diff --git a/CVE-2025/CVE-2025-264xx/CVE-2025-26412.json b/CVE-2025/CVE-2025-264xx/CVE-2025-26412.json new file mode 100644 index 00000000000..18f5b0b61c0 --- /dev/null +++ b/CVE-2025/CVE-2025-264xx/CVE-2025-26412.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-26412", + "sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf", + "published": "2025-06-11T09:15:22.067", + "lastModified": "2025-06-11T09:15:22.067", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The SIMCom SIM7600G modem supports an undocumented AT command, which allows an attacker to execute system commands with root permission on the modem. An attacker needs either physical access or remote shell access to a device that interacts directly with the modem via AT commands." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "551230f0-3615-47bd-b7cc-93e92e730bbf", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-912" + } + ] + } + ], + "references": [ + { + "url": "https://r.sec-consult.com/simcom", + "source": "551230f0-3615-47bd-b7cc-93e92e730bbf" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-297xx/CVE-2025-29756.json b/CVE-2025/CVE-2025-297xx/CVE-2025-29756.json new file mode 100644 index 00000000000..79599e6d593 --- /dev/null +++ b/CVE-2025/CVE-2025-297xx/CVE-2025-29756.json @@ -0,0 +1,93 @@ +{ + "id": "CVE-2025-29756", + "sourceIdentifier": "csirt@divd.nl", + "published": "2025-06-11T08:15:21.730", + "lastModified": "2025-06-11T08:15:21.730", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "csirt@divd.nl", + "tags": [ + "exclusively-hosted-service" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "SunGrow's back end users system iSolarCloud https://isolarcloud.com \u00a0uses an MQTT service to transport data from the user's connected devices to the user's web browser.\u00a0\nThe MQTT server however did not have sufficient restrictions in place to limit the topics that a user could subscribe to.\u00a0\nWhile the data that is transmitted through the MQTT server is encrypted and the credentials for the MQTT server are obtained though an API call, the credentials could be used to subscribe to any topic and the encryption key can be used to decrypt all messages received.\nAn attack with an account on iSolarCloud.com could extract\u00a0MQTT credentials and the decryption key from the browser and then use an external program to subscribe to the topic '#' and thus recieve all messages from all connected devices." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "csirt@divd.nl", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:X/V:X/RE:X/U:X", + "baseScore": 8.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "YES", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "csirt@divd.nl", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://csirt.divd.nl/CVE-2025-29756", + "source": "csirt@divd.nl" + }, + { + "url": "https://csirt.divd.nl/DIVD-2025-00009", + "source": "csirt@divd.nl" + }, + { + "url": "https://isolarcloud.com", + "source": "csirt@divd.nl" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-416xx/CVE-2025-41661.json b/CVE-2025/CVE-2025-416xx/CVE-2025-41661.json new file mode 100644 index 00000000000..7fbbbe9e245 --- /dev/null +++ b/CVE-2025/CVE-2025-416xx/CVE-2025-41661.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-41661", + "sourceIdentifier": "info@cert.vde.com", + "published": "2025-06-11T09:15:22.257", + "lastModified": "2025-06-11T09:15:22.257", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An unauthenticated remote attacker can execute arbitrary commands with root privileges on affected devices due to lack of Cross-Site Request Forgery (CSRF) protection in the Main Web Interface (endpoint event_mail_test)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "info@cert.vde.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "info@cert.vde.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://certvde.com/en/advisories/VDE-2025-052", + "source": "info@cert.vde.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-416xx/CVE-2025-41662.json b/CVE-2025/CVE-2025-416xx/CVE-2025-41662.json new file mode 100644 index 00000000000..9a4e26d00f4 --- /dev/null +++ b/CVE-2025/CVE-2025-416xx/CVE-2025-41662.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-41662", + "sourceIdentifier": "info@cert.vde.com", + "published": "2025-06-11T09:15:22.480", + "lastModified": "2025-06-11T09:15:22.480", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An unauthenticated remote attacker can execute arbitrary commands with root privileges on affected devices due to lack of Cross-Site Request Forgery (CSRF) protection in the Main Web Interface (endpoint tls_iotgen_setting)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "info@cert.vde.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "info@cert.vde.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://certvde.com/en/advisories/VDE-2025-052", + "source": "info@cert.vde.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-416xx/CVE-2025-41663.json b/CVE-2025/CVE-2025-416xx/CVE-2025-41663.json new file mode 100644 index 00000000000..2925ca36bde --- /dev/null +++ b/CVE-2025/CVE-2025-416xx/CVE-2025-41663.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-41663", + "sourceIdentifier": "info@cert.vde.com", + "published": "2025-06-11T09:15:22.700", + "lastModified": "2025-06-11T09:15:22.700", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An unauthenticated remote attacker in a man-in-the-middle position can inject arbitrary commands in responses returned by WWH servers and gain arbitrary command execution with elevated privileges." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "info@cert.vde.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "info@cert.vde.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://certvde.com/en/advisories/VDE-2025-052", + "source": "info@cert.vde.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5991.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5991.json new file mode 100644 index 00000000000..dc60ac502b1 --- /dev/null +++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5991.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-5991", + "sourceIdentifier": "a59d8014-47c4-4630-ab43-e1b13cbe58e3", + "published": "2025-06-11T08:15:22.933", + "lastModified": "2025-06-11T08:15:22.933", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "There is a \"Use After Free\" vulnerability in Qt's QHttp2ProtocolHandler in the QtNetwork module. This only affects HTTP/2 handling, HTTP handling is not affected by this at all. This happens due to a race condition between how QHttp2Stream uploads the body of a\n POST request and the simultaneous handling of HTTP error responses.\n\nThis issue only affects Qt 6.9.0 and has been fixed for Qt 6.9.1." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "a59d8014-47c4-4630-ab43-e1b13cbe58e3", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 2.1, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "LOW", + "subIntegrityImpact": "LOW", + "subAvailabilityImpact": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "a59d8014-47c4-4630-ab43-e1b13cbe58e3", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://codereview.qt-project.org/c/qt/qtbase/+/643777", + "source": "a59d8014-47c4-4630-ab43-e1b13cbe58e3" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index eb1e2fc7c0f..7e6a5fcf714 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-11T08:00:19.859810+00:00 +2025-06-11T10:00:19.120084+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-06-11T07:15:24.800000+00:00 +2025-06-11T09:15:22.700000+00:00 ``` ### Last Data Feed Release @@ -33,15 +33,19 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -297703 +297709 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `6` -- [CVE-2024-35295](CVE-2024/CVE-2024-352xx/CVE-2024-35295.json) (`2025-06-11T07:15:24.273`) -- [CVE-2025-5395](CVE-2025/CVE-2025-53xx/CVE-2025-5395.json) (`2025-06-11T07:15:24.800`) +- [CVE-2025-26412](CVE-2025/CVE-2025-264xx/CVE-2025-26412.json) (`2025-06-11T09:15:22.067`) +- [CVE-2025-29756](CVE-2025/CVE-2025-297xx/CVE-2025-29756.json) (`2025-06-11T08:15:21.730`) +- [CVE-2025-41661](CVE-2025/CVE-2025-416xx/CVE-2025-41661.json) (`2025-06-11T09:15:22.257`) +- [CVE-2025-41662](CVE-2025/CVE-2025-416xx/CVE-2025-41662.json) (`2025-06-11T09:15:22.480`) +- [CVE-2025-41663](CVE-2025/CVE-2025-416xx/CVE-2025-41663.json) (`2025-06-11T09:15:22.700`) +- [CVE-2025-5991](CVE-2025/CVE-2025-59xx/CVE-2025-5991.json) (`2025-06-11T08:15:22.933`) ### CVEs modified in the last Commit diff --git a/_state.csv b/_state.csv index 0611c5407b5..1f3b469616d 100644 --- a/_state.csv +++ b/_state.csv @@ -261612,7 +261612,7 @@ CVE-2024-35291,0,0,68f25d86268f0841afdd1d14b56353ce2ee5e6517f604738d19dca536b9e9 CVE-2024-35292,0,0,6e5c4c8222f0d63eb4c4c2f99f4d66e32d119335c8846bea5247c5b2542fe5f0,2024-11-21T09:20:05.477000 CVE-2024-35293,0,0,55ecab019b9bc05e17fb9740f75542540a9b2311e66fb192268f9d57609b2845,2024-10-04T13:50:43.727000 CVE-2024-35294,0,0,1c6f1605fc3c9904bc421a18ad31d4464fc1e4554d4917d8dd1c25b7a0d024c6,2024-10-04T13:50:43.727000 -CVE-2024-35295,1,1,4e6a4972a9791fa6fb6efbb867221cf3eecca27a6ccec8ecd30f5c7dd99cfccc,2025-06-11T07:15:24.273000 +CVE-2024-35295,0,0,4e6a4972a9791fa6fb6efbb867221cf3eecca27a6ccec8ecd30f5c7dd99cfccc,2025-06-11T07:15:24.273000 CVE-2024-35296,0,0,8eeaaf70f1e278aae70095c59c0f6e6d8374adc16444eb79c302ddf5c2754a61,2025-03-27T16:15:23.977000 CVE-2024-35297,0,0,23e69c7fa8758d2839ba0f21232e1c70c9a4debd79526bb77618b215f0e86ca8,2024-11-21T09:20:05.907000 CVE-2024-35298,0,0,fa7788bf317a71a84bf8146795eafa26bcb4ed57f180f49f693caedd58415924,2024-11-21T09:20:06.100000 @@ -288682,6 +288682,7 @@ CVE-2025-26409,0,0,cdf29866235215f5068aacbcbdb6f999e9c9f7adf8baf249758a0e54e8048 CVE-2025-2641,0,0,0c4e7f6e917c2684e1ef81919020337c8afbfd73d5a46107cea6f98fc25ffc5c,2025-04-02T14:32:40.757000 CVE-2025-26410,0,0,e0a8c1ecc38adad5db47008cfe5d8287500ec3cbba2c1f9a4a60a8e1051c525e,2025-03-18T19:15:50.450000 CVE-2025-26411,0,0,3c8f066d5451ad6ef36a27d64d17719d6f654697fa56337f49dfc83e42e73333,2025-03-14T18:15:31.947000 +CVE-2025-26412,1,1,e439f02063f036d3657a0bf05afa8e0aae7f2989029f4b795f42ec34bbfc4505,2025-06-11T09:15:22.067000 CVE-2025-26413,0,0,2158c3399ea37dae246e6333a0208fa039262ef589c11e6030057cf377da68cd,2025-05-12T16:15:23.023000 CVE-2025-2642,0,0,9fd74d08c30eb46678d329dd538a5586185726ca4d8ec1276ca17b4f6bd06bab,2025-04-02T13:48:31.510000 CVE-2025-2643,0,0,f96a1e9165c8c6b99a098f4d86d5cf57a75b6fe768e009b644ffd8b873a80653,2025-04-02T13:42:29.387000 @@ -290384,6 +290385,7 @@ CVE-2025-2974,0,0,695ae768ef6524a31e333a2a15c7b6d7e58b63b62d57be8f5f977780042de4 CVE-2025-29743,0,0,81120842f22b2571ea7e3fe058ac6f5d5658e8dd31a46120b990d9a82771d185,2025-04-30T13:54:38.493000 CVE-2025-29746,0,0,b928f042c8f64c45c80662a4638972935a0ad568b5c440e11d275fd69dd05300,2025-05-08T16:15:25.443000 CVE-2025-2975,0,0,a51ab4826f882dfc9eb64143ebea4f1b786d39ebf186c00a08fe8a9302ac16b4,2025-04-01T20:26:30.593000 +CVE-2025-29756,1,1,31c46edf3dde58bd9d48d72e74cb8b05849e66e6393c7f07bb971e9323117946,2025-06-11T08:15:21.730000 CVE-2025-2976,0,0,2714beee469a94bef5bdeffcc7963fd27d32ec325e019e7704104b1aec409041,2025-04-01T20:26:30.593000 CVE-2025-29763,0,0,bf55241b67fdd310b98028858a08a97cc074676a6765a11772e4f8ce63994862,2025-05-01T20:15:36.110000 CVE-2025-29766,0,0,d0d6c01c0aacc0172ff6cf10187bd4c58c9fb5a0b02e4e65dffc9f50e759cbe7,2025-04-01T20:26:22.890000 @@ -294515,6 +294517,9 @@ CVE-2025-41654,0,0,c22856a515f49ccd204a32143b656fc257abf14e343863bdec0d026ca010b CVE-2025-41655,0,0,d4e55c0bf8ee1b4fb7f9a5a70eabfb748935a97fe6cc917be3646a99349642c3,2025-05-28T15:01:30.720000 CVE-2025-41657,0,0,fe785a8a271a8bfed9a8574477bebed4f54bcc892e6c96de3103c865106136b3,2025-06-10T11:15:53.150000 CVE-2025-4166,0,0,5bfebbee34c2356ee039434bb4ac7a8705ff7fab6fe8d313f7df39c4661cee90,2025-05-05T20:54:45.973000 +CVE-2025-41661,1,1,4ee8cdbc31d7aec5bcd54c61368711631ea0d886723d4e17b3571a3eb111e85e,2025-06-11T09:15:22.257000 +CVE-2025-41662,1,1,800eae9415033dac7a1738711da9fca818642a243e70a1d6cc18b56f3878828e,2025-06-11T09:15:22.480000 +CVE-2025-41663,1,1,92b360c44e537e634f663c5990e588057c8b6322aca9407ebff20703a69c9010,2025-06-11T09:15:22.700000 CVE-2025-4168,0,0,a6468df4f7a2597ad76d3cb7aeb08566a4877cfddb2b3e40039e98441ddbce5f,2025-05-05T20:54:19.760000 CVE-2025-4169,0,0,bfc728158ddf7f1a565291bbe3bc05c4816fdb9cc64adedded01a1b86d632adf,2025-05-16T14:42:18.700000 CVE-2025-4170,0,0,133573d3aa8594d19e56ffa6beff9d425ae43d2765fc46c0e41b4c599f9a4675,2025-05-05T20:54:19.760000 @@ -297304,7 +297309,7 @@ CVE-2025-5387,0,0,65ec5c965e0aa55c8047ca231400a6ecd9307463295059e1349de0bd80976c CVE-2025-5388,0,0,a0253f0c3333e57e30f53ca748c2f786064d252af030391460f61763742994dc,2025-06-02T17:32:17.397000 CVE-2025-5389,0,0,260909efcc6b6b292bffdc65b5b0e9633781d0b5c8c5ea87a3dce1c6319b67ab,2025-06-02T17:32:17.397000 CVE-2025-5390,0,0,039345fdea46e1731d2841f7a4397db225f36b8f7cd62f23d1ae898d97067564,2025-06-02T17:32:17.397000 -CVE-2025-5395,1,1,7bfcea634fa6688a6312a7ef9f4a96a773ade20859bf5e7d0e416741c2413713,2025-06-11T07:15:24.800000 +CVE-2025-5395,0,0,7bfcea634fa6688a6312a7ef9f4a96a773ade20859bf5e7d0e416741c2413713,2025-06-11T07:15:24.800000 CVE-2025-5399,0,0,0ecebfde69eb11c2808a3eee614685de2e5fb1417c4788dd2b728d39b531d7cf,2025-06-09T14:15:23.470000 CVE-2025-5400,0,0,7cd289b1f8796f433468abfa83e965b2ae8c6d02300bfc34aeb9a97484dcc2f7,2025-06-02T17:32:17.397000 CVE-2025-5401,0,0,7191cee0bc77ec5bd67bfc250972477b89f2f18db54f39596b26be9c1bb1595c,2025-06-02T17:32:17.397000 @@ -297702,3 +297707,4 @@ CVE-2025-5979,0,0,d27c61690a89a70834e1ac7ec79b55e9c00b548ee2fa9335cb0305161ad452 CVE-2025-5980,0,0,e040dd481b18254b8331cc7db878c5d64b7a6be5a4fa7521d9ea11a576b92997,2025-06-10T21:15:23.150000 CVE-2025-5984,0,0,23b7a2e2427c55d6b8b71bdfb3210e81fbbb4de6329b5126e67b10ed13442fce,2025-06-10T23:15:58.583000 CVE-2025-5985,0,0,6446d10df39548f8cc9543e4c4495bd4e0a246e2b8805b29cf25763ee00bb5ed,2025-06-10T23:15:58.770000 +CVE-2025-5991,1,1,63a683acbdc0ee08246e1a037b74c64c0c9a5c11210d84e35e546c14a58c12d4,2025-06-11T08:15:22.933000