From 3b8a707ad2fbd054b160828768effc492a821966 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 30 May 2025 14:03:56 +0000 Subject: [PATCH] Auto-Update: 2025-05-30T14:00:19.634062+00:00 --- CVE-2024/CVE-2024-122xx/CVE-2024-12224.json | 10 +- CVE-2024/CVE-2024-37xx/CVE-2024-3767.json | 58 +++++++++++- CVE-2025/CVE-2025-14xx/CVE-2025-1484.json | 100 ++++++++++++++++++++ CVE-2025/CVE-2025-25xx/CVE-2025-2500.json | 100 ++++++++++++++++++++ CVE-2025/CVE-2025-409xx/CVE-2025-40909.json | 61 ++++++++++++ CVE-2025/CVE-2025-412xx/CVE-2025-41235.json | 18 +++- CVE-2025/CVE-2025-44xx/CVE-2025-4433.json | 33 +++++++ CVE-2025/CVE-2025-45xx/CVE-2025-4597.json | 60 ++++++++++++ CVE-2025/CVE-2025-484xx/CVE-2025-48492.json | 12 ++- CVE-2025/CVE-2025-488xx/CVE-2025-48865.json | 12 ++- CVE-2025/CVE-2025-488xx/CVE-2025-48889.json | 12 ++- CVE-2025/CVE-2025-49xx/CVE-2025-4944.json | 64 +++++++++++++ CVE-2025/CVE-2025-51xx/CVE-2025-5190.json | 64 +++++++++++++ CVE-2025/CVE-2025-53xx/CVE-2025-5325.json | 10 +- CVE-2025/CVE-2025-53xx/CVE-2025-5328.json | 14 ++- CVE-2025/CVE-2025-53xx/CVE-2025-5330.json | 14 ++- CVE-2025/CVE-2025-53xx/CVE-2025-5332.json | 14 ++- README.md | 32 +++++-- _state.csv | 37 +++++--- 19 files changed, 677 insertions(+), 48 deletions(-) create mode 100644 CVE-2025/CVE-2025-14xx/CVE-2025-1484.json create mode 100644 CVE-2025/CVE-2025-25xx/CVE-2025-2500.json create mode 100644 CVE-2025/CVE-2025-409xx/CVE-2025-40909.json create mode 100644 CVE-2025/CVE-2025-44xx/CVE-2025-4433.json create mode 100644 CVE-2025/CVE-2025-45xx/CVE-2025-4597.json create mode 100644 CVE-2025/CVE-2025-49xx/CVE-2025-4944.json create mode 100644 CVE-2025/CVE-2025-51xx/CVE-2025-5190.json diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12224.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12224.json index 1237ee488dc..cec4f69f873 100644 --- a/CVE-2024/CVE-2024-122xx/CVE-2024-12224.json +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12224.json @@ -2,13 +2,17 @@ "id": "CVE-2024-12224", "sourceIdentifier": "security@mozilla.org", "published": "2025-05-30T02:15:19.670", - "lastModified": "2025-05-30T02:15:19.670", + "lastModified": "2025-05-30T13:15:20.247", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Validation of Unsafe Equivalence in punycode by the idna crate from Servo rust-url allows an attacker to create a punycode hostname that one part of a system might treat as distinct while another part of that system would treat as equivalent to another hostname." + }, + { + "lang": "es", + "value": "La validaci\u00f3n incorrecta de equivalencia insegura en punycode por parte del crate idna de Servo rust-url permite que un atacante cree un nombre de host punycode que una parte de un sistema podr\u00eda tratar como distinto mientras que otra parte de ese sistema tratar\u00eda como equivalente a otro nombre de host." } ], "metrics": { @@ -77,6 +81,10 @@ { "url": "https://rustsec.org/advisories/RUSTSEC-2024-0421.html", "source": "security@mozilla.org" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1887898", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3767.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3767.json index 32d9e8c7fd3..5e57352ba1f 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3767.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3767.json @@ -2,13 +2,13 @@ "id": "CVE-2024-3767", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-15T04:15:15.340", - "lastModified": "2025-04-08T16:30:20.067", - "vulnStatus": "Analyzed", + "lastModified": "2025-05-30T12:15:19.907", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability classified as critical was found in PHPGurukul News Portal 4.1. This vulnerability affects unknown code of the file /admin/edit-post.php. The manipulation of the argument posttitle leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-260614 is the identifier assigned to this vulnerability." + "value": "A vulnerability classified as critical was found in PHPGurukul News Portal 4.1. This vulnerability affects unknown code of the file /admin/edit-post.php. The manipulation of the argument posttitle/category leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "es", @@ -16,6 +16,50 @@ } ], "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], "cvssMetricV31": [ { "source": "cna@vuldb.com", @@ -89,6 +133,10 @@ "source": "cna@vuldb.com", "type": "Primary", "description": [ + { + "lang": "en", + "value": "CWE-74" + }, { "lang": "en", "value": "CWE-89" @@ -122,6 +170,10 @@ "Third Party Advisory" ] }, + { + "url": "https://phpgurukul.com/", + "source": "cna@vuldb.com" + }, { "url": "https://vuldb.com/?ctiid.260614", "source": "cna@vuldb.com", diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1484.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1484.json new file mode 100644 index 00000000000..6c4fc7a56b1 --- /dev/null +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1484.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-1484", + "sourceIdentifier": "cybersecurity@hitachienergy.com", + "published": "2025-05-30T13:15:20.953", + "lastModified": "2025-05-30T13:15:20.953", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability exists in the media upload component of the Asset \nSuite versions listed below. If successfully exploited an attacker \ncould impact the confidentiality or integrity of the system. An attacker can use this vulnerability to construct a request that will \ncause JavaScript code supplied by the attacker to execute within \nthe user\u2019s browser in the context of that user\u2019s session with the \napplication." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cybersecurity@hitachienergy.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cybersecurity@hitachienergy.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "cybersecurity@hitachienergy.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-184" + } + ] + } + ], + "references": [ + { + "url": "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000212&LanguageCode=en&DocumentPartId=&Action=Launch", + "source": "cybersecurity@hitachienergy.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-25xx/CVE-2025-2500.json b/CVE-2025/CVE-2025-25xx/CVE-2025-2500.json new file mode 100644 index 00000000000..8824447d031 --- /dev/null +++ b/CVE-2025/CVE-2025-25xx/CVE-2025-2500.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-2500", + "sourceIdentifier": "cybersecurity@hitachienergy.com", + "published": "2025-05-30T13:15:22.100", + "lastModified": "2025-05-30T13:15:22.100", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability exists in the SOAP Web services of the Asset \nSuite versions listed below. If successfully exploited, an attacker \ncould gain unauthorized access to the product and the time window of a possible password attack could be expanded." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cybersecurity@hitachienergy.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cybersecurity@hitachienergy.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "cybersecurity@hitachienergy.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-256" + } + ] + } + ], + "references": [ + { + "url": "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000212&LanguageCode=en&DocumentPartId=&Action=Launch", + "source": "cybersecurity@hitachienergy.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-409xx/CVE-2025-40909.json b/CVE-2025/CVE-2025-409xx/CVE-2025-40909.json new file mode 100644 index 00000000000..0f58e448d9e --- /dev/null +++ b/CVE-2025/CVE-2025-409xx/CVE-2025-40909.json @@ -0,0 +1,61 @@ +{ + "id": "CVE-2025-40909", + "sourceIdentifier": "9b29abf9-4ab0-4765-b253-1875cd9b441e", + "published": "2025-05-30T13:15:22.350", + "lastModified": "2025-05-30T13:15:22.350", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Perl threads have a working directory race condition where file operations may target unintended paths.\n\nIf a directory handle is open at thread creation, the process-wide current working directory is temporarily changed in order to clone\u00a0that handle for the new thread, which is visible from any third (or\u00a0more) thread already running. \n\nThis may lead to unintended operations\u00a0such as loading code or accessing files from unexpected locations,\u00a0which a local attacker may be able to exploit.\n\nThe bug was introduced in commit\u00a011a11ecf4bea72b17d250cfb43c897be1341861e and released in Perl version 5.13.6" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + }, + { + "lang": "en", + "value": "CWE-426" + } + ] + } + ], + "references": [ + { + "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226", + "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e" + }, + { + "url": "https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e", + "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e" + }, + { + "url": "https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch", + "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e" + }, + { + "url": "https://github.com/Perl/perl5/issues/10387", + "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e" + }, + { + "url": "https://github.com/Perl/perl5/issues/23010", + "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e" + }, + { + "url": "https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads", + "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e" + }, + { + "url": "https://www.openwall.com/lists/oss-security/2025/05/22/2", + "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-412xx/CVE-2025-41235.json b/CVE-2025/CVE-2025-412xx/CVE-2025-41235.json index 34273a57772..c9ff388e3fa 100644 --- a/CVE-2025/CVE-2025-412xx/CVE-2025-41235.json +++ b/CVE-2025/CVE-2025-412xx/CVE-2025-41235.json @@ -2,13 +2,17 @@ "id": "CVE-2025-41235", "sourceIdentifier": "security@vmware.com", "published": "2025-05-30T06:15:26.590", - "lastModified": "2025-05-30T06:15:26.590", + "lastModified": "2025-05-30T13:15:22.500", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Spring Cloud Gateway Server forwards the X-Forwarded-For\u00a0and Forwarded\u00a0headers from untrusted proxies." + }, + { + "lang": "es", + "value": "Spring Cloud Gateway Server reenv\u00eda los encabezados X-Forwarded-For y Forwarded desde servidores proxy que no son de confianza." } ], "metrics": { @@ -35,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-444" + } + ] + } + ], "references": [ { "url": "https://spring.io/security/cve-2025-41235", diff --git a/CVE-2025/CVE-2025-44xx/CVE-2025-4433.json b/CVE-2025/CVE-2025-44xx/CVE-2025-4433.json new file mode 100644 index 00000000000..2648ea07256 --- /dev/null +++ b/CVE-2025/CVE-2025-44xx/CVE-2025-4433.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-4433", + "sourceIdentifier": "security@devolutions.net", + "published": "2025-05-30T13:15:24.020", + "lastModified": "2025-05-30T13:15:24.020", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper access control in user group management in Devolutions Server 2025.1.7.0 and earlier allows a non-administrative user with both \"User Management\" and \"User Group Management\" permissions to perform privilege escalation by adding users to groups with administrative privileges." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@devolutions.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://devolutions.net/security/advisories/DEVO-2025-0010/", + "source": "security@devolutions.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-45xx/CVE-2025-4597.json b/CVE-2025/CVE-2025-45xx/CVE-2025-4597.json new file mode 100644 index 00000000000..2c58c1b47d7 --- /dev/null +++ b/CVE-2025/CVE-2025-45xx/CVE-2025-4597.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-4597", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-05-30T12:15:20.780", + "lastModified": "2025-05-30T12:15:20.780", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Woo Slider Pro \u2013 Drag Drop Slider Builder For WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the woo_slide_pro_delete_draft_preview AJAX action in all versions up to, and including, 1.12. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary posts." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/woo-slider-pro-drag-drop-slider-builder-for-woocommerce/trunk/inc/actions.php#L111", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1eaee0f6-968c-4004-83e7-f79baf3ff88d?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-484xx/CVE-2025-48492.json b/CVE-2025/CVE-2025-484xx/CVE-2025-48492.json index 01e2ba06843..f179a14f723 100644 --- a/CVE-2025/CVE-2025-484xx/CVE-2025-48492.json +++ b/CVE-2025/CVE-2025-484xx/CVE-2025-48492.json @@ -2,13 +2,17 @@ "id": "CVE-2025-48492", "sourceIdentifier": "security-advisories@github.com", "published": "2025-05-30T07:15:23.780", - "lastModified": "2025-05-30T07:15:23.780", + "lastModified": "2025-05-30T13:15:23.490", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "GetSimple CMS is a content management system. In versions starting from 3.3.16 to 3.3.21, an authenticated user with access to the Edit component can inject arbitrary PHP into a component file and execute it via a crafted query string, resulting in Remote Code Execution (RCE). This issue is set to be patched in version 3.3.22." + }, + { + "lang": "es", + "value": "GetSimple CMS es un sistema de gesti\u00f3n de contenido. En las versiones 3.3.16 a 3.3.21, un usuario autenticado con acceso al componente Editar puede inyectar PHP arbitrario en un archivo de componente y ejecutarlo mediante una cadena de consulta manipulada, lo que resulta en una ejecuci\u00f3n remota de c\u00f3digo (RCE). Este problema se solucionar\u00e1 en la versi\u00f3n 3.3.22." } ], "metrics": { @@ -60,7 +64,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -73,6 +77,10 @@ { "url": "https://github.com/GetSimpleCMS-CE/GetSimpleCMS-CE/security/advisories/GHSA-g435-p72m-p582", "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/GetSimpleCMS-CE/GetSimpleCMS-CE/security/advisories/GHSA-g435-p72m-p582", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-488xx/CVE-2025-48865.json b/CVE-2025/CVE-2025-488xx/CVE-2025-48865.json index 3cc8bfb68b4..67e905e66b5 100644 --- a/CVE-2025/CVE-2025-488xx/CVE-2025-48865.json +++ b/CVE-2025/CVE-2025-488xx/CVE-2025-48865.json @@ -2,13 +2,17 @@ "id": "CVE-2025-48865", "sourceIdentifier": "security-advisories@github.com", "published": "2025-05-30T07:15:23.940", - "lastModified": "2025-05-30T07:15:23.940", + "lastModified": "2025-05-30T13:15:23.690", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Fabio is an HTTP(S) and TCP router for deploying applications managed by consul. Prior to version 1.6.6, Fabio allows clients to remove X-Forwarded headers (except X-Forwarded-For) due to a vulnerability in how it processes hop-by-hop headers. Fabio adds HTTP headers like X-Forwarded-Host and X-Forwarded-Port when routing requests to backend applications. Since the receiving application should trust these headers, allowing HTTP clients to remove or modify them creates potential security vulnerabilities. Some of these custom headers can be removed and, in certain cases, manipulated. The attack relies on the behavior that headers can be defined as hop-by-hop via the HTTP Connection header. This issue has been patched in version 1.6.6." + }, + { + "lang": "es", + "value": "Fabio es un enrutador HTTP(S) y TCP para implementar aplicaciones administradas por consul. Antes de la versi\u00f3n 1.6.6, Fabio permit\u00eda a los clientes eliminar los encabezados X-Forwarded (excepto X-Forwarded-For) debido a una vulnerabilidad en el procesamiento de los encabezados salto a salto. Fabio a\u00f1ade encabezados HTTP como X-Forwarded-Host y X-Forwarded-Port al enrutar solicitudes a aplicaciones backend. Dado que la aplicaci\u00f3n receptora debe confiar en estos encabezados, permitir que los clientes HTTP los eliminen o modifiquen crea posibles vulnerabilidades de seguridad. Algunos de estos encabezados personalizados pueden eliminarse y, en ciertos casos, manipularse. El ataque se basa en que los encabezados pueden definirse como salto a salto mediante el encabezado HTTP Connection. Este problema se ha corregido en la versi\u00f3n 1.6.6." } ], "metrics": { @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -63,6 +67,10 @@ { "url": "https://github.com/fabiolb/fabio/security/advisories/GHSA-q7p4-7xjv-j3wf", "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/fabiolb/fabio/security/advisories/GHSA-q7p4-7xjv-j3wf", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-488xx/CVE-2025-48889.json b/CVE-2025/CVE-2025-488xx/CVE-2025-48889.json index fa37786276e..3071bc7110c 100644 --- a/CVE-2025/CVE-2025-488xx/CVE-2025-48889.json +++ b/CVE-2025/CVE-2025-488xx/CVE-2025-48889.json @@ -2,13 +2,17 @@ "id": "CVE-2025-48889", "sourceIdentifier": "security-advisories@github.com", "published": "2025-05-30T06:15:28.500", - "lastModified": "2025-05-30T06:15:28.500", + "lastModified": "2025-05-30T13:15:23.810", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Gradio is an open-source Python package that allows quick building of demos and web application for machine learning models, API, or any arbitrary Python function. Prior to version 5.31.0, an arbitrary file copy vulnerability in Gradio's flagging feature allows unauthenticated attackers to copy any readable file from the server's filesystem. While attackers can't read these copied files, they can cause DoS by copying large files (like /dev/urandom) to fill disk space. This issue has been patched in version 5.31.0." + }, + { + "lang": "es", + "value": "Gradio es un paquete de Python de c\u00f3digo abierto que permite la creaci\u00f3n r\u00e1pida de demos y aplicaciones web para modelos de aprendizaje autom\u00e1tico, API o cualquier funci\u00f3n arbitraria de Python. Antes de la versi\u00f3n 5.31.0, una vulnerabilidad de copia arbitraria de archivos en la funci\u00f3n de marcado de Gradio permit\u00eda a atacantes no autenticados copiar cualquier archivo legible del sistema de archivos del servidor. Si bien los atacantes no pueden leer estos archivos copiados, pueden causar un ataque de denegaci\u00f3n de servicio (DoS) al copiar archivos grandes (como /dev/urandom) para llenar el espacio del disco. Este problema se ha corregido en la versi\u00f3n 5.31.0." } ], "metrics": { @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,6 +55,10 @@ { "url": "https://github.com/gradio-app/gradio/security/advisories/GHSA-8jw3-6x8j-v96g", "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/gradio-app/gradio/security/advisories/GHSA-8jw3-6x8j-v96g", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-49xx/CVE-2025-4944.json b/CVE-2025/CVE-2025-49xx/CVE-2025-4944.json new file mode 100644 index 00000000000..3ca163bc0c1 --- /dev/null +++ b/CVE-2025/CVE-2025-49xx/CVE-2025-4944.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-4944", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-05-30T12:15:20.943", + "lastModified": "2025-05-30T12:15:20.943", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The LA-Studio Element Kit for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Image Compare and Google Maps widgets in all versions up to, and including, 1.5.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset/3302784/", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/lastudio-element-kit/#developers", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/68ae8404-6dfa-4b13-b2a6-bd4554f1043f?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5190.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5190.json new file mode 100644 index 00000000000..682d4cd4e90 --- /dev/null +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5190.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-5190", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-05-30T12:15:21.103", + "lastModified": "2025-05-30T12:15:21.103", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Browse As plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 0.2. This is due to incorrect authentication checking in the 'IS_BA_Browse_As::notice' function with the 'is_ba_original_user_COOKIEHASH' cookie value. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to log in as any existing user on the site, such as an administrator, if they have access to the user id." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-288" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/browse-as/tags/0.2/browse-as.php#L115", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/browse-as/tags/0.2/browse-as.php#L92", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8f5722b0-0d54-4c44-b168-a886da1077cb?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5325.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5325.json index fe8a30a425c..8d31ba06215 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5325.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5325.json @@ -2,7 +2,7 @@ "id": "CVE-2025-5325", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-29T20:15:27.853", - "lastModified": "2025-05-29T20:15:27.853", + "lastModified": "2025-05-30T13:15:24.593", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -132,6 +132,10 @@ { "url": "https://vuldb.com/?submit.581275", "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.581275", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5328.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5328.json index 2b74b8d47e9..2adcb67eb0a 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5328.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5328.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5328", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-29T21:15:26.753", - "lastModified": "2025-05-29T21:15:26.753", + "lastModified": "2025-05-30T13:15:24.733", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in chshcms mccms 2.7. It has been declared as critical. This vulnerability affects the function restore_del of the file /sys/apps/controllers/admin/Backups.php. The manipulation of the argument dirs leads to path traversal. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en chshcms mccms 2.7. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n restore_del del archivo /sys/apps/controllers/admin/Backups.php. La manipulaci\u00f3n del argumento dirs provoca un path traversal. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -132,6 +136,10 @@ { "url": "https://vuldb.com/?submit.582297", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/caigo8/CVE-md/blob/main/Mccms_V2.7/%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E5%88%A0%E9%99%A4.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5330.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5330.json index f0931f79b0d..c66120e7d8d 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5330.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5330.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5330", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-29T22:15:22.747", - "lastModified": "2025-05-29T22:15:22.747", + "lastModified": "2025-05-30T13:15:24.900", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in FreeFloat FTP Server 1.0. This affects an unknown part of the component RETR Command Handler. The manipulation leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en FreeFloat FTP Server 1.0. Esta afecta a una parte desconocida del componente RETR Command Handler. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +140,10 @@ { "url": "https://vuldb.com/?submit.585402", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/r3ng4f/FreeFloat_1/blob/main/01-exploit.txt", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5332.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5332.json index dde133af6d7..dbe15f0f4d0 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5332.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5332.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5332", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-29T23:15:26.680", - "lastModified": "2025-05-29T23:15:26.680", + "lastModified": "2025-05-30T13:15:25.050", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in 1000 Projects Online Notice Board 1.0 and classified as critical. This issue affects some unknown processing of the file /index.php. The manipulation of the argument email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en 1000 Projects Online Notice Board 1.0, clasificada como cr\u00edtica. Este problema afecta a un procesamiento desconocido del archivo /index.php. La manipulaci\u00f3n del argumento \"email\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.586566", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/ubfbuz3/cve/issues/16", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/README.md b/README.md index 247f65eb813..6d01310552d 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-05-30T12:00:21.767270+00:00 +2025-05-30T14:00:19.634062+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-05-30T11:15:20.213000+00:00 +2025-05-30T13:15:25.050000+00:00 ``` ### Last Data Feed Release @@ -33,24 +33,36 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -296024 +296031 ``` ### CVEs added in the last Commit -Recently added CVEs: `3` +Recently added CVEs: `7` -- [CVE-2025-1763](CVE-2025/CVE-2025-17xx/CVE-2025-1763.json) (`2025-05-30T11:15:20.213`) -- [CVE-2025-5142](CVE-2025/CVE-2025-51xx/CVE-2025-5142.json) (`2025-05-30T10:15:25.640`) -- [CVE-2025-5235](CVE-2025/CVE-2025-52xx/CVE-2025-5235.json) (`2025-05-30T10:15:26.040`) +- [CVE-2025-1484](CVE-2025/CVE-2025-14xx/CVE-2025-1484.json) (`2025-05-30T13:15:20.953`) +- [CVE-2025-2500](CVE-2025/CVE-2025-25xx/CVE-2025-2500.json) (`2025-05-30T13:15:22.100`) +- [CVE-2025-40909](CVE-2025/CVE-2025-409xx/CVE-2025-40909.json) (`2025-05-30T13:15:22.350`) +- [CVE-2025-4433](CVE-2025/CVE-2025-44xx/CVE-2025-4433.json) (`2025-05-30T13:15:24.020`) +- [CVE-2025-4597](CVE-2025/CVE-2025-45xx/CVE-2025-4597.json) (`2025-05-30T12:15:20.780`) +- [CVE-2025-4944](CVE-2025/CVE-2025-49xx/CVE-2025-4944.json) (`2025-05-30T12:15:20.943`) +- [CVE-2025-5190](CVE-2025/CVE-2025-51xx/CVE-2025-5190.json) (`2025-05-30T12:15:21.103`) ### CVEs modified in the last Commit -Recently modified CVEs: `2` +Recently modified CVEs: `10` -- [CVE-2025-4226](CVE-2025/CVE-2025-42xx/CVE-2025-4226.json) (`2025-05-30T10:15:23.343`) -- [CVE-2025-4696](CVE-2025/CVE-2025-46xx/CVE-2025-4696.json) (`2025-05-30T10:15:25.403`) +- [CVE-2024-12224](CVE-2024/CVE-2024-122xx/CVE-2024-12224.json) (`2025-05-30T13:15:20.247`) +- [CVE-2024-3767](CVE-2024/CVE-2024-37xx/CVE-2024-3767.json) (`2025-05-30T12:15:19.907`) +- [CVE-2025-41235](CVE-2025/CVE-2025-412xx/CVE-2025-41235.json) (`2025-05-30T13:15:22.500`) +- [CVE-2025-48492](CVE-2025/CVE-2025-484xx/CVE-2025-48492.json) (`2025-05-30T13:15:23.490`) +- [CVE-2025-48865](CVE-2025/CVE-2025-488xx/CVE-2025-48865.json) (`2025-05-30T13:15:23.690`) +- [CVE-2025-48889](CVE-2025/CVE-2025-488xx/CVE-2025-48889.json) (`2025-05-30T13:15:23.810`) +- [CVE-2025-5325](CVE-2025/CVE-2025-53xx/CVE-2025-5325.json) (`2025-05-30T13:15:24.593`) +- [CVE-2025-5328](CVE-2025/CVE-2025-53xx/CVE-2025-5328.json) (`2025-05-30T13:15:24.733`) +- [CVE-2025-5330](CVE-2025/CVE-2025-53xx/CVE-2025-5330.json) (`2025-05-30T13:15:24.900`) +- [CVE-2025-5332](CVE-2025/CVE-2025-53xx/CVE-2025-5332.json) (`2025-05-30T13:15:25.050`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 0ba57371bca..41f2f8bcd6f 100644 --- a/_state.csv +++ b/_state.csv @@ -247338,7 +247338,7 @@ CVE-2024-1222,0,0,9f12836c0f02ca1d924e4fb3ebe7d868c8c39d989928ab7ecc2c4c71ac16f7 CVE-2024-12220,0,0,5a9af5863bd9968393d1012c1c5f5fb4875db98205155149f405e76579a2b19e,2024-12-17T08:15:05.393000 CVE-2024-12221,0,0,a87846a9ea687f0610603fb61d7ca73e4beeed151fc32a3afc0c338aec17e851,2025-01-04T10:15:06.410000 CVE-2024-12222,0,0,cf65a2967224f753870ef46b5e08d14581e6de5063f9b31016c226df28360d7d,2025-01-09T11:15:12.490000 -CVE-2024-12224,0,0,d85deac0d1750d8f8621b6fe40c3c7da762bdf7bdc73e4fa0e9ae35e1e30ba49,2025-05-30T02:15:19.670000 +CVE-2024-12224,0,1,8bdfb82195e6558c9fc68f526ef0f2f21d2654951f5b8b86677f03596720c3e8,2025-05-30T13:15:20.247000 CVE-2024-12225,0,0,8287d8ab23f982048d9c4e71ccf9a1482d0d499fcefb0f1bf17eedc2ef7d0fe3,2025-05-07T14:13:20.483000 CVE-2024-12226,0,0,21bb283eb49b4f7bfaba4358070671ebb37dd2e9917de9da1738797e9c2071f5,2025-01-16T07:15:26.333000 CVE-2024-12227,0,0,db615a59b09c6a85883a77293d863c5519e310b0cb63e5c28ea07e1cfd25fc08,2024-12-05T14:15:19.400000 @@ -263546,7 +263546,7 @@ CVE-2024-37662,0,0,88a4c2147c30ea5a0fae26e20d528c30a4f04b1f060a201d4e0094a477f8a CVE-2024-37663,0,0,fed344a0d61f1e567327514f6a8e91ad3162275e1c47738bf38d3802a419ffbb,2024-11-22T16:15:24.273000 CVE-2024-37664,0,0,ec10d2a017c572696a305d5984bbbc6e09db1615173526af4be64eee6d7ed665,2024-11-22T16:15:24.463000 CVE-2024-37665,0,0,1eb587434ded45d2e868af7abc77840ba8d1cc348193e8d80a8fd746774e5a12,2024-11-21T09:24:12.510000 -CVE-2024-3767,0,0,b041b2442c46aa71ae40af15cf3d134883b3c479558ab7978d2707e95f873508,2025-04-08T16:30:20.067000 +CVE-2024-3767,0,1,b4ea3f0e16993e9f310cfbde1e62879723209ff6ca6fab1f3423f8b6c9db7f57,2025-05-30T12:15:19.907000 CVE-2024-37671,0,0,63a7bb054b9783dd1c7933bd57d4a8f7e2cfd8dd008993792ee8177e6854a803,2025-03-14T16:15:32.600000 CVE-2024-37672,0,0,e44dfa3a5448c7ddc8be3e7358264cb6292a7fdffc27b2a73e33c9a81cd357fa,2024-11-21T09:24:12.893000 CVE-2024-37673,0,0,4948f447146a2f01fa61fd5402a993016f9583881e815929a457af264ecd9e35,2024-11-21T09:24:13.130000 @@ -283456,6 +283456,7 @@ CVE-2025-1474,0,0,16ca85451a6c572acfb94ec027bf63fd66ee45faa5ceb1d08c8cd3a16e15e4 CVE-2025-1475,0,0,dc71c83df2dea22fb2355bdce40ab12e4f98ce7aad24f8511146bb81157cc42d,2025-03-07T07:15:23.343000 CVE-2025-1481,0,0,d10660ccfc75afffd9cc52715a6e9675c63c4f59ae92c95b59ff9bb03291f5a4,2025-03-12T16:40:25.783000 CVE-2025-1483,0,0,eed3d83cb2da5908d92aa9dd620a120571071c04f49e7599dc48ec4179593bf0,2025-02-25T18:59:39.860000 +CVE-2025-1484,1,1,2b29e0858b8b3d6bfca31d241334feba2634dd51ce60ca17159c5a17dba4f10f,2025-05-30T13:15:20.953000 CVE-2025-1486,0,0,d9927d7d4d1384639bc8151ec9cdf5ac42c5c5ba19dec6e228e44ddcc54c667c,2025-04-09T13:10:08.783000 CVE-2025-1487,0,0,08095a6c47277e146f974b72230847c7e22adc360332813ad879609a240493bd,2025-04-09T13:07:45.937000 CVE-2025-1488,0,0,41db8f13bdc7bcc4795270a365123a77f5c2866e92341d8e17a3cfe430cb556b,2025-03-27T00:25:37.117000 @@ -283669,7 +283670,7 @@ CVE-2025-1756,0,0,469a2e36bf9b0a53fa5f2a58ce7fdccfdf577f34edea6c0bcffa665f76adda CVE-2025-1757,0,0,c25e39602a825b6394df945ad4b24df4019eaaa8085cc7f11e82831fb6895cb4,2025-03-10T16:48:47.823000 CVE-2025-1758,0,0,0373ea84effa2e885cc20b107f682d5ddfeea043aa22d13e9c170486f7fa1885,2025-03-19T16:15:30.527000 CVE-2025-1762,0,0,5eb4f8eb32ff7e9dd5693d53ebf6ac723f3ad2b6278e75ae2680335a0f36992e,2025-04-17T13:48:32.093000 -CVE-2025-1763,1,1,595dcc8620699e23d0ba33b11e68ba81ab6074dbb192303de5157ecc7adc08b2,2025-05-30T11:15:20.213000 +CVE-2025-1763,0,0,595dcc8620699e23d0ba33b11e68ba81ab6074dbb192303de5157ecc7adc08b2,2025-05-30T11:15:20.213000 CVE-2025-1764,0,0,13706f4025eae225fc3793a7e7a1fa321df281c8253d66f7993d98f6aa09100c,2025-03-14T06:15:24.860000 CVE-2025-1766,0,0,598707d3f8b19c5a3ff0b336e9bc39a76f8ffb8a9d939d0b001d5b5f979e7c65,2025-03-20T06:15:22.740000 CVE-2025-1767,0,0,db4a25182003b3801d09638d93655c86fe8651aa60672fd3a6309c07b55e200e,2025-03-13T21:15:43.127000 @@ -287746,6 +287747,7 @@ CVE-2025-24995,0,0,5941a6bfacbb23c8364db7fae58b60ff3ceb520bc5c6aa455cb355669359e CVE-2025-24996,0,0,76d859fdbeca0832f33504130bbb93876c7c278e86d0f29396967ce06056d54e,2025-03-11T17:16:36.803000 CVE-2025-24997,0,0,518312c5725fe48f17f67f709c2db44e4ef3aec37deaac9bec9cd39823dbbe4c,2025-03-11T17:16:37.103000 CVE-2025-24998,0,0,97ff83c7f8c3dc3c86cf3e217ce8a9825fb5a93ab4895982732725d23057fced,2025-03-11T17:16:37.670000 +CVE-2025-2500,1,1,eab27ad66a278be37a05b5c95af58f6a056ebb925347a30ae4310a70747dc4de,2025-05-30T13:15:22.100000 CVE-2025-25000,0,0,d5ec8035d195406518f39319cbcf905fba8c6f7fd5b0c53e90332d3f680df9f2,2025-04-07T14:18:34.453000 CVE-2025-25001,0,0,c45cc763a1547fefda7795f8d11522125ff7003c83cf07f197d3b95e585aaa2a,2025-04-07T14:18:34.453000 CVE-2025-25002,0,0,12f8033c4f78f1fc2a11a22d65139dde5cad0f892f0f27858d617011f4499917,2025-04-09T20:03:01.577000 @@ -293836,6 +293838,7 @@ CVE-2025-4089,0,0,505a4df56497bc3e08f2e58439684c838786761a96bd4da3f2b0e37b4fa97e CVE-2025-4090,0,0,7f9eabb4ad6772523e0c5f0a270166b4617494fcbb3075e75cc2736a0fa15b02,2025-05-09T19:32:34.333000 CVE-2025-40906,0,0,3bcd0a99f567a8c8c8c888444bf8652ce672ff26763dd9562ab4be9a1279c017,2025-05-19T13:35:50.497000 CVE-2025-40907,0,0,02479ee238b9c2c4380d00bd9d3c9ee05adf00f8c7961fd6f9263c931d94c687,2025-05-16T16:15:41.590000 +CVE-2025-40909,1,1,8296d246708675ad5c788d166436c290fb0278d24b1f1ba1a5149d39ffef885b,2025-05-30T13:15:22.350000 CVE-2025-4091,0,0,798a4cccfe2006913bea941ae05240fec836c7335fe01bd824f887f2a82ba4a5,2025-05-09T19:32:09.470000 CVE-2025-40911,0,0,fcf4deedf6cc79e67d521479df45c4b1f5ac81bf8605fcf0e3b318f0c121b089,2025-05-28T15:01:30.720000 CVE-2025-4092,0,0,5c481b9edaa4dc01b6e2af0355fb37068b547aa3807c69c17d8381f725e9d766,2025-05-09T19:32:00.773000 @@ -293874,7 +293877,7 @@ CVE-2025-4123,0,0,b273a1b485cb3feb197a6a9855fd98a99a47d7d21e024b2df7154800bc33c4 CVE-2025-41230,0,0,0c25a26a651e10ec85f6e769a1a9cc82bb8d12716df24840e46d82d1d274c1bc,2025-05-21T20:25:16.407000 CVE-2025-41231,0,0,8c3a17f494797b4f963586973b84b10178b0b5b2e009d83f934a59601a4b3cac,2025-05-21T20:25:16.407000 CVE-2025-41232,0,0,517310e679218fd1f22e7e0fd08cf56e44290e9febf8e46b848de21769620f54,2025-05-21T20:24:58.133000 -CVE-2025-41235,0,0,c5a1ef8bea6ed913630a641a2a04bd83b852cc69c611f9e0fdcd23e37c2a854f,2025-05-30T06:15:26.590000 +CVE-2025-41235,0,1,9ec5a55915444f95ec7a4e229b3b1d4907150d53ed6a3b355cde4e0ab4de98da,2025-05-30T13:15:22.500000 CVE-2025-4124,0,0,2116d33601d18584d8ff86788e21befdf79ee067b30d9afca370ae97d0f6cb63,2025-05-16T16:56:49.807000 CVE-2025-4125,0,0,9ce360e53c445df2b459e99f4cc1a32fbf05cb06f761d7887ca2ad1edf5cdba7,2025-05-16T16:56:47.173000 CVE-2025-4126,0,0,c504eb8f9e35e66ea3a2e9e649e0b3ff59910e9bf49695680cf85ff18119f2ac,2025-05-16T14:43:26.160000 @@ -293988,7 +293991,7 @@ CVE-2025-4220,0,0,5c86caee7e1d137cda1341728be0ecf7fbbff93f4260af3080c92a642cb601 CVE-2025-4221,0,0,0fd12a0e5b55ee42c307389a259ec1bd53c25a7a1b0cd952ead8bf19842b795b,2025-05-21T20:24:58.133000 CVE-2025-4222,0,0,0ac402cc845bab4a30e9252ea588813619c6f19618452a717b52c67067208bc3,2025-05-13T18:15:41.657000 CVE-2025-4223,0,0,956f48551f11f91b052ecedb14a153aceab464c078b4bc0b79be148ceb74f438,2025-05-28T14:58:52.920000 -CVE-2025-4226,0,1,553848fc8965850ce01d7354687a65a57c667ad58d4e47460cbb85b0387517fd,2025-05-30T10:15:23.343000 +CVE-2025-4226,0,0,553848fc8965850ce01d7354687a65a57c667ad58d4e47460cbb85b0387517fd,2025-05-30T10:15:23.343000 CVE-2025-4236,0,0,4a998b3d009e2e5b8d6c745dec0a05483fadfb16e9111b778387c6694f340a68,2025-05-16T15:04:03.170000 CVE-2025-4237,0,0,6e9102316b2d9622f5dbc1640c375fa9a5bfea77a1257bb79b559d426c098991,2025-05-16T15:03:54.820000 CVE-2025-4238,0,0,4c32d3f4362fe39e2d2da40a1702743e497b428c81eff7b7cd5a815f44e86b4b,2025-05-16T17:31:59.303000 @@ -294288,6 +294291,7 @@ CVE-2025-4429,0,0,b71bde334a7b1037c745f2a8102b67a9fcc28421e04a6692603b0f31a28f82 CVE-2025-4430,0,0,9407bbff74dafc85b3536cdd9f5ebdd9f076e8c0d07f50c61a7b35510b1eb336,2025-05-16T14:43:56.797000 CVE-2025-4431,0,0,c35bd3952d535d5df6ec4920cadc64cef1bae4731443b7b63f5df59e7da1c234,2025-05-30T08:15:19.383000 CVE-2025-4432,0,0,813cec0cb180e837181e2d39de9b9b934de385ad08a799d2cf0711f93bd8b820,2025-05-12T17:32:32.760000 +CVE-2025-4433,1,1,295e5a60c5f6a33a416a9156b69af73683a76af1448a5e677a1c0f8872f416c6,2025-05-30T13:15:24.020000 CVE-2025-4434,0,0,67580eaaa0159e758312bfd49938e21c5f74ef029d7825e2181725d8c67814d8,2025-05-12T17:32:52.810000 CVE-2025-4436,0,0,85a8f0318ccedc4ef4ef6314b458049fc833acf857a8e235d2ecff13798cf4d4,2025-05-20T23:15:19.440000 CVE-2025-4440,0,0,2664c1cf05645457f92ebc54a1f1ba520a15af0474bcfaabcae2efe1f592618e,2025-05-12T17:32:52.810000 @@ -294562,6 +294566,7 @@ CVE-2025-45947,0,0,359c9dbf14e503988017d67aa788a499a7ac3bca9ffc4dc379e7011548317 CVE-2025-45949,0,0,2cec517c1301a76b89b8ccefb135dc95210f8464628904a6679478252432eda9,2025-04-30T18:03:41.357000 CVE-2025-45953,0,0,4ae22ace1fa79622bebb714ee3a1b2bc44139600b15fc188f0269a639daf29ec,2025-04-30T18:03:25.497000 CVE-2025-45956,0,0,5c4c4370cebea5362e52ff80785ad75271a9ace1cfcc698a1fc7b6e2a3193f1f,2025-05-14T21:01:22.690000 +CVE-2025-4597,1,1,8a3a8621a1b821fdc6c6557764aa5de061f796f2c7e0ceb892a61a8a2720d2d2,2025-05-30T12:15:20.780000 CVE-2025-45997,0,0,81c5d5b71a994d3837a58abb0eadde2f9d1059930b033542f6b76f8f10cc58c4,2025-05-28T15:15:24.900000 CVE-2025-4600,0,0,026383a000ee9b132f9dd97af63a0401be9be3b21241dcdc822424d27f013326,2025-05-16T14:42:18.700000 CVE-2025-4602,0,0,409776dd4d3f5aa956641458acdab541ced8aee4cc4b0cac3a447338c59994d1,2025-05-28T14:58:52.920000 @@ -294965,7 +294970,7 @@ CVE-2025-46836,0,0,ec506562f5fa35ee7cd2d6fd4d3525133c720d2c6eb91fe3d2520e1aa911e CVE-2025-4687,0,0,eeab849766ac526bfbd81e4ab3d7d59d86d4fbdae4b5b475f8ed7ab80575da5e,2025-05-29T14:29:50.247000 CVE-2025-4692,0,0,6b3541c77076c4057b96e95cd4d05354ec769644d2ab1b6cb8b6a2615ff8f8d7,2025-05-23T15:54:42.643000 CVE-2025-4695,0,0,0a0f54d4c59f025a44c7f56cf61d2ee6bfa8db27b80bd2484bf98e0dfa12f657,2025-05-30T09:15:25.950000 -CVE-2025-4696,0,1,31071f43e3740535da1c82b61df84e8f69c1ffa5e0f628e3dfad36c4534c8fa8,2025-05-30T10:15:25.403000 +CVE-2025-4696,0,0,31071f43e3740535da1c82b61df84e8f69c1ffa5e0f628e3dfad36c4534c8fa8,2025-05-30T10:15:25.403000 CVE-2025-4697,0,0,bfbb2280e3ce953d874c6922904cbb0aa3f9380019c3332d7eae9696f7039e5d,2025-05-28T14:30:43.507000 CVE-2025-4698,0,0,629d6280fd3d3fe101760664e35242f9f6abe094cabf022cd7d827567767722a,2025-05-28T14:22:16.457000 CVE-2025-4699,0,0,8050368b263de08669c173a654994e653b6b74b6e1b034c43e19a012e2c34d52,2025-05-28T14:29:57.107000 @@ -295656,7 +295661,7 @@ CVE-2025-48489,0,0,6e8044af4c343ea269cab4c7a82bd000f0f272e9f58804d2cc5813954a37e CVE-2025-4849,0,0,79bafc8d78c1efc632ed95ad4a130766ed5d90c45e45605773df0d46773756c4,2025-05-24T00:55:22.313000 CVE-2025-48490,0,0,a97b72bfc87989f4eb2307624eed629b592bff3f7118c8c9353d28acd12966bc,2025-05-30T06:15:28.117000 CVE-2025-48491,0,0,e0e8e9c6da074fdcdb76898941d53f131ab7b6706008d2093580e3aa6472cea3,2025-05-30T04:15:54.470000 -CVE-2025-48492,0,0,68efcbad05e064832b31faa0157c1cf5157bf07a18ec9e17874bc4c1371dcb68,2025-05-30T07:15:23.780000 +CVE-2025-48492,0,1,f9cde2899489f06d8e8d9c6ebf180193c2ee088ad6391c734b3ea18ea4b70c37,2025-05-30T13:15:23.490000 CVE-2025-4850,0,0,f4734de71688bb34b47f04cb41c5af0cc568cf46c9e6cb90745360a2b3c7693b,2025-05-24T00:57:35.620000 CVE-2025-4851,0,0,e5a9ac67f494616a05e2f84fff689d174d4a8c96dcdf95534865dd01a2cf2a1b,2025-05-24T01:03:29.400000 CVE-2025-4852,0,0,8056c97adb54f901af1b48f1e44b7ca1809889745baa2872bb19324ac5d93e7f,2025-05-19T15:15:34.693000 @@ -295731,13 +295736,13 @@ CVE-2025-48847,0,0,b8563d91ba0679f627536816b3f17216a89f937d1a7db8c25b786323bd302 CVE-2025-48848,0,0,38731265ae915b14c5e915b02c11b0e53a54815641117da26fffd1c6f20ec7db,2025-05-28T04:15:50.207000 CVE-2025-4885,0,0,8b1f3d2344963a11ed048c1b11c72d90a832e37d4502c4d02b2f6dc0aedfb978,2025-05-28T11:49:42.250000 CVE-2025-4886,0,0,f0bc96dcd8776bcc92f543590bbb95ec4351295de136202b130c74e915ed1af1,2025-05-19T13:35:20.460000 -CVE-2025-48865,0,0,abadb0aa4ff4f91232925526caec7e38160d36d2ea039d3cf9e67127623c40ea,2025-05-30T07:15:23.940000 +CVE-2025-48865,0,1,e4bdf74e74b8d3c65658e0958686da6f2ca2eddd7d5266104c350e5423396ccd,2025-05-30T13:15:23.690000 CVE-2025-4887,0,0,a7b499ed3cdf6c879f3ec3b69793ad811740da88bfec778065c6ba52abd3d64a,2025-05-19T13:35:20.460000 CVE-2025-48875,0,0,864ab323166825f03eb2906e1a7e5fb001c16d13bfd777e00ffe2ac77df0b70c,2025-05-30T07:15:24.127000 CVE-2025-4888,0,0,6310b8fff197a575079561816e1f76f1ad70f7608de3ca85411d4b87b2143843,2025-05-28T15:27:22.353000 CVE-2025-48880,0,0,c97a2702c6dc8b428197434b898bd55e215ce03dc721ea7c46d8b57c599bcb5b,2025-05-30T07:15:24.270000 CVE-2025-48881,0,0,bacdd758239b066216a54eaa9732e7a4b90153991797115ec7edf5f2d19efa4b,2025-05-30T06:15:28.327000 -CVE-2025-48889,0,0,2f80847bd6e9e0b005b2131c708e40defe5134d0df157520bd70794a41eae342,2025-05-30T06:15:28.500000 +CVE-2025-48889,0,1,155c4579671c2d39b9e5de0cd30bbe8db2e48e085455715e3ab743af6f76ecfc,2025-05-30T13:15:23.810000 CVE-2025-4889,0,0,01c7a8037082d88b5ac656519933c8c5460517579f14e0273e6b2875f7942bab,2025-05-28T15:30:05.053000 CVE-2025-4890,0,0,81e619b8915c0f1194bf5df58e7b0a9363ea517d5998dc711619ba92ff360f3e,2025-05-21T19:37:54.033000 CVE-2025-4891,0,0,ce5eadb58621294f252fd31aa2b4c3c08be14da6ad289e0467dbab1173f36755,2025-05-27T15:29:23.960000 @@ -295800,6 +295805,7 @@ CVE-2025-4939,0,0,5ec31620a920403386badd8ed8c9ad70156a6e4853cf1462dcd01754dc60b7 CVE-2025-4940,0,0,2476264f5ca230e398816216f503ad21bd6ee0718fc81a3cc8e1ef1268a9a775,2025-05-21T20:25:16.407000 CVE-2025-4941,0,0,7ee6643b2dca5855a4c8910cf9fb3433ecd0901f54d071fbb7ffd69250830b9c,2025-05-28T01:31:03.773000 CVE-2025-4943,0,0,1baef78a9b9a6104b8ce769cdd4d8ad679034d25c6c1aa31b00e7f091d70b6ad,2025-05-30T07:15:24.680000 +CVE-2025-4944,1,1,6220031bd21147ee74fed2715f10a9cc5adf408a69ee840522314260c98c9739,2025-05-30T12:15:20.943000 CVE-2025-4945,0,0,7c1921d824c0ffc4efae3fdac0f07df6ef4c8b0fbdbb004d6249658d4756d858,2025-05-21T20:25:16.407000 CVE-2025-4947,0,0,5a2596b46f41daf47fb71d339aa3ece981233d1a2e1afb5f6d90d81a432acb92,2025-05-28T15:01:30.720000 CVE-2025-4948,0,0,e12b96fc15a3337b1a5472be7bd293153c0243a5f5b0eebe50bcd774eeadfb3b,2025-05-28T08:15:23 @@ -295895,7 +295901,7 @@ CVE-2025-5137,0,0,bd7b0939690c00ed16e8b3fb58c2a16dc513e9bfd444f41fa5f480b987908a CVE-2025-5138,0,0,3bae41860cd01f5b3b29a66081652cec538a389d28958af017b419d06b38908c,2025-05-28T14:58:52.920000 CVE-2025-5139,0,0,1f6b6d6f74654497d336b663b2d16a5fe2eea3d0378c7d1c3577dfaa66e63c83,2025-05-28T14:58:52.920000 CVE-2025-5140,0,0,7eb8851e623e7595aeb04f88f3b17c4f06b9055459a202a999065089d465d23f,2025-05-28T14:58:52.920000 -CVE-2025-5142,1,1,23d740890935c6fae4f1240c64eb12b21bf83e2bf9de3f9e1ddcdd90b2f1ab5f,2025-05-30T10:15:25.640000 +CVE-2025-5142,0,0,23d740890935c6fae4f1240c64eb12b21bf83e2bf9de3f9e1ddcdd90b2f1ab5f,2025-05-30T10:15:25.640000 CVE-2025-5145,0,0,79eef495ab65fcf81286a635001443af56e362b501d3db2d9a57e69f802a1c67,2025-05-28T14:58:52.920000 CVE-2025-5146,0,0,30dc5c61e39c6bb48e155d9bcd0fd66e2395886111a482cc56b330fb6c74d9f8,2025-05-29T07:15:25.120000 CVE-2025-5147,0,0,0d68c3226bde9ea189f2d3e4a81d7d02206c36b54e63b2ea80685be3458a5459,2025-05-29T07:15:25.330000 @@ -295938,6 +295944,7 @@ CVE-2025-5183,0,0,e3d383156f88c9f1d209816267701a2f426496078edbd01f5ce89bc8f58632 CVE-2025-5184,0,0,0c5c90bbe042200f257d74fe1737e64bd3ba98af13ab365019a3e855829a750d,2025-05-28T15:01:30.720000 CVE-2025-5185,0,0,38d3e8df6b4bf723f8b7c203881d74ed487013508bbfe062800873a9ef93893c,2025-05-28T15:01:30.720000 CVE-2025-5186,0,0,f1c0dc9e00200ceb159990b282fc6fc2adc0cb5ea875d85c26223f5d5865c3f8,2025-05-28T18:15:33.550000 +CVE-2025-5190,1,1,c9b423b0284172319eb2a7eeca6bcda848348cdac6024c6f5c3cfe6fafeaa633,2025-05-30T12:15:21.103000 CVE-2025-5196,0,0,e0938db7c97745bb3f3070e04c267d2314060f49f00cd38492cd5b468ae94740,2025-05-28T18:15:33.670000 CVE-2025-5198,0,0,81bd13d2a866ca7de4c3f2f26760c3d14afdd9d115b50ea3fd55967b3466e3f8,2025-05-28T15:01:30.720000 CVE-2025-5200,0,0,3e6466a0b85569e65a55e8d6d8153c6a4478bd183cd856d713684b7b6ad321cd,2025-05-28T18:15:33.800000 @@ -295971,7 +295978,7 @@ CVE-2025-5229,0,0,1288da6b330c7645f72b24c3f896b277f2be20982fe0d52f419898332e513b CVE-2025-5230,0,0,2e235dbf1898f28539b100da4a6a6a412aca322bb268e421abadd01be2777514,2025-05-28T15:01:30.720000 CVE-2025-5231,0,0,951eb3def93e595a6ef6cc052784501e9d6d9beba0f97ae7417df8cb11736a4e,2025-05-28T15:01:30.720000 CVE-2025-5232,0,0,94f780db8b43929a33d0ebce8e4a0421854097c69daa52f40cf1b8be5db5d176,2025-05-28T15:01:30.720000 -CVE-2025-5235,1,1,30bafc780e3ee88f9157fa762535f1219d32b79060c583d99f11b1f1354e59a8,2025-05-30T10:15:26.040000 +CVE-2025-5235,0,0,30bafc780e3ee88f9157fa762535f1219d32b79060c583d99f11b1f1354e59a8,2025-05-30T10:15:26.040000 CVE-2025-5236,0,0,211f582b986847083f09babaddb7a97b32d8facf19115f352519c743dec294d5,2025-05-30T08:15:19.710000 CVE-2025-5244,0,0,f16a7ad73436a8b188ea427e076cb6d66c3866f0d06770cfebf2ea7a2f86cb34,2025-05-28T15:01:30.720000 CVE-2025-5245,0,0,76dfb770c29fdb4cddbdbfbfa1fee59cf2a7272fa687dfaa6e702792fcfc63df,2025-05-28T15:01:30.720000 @@ -296015,11 +296022,11 @@ CVE-2025-5320,0,0,ee7fb1d3594ecc8f3338b2dd50ece8d49038b6e1f5c612f8b9b85e6cb42731 CVE-2025-5321,0,0,9e05504faedb37c714ab4871e8172010ba09093d29addefd8c36eb2b529b87b8,2025-05-29T15:15:34.417000 CVE-2025-5323,0,0,9b08749dda231819786a6e39ec4a13f6c10a57c5cda3006ba1145aa9e5b25ceb,2025-05-29T19:15:28.747000 CVE-2025-5324,0,0,243e199b709d1a88c2927e7d3cc100eeedc5d81b767b2c455aa9036befc486d7,2025-05-29T19:15:28.917000 -CVE-2025-5325,0,0,f2bbb135eb03160cd04cc13499ec1ebcc468b5fd4391a177389d05af8054ffce,2025-05-29T20:15:27.853000 +CVE-2025-5325,0,1,3545ea56dcd5bba02332f3fad85a34d08d7a82a274b4f538de832af222d55e85,2025-05-30T13:15:24.593000 CVE-2025-5326,0,0,18d1ce1d3cf923fc33534d3fd8af918332b48e3686c44d91aa9769a69fa6f042,2025-05-29T20:15:28.060000 CVE-2025-5327,0,0,46778b15f6fc806947fc15464ebf143bc8624f1c653c4555efb608d2639c199a,2025-05-29T21:15:26.557000 -CVE-2025-5328,0,0,3d0e42808751ba882f514e26698498b2d82af1dbda053903bf2af4aaacb467a7,2025-05-29T21:15:26.753000 -CVE-2025-5330,0,0,becb998fdc3396cd909582453b31b6b2f07f50b02a96a8faa3959f57bbfe652c,2025-05-29T22:15:22.747000 +CVE-2025-5328,0,1,23e3436c2d76f02288bac37c7913c8e764a41d91376db940e710406b7c137fe2,2025-05-30T13:15:24.733000 +CVE-2025-5330,0,1,5622492c3a73bb129d90205feb9ed59fe2d5b16a73fabe6f19e88b7564dd17d2,2025-05-30T13:15:24.900000 CVE-2025-5331,0,0,8489ebedf654d7fdbbe01200bd73205f7f8e393dfe71484c796f5d6a245d6410,2025-05-29T22:15:22.940000 -CVE-2025-5332,0,0,f8977548ddceb1502298b1f57d7b9ebd54d12d2f2bf0335af0b34b1c8e258d65,2025-05-29T23:15:26.680000 +CVE-2025-5332,0,1,56ce9977d1def5baa14778f55cf4e87f3da6f315b92d36a53475aea8364e60f4,2025-05-30T13:15:25.050000 CVE-2025-5334,0,0,4e60e1ab1eeaa1fd20fc8046892744b98efa9ae8fb9f515a84323e31a31d20e3,2025-05-29T15:15:34.650000