21.863000 CVE-2024-57278,0,0,5802b511c82f2f71ef9a786cc45e5ccdffc451e02dca104a266adf57fe298a49,2025-02-07T23:15:14.230000 @@ -281379,7 +281384,7 @@ CVE-2024-8519,0,0,6d09c03bb5c0676e2db6d7de8b2d6bfb1c8c549009d82d08f9b45ce64c552e CVE-2024-8520,0,0,ee5e313bdd2082e7ac0347f97a4f567f3e181986d8d2c028c9afe06673efefeb,2024-10-08T21:50:30.153000 CVE-2024-8521,0,0,f9b371241b659e5641a68121d0175d4d79935b6aa87350515395e868afaa92d1,2025-06-04T16:56:10.697000 CVE-2024-8522,0,0,3ac21e73fb1c10b4b5ed0e52a198a17bd9ec825a9c6d4ed8383caff4ddd53d99,2024-09-13T16:12:30.497000 -CVE-2024-8523,0,1,44421ed02bc08ce2faed0d67ae6d1aba60b9f198d27b1b8b06fe7bf129d33e7a,2025-06-23T15:07:51.127000 +CVE-2024-8523,0,0,44421ed02bc08ce2faed0d67ae6d1aba60b9f198d27b1b8b06fe7bf129d33e7a,2025-06-23T15:07:51.127000 CVE-2024-8524,0,0,33b79bd5f5f8b1f6caea1361e2709fb9f6e9ffdb86bbfb1fd17fb49f4b2255d5,2025-04-01T20:31:52.367000 CVE-2024-8525,0,0,e40fe06cb9d6da5dea832197d70784a726c2e86485a80664114babe1f94175e1,2024-11-21T16:15:27.217000 CVE-2024-8526,0,0,87a88335b350126bc897aa9b90f3452321356859016838db3ea06327abc68688,2024-11-21T16:15:27.437000 @@ -283835,7 +283840,7 @@ CVE-2025-1373,0,0,77cfaa3a6771902b072de962115d7552a47b140ae8333a2256741e5279e5fe CVE-2025-1374,0,0,cadb80f4dd4c990bddb9a04d1d5b86061bf8cb9c94d8d0e9a8e4622fd190d028,2025-02-24T12:39:38.450000 CVE-2025-1376,0,0,2b2b61cbe13de588e58e77dbd2d6ba8599c2b392d8f7811bef18ce22646e2214,2025-02-17T05:15:09.807000 CVE-2025-1377,0,0,19be1f82dafea985fb389f6935710bf6fb3889bba10c10bc1ad76bf361c5c361,2025-02-17T05:15:10.090000 -CVE-2025-1378,0,1,7b0b1440e8634b58b74747d3b86a48aac3845e3d771526460c32a15ff40576ad,2025-06-23T14:37:28.747000 +CVE-2025-1378,0,0,7b0b1440e8634b58b74747d3b86a48aac3845e3d771526460c32a15ff40576ad,2025-06-23T14:37:28.747000 CVE-2025-1379,0,0,5dcb3165f40d5545ed4ce19a6009cd3b7b7246346d15ef8a292528f915f8199d,2025-04-02T18:44:42.610000 CVE-2025-1380,0,0,6bd04dd2008ea0079e8919e2e53c4972b6e83c3f4c56a4b8715e29739c2e265b,2025-04-02T19:01:09.913000 CVE-2025-1381,0,0,0527ab2734ccec4269c70fb2d0d40ea59b49fa3f3723a4356fee1835e38fef1a,2025-04-11T18:38:03.400000 @@ -284287,7 +284292,7 @@ CVE-2025-1920,0,0,fe1bfe7d3968a4bee0153a90d7c96939434eef45f8e8313d77416606c59a2b CVE-2025-1921,0,0,ba74c018bcf5faf8a06ccf49ccb3d218a4283defa0404c6fedf537f78ae8c0db,2025-04-01T20:42:02.037000 CVE-2025-1922,0,0,ffe3afa46e41291810fea1180110899b162ac00bfd72f4ed17aed7281078e346,2025-04-01T20:41:48.893000 CVE-2025-1923,0,0,6582409071430538ff195b4cf1ccfbfda63320893f755839ae619a5289f82d8c,2025-04-01T20:41:40.067000 -CVE-2025-1925,0,1,ed33e020c6c799e97809a4da2f8b3e738413c3ef2ebfe4deea0f92aa1a0fd65e,2025-06-23T15:10:37.883000 +CVE-2025-1925,0,0,ed33e020c6c799e97809a4da2f8b3e738413c3ef2ebfe4deea0f92aa1a0fd65e,2025-06-23T15:10:37.883000 CVE-2025-1926,0,0,4221b375af30e7037e93f37efe9c0a6378338767f4a8a8f0236af0d6a028f3db,2025-05-26T02:32:26.917000 CVE-2025-1930,0,0,e27d05864f3d9f6ebafc49ef3fedf20597ddb9434fbbf0c2cd1b8fbc38c09f10,2025-04-04T15:16:09.610000 CVE-2025-1931,0,0,af8164fe526ea731987cc7549eea9e98de73d45458537b9e7803f34ece876fe1,2025-04-03T13:29:22.950000 @@ -284497,7 +284502,7 @@ CVE-2025-20184,0,0,9eb256a52263cf40f2a0e3559972cb02a910d9338675658a6b6e99c16dd38 CVE-2025-20185,0,0,d91cdec4770a3b57d38bd59b46eef47ee3c325e1ce185af9d0c0b74204bb3b1c,2025-02-05T17:15:25.883000 CVE-2025-20186,0,0,988f7f1d2645d1b97028fb13ba80ac27036d7d2054583bffc040f1b4de466626,2025-05-08T14:39:09.683000 CVE-2025-20187,0,0,49cb1bb2460f1bf94d25f953e4816fb4704910b25f07a14f891f757e44af242f,2025-05-08T14:39:09.683000 -CVE-2025-20188,0,1,80a0c043db9ae0ef650c538fc232514e7650309e09c1117b267293be7fa27255,2025-06-23T15:15:11.117000 +CVE-2025-20188,0,0,80a0c043db9ae0ef650c538fc232514e7650309e09c1117b267293be7fa27255,2025-06-23T15:15:11.117000 CVE-2025-20189,0,0,80748ec81ef3d0bfea0a8fd1c737694e12cc44ced3d0cbf30c347d4a66ab6799,2025-05-08T14:39:09.683000 CVE-2025-2019,0,0,ce7a9cbc0a7eb98392e8b644905555ade42dac13612963c992df55a4ab3df595,2025-03-11T21:15:53.337000 CVE-2025-20190,0,0,469a86e281a91f6666aba5167ba034aae7aaa490b577c894f7d420858aa81096,2025-05-08T14:39:09.683000 @@ -285180,7 +285185,7 @@ CVE-2025-2148,0,0,d4190a3f054e2420a8d60bda0390077417613c29dc75da593352ca97816f8b CVE-2025-21480,0,0,6948132d528c7804139999300020de3a6192ffe9f450494845d5e5c5a7c138cc,2025-06-04T17:24:26.927000 CVE-2025-21485,0,0,03d83e3b9947fa20b8c4220c62d45e20f0436065a3a3d3554a8beeb69e71c0fa,2025-06-04T14:54:33.783000 CVE-2025-21486,0,0,6657ae7f3cc111f37509795b42a9ee2f1a625afcb0e5375a7c1283ba109a4c1b,2025-06-04T14:54:33.783000 -CVE-2025-21489,0,1,3e868db9a0a2c09e7628e20d55caa1b9b3f67be100045162493f134e3c4ef116,2025-06-23T15:21:28.207000 +CVE-2025-21489,0,0,3e868db9a0a2c09e7628e20d55caa1b9b3f67be100045162493f134e3c4ef116,2025-06-23T15:21:28.207000 CVE-2025-2149,0,0,d7df4a69e494fa588a972d8a9b2091768f937c9cdd73a96cb132062cdf0f66aa,2025-03-10T14:15:26.267000 CVE-2025-21490,0,0,b59bfaf73f4a7aac7f498efe2114db1737794c6dd1c56d41aa09f498e00d23bb,2025-04-09T16:06:52.400000 CVE-2025-21491,0,0,4c71536c040f797c835de923bbd00b182f1ac6ab6a1fff2e0c1acd32c2e0881a,2025-04-09T16:07:09.130000 @@ -285198,7 +285203,7 @@ CVE-2025-21502,0,0,e609b91a197717b73d4133c8279c7e31d49feb54f8e96c78fcec879f0eb13 CVE-2025-21503,0,0,c6621e1804e534da4b6f8af2b5c1b59b3c1bcd12c30ae31ad8d5fe188bdf3555,2025-04-09T16:04:21.040000 CVE-2025-21504,0,0,bc881ca1fb7f096c2e016f923823b9a2470f1d2c468ee6287a81011b2db7263e,2025-04-09T16:02:55.010000 CVE-2025-21505,0,0,f82b99d26e4784c08ee442698027f2b08d7f4b7e9565daea0fd24615c17f7a08,2025-04-09T16:03:07.740000 -CVE-2025-21506,0,1,adebf56e0e227afc1f43553e52c0b21e84ee510be6541592b62fc2fe7f7bc436,2025-06-23T15:21:39.560000 +CVE-2025-21506,0,0,adebf56e0e227afc1f43553e52c0b21e84ee510be6541592b62fc2fe7f7bc436,2025-06-23T15:21:39.560000 CVE-2025-21507,0,0,007166eda0d37ec06452a45526793243e0fea8d62f479e18176e81c46b4337a3,2025-03-17T19:46:46.897000 CVE-2025-21508,0,0,38aa46d6a476bca3579602fdfbd94ba2a9ddd3791de5357a8b647e31a8958f44,2025-03-17T19:47:09.393000 CVE-2025-21509,0,0,78d11a80a54a729b734634d90323f7ce96e2b4cd9da9222a33edddf0250cb60d,2025-03-17T19:47:23.373000 @@ -285209,7 +285214,7 @@ CVE-2025-21512,0,0,b41dd68018c5ee645b589d1dc835b8f1b44209721493f0312f1786c09fc84 CVE-2025-21513,0,0,3c86989aabb2a1abf9d935de5a183eb43828fa543d6b90f0a3a11729ad9dd767,2025-03-17T19:48:23.063000 CVE-2025-21514,0,0,8f6143affc9f22c6886521c601abb0dc1d9ae0e636d6e6c6cd0ae89c6968aca6,2025-03-17T19:48:36.210000 CVE-2025-21515,0,0,0828af27bcb9a16663a74195e55950d31ee556d7231c37d2d3137b27845ad264,2025-03-17T19:48:55.423000 -CVE-2025-21516,0,1,33ebc4dc0386e8d08244adab75f9c46c30265c9b80e06b800dd67372899c2fd3,2025-06-23T15:22:04.620000 +CVE-2025-21516,0,0,33ebc4dc0386e8d08244adab75f9c46c30265c9b80e06b800dd67372899c2fd3,2025-06-23T15:22:04.620000 CVE-2025-21517,0,0,1086512bfae7e253f269aad4651607ad2b61c185f2d23e04b49b9b890b2708ec,2025-03-17T19:49:06.110000 CVE-2025-21518,0,0,a3e730d8002ec29d3429831f974c1c6d7cfb47e29e96c89f068326fa8430be91,2025-04-09T16:03:17.900000 CVE-2025-21519,0,0,bd99e2535abab66a9b94434ac3f5b4c912dacdf6748e95a236c4dafd8868bf6e,2025-04-09T16:03:28.280000 @@ -285228,24 +285233,24 @@ CVE-2025-2153,0,0,d1001c611eef70eb71a49d9fe459204d662bb89375cad643af202eb312828d CVE-2025-21530,0,0,b1a49e867472ba70a25f247af19b090d67ec55139a19152ce999713a4e79ac88,2025-05-07T20:05:11.573000 CVE-2025-21531,0,0,5030ca0040f9a6018a6680d6e91134a4e5feb19b3e27dd86ec8b9c39f5a0e810,2025-04-08T20:53:44.180000 CVE-2025-21532,0,0,ff62206288e1ce3e2eb346cc4f07db2099e0d4a0af5b22a41c25d9e7ed7c5c99,2025-03-18T20:15:25.563000 -CVE-2025-21533,0,1,ccc0ae1be4f14dabe743caaa8d158db841e2bd795ccdbb12a087598b5bb9f713,2025-06-23T15:22:21.003000 +CVE-2025-21533,0,0,ccc0ae1be4f14dabe743caaa8d158db841e2bd795ccdbb12a087598b5bb9f713,2025-06-23T15:22:21.003000 CVE-2025-21534,0,0,f3e3bc44268f89c76af0200cd6217f2c6a3ac2379b1fb591b60edf404fd4115d,2025-04-08T20:53:53.383000 -CVE-2025-21535,0,1,2e888af15392fb0b9595cc35128d6e3917c29fbaebeeb37721f707b3357f1c50,2025-06-23T15:22:32.057000 +CVE-2025-21535,0,0,2e888af15392fb0b9595cc35128d6e3917c29fbaebeeb37721f707b3357f1c50,2025-06-23T15:22:32.057000 CVE-2025-21536,0,0,b28639c212dac5fe3456f26bb9716d382e07a02dd29aec1a2f95f12a92391861,2025-04-08T20:53:58.330000 CVE-2025-21537,0,0,f58f33954af15f700374ba4be972c7b059d34eb3fd460d41885ca0b87c9ecb94,2025-06-20T16:45:43.840000 CVE-2025-21538,0,0,58939685b83171a2f0dbdefd4b15f8bbe50eb2d247ec0557417661152fcf2ef7,2025-03-17T19:49:44.330000 CVE-2025-21539,0,0,8342d82994d74679b4efe1a9e7012563d4b762f0ca4e1d7f1da81ff6370349e2,2025-06-20T16:56:56.333000 CVE-2025-21540,0,0,5c0fc7a5663922f24325b74a7fb831d5b624b90b2a1de956bce68058ecbf8e1e,2025-04-08T20:12:26.263000 -CVE-2025-21541,0,1,185c0488e9eaeb6b52951ef7b7b65f12c76a0d30ac37b055ad79336ba291a8e5,2025-06-23T15:23:31.587000 +CVE-2025-21541,0,0,185c0488e9eaeb6b52951ef7b7b65f12c76a0d30ac37b055ad79336ba291a8e5,2025-06-23T15:23:31.587000 CVE-2025-21542,0,0,3a52bdb4139f482b37a35bf074f2329800b6e986f65ea89f862e8d92838cda61,2025-06-20T16:57:56.907000 CVE-2025-21543,0,0,1e4da3260b0f2a0de189ddd7aeb40c7f66c75cf9aa4d7a2bd7414442b02ba8a3,2025-04-08T20:13:35.230000 CVE-2025-21544,0,0,8e6235c2828cdd2783c06437e71f4dae7aa335264d892f772c25be6f01aabde7,2025-06-20T16:58:04.887000 CVE-2025-21545,0,0,8e72a18fadb3251721734a26ad9eb23dfd0f940d095f541002bdc57daf18ec8e,2025-05-07T20:04:23.117000 CVE-2025-21546,0,0,b82f3e380622b9a05860422ffd272d7a27cd1f165e5094c53eda87f473ce924a,2025-04-08T20:14:45.287000 -CVE-2025-21547,0,1,25a10b0b4a18b05878e66ee2bab4bd3d60b8f9ebc2f40021a4607eff19bde8f3,2025-06-23T15:24:44.480000 +CVE-2025-21547,0,0,25a10b0b4a18b05878e66ee2bab4bd3d60b8f9ebc2f40021a4607eff19bde8f3,2025-06-23T15:24:44.480000 CVE-2025-21548,0,0,606a21c57ea081be937bfbc67e5b25b8530acf17f17fc0109687613859fc2d3d,2025-06-18T19:24:16.277000 -CVE-2025-21549,0,1,5382d09d836faef06b93d03399d3ac89a276e72c7a12f28c455743ae66c106a0,2025-06-23T15:24:53.057000 -CVE-2025-21550,0,1,92017aa77ae6c95a423070eda1c8df32559a69c0bcdda4df962784b46c563c81,2025-06-23T15:25:05.683000 +CVE-2025-21549,0,0,5382d09d836faef06b93d03399d3ac89a276e72c7a12f28c455743ae66c106a0,2025-06-23T15:24:53.057000 +CVE-2025-21550,0,1,f923d248ff899007602102b6ca7e933a44ea28f7e5ba26f26c6f5b73ed8e5a32,2025-03-13T15:15:51.980000 CVE-2025-21551,0,0,b673da22cf5f8a5606180b66209828b12e63cef230313032db77a47e1a7f3e59,2025-05-07T20:04:11.897000 CVE-2025-21552,0,0,7ecce434a919c478959a0e1087c69e67e36ea612972e1b51c4e646beee5c29e9,2025-03-13T15:15:52.237000 CVE-2025-21553,0,0,92802bf9739837fa0d2c62514ebaef4b18196a11ad6b61143f1fb0c046ffa5cc,2025-02-04T16:15:41.797000 @@ -285417,7 +285422,7 @@ CVE-2025-21706,0,0,f3378bca6611e287e62df39933cf1d21e33557d4d00ba79e50a89e8e61499 CVE-2025-21707,0,0,b9a0ead8603132ae8c9b4545a9ad4ef804e9617616abc14068f03d0615379a18,2025-03-13T13:15:49.053000 CVE-2025-21708,0,0,180375921d7ace222b11f8ec59581e85e27778345c37b4ab9b4b71ce18a0a587,2025-03-13T13:15:49.207000 CVE-2025-21709,0,0,a14e7b079991c2dff834a4c134806b146fad3426c8ee00bb7e36d413c6c5e076,2025-02-27T02:15:14.560000 -CVE-2025-2171,1,1,f23b527784d8281229ba754f7aa717363b2f886636e19b1f132370bc3f4051e3,2025-06-23T14:15:26.437000 +CVE-2025-2171,0,0,f23b527784d8281229ba754f7aa717363b2f886636e19b1f132370bc3f4051e3,2025-06-23T14:15:26.437000 CVE-2025-21710,0,0,7d577fdeeae7df2e8f9e47f3e4aa9e890b8b043c8f557f4e9316ece7be82aa42,2025-02-27T02:15:14.657000 CVE-2025-21711,0,0,e6c14c8d6127b841cd40a6c73bdb0db683cc2793b219532fa0c9bbe5155e4a77,2025-03-13T13:15:49.343000 CVE-2025-21712,0,0,2be8d4a727b7dc56525c5bbe0eccd2de67a0d51ec13edf6e62a85504ec440f98,2025-03-07T18:15:47.507000 @@ -285428,7 +285433,7 @@ CVE-2025-21716,0,0,549d7591deeaa155c202289561e5593a5a85c8ded4d1431847a10528b2e8e CVE-2025-21717,0,0,75c35fa7fba42e24f73abff9b53b1952419e1ddad8d4143bf10c80475ee6ece3,2025-02-27T02:15:15.373000 CVE-2025-21718,0,0,2520ef1afcdc46478f313a5a92354d6fb20effaff260f2b5b7d82b998895b4eb,2025-03-13T13:15:49.760000 CVE-2025-21719,0,0,f615c6b22a70cd4a20e7b0424d01a8a7ad6c045d5c2c11aca0dcb25e7b3a77c2,2025-03-13T13:15:49.913000 -CVE-2025-2172,1,1,cfe0605f5d917c9f00eafe58994390efee3ce4e1d7d40aca3bbaf19f356b2caf,2025-06-23T14:15:26.607000 +CVE-2025-2172,0,0,cfe0605f5d917c9f00eafe58994390efee3ce4e1d7d40aca3bbaf19f356b2caf,2025-06-23T14:15:26.607000 CVE-2025-21720,0,0,0a0c8dead69b88fdb48e05feff8e64e2e34f9199f277d44d9b715abac576f042,2025-02-27T02:15:15.683000 CVE-2025-21721,0,0,cb718b259efff33aef42e06dc10e923ca6afb1c706aa2b3e33501228c041fbd6,2025-03-13T13:15:50.060000 CVE-2025-21722,0,0,072d53056ce905d076e5c84d30643f7bbfa8ee92227d7718c69ee109f330f3e1,2025-03-24T18:27:47.437000 @@ -286698,7 +286703,7 @@ CVE-2025-23118,0,0,1b6935e1de98bd988462eba8eda54cef63b56f3eba9236fce4c76fcc1a2a8 CVE-2025-23119,0,0,03b50e07e15abdb790cc32062bbf922a7a5b86dedcc5d4ac846195c74e91324e,2025-03-04T20:15:38.060000 CVE-2025-2312,0,0,9414b11cccd912a93c7b77b8b8a4cccf6c204bd0063ade57fb6afec180d8cd63,2025-03-27T16:45:46.410000 CVE-2025-23120,0,0,fcc412fa6fb516a26fbcce2f3fd613ece130eab1dda24987978f45ecc9becda2,2025-04-02T16:01:20.857000 -CVE-2025-23121,0,0,c86b05491865e4836bf6329c1e162cbd30a6a1a5c9be4521f81e5cc797e8b1c6,2025-06-19T00:15:21.260000 +CVE-2025-23121,0,1,5a5c46c9dbf65791f2e2637d8b8bf18cc2e8a78929cdf524a4840e0ea5e49210,2025-06-19T00:15:21.260000 CVE-2025-23122,0,0,f8c01c8ef5b6f9e831cc1568dda7fdd2cbff2f2dc9b80c6b770cbbbb7df7e604,2025-05-20T22:15:18.907000 CVE-2025-23123,0,0,d28e8b5e29fa7054d5082b2ec0990e478426188aacd81179d6ef03e17b2813d9,2025-05-19T14:15:22.560000 CVE-2025-23124,0,0,4a6299a78e71ef66b973ec2da68c573755c2e809b823d245784536d2b11ad68d,2025-01-11T15:15:08.930000 @@ -286746,13 +286751,13 @@ CVE-2025-23164,0,0,d6c71aadf409109dde414ece9e46d71250f8539b53bfd49135d9534a66c81 CVE-2025-23165,0,0,a3f5779be4e59c9a66a594d6c3ca801baf089a9d49144b143211178cc604b18d,2025-05-19T14:15:22.683000 CVE-2025-23166,0,0,47816fc5591e3a4414111fd69de9efb4cbf6aca82919721dea5adc3261322e9d,2025-05-19T15:15:23.310000 CVE-2025-23167,0,0,51e20beaaef964a23d54b2f922e381e06cac714eb024305c1bced81671d165c1,2025-05-19T16:15:27.317000 -CVE-2025-23168,0,0,546ed7c64bc03ea0d51fecc396d56c188ec7f68a49c7ea532db1eaf3e684366b,2025-06-19T00:15:21.377000 -CVE-2025-23169,0,0,e6f8ba47a6606d785ba012a980755371860a8b07baaaed5333bdd4dff9994ab6,2025-06-19T00:15:21.497000 +CVE-2025-23168,0,1,8a7994089ec6385e522516bf2f536510085098ab8ffd833145f9cf8895224005,2025-06-19T00:15:21.377000 +CVE-2025-23169,0,1,fec4996f1a4a5562a715d0fac570ff9108e7ca433422b014e4068e2ec0bb358e,2025-06-19T00:15:21.497000 CVE-2025-2317,0,0,9ea9ba34615d5bc5ee8806158627db355af143699ea415828af46066a4160dd0,2025-04-07T14:18:15.560000 -CVE-2025-23170,0,0,435072620bb9f6e2323acf1b32f92f05d9f6176513f869147cabcbc7416369e7,2025-06-19T00:15:21.620000 -CVE-2025-23171,0,0,93cd0060572ed22af88863bbc002e2eae1bda0f6be8c43e073a24b943a764b61,2025-06-19T00:15:21.743000 -CVE-2025-23172,0,0,08d066df5e2545e2c4980c7a00113f81e9955fbf9898af9917452768c0c042ca,2025-06-19T00:15:21.857000 -CVE-2025-23173,0,0,46be7eeb11c19f13fd500aa3ff85203ba69130d74a0bd93b54ea0e84e022ac91,2025-06-19T00:15:21.977000 +CVE-2025-23170,0,1,5b808da9b57d389379b1d0b1e0c53a07e1a17dd583bc4fe3eec454f691bb1345,2025-06-19T00:15:21.620000 +CVE-2025-23171,0,1,827b4248ccfe906d0f0742fd36a2ec1d16326b94ab077d1643894fcbe8936e6f,2025-06-19T00:15:21.743000 +CVE-2025-23172,0,1,8349294cda657892d33b9abaf6d3ea4aced4f1702b45ccbb9e881839ea2cafeb,2025-06-19T00:15:21.857000 +CVE-2025-23173,0,1,16e7e25ef7bfb6bb9349e599be7048658e67402e487b05b79cbdf70ddf5e83e2,2025-06-19T00:15:21.977000 CVE-2025-23174,0,0,50322119595bff087a12ed6f94f87f583ba40060fccb96eb5cf9c3f3476fa552,2025-04-23T14:08:13.383000 CVE-2025-23175,0,0,d32116b600ac178b1ee720078d8acfc21dc4298d12982e92ae53dd00f4271286,2025-04-23T14:08:13.383000 CVE-2025-23176,0,0,4d8a569d7f8b232199b1ed07a8ee3ee2f1c9e25ade11e06e887257dda42b67cb,2025-04-23T14:08:13.383000 @@ -287052,7 +287057,7 @@ CVE-2025-23566,0,0,88ff034c0930eb7962346da8f31a94b9eca19a480252f7930366050551ebf CVE-2025-23567,0,0,a5334e3a1104d1d3b6196126e4f57ba74f8e92384c039079a9ba04e3f6d27982,2025-01-16T20:15:40.090000 CVE-2025-23568,0,0,541d6e4ad43f8dba765299393aac14407144d095e5c8f6fed5ce69f6ad16e1ea,2025-02-14T13:15:44.123000 CVE-2025-23569,0,0,e1a856fd806178c29488dac0d174aee24c02bc663bf84b5b8e41189ca4debaaf,2025-01-16T20:15:40.230000 -CVE-2025-2357,0,1,3306f690e5868bfd53d607f9011e67bad600c8de0eec40eabfd6792bc7774ed6,2025-06-23T15:11:50.187000 +CVE-2025-2357,0,0,3306f690e5868bfd53d607f9011e67bad600c8de0eec40eabfd6792bc7774ed6,2025-06-23T15:11:50.187000 CVE-2025-23570,0,0,c339e33fe57ee43e67044cf27eb7b67a55d9ba70ad791589ea878809139d8a71,2025-03-03T14:15:42.437000 CVE-2025-23571,0,0,3c56bf3d57cf36665f942829237cdd5ae4a799e329add61ae4a156fa2555e187,2025-02-14T13:15:44.330000 CVE-2025-23572,0,0,de6082afe4a128b0f4da24928b9919e3a956306fd340d20a91397a5cf127b9da,2025-01-16T20:15:40.403000 @@ -287772,10 +287777,10 @@ CVE-2025-24280,0,0,7e6318ddeec3c45683c18b4a04b0c338f2389b9346d93c786d9c6752b668d CVE-2025-24281,0,0,76b9011c7783c871ef865a80caf1ae08e485f8d8810428515769f6f44737d638,2025-04-04T18:22:19.983000 CVE-2025-24282,0,0,92059d5a241b5d96ef7593ded7e2abc281079ec5ed3a524fa050c614e5194214,2025-04-04T18:23:23.340000 CVE-2025-24283,0,0,4df1743210499b8e21375ec5fdb7750825951563a76a92a49e54d06df67345b4,2025-04-07T14:07:33.510000 -CVE-2025-24286,0,0,65683583000d5529830b20ccff957add7c317eaf54ac1796bbc7a2c77fe87db0,2025-06-19T00:15:22.093000 -CVE-2025-24287,0,0,e41d94977fd890910d04b473f5243ba60c7263c3bad06c2e597f78ea0eb5c900,2025-06-19T00:15:22.207000 -CVE-2025-24288,0,0,2a83985293da967adc6016271e645505f2b1fe813d876cc179a7cddf121b081a,2025-06-19T00:15:22.323000 -CVE-2025-24291,0,0,af1e02cc91c468c4c3b8047dcc990ef7498963d0fe709481ee27332ceda5885a,2025-06-19T00:15:22.437000 +CVE-2025-24286,0,1,fd3fb7280d51fd2a71a111f451a2da4d293afb37dc62ff7a2a80c0cdf8ce2ea6,2025-06-19T00:15:22.093000 +CVE-2025-24287,0,1,ebc03adaff4ae5856e885bf441e46a17f37f0bac234cc982630d274eb758a579,2025-06-19T00:15:22.207000 +CVE-2025-24288,0,1,2fa6148fd47506eeeac6a7638be549b1e9bea9b3b9bfa376f4b50508c21bc50d,2025-06-19T00:15:22.323000 +CVE-2025-24291,0,1,7fd5d75bc01388d3c0c3423ad0eb3c07d7af10787121f31e51948e0aba26b8e7,2025-06-19T00:15:22.437000 CVE-2025-24297,0,0,5d4a74f3648dba475a9505a338d2107001df4a92611f1e742f9c3b8bc6fc9e4e,2025-04-16T13:25:37.340000 CVE-2025-24301,0,0,7b7c3fba06b103a537ce7db06429d9d2300d69047940e33831c6830c359206c5,2025-03-04T17:15:48.160000 CVE-2025-24304,0,0,d93e512a7b4aa7125a9d9a3a56f58a274a5675b50a430e59bfee24f84fb92162,2025-04-07T14:17:50.220000 @@ -288729,7 +288734,7 @@ CVE-2025-25568,0,0,8bf6eccd897b3aef0c5b736978952194e590be79850ad050dceac1781eef8 CVE-2025-2557,0,0,a42b70c78dcd89b9d3e57fec472337c34078e8807b7744b63a4210d869265076,2025-03-20T19:15:38.220000 CVE-2025-25570,0,0,a1a60fff83d4e58f97f6cb73bc995dd008cce7cbdda97b57369c1d11bafc9be9,2025-02-28T22:15:39.630000 CVE-2025-25579,0,0,9ad1112c1ed3d836da183b36b2d4375f4736b0d6d1110b2bc10e441acd9590d4,2025-04-07T14:23:36.660000 -CVE-2025-2558,0,1,0fecb874eee93db88d1c6609beca7f0ff289247f5b4891178b0b8fecdddabbe8,2025-06-23T15:17:34.443000 +CVE-2025-2558,0,0,0fecb874eee93db88d1c6609beca7f0ff289247f5b4891178b0b8fecdddabbe8,2025-06-23T15:17:34.443000 CVE-2025-25580,0,0,a7fce7289773d49e23ea5e84e7bf568aff3d97944f32e02e6812a51089903564,2025-06-19T00:18:57.017000 CVE-2025-25582,0,0,fdff5f005418e70695619b15a5365b87844b6870f1b28eb8b42a995086eb8722,2025-04-02T12:27:19.593000 CVE-2025-25585,0,0,98a50572e811d5f13ce801a89eed6933c5c3cc3522affcd97ffbbab7b5092abc,2025-06-19T00:16:52.923000 @@ -289953,7 +289958,7 @@ CVE-2025-27525,0,0,a4b246e05aa8e9149e0a9842b4c6807efcd61fab385038ed52473da98c7e4 CVE-2025-27526,0,0,ddc528ca33e807ad7bd5971d3e294beeb24112a05eee8ee501fa1c1a70ff05da,2025-06-03T15:36:56.813000 CVE-2025-27528,0,0,737d925979e07df03f0b19543dbdef55dc6a203923452f1c2a733ea2711ffa92,2025-06-03T15:36:47.120000 CVE-2025-2753,0,0,e912daa6c2718d8ed3f24e43ec3e9ee9f4a48455fb53e9e67461e5144c99f550,2025-03-27T16:45:46.410000 -CVE-2025-27531,0,1,38b70a8ba5bd87d9d2ad404b393001e5890066ca51a211623411c9449671990a,2025-06-23T14:24:00.320000 +CVE-2025-27531,0,0,38b70a8ba5bd87d9d2ad404b393001e5890066ca51a211623411c9449671990a,2025-06-23T14:24:00.320000 CVE-2025-27532,0,0,651aa4a409c4869b141a04074791dba5e586b669772ff0617df8a664fec2b98e,2025-05-02T13:53:40.163000 CVE-2025-27533,0,0,b646a1fe0a6d11554ef785ea8ecefbb2ab2f1a88b51b3c456731090eb57b5f27,2025-05-07T14:13:20.483000 CVE-2025-27534,0,0,e40558e45672ac9b9a33735fa16ef08f02dcb0996c9978ce0ed6bcd8b32d3dcd,2025-04-07T14:17:50.220000 @@ -290370,7 +290375,7 @@ CVE-2025-28380,0,0,c812077873aafe4be08d39ece96a4d97cd2f4df4a28357fdf5933a2f28611 CVE-2025-28381,0,0,c29a1bab5aea9357924456ab747be9f25188b616f7afcf694fba4f682f8e5550,2025-06-17T19:09:45.910000 CVE-2025-28382,0,0,b0e7ccf5d5a7ced7868f423fbff9e70580d3563f85b9762b991c87477aaa0c67,2025-06-17T19:29:21.273000 CVE-2025-28384,0,0,040afa29fdc376ec47fa008bae4239a0570cc89b0355eff5bcb56a6a3b73be48,2025-06-17T19:31:52.810000 -CVE-2025-28386,0,1,5912fa67d9596f8f2697095a3fe341321328dfdc001cf398bf53bee4f44bb6ed,2025-06-23T14:06:04.657000 +CVE-2025-28386,0,0,5912fa67d9596f8f2697095a3fe341321328dfdc001cf398bf53bee4f44bb6ed,2025-06-23T14:06:04.657000 CVE-2025-28388,0,0,1794bcba8ec3946381f378038b8ba673ba619f4324eae27560582f6f3438e967,2025-06-17T19:41:40.320000 CVE-2025-28389,0,0,ac3d6d4614830ae5beed2b1a1a239f742425bde3a69256016d024e0949604b02,2025-06-17T19:42:06.507000 CVE-2025-2839,0,0,b5f50833ae89a723232ee09a371d928add8cd2f82f45ae4596cf5961719812f4,2025-04-23T14:08:13.383000 @@ -293402,7 +293407,7 @@ CVE-2025-32870,0,0,9dfaf4968559e46a3335f01151ff3a08e8a477d9c61bda01559d6ee35cfa4 CVE-2025-32871,0,0,0858782c82e95a39be97e7ffdc176ada44bec9377cc23b99d288083a9a1b85e3,2025-04-17T20:21:48.243000 CVE-2025-32872,0,0,a6acd2c4749d25af3a9674e470b92f66756a824f6626eef20d9bf26ef8cf4544,2025-04-17T20:21:48.243000 CVE-2025-32873,0,0,f7d763f6cf9dd2dd2fc4fd446f09dcd8aecf88b16e7b9cbc3c04e6b52caefba3,2025-06-17T19:44:20.957000 -CVE-2025-32875,0,1,1ecf4ecb9c8c9299160a8dec13b31f1e344f77f02ee93af1c8f61f5fcd4dd794,2025-06-23T15:15:27.400000 +CVE-2025-32875,0,0,1ecf4ecb9c8c9299160a8dec13b31f1e344f77f02ee93af1c8f61f5fcd4dd794,2025-06-23T15:15:27.400000 CVE-2025-32876,0,0,b359294b619c26c8351a299d7818957dd391eeaf6565d3672638043e8443c0e5,2025-06-20T14:15:27.877000 CVE-2025-32877,0,0,dd219aeeb9989d4c29173d23498e70d0a6a03ae3090a8b9918df11e455e331f0,2025-06-20T14:15:28.250000 CVE-2025-32878,0,0,3879fa1faf01e446cb6e900199955a950befa6933404b3f997c1c9e54a599695,2025-06-20T15:15:20.257000 @@ -294858,7 +294863,7 @@ CVE-2025-4037,0,0,c2a9a7365cb7350487e335b4185abf1b7136e28443b7d38831abbd5f1a9ddf CVE-2025-4038,0,0,811046a13e982bc58a873e9f3dcdd8f0924b9962b393b0dcd42ae969573255a9,2025-05-10T00:54:58.380000 CVE-2025-4039,0,0,82997abe4f3d1a06f2c0c0c7affe39718ef0820c54c5fc54b87a7722e7f87a51,2025-04-29T21:08:47.950000 CVE-2025-4041,0,0,81f238f672f184f46ddf27c78435ddee43bf5343b5983877b97d104b8691f898,2025-05-07T14:13:20.483000 -CVE-2025-4043,0,1,96e5d1ee8417eb83850d485f2ac507c3e7a120681669505409fb2466342ff662,2025-06-23T15:02:15.940000 +CVE-2025-4043,0,0,96e5d1ee8417eb83850d485f2ac507c3e7a120681669505409fb2466342ff662,2025-06-23T15:02:15.940000 CVE-2025-4047,0,0,697dde15b783c10558b99d9c3867d89fa2dd1910aca7332b9ebaf25195362a97,2025-06-04T14:54:33.783000 CVE-2025-4050,0,0,ccfe15f2834569ec41cc4a482172c37e9ee278c6a1d3b20eba7b56bd00075454,2025-05-28T20:08:51.557000 CVE-2025-4051,0,0,ff804ba52545392d7d95b067994000fe8637ebe480f1a272e743d510a5634584,2025-05-28T20:08:14.553000 @@ -295036,7 +295041,7 @@ CVE-2025-4131,0,0,e145db9bdcf5e54a3788ea8919212b2cfcdb96e29e639a2a6fca852d8fbe36 CVE-2025-4132,0,0,e4809de586f057a9e14a37c05676b7015f221bfc82c94512bf23f0611070b256,2025-05-12T09:15:16.080000 CVE-2025-4133,0,0,62707a46d404303184816916a5f626e6709dc33fc51eeac3cd7609c2da4dc930,2025-06-09T20:13:53.007000 CVE-2025-4134,0,0,fe02b000815c2b18022230e610523ae527b21156d0dce332dccab36a3788f863,2025-05-28T15:01:30.720000 -CVE-2025-4135,0,1,c9ff5c59ba5a97583f7b69e4b2ed2e557c817f63927999bfb3854e6ee5f62bd3,2025-06-23T15:13:00.287000 +CVE-2025-4135,0,0,c9ff5c59ba5a97583f7b69e4b2ed2e557c817f63927999bfb3854e6ee5f62bd3,2025-06-23T15:13:00.287000 CVE-2025-4136,0,0,b8475b2b882f1f1345ee88b0d17b9c4d6134110c252d26b338548acd634728a6,2025-05-02T13:53:40.163000 CVE-2025-41360,0,0,0c58d2152e0e379d53112ddcbb05190aaed26ee5677fca051411e5049c547888,2025-06-06T14:06:58.193000 CVE-2025-41361,0,0,bd83711ed5d2ea941a053d38aae602c59aadd1434b92514650a1e422cecff8e3,2025-06-06T14:06:58.193000 @@ -295053,7 +295058,7 @@ CVE-2025-4138,0,0,e24a1df01d5dbf416d0772fbc42743a05ce6be9e23d5dee2edf9f865e78913 CVE-2025-41380,0,0,6a50932054dc502ee7c0d77cfea4430344ce4717310545d50ac9fc3a7b76dc81,2025-05-23T15:54:42.643000 CVE-2025-41385,0,0,37545ea39efd4d7b5e0d6cb5131cca3e61d7d577b10fafacb6827a6e97f74309,2025-06-04T19:58:38.140000 CVE-2025-41388,0,0,cea4fd6e5baa020179de0c3ab4a93002a86c5b4be86c160109165aee67a76dd3,2025-06-18T13:47:10.020000 -CVE-2025-4139,0,1,1495c73b6647ed5780d6e1ad25afe1ee98c197ea2b5ab75677590ec2918b1247,2025-06-23T15:13:27.283000 +CVE-2025-4139,0,0,1495c73b6647ed5780d6e1ad25afe1ee98c197ea2b5ab75677590ec2918b1247,2025-06-23T15:13:27.283000 CVE-2025-41393,0,0,530f65a313720270b05a5e04ea761ed2dfbc169adb957fa6f54beb0e36c6dbe7,2025-05-12T17:32:32.760000 CVE-2025-41395,0,0,65b9e3526569f587eb1cd97410ac7325e217f46717fe2bbf0abfe0a9511ead3c,2025-04-29T13:52:47.470000 CVE-2025-41399,0,0,7a1373417457a02ea13a0bd88541383fb57eb0536c4c4f5c68760eae861e0e0e,2025-05-08T14:39:09.683000 @@ -295462,7 +295467,7 @@ CVE-2025-43926,0,0,4d0844f61e8a4f3908e6525284978ee3dd3d8da4c86df34256626c5eb8824 CVE-2025-43928,0,0,ada37df9b018408af843f1b1cc9151f6f5a494aafca776d997eba7b7d4788264,2025-04-24T16:00:50.257000 CVE-2025-43929,0,0,867435a167581ab99f3a2b85e0ea6073e3538639a37e0ae43a9f94228cfe9a85,2025-04-24T15:46:35.757000 CVE-2025-43946,0,0,30b1b66631e81e9cea6f13a15d14a3693a662f0512102eed75d0a09582b31af1,2025-04-25T15:15:40.050000 -CVE-2025-43947,0,0,45dc55ef8d0feb1382386c26465395b874bd89f0f1e3ab24423e3a96653b3c87,2025-04-23T14:08:13.383000 +CVE-2025-43947,0,1,ae1d3f46580c150253bdd8592038a95b81141e936f71e9dab7b936d6192f4447,2025-04-23T14:08:13.383000 CVE-2025-43948,0,0,efd3931cdaeca2d3b1dbf5f3f44aee732afa37b700ca8822c69f897fc0f80984,2025-04-23T14:08:13.383000 CVE-2025-43949,0,0,c8d8666427b910512729fd59d7334c67c298b545b1a137043425731a8a0336b5,2025-04-23T14:15:29.783000 CVE-2025-43950,0,0,fd407a24e88ae012aca24316990e11ac16eda1715cfed08e301689999509229f,2025-04-23T14:15:29.930000 @@ -295658,8 +295663,8 @@ CVE-2025-4498,0,0,fe4e54354871751f165270510115e7eb077cabbe51e36c7351729c7c48e0bb CVE-2025-4499,0,0,1c02b1692a3925b37458edec07dd6f80534dbff3f2fbf04106606bb95639a5b2,2025-05-28T19:24:12.107000 CVE-2025-44998,0,0,f1cb20085e6ad15afab179cb443903adcddb0c447c4e2857ef8052b5a5ee7d7a,2025-05-28T14:58:52.920000 CVE-2025-4500,0,0,b252739c7e43e1ed91691824353b7e97e2316b3cdd7ea7ee228d50eda984af82,2025-05-16T14:16:47.373000 -CVE-2025-45001,0,1,5f4f05269038efb99ff482c55824e423af834b14d21d110122e4124de52aafd2,2025-06-23T14:18:43.410000 -CVE-2025-45002,0,1,4062797d30f697271410ee1f345875504aece31b398023f8c0ae9a198b60b968,2025-06-23T14:15:58.093000 +CVE-2025-45001,0,0,5f4f05269038efb99ff482c55824e423af834b14d21d110122e4124de52aafd2,2025-06-23T14:18:43.410000 +CVE-2025-45002,0,0,4062797d30f697271410ee1f345875504aece31b398023f8c0ae9a198b60b968,2025-06-23T14:15:58.093000 CVE-2025-45007,0,0,5a942b67af458dcbffcc204143a4774311c59d5ad4885c5c55fb7d9c1ebbeebe,2025-05-09T13:45:28.627000 CVE-2025-45009,0,0,36c5cbb0f37a55a2bcef11b942052fc47923af5c699055a488196b4ed54c3a22,2025-05-09T13:45:16.187000 CVE-2025-4501,0,0,2714d56986429b577c90c5115348855d531ee85270c1ad90311b312266b13026,2025-05-28T19:25:52.347000 @@ -295775,6 +295780,7 @@ CVE-2025-45616,0,0,c9bb8d066376074c78acbc5924019c8e92d0a353068f59914673e5a7f7d2c CVE-2025-45617,0,0,45ec32c91fa8777f902c441e0ad6a5cbb4b231cb8d61355ddcbbf662a9985843,2025-05-06T04:16:18.073000 CVE-2025-45618,0,0,767ee00e764e7ef5bf5da280443f8f8ac155a067bd61e2227396cf4720a51137,2025-05-06T04:16:18.347000 CVE-2025-4562,0,0,d2657f9e359abe15e16bbecb49ae9ba4428138285e1222df0d7e8c7358260e0e,2025-05-22T23:15:19.620000 +CVE-2025-4563,1,1,02cd410129339d703842fe711979ad9145a12e58a5b9c9800dfb713f1cab80ce,2025-06-23T16:15:27.350000 CVE-2025-4564,0,0,8d3f9720d908e446b737db8b900434db81b180dd53397ac7362129a7e91e5314,2025-05-16T14:43:26.160000 CVE-2025-4565,0,0,4256f50161ec95000de287e54ecfa2b8b56d3a683613b559af85e1b918e03fef,2025-06-17T20:50:23.507000 CVE-2025-45661,0,0,d4f42c25435e84688f4ce3b76e88805fd211efabda5b2495d0e5c2dcb924ab9f,2025-06-18T15:15:26.513000 @@ -295819,7 +295825,7 @@ CVE-2025-45846,0,0,51d693d14f22c6c735df1fa76b25052e8a11d20981dbbc646066d2d29016b CVE-2025-45847,0,0,4ed18ef753848179b985042a19837700c8f0cb1a81c7d5ce45292d9f94eadadb,2025-06-02T17:27:39.587000 CVE-2025-4585,0,0,de0ef46eb68a7bfcdbe12487f0dad42760c4b1425908d33a0156dee60d09c3e8,2025-06-16T12:32:18.840000 CVE-2025-45854,0,0,8da6ea0519a831e65c7cd6df3945ca62dff794f0b2efeba768b2f0909531788a,2025-06-09T15:14:23.153000 -CVE-2025-45855,0,1,f83acc46039ebb0726b90a3363a04a3275d7490e0c2ce1bd0670de0c97f6346c,2025-06-23T14:25:39.560000 +CVE-2025-45855,0,0,f83acc46039ebb0726b90a3363a04a3275d7490e0c2ce1bd0670de0c97f6346c,2025-06-23T14:25:39.560000 CVE-2025-45857,0,0,dcf851c628b00f7cbf7f9997f2bbb8d1869ef466c2968b3bd76ff4947bdcf23b,2025-05-14T14:15:29.737000 CVE-2025-45858,0,0,a000c9c9a64c590fb591b967028ca45d12f9b4512bdd2b8ce0395e50725e9c2d,2025-05-23T18:57:36.203000 CVE-2025-45859,0,0,f04cb01d4c73926dbf1b974b33e3c12f183dcea4c8d1314caf69fec8d88d36b8,2025-06-16T18:25:52.807000 @@ -295869,9 +295875,9 @@ CVE-2025-46060,0,0,2da92ad7624a864b48c567a8180993e9f22aabb3ca09b58c16a9f521dba58 CVE-2025-4607,0,0,7929f7497a2f3fdbdefa5c40c24e8dfb722bcbca57929b42733b89c15e0bc1dd,2025-06-02T17:32:17.397000 CVE-2025-46078,0,0,2fc8a269b5a28c0015e225ca3c3d8f64c503abc0c5a8ea5ce240137e0c4c6776,2025-06-04T19:59:09.353000 CVE-2025-46080,0,0,e77557f865cb8f0c8a7b01f1f6fbdee1ca66bad8ebda2925b71b207a25112a43,2025-06-04T19:59:02.890000 -CVE-2025-46096,0,1,e46e913b0fe20a27c7a6297a3680c5637edd7add55053ff1310b775a32e2d62b,2025-06-23T14:08:37.750000 +CVE-2025-46096,0,0,e46e913b0fe20a27c7a6297a3680c5637edd7add55053ff1310b775a32e2d62b,2025-06-23T14:08:37.750000 CVE-2025-4610,0,0,d61d953fe0fd6f0d2b21233839836df5133468380db75b47c2a05d78020b6b82,2025-05-19T13:35:20.460000 -CVE-2025-46101,1,1,3ed9f973817c1345c2cb40bfea3c49153c9652185515117023d05d2c6e6b815d,2025-06-23T15:15:27.793000 +CVE-2025-46101,0,0,3ed9f973817c1345c2cb40bfea3c49153c9652185515117023d05d2c6e6b815d,2025-06-23T15:15:27.793000 CVE-2025-46109,0,0,bb1109471e63f9f01bda5a8e1fe3323745e7e35c57fe91f6f8526660daab841f,2025-06-18T16:15:27.607000 CVE-2025-4611,0,0,551957ca30c77144066c2501102cbe8b5cc59e5d0e8959ef20d14b731299a950,2025-05-21T20:24:58.133000 CVE-2025-4613,0,0,f577ead831948daefe1272603bfaf0609f1e849af3f425f017bfac9ead135854,2025-06-12T16:06:20.180000 @@ -296217,7 +296223,7 @@ CVE-2025-46718,0,0,885c34e4ac34f705a4ef1825ec33431373f2ba5032bb9657c9e7312381094 CVE-2025-46719,0,0,b25887997950d7d3ab39998b5b94bb3c024854b8ada00a78d9ecb1ca2e7fd509,2025-06-17T20:18:16.003000 CVE-2025-4672,0,0,770c887d10dfc09d1e63fabe3c5364c54cf353a1948a47be8491ff905549003b,2025-06-02T17:32:17.397000 CVE-2025-46720,0,0,4c7236595d2f87b0b5d063c4e69a2cbdebfbdb7c2550f3a068081936f8a24e34,2025-05-05T20:54:19.760000 -CVE-2025-46721,0,1,128da113ea8f0dd50abb34a02b6e5908442d1b77af5bac7d0b34ba51b6fb6537,2025-06-23T14:55:07.967000 +CVE-2025-46721,0,0,128da113ea8f0dd50abb34a02b6e5908442d1b77af5bac7d0b34ba51b6fb6537,2025-06-23T14:55:07.967000 CVE-2025-46722,0,0,cf46ef2e6249b8935c48334672e28d50cf3343c6c1aff5e7300e5238080dc235,2025-05-30T16:31:03.107000 CVE-2025-46723,0,0,23909492a9ee443fd9ae3060d2ebc8db94328dcc9cf17248e4a0a9a7d6a6e953,2025-05-05T20:54:19.760000 CVE-2025-46724,0,0,e9c56e50a6ab4789521e42f1b57dca0731674d1f66af8a8445523cd7498bdd5d,2025-06-17T14:11:48.377000 @@ -296596,7 +296602,7 @@ CVE-2025-47256,0,0,c5f61341ce1b30960f41faf1ef0c8059c16b1b83f0508df1bf27b84fa8e3d CVE-2025-4726,0,0,984a3badb3ae6972f992c3a68c560c7dfd9d5fe06debdb311c424144763624af,2025-05-27T19:51:34.753000 CVE-2025-47268,0,0,4a46b9885e97102b8415ee3e4814f6839dc4a606dc76c0dedcf7a1f41c27c030,2025-06-13T18:21:42.427000 CVE-2025-47269,0,0,b9d52d64e2c0cec1ecdcd2f4d7408887dda629b4e369e1e7b2409608db43df35,2025-05-12T17:32:32.760000 -CVE-2025-4727,0,1,8969a844acb51d1753bc87877879fed95de1d0baf44d432214b9cd44fd598ac5,2025-06-23T15:14:50.350000 +CVE-2025-4727,0,0,8969a844acb51d1753bc87877879fed95de1d0baf44d432214b9cd44fd598ac5,2025-06-23T15:14:50.350000 CVE-2025-47270,0,0,f7de4b1bbad67df8d0ed8562ed81ad54a4a617d8e905a95b0012c5c493a9cba4,2025-05-12T17:32:32.760000 CVE-2025-47271,0,0,b4dba60dfb0342c7663df3f21e36f0d1e4cac1426ea6dff373e34c92771a1236,2025-05-12T17:32:32.760000 CVE-2025-47272,0,0,1bb2a09d129fd4f2d7c6b93b95b1a828935f3db642060df71fcd1da62c721565,2025-06-02T17:32:17.397000 @@ -297034,7 +297040,7 @@ CVE-2025-4790,0,0,1cde53f18939fd245b2e017ab5d61b1aabe2517bc390d40b0830feb8eba632 CVE-2025-47905,0,0,0badab8f2933a29538d7ef66ea7b6761136968565fc3d324c0e27cff6bcc6258,2025-05-29T09:15:26.587000 CVE-2025-4791,0,0,28f506e7fa1c70a3ee261c046fff0149e1890f11d112b4d14f3ee7199740eeee,2025-05-23T13:19:04.810000 CVE-2025-47916,0,0,7254b14db3d84a4fae2a957ff5aae1d18dda4aa5d6c7fa7b707e42e9728ce8d3,2025-06-20T17:42:15.083000 -CVE-2025-4792,0,1,f4aa37a652381fa243274795ed37a191f51b49c8040e00fb5b01e1520c8c5161,2025-06-23T14:51:36.113000 +CVE-2025-4792,0,0,f4aa37a652381fa243274795ed37a191f51b49c8040e00fb5b01e1520c8c5161,2025-06-23T14:51:36.113000 CVE-2025-47928,0,0,c98d79f9403b054eccd93f148fcf481d13089a9bec154b271a0eadcf13b86566,2025-05-16T14:42:18.700000 CVE-2025-47929,0,0,7fc15c7af26adf36cdf89018fb748ea0cea6a0ed56d6cabffa736dce44604a5c,2025-05-16T14:42:18.700000 CVE-2025-4793,0,0,ec69064861ba117d418880947f64b864bae8e19e90fef5ea47c2be77c9ecb787,2025-05-21T21:00:12.357000 @@ -297364,9 +297370,9 @@ CVE-2025-4869,0,0,870b6fb7f96763d1ac0b1ff6f50594749d4dd6426d23a4566486d6e216908d CVE-2025-48695,0,0,39b88432a15a3b8e91feb94d32e426fa969d9198b6e75ff2ba9bd798bc547242,2025-05-23T15:54:42.643000 CVE-2025-48699,0,0,44d8862507c41a93f498ba4b6a9317982afecdc3e0eb3976f21c5759c7dadf21,2025-06-12T20:15:21.583000 CVE-2025-4870,0,0,b9975f7dc89af7cfd09d0fdbb811b050a9e4120a956157701f81e28626493a8c,2025-05-21T19:40:16.293000 -CVE-2025-48700,1,1,cee7f1f9d16618ddf8f0ee40193c7dc9b1ca05cb84b07493960a078ada86c35c,2025-06-23T15:15:27.930000 +CVE-2025-48700,0,0,cee7f1f9d16618ddf8f0ee40193c7dc9b1ca05cb84b07493960a078ada86c35c,2025-06-23T15:15:27.930000 CVE-2025-48701,0,0,35aa8b81bef67a8b475084f139411c80773326ef7d953cb76c543e9e2bb840a9,2025-05-23T15:54:42.643000 -CVE-2025-48705,0,1,5fbe304565cc6dded9dff7ec2e63dfc17afbc5aeefe04a66fc4003d534d40ed2,2025-06-23T15:15:28.067000 +CVE-2025-48705,0,0,5fbe304565cc6dded9dff7ec2e63dfc17afbc5aeefe04a66fc4003d534d40ed2,2025-06-23T15:15:28.067000 CVE-2025-48706,0,0,b6396ca4f8f26244025ac40c88dabb3a26eff089e363c92cb8bcd03b388139a9,2025-06-20T14:15:29.750000 CVE-2025-48708,0,0,2f2ee7f6835a24101b8f2fad92720fa7e2d2cfee9343296271ef3f76df75e315,2025-06-20T17:13:54.913000 CVE-2025-4871,0,0,d9183a6ea5a2afa28642be53d20b661c6aa8059e9e6e695046b3eafadb08ebe3,2025-06-12T16:27:46.547000 @@ -297386,7 +297392,7 @@ CVE-2025-48744,0,0,a039740c56d4e93180f7ac5a496864b9f89957753f0bd173790011a4f09f8 CVE-2025-48745,0,0,f2d9c50f894d95aade77e788c5c232afd36dc9a98ad93323913ad989a9da4a6d,2025-06-02T13:15:21.897000 CVE-2025-48746,0,0,f72c5a8d16806b0ba968ccabf6f8a5266bce1d331d3179a6d466243179f0e088,2025-05-30T17:15:29.937000 CVE-2025-48747,0,0,77f2b3f312e05dae0fd49a4fbf0de33587f3dcda8e8123589893c43a0bb874a3,2025-06-19T00:01:01.873000 -CVE-2025-48748,0,1,805c8ddf5f6d5cc89225c3c520f65d04d0cefe8e51baabf5c77788a905f60841,2025-06-23T14:37:52.580000 +CVE-2025-48748,0,0,805c8ddf5f6d5cc89225c3c520f65d04d0cefe8e51baabf5c77788a905f60841,2025-06-23T14:37:52.580000 CVE-2025-48749,0,0,1782601449fdbad7e128b503fdc88bf73801639c356e6033cd52a3b78e0cb26f,2025-06-18T23:59:44.600000 CVE-2025-4875,0,0,130bc5da676a7028541a0b0fca1ba41a63baeb979bb88a491f60fd8b45c2548f,2025-05-21T19:39:23.917000 CVE-2025-48751,0,0,7b48afa401b2b93b58deb3a57cdb6356d07d3afa8b095b572a5b480362f21209,2025-05-28T14:58:52.920000 @@ -297558,7 +297564,7 @@ CVE-2025-49075,0,0,54be58c89d858cfc2a2a38282ca430d2d44e5da7afee9b9ba3a3af9890aab CVE-2025-49076,0,0,11ca67faa747268bd3e42ef94a795b585577483e7914ce9d6c222e8b9284807a,2025-06-06T14:06:58.193000 CVE-2025-49077,0,0,ea2e636f032c4f39bdc78ff636e21026e853dcff77025a2be8dc5f87ad787347,2025-06-06T14:06:58.193000 CVE-2025-4908,0,0,de60be5e9644ec87fb1afc243f75b0e5b1a22cdd347bf91d496fa5782bf1af05,2025-05-21T17:25:58.063000 -CVE-2025-49080,0,1,a3ee145d7be4cf83dc9f312b5f9ff46e81d31b0fafa34aa01f5f4b5126f1b5b8,2025-06-23T14:09:31.560000 +CVE-2025-49080,0,0,a3ee145d7be4cf83dc9f312b5f9ff46e81d31b0fafa34aa01f5f4b5126f1b5b8,2025-06-23T14:09:31.560000 CVE-2025-49081,0,0,f46741ebf083f87723e4189da0a46cfa0dc212582189b9cc78f69348a5e0933b,2025-06-17T20:32:38.453000 CVE-2025-4909,0,0,2543aa084bfc859fe1a7a0558cc76c793b6ee9b986cb9885265313fc24749d9b,2025-05-28T13:08:14.173000 CVE-2025-49091,0,0,6801a10a59e1cc04be6899d10437a31277f24115003af5306a3ab76dcd2ff20b,2025-06-18T01:15:28.803000 @@ -297987,7 +297993,7 @@ CVE-2025-50048,0,0,51d0791e924069b35e627a01d5c6c3ad560a9ad85e74f0bb2bcf139e9159b CVE-2025-50049,0,0,726a0dd76d44294314cdc18ad7657fe08bc2f7ebe99df2fd6367d870bcf1cec6,2025-06-20T15:15:31.440000 CVE-2025-50050,0,0,55ed1cfe9ba407ae0f1cef45284cfc220f443df1553027f06d9901c62736ec42,2025-06-20T15:15:31.590000 CVE-2025-50051,0,0,586cfd8fc67c6e705f028bea1f285dc2f199480672abe9b2cbd65d3de69e7c1d,2025-06-20T15:15:31.747000 -CVE-2025-50054,0,0,56d928378c753c8a037c09aac14688a6511e72e126eb6212e7ffd9507c69711a,2025-06-20T07:15:26.367000 +CVE-2025-50054,0,1,8345803c26053cd2e12f78da8fd6f235094a62d9934b629ba0efa2d7c6076176,2025-06-20T07:15:26.367000 CVE-2025-5006,0,0,681cabb0d000288ea3de1bc96c248c8dc62af67d94cda924b490a24cb5ce4b87,2025-05-28T01:16:17.537000 CVE-2025-5007,0,0,90fd6cc505f919e9193a4f785ead55c22de48a03da4d584106515fa806e84a62,2025-05-21T20:24:58.133000 CVE-2025-5008,0,0,a44de43d4fdee78a58fb0f23f855e641b712c558235d8e8c4b331b29571b8d57,2025-05-28T01:06:49.867000 @@ -298024,10 +298030,10 @@ CVE-2025-5032,0,0,4156143fef9ccb288081dade2120fec7f51a54986c4f66b96dc31d6794fced CVE-2025-5033,0,0,06c9afb9196a99dd4f0b3020a989f4b3254b2b9e05cd3f3304d140aa64b94a45,2025-06-20T16:15:38.947000 CVE-2025-5034,0,0,a5237986d670eb1fe5b75c607eb4c19a8e149970963980b2e7a9c1ea2e29eb2a,2025-06-21T06:15:18.363000 CVE-2025-5036,0,0,c38e53ab36341883513f1bc0436ec7cb62abd108008baba46460fded702f863e,2025-06-02T18:15:24.783000 -CVE-2025-5049,0,1,44cfcf3aff795ef24e83417940f428248f6dbe73d228a2445e4d18a251d64c21,2025-06-23T14:51:34.223000 -CVE-2025-5050,0,1,18c722bc6b5f548b69eef0fffd3878fac15ddedca7de625378de12e31e056210,2025-06-23T14:51:31.630000 -CVE-2025-5051,0,1,5142d535b5dcabf799858265cb0a073c54ecb398a0506990f7cead12fe67b40e,2025-06-23T14:51:29.537000 -CVE-2025-5052,0,1,fb14f53f59872f2ab4cd272c068cbf989da6288adaf09d4f876ce8e48ca81915,2025-06-23T14:51:27.970000 +CVE-2025-5049,0,0,44cfcf3aff795ef24e83417940f428248f6dbe73d228a2445e4d18a251d64c21,2025-06-23T14:51:34.223000 +CVE-2025-5050,0,0,18c722bc6b5f548b69eef0fffd3878fac15ddedca7de625378de12e31e056210,2025-06-23T14:51:31.630000 +CVE-2025-5051,0,0,5142d535b5dcabf799858265cb0a073c54ecb398a0506990f7cead12fe67b40e,2025-06-23T14:51:29.537000 +CVE-2025-5052,0,0,fb14f53f59872f2ab4cd272c068cbf989da6288adaf09d4f876ce8e48ca81915,2025-06-23T14:51:27.970000 CVE-2025-5053,0,0,3d2b70b4aa9309898ac88338d0e45e48032f9ef01b4619e69e4f80270305e3ac,2025-06-10T19:34:33.830000 CVE-2025-5054,0,0,68d095110a6b2be331697a8699cb10ea98d7a65a96add11ba5059f95d872a268,2025-06-02T17:32:17.397000 CVE-2025-5055,0,0,2813a40f904a4d38c72314bdeb0478f12eb76957b4f05117bb45d588d4e24d35,2025-05-28T14:58:52.920000 @@ -298045,8 +298051,8 @@ CVE-2025-5068,0,0,743f6f8e9f7972849bbf135b58a69c40f5a6f921a1bb6da952423dea4534ee CVE-2025-5071,0,0,3b2deef9236f3c759cda3ca3d7c218b19b13648226fc3eecf9f17094b26eaf9e,2025-06-19T10:15:22.027000 CVE-2025-5073,0,0,a1230535d583b5f466b5fe2615cca31afcba55333f600b324f190ec047a41d18,2025-06-05T20:13:49.707000 CVE-2025-5074,0,0,b32e6a163eb96eec8f69e51ca7a85c7da766b8b9d224e7b4f2f300a52a5b9bc3,2025-06-05T20:14:07.020000 -CVE-2025-5075,0,1,84d47ffcc3b0444179dda95ea7f7a9076e7c3fde7adbf4a674f65dac66b933d7,2025-06-23T14:51:26.367000 -CVE-2025-5076,0,1,dfb109cca293f4ecfde310307b8461b290498890aab42474abfa1c401ad76c9b,2025-06-23T14:51:24.623000 +CVE-2025-5075,0,0,84d47ffcc3b0444179dda95ea7f7a9076e7c3fde7adbf4a674f65dac66b933d7,2025-06-23T14:51:26.367000 +CVE-2025-5076,0,0,dfb109cca293f4ecfde310307b8461b290498890aab42474abfa1c401ad76c9b,2025-06-23T14:51:24.623000 CVE-2025-5077,0,0,5bb361381f7737ab78bfa864953c20bd9e7bf1942fef8fedd416b02808d591ef,2025-05-28T01:53:25.660000 CVE-2025-5078,0,0,57059c330cb53e9cb302cf773988b3ce2f731665e7a246772389547bf3f9a34e,2025-05-28T01:52:35.277000 CVE-2025-5079,0,0,b65b7a01086680e7c33bb20f87a251322b770baf6a9a37966a216093dc14b5cf,2025-05-28T01:50:48.303000 @@ -298065,8 +298071,8 @@ CVE-2025-5106,0,0,8d60356cbd9079f6bf55b49bab02b8750a168dbc792ae017334e677c2dae68 CVE-2025-5107,0,0,9bef18bc6435a934e04f34863d5f7ce6cdc3bf383eb4382c07acbfcfb93c088a,2025-05-27T15:15:35.577000 CVE-2025-5108,0,0,78dbeee09f012ae2aaa551a95acb36d04547bdfe4234231d8b8da6c18969eef6,2025-05-27T15:15:35.727000 CVE-2025-5109,0,0,af8f6823c329a88d09917c36f339b1374b9b939e3d9208c4a4573c3155524a8d,2025-06-20T16:02:35.837000 -CVE-2025-5110,0,1,afef19488b9b1daf7bad30423efa6db081313c1d760a7b2a90aa6560948b5674,2025-06-23T14:51:22.817000 -CVE-2025-5111,0,1,17bae438284397cfc73752a9b416f2ba9d466f2efbb72d3931bb65bdff917541,2025-06-23T14:51:20.580000 +CVE-2025-5110,0,0,afef19488b9b1daf7bad30423efa6db081313c1d760a7b2a90aa6560948b5674,2025-06-23T14:51:22.817000 +CVE-2025-5111,0,0,17bae438284397cfc73752a9b416f2ba9d466f2efbb72d3931bb65bdff917541,2025-06-23T14:51:20.580000 CVE-2025-5112,0,0,14e5700c63f1f1d448cfb10a35f8ed4225ebfe296cafec9014826190b78b6763,2025-05-23T15:54:42.643000 CVE-2025-5113,0,0,4fded5fd40401c221cac2ef8ce80b61992e5d3143855e1468dca36f7819a9933,2025-06-02T17:32:17.397000 CVE-2025-5114,0,0,20a4205c8646981529f8abb6bcbb5fe0a32214254e6052ddc8802d6fd9b03d3c,2025-05-23T15:54:42.643000 @@ -298212,7 +298218,7 @@ CVE-2025-5249,0,0,fc0947e1350e4210bd6e677b41423c19ba4df5864aa9264c3ec9f64636ca0b CVE-2025-5250,0,0,2a4bdc606e390fc951ba8f4ded6d97e8a69fbc9ec9574eb66322c159fbee23de,2025-06-10T15:12:33.010000 CVE-2025-5251,0,0,f632fe7c5885617fb201b5b935c30961323c6054755926cad7791588fe5ea46c,2025-06-10T15:12:43.393000 CVE-2025-5252,0,0,befcffbe58a6c748b51a32dbfdb428108ffe2b16ca817a921564fafd634c86b0,2025-06-09T18:51:06.110000 -CVE-2025-52542,1,1,6a356dbb016e8c78bba3561542110106778fbb5f08761ae704acc7dfbd8bdd74,2025-06-23T14:15:26.753000 +CVE-2025-52542,0,0,6a356dbb016e8c78bba3561542110106778fbb5f08761ae704acc7dfbd8bdd74,2025-06-23T14:15:26.753000 CVE-2025-5255,0,0,0d9f56d5e1509a662651a50a1959d77ed1c049a1471df3ec7483fe3801248464,2025-06-20T10:15:21.653000 CVE-2025-52552,0,0,27741305ae00f3d36bb92eb33f15f4f7f40418a880f409aa430ffa00fa775060,2025-06-21T03:15:24.990000 CVE-2025-52556,0,0,839776e8ea5d48efbfe10dd749a9ae7819c361ef6cbb9befd317045b49103746,2025-06-21T02:15:19.947000 @@ -298268,11 +298274,11 @@ CVE-2025-5283,0,0,a8169db79b4666d05c59f16c729749cd032f3753a6abd4a1bda7e79d017ef3 CVE-2025-5285,0,0,44bcec87abafcefe0886e878731e41dce32b0fc09d4f84e223174bcbfeb5ce09,2025-06-02T17:32:17.397000 CVE-2025-5286,0,0,05e7ca3386f0ef15ac2b01314d8e06913e02de8c1752e75b99b02bac23121404,2025-05-29T14:29:50.247000 CVE-2025-5287,0,0,b8300f230839e0ad3335fdc92731d9b07abc7f3405256834dd55febc4f9b0133,2025-05-28T15:01:30.720000 -CVE-2025-52875,1,1,de754e4497180a907f0d433e64adca9030b7017b82b3587162d59f6bf510c0b8,2025-06-23T15:15:28.260000 -CVE-2025-52876,1,1,df0bcba60153504feaa86afc0059e8a8994fd547fbef45903954ca07a542bbc8,2025-06-23T15:15:28.447000 -CVE-2025-52877,1,1,b2da309d35100995e03c52bab09ada2e66fade963cff04b95af0c33c599be141,2025-06-23T15:15:28.603000 -CVE-2025-52878,1,1,a631817ec18b37959b9580e1c3089005937ed70e4127c5016da10b9e930f9076,2025-06-23T15:15:28.770000 -CVE-2025-52879,1,1,9d4f83893a3c9f1de395e9905a463896db5eb3d4bdaa2a661fcb2a12bdf97553,2025-06-23T15:15:28.933000 +CVE-2025-52875,0,0,de754e4497180a907f0d433e64adca9030b7017b82b3587162d59f6bf510c0b8,2025-06-23T15:15:28.260000 +CVE-2025-52876,0,0,df0bcba60153504feaa86afc0059e8a8994fd547fbef45903954ca07a542bbc8,2025-06-23T15:15:28.447000 +CVE-2025-52877,0,0,b2da309d35100995e03c52bab09ada2e66fade963cff04b95af0c33c599be141,2025-06-23T15:15:28.603000 +CVE-2025-52878,0,0,a631817ec18b37959b9580e1c3089005937ed70e4127c5016da10b9e930f9076,2025-06-23T15:15:28.770000 +CVE-2025-52879,0,0,9d4f83893a3c9f1de395e9905a463896db5eb3d4bdaa2a661fcb2a12bdf97553,2025-06-23T15:15:28.933000 CVE-2025-5288,0,0,5b20c7a865ed486d932e1f5165bbcfd30ae2f04bc0acfb20d9396799c2c655a3,2025-06-16T12:32:18.840000 CVE-2025-5289,0,0,b9d742cd07348cf5ac5a6bc32677ea7f81a3f79e8dc609eede8959a563a09a42,2025-06-21T11:15:35.240000 CVE-2025-5290,0,0,ad45f62f849dd27deb380b44d26b94809d4f0499166fbd95cf7b52d6d8099374,2025-06-02T17:32:17.397000 @@ -298289,12 +298295,13 @@ CVE-2025-52923,0,0,825efd0bf97043c553869930f73d387d618324b6c5d516039439c06bdeeb2 CVE-2025-52926,0,0,a2ea71f5f513826223184ebdf984a9517b3b97a40b47a0432cc67e7fcc0b13bd,2025-06-23T01:15:21.877000 CVE-2025-52935,0,0,69f0a3d1fc334d25c1072a4fb7417df75df937e1592f0e78c34731ed1c3d5dec,2025-06-23T10:15:27.380000 CVE-2025-52936,0,0,5a73b32cd0cf146bc0ee081a574067937ffe0c6a2ffedc2de43fa39d77cb9bb9,2025-06-23T10:15:27.570000 -CVE-2025-52937,0,1,546c5911371065d8732d43f638a4acee46934556799b9d4d3a79d6c246ce41bb,2025-06-23T14:15:27.203000 +CVE-2025-52937,0,0,546c5911371065d8732d43f638a4acee46934556799b9d4d3a79d6c246ce41bb,2025-06-23T14:15:27.203000 CVE-2025-52938,0,0,32cfa0125cbed90894c155e967587051de3d80629a5cbc836d8fa783497c0b5c,2025-06-23T10:15:27.857000 CVE-2025-52939,0,0,acb57ccf8c49d776c9ae1d73e624db6ecf3f28e9fcac64a91b7b96853d88ef7b,2025-06-23T10:15:28.007000 CVE-2025-5295,0,0,d0e6aa3b032b1532910154b10cc32ceaaf64a98256f38c6f6f628cd0a1c4bacc,2025-05-28T15:01:30.720000 -CVE-2025-52967,1,1,6400c520949bb3b6a2dee7f261f5e193d9f26cdbd6767e30da7f754f88aeefc3,2025-06-23T15:15:29.163000 -CVE-2025-52968,1,1,a9658590dac69c266160ede971810619ebd88051cc14c521e59449b331bfcf05,2025-06-23T15:15:29.350000 +CVE-2025-52967,0,0,6400c520949bb3b6a2dee7f261f5e193d9f26cdbd6767e30da7f754f88aeefc3,2025-06-23T15:15:29.163000 +CVE-2025-52968,0,1,1b929f37b5e64d12a621147b3a595070ab199f341f8983fdb5e0a7be6e7d4b90,2025-06-23T17:15:30.990000 +CVE-2025-52969,1,1,546a1519926ec728f2b164af7db7b3a0ef54cc320ae9101eb035308842ea95cb,2025-06-23T17:15:31.137000 CVE-2025-5297,0,0,32219ebb357b11c35687ad82e2d72808a3fe88681e14d78b6d0829c9d1dbc7ef,2025-06-10T19:33:01.990000 CVE-2025-5298,0,0,db5fe80cdf57c0cc24fb51e7a48139d5b1b81a3a48561037cf1b32b8be34d74f,2025-05-28T20:37:48.440000 CVE-2025-5299,0,0,1f89fdfea84380ce22c226fdfd1b89a6ae1b920a9c80e662b58b6ab3dafee162,2025-06-10T15:46:55.753000 @@ -298310,8 +298317,8 @@ CVE-2025-5325,0,0,c13176172452a62b2dce96df66b8263f391e2e94fbea914673cf01de62808a CVE-2025-5326,0,0,44e560162f190407a031d43fb109d883b338df688e809a58566da260b71fd2ba,2025-05-30T16:31:03.107000 CVE-2025-5327,0,0,a8b880c32053a31de283f5a9cad582c296c544f77211624787db5b92e0d637e7,2025-06-10T15:13:37.533000 CVE-2025-5328,0,0,69e2dcbfc2b85f6314db4745b576ea63b045f3b89808be8d33ed6e2b70669005,2025-06-10T15:14:10.110000 -CVE-2025-5330,0,1,e7ffe160dd4f6c3817c7e36e2e683e91c9ad47396ef2482f8a3aba919f7252b8,2025-06-23T14:37:01.860000 -CVE-2025-5331,0,1,3e528485905d1d35c61ee15111a6c2d55d98c95985d2190c3f8dd98dcd93e3b2,2025-06-23T14:35:13.397000 +CVE-2025-5330,0,0,e7ffe160dd4f6c3817c7e36e2e683e91c9ad47396ef2482f8a3aba919f7252b8,2025-06-23T14:37:01.860000 +CVE-2025-5331,0,0,3e528485905d1d35c61ee15111a6c2d55d98c95985d2190c3f8dd98dcd93e3b2,2025-06-23T14:35:13.397000 CVE-2025-5332,0,0,e1def175621c4e1d1942302bd613c0906cf0d988637a95edef4cbf91efd49e74,2025-06-04T15:37:02.583000 CVE-2025-5334,0,0,3b25ffa10fa68a37bf0e18657dc7cc96e971a33e8fade936cdd130170872987d,2025-06-10T19:15:35.243000 CVE-2025-5335,0,0,5abfb5e74bc6ec2f8ed9b95f56ffcbd4f93dcd183997df85e24502ad95934637,2025-06-12T16:06:39.330000 @@ -298541,13 +298548,13 @@ CVE-2025-5637,0,0,b4095ae9d6d117e5e5fe317c037877142ad009ffe86dcd38c16540d27f7b17 CVE-2025-5638,0,0,5fa603e90eeb98583ea40591c0f1493256693a05d984ab5725744a9282518d9e,2025-06-06T20:12:17.237000 CVE-2025-5639,0,0,df69c796d2f2dcdd7b52222b3cca34eb33581a84dfcf4149ec44f708e4f12118,2025-06-06T20:12:28.340000 CVE-2025-5640,0,0,a28c86c8136e1feb945fccbeca2e1e5a219c046c15a8a6365d3963b3188e3fa7,2025-06-05T20:12:23.777000 -CVE-2025-5641,0,1,d5b74ed2999cb0573a6a00c5400b18ea1376fb3a7e88a5275977b2c2932e733f,2025-06-23T14:37:57.193000 -CVE-2025-5642,0,1,07bc4ff6bdf6624bf56957684ab53a92c9369b191efa0f5f0ccbb572aed8a52a,2025-06-23T14:38:11.337000 -CVE-2025-5643,0,1,bdc7b71238ce4013f922d9b127c18310da265916fde136924493a6a34126de7b,2025-06-23T14:38:25.483000 -CVE-2025-5644,0,1,5900d2ca0f624df2ba2cda28d1db8544b5da24767efe33d6c650c6c3f7428c8e,2025-06-23T14:38:45.623000 -CVE-2025-5645,0,1,17c50a7d3445db31fbfcc3af059c43697342bb3ec0608c670b1178f5cc8192e1,2025-06-23T14:39:01.727000 -CVE-2025-5646,0,1,2af58f3f277256983114103b89acb87ac3e1b53da1079dd51f5194cdb134d619,2025-06-23T14:40:23.430000 -CVE-2025-5647,0,1,cec2cc0ef01931a062fe6cfcc4eb1a3addc899b6310cbf327d1ae9d895f9464b,2025-06-23T14:40:09.040000 +CVE-2025-5641,0,0,d5b74ed2999cb0573a6a00c5400b18ea1376fb3a7e88a5275977b2c2932e733f,2025-06-23T14:37:57.193000 +CVE-2025-5642,0,0,07bc4ff6bdf6624bf56957684ab53a92c9369b191efa0f5f0ccbb572aed8a52a,2025-06-23T14:38:11.337000 +CVE-2025-5643,0,0,bdc7b71238ce4013f922d9b127c18310da265916fde136924493a6a34126de7b,2025-06-23T14:38:25.483000 +CVE-2025-5644,0,0,5900d2ca0f624df2ba2cda28d1db8544b5da24767efe33d6c650c6c3f7428c8e,2025-06-23T14:38:45.623000 +CVE-2025-5645,0,0,17c50a7d3445db31fbfcc3af059c43697342bb3ec0608c670b1178f5cc8192e1,2025-06-23T14:39:01.727000 +CVE-2025-5646,0,0,2af58f3f277256983114103b89acb87ac3e1b53da1079dd51f5194cdb134d619,2025-06-23T14:40:23.430000 +CVE-2025-5647,0,0,cec2cc0ef01931a062fe6cfcc4eb1a3addc899b6310cbf327d1ae9d895f9464b,2025-06-23T14:40:09.040000 CVE-2025-5648,0,0,8d8a946a9691d84bd632207adec092a07f5e621bdddce363a223111a1e12ac35,2025-06-17T18:56:04.373000 CVE-2025-5649,0,0,8d1f3267e39f86a1983625a80d2b4086de30c2bb535ef4e2d4852137479dd55a,2025-06-10T15:05:56.120000 CVE-2025-5650,0,0,c41210387d1002531a8860804a9f5e98813d1f3f1969221163975f35d5b4da41,2025-06-10T15:05:23.553000 @@ -298710,7 +298717,7 @@ CVE-2025-5871,0,0,cf8b155d3f5676937055fc70fc356be425d106281694dba873cdc0b7b3134e CVE-2025-5872,0,0,df91dff262321d8e54a907aa2d26c35e2664d50439e57f3d1baa4408ee42b93e,2025-06-09T12:15:47.880000 CVE-2025-5873,0,0,94e40892e1834c35ffd2c63a40f58e3bdf2ff473f557d19637cf12f248462e7f,2025-06-09T12:15:47.880000 CVE-2025-5874,0,0,726c9df65c566725a510f5c58b0c057c9bdfc295fa5f1ff3d2641c2157e02012,2025-06-09T12:15:47.880000 -CVE-2025-5875,0,1,c25b34ccfcd613e0dc066c8ac82a22ec084260cbb2bc3930454841ae31515b22,2025-06-23T14:21:01.890000 +CVE-2025-5875,0,0,c25b34ccfcd613e0dc066c8ac82a22ec084260cbb2bc3930454841ae31515b22,2025-06-23T14:21:01.890000 CVE-2025-5876,0,0,32a8af4e9cd8f7d2c246abe46c081e26ff3051e42e928a128210a8c01026ea88,2025-06-09T13:15:25.777000 CVE-2025-5877,0,0,e0dce4f1c575be2988ae468fd3b9f298d5610dc4a16b678a804d86d9b1adf31b,2025-06-12T16:06:47.857000 CVE-2025-5879,0,0,756604528009a19f95fc6aaf90273ff5d2ceec0a3e555d776ee81b7d6b78c298,2025-06-12T16:06:47.857000 @@ -298797,7 +298804,7 @@ CVE-2025-6007,0,0,ad7217a46edf88f3122f03c09e2fdcfd31382468cbe1002c4a5de402899399 CVE-2025-6008,0,0,cf45d1b8877307f98a5e962959db4dd8b70df84c99522375a10c3d04cde0826f,2025-06-19T01:26:01.867000 CVE-2025-6009,0,0,78abb2d4f36e6029b865859c44e8b3b2ae426316eb8bf2e15ca3e33565c4ca16,2025-06-19T01:25:17.743000 CVE-2025-6012,0,0,26f2f66d87f45d6aa756cc004552cfa11ed42d44708395d664a6658fe8d21b45,2025-06-16T12:32:18.840000 -CVE-2025-6019,0,1,4ac3780c7472efb91964dc19bb6ed01f38f9812cdbb0225ce13decc142e609e7,2025-06-23T14:15:27.323000 +CVE-2025-6019,0,0,4ac3780c7472efb91964dc19bb6ed01f38f9812cdbb0225ce13decc142e609e7,2025-06-23T14:15:27.323000 CVE-2025-6020,0,0,439a2d09f05868a64a6818f204c8af8c3741a1aa91da69dac7da1c6864b5ef72,2025-06-17T20:50:23.507000 CVE-2025-6021,0,0,4d6c316d6b2265feaa5a1f1976caab5acbb233a1583e3791720a0a82dcf439c4,2025-06-12T16:06:20.180000 CVE-2025-6029,0,0,e9108be7e98d0780991a9dbc9771d79381463de686ea76ad25b1212ca465841e,2025-06-16T12:32:18.840000 @@ -298992,54 +298999,54 @@ CVE-2025-6346,0,0,011bc8a262555edab4b20ddcee756fa3b3eb6e2997e406cc2e1d1d0357f55b CVE-2025-6347,0,0,76734206bdc523737368eb0b5491079d98ed161c921feac5e394265e2bbfb26b,2025-06-20T16:15:30.057000 CVE-2025-6351,0,0,0b04aaa7d086b3fc46c47903a32227c30f140a645f1c0f92929b974615781879,2025-06-20T16:15:30.250000 CVE-2025-6352,0,0,62dcc2d0d677be1f0bf6457d6b220cb963fe1d46556db17bc4c47d1d8c8d8385,2025-06-20T16:15:30.430000 -CVE-2025-6353,0,0,59d8b8297840f89c40ef36cdd69b9e5d760b77a0f415fde65797366096e36de0,2025-06-20T17:15:41.737000 -CVE-2025-6354,0,0,e5ff5359021ef92c7c075fbef4ee6410047d4c341520f408b4431aef1608a6a6,2025-06-20T17:15:41.977000 -CVE-2025-6355,0,0,9e75b08ef9e6d0811eec887a3b5a5f4bd2fd3b5be1479bcfaeb0db5aa9d2e49b,2025-06-20T17:15:42.217000 -CVE-2025-6356,0,0,8906897f1b5089a2863720fd249aa4f385343dd922b3be13810cd907806bfc51,2025-06-20T18:15:29.280000 +CVE-2025-6353,0,1,bcedf07597810e9d313a4c3a7c18928e1fe4e3b892c9aeb0160c86103a73a43f,2025-06-23T16:15:28.043000 +CVE-2025-6354,0,1,df2134d7cd28fa0b4ed4b2c0d2a5b7ad474049f7ae16993180dd54340ff08c00,2025-06-23T16:15:28.183000 +CVE-2025-6355,0,1,ed61aa51361a6ef5314447f6138259759f329568a14df6f763349dcac107378e,2025-06-23T16:15:28.320000 +CVE-2025-6356,0,1,6f51e45f250dd5d789a43513a01d7864e0501c685d80308e7b466dd47b28658b,2025-06-23T16:15:28.447000 CVE-2025-6357,0,0,9994f05f11f6fd4f3843657895c3ed7e60bf0cef59fb9fbb76dab8a2b1e4789f,2025-06-20T18:15:29.477000 -CVE-2025-6358,0,0,f99bf02cecc343314055e7b36fb7d8f9037e216a78f33ee40b5413a6190a3216,2025-06-20T18:15:29.660000 -CVE-2025-6359,0,0,9d007b920753fa0df20b7c612cf2630a29866fc99794bb75396ed51646f5b228,2025-06-20T19:15:37.803000 +CVE-2025-6358,0,1,90168a7e5f8bb04f80098d96bc607af18cccd3b433e581f356f31a7c50836f9f,2025-06-23T16:15:28.577000 +CVE-2025-6359,0,1,971dd2636f9a6ba83e95d9b37af5b017dc1aff2e022f864346c14d22f1642f48,2025-06-23T16:15:28.707000 CVE-2025-6360,0,0,29092be81e3b76da8c7336c69490f45ea3fdc5ab81dd51a38ebd8491d2510cb3,2025-06-20T19:15:38.023000 CVE-2025-6361,0,0,497d8faf69695876782410eef11eb7c547567394663443e19fb6830ea9f5d580,2025-06-20T20:15:34.633000 CVE-2025-6362,0,0,200f7dcdd01d32c3f0ee5808f9417c4d37452dd91b91b230b5879aeb762b55dc,2025-06-20T20:15:34.820000 -CVE-2025-6363,0,0,02ac2f155cec55cb8bc0cf8655350fdcf92c00dcede0bce48e58b81564cda535,2025-06-20T20:15:35.003000 -CVE-2025-6364,0,0,006bf7fbb97f6b87a275c265150de651dc85857c35924c5c61f64c74246732f3,2025-06-20T21:15:22.957000 -CVE-2025-6365,0,0,e7e0ed9d0d08d064f4be3e304abee4c9926e1d8a86b07b52cae6a84b3ece8e29,2025-06-20T21:15:23.140000 -CVE-2025-6367,0,0,d73c83ef68be9737bb36adece1ed10045d8ea359beea0979c29b6d1ef155c944,2025-06-20T21:15:23.327000 -CVE-2025-6368,0,1,b652a69ddcbda2353b55c798f12cf68deb176b8b42a2e80247181195cd741b48,2025-06-23T15:15:29.943000 -CVE-2025-6369,0,1,0b71d9d185a33961495404d89996f1b55447f0376b424dc78071d0b32068e6b4,2025-06-23T15:15:30.093000 -CVE-2025-6370,0,1,1d309b256ce7676343cc9ab52cdc93b4a1dde8c66fffb7c3460894c8840fdbe6,2025-06-23T15:15:30.220000 -CVE-2025-6371,0,1,c724d44e69a50c44fe24bc8706b1a0ea626864ff9482d6c94e657c4b6b0823a0,2025-06-23T15:15:30.370000 -CVE-2025-6372,0,0,11f261fd4f301b97a69b5991b974c6cc6925c34359044898a0d8cdb4b3c65be3,2025-06-20T23:15:20.077000 +CVE-2025-6363,0,1,ab8b6a80460bac6a8b4812f18ab1e9501d5cb1f0c950496fa3871733e7d502dc,2025-06-23T16:15:28.830000 +CVE-2025-6364,0,1,a7952d8f2b6f3d7a697638c673b9b44940e0e41de7c45bcb912151791a9d8bc1,2025-06-23T16:15:28.960000 +CVE-2025-6365,0,1,fc8714e58327815c646e42087290ed224d315b6d66cea9788d79d9a5202a610f,2025-06-23T16:15:29.093000 +CVE-2025-6367,0,1,44fe957d1b3839d7e219e2790bd5d0ed99b3dd2b72cc35955a21c23e4d4c6e1a,2025-06-23T16:15:29.233000 +CVE-2025-6368,0,0,b652a69ddcbda2353b55c798f12cf68deb176b8b42a2e80247181195cd741b48,2025-06-23T15:15:29.943000 +CVE-2025-6369,0,0,0b71d9d185a33961495404d89996f1b55447f0376b424dc78071d0b32068e6b4,2025-06-23T15:15:30.093000 +CVE-2025-6370,0,0,1d309b256ce7676343cc9ab52cdc93b4a1dde8c66fffb7c3460894c8840fdbe6,2025-06-23T15:15:30.220000 +CVE-2025-6371,0,0,c724d44e69a50c44fe24bc8706b1a0ea626864ff9482d6c94e657c4b6b0823a0,2025-06-23T15:15:30.370000 +CVE-2025-6372,0,1,36c00124f4b93e190073a36ed7b0a2b2147469323e9aef7f9b8c2b21f1929ac6,2025-06-23T16:15:29.363000 CVE-2025-6373,0,0,6e218b88406a89e42e51ab0b6bce2f99cf7c4031ea9443c81ddd02dc9c9521cd,2025-06-21T00:15:22.420000 CVE-2025-6374,0,0,b64de8ac08765ef2aa29524f49bd34819f262290b45c21bdea86cc8246ba3a99,2025-06-21T01:15:29.257000 -CVE-2025-6375,0,1,a701de4fa9acbeb9a5275341037fb4b17ed765a131529c9f5e2fc59ec01b7bfb,2025-06-23T15:15:30.500000 +CVE-2025-6375,0,0,a701de4fa9acbeb9a5275341037fb4b17ed765a131529c9f5e2fc59ec01b7bfb,2025-06-23T15:15:30.500000 CVE-2025-6384,0,0,5cdec51953ac45fb27a9189069c1d2dedd736d67cb8696f7a629dd1dd7d1191f,2025-06-19T21:15:27.390000 -CVE-2025-6393,0,1,875eb5cbedee94117eab5461cf902033c5077e7b3e07d0a3bd519e5ba6237345,2025-06-23T15:15:30.647000 -CVE-2025-6394,0,1,2eab86707fdfae5ed188daf89a57180ba0c1b5fe5fd120e59affb028d9b4e422,2025-06-23T15:15:30.777000 +CVE-2025-6393,0,0,875eb5cbedee94117eab5461cf902033c5077e7b3e07d0a3bd519e5ba6237345,2025-06-23T15:15:30.647000 +CVE-2025-6394,0,0,2eab86707fdfae5ed188daf89a57180ba0c1b5fe5fd120e59affb028d9b4e422,2025-06-23T15:15:30.777000 CVE-2025-6399,0,0,4e1efe71bd5e4cfa8ab2ff5a9127ce00373b7f6790fd011901c9b5eee0f73f6a,2025-06-21T04:15:23.140000 CVE-2025-6400,0,0,748a86d253e9363c04b818e49ea5dee266bc2fc2cefdf3d21460cc5d4fa7f8cf,2025-06-21T06:15:19.577000 CVE-2025-6401,0,0,9d9dd7c8c9a8182d339c1e04938e080d45737af681976610632f07c1158446ae,2025-06-21T07:15:23.197000 CVE-2025-6402,0,0,86e3fb80660b4a0aa440d06524000ca21ff60f631715b366a9d8547e04bbf0c9,2025-06-21T09:15:22.193000 -CVE-2025-6403,0,1,016a930de1257f909dfa0214b23b13acb0cbf0721de6e571912b8fb6ece8484e,2025-06-23T15:15:30.903000 -CVE-2025-6404,0,1,99cf4fdc5c22d9c49f68f5b5bad6481bc45b040385f4e422b3f4765bad3cf745,2025-06-23T15:15:31.030000 -CVE-2025-6405,0,1,af14a509beaea1890451eac5c54e2f0f4017a137a06b7e6d7bf0352ad8b63992,2025-06-23T15:15:31.153000 -CVE-2025-6406,0,1,7e8561f16fc2b274624199aa840c7736970fc25a0c2fc2c1229a7df1fc57a970,2025-06-23T15:15:31.280000 -CVE-2025-6407,0,1,08818ab65b4c18d84a6e4b78723522dd326591fa638897bacfc7eaa2b313473a,2025-06-23T15:15:31.400000 -CVE-2025-6408,0,1,f6bb2de866b420e94b9e9994a67815e4a12cb8b33f99ec35f27a44695d1baeb7,2025-06-23T15:15:31.527000 +CVE-2025-6403,0,0,016a930de1257f909dfa0214b23b13acb0cbf0721de6e571912b8fb6ece8484e,2025-06-23T15:15:30.903000 +CVE-2025-6404,0,0,99cf4fdc5c22d9c49f68f5b5bad6481bc45b040385f4e422b3f4765bad3cf745,2025-06-23T15:15:31.030000 +CVE-2025-6405,0,0,af14a509beaea1890451eac5c54e2f0f4017a137a06b7e6d7bf0352ad8b63992,2025-06-23T15:15:31.153000 +CVE-2025-6406,0,0,7e8561f16fc2b274624199aa840c7736970fc25a0c2fc2c1229a7df1fc57a970,2025-06-23T15:15:31.280000 +CVE-2025-6407,0,0,08818ab65b4c18d84a6e4b78723522dd326591fa638897bacfc7eaa2b313473a,2025-06-23T15:15:31.400000 +CVE-2025-6408,0,0,f6bb2de866b420e94b9e9994a67815e4a12cb8b33f99ec35f27a44695d1baeb7,2025-06-23T15:15:31.527000 CVE-2025-6409,0,0,ab58691f2ecf6e947a9564c4c0156aa3bbf03a9b1aeb4b1e15a35636ca599aaf,2025-06-21T16:15:21.407000 CVE-2025-6410,0,0,c0173d12925efeb271e682924d6b75fbb1583ecd595d8bae5f480e46133161cc,2025-06-21T17:15:23.580000 CVE-2025-6411,0,0,b8157503290e836e4debd48f60c1e95d700074b4878a50f7f6bd70907c82b061,2025-06-21T17:15:23.800000 CVE-2025-6412,0,0,6bba585df4a6a1290d4defcad0a067fb3000d58fdf83ecbd8be32ef6de55500b,2025-06-21T18:15:23.830000 -CVE-2025-6413,0,1,878d96cbd6373d4bbcbc7eac8e3f7b883bbdaf9647b3f8f01ffac49243778471,2025-06-23T15:15:31.657000 -CVE-2025-6414,0,1,9ea807bf9a81de1a2d462892ae7f6f355ac53ddfc19e9289e4d524342b29c22f,2025-06-23T15:15:31.800000 -CVE-2025-6415,0,1,bb5f0509b2887c056c271bf0f45ad9b70fe18acfadfacee68c2b844e143fff5b,2025-06-23T15:15:31.930000 -CVE-2025-6416,0,1,f6e0cd95d0883543e0d1f97d7088ef861ad9953436aa8a1283aa7bb720c6959e,2025-06-23T15:15:32.057000 -CVE-2025-6417,0,1,ed608dcd14204e3f1e89582f0fde89c7cb1601320a169263aa0d5bde1a7f6d40,2025-06-23T15:15:32.183000 -CVE-2025-6418,0,1,3e0b567697264438b4f5b77b0ab4d0f48f168ad26c7f87494ad73e30925bd25e,2025-06-23T15:15:32.307000 -CVE-2025-6419,0,1,8c6e63e1663c741684ad25c792cd159705ea320552f15b4bb98108113d175ee6,2025-06-23T15:15:32.433000 -CVE-2025-6420,0,1,cdb75dba0b5ce7b892adebfa0b9d7a45ff81df4b0222d01fde6da32f8eeab99c,2025-06-23T15:15:32.560000 -CVE-2025-6421,0,1,af5baab7d33200cd061f296b00b3de92031f238f561e3eb614150bcb8ec563fa,2025-06-23T15:15:32.680000 +CVE-2025-6413,0,0,878d96cbd6373d4bbcbc7eac8e3f7b883bbdaf9647b3f8f01ffac49243778471,2025-06-23T15:15:31.657000 +CVE-2025-6414,0,0,9ea807bf9a81de1a2d462892ae7f6f355ac53ddfc19e9289e4d524342b29c22f,2025-06-23T15:15:31.800000 +CVE-2025-6415,0,0,bb5f0509b2887c056c271bf0f45ad9b70fe18acfadfacee68c2b844e143fff5b,2025-06-23T15:15:31.930000 +CVE-2025-6416,0,0,f6e0cd95d0883543e0d1f97d7088ef861ad9953436aa8a1283aa7bb720c6959e,2025-06-23T15:15:32.057000 +CVE-2025-6417,0,0,ed608dcd14204e3f1e89582f0fde89c7cb1601320a169263aa0d5bde1a7f6d40,2025-06-23T15:15:32.183000 +CVE-2025-6418,0,0,3e0b567697264438b4f5b77b0ab4d0f48f168ad26c7f87494ad73e30925bd25e,2025-06-23T15:15:32.307000 +CVE-2025-6419,0,0,8c6e63e1663c741684ad25c792cd159705ea320552f15b4bb98108113d175ee6,2025-06-23T15:15:32.433000 +CVE-2025-6420,0,0,cdb75dba0b5ce7b892adebfa0b9d7a45ff81df4b0222d01fde6da32f8eeab99c,2025-06-23T15:15:32.560000 +CVE-2025-6421,0,0,af5baab7d33200cd061f296b00b3de92031f238f561e3eb614150bcb8ec563fa,2025-06-23T15:15:32.680000 CVE-2025-6422,0,0,c573c4db3c0f20957365ddf4fca4d8cd722bee1aea05672517904a42b456062e,2025-06-21T23:15:24.563000 CVE-2025-6446,0,0,44bb6e746b3927f98410a922df7f49f7dfc756465d7a1b8c41e32b3d72a60ca9,2025-06-21T23:15:24.743000 CVE-2025-6447,0,0,d6e53d5485fb5a3d0f12bc8d5c88d5554f6d7639b5607c74f1cea40c03552c01,2025-06-22T00:15:25.220000 @@ -299047,14 +299054,14 @@ CVE-2025-6448,0,0,40cda260ec27fd5e0737735c0c34194b09100006124949d443f7335c8e347f CVE-2025-6449,0,0,116d3d2e21456f110f9a0f23b1e214947937874eabee1f30050b1cc53b689b69,2025-06-22T01:15:24.283000 CVE-2025-6450,0,0,7799bb9dd2f2f68c9e0b3e0363e03394a18b58a0cbe8e725f2b08981ea76741f,2025-06-22T01:15:24.470000 CVE-2025-6451,0,0,ddfd5352b74ff29f320f2da5b49b9c3961bbabfa82ef06d1c3b29e20d8991728,2025-06-22T02:15:22.983000 -CVE-2025-6452,0,1,63ff1d707c2d4d6191c1be973aa90ec67a6c1acf6baf2f39ac5a900fd758b3a4,2025-06-23T15:15:32.813000 -CVE-2025-6453,0,1,9c885666116121e3b884ab4ff5531440727d5c1418716ceb5b840c4a9a393584,2025-06-23T15:15:32.937000 -CVE-2025-6455,0,1,28c74c7cb9544884eb7535a971765d74e5d1c3f96dacbf9c086677c417a5fa5b,2025-06-23T15:15:33.073000 -CVE-2025-6456,0,1,2d820c12caf403f62a3f4e6b3131debc016ddc24e6880c7d796407e57d2acd28,2025-06-23T15:15:33.230000 -CVE-2025-6457,0,1,3ed47e74d5401b3a49a017fb16219dec6ef33a4d30b3bc35a29970e3e4dc0115,2025-06-23T15:15:33.357000 -CVE-2025-6458,0,1,e8f22c4aef78a28ac9577ad7f726df891a8351f52465f7e1cd96b0890bbdc9a6,2025-06-23T15:15:33.497000 -CVE-2025-6466,0,1,4976e85db194b48b1567167c969a847ccee78fb03413b69a23ee3e29a3acbdf7,2025-06-23T15:15:34.440000 -CVE-2025-6467,0,1,9a3adfa72fc7506ba417d1a5a324fa98822d0838dfb58a14722e7ce6d55815b0,2025-06-23T14:15:27.473000 +CVE-2025-6452,0,0,63ff1d707c2d4d6191c1be973aa90ec67a6c1acf6baf2f39ac5a900fd758b3a4,2025-06-23T15:15:32.813000 +CVE-2025-6453,0,0,9c885666116121e3b884ab4ff5531440727d5c1418716ceb5b840c4a9a393584,2025-06-23T15:15:32.937000 +CVE-2025-6455,0,0,28c74c7cb9544884eb7535a971765d74e5d1c3f96dacbf9c086677c417a5fa5b,2025-06-23T15:15:33.073000 +CVE-2025-6456,0,0,2d820c12caf403f62a3f4e6b3131debc016ddc24e6880c7d796407e57d2acd28,2025-06-23T15:15:33.230000 +CVE-2025-6457,0,0,3ed47e74d5401b3a49a017fb16219dec6ef33a4d30b3bc35a29970e3e4dc0115,2025-06-23T15:15:33.357000 +CVE-2025-6458,0,0,e8f22c4aef78a28ac9577ad7f726df891a8351f52465f7e1cd96b0890bbdc9a6,2025-06-23T15:15:33.497000 +CVE-2025-6466,0,0,4976e85db194b48b1567167c969a847ccee78fb03413b69a23ee3e29a3acbdf7,2025-06-23T15:15:34.440000 +CVE-2025-6467,0,0,9a3adfa72fc7506ba417d1a5a324fa98822d0838dfb58a14722e7ce6d55815b0,2025-06-23T14:15:27.473000 CVE-2025-6468,0,0,fbd044ac936e33262d45471d5bd03b56e48368b2b44c1a71ed9578ebf513d15a,2025-06-22T08:15:24.677000 CVE-2025-6469,0,0,9aabfd74ea6320805ce8b656f216d435faba1feb3077facc77facf7f64092150,2025-06-22T08:15:25.497000 CVE-2025-6470,0,0,5f23ea5ce0815ab35440026fa17de2e18509ec334d3f2e6b8233a9348a155287,2025-06-22T09:15:25.157000 @@ -299064,7 +299071,7 @@ CVE-2025-6473,0,0,09409a4bd477f81614d70281f18b72d4f6fa78f49d1117127779c435ad3600 CVE-2025-6474,0,0,3e39c8512816416fe8c7ddf5aaed888f37c2634d5d80b0be4ec720b4c35ad5bc,2025-06-22T12:15:19.777000 CVE-2025-6475,0,0,0344ea1c6e041c7440b343720387b9179b9f0e1cabde7f3aafb90f7057fbc66d,2025-06-22T12:15:20.747000 CVE-2025-6476,0,0,d7334e2904c03dcecdcfc40845defacdd1ecf8afbe242a8181c73133e9d019d9,2025-06-22T13:15:34.470000 -CVE-2025-6477,0,1,cfa2bd7fef0c902e2c30cad9bf680868cbf861e0fe517c90d1aa7af0157fb159,2025-06-23T14:15:28.330000 +CVE-2025-6477,0,0,cfa2bd7fef0c902e2c30cad9bf680868cbf861e0fe517c90d1aa7af0157fb159,2025-06-23T14:15:28.330000 CVE-2025-6478,0,0,e86ea84207021fa44f32275e31374d82feb873262d1459f18c9a2e5fc8fad6ff,2025-06-22T14:15:21.467000 CVE-2025-6479,0,0,87049c82e93ed13079449e8a426feaafd7bcde7e185f10e9339b40c6bd40b18b,2025-06-22T14:15:22.193000 CVE-2025-6480,0,0,ac6d9565637ad4389fcc04e1bcce035789833b9f48dd1e237c00ebd5f3337e48,2025-06-22T15:15:20.030000 @@ -299082,11 +299089,15 @@ CVE-2025-6493,0,0,b07984a53cd9acdb838d53ec36f19bf2b78d39f60ec9fbcd3799653f00698e CVE-2025-6494,0,0,86f1220d913db6a1ab74494e021685dc10d3e076bd7d139d8673bfd67dc71200,2025-06-22T23:15:20.103000 CVE-2025-6496,0,0,2b5f2de3f64d739030644e9cc059b885cfe6a37938dff98fe008e38153a2053e,2025-06-23T00:15:23.117000 CVE-2025-6497,0,0,dc164f05cd4fbed7722e13df6028fdc1267acb81bac64b9f55e604144a684c22,2025-06-23T01:15:22.073000 -CVE-2025-6498,0,1,7f117998d5758a3fbc3c030e1b3c62d5890f5ff09de5b53e7b548389eb48d7d0,2025-06-23T14:15:28.950000 -CVE-2025-6499,0,1,4eb7250c581d89d97dd682ec0d42a8210a61278e9906826875a49855348b804e,2025-06-23T14:15:29.077000 -CVE-2025-6500,0,1,881dc0d608000677c0cffd31356201096e6e26efc4f18eec38a2cb5c495a0250,2025-06-23T14:15:29.207000 -CVE-2025-6501,0,1,d375b1fdb8f2189e2cf1c0ea6bab2b673a1f6050f3aa39ea576b3b9a0851ae19,2025-06-23T14:15:29.337000 +CVE-2025-6498,0,0,7f117998d5758a3fbc3c030e1b3c62d5890f5ff09de5b53e7b548389eb48d7d0,2025-06-23T14:15:28.950000 +CVE-2025-6499,0,0,4eb7250c581d89d97dd682ec0d42a8210a61278e9906826875a49855348b804e,2025-06-23T14:15:29.077000 +CVE-2025-6500,0,0,881dc0d608000677c0cffd31356201096e6e26efc4f18eec38a2cb5c495a0250,2025-06-23T14:15:29.207000 +CVE-2025-6501,0,0,d375b1fdb8f2189e2cf1c0ea6bab2b673a1f6050f3aa39ea576b3b9a0851ae19,2025-06-23T14:15:29.337000 CVE-2025-6502,0,0,dee39bba679fa1664ff5ffd6d1f5297b6166726b2901546250d37a4402661b97,2025-06-23T04:15:24.780000 CVE-2025-6503,0,0,09279d17f7c61f97e4798e7b6e3c3fe45d55c669f7d25ad1125f5eab7e1ec9d8,2025-06-23T04:15:42.737000 +CVE-2025-6509,1,1,2aac3f390efb001eb5e772abfe22fa572851732ca789fb54373fe951baac1f4b,2025-06-23T16:15:29.560000 +CVE-2025-6510,1,1,e99e364cac546b151f8c26db6330a22c841229fd024490545442019c2170bf2d,2025-06-23T16:15:29.770000 +CVE-2025-6511,1,1,4689ea3fded3deafcf094dc9c193908921ce796acb819025e59f821328837b70,2025-06-23T17:15:32.347000 CVE-2025-6512,0,0,929074c40784a8a7e4bea63b3e8fde745aecb9b4aac7e380dbea6fff6bf1a027,2025-06-23T13:15:22.460000 CVE-2025-6513,0,0,fce112496af3766c83513d2f7532743c646a19af3da3761627887efca2174e9f,2025-06-23T13:15:23.040000 +CVE-2025-6516,1,1,e1b221c85d85f1613a82baa969aaa96dac7131ffc9bbbcdaf0ed77517e236f49,2025-06-23T17:15:32.550000