diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57050.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57050.json index 8e41367b295..f917f895571 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57050.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57050.json @@ -2,93 +2,15 @@ "id": "CVE-2024-57050", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-18T15:15:16.977", - "lastModified": "2025-06-06T17:59:21.903", - "vulnStatus": "Analyzed", + "lastModified": "2025-06-16T22:15:20.670", + "vulnStatus": "Rejected", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability in the TP-Link WR840N v6 router with firmware version 0.9.1 4.16 and earlier permits unauthorized individuals to bypass the authentication of some interfaces under the /cgi directory.When adding Referer: http://tplinkwifi.net to the the request, it will be recognized as passing the authentication." - }, - { - "lang": "es", - "value": "Una vulnerabilidad en el TP-Link WR840N V6 router con el firmware Versi\u00f3n 0.9.1 4.16 y antes permite a las personas no autorizadas omitir la autenticaci\u00f3n de algunas interfaces en el directorio/CGI. Cuando agregue el referente: http://tplinkwifi.netnet. a la solicitud, se reconocer\u00e1 como aprobar la autenticaci\u00f3n." + "value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2018-11714. Reason: This candidate is a reservation duplicate of CVE-2018-11714. Notes: All CVE users should reference CVE-2018-11714 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 9.8, - "baseSeverity": "CRITICAL", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 3.9, - "impactScore": 5.9 - } - ] - }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-287" - } - ] - } - ], - "configurations": [ - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:tp-link:wr840n_firmware:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.9.1_4.16", - "matchCriteriaId": "9921C785-A6AB-4E22-B8AE-791C2E774483" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:tp-link:wr840n:6:*:*:*:*:*:*:*", - "matchCriteriaId": "79A291AB-FA6F-452E-90B3-2F705A86F83A" - } - ] - } - ] - } - ], - "references": [ - { - "url": "https://github.com/Shuanunio/CVE_Requests/blob/main/TP-Link/WR840N%20v6/ACL%20bypass%20Vulnerability%20in%20TP-Link%20TL-WR840N.md", - "source": "cve@mitre.org", - "tags": [ - "Third Party Advisory", - "Exploit" - ] - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27587.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27587.json new file mode 100644 index 00000000000..e678e0ab781 --- /dev/null +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27587.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2025-27587", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-06-16T22:15:44.093", + "lastModified": "2025-06-16T22:15:44.093", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "OpenSSL 3.0.0 through 3.3.2 on the PowerPC architecture is vulnerable to a Minerva attack, exploitable by measuring the time of signing of random messages using the EVP_DigestSign API, and then using the private key to extract the K value (nonce) from the signatures. Next, based on the bit size of the extracted nonce, one can compare the signing time of full-sized nonces to signatures that used smaller nonces, via statistical tests. There is a side-channel in the P-364 curve that allows private key extraction (also, there is a dependency between the bit size of K and the size of the side channel). NOTE: This CVE is disputed because the OpenSSL security policy explicitly notes that any side channels which require same physical system to be detected are outside of the threat model for the software. The timing signal is so small that it is infeasible to be detected without having the attacking process running on the same physical system." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/openssl/openssl/issues/24253", + "source": "cve@mitre.org" + }, + { + "url": "https://minerva.crocs.fi.muni.cz", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-296xx/CVE-2025-29648.json b/CVE-2025/CVE-2025-296xx/CVE-2025-29648.json index a56c707fb94..5351e35bcc4 100644 --- a/CVE-2025/CVE-2025-296xx/CVE-2025-29648.json +++ b/CVE-2025/CVE-2025-296xx/CVE-2025-29648.json @@ -2,98 +2,15 @@ "id": "CVE-2025-29648", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-16T20:15:17.460", - "lastModified": "2025-04-24T12:52:00.727", - "vulnStatus": "Analyzed", - "cveTags": [ - { - "sourceIdentifier": "cve@mitre.org", - "tags": [ - "disputed" - ] - } - ], + "lastModified": "2025-06-16T22:15:44.517", + "vulnStatus": "Rejected", + "cveTags": [], "descriptions": [ { "lang": "en", - "value": "SQL Injection vulnerability exists in the TP-Link EAP120 router s login dashboard (version 1.0), allowing an unauthenticated attacker to inject malicious SQL statements via the login fields. NOTE: this is disputed because the issue can only be reproduced on a supplier-provided emulator, where access control is intentionally absent for ease of functional testing." - }, - { - "lang": "es", - "value": "Existe una vulnerabilidad de inyecci\u00f3n SQL en TP-Link EAP120 router s login dashboard (versi\u00f3n 1.0), que permite a un atacante no autenticado inyecte sentencias SQL maliciosas a trav\u00e9s de los campos de inicio de sesi\u00f3n." + "value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", - "baseScore": 7.3, - "baseSeverity": "HIGH", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "LOW" - }, - "exploitabilityScore": 3.9, - "impactScore": 3.4 - } - ] - }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-89" - } - ] - } - ], - "configurations": [ - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:tp-link:eap120_firmware:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "07561227-B7ED-4931-A792-DC5F3EFC60BC" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:tp-link:eap120:-:*:*:*:*:*:*:*", - "matchCriteriaId": "117B617D-360F-4FF9-8785-1A2CDE1B0EB6" - } - ] - } - ] - } - ], - "references": [ - { - "url": "https://github.com/TheVeteran1/Vulnerability-Research/blob/main/CVE-2025-29648", - "source": "cve@mitre.org", - "tags": [ - "Third Party Advisory" - ] - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-296xx/CVE-2025-29649.json b/CVE-2025/CVE-2025-296xx/CVE-2025-29649.json index 7fe9a5e2c44..c120878019e 100644 --- a/CVE-2025/CVE-2025-296xx/CVE-2025-29649.json +++ b/CVE-2025/CVE-2025-296xx/CVE-2025-29649.json @@ -2,98 +2,15 @@ "id": "CVE-2025-29649", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-16T20:15:17.563", - "lastModified": "2025-04-24T12:51:37.493", - "vulnStatus": "Analyzed", - "cveTags": [ - { - "sourceIdentifier": "cve@mitre.org", - "tags": [ - "disputed" - ] - } - ], + "lastModified": "2025-06-16T22:15:55.553", + "vulnStatus": "Rejected", + "cveTags": [], "descriptions": [ { "lang": "en", - "value": "SQL Injection vulnerability exists in the TP-Link TL-WR840N router s login dashboard (version 1.0), allowing an unauthenticated attacker to inject malicious SQL statements via the username and password fields. NOTE: this is disputed because the issue can only be reproduced on a supplier-provided emulator, where access control is intentionally absent for ease of functional testing." - }, - { - "lang": "es", - "value": "Existe una vulnerabilidad de inyecci\u00f3n SQL en TP-Link TL-WR840N router s login dashboard (versi\u00f3n 1.0), que permite a un atacante no autenticado inyecte sentencias SQL maliciosas a trav\u00e9s de los campos de nombre de usuario y contrase\u00f1a." + "value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", - "baseScore": 7.3, - "baseSeverity": "HIGH", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "LOW" - }, - "exploitabilityScore": 3.9, - "impactScore": 3.4 - } - ] - }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-89" - } - ] - } - ], - "configurations": [ - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:tp-link:tl-wr840n_firmware:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4F2E1762-B468-46CA-A3E9-44B4A21EC437" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:tp-link:tl-wr840n:-:*:*:*:*:*:*:*", - "matchCriteriaId": "AF3078F3-4CD5-4157-9A2D-7E338B6C7058" - } - ] - } - ] - } - ], - "references": [ - { - "url": "https://github.com/TheVeteran1/Vulnerability-Research/blob/main/CVE-2025-29649", - "source": "cve@mitre.org", - "tags": [ - "Third Party Advisory" - ] - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-296xx/CVE-2025-29650.json b/CVE-2025/CVE-2025-296xx/CVE-2025-29650.json index ba679d1fdad..ca5834d5af2 100644 --- a/CVE-2025/CVE-2025-296xx/CVE-2025-29650.json +++ b/CVE-2025/CVE-2025-296xx/CVE-2025-29650.json @@ -2,98 +2,15 @@ "id": "CVE-2025-29650", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-16T20:15:17.663", - "lastModified": "2025-04-24T13:44:23.137", - "vulnStatus": "Analyzed", - "cveTags": [ - { - "sourceIdentifier": "cve@mitre.org", - "tags": [ - "disputed" - ] - } - ], + "lastModified": "2025-06-16T22:16:04.667", + "vulnStatus": "Rejected", + "cveTags": [], "descriptions": [ { "lang": "en", - "value": "SQL Injection vulnerability exists in the TP-Link M7200 4G LTE Mobile Wi-Fi Router Firmware Version: 1.0.7 Build 180127 Rel.55998n, allowing an unauthenticated attacker to inject malicious SQL statements via the username and password fields. NOTE: this is disputed because the issue can only be reproduced on a supplier-provided emulator, where access control is intentionally absent for ease of functional testing." - }, - { - "lang": "es", - "value": "Existe una vulnerabilidad de inyecci\u00f3n SQL en TP-Link M7200 4G LTE Mobile Wi-Fi Router Firmware versi\u00f3n: 1.0.7 Build 180127 Rel.55998n, lo que permite que un atacante no autenticado inyecte sentencias SQL maliciosas a trav\u00e9s de los campos de nombre de usuario y contrase\u00f1a." + "value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", - "baseScore": 6.3, - "baseSeverity": "MEDIUM", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "LOW" - }, - "exploitabilityScore": 2.8, - "impactScore": 3.4 - } - ] - }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-89" - } - ] - } - ], - "configurations": [ - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:tp-link:m7200_firmware:1.0.7:build_180127_rel.55998n:*:*:*:*:*:*", - "matchCriteriaId": "00D5463C-58B7-400E-9B73-37C7036FE252" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:tp-link:m7200:-:*:*:*:*:*:*:*", - "matchCriteriaId": "41438D26-F2D6-4DFC-B13C-A7458CE8F22C" - } - ] - } - ] - } - ], - "references": [ - { - "url": "https://github.com/TheVeteran1/Vulnerability-Research/blob/main/CVE-2025-29650", - "source": "cve@mitre.org", - "tags": [ - "Third Party Advisory" - ] - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-296xx/CVE-2025-29651.json b/CVE-2025/CVE-2025-296xx/CVE-2025-29651.json index 4eb898fdcfa..26cbc003b2b 100644 --- a/CVE-2025/CVE-2025-296xx/CVE-2025-29651.json +++ b/CVE-2025/CVE-2025-296xx/CVE-2025-29651.json @@ -2,98 +2,15 @@ "id": "CVE-2025-29651", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-16T20:15:17.760", - "lastModified": "2025-04-24T14:56:11.510", - "vulnStatus": "Analyzed", - "cveTags": [ - { - "sourceIdentifier": "cve@mitre.org", - "tags": [ - "disputed" - ] - } - ], + "lastModified": "2025-06-16T22:16:13.750", + "vulnStatus": "Rejected", + "cveTags": [], "descriptions": [ { "lang": "en", - "value": "SQL Injection vulnerability exists in the TP-Link M7650 4G LTE Mobile Wi-Fi Router Firmware Version: 1.0.7 Build 170623 Rel.1022n, allowing an unauthenticated attacker to inject malicious SQL statements via the username and password fields. NOTE: this is disputed because the issue can only be reproduced on a supplier-provided emulator, where access control is intentionally absent for ease of functional testing." - }, - { - "lang": "es", - "value": "Existe una vulnerabilidad de inyecci\u00f3n SQL en TP-Link M7650 4G LTE Mobile Wi-Fi Router Firmware versi\u00f3n: 1.0.7 Build 170623 Rel.1022n, lo que permite que un atacante no autenticado inyecte sentencias SQL maliciosas a trav\u00e9s de los campos de nombre de usuario y contrase\u00f1a." + "value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 9.8, - "baseSeverity": "CRITICAL", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 3.9, - "impactScore": 5.9 - } - ] - }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-89" - } - ] - } - ], - "configurations": [ - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:tp-link:m7650_firmware:1.0.7:build_170623_rel.1022n:*:*:*:*:*:*", - "matchCriteriaId": "425955C0-305B-4AFD-ADC0-34C6E469559C" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:tp-link:m7650:-:*:*:*:*:*:*:*", - "matchCriteriaId": "04ED6964-77D4-48AD-8CA4-0FCA62BB3189" - } - ] - } - ] - } - ], - "references": [ - { - "url": "https://github.com/TheVeteran1/Vulnerability-Research/blob/main/CVE-2025-29651", - "source": "cve@mitre.org", - "tags": [ - "Third Party Advisory" - ] - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-296xx/CVE-2025-29652.json b/CVE-2025/CVE-2025-296xx/CVE-2025-29652.json index e05634f0bc7..3f52125c489 100644 --- a/CVE-2025/CVE-2025-296xx/CVE-2025-29652.json +++ b/CVE-2025/CVE-2025-296xx/CVE-2025-29652.json @@ -2,98 +2,15 @@ "id": "CVE-2025-29652", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-16T20:15:17.860", - "lastModified": "2025-04-24T13:56:26.960", - "vulnStatus": "Analyzed", - "cveTags": [ - { - "sourceIdentifier": "cve@mitre.org", - "tags": [ - "disputed" - ] - } - ], + "lastModified": "2025-06-16T22:16:22.843", + "vulnStatus": "Rejected", + "cveTags": [], "descriptions": [ { "lang": "en", - "value": "SQL Injection vulnerability exists in the TP-Link M7000 4G LTE Mobile Wi-Fi Router Firmware Version: 1.0.7 Build 180127 Rel.55998n, allowing an unauthenticated attacker to inject malicious SQL statements via the username and password fields. NOTE: this is disputed because the issue can only be reproduced on a supplier-provided emulator, where access control is intentionally absent for ease of functional testing." - }, - { - "lang": "es", - "value": "Existe una vulnerabilidad de inyecci\u00f3n SQL en TP-Link M7000 4G LTE Mobile Wi-Fi Router Firmware versi\u00f3n: 1.0.7 Build 180127 Rel.55998n, lo que permite que un atacante no autenticado inyecte sentencias SQL maliciosas a trav\u00e9s de los campos de nombre de usuario y contrase\u00f1a." + "value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 9.8, - "baseSeverity": "CRITICAL", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 3.9, - "impactScore": 5.9 - } - ] - }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-89" - } - ] - } - ], - "configurations": [ - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:tp-link:m7000_firmware:1.0.7:build_180127_rel.55998n:*:*:*:*:*:*", - "matchCriteriaId": "AC7C3EA6-A860-4814-A424-7332FDE625F5" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:tp-link:m7000:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F661A5EA-62E0-4073-946F-D279BC385453" - } - ] - } - ] - } - ], - "references": [ - { - "url": "https://github.com/TheVeteran1/Vulnerability-Research/blob/main/CVE-2025-29652", - "source": "cve@mitre.org", - "tags": [ - "Third Party Advisory" - ] - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-296xx/CVE-2025-29653.json b/CVE-2025/CVE-2025-296xx/CVE-2025-29653.json index 44726260f63..e5ffdad699a 100644 --- a/CVE-2025/CVE-2025-296xx/CVE-2025-29653.json +++ b/CVE-2025/CVE-2025-296xx/CVE-2025-29653.json @@ -2,91 +2,15 @@ "id": "CVE-2025-29653", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-16T20:15:17.963", - "lastModified": "2025-04-24T13:54:34.550", - "vulnStatus": "Analyzed", + "lastModified": "2025-06-16T22:16:31.940", + "vulnStatus": "Rejected", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "SQL Injection vulnerability exists in the TP-Link M7450 4G LTE Mobile Wi-Fi Router Firmware Version: 1.0.2 Build 170306 Rel.1015n, allowing an unauthenticated attacker to inject malicious SQL statements via the username and password fields." - }, - { - "lang": "es", - "value": "Existe una vulnerabilidad de inyecci\u00f3n SQL en TP-Link M7450 4G LTE Mobile Wi-Fi Router Firmware versi\u00f3n: 1.0.2 Build 170306 Rel.1015n, lo que permite que un atacante no autenticado inyecte sentencias SQL maliciosas a trav\u00e9s de los campos de nombre de usuario y contrase\u00f1a." + "value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 9.8, - "baseSeverity": "CRITICAL", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 3.9, - "impactScore": 5.9 - } - ] - }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-89" - } - ] - } - ], - "configurations": [ - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:tp-link:m7450_firmware:1.0.2:build_170306_rel.1015n:*:*:*:*:*:*", - "matchCriteriaId": "FC5FA2EA-3A0C-4E80-B499-1E97DEA3B955" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:tp-link:m7450:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F2F6BAE4-33F8-44D7-8FCF-C7D9AA436BCE" - } - ] - } - ] - } - ], - "references": [ - { - "url": "https://github.com/TheVeteran1/Vulnerability-Research/blob/main/CVE-2025-29653", - "source": "cve@mitre.org", - "tags": [ - "Third Party Advisory" - ] - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-432xx/CVE-2025-43200.json b/CVE-2025/CVE-2025-432xx/CVE-2025-43200.json new file mode 100644 index 00000000000..b523bb6196a --- /dev/null +++ b/CVE-2025/CVE-2025-432xx/CVE-2025-43200.json @@ -0,0 +1,53 @@ +{ + "id": "CVE-2025-43200", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-06-16T22:16:41.120", + "lastModified": "2025-06-16T22:16:41.120", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "This issue was addressed with improved checks. This issue is fixed in watchOS 11.3.1, macOS Ventura 13.7.4, iOS 15.8.4 and iPadOS 15.8.4, iOS 16.7.11 and iPadOS 16.7.11, iPadOS 17.7.5, visionOS 2.3.1, macOS Sequoia 15.3.1, iOS 18.3.1 and iPadOS 18.3.1, macOS Sonoma 14.7.4. A logic issue existed when processing a maliciously crafted photo or video shared via an iCloud Link. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122173", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122174", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122345", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122346", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122900", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122901", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122902", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122903", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122904", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48992.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48992.json new file mode 100644 index 00000000000..439e06fbd63 --- /dev/null +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48992.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2025-48992", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-06-16T23:15:21.827", + "lastModified": "2025-06-16T23:15:21.827", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.123 and 25.0.27, a stored and blind cross-site scripting (XSS) vulnerability exists in the Name Field of the user profile. A malicious attacker can change their name to a javascript payload, which is executed when a user adds the malicious user to their Synchronization > Address books. This issue has been patched in versions 6.8.123 and 25.0.27." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.2, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-87" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Intermesh/groupoffice/commit/2e3695db9cdef1da7a9d754ff4d98f49f6924e2d", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/Intermesh/groupoffice/security/advisories/GHSA-j35g-q5mc-jwgp", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6140.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6140.json new file mode 100644 index 00000000000..66b82ff351f --- /dev/null +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6140.json @@ -0,0 +1,153 @@ +{ + "id": "CVE-2025-6140", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-16T22:16:41.250", + "lastModified": "2025-06-16T22:16:41.250", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as problematic, was found in spdlog up to 1.15.1. This affects the function scoped_padder in the library include/spdlog/pattern_formatter-inl.h. The manipulation leads to resource consumption. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. Upgrading to version 1.15.2 is able to address this issue. The identifier of the patch is 10320184df1eb4638e253a34b1eb44ce78954094. It is recommended to upgrade the affected component." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 1.7, + "accessVector": "LOCAL", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "LOW", + "exploitabilityScore": 3.1, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + }, + { + "lang": "en", + "value": "CWE-404" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/gabime/spdlog/commit/10320184df1eb4638e253a34b1eb44ce78954094", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/gabime/spdlog/issues/3360", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/gabime/spdlog/issues/3360#issuecomment-2729579422", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/gabime/spdlog/releases/tag/v1.15.2", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.312609", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.312609", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.592999", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6141.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6141.json new file mode 100644 index 00000000000..84ad0598f26 --- /dev/null +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6141.json @@ -0,0 +1,157 @@ +{ + "id": "CVE-2025-6141", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-16T22:16:41.527", + "lastModified": "2025-06-16T22:16:41.527", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in GNU ncurses up to 6.5-20250322 and classified as problematic. This vulnerability affects the function postprocess_termcap of the file tinfo/parse_entry.c. The manipulation leads to stack-based buffer overflow. The attack needs to be approached locally. Upgrading to version 6.5-20250329 is able to address this issue. It is recommended to upgrade the affected component." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 1.7, + "accessVector": "LOCAL", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "LOW", + "exploitabilityScore": 3.1, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://invisible-island.net/ncurses/NEWS.html#index-t20250329", + "source": "cna@vuldb.com" + }, + { + "url": "https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00107.html", + "source": "cna@vuldb.com" + }, + { + "url": "https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00109.html", + "source": "cna@vuldb.com" + }, + { + "url": "https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00114.html", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.312610", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.312610", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.593000", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.gnu.org/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6142.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6142.json new file mode 100644 index 00000000000..a1067df4277 --- /dev/null +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6142.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2025-6142", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-16T22:16:41.710", + "lastModified": "2025-06-16T22:16:41.710", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Intera InHire up to 20250530. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation of the argument 29chcotoo9 leads to server-side request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://drive.google.com/file/d/1-doSYzFeLaKtd_b6RmpBtZ5qtsvu4gYI/view?usp=sharing", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.312613", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.312613", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.587665", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6143.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6143.json new file mode 100644 index 00000000000..0c3ea8f5c08 --- /dev/null +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6143.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-6143", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-16T23:15:22.500", + "lastModified": "2025-06-16T23:15:22.500", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in TOTOLINK EX1200T 4.1.2cu.5232_B20210713. Affected is an unknown function of the file /boafrm/formNtp of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/awindog/cve/blob/main/13.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.312618", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.312618", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.593004", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.totolink.net/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6144.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6144.json new file mode 100644 index 00000000000..c7ebc08ab86 --- /dev/null +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6144.json @@ -0,0 +1,149 @@ +{ + "id": "CVE-2025-6144", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-16T23:15:22.683", + "lastModified": "2025-06-16T23:15:22.683", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in TOTOLINK EX1200T 4.1.2cu.5232_B20210713 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /boafrm/formSysCmd of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/awindog/cve/blob/main/688/1.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/awindog/cve/blob/main/688/1.md#poc", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.312619", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.312619", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.593009", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.totolink.net/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6145.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6145.json new file mode 100644 index 00000000000..78d646e2d12 --- /dev/null +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6145.json @@ -0,0 +1,149 @@ +{ + "id": "CVE-2025-6145", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-16T23:15:22.863", + "lastModified": "2025-06-16T23:15:22.863", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in TOTOLINK EX1200T 4.1.2cu.5232_B20210713 and classified as critical. Affected by this issue is some unknown functionality of the file /boafrm/formSysLog of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/awindog/cve/blob/main/688/2.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/awindog/cve/blob/main/688/2.md#poc", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.312620", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.312620", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.593011", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.totolink.net/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index fff0df84e8b..ecaeb8838fc 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-16T22:00:19.875634+00:00 +2025-06-16T23:55:19.871254+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-06-16T21:45:19.070000+00:00 +2025-06-16T23:15:22.863000+00:00 ``` ### Last Data Feed Release @@ -33,53 +33,35 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -298054 +298063 ``` ### CVEs added in the last Commit Recently added CVEs: `9` -- [CVE-2025-32798](CVE-2025/CVE-2025-327xx/CVE-2025-32798.json) (`2025-06-16T20:15:27.200`) -- [CVE-2025-32799](CVE-2025/CVE-2025-327xx/CVE-2025-32799.json) (`2025-06-16T21:15:23.683`) -- [CVE-2025-32800](CVE-2025/CVE-2025-328xx/CVE-2025-32800.json) (`2025-06-16T21:15:23.847`) -- [CVE-2025-47951](CVE-2025/CVE-2025-479xx/CVE-2025-47951.json) (`2025-06-16T21:15:24.010`) -- [CVE-2025-49134](CVE-2025/CVE-2025-491xx/CVE-2025-49134.json) (`2025-06-16T21:15:24.167`) -- [CVE-2025-6136](CVE-2025/CVE-2025-61xx/CVE-2025-6136.json) (`2025-06-16T20:15:27.863`) -- [CVE-2025-6137](CVE-2025/CVE-2025-61xx/CVE-2025-6137.json) (`2025-06-16T20:15:28.040`) -- [CVE-2025-6138](CVE-2025/CVE-2025-61xx/CVE-2025-6138.json) (`2025-06-16T21:15:24.323`) -- [CVE-2025-6139](CVE-2025/CVE-2025-61xx/CVE-2025-6139.json) (`2025-06-16T21:15:24.513`) +- [CVE-2025-27587](CVE-2025/CVE-2025-275xx/CVE-2025-27587.json) (`2025-06-16T22:15:44.093`) +- [CVE-2025-43200](CVE-2025/CVE-2025-432xx/CVE-2025-43200.json) (`2025-06-16T22:16:41.120`) +- [CVE-2025-48992](CVE-2025/CVE-2025-489xx/CVE-2025-48992.json) (`2025-06-16T23:15:21.827`) +- [CVE-2025-6140](CVE-2025/CVE-2025-61xx/CVE-2025-6140.json) (`2025-06-16T22:16:41.250`) +- [CVE-2025-6141](CVE-2025/CVE-2025-61xx/CVE-2025-6141.json) (`2025-06-16T22:16:41.527`) +- [CVE-2025-6142](CVE-2025/CVE-2025-61xx/CVE-2025-6142.json) (`2025-06-16T22:16:41.710`) +- [CVE-2025-6143](CVE-2025/CVE-2025-61xx/CVE-2025-6143.json) (`2025-06-16T23:15:22.500`) +- [CVE-2025-6144](CVE-2025/CVE-2025-61xx/CVE-2025-6144.json) (`2025-06-16T23:15:22.683`) +- [CVE-2025-6145](CVE-2025/CVE-2025-61xx/CVE-2025-6145.json) (`2025-06-16T23:15:22.863`) ### CVEs modified in the last Commit -Recently modified CVEs: `44` +Recently modified CVEs: `7` -- [CVE-2024-38875](CVE-2024/CVE-2024-388xx/CVE-2024-38875.json) (`2025-06-16T21:39:39.120`) -- [CVE-2024-39329](CVE-2024/CVE-2024-393xx/CVE-2024-39329.json) (`2025-06-16T21:39:25.910`) -- [CVE-2024-39330](CVE-2024/CVE-2024-393xx/CVE-2024-39330.json) (`2025-06-16T21:39:07.157`) -- [CVE-2024-39614](CVE-2024/CVE-2024-396xx/CVE-2024-39614.json) (`2025-06-16T21:38:55.470`) -- [CVE-2025-29573](CVE-2025/CVE-2025-295xx/CVE-2025-29573.json) (`2025-06-16T20:19:43.233`) -- [CVE-2025-30317](CVE-2025/CVE-2025-303xx/CVE-2025-30317.json) (`2025-06-16T21:27:49.447`) -- [CVE-2025-30321](CVE-2025/CVE-2025-303xx/CVE-2025-30321.json) (`2025-06-16T21:32:02.783`) -- [CVE-2025-3638](CVE-2025/CVE-2025-36xx/CVE-2025-3638.json) (`2025-06-16T21:03:13.033`) -- [CVE-2025-43558](CVE-2025/CVE-2025-435xx/CVE-2025-43558.json) (`2025-06-16T21:31:49.540`) -- [CVE-2025-43589](CVE-2025/CVE-2025-435xx/CVE-2025-43589.json) (`2025-06-16T21:31:39.580`) -- [CVE-2025-43590](CVE-2025/CVE-2025-435xx/CVE-2025-43590.json) (`2025-06-16T21:31:30.193`) -- [CVE-2025-43593](CVE-2025/CVE-2025-435xx/CVE-2025-43593.json) (`2025-06-16T21:31:20.630`) -- [CVE-2025-45236](CVE-2025/CVE-2025-452xx/CVE-2025-45236.json) (`2025-06-16T20:36:27.817`) -- [CVE-2025-45237](CVE-2025/CVE-2025-452xx/CVE-2025-45237.json) (`2025-06-16T20:35:29.437`) -- [CVE-2025-45607](CVE-2025/CVE-2025-456xx/CVE-2025-45607.json) (`2025-06-16T20:17:27.537`) -- [CVE-2025-45612](CVE-2025/CVE-2025-456xx/CVE-2025-45612.json) (`2025-06-16T20:00:50.837`) -- [CVE-2025-46654](CVE-2025/CVE-2025-466xx/CVE-2025-46654.json) (`2025-06-16T21:00:11.573`) -- [CVE-2025-47104](CVE-2025/CVE-2025-471xx/CVE-2025-47104.json) (`2025-06-16T21:31:11.607`) -- [CVE-2025-47105](CVE-2025/CVE-2025-471xx/CVE-2025-47105.json) (`2025-06-16T21:30:52.307`) -- [CVE-2025-47106](CVE-2025/CVE-2025-471xx/CVE-2025-47106.json) (`2025-06-16T21:30:33.830`) -- [CVE-2025-4748](CVE-2025/CVE-2025-47xx/CVE-2025-4748.json) (`2025-06-16T20:15:27.750`) -- [CVE-2025-48976](CVE-2025/CVE-2025-489xx/CVE-2025-48976.json) (`2025-06-16T20:15:27.350`) -- [CVE-2025-48988](CVE-2025/CVE-2025-489xx/CVE-2025-48988.json) (`2025-06-16T20:15:27.447`) -- [CVE-2025-49124](CVE-2025/CVE-2025-491xx/CVE-2025-49124.json) (`2025-06-16T20:15:27.557`) -- [CVE-2025-49125](CVE-2025/CVE-2025-491xx/CVE-2025-49125.json) (`2025-06-16T20:15:27.650`) +- [CVE-2024-57050](CVE-2024/CVE-2024-570xx/CVE-2024-57050.json) (`2025-06-16T22:15:20.670`) +- [CVE-2025-29648](CVE-2025/CVE-2025-296xx/CVE-2025-29648.json) (`2025-06-16T22:15:44.517`) +- [CVE-2025-29649](CVE-2025/CVE-2025-296xx/CVE-2025-29649.json) (`2025-06-16T22:15:55.553`) +- [CVE-2025-29650](CVE-2025/CVE-2025-296xx/CVE-2025-29650.json) (`2025-06-16T22:16:04.667`) +- [CVE-2025-29651](CVE-2025/CVE-2025-296xx/CVE-2025-29651.json) (`2025-06-16T22:16:13.750`) +- [CVE-2025-29652](CVE-2025/CVE-2025-296xx/CVE-2025-29652.json) (`2025-06-16T22:16:22.843`) +- [CVE-2025-29653](CVE-2025/CVE-2025-296xx/CVE-2025-29653.json) (`2025-06-16T22:16:31.940`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 3aa53e8b679..af12474f66b 100644 --- a/_state.csv +++ b/_state.csv @@ -39251,7 +39251,7 @@ CVE-2009-2626,0,0,7d808c3b337b3dd179c5c83f2afaaa2086056b848ea5fcca29f5344102d32c CVE-2009-2627,0,0,694ff522c2c2384ac2ef84c6917a414a152aa0809bdf43a8e6b69444ebb5c6b5,2025-04-09T00:30:58.490000 CVE-2009-2628,0,0,0d71b5b55b2a76adc0a40b01b856df4d643748d69e1b6d2ddf74be2c3b018f04,2025-04-09T00:30:58.490000 CVE-2009-2629,0,0,c269a1546ec3551cc7c6dd410202f6e170c9edb7369c16ab4c02d0a95dc3053c,2025-04-09T00:30:58.490000 -CVE-2009-2631,0,1,f7a2ab6b9574f53797105cc930ffc84b38334d110f2e5a6043983af93bb29e9a,2025-06-16T21:15:22.113000 +CVE-2009-2631,0,0,f7a2ab6b9574f53797105cc930ffc84b38334d110f2e5a6043983af93bb29e9a,2025-06-16T21:15:22.113000 CVE-2009-2632,0,0,d4abe203f8fe18c26b468bad7eb2075a45826c502661df98d8df1ca946af1681,2025-04-09T00:30:58.490000 CVE-2009-2633,0,0,57a10f8a0370e765cd5c4db6177ea6709b0ea6b7921354cc00d8630e517f7f07,2025-04-09T00:30:58.490000 CVE-2009-2634,0,0,fd4588f61c55fcd0997f4cdc4d78e1193050d47ff58fe3241f247ad7b7d80505,2025-04-09T00:30:58.490000 @@ -184979,7 +184979,7 @@ CVE-2021-43579,0,0,7795b4717e11fd2641e463a49231835fce3ea5cb7eb5fb562ec7490a62052 CVE-2021-4358,0,0,b2ea1964b0aaec46c7cef84d55058430bfdf214bac87a1e8b460a29a79125446,2024-11-21T06:37:29.957000 CVE-2021-43581,0,0,8108c5b39f7ca8239e11c52952d79ed5aa76af3ac0ce5532e18c301d3825a99a,2024-11-21T06:29:29.140000 CVE-2021-43582,0,0,43a81bf863d57ab551e8731ccba32f8e965bca39a894587dff864e90e5bc9264,2024-11-21T06:29:29.293000 -CVE-2021-43584,0,1,aee18099c737c3e57ba9a727a11234e9347975ec334898fed2010c39f6d286b6,2025-06-16T20:15:23.203000 +CVE-2021-43584,0,0,aee18099c737c3e57ba9a727a11234e9347975ec334898fed2010c39f6d286b6,2025-06-16T20:15:23.203000 CVE-2021-43587,0,0,7fbb5ce8b85874af575c4d094206bbb97a641f3bf8bfdd530f385e73f835079d,2024-11-21T06:29:29.623000 CVE-2021-43588,0,0,5fa55ef971ca4fd6c419512879e9914d923150440b0a909438ef8a8a7aa160f6,2024-11-21T06:29:29.767000 CVE-2021-43589,0,0,1be5e4212f6cd5c9a99dae98461249f5c0dec0cc80b669d16628ab1cd22c953f,2024-11-21T06:29:29.913000 @@ -226942,7 +226942,7 @@ CVE-2023-32883,0,0,18723e3d230f195bc0a868976daaa68e0e09f50ea939aff9a7f50817007d3 CVE-2023-32884,0,0,badab0b564d8b0671ccccd8220cc21ebd691ade4e70a70e9932ae240cc9e9b1d,2025-06-03T15:15:31.293000 CVE-2023-32885,0,0,e6ad4cab5f683cd31277c541f39b573a4cab547e3c7cbe67334cd94792821ed1,2025-04-17T19:15:55.867000 CVE-2023-32886,0,0,b130264fbebddf30b7785f9804d4b6984dea839b524cc40be854e297927fa567,2025-06-03T15:15:31.613000 -CVE-2023-32887,0,1,8dfcd3281dda4dc3932cdb8ff5579af8f4b86833200562954b8c6031c8e6fd07,2025-06-16T20:15:24.233000 +CVE-2023-32887,0,0,8dfcd3281dda4dc3932cdb8ff5579af8f4b86833200562954b8c6031c8e6fd07,2025-06-16T20:15:24.233000 CVE-2023-32888,0,0,752087afa621d16e61d32ee9c8700b21050b1a9343589eda4eef2d1b19855fd8,2025-05-16T18:16:01.257000 CVE-2023-32889,0,0,e2d8dfe153faa54fe19d590087d31f3105782c0ca961382255d5f028954e56ad,2024-11-21T08:04:16.780000 CVE-2023-3289,0,0,8443b25ebddb1823f9095d1a039ea811ffd9d30f62068eb82d3e7c0037047f18,2024-11-21T08:16:56.233000 @@ -227436,7 +227436,7 @@ CVE-2023-33533,0,0,3c4dc916ce0e09629a4d1fe9abe3d09a4054678118c9121ca7e5c0b829b1c CVE-2023-33534,0,0,375224b30005c5c6b4df976c11ab08ed3b921dbd5d50ac7db6447c43e9441aad,2024-11-21T08:05:41.057000 CVE-2023-33536,0,0,cb50e37274d092888d1fe39ac87a363acf8eaa47d7301bb2b831795e57af7d9d,2025-01-07T16:15:31.153000 CVE-2023-33537,0,0,e4de1c536060f7cf7b6b601cdcb55c69fae53fc6ccc20322c7e5aead8394ad75,2025-01-07T16:15:31.423000 -CVE-2023-33538,0,1,7ca40e5c1717f6c5efc4d7d982273e5e5e1e4ca9a388f3ac080b69eefef8d862,2025-06-16T21:15:23.267000 +CVE-2023-33538,0,0,7ca40e5c1717f6c5efc4d7d982273e5e5e1e4ca9a388f3ac080b69eefef8d862,2025-06-16T21:15:23.267000 CVE-2023-3354,0,0,c1971a8d35c84792a7e3b4b69170665e207a3bb365fff75d5a707072047933e4,2024-11-21T08:17:05.117000 CVE-2023-33544,0,0,ea770ac3095100c0cf3dfef2c91d44acce796d4bc92ed10e70a1e80795446c94,2025-01-09T17:15:09.997000 CVE-2023-33546,0,0,9e82aede766f4b9b701714d917a2868af3b3571a49bd4b295d6aba2bb98c278a,2024-11-21T08:05:41.850000 @@ -229008,7 +229008,7 @@ CVE-2023-35830,0,0,f9ec7bc37d75084b8f9adb19576e522ba0ca1eac41387899bac0f91ba3a89 CVE-2023-35833,0,0,c1bf8e993bff3c15ea6b1d5ea82e7182e9df63907a88f295064618c4d1f070ba,2024-11-21T08:08:46.997000 CVE-2023-35835,0,0,c472cfaca014db3ca099e3bd7467ed6b0670670172a0e8f336efd51e4092fc62,2025-05-30T15:15:22.107000 CVE-2023-35836,0,0,acaaf0e5111795f0a1deca0b38b68c171a0c114afd926ca0ef4711f965e3b753,2025-06-11T17:15:31.923000 -CVE-2023-35837,0,1,5341147c990d2ce4179daea5262cd87a6eeb4142e4704a8f7a8f53690a02c15b,2025-06-16T20:15:24.593000 +CVE-2023-35837,0,0,5341147c990d2ce4179daea5262cd87a6eeb4142e4704a8f7a8f53690a02c15b,2025-06-16T20:15:24.593000 CVE-2023-35838,0,0,183f211cfdb5c0b95769b09aaa0c425385e59381d55642b1813c42fff31c8a36,2024-11-21T08:08:47.637000 CVE-2023-35839,0,0,656f78752e563a12ede3b5803be9c4748192ecddd9db4c5bb9648851053668b6,2024-11-21T08:08:47.797000 CVE-2023-3584,0,0,db20d2c7ac289598080cfe7af369da1c9e2f79983a8f4444c3d60e81d4ca7c03,2024-11-21T08:17:36.207000 @@ -231359,7 +231359,7 @@ CVE-2023-38607,0,0,2ce363c1d9b97cb3747e23823fba83b3f8ee2adfbf120a92c7b78eb51b356 CVE-2023-38608,0,0,b71d5a2655ed04c8dddf465e235f7b0639be5f023e883b9a5ba1758064cc8e3b,2024-11-21T08:13:55.913000 CVE-2023-38609,0,0,6dc79f9d60fa5646ad0e783262026af7df43cd2e155e3927d10dda9c9455089f,2024-11-21T08:13:56.030000 CVE-2023-3861,0,0,256bdf9cd413cbfa70ed4e6a0b9211792976947f22c0d0ba6729c1ba3a66e3fc,2024-11-21T08:18:14.550000 -CVE-2023-38610,0,1,63b66d820b7fe613a2f9461038899a1b6f2132c01144b878382779fbc9cac559,2025-06-16T20:15:24.867000 +CVE-2023-38610,0,0,63b66d820b7fe613a2f9461038899a1b6f2132c01144b878382779fbc9cac559,2025-06-16T20:15:24.867000 CVE-2023-38611,0,0,0c21e67a52c96f626024280838ea08bd20ff315d2265b8b2d16822974fdb8823,2024-11-21T08:13:56.267000 CVE-2023-38612,0,0,dc7d175e74c392b2fa34b19b326d494d7537b9d88be3ebe3dbd10253f9d4194b,2025-06-03T15:15:38.607000 CVE-2023-38614,0,0,62fbad3f38dd4f4036a676d9c766532164d35e9d276fb55f22cda5a23b82d493,2025-04-25T16:55:31.270000 @@ -234732,7 +234732,7 @@ CVE-2023-42882,0,0,52d3d6e63624b766645b42f6de5717aa4cf8dfd75908cc909fde080396178 CVE-2023-42883,0,0,f5e872895d15f38cbd7c669092eb1e3aea886639119d160af848a76f82a5203f,2024-11-21T08:23:25.203000 CVE-2023-42884,0,0,2e5a8b2139dbb918dbc0af76f59335eac704130dc73878de8da29830077c7be6,2025-05-27T15:15:30.620000 CVE-2023-42886,0,0,c15407d84b2542d842f4506c0cd71a04ba67406423e4c036a717e97c9a72bbe5,2024-11-21T08:23:25.483000 -CVE-2023-42887,0,1,d77eb16ad80e94e32082e9331c2233a5ec8fb4cbfa1d5e9af956fdf704240652,2025-06-16T20:15:25.120000 +CVE-2023-42887,0,0,d77eb16ad80e94e32082e9331c2233a5ec8fb4cbfa1d5e9af956fdf704240652,2025-06-16T20:15:25.120000 CVE-2023-42888,0,0,53dcb8ac8f380ce3afe4718b34f84401ac21952dd00fc8c845621c41239cbfc5,2025-06-16T19:15:23.777000 CVE-2023-42889,0,0,a974df235eb2d3c4ac74c2469929bae42468dda315bde0f114e922e68df14623,2024-12-09T17:10:23.580000 CVE-2023-4289,0,0,84ea1a015248ce44ce4d95acdcd6cce0ce0aea730d50a3bfd933c2196769c933,2025-04-23T17:16:43.033000 @@ -237493,7 +237493,7 @@ CVE-2023-46824,0,0,986b06bf57d50728dbf5f80c95830764c980384db658e4991e6c4a53a212b CVE-2023-4683,0,0,76ee54862a2b6294ce73a6e0f8dddb60dfaac815f4119e8c25a08426a72a9401,2024-11-21T08:35:40.860000 CVE-2023-46835,0,0,e8b24f3a833cecb5e26772221ee94c6e7de234b62344eeb1bf8a83632146bc3e,2024-11-21T08:29:23.593000 CVE-2023-46836,0,0,e0785f3778eb579729a1be636dffebd4a5f98f6ffcf042af2ec5bc63df61c452,2025-06-03T15:15:42.700000 -CVE-2023-46837,0,1,8a79759f48a05b77b31d6ec660aee12324603d7f402cca4e5c53f0d954268f7e,2025-06-16T20:15:25.510000 +CVE-2023-46837,0,0,8a79759f48a05b77b31d6ec660aee12324603d7f402cca4e5c53f0d954268f7e,2025-06-16T20:15:25.510000 CVE-2023-46838,0,0,f1babf526c3f5839d278fd86f9852b1cd10fd3733391c516fd9386abab96da86,2025-06-02T19:15:21.687000 CVE-2023-46839,0,0,110c4574be648ab625e9ba9b9f041f367f3cfe8e1328db16490d89d1854556ab,2024-11-21T20:15:36.450000 CVE-2023-46840,0,0,35101892971cbf6355ae8df6a82236e4f3dffa9cecb80f1c3349b445a8ac7edf,2024-11-21T08:29:24.200000 @@ -239448,7 +239448,7 @@ CVE-2023-4942,0,0,3c7a5d772b22681bef3ed3e6c9496e43c134a6f368f32a6bae14ed4d3847ad CVE-2023-49424,0,0,d2f93e70c9be16993bbf1d8c7906db8335f897b831e85223bdf76f20c47bff6d,2024-11-21T08:33:22.383000 CVE-2023-49425,0,0,41aec47a68b046d68f3afc2d29f4e86911729f41a2d38db56112b7fe298a8b42,2024-11-21T08:33:22.637000 CVE-2023-49426,0,0,24ccb283dd811b7bbe9dac5994304963d40e99b04308ac6657fd7508af2d4466,2024-11-21T08:33:22.793000 -CVE-2023-49427,0,1,9e3d25715006745095ecc3c2d768f83e63e5c485dd28d50aa07bf323c9c27727,2025-06-16T20:15:25.787000 +CVE-2023-49427,0,0,9e3d25715006745095ecc3c2d768f83e63e5c485dd28d50aa07bf323c9c27727,2025-06-16T20:15:25.787000 CVE-2023-49428,0,0,868063d4b88a113eac2ad7dfd7a983c90c1888bd4c0fd88457e82c182b022090,2024-11-21T08:33:23.093000 CVE-2023-49429,0,0,2e5afa3b83b44af2a51b62ff5369b8e7b42a100071b9f2a98c76a7854b28d0f5,2024-11-21T08:33:23.327000 CVE-2023-4943,0,0,1a8987516543f87ce2b5b23583241ad5040c167598f6c1afaf4a0e38f4c156b6,2024-11-21T08:36:19.200000 @@ -239509,7 +239509,7 @@ CVE-2023-49545,0,0,47f3429e08f2c293fa1cc12b36624cb4d5f68d2ea9bef0685b799dd88a7d2 CVE-2023-49546,0,0,e46a5d6ba9f928f5ccce6110cf05864cdb8c95510d303e32eb9d6ba14881858a,2025-03-28T14:32:41.870000 CVE-2023-49547,0,0,62a6f6e3b035cf2acd18665693229ea22aac788ca296ee7a229b4a2dce9eae2c,2025-03-28T14:32:37.313000 CVE-2023-49548,0,0,e74378dd5804e4ba9b3280e9ef7d96db58590c88b07392a11d8977286e3b39c9,2025-03-28T14:32:32.823000 -CVE-2023-49549,0,1,e250802eda8c7c4fca3ddf77ab1de03a2428108ca7705eb394a1cef85c7a5cac,2025-06-16T20:15:25.967000 +CVE-2023-49549,0,0,e250802eda8c7c4fca3ddf77ab1de03a2428108ca7705eb394a1cef85c7a5cac,2025-06-16T20:15:25.967000 CVE-2023-49550,0,0,2c81aa1b1a990754ef879c26f0a6ee754ede0d23bfa96a1085f14891646cb258,2025-05-16T18:16:01.490000 CVE-2023-49551,0,0,ed28c559f9ba8d4b8aae8d2d4e401c8834ea212cf18214e50de777924bce03bc,2024-11-21T08:33:32.447000 CVE-2023-49552,0,0,ae4e673718d2ece6c9d20818d4dbdbed3840be8be0432a45b27d72d6dac502e9,2025-04-17T19:15:57.020000 @@ -251587,7 +251587,7 @@ CVE-2024-22069,0,0,2589bf56dffdf4ef29eab8695fc269ca81c308524ec8bece7dc0674ae5676 CVE-2024-2207,0,0,8ea6ed342e7acaef1c3218ac0166f216837d9139fa465e9658495103208688f2,2024-11-13T17:01:16.850000 CVE-2024-22074,0,0,8ce1416a2a2c2062f8a4515755c7506139d9261992e4df0985ed7bb84eb5f26f,2025-03-18T21:15:23.753000 CVE-2024-22075,0,0,6dc0dd67a1731f80576b4eb68aefe5391b243a762942cc9a93f563c5e6243aa8,2025-06-05T17:15:27.147000 -CVE-2024-22076,0,1,8df17a9e5da6687644592eb13f6108982f6808afa0e0ef5f67385a3a657b4a8b,2025-06-16T20:15:26.483000 +CVE-2024-22076,0,0,8df17a9e5da6687644592eb13f6108982f6808afa0e0ef5f67385a3a657b4a8b,2025-06-16T20:15:26.483000 CVE-2024-22077,0,0,8d56db529de03b85ebd97acb9333cc2ed26899ac306cf0acec7262d040dc588a,2025-04-16T18:20:36.067000 CVE-2024-22078,0,0,46ee7f1461ed88577c888e3c7fb500abb803e96986ad6800d0492878c6e910de,2025-04-16T18:20:45.887000 CVE-2024-22079,0,0,954368bce62047e9105fd47ef1997588788142259ffb5d52007fda3ef1f622d2,2025-04-16T17:28:31.577000 @@ -252836,7 +252836,7 @@ CVE-2024-23736,0,0,79df2399a819d34fa678176aa1fa937f65e00863f268b4896e44d2087292c CVE-2024-23737,0,0,540efa9ee00efd37944f43ad1656f3b195cf720184caf65cc0e057840cf72c9f,2025-03-18T15:15:47.677000 CVE-2024-23738,0,0,194fa187167961d4a7ea8823665a156c16bef0fdb38b3bf079adecd3590504b6,2024-11-21T08:58:17.097000 CVE-2024-23739,0,0,5fca16dbc725b4436fe41f1f025ceb46fcd84b9811e3b3737739d8cf70da2c24,2025-05-29T16:15:35.657000 -CVE-2024-23740,0,1,7e5c8dfa413b11f7c6b8966d5cdf8fba59dd96354b3012a055f055437514c5c2,2025-06-16T20:15:26.773000 +CVE-2024-23740,0,0,7e5c8dfa413b11f7c6b8966d5cdf8fba59dd96354b3012a055f055437514c5c2,2025-06-16T20:15:26.773000 CVE-2024-23741,0,0,cec6fa87499b6b24bec1cad23d019ade6552bf7a67f18abab2c2cdd15debb8a8,2025-06-03T19:15:38.503000 CVE-2024-23742,0,0,60ce68668ba096e31d7358004d46252e5708dd5c7e16e43273c83b3627661a67,2024-11-21T08:58:17.843000 CVE-2024-23743,0,0,c4ab1516b8f8c866ff87e9e1f54df21c028456ef3e5af76f499e4f60c61bd176,2024-11-21T08:58:18.013000 @@ -252997,7 +252997,7 @@ CVE-2024-23897,0,0,0228b7769e643d6ef05fe2a1c93c1e37d5e76065c0415e858a22d7bfa4a4e CVE-2024-23898,0,0,82cb86eeead29a41a26f8d43a27d3730988e662134d81188c8cd9708a0afbd78,2024-11-21T08:58:39.923000 CVE-2024-23899,0,0,c9706debcbb25b54a6bc875acb0da336d766e313da3eea8e6dba91d19993d393,2025-06-04T15:15:23.400000 CVE-2024-2390,0,0,3e848f25c0e6aca1cdb589d9d47a5535f56144364579a0cdbb3a8951c3252040,2024-11-21T09:09:39.010000 -CVE-2024-23900,0,1,a6b9a1972a90fef72a5600ab519c0ba9ad702d2ab57f30e71b6b1204e133411d,2025-06-16T20:15:26.943000 +CVE-2024-23900,0,0,a6b9a1972a90fef72a5600ab519c0ba9ad702d2ab57f30e71b6b1204e133411d,2025-06-16T20:15:26.943000 CVE-2024-23901,0,0,49bcb4810f55c620816c3f0e594dbd0087699ab58f867f02a2b90676bb50fc8e,2025-05-30T15:15:39.480000 CVE-2024-23902,0,0,c73fb2fe61aff6c4d1ed0d50eabeaf4ebe1700493a0b0e65d14e9f623c631a00,2025-05-30T15:15:39.690000 CVE-2024-23903,0,0,7b6250a29108c7172c9048bcf6031f095bf8c0ec94ede321b93e4b7334b19c5a,2024-11-21T08:58:40.513000 @@ -260432,10 +260432,10 @@ CVE-2024-33773,0,0,034058b04ec93ca6c5edc4f174f8f4df83d661d3c6f32106b0dd0a828f81c CVE-2024-33774,0,0,52b770b7f333615156ba87f01b3cea08102d5ac65159461b358a36f647f81817,2025-05-21T14:42:59.237000 CVE-2024-33775,0,0,bc597e520cb5802c10bcc9b429b021dd323dfc44b73d29075d59180bbe1246e2,2024-11-21T09:17:28.473000 CVE-2024-3378,0,0,3baf56e09d4e512582bd0fad8896d230d93b23be4ed5cff61b2d7585ee2d7eb6,2024-11-21T09:29:29.847000 -CVE-2024-33780,0,1,72f8dfcd17909bf4c4e40b8b9d97596995a01e522f1d6a66162a9d0b9be0b1c0,2025-06-16T21:43:46.523000 -CVE-2024-33781,0,1,c40d097d94d2077cdf36976c1d28b87ecc6f883a65a6fbf3b75f94d98d4a21cb,2025-06-16T21:45:19.070000 -CVE-2024-33782,0,1,6b64e9146367652ab9d0440bbae07abbb6805bad95ffbd0bfc513af27b1f75aa,2025-06-16T21:45:07.900000 -CVE-2024-33783,0,1,ddffa27e7f8352f14c94ce31d27ab88b9353a70ef496ad7759efacfbe846cc71,2025-06-16T21:44:57.410000 +CVE-2024-33780,0,0,72f8dfcd17909bf4c4e40b8b9d97596995a01e522f1d6a66162a9d0b9be0b1c0,2025-06-16T21:43:46.523000 +CVE-2024-33781,0,0,c40d097d94d2077cdf36976c1d28b87ecc6f883a65a6fbf3b75f94d98d4a21cb,2025-06-16T21:45:19.070000 +CVE-2024-33782,0,0,6b64e9146367652ab9d0440bbae07abbb6805bad95ffbd0bfc513af27b1f75aa,2025-06-16T21:45:07.900000 +CVE-2024-33783,0,0,ddffa27e7f8352f14c94ce31d27ab88b9353a70ef496ad7759efacfbe846cc71,2025-06-16T21:44:57.410000 CVE-2024-33786,0,0,e1fb385dd8747da32e59253a9ffdea319cd8cdf03f2ca73f386cdc040ae670ac,2024-11-21T09:17:29.420000 CVE-2024-33787,0,0,c49a88a43a707c2472f311af9a25d218e0650695fd55867c121db961e1d0f0a5,2024-11-21T09:17:29.593000 CVE-2024-33788,0,0,d9e631d68ae2203702b7e708decaf819d9af63c25e4d0516bd7f43a761e5472b,2025-06-11T15:39:33.297000 @@ -262482,7 +262482,7 @@ CVE-2024-36295,0,0,3c7252205fab8389ff604c7c9e106ade710abf8f2bfb98226da656ac02a8a CVE-2024-3630,0,0,f45524cfa972af7bb2aff53d16e1a1b83041609f3cdf694c64819cdf2dc69047,2025-05-15T14:13:56.197000 CVE-2024-36302,0,0,deb43f7268cf50cfed94b6e52be5d17bf5e3fbe5fd4ac51c48040db4fad24517,2025-05-29T20:20:31.940000 CVE-2024-36303,0,0,b4111938d128c9565d65f07c6c56322c350c793e76b61c6854b8deaf71b80e05,2025-03-25T19:15:43.273000 -CVE-2024-36304,0,1,d672eea5735554868eaf67944f914e35802e168f9b1639f91b7e62cd1ea49d0e,2025-06-16T20:39:51.303000 +CVE-2024-36304,0,0,d672eea5735554868eaf67944f914e35802e168f9b1639f91b7e62cd1ea49d0e,2025-06-16T20:39:51.303000 CVE-2024-36305,0,0,6cfa43069ee33e00c30d8fa3baead3036438742e2cae79ef30cc5d5dbaececa6,2025-03-14T02:15:14.077000 CVE-2024-36306,0,0,64b14f3a298243574030100c00019e79538277aa5e06c79a15c2ad9d80646a47,2025-03-27T21:15:49.143000 CVE-2024-36307,0,0,51d04be494c1bf54f841be1910d46ae0bb0c05ba90a56fa1759530c58c0d282e,2024-11-21T09:22:00.763000 @@ -263245,7 +263245,7 @@ CVE-2024-37285,0,0,e8cc98ed37c5497fbc9f92b308c74c874cd45490ed814f99ca1ead61244ae CVE-2024-37286,0,0,b4282d67550d8be06ee44ec1a1d7f9fab63643d7219a6e606e7fbac14d351953,2024-09-11T20:20:34.503000 CVE-2024-37287,0,0,bcf9844fa80494210d104fcba352f6ab7b4fe100f45f4712e22ea47490257093,2024-08-22T13:33:12.477000 CVE-2024-37288,0,0,3475a41b766be52846504d882c74d10d7a859ac0e1e60ce1dc0f10d4b0be8ed9,2024-09-16T13:29:06.023000 -CVE-2024-37289,0,1,dc4ae27da3f83405e806371f376c911569ffb7a98109a55edc534993293c5cf0,2025-06-16T21:06:18.303000 +CVE-2024-37289,0,0,dc4ae27da3f83405e806371f376c911569ffb7a98109a55edc534993293c5cf0,2025-06-16T21:06:18.303000 CVE-2024-3729,0,0,65abd6654c17cc3e018ee04581d61c620b50a730e72a5a977007e121eb77577c,2025-06-05T20:27:10.677000 CVE-2024-37293,0,0,2903e889cdd9f8be1e4ad48b17a596c07af5b20d5dcb6cbc56e38733c334d0fe,2024-11-21T09:23:32.963000 CVE-2024-37294,0,0,a18f9fa103420601f5842225843a4bd9744b5082925500986dd9d320528b58ee,2024-11-21T09:23:33.123000 @@ -264668,7 +264668,7 @@ CVE-2024-38871,0,0,aaca5100a2da9e7b5d586a9692295acab5c9d0d91eda66f1860ebeb293e90 CVE-2024-38872,0,0,47ea80c2905b4fcc836b85526e852dd82f3dd2956ab3cfac662114764141134e,2024-11-21T09:26:54.350000 CVE-2024-38873,0,0,f2ba5412275048e33812e6176a6bf99f7df96dd1ba2fdb85068e1d077b18f066,2025-03-14T19:15:46.563000 CVE-2024-38874,0,0,4355134bc7b65d4c8d4d874d6387ce19d5bde4ef04856b24cade7c33a3fdf2d3,2025-03-24T21:15:17.203000 -CVE-2024-38875,0,1,3e2807d526a7235cf7a075b444d5de74606e7a4a30ff4253080e5d38aed706d9,2025-06-16T21:39:39.120000 +CVE-2024-38875,0,0,3e2807d526a7235cf7a075b444d5de74606e7a4a30ff4253080e5d38aed706d9,2025-06-16T21:39:39.120000 CVE-2024-38876,0,0,382393d19d29340103e034acb95663867b49aa61928e9d6677747c9fde52b56e,2024-09-17T14:45:04.577000 CVE-2024-38877,0,0,debb17cf13d15d92eae54014caecd50256c36b5032209a063b03638e2fcdc712,2024-09-20T23:35:04.073000 CVE-2024-38878,0,0,0427331b5276e0aaf96c22ec915ceec80379648af41050ea650c27397769ec91,2024-09-17T15:50:41.117000 @@ -264914,9 +264914,9 @@ CVE-2024-39325,0,0,2d63785eb179762c856eea2ec86fc3efa2f2c067bbb8d9d3b6088dc568ae6 CVE-2024-39326,0,0,36a1fd07341b99cf706e1069ff0c3c0b0e50f721ea59b85388d56c1cba535054,2024-11-21T09:27:28.167000 CVE-2024-39327,0,0,f1d9ff16bae4b39dc8ccb82deff44aa6b991a127e7526d125d453464456f070b,2025-03-17T22:15:12.800000 CVE-2024-39328,0,0,a00e9dbdd3e55bbdf614ef0ad9d1cf5f35291f7ebcc2655205839e9683cf46cf,2025-02-18T20:15:18.533000 -CVE-2024-39329,0,1,de737deeab9d30cf7e765f18930001367aea63c48a5b0cadca8e73ee0b3b6447,2025-06-16T21:39:25.910000 +CVE-2024-39329,0,0,de737deeab9d30cf7e765f18930001367aea63c48a5b0cadca8e73ee0b3b6447,2025-06-16T21:39:25.910000 CVE-2024-3933,0,0,df64f87f68ad2e15d5453047c42e0ed6cb0fa7b8af24502bdac6a78fb0f454aa,2025-01-09T18:00:53.140000 -CVE-2024-39330,0,1,45d64a165c5cbf4443561c4228c5e71c339abec3f4d6962bb9afcd5a3acf165a,2025-06-16T21:39:07.157000 +CVE-2024-39330,0,0,45d64a165c5cbf4443561c4228c5e71c339abec3f4d6962bb9afcd5a3acf165a,2025-06-16T21:39:07.157000 CVE-2024-39331,0,0,f95fa1eb69af148f11a765a1ec92c46fcf56bb3e58c0541443e234e8b15a8d12,2025-04-30T16:44:51.867000 CVE-2024-39332,0,0,1f97303c758e324e488ed758e883e305ce844aaff7524d06547eb074ededefc3,2024-11-01T16:35:21.290000 CVE-2024-39334,0,0,6658b5cdd9b8f471072648252d10cf59fe676c32ec2f32b00395e3dab4f56b09,2024-11-21T09:27:29.230000 @@ -265197,7 +265197,7 @@ CVE-2024-3961,0,0,9adcc99617b8264560a448864cfa925b25ac1a522a680cd7491d3775365a24 CVE-2024-39610,0,0,5343055bcd0163768ab6327ea58c70d44bca3d34250efd82fb84b72dc771d3be,2024-11-20T15:02:14.297000 CVE-2024-39612,0,0,33a99f9d5e7a84847570107d4ada7b5da5e937e8a3e280000a5cc5660179c96b,2024-09-04T16:38:56.383000 CVE-2024-39613,0,0,7cafea60d2bb85cb27b66cde858f3744dc167d0cc43f0183fc2d18ab2b4fb18b,2024-09-20T13:59:01.117000 -CVE-2024-39614,0,1,75ff152b2e305b38e3e5a86e0a40ecb002a7a11b05ed580e4de49a4a662622af,2025-06-16T21:38:55.470000 +CVE-2024-39614,0,0,75ff152b2e305b38e3e5a86e0a40ecb002a7a11b05ed580e4de49a4a662622af,2025-06-16T21:38:55.470000 CVE-2024-39619,0,0,067410b7de6a8e32a69b3466976f3f37f3994accf19c4b46d2a649c1738d9ab4,2025-03-07T12:16:26.617000 CVE-2024-3962,0,0,ac26c730ea7e98c5ae97bfda18ed5791ce686630787c902a3918c7f11fcc01ad,2025-02-07T02:07:02.537000 CVE-2024-39620,0,0,3103eb99384deca53db687a27b3e5caaa6689cbe4eb572f735afe1f0771046b8,2024-08-30T16:30:39.210000 @@ -277806,7 +277806,7 @@ CVE-2024-57045,0,0,fb5ea4e4f7a4b9889a1febeaf0802625e04c77b289c8befbcdbc515a09b01 CVE-2024-57046,0,0,fe99d44204f56661f0679c5d1ecb0fd6df526b6f6fc17cfa20ea09ee55d671c5,2025-02-19T22:15:23.207000 CVE-2024-57049,0,0,2a0005173d8041814a4147620684c257c9ca3c68d2751da229477245e15e8a12,2025-06-06T17:59:07.280000 CVE-2024-5705,0,0,f3b79a5d6cb194f0bd96745c53b497323f2e376cb2b6ea3a0bd2883a13683047,2025-02-19T23:15:10.823000 -CVE-2024-57050,0,0,a8a23107a1e42d1b6ac3205cc9b597da829b10740486a542824fbd3889bb45fd,2025-06-06T17:59:21.903000 +CVE-2024-57050,0,1,f6fe4502a7b18901ddf478890a963604732260de8ad7ae059ab03cc4eda5a419,2025-06-16T22:15:20.670000 CVE-2024-57052,0,0,5683e7b641254ab70a5fb17d8461ee1673d426f59e2b3701e2e1d43626b51181,2025-01-28T20:15:54.727000 CVE-2024-57055,0,0,10985f4d1644c583934097b7ec50c1a0dc3d6cc9f218e4bbfca50a2ea6ce6767,2025-02-19T21:15:15.227000 CVE-2024-57056,0,0,5fa1c6daac1c565c60219576528f65f5f288f5ab9fda6e5efedccb351b0ddf0d,2025-02-18T22:15:14.653000 @@ -289630,6 +289630,7 @@ CVE-2025-27581,0,0,010725d7ecbfe0dd212b958a3a5bd2c7e9f3630c39f4e0964f9540d000321 CVE-2025-27583,0,0,0323a5ab9427edc3fc5fcf52b07bbd68cd541b31029bf0b1077e85dabad17762,2025-03-05T17:15:16.693000 CVE-2025-27584,0,0,f03e6726bedccad19322a88f13d717b29a57c1713f548b043d4f11c0c134f427,2025-03-04T17:15:20.527000 CVE-2025-27585,0,0,720b68d2eda984711942f08d1f5d1c3e9ff08ec0907ec239e78ca92044ae9f6a,2025-03-04T17:15:20.690000 +CVE-2025-27587,1,1,737c929fdf729bd27a538e97494a0e65a31a264aa1fa51392616b0e648b80f2d,2025-06-16T22:15:44.093000 CVE-2025-2759,0,0,6df40746bca0a076cfdd89fceb7edae074243de43f4b4548050e4f6a4f49b153,2025-05-23T15:55:02.040000 CVE-2025-27590,0,0,967f795bd4c85a7326c3accbc97af4e437c14d446f9275cd756d84bf07c7deb5,2025-03-10T14:01:33.053000 CVE-2025-27591,0,0,bde746d629d3275aa4bd9bd60b4521aac06adacde1e58fa17d924514d9ced6d1,2025-03-21T21:15:36.737000 @@ -290389,7 +290390,7 @@ CVE-2025-2956,0,0,12b742621d86c28d988776b85da597ef776ef6fe74e703c6823d14feeb258a CVE-2025-29568,0,0,3b23dcb888abcc37f1444d0fc863cef625a6ebdc671441b643f7de7ab4accc97,2025-05-14T13:09:12.467000 CVE-2025-2957,0,0,d90251765154920d1060d5e6f1781980ec9f028972bb25184edb9ab3b3acf04f,2025-04-01T20:26:30.593000 CVE-2025-29570,0,0,ce09831559b48fe479ba4c5f9b34d0db4bbbbbf20068eb3ed4fe546923ebfe0f,2025-04-07T15:15:43.543000 -CVE-2025-29573,0,1,06884748a5fc29b781a49fdb90043d550ed36dfc5e15b1fbcf626b4039da325f,2025-06-16T20:19:43.233000 +CVE-2025-29573,0,0,06884748a5fc29b781a49fdb90043d550ed36dfc5e15b1fbcf626b4039da325f,2025-06-16T20:19:43.233000 CVE-2025-2958,0,0,9728ea5d0e1e0ffe03d484b47c7dc7d2f752fe0ff3a0cf460614ef3d0b6ffb41,2025-04-01T20:26:30.593000 CVE-2025-2959,0,0,2e5fb15945faaa1aff3f84ae92ae41d627608b92925fe249b869a66c5d1ada9d,2025-04-15T18:17:30.903000 CVE-2025-29594,0,0,2f622bba8fdc6dc52fbb1c6d9cffd703149b20ba0389fb0df41fe5a0ef1aba15,2025-04-08T18:13:53.347000 @@ -290406,13 +290407,13 @@ CVE-2025-2964,0,0,ec69ae3f38e343756ba814c2e5955dca4ab2cdb43321644a6a3ca4d2fda05b CVE-2025-29640,0,0,10d69d5153affdfdd1cfbbf32b1c82cf02889c3684c0ecfe28cc371bbe51cc15,2025-04-01T20:23:29.113000 CVE-2025-29641,0,0,07728e025c7edec0a6c57cfca48077e7931db6a66e70d6357266b91cead71f8a,2025-04-01T20:23:16.657000 CVE-2025-29647,0,0,b2c68859973ff17d99e38be6964fb50b00d742d76463efee1e3f756976e68d06,2025-04-08T20:15:30.700000 -CVE-2025-29648,0,0,a7eaa771354a705b285f1c3684a3f953432537672eb28b52e912d0d68517ff15,2025-04-24T12:52:00.727000 -CVE-2025-29649,0,0,d9f19c85152376fc41b6043f80b049c59ec4caf7c602a3488f5c6538fbc911b7,2025-04-24T12:51:37.493000 +CVE-2025-29648,0,1,84bec7b21f7c56a1385297c289052d8ecde84cec92268af480ddf8554a7270a0,2025-06-16T22:15:44.517000 +CVE-2025-29649,0,1,674d024497e2e807662619a838994b70647b9018a5b3a3e54a8fa02abea03a23,2025-06-16T22:15:55.553000 CVE-2025-2965,0,0,b1d83303c83fa5c453f89d281c2631e556dad3281735af3c32f95354d255295b,2025-04-04T01:15:39.727000 -CVE-2025-29650,0,0,5f46dc6c7a387a28666637bcf7367f72ffe82767fe1270be661aad1f55cd5e69,2025-04-24T13:44:23.137000 -CVE-2025-29651,0,0,ee2e1abdc8add2e978c76a5d12cc323b8871d73c897faeaf0b2250b0a3c28292,2025-04-24T14:56:11.510000 -CVE-2025-29652,0,0,725117646d812bd9ba15bdbfca81a3949128b5f16ff0950b6d0bfd05d931b133,2025-04-24T13:56:26.960000 -CVE-2025-29653,0,0,56b2d2a07b99b4d66ca95d61135d9f92c834689e3e3ed529503dfff30cff5718,2025-04-24T13:54:34.550000 +CVE-2025-29650,0,1,cb690fb06c7e170a94213a0089eba59b88ea6951964a1db72e6fe406f0c5d8c0,2025-06-16T22:16:04.667000 +CVE-2025-29651,0,1,bffa517747fb1fd066ce6168347e27bf8df7ca0a832f9d9f64bf0567578be439,2025-06-16T22:16:13.750000 +CVE-2025-29652,0,1,8d5c668462d815386589b7176986a0f06753f6b9c9cb94261388491c1b545a66,2025-06-16T22:16:22.843000 +CVE-2025-29653,0,1,67a65ee0fcb50c85eef841f0e84da2c245401851e7c01a4f02b2fa6f7a74fb5e,2025-06-16T22:16:31.940000 CVE-2025-29659,0,0,f9e8d6621163c83dcf8fec3e0aa9d79236f03dcdde01fbd274cbdbc678026bf1,2025-04-23T14:08:13.383000 CVE-2025-2966,0,0,4b9026ccd40e00fcfd51a7652f6490239e965ca285425fe097bdd2da5faa6bb0,2025-04-04T01:15:39.793000 CVE-2025-29660,0,0,7872b4589e7a281e05a7df2d5b23f35c28a06e32d443bbdd2d26b4ef96f8e1b9,2025-04-23T14:08:13.383000 @@ -290820,12 +290821,12 @@ CVE-2025-30310,0,0,664c5c0917b994456cf8cf1770f4e26dab72570ca49aebcf3803f0c4478c2 CVE-2025-30314,0,0,64cf02f0bc690481a57c6cdb14a994551761ffa2e82058946039130616e9602c,2025-05-19T20:29:21.407000 CVE-2025-30315,0,0,db0eda92c59831715273a267152e238fac9691a936628e374e847ef4f8e7639b,2025-05-19T20:29:33.717000 CVE-2025-30316,0,0,7c60bffaf5b5500cead0b668c260c53f7df6586ed76525d0085392b74ef9c702,2025-05-19T20:29:48.503000 -CVE-2025-30317,0,1,eaecc747d49a568cc39fe4d6912494690707dd4e5866f61992f41e27efc909e0,2025-06-16T21:27:49.447000 +CVE-2025-30317,0,0,eaecc747d49a568cc39fe4d6912494690707dd4e5866f61992f41e27efc909e0,2025-06-16T21:27:49.447000 CVE-2025-30318,0,0,e9585c50b60ffa8b64da830b96992e12585dd9971124ba2c8ec2d12aa9784ca0,2025-05-14T14:28:36.363000 CVE-2025-30319,0,0,eb12dac8472fdfe9992ec3368e7c4232ecf79a9fba5a19c43d0577fbd40d843d,2025-05-14T14:28:51.907000 CVE-2025-3032,0,0,f8b4ab2f73ff457fe82cca4d434a54ce5e1088aad2e6e70e30f2847b41780fdf,2025-04-07T13:31:04.710000 CVE-2025-30320,0,0,5faa500599293b831a4781f7de4dfeab3c23d52e0e4bd715e06e02481844c75b,2025-05-14T14:28:59.920000 -CVE-2025-30321,0,1,0afe8e51fb4e51970859c3c43c333dc7d8aaebb8afcd87e0a791097204ca8c33,2025-06-16T21:32:02.783000 +CVE-2025-30321,0,0,0afe8e51fb4e51970859c3c43c333dc7d8aaebb8afcd87e0a791097204ca8c33,2025-06-16T21:32:02.783000 CVE-2025-30322,0,0,fffb143d86fda45cfaab46b7f00cb9ce6863b83ec5cc74e528f6ecd921540634,2025-05-19T17:10:08.910000 CVE-2025-30324,0,0,cc814187ea587e10cc609b1aa2e1d499f6d169893aea075eef7cd426f0fb5529,2025-05-22T18:34:10.280000 CVE-2025-30325,0,0,28ff58c7866f3c5b8b7c6c71294d9237d94bc56e945e412c9e15b3bb0632bfd8,2025-05-22T18:33:36.103000 @@ -292946,10 +292947,10 @@ CVE-2025-32794,0,0,e5c75374c7acd23f4b7bf6398c0b16e7126deed02aabe7e5caf26f8df1848 CVE-2025-32795,0,0,9b91f12206c53caef7f7087deba98182feb5bc18c57224b5893c030b3a403c24,2025-04-21T14:23:45.950000 CVE-2025-32796,0,0,20ed07849a09b1f538632557f0ede2b9976cfa2cb03f0965ae7b2114a9dbac36,2025-04-30T16:12:32.757000 CVE-2025-32797,0,0,28082659442d2f9caf3b20b177923fc2a5249fb7d4c413f133fbad3ac6617b7c,2025-06-16T19:15:33.510000 -CVE-2025-32798,1,1,3b2f20fc76c1f3f807497fc4a8441c72fa470411c933d21c3bd116a9d628d28b,2025-06-16T20:15:27.200000 -CVE-2025-32799,1,1,adc17354685be5a1d664ce4fc8da817a7780171d02371029a6753caa0c1bcfc6,2025-06-16T21:15:23.683000 +CVE-2025-32798,0,0,3b2f20fc76c1f3f807497fc4a8441c72fa470411c933d21c3bd116a9d628d28b,2025-06-16T20:15:27.200000 +CVE-2025-32799,0,0,adc17354685be5a1d664ce4fc8da817a7780171d02371029a6753caa0c1bcfc6,2025-06-16T21:15:23.683000 CVE-2025-3280,0,0,bbfa48dab65dd8e30d4af992e1eee1a23f41dd90ea1a7ea7a1775416dce3500e,2025-04-29T13:52:47.470000 -CVE-2025-32800,1,1,a3b485e8169439c61e9425a2d77a02aafbf1d0102042f325b3a29373b1d216cb,2025-06-16T21:15:23.847000 +CVE-2025-32800,0,0,a3b485e8169439c61e9425a2d77a02aafbf1d0102042f325b3a29373b1d216cb,2025-06-16T21:15:23.847000 CVE-2025-32801,0,0,6146013012d0cc266cf2a68a1cfcd1c7bf0ca9e930c722235f6d34464ee53a2b,2025-05-29T14:29:50.247000 CVE-2025-32802,0,0,f6e78eb116b2cd56d8ef0898bf440fc0936b1baf62e5eadf8e89c04d3f335f9e,2025-05-29T14:29:50.247000 CVE-2025-32803,0,0,f6920fa88ece4e7143788cee904b73826ee8e5e4a2ab79ec11586c6e694e4f40,2025-05-29T14:29:50.247000 @@ -293475,7 +293476,7 @@ CVE-2025-3634,0,0,f1df1ce281d4f05da7d71805ec7234d4d7b9375eb0df11046db6b194005749 CVE-2025-3635,0,0,d0b560b1de78f379fe7f701ac4faf0bc2dd5f1916438a1bf60f9e86147301708,2025-04-29T13:52:28.490000 CVE-2025-3636,0,0,ceaad85bcd46f58415162f18dbf8cfc38d5ab635c16737d3ade9ca6e7b13c8d6,2025-04-29T13:52:28.490000 CVE-2025-3637,0,0,c87041797c311e81a89dfd1fc18de62f159879af670bfc90cb09b45a20c270e1,2025-04-29T13:52:28.490000 -CVE-2025-3638,0,1,0b36fddd5515287a1a712f272220188fa7e5b84f4e00c89fe48c91044f4ac294,2025-06-16T21:03:13.033000 +CVE-2025-3638,0,0,0b36fddd5515287a1a712f272220188fa7e5b84f4e00c89fe48c91044f4ac294,2025-06-16T21:03:13.033000 CVE-2025-3640,0,0,6bdde0071981ec66085b65d919467b17b738e8eae4a4b1251a80c28ae8725e70,2025-04-29T13:52:28.490000 CVE-2025-3641,0,0,dbfd44d03760d8b3be148abd0efc0467b1e063b595f60cf58929e9634a8e273d,2025-04-29T13:52:28.490000 CVE-2025-3642,0,0,ca4fa0ca9109366f127ceafe021e351913f33001fd19e6b1dd6b95dc80ada57f,2025-04-29T13:52:28.490000 @@ -294792,6 +294793,7 @@ CVE-2025-4315,0,0,321394bc3849af4ab9b6cd61bfefb289f1f6cc25ce89390fc43856f0333190 CVE-2025-4316,0,0,a850e49ba627f858db58117c4cb778bc199e996d4e90b919c7290f94c5d139b8,2025-05-14T13:15:48.907000 CVE-2025-4317,0,0,f983c055783da6de4e51f0e6cd7b6401724e0ab142e6ae06607742ab65cbbc38,2025-05-13T19:35:18.080000 CVE-2025-4318,0,0,5887b3ce06385074832e5ab93ef36220685a1c2570be13ee561ec8804f3cb15a,2025-06-10T01:15:23.483000 +CVE-2025-43200,1,1,91f3d0c6a5bc8d72322fe26af614b864d8e65f6dd74cd9172b8234b9066c7270,2025-06-16T22:16:41.120000 CVE-2025-4322,0,0,e2ee1e5545786d5194d1f34f3de88e5515751a08a7c9f4ad7a4ef29aeb6cb910,2025-05-21T20:25:16.407000 CVE-2025-4323,0,0,c1269792d01afee15d189426619dce99f2b7fd20ca7e7484441a414f66a84606,2025-05-07T14:13:35.980000 CVE-2025-4324,0,0,322bfee86bcfcb6ca23d23a1743d3ee5a6951408d15d6bec55f13d4d4fd25fa3,2025-05-07T14:13:35.980000 @@ -294836,7 +294838,7 @@ CVE-2025-43554,0,0,72f8a55aa3016b7b98602aea28c96ba8387be55ce503a81731ea16020f85c CVE-2025-43555,0,0,19d4da2bfc545b26b865091f8de87f344da2925ac800cb983df6cbdd3dd38236,2025-05-15T18:39:08.297000 CVE-2025-43556,0,0,eca516d80145b82d74e737be6b84aa271756b3ab57b5bfd3b44c5b6cb06029d1,2025-05-15T18:39:00.157000 CVE-2025-43557,0,0,46ce49a54afa407d288372144d1569006db3ee5a386d9b87264495da2521727d,2025-05-15T18:38:50.533000 -CVE-2025-43558,0,1,c114eb89f9c94a14205e0cf12555f005ae5fff71f5c84fdbe3bd23161b529676,2025-06-16T21:31:49.540000 +CVE-2025-43558,0,0,c114eb89f9c94a14205e0cf12555f005ae5fff71f5c84fdbe3bd23161b529676,2025-06-16T21:31:49.540000 CVE-2025-43559,0,0,5ba3945b07996edeb9a056650b7e4cc9fac22eca84981fc7a2c7dcc1b7da159c,2025-05-19T20:31:34.550000 CVE-2025-4356,0,0,1808eaf22cb046635d44f9db8c325a9360bb6eb68204b8a94aa8ea43d160384c,2025-05-13T20:24:15.620000 CVE-2025-43560,0,0,f024c3768806730423456b31d211372c754d424eed90de6b61cf7127fc2f200a,2025-05-19T20:35:23.227000 @@ -294865,10 +294867,10 @@ CVE-2025-43581,0,0,be2c63dd2c1987721d4f59f8519c99d785cb988dc2b859928d2cddedf0fc1 CVE-2025-43585,0,0,0ee58ab063c833215b13953595c7415a2875f7dfd620cd1a98fc39dd0300acdd,2025-06-12T16:06:39.330000 CVE-2025-43586,0,0,84d6946d4240412f9ea7e35b1116044dd84f632670958760f891cc307e06b113,2025-06-12T16:06:39.330000 CVE-2025-43588,0,0,18f5e59b51717e1346fca3045898f24af5f456d77d491f9c5377ad6cd7d6deb5,2025-06-12T16:06:29.520000 -CVE-2025-43589,0,1,88897a5ff9cb2e799cf7b02db25e13c1e1906eba4e99021ff3fa67fd0cc9ef9f,2025-06-16T21:31:39.580000 +CVE-2025-43589,0,0,88897a5ff9cb2e799cf7b02db25e13c1e1906eba4e99021ff3fa67fd0cc9ef9f,2025-06-16T21:31:39.580000 CVE-2025-4359,0,0,59ee176cba0c4e4e03aa8a60f5b2ae3d433f145526f53fa31de3f32e5e408c2d,2025-05-28T20:02:09.627000 -CVE-2025-43590,0,1,f4ceb608883cf7e2697ab6b900971841d789b6d664b9bd657e34d743fae90306,2025-06-16T21:31:30.193000 -CVE-2025-43593,0,1,b84414267ab98c9b8606f91d272d445e5ba05cacff347c93ca65979eeb68eb16,2025-06-16T21:31:20.630000 +CVE-2025-43590,0,0,f4ceb608883cf7e2697ab6b900971841d789b6d664b9bd657e34d743fae90306,2025-06-16T21:31:30.193000 +CVE-2025-43593,0,0,b84414267ab98c9b8606f91d272d445e5ba05cacff347c93ca65979eeb68eb16,2025-06-16T21:31:20.630000 CVE-2025-43595,0,0,ec533d0b32ab87a6e7dd76a79146ad6546e236f3fe580e7c0c1d4424d4e28c5b,2025-05-22T17:15:23.903000 CVE-2025-43596,0,0,29872261ca8016ff214f65d23588f315ee328e08b07cf2f6990482ee63e89e06,2025-05-23T15:55:02.040000 CVE-2025-4360,0,0,889f39d6fedc34404784b6ded7b84b7ae2156985291e2ce92d30fe81490d2582,2025-05-28T20:01:23.620000 @@ -295185,8 +295187,8 @@ CVE-2025-4515,0,0,15842f64bc5158ee594ebc8bcc08fddcbccd67b13581d77b6c2aa4b49c2d35 CVE-2025-4516,0,0,796b8f07feac2cf0afff20513d00fadb85e8da28c0408ddb3453089e5fc0ed01,2025-06-03T14:15:49.697000 CVE-2025-4517,0,0,8f51c46af888510dd73bb462bbca2c104af9d3c9f1d6809b8679167122b8adcb,2025-06-05T14:15:33.050000 CVE-2025-4520,0,0,2649cd1b163a0622d5bf29e4b3dee5950ca643285f952a7b68fc954427092ffd,2025-05-16T14:43:56.797000 -CVE-2025-45236,0,1,9830570b306de4a57c004cb48836797797fb1d76b38f8162fa9abe4600c7152d,2025-06-16T20:36:27.817000 -CVE-2025-45237,0,1,5f8d1ec8e1b1339bb5462775e85ab06ba1121e2fb8ab2bc11bb23bc8829151ce,2025-06-16T20:35:29.437000 +CVE-2025-45236,0,0,9830570b306de4a57c004cb48836797797fb1d76b38f8162fa9abe4600c7152d,2025-06-16T20:36:27.817000 +CVE-2025-45237,0,0,5f8d1ec8e1b1339bb5462775e85ab06ba1121e2fb8ab2bc11bb23bc8829151ce,2025-06-16T20:35:29.437000 CVE-2025-45238,0,0,b39549f1b61e24807431d3a951f2254a17eb0dbb519151422154254ab9990a40,2025-06-12T17:39:05.167000 CVE-2025-45239,0,0,991350366fb0c83185e15ef1dc4c822dd146409f9225ec787d11246fc95065fc,2025-06-12T17:34:08.947000 CVE-2025-4524,0,0,9f2ebfa9f8ca01d98c78b645fd8edee7f81ea49ceedcaa7d6aa7658167675b4b,2025-05-21T20:24:58.133000 @@ -295253,13 +295255,13 @@ CVE-2025-4557,0,0,923891368ba582855d183f0d5ed088d1956f49e0c8ca1b57be2ee3de815507 CVE-2025-4558,0,0,c51dcc9b20597a586f895771ce09346fff8c096f4a984512090059be827823b1,2025-05-12T17:32:32.760000 CVE-2025-4559,0,0,501974ee65c3407829c4ff0fc2a00de3038d9f8b3a2c9015f4408c8d496962ee,2025-05-12T17:32:32.760000 CVE-2025-4560,0,0,823d3f1a0cdcb165bbc1b67941faa6edd3e4515651bcf7fd119ca884109cd9b0,2025-05-12T17:32:32.760000 -CVE-2025-45607,0,1,fffa21d5b90a35012c61783fd1f71093104910573d69364d365590853d097560,2025-06-16T20:17:27.537000 +CVE-2025-45607,0,0,fffa21d5b90a35012c61783fd1f71093104910573d69364d365590853d097560,2025-06-16T20:17:27.537000 CVE-2025-45608,0,0,7e3c4c58c1ade44391ab70b89a990f1ca9ac0effbe72f1f748d083655476c797,2025-05-06T14:15:37.827000 CVE-2025-45609,0,0,06affab3802b43ae1968573a7a3af6dd916eb663f70dda2f2ad7c25bb77cc10d,2025-05-06T14:15:37.983000 CVE-2025-4561,0,0,e4177b88ab0583a3c8a6f6e3d419ecb83b860ceaf129cd282a7808dbb5d294e0,2025-05-12T17:32:32.760000 CVE-2025-45610,0,0,36fda72579ee19bcdaf663e853af79b2168dd075bca3c6cbdaf261b30ad1f0e0,2025-05-06T14:15:38.153000 CVE-2025-45611,0,0,e0ef9e668b81f5bbbbc066e7d93540ec7cf50f0cdb3ee5117e568efa0fa1f968,2025-05-06T14:15:38.317000 -CVE-2025-45612,0,1,aa12a5613c6acbac0c0a52bbedf8110e15d8007b501022b489be1408a2902c1f,2025-06-16T20:00:50.837000 +CVE-2025-45612,0,0,aa12a5613c6acbac0c0a52bbedf8110e15d8007b501022b489be1408a2902c1f,2025-06-16T20:00:50.837000 CVE-2025-45613,0,0,576651e2464558fbb6a2d5fd1d1a5eaec94a8b79e83eb09711f47a8a962694b8,2025-05-06T14:15:38.630000 CVE-2025-45614,0,0,11010ca358744e76d6a8d87844f129a25b0b063b116429fdbd92c04c1d120279,2025-05-06T04:16:14.580000 CVE-2025-45615,0,0,cd4b38212bfe3b58d8a8954f5868c330ece936029e48916fc212bace97574bc7,2025-05-06T04:16:16.153000 @@ -295664,7 +295666,7 @@ CVE-2025-4664,0,0,d4044bce681082456ae2ed2a3baaa6f65e61937d9e24855cf4b96203efa269 CVE-2025-46646,0,0,9a8a54d0124778094859178ae2a1be4b3ab7d35f7adc764a918d49bfc846da89,2025-04-29T13:52:10.697000 CVE-2025-46652,0,0,9d812ecaad689bd29eeb08cd6e51fc2313308ed71660c22dce020d578677f79a,2025-04-29T13:52:10.697000 CVE-2025-46653,0,0,3b6009fc3a51ec55453aaec5d1f7a19d2114d1ff8e2f811535a6f418b5dab168,2025-04-29T16:15:37.150000 -CVE-2025-46654,0,1,0aa14c4ea6fe1b19c5c6aa8b1b364a4f4f00114d15c5d807117da3c6c36c9dc8,2025-06-16T21:00:11.573000 +CVE-2025-46654,0,0,0aa14c4ea6fe1b19c5c6aa8b1b364a4f4f00114d15c5d807117da3c6c36c9dc8,2025-06-16T21:00:11.573000 CVE-2025-46655,0,0,34630625faf28d1a43b5cdb5fca99ebd8a91139b3a9b9f2e1d3fba1d80e58054,2025-04-29T16:15:37.440000 CVE-2025-46656,0,0,88d2e959cac4cda5103c704a18b5a278dfdfbb63d41e023dbd311e14a8416d7e,2025-04-29T16:15:37.573000 CVE-2025-46657,0,0,4b6d658b20503b01465fb89f1f4e404ee10732b42838e3f3a51606289348610b,2025-05-12T19:07:34.390000 @@ -296012,9 +296014,9 @@ CVE-2025-47095,0,0,6692e6dca71a9ad0e88f0bb3f86803201fe675c9243f60adf2c9cc2e0a673 CVE-2025-47096,0,0,e36e469f5850085f588b67839209d7a2406a67c09a4e10c7e0b375d32031e9be,2025-06-16T14:47:44.727000 CVE-2025-4710,0,0,e39d67cb76ce566e1fa070d7e96f2d3191895b08d95f46b970d158a013f006a6,2025-05-28T14:25:57.370000 CVE-2025-47102,0,0,718a80105b6565fee66f0014accca7ba51fb51a15c80dbabb0b54b0424234e8d,2025-06-11T00:15:27.530000 -CVE-2025-47104,0,1,da9c2e508574f468f0e6080d7a92db8f4a9b2381c09785cf7de4c646bfe29e01,2025-06-16T21:31:11.607000 -CVE-2025-47105,0,1,a7754d3c7f1382161f6093854cc0fccc706892435b48f3a2dff2e16f27a1401e,2025-06-16T21:30:52.307000 -CVE-2025-47106,0,1,e2626924918687a8e0451f7a1ec838ee995185e6681d87245e83d1fec1ea89af,2025-06-16T21:30:33.830000 +CVE-2025-47104,0,0,da9c2e508574f468f0e6080d7a92db8f4a9b2381c09785cf7de4c646bfe29e01,2025-06-16T21:31:11.607000 +CVE-2025-47105,0,0,a7754d3c7f1382161f6093854cc0fccc706892435b48f3a2dff2e16f27a1401e,2025-06-16T21:30:52.307000 +CVE-2025-47106,0,0,e2626924918687a8e0451f7a1ec838ee995185e6681d87245e83d1fec1ea89af,2025-06-16T21:30:33.830000 CVE-2025-47107,0,0,fdd924643f30ad0038e7fd95dd810702588a19273ddc406fc67f30e962777fd0,2025-06-12T16:06:29.520000 CVE-2025-47108,0,0,357230c30613137af807a607a4225bc350d8e27b93f9449fb985d3fecb4482a6,2025-06-12T16:06:39.330000 CVE-2025-4711,0,0,21c8c473cfd0b8fb70049ba4f98b86bc8037c0e94662198ff53f909236b4a0c5,2025-05-27T14:10:06.050000 @@ -296170,7 +296172,7 @@ CVE-2025-47475,0,0,419116b80f7fe9386a9aac3c0836858ef647ac252eac4b1ff08d67e0a3375 CVE-2025-47476,0,0,f06946c9db65910277eefdd02a4e277fdae7c5884111c0fe22a4a0e5abb63365,2025-05-08T14:39:18.800000 CVE-2025-47477,0,0,77da2db11e5826e5ac8b7646c2ab3c2664e4f15f6b958d535ab609737d59cbfd,2025-06-12T16:06:47.857000 CVE-2025-47478,0,0,e6d6adb3b1616923ef0638df6a5bba4a6a66b2f12e5e8ad860cddbc43d60dfda,2025-05-23T15:54:42.643000 -CVE-2025-4748,0,1,ca31697b4209a75e135d47e1ec1233b9df790bf7840bea1b03bd9ce709b6dbca,2025-06-16T20:15:27.750000 +CVE-2025-4748,0,0,ca31697b4209a75e135d47e1ec1233b9df790bf7840bea1b03bd9ce709b6dbca,2025-06-16T20:15:27.750000 CVE-2025-47480,0,0,ef5cc5737d0e088e76573f050c6e079a8e6e4769a34e7600bd175867d6608ec8,2025-05-08T14:39:18.800000 CVE-2025-47481,0,0,9dd0d7411f22176e27723210f288403628c90f1234e60ae0d0856344023dd406,2025-05-08T14:39:18.800000 CVE-2025-47482,0,0,961d8ef4753c50b36e4d7feaf8debc74b4e022889d69dcdb4a7b418fc8bebc1e,2025-05-08T14:39:18.800000 @@ -296525,7 +296527,7 @@ CVE-2025-47948,0,0,ba2e8c1cb0258308d0310ef150246d3504511a8f7fe9ed640ab9013bfefad CVE-2025-47949,0,0,dc86078901df64be63bcaee4a73ca319eec3de89fa5549a71818463921d49b3a,2025-05-21T20:25:16.407000 CVE-2025-4795,0,0,3fd0e28eaafb548c1d9f9e6a41da631ae960e10221f6f4901b1a5e253e1ad775,2025-05-19T13:35:20.460000 CVE-2025-47950,0,0,4b0b13462648502a1d9e9c65a1a516635c319d24d84102d181b2a27357de0e4c,2025-06-09T12:15:47.880000 -CVE-2025-47951,1,1,86333cf5e9e8a5a2394e7c92f3ecefb7d8ebdf720749508a166bd575cd813c09,2025-06-16T21:15:24.010000 +CVE-2025-47951,0,0,86333cf5e9e8a5a2394e7c92f3ecefb7d8ebdf720749508a166bd575cd813c09,2025-06-16T21:15:24.010000 CVE-2025-47952,0,0,98063020cb9f5c2b480f0cb92a50eeedaf8c49e542ef7ba3da076028de108162,2025-05-30T16:31:03.107000 CVE-2025-47953,0,0,4efadcb8de5ee103c4397343fd477ac2f1cc76312f377843529dc0565acd9d4e,2025-06-12T16:06:29.520000 CVE-2025-47955,0,0,eb2ec88dd5cc932731cf640b586ede1e8a1ad4d65d53649a0708f1fa7a7dcbc2,2025-06-12T16:06:29.520000 @@ -296963,11 +296965,12 @@ CVE-2025-48960,0,0,6388a249faff67cc5a4d2fa4bca8d3989a10ec11030dddacff72a168ec292 CVE-2025-48961,0,0,44e1cee69124b46bd6b795101bc0b7c9c4699ce00a138653c66e2e8aeff53be4,2025-06-04T14:54:33.783000 CVE-2025-48962,0,0,4b2d64282106eed58f9e4647aa4bdcfb03945a2468e53d084f7081033bf14af0,2025-06-04T14:54:33.783000 CVE-2025-4897,0,0,104730cc5ad0680860a774881c7ad06896ad7afe2bb00c017480a43cf79011cd,2025-05-27T16:30:05.410000 -CVE-2025-48976,0,1,ab1bc5562757eff2a298b7ce1b2f60f8d15bbc3717ff9ce51046390347fc9b0e,2025-06-16T20:15:27.350000 +CVE-2025-48976,0,0,ab1bc5562757eff2a298b7ce1b2f60f8d15bbc3717ff9ce51046390347fc9b0e,2025-06-16T20:15:27.350000 CVE-2025-4898,0,0,088de021e18707e0dc4ec8499500601b39900fc456f0a7d4c0f7a0b50fbac254,2025-05-21T19:37:41.533000 -CVE-2025-48988,0,1,af79b0d56ade70d464da7381544626bd5b7c0be41380335aba730b61b05234c6,2025-06-16T20:15:27.447000 +CVE-2025-48988,0,0,af79b0d56ade70d464da7381544626bd5b7c0be41380335aba730b61b05234c6,2025-06-16T20:15:27.447000 CVE-2025-4899,0,0,384aad67823f1c19c564c5975182391c80467536acba8235a635dfd93a5393e3,2025-05-21T19:37:31.280000 CVE-2025-48990,0,0,35250e6aeab8f33cddd6a2463ca29c89c0b5491c46e9371235f8d9552555aa3b,2025-06-02T17:32:17.397000 +CVE-2025-48992,1,1,020a35cfe3046cb69fffeb0fe8d92462d7fc52c795b4589f9a69904b72342f16,2025-06-16T23:15:21.827000 CVE-2025-48994,0,0,2347eea9d248ee0ef643957a0a53d1ea86b7f69fd6aea9013390675ac9969f47,2025-06-02T17:32:17.397000 CVE-2025-48995,0,0,13be942b01243f59599a7f021ac94d7f691b51f24284ec645c1ab118368b0b77,2025-06-02T17:32:17.397000 CVE-2025-48996,0,0,a5bc0462fba0b0454b69362838585b85b6432cd607f3470780f5a230a04991c5,2025-06-04T14:54:33.783000 @@ -297012,15 +297015,15 @@ CVE-2025-4911,0,0,8165f0d1dc1e78afded21e50626575112805e2ff63d8f266295fb56c02f369 CVE-2025-49112,0,0,53acc03eb5f34e287cf80e6f2606bfb4760fb16ea2fe509fc70b20f7de56218f,2025-06-02T17:32:17.397000 CVE-2025-49113,0,0,56a8fd04a9ef82f1d5c677d3aef05bbaae629657949015a38e21cc671f31eeb2,2025-06-12T17:15:29.310000 CVE-2025-4912,0,0,952cc1697455c59886c397e61a80308747f6eedd0f377c0531d621b366fc5d7d,2025-05-21T17:41:21.063000 -CVE-2025-49124,0,1,3c217f37578e1849840faa6b85bf65635ac11a99332db91c6d0115ed08f141be,2025-06-16T20:15:27.557000 -CVE-2025-49125,0,1,5e8874247a201cb56394c3b5234a03113a560a96bb6f82b09d2c3dfa5cdcf8fd,2025-06-16T20:15:27.650000 +CVE-2025-49124,0,0,3c217f37578e1849840faa6b85bf65635ac11a99332db91c6d0115ed08f141be,2025-06-16T20:15:27.557000 +CVE-2025-49125,0,0,5e8874247a201cb56394c3b5234a03113a560a96bb6f82b09d2c3dfa5cdcf8fd,2025-06-16T20:15:27.650000 CVE-2025-49127,0,0,3f4889eef877e3cbd48aa702e8cb35c833e3234501017b5b4ce4fc613f23b00a,2025-06-09T16:15:44.833000 CVE-2025-49128,0,0,be74e1e3636b4e3c68c2e5f707126adefa5b42c030884a0a961eb0fa96655c19,2025-06-09T16:15:44.947000 CVE-2025-4913,0,0,53b3af32223266d4fefa6288fa7668d3e6278e5d2f6f83bce997bdbd90d149c2,2025-05-19T17:37:22.390000 CVE-2025-49130,0,0,c7a7f43db7ab1736ae0ac701a4154668121fb632c9f0116d3af26488234c6f03,2025-06-12T16:06:47.857000 CVE-2025-49131,0,0,8a44c490c7fa295d5533f610dd64963399edc71879b888527baab1ab4d531129,2025-06-12T16:06:47.857000 CVE-2025-49133,0,0,8088c6aaceb03a008d386616b846a037fdecedf4d2cd5516fa2cf3ebcd733d0a,2025-06-12T16:06:29.520000 -CVE-2025-49134,1,1,792f49c3c5d75906c9f62279f0a3a64786a4e379b66ebafc30f77504393dabbf,2025-06-16T21:15:24.167000 +CVE-2025-49134,0,0,792f49c3c5d75906c9f62279f0a3a64786a4e379b66ebafc30f77504393dabbf,2025-06-16T21:15:24.167000 CVE-2025-49136,0,0,c1d869d890c14268fd4f2fb480144530c7eab04eea9b543be4e0614ad0048264,2025-06-12T16:06:47.857000 CVE-2025-49137,0,0,a477190bb63ed4681206816d4240428efe69c92093321f84a64a5bd0869453f3,2025-06-12T16:06:47.857000 CVE-2025-49138,0,0,8c9222e6db28a0722fcd86b0c6153a24f83a1107e7a502e6df61b7751665bb28,2025-06-12T16:06:47.857000 @@ -298044,10 +298047,16 @@ CVE-2025-6132,0,0,94b02d7f3985b6649b8d5c4432445df1fe94d7793a3e8e46bb2916e7f8ee69 CVE-2025-6133,0,0,27d52f36b7e8d5b05576aa449ff5731fc04b86760269fdcdf2273be8ac827c92,2025-06-16T18:15:22.033000 CVE-2025-6134,0,0,4257b9cd77f1960d6cdf4eeb3bffc7ec6ddfc5aca9d6259ece844471c8473564,2025-06-16T19:15:34.633000 CVE-2025-6135,0,0,29e788198e5272e3b58eef7a2549776ef0373c688e618eda330248e6560eaf81,2025-06-16T19:15:34.850000 -CVE-2025-6136,1,1,176abadfc1b38f1e5124fa45bec2d5dc2bb5b6074a30c85c28372387f0dffabe,2025-06-16T20:15:27.863000 -CVE-2025-6137,1,1,5c8c7b975ca226277ed0790ed01c97657492009374dc6bc55c1a30f767d80158,2025-06-16T20:15:28.040000 -CVE-2025-6138,1,1,d30c5c35a881c39e3c70e5b99787cc0589a79d3349beca7d24e7e674be6859cc,2025-06-16T21:15:24.323000 -CVE-2025-6139,1,1,7cba670209d8308093d2e5607a543575d2624cdbba77aade528775737b26a49d,2025-06-16T21:15:24.513000 +CVE-2025-6136,0,0,176abadfc1b38f1e5124fa45bec2d5dc2bb5b6074a30c85c28372387f0dffabe,2025-06-16T20:15:27.863000 +CVE-2025-6137,0,0,5c8c7b975ca226277ed0790ed01c97657492009374dc6bc55c1a30f767d80158,2025-06-16T20:15:28.040000 +CVE-2025-6138,0,0,d30c5c35a881c39e3c70e5b99787cc0589a79d3349beca7d24e7e674be6859cc,2025-06-16T21:15:24.323000 +CVE-2025-6139,0,0,7cba670209d8308093d2e5607a543575d2624cdbba77aade528775737b26a49d,2025-06-16T21:15:24.513000 +CVE-2025-6140,1,1,b4769e2ad859cd6aad24ff664586d54d514a3baa4745610fe22c97c6833e6a97,2025-06-16T22:16:41.250000 +CVE-2025-6141,1,1,2541dd4213d822272a8ed07f6043934e922cfdefe6ec3d88a669822ded83f053,2025-06-16T22:16:41.527000 +CVE-2025-6142,1,1,db688935d8075655dfd000e77c5911a0d1cb69d0bfe761db1b8980de9960e1d7,2025-06-16T22:16:41.710000 +CVE-2025-6143,1,1,5a45a270d06f2e4e533159e0a51094901e0eeea9008d15cc57f14739c54b844a,2025-06-16T23:15:22.500000 +CVE-2025-6144,1,1,99e48eaa193e4b62e7191e8d52c6345135d324216f04cbbdba8519edb362ce54,2025-06-16T23:15:22.683000 +CVE-2025-6145,1,1,2e898950b03f74de6d569cac07508094946b059ab1dfd4f6ec1f379f9376a406,2025-06-16T23:15:22.863000 CVE-2025-6169,0,0,24b56c63dd5c2b9799043dae6dc3b75a3e06e9ee630be707f681a9bb09cd5b58,2025-06-16T12:32:18.840000 CVE-2025-6170,0,0,b6c9e594edbf46197f9f9a30d565b603f055d40c252eab039c7ec60bb43a9554,2025-06-16T16:15:20.430000 CVE-2025-6172,0,0,df5b11377ae2bcb860baea092fdadde3351cf8aeca30edf92e0d7977024948be,2025-06-16T17:15:31.503000