diff --git a/CVE-2022/CVE-2022-46xx/CVE-2022-4653.json b/CVE-2022/CVE-2022-46xx/CVE-2022-4653.json index 1c747c37b07..4fbf0c86548 100644 --- a/CVE-2022/CVE-2022-46xx/CVE-2022-4653.json +++ b/CVE-2022/CVE-2022-46xx/CVE-2022-4653.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4653", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-16T16:15:13.640", - "lastModified": "2025-04-08T20:15:19.183", + "lastModified": "2025-06-10T11:44:28.910", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -68,9 +68,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:greenshiftwp:greenshift_-_animation_and_page_builder_blocks:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:wpsoul:greenshift:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "4.8.9", - "matchCriteriaId": "1E26D90F-41B7-4C4B-B040-2764BE0CB59F" + "matchCriteriaId": "52F771CE-5D47-4208-B03A-9B080043F5E4" } ] } diff --git a/CVE-2023/CVE-2023-03xx/CVE-2023-0378.json b/CVE-2023/CVE-2023-03xx/CVE-2023-0378.json index b437203ad62..4438c3ef858 100644 --- a/CVE-2023/CVE-2023-03xx/CVE-2023-0378.json +++ b/CVE-2023/CVE-2023-03xx/CVE-2023-0378.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0378", "sourceIdentifier": "contact@wpscan.com", "published": "2023-02-21T09:15:12.600", - "lastModified": "2025-03-12T21:15:40.490", + "lastModified": "2025-06-10T11:44:28.910", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -64,9 +64,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:greenshiftwp:greenshift_-_animation_and_page_builder_blocks:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:wpsoul:greenshift:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "5.0", - "matchCriteriaId": "7EF0CD45-1585-40D2-B584-E64F44113531" + "matchCriteriaId": "E73DB4A1-0777-43D4-B48E-F3B0780EFD2F" } ] } diff --git a/CVE-2023/CVE-2023-227xx/CVE-2023-22707.json b/CVE-2023/CVE-2023-227xx/CVE-2023-22707.json index 222bf4e1320..08ebee2ddc6 100644 --- a/CVE-2023/CVE-2023-227xx/CVE-2023-22707.json +++ b/CVE-2023/CVE-2023-227xx/CVE-2023-22707.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22707", "sourceIdentifier": "audit@patchstack.com", "published": "2023-03-27T15:15:08.560", - "lastModified": "2024-11-21T07:45:15.753", + "lastModified": "2025-06-10T11:44:28.910", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -76,9 +76,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:greenshiftwp:greenshift_-_animation_and_page_builder_blocks:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:wpsoul:greenshift:*:*:*:*:*:wordpress:*:*", "versionEndIncluding": "4.9.9", - "matchCriteriaId": "C92FBA4E-0733-485E-9542-0514D40D1961" + "matchCriteriaId": "35EF8152-7FD9-4200-9BBF-591B75C9BB7A" } ] } diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3345.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3345.json index e84bde19e3c..c17f2fd17ba 100644 --- a/CVE-2023/CVE-2023-33xx/CVE-2023-3345.json +++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3345.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3345", "sourceIdentifier": "contact@wpscan.com", "published": "2023-07-31T10:15:10.653", - "lastModified": "2024-11-21T08:17:03.907", + "lastModified": "2025-06-10T11:56:01.460", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -44,9 +44,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:masteriyo:masteriyo:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:themegrill:masteriyo:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "1.6.8", - "matchCriteriaId": "68D5B983-C89A-4BE7-884D-3DB7D09BB2F1" + "matchCriteriaId": "AC1A51BC-7B44-4FEA-AD0C-18BEB00E864C" } ] } diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6636.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6636.json index 03f8011eda9..fdee1ebc796 100644 --- a/CVE-2023/CVE-2023-66xx/CVE-2023-6636.json +++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6636.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6636", "sourceIdentifier": "security@wordfence.com", "published": "2024-01-11T09:15:50.593", - "lastModified": "2024-11-21T08:44:15.893", + "lastModified": "2025-06-10T11:44:28.910", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -80,9 +80,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:greenshiftwp:greenshift_-_animation_and_page_builder_blocks:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:wpsoul:greenshift:*:*:*:*:*:wordpress:*:*", "versionEndIncluding": "7.6.2", - "matchCriteriaId": "2E956FA1-FD4C-4E46-8811-548D9DB1698D" + "matchCriteriaId": "B43F2C55-B0F3-4DBE-A1EC-C0DAA2559BEC" } ] } diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12397.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12397.json index 47397ab6989..447f3d300cd 100644 --- a/CVE-2024/CVE-2024-123xx/CVE-2024-12397.json +++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12397.json @@ -2,7 +2,7 @@ "id": "CVE-2024-12397", "sourceIdentifier": "secalert@redhat.com", "published": "2024-12-12T09:15:05.570", - "lastModified": "2025-03-19T21:15:35.480", + "lastModified": "2025-06-10T11:15:21.283", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -57,11 +57,11 @@ "source": "secalert@redhat.com" }, { - "url": "https://access.redhat.com/errata/RHSA-2025:1082", + "url": "https://access.redhat.com/errata/RHSA-2025:3018", "source": "secalert@redhat.com" }, { - "url": "https://access.redhat.com/errata/RHSA-2025:3018", + "url": "https://access.redhat.com/errata/RHSA-2025:8761", "source": "secalert@redhat.com" }, { diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12743.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12743.json index 1005e824b1c..e1cbfc477d1 100644 --- a/CVE-2024/CVE-2024-127xx/CVE-2024-12743.json +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12743.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12743", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:37.003", - "lastModified": "2025-05-20T20:15:32.620", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T11:53:54.447", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:automattic:mailpoet:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "5.5.2", + "matchCriteriaId": "FCB5746F-F16A-4FBA-9625-D409712BF6A2" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/7945f52d-364d-438c-84f2-cf19b4250056/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/7945f52d-364d-438c-84f2-cf19b4250056/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12767.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12767.json index 467b61009d3..679549e6eb6 100644 --- a/CVE-2024/CVE-2024-127xx/CVE-2024-12767.json +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12767.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12767", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:37.193", - "lastModified": "2025-05-16T17:15:49.970", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T11:53:16.670", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:buddyboss:buddyboss_platform:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.7.60", + "matchCriteriaId": "DC721A64-FEA3-46DB-97FC-90E8F42ADA59" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/e8997f90-d8e9-4815-8808-aa0183443dae/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13089.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13089.json new file mode 100644 index 00000000000..080998b8826 --- /dev/null +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13089.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-13089", + "sourceIdentifier": "prodsec@nozominetworks.com", + "published": "2025-06-10T11:15:52.113", + "lastModified": "2025-06-10T11:15:52.113", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An OS command injection vulnerability within the update functionality may allow an authenticated administrator to execute unauthorized arbitrary OS commands.\n\n\n\nUsers with administrative privileges may upload update packages to upgrade the versions of Nozomi Networks Guardian and CMC.\n\nWhile these updates are signed and their signatures are validated prior to installation, an improper signature validation check has been identified.\n\nThis issue could potentially enable users to execute commands remotely on the appliance, thereby impacting confidentiality, integrity, and availability." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "prodsec@nozominetworks.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "prodsec@nozominetworks.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "prodsec@nozominetworks.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://security.nozominetworks.com/NN-2025:1-01", + "source": "prodsec@nozominetworks.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13090.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13090.json new file mode 100644 index 00000000000..1a15c2b1ac3 --- /dev/null +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13090.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-13090", + "sourceIdentifier": "prodsec@nozominetworks.com", + "published": "2025-06-10T11:15:52.477", + "lastModified": "2025-06-10T11:15:52.477", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A privilege escalation vulnerability may enable a service account to elevate its privileges.\n\n\n\nThe sudo rules configured for a local service account were excessively permissive, potentially allowing administrative access if a malicious actor could execute arbitrary commands as that account.\n\nIt is important to note that no such vector has been identified in this instance." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "prodsec@nozominetworks.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "prodsec@nozominetworks.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "prodsec@nozominetworks.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-250" + } + ] + } + ], + "references": [ + { + "url": "https://security.nozominetworks.com/NN-2025:2-01", + "source": "prodsec@nozominetworks.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-139xx/CVE-2024-13916.json b/CVE-2024/CVE-2024-139xx/CVE-2024-13916.json index 19a44132d3c..5ad264a5307 100644 --- a/CVE-2024/CVE-2024-139xx/CVE-2024-13916.json +++ b/CVE-2024/CVE-2024-139xx/CVE-2024-13916.json @@ -2,13 +2,13 @@ "id": "CVE-2024-13916", "sourceIdentifier": "cvd@cert.pl", "published": "2025-05-30T16:15:36.117", - "lastModified": "2025-05-30T16:31:03.107", + "lastModified": "2025-06-10T10:15:21.443", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "An\u00a0application \"com.pri.applock\", which is pre-loaded on\u00a0Kruger&Matz smartphones, allows a user to encrypt any application using user-provided PIN code or by using biometric data.\nExposed \u201dcom.android.providers.settings.fingerprint.PriFpShareProvider\u201c content provider's public method query() allows any other malicious application, without any granted Android system permissions, to exfiltrate the PIN code.\n\nVendor did not provide information about vulnerable versions.\nOnly version (version name: 13, version code: 33) was tested and confirmed to have this vulnerability" + "value": "An\u00a0application \"com.pri.applock\", which is pre-loaded on\u00a0Kruger&Matz smartphones, allows a user to encrypt any application using user-provided PIN code or by using biometric data.\nExposed \u201dcom.android.providers.settings.fingerprint.PriFpShareProvider\u201c content provider's public method query() allows any other malicious application, without any granted Android system permissions, to exfiltrate the PIN code.\n\nOnly version (version name: 13, version code: 33) was tested and confirmed to have this vulnerability. \nApplication update was released in April 2025." }, { "lang": "es", @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "cvd@cert.pl", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-139xx/CVE-2024-13917.json b/CVE-2024/CVE-2024-139xx/CVE-2024-13917.json index 1f940996e00..2fea753682a 100644 --- a/CVE-2024/CVE-2024-139xx/CVE-2024-13917.json +++ b/CVE-2024/CVE-2024-139xx/CVE-2024-13917.json @@ -2,13 +2,13 @@ "id": "CVE-2024-13917", "sourceIdentifier": "cvd@cert.pl", "published": "2025-05-30T16:15:36.263", - "lastModified": "2025-05-30T16:31:03.107", + "lastModified": "2025-06-10T10:15:26.553", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "An\u00a0application \"com.pri.applock\", which is pre-loaded on\u00a0Kruger&Matz smartphones, allows a user to encrypt any application using user-provided PIN code or by using biometric data.\nExposed \u201dcom.pri.applock.LockUI\u201c activity allows any other malicious application, with no granted Android system permissions, to inject an arbitrary intent with system-level privileges to a protected application. One must know the protecting PIN number (it might be revealed by exploiting\u00a0CVE-2024-13916) or ask the user to provide it.\n\nVendor did not provide information about vulnerable versions.\nOnly version (version name: 13, version code: 33) was tested and confirmed to have this vulnerability" + "value": "An\u00a0application \"com.pri.applock\", which is pre-loaded on\u00a0Kruger&Matz smartphones, allows a user to encrypt any application using user-provided PIN code or by using biometric data.\nExposed \u201dcom.pri.applock.LockUI\u201c activity allows any other malicious application, with no granted Android system permissions, to inject an arbitrary intent with system-level privileges to a protected application. One must know the protecting PIN number (it might be revealed by exploiting\u00a0CVE-2024-13916) or ask the user to provide it.\n\nOnly version (version name: 13, version code: 33) was tested and confirmed to have this vulnerability. \nApplication update was released in April 2025." }, { "lang": "es", @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "cvd@cert.pl", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44005.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44005.json index 36a55ad5101..8bfb75573e5 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44005.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44005.json @@ -2,7 +2,7 @@ "id": "CVE-2024-44005", "sourceIdentifier": "audit@patchstack.com", "published": "2024-09-18T00:15:09.887", - "lastModified": "2024-09-25T15:25:30.083", + "lastModified": "2025-06-10T11:44:28.910", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -80,9 +80,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:greenshiftwp:greenshift_-_animation_and_page_builder_blocks:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:wpsoul:greenshift:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "9.4", - "matchCriteriaId": "25384C7C-0D7F-4CF5-8DA2-11EBD17B30BA" + "matchCriteriaId": "850EB61E-4D60-43E0-8533-4B1FE759DA18" } ] } diff --git a/CVE-2025/CVE-2025-27xx/CVE-2025-2703.json b/CVE-2025/CVE-2025-27xx/CVE-2025-2703.json index f9410387928..61de9d4dcce 100644 --- a/CVE-2025/CVE-2025-27xx/CVE-2025-2703.json +++ b/CVE-2025/CVE-2025-27xx/CVE-2025-2703.json @@ -2,7 +2,7 @@ "id": "CVE-2025-2703", "sourceIdentifier": "security@grafana.com", "published": "2025-04-23T12:15:16.103", - "lastModified": "2025-04-23T14:08:13.383", + "lastModified": "2025-06-10T11:15:52.680", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -55,6 +55,10 @@ { "url": "https://grafana.com/security/security-advisories/cve-2025-2703", "source": "security@grafana.com" + }, + { + "url": "https://www.sonarsource.com/blog/data-in-danger-detecting-xss-in-grafana-cve-2025-2703/", + "source": "security@grafana.com" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-406xx/CVE-2025-40654.json b/CVE-2025/CVE-2025-406xx/CVE-2025-40654.json new file mode 100644 index 00000000000..0b9fbb52291 --- /dev/null +++ b/CVE-2025/CVE-2025-406xx/CVE-2025-40654.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-40654", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2025-06-10T10:15:26.990", + "lastModified": "2025-06-10T10:15:26.990", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A SQL injection vulnerability has been found in DM Corporative CMS. This vulnerability allows an attacker to retrieve, create, update and delete databases through the name and cod parameters in /antbuspre.asp." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-dm-corporative-cms-dmacroweb", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-406xx/CVE-2025-40655.json b/CVE-2025/CVE-2025-406xx/CVE-2025-40655.json new file mode 100644 index 00000000000..5203871b42f --- /dev/null +++ b/CVE-2025/CVE-2025-406xx/CVE-2025-40655.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-40655", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2025-06-10T10:15:27.620", + "lastModified": "2025-06-10T10:15:27.620", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A SQL injection vulnerability has been found in DM Corporative CMS. This vulnerability allows an attacker to retrieve, create, update and delete databases through the name parameter in /antcatalogue.asp." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-dm-corporative-cms-dmacroweb", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-406xx/CVE-2025-40656.json b/CVE-2025/CVE-2025-406xx/CVE-2025-40656.json new file mode 100644 index 00000000000..2233a0f72a8 --- /dev/null +++ b/CVE-2025/CVE-2025-406xx/CVE-2025-40656.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-40656", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2025-06-10T10:15:27.843", + "lastModified": "2025-06-10T10:15:27.843", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A SQL injection vulnerability has been found in DM Corporative CMS. This vulnerability allows an attacker to retrieve, create, update and delete databases through the cod parameter in /administer/node-selection/data.asp." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-dm-corporative-cms-dmacroweb", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-406xx/CVE-2025-40657.json b/CVE-2025/CVE-2025-406xx/CVE-2025-40657.json new file mode 100644 index 00000000000..9f245635f5a --- /dev/null +++ b/CVE-2025/CVE-2025-406xx/CVE-2025-40657.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-40657", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2025-06-10T10:15:28.043", + "lastModified": "2025-06-10T10:15:28.043", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A SQL injection vulnerability has been found in DM Corporative CMS. This vulnerability allows an attacker to retrieve, create, update and delete databases through the codform parameter in /modules/forms/collectform.asp." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-dm-corporative-cms-dmacroweb", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-406xx/CVE-2025-40658.json b/CVE-2025/CVE-2025-406xx/CVE-2025-40658.json new file mode 100644 index 00000000000..a3c66e66da9 --- /dev/null +++ b/CVE-2025/CVE-2025-406xx/CVE-2025-40658.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-40658", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2025-06-10T10:15:28.237", + "lastModified": "2025-06-10T10:15:28.237", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Insecure Direct Object Reference (IDOR) vulnerability has been found in DM Corporative CMS. This vulnerability allows an attacker to access the private area setting the\u00a0option parameter equal to 0, 1 or 2 in /administer/selectionnode/framesSelection.asp." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-dm-corporative-cms-dmacroweb", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-406xx/CVE-2025-40659.json b/CVE-2025/CVE-2025-406xx/CVE-2025-40659.json new file mode 100644 index 00000000000..88aea100e76 --- /dev/null +++ b/CVE-2025/CVE-2025-406xx/CVE-2025-40659.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-40659", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2025-06-10T10:15:28.430", + "lastModified": "2025-06-10T10:15:28.430", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Insecure Direct Object Reference (IDOR) vulnerability has been found in DM Corporative CMS. This vulnerability allows an attacker to access the private area setting the\u00a0option parameter equal to 0, 1 or 2 in /administer/selectionnode/framesSelectionNetworks.asp." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-dm-corporative-cms-dmacroweb", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-406xx/CVE-2025-40660.json b/CVE-2025/CVE-2025-406xx/CVE-2025-40660.json new file mode 100644 index 00000000000..fd1e11deb4e --- /dev/null +++ b/CVE-2025/CVE-2025-406xx/CVE-2025-40660.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-40660", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2025-06-10T10:15:28.627", + "lastModified": "2025-06-10T10:15:28.627", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Insecure Direct Object Reference (IDOR) vulnerability has been found in DM Corporative CMS. This vulnerability allows an attacker to access the private area setting the\u00a0option parameter equal to 0, 1 or 2 in /administer/select node/data.asp?mode=catalogue&id1=1&id2=1session=&cod=1&networks=0." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-dm-corporative-cms-dmacroweb", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-406xx/CVE-2025-40661.json b/CVE-2025/CVE-2025-406xx/CVE-2025-40661.json new file mode 100644 index 00000000000..8f3e7e287a9 --- /dev/null +++ b/CVE-2025/CVE-2025-406xx/CVE-2025-40661.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-40661", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2025-06-10T10:15:28.827", + "lastModified": "2025-06-10T10:15:28.827", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Insecure Direct Object Reference (IDOR) vulnerability has been found in DM Corporative CMS. This vulnerability allows an attacker to access the private area setting the\u00a0option parameter equal to 0, 1 or 2 in /administer/selectionnode/selection.asp." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-dm-corporative-cms-dmacroweb", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-406xx/CVE-2025-40662.json b/CVE-2025/CVE-2025-406xx/CVE-2025-40662.json new file mode 100644 index 00000000000..499fae8dba3 --- /dev/null +++ b/CVE-2025/CVE-2025-406xx/CVE-2025-40662.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-40662", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2025-06-10T10:15:29.103", + "lastModified": "2025-06-10T10:15:29.103", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Absolute path disclosure vulnerability in DM Corporative CMS. This vulnerability allows an attacker to view the contents of webroot/file, if navigating to a non-existent file." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-dm-corporative-cms-dmacroweb", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-416xx/CVE-2025-41657.json b/CVE-2025/CVE-2025-416xx/CVE-2025-41657.json new file mode 100644 index 00000000000..59627a2e604 --- /dev/null +++ b/CVE-2025/CVE-2025-416xx/CVE-2025-41657.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-41657", + "sourceIdentifier": "info@cert.vde.com", + "published": "2025-06-10T11:15:53.150", + "lastModified": "2025-06-10T11:15:53.150", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Due to an undocumented active bluetooth stack on products delivered within the period 01.01.2024 to 09.05.2025 fingerprinting is possible by an unauthenticated adjacent attacker." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "info@cert.vde.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "info@cert.vde.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-207" + } + ] + } + ], + "references": [ + { + "url": "https://certvde.com/en/advisories/VDE-2025-047", + "source": "info@cert.vde.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index cdb5374ccf5..30fed368577 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-10T10:00:20.202255+00:00 +2025-06-10T12:00:22.759068+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-06-10T09:15:25.930000+00:00 +2025-06-10T11:56:01.460000+00:00 ``` ### Last Data Feed Release @@ -33,41 +33,43 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -297243 +297255 ``` ### CVEs added in the last Commit -Recently added CVEs: `16` +Recently added CVEs: `12` -- [CVE-2025-27817](CVE-2025/CVE-2025-278xx/CVE-2025-27817.json) (`2025-06-10T08:15:22.367`) -- [CVE-2025-27818](CVE-2025/CVE-2025-278xx/CVE-2025-27818.json) (`2025-06-10T08:15:22.533`) -- [CVE-2025-27819](CVE-2025/CVE-2025-278xx/CVE-2025-27819.json) (`2025-06-10T08:15:22.687`) -- [CVE-2025-3112](CVE-2025/CVE-2025-31xx/CVE-2025-3112.json) (`2025-06-10T09:15:23.437`) -- [CVE-2025-3116](CVE-2025/CVE-2025-31xx/CVE-2025-3116.json) (`2025-06-10T09:15:23.657`) -- [CVE-2025-3117](CVE-2025/CVE-2025-31xx/CVE-2025-3117.json) (`2025-06-10T09:15:23.873`) -- [CVE-2025-3898](CVE-2025/CVE-2025-38xx/CVE-2025-3898.json) (`2025-06-10T09:15:24.137`) -- [CVE-2025-3899](CVE-2025/CVE-2025-38xx/CVE-2025-3899.json) (`2025-06-10T09:15:24.333`) -- [CVE-2025-3905](CVE-2025/CVE-2025-39xx/CVE-2025-3905.json) (`2025-06-10T09:15:24.543`) -- [CVE-2025-4680](CVE-2025/CVE-2025-46xx/CVE-2025-4680.json) (`2025-06-10T09:15:24.753`) -- [CVE-2025-4681](CVE-2025/CVE-2025-46xx/CVE-2025-4681.json) (`2025-06-10T09:15:24.933`) -- [CVE-2025-5740](CVE-2025/CVE-2025-57xx/CVE-2025-5740.json) (`2025-06-10T09:15:25.093`) -- [CVE-2025-5741](CVE-2025/CVE-2025-57xx/CVE-2025-5741.json) (`2025-06-10T09:15:25.290`) -- [CVE-2025-5742](CVE-2025/CVE-2025-57xx/CVE-2025-5742.json) (`2025-06-10T09:15:25.493`) -- [CVE-2025-5743](CVE-2025/CVE-2025-57xx/CVE-2025-5743.json) (`2025-06-10T09:15:25.703`) -- [CVE-2025-5945](CVE-2025/CVE-2025-59xx/CVE-2025-5945.json) (`2025-06-10T08:15:22.883`) +- [CVE-2024-13089](CVE-2024/CVE-2024-130xx/CVE-2024-13089.json) (`2025-06-10T11:15:52.113`) +- [CVE-2024-13090](CVE-2024/CVE-2024-130xx/CVE-2024-13090.json) (`2025-06-10T11:15:52.477`) +- [CVE-2025-40654](CVE-2025/CVE-2025-406xx/CVE-2025-40654.json) (`2025-06-10T10:15:26.990`) +- [CVE-2025-40655](CVE-2025/CVE-2025-406xx/CVE-2025-40655.json) (`2025-06-10T10:15:27.620`) +- [CVE-2025-40656](CVE-2025/CVE-2025-406xx/CVE-2025-40656.json) (`2025-06-10T10:15:27.843`) +- [CVE-2025-40657](CVE-2025/CVE-2025-406xx/CVE-2025-40657.json) (`2025-06-10T10:15:28.043`) +- [CVE-2025-40658](CVE-2025/CVE-2025-406xx/CVE-2025-40658.json) (`2025-06-10T10:15:28.237`) +- [CVE-2025-40659](CVE-2025/CVE-2025-406xx/CVE-2025-40659.json) (`2025-06-10T10:15:28.430`) +- [CVE-2025-40660](CVE-2025/CVE-2025-406xx/CVE-2025-40660.json) (`2025-06-10T10:15:28.627`) +- [CVE-2025-40661](CVE-2025/CVE-2025-406xx/CVE-2025-40661.json) (`2025-06-10T10:15:28.827`) +- [CVE-2025-40662](CVE-2025/CVE-2025-406xx/CVE-2025-40662.json) (`2025-06-10T10:15:29.103`) +- [CVE-2025-41657](CVE-2025/CVE-2025-416xx/CVE-2025-41657.json) (`2025-06-10T11:15:53.150`) ### CVEs modified in the last Commit -Recently modified CVEs: `6` +Recently modified CVEs: `12` -- [CVE-2020-7533](CVE-2020/CVE-2020-75xx/CVE-2020-7533.json) (`2025-06-10T08:15:21.423`) -- [CVE-2024-13915](CVE-2024/CVE-2024-139xx/CVE-2024-13915.json) (`2025-06-10T09:15:22.463`) -- [CVE-2024-2318](CVE-2024/CVE-2024-23xx/CVE-2024-2318.json) (`2025-06-10T08:15:21.797`) -- [CVE-2024-45478](CVE-2024/CVE-2024-454xx/CVE-2024-45478.json) (`2025-06-10T09:15:22.687`) -- [CVE-2024-45479](CVE-2024/CVE-2024-454xx/CVE-2024-45479.json) (`2025-06-10T09:15:23.043`) -- [CVE-2024-6807](CVE-2024/CVE-2024-68xx/CVE-2024-6807.json) (`2025-06-10T08:15:22.123`) +- [CVE-2022-4653](CVE-2022/CVE-2022-46xx/CVE-2022-4653.json) (`2025-06-10T11:44:28.910`) +- [CVE-2023-0378](CVE-2023/CVE-2023-03xx/CVE-2023-0378.json) (`2025-06-10T11:44:28.910`) +- [CVE-2023-22707](CVE-2023/CVE-2023-227xx/CVE-2023-22707.json) (`2025-06-10T11:44:28.910`) +- [CVE-2023-3345](CVE-2023/CVE-2023-33xx/CVE-2023-3345.json) (`2025-06-10T11:56:01.460`) +- [CVE-2023-6636](CVE-2023/CVE-2023-66xx/CVE-2023-6636.json) (`2025-06-10T11:44:28.910`) +- [CVE-2024-12397](CVE-2024/CVE-2024-123xx/CVE-2024-12397.json) (`2025-06-10T11:15:21.283`) +- [CVE-2024-12743](CVE-2024/CVE-2024-127xx/CVE-2024-12743.json) (`2025-06-10T11:53:54.447`) +- [CVE-2024-12767](CVE-2024/CVE-2024-127xx/CVE-2024-12767.json) (`2025-06-10T11:53:16.670`) +- [CVE-2024-13916](CVE-2024/CVE-2024-139xx/CVE-2024-13916.json) (`2025-06-10T10:15:21.443`) +- [CVE-2024-13917](CVE-2024/CVE-2024-139xx/CVE-2024-13917.json) (`2025-06-10T10:15:26.553`) +- [CVE-2024-44005](CVE-2024/CVE-2024-440xx/CVE-2024-44005.json) (`2025-06-10T11:44:28.910`) +- [CVE-2025-2703](CVE-2025/CVE-2025-27xx/CVE-2025-2703.json) (`2025-06-10T11:15:52.680`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 1d7ed7b4368..3ad9c04db2e 100644 --- a/_state.csv +++ b/_state.csv @@ -162816,7 +162816,7 @@ CVE-2020-7529,0,0,4bcdbc968e0da9a37524428e76a4148c588e10a92679dfbd0f518220c3b1a3 CVE-2020-7530,0,0,c76dc52352d9d98e85b5840da2c0e0ed0d20db2ad16c23d2f35040b966d54081,2024-11-21T05:37:19.293000 CVE-2020-7531,0,0,9c3aba180e960e5350023170088f6ffdc5e62432721db44383c204d529282003,2024-11-21T05:37:19.403000 CVE-2020-7532,0,0,76e86d6c962e42324fde6ee04b52d6776179a4116faff2cf98a15d4c4037472f,2024-11-21T05:37:19.513000 -CVE-2020-7533,0,1,f7c6f6ae323dac3ada05e6dbad6c4592d9ad949375b7c9d360f27e2e44b3dc72,2025-06-10T08:15:21.423000 +CVE-2020-7533,0,0,f7c6f6ae323dac3ada05e6dbad6c4592d9ad949375b7c9d360f27e2e44b3dc72,2025-06-10T08:15:21.423000 CVE-2020-7534,0,0,d7f036d5a2c2d6d4d9cb273d7692b03687aea8bac74d549f6387ee4c045e072b,2024-11-21T05:37:19.763000 CVE-2020-7535,0,0,0c94cbbeb495c1b938f0e86e81e282f12cf39179c85b251e5f8fc2ee2c889dca,2024-11-21T05:37:19.907000 CVE-2020-7536,0,0,7676351ea1e300143f4ff7318fbf8f9088f3c9caf8045b78f380e7159876763d,2024-11-21T05:37:20.047000 @@ -211563,7 +211563,7 @@ CVE-2022-46505,0,0,556f68f80f426556fa441caaf3ece3247d1f844d1ca10adaa553eb4ec2d51 CVE-2022-4651,0,0,e7cf4a70afca20f66b5af34080804c6864be6d29e3a2f96826c8a4a51fcc2990,2025-03-27T16:15:17.703000 CVE-2022-4652,0,0,1095194f9f154259f49411f7dbb93d1a6c03863c10e1a5c3e3727f220f6e9465,2025-02-27T21:15:16.310000 CVE-2022-46527,0,0,d02de0aae02127d126346be665f04f296ca7c58b711b92b26e017819accbd88f,2024-11-21T07:30:40.330000 -CVE-2022-4653,0,0,5e04a4070d5781883e868846a741d01bc94f599a545343e05bb5833cc37628eb,2025-04-08T20:15:19.183000 +CVE-2022-4653,0,1,fdf82423452f9f1fb82a2b67a45692e54bb1a5e54d616807d8d22fd37f4fe533,2025-06-10T11:44:28.910000 CVE-2022-46530,0,0,af2bb5ee46d936d244c92c467e760d00274999c52ba2494e2e4cdcdcdf8c1946,2025-04-16T18:15:59.500000 CVE-2022-46531,0,0,2ac78f73b3153ff5c8e9907f04f29148da22e1ff69025d5820fd91be844de458,2025-04-16T16:15:25.327000 CVE-2022-46532,0,0,432e2fb1ac9231e3900f9510862b24af15ae515bd54591843ed70bfaf195023c,2025-04-16T16:15:25.507000 @@ -214767,7 +214767,7 @@ CVE-2023-0374,0,0,ae4f5db6eb936a3b818c45a588550c93b15d5a51af99d7e2373040cf12eb9f CVE-2023-0375,0,0,8948a3962bbed5c7e344609d7d5077346684df9a4b1ebdbb684540f03777e60c,2025-03-12T21:15:40.340000 CVE-2023-0376,0,0,a9f6de5e0668ec86ac889cde4b7f40c1edd842c95af7ba6f28a9a7a5f9cf4a27,2025-06-02T15:15:21.640000 CVE-2023-0377,0,0,9985f7addb4b6395ecb8f44f70b75d5f0a14376de7e9bfa2d4adc8dd24e4447a,2024-11-21T07:37:04.600000 -CVE-2023-0378,0,0,736996cb01e7855e9d6ff04f5f36851f6d27f466bd855e3b2600330380ed8d08,2025-03-12T21:15:40.490000 +CVE-2023-0378,0,1,7dc9c8b5c6c13deeff5b72af52f9f6595c5c49fc084d53f7ddaadbb20c2bfd1d,2025-06-10T11:44:28.910000 CVE-2023-0379,0,0,45a21024b71eac3a3ff03943f6ddf52c72280bcd61f1cdeff5ae8ab462791d33,2025-03-21T15:15:39.677000 CVE-2023-0380,0,0,e199a00c1e1579f86574b186fac08be1b5ee641379e96e857389051cc7026e5d,2025-03-14T19:15:40.897000 CVE-2023-0381,0,0,fb963192539a86802660cecf1f4984bcbc8442d3688b92930e1e773c336353cb,2025-03-18T15:15:42.723000 @@ -218726,7 +218726,7 @@ CVE-2023-22703,0,0,b11cbe66777334b92d49ab1285216c2daf10bc1ade9e60e348ec608d69ec7 CVE-2023-22704,0,0,3391b5e9fe8cfdb113a4335180cf222b3480dc9186971ddf99b9d7c23f514db4,2024-11-21T07:45:15.363000 CVE-2023-22705,0,0,af778e225555747df5c233219acb78451206239cdbd1890f1bc52e0b4eff1577,2025-02-20T18:34:50.990000 CVE-2023-22706,0,0,ebe261333ec94aa8d06d2c8f8fa51152653338e9e5613bd8d3569a6f53cb90e2,2024-11-21T07:45:15.623000 -CVE-2023-22707,0,0,83b334ee529eefc9ab11f726a4a33783ae7ec49b01a932387d3ab561fdacf988,2024-11-21T07:45:15.753000 +CVE-2023-22707,0,1,0bb7c425aded4142ebbe2c9be8b3883425d1ae75e2be1d4c2d9e6d8ce6aee24b,2025-06-10T11:44:28.910000 CVE-2023-22708,0,0,0bda0fb09283863451e953094b448349ab539148689b6d150d6367fafec54d48,2024-12-09T13:15:20.260000 CVE-2023-22709,0,0,b97092a949b7838108594a0e4a6775ddf43d90533b1340d5130b127236ed7e78,2024-11-21T07:45:15.890000 CVE-2023-2271,0,0,82a1b193d56a689b6f14541ed8547a7aebaefaa1fa98350a6f5d11be1c01604a,2024-11-21T07:58:17.063000 @@ -227388,7 +227388,7 @@ CVE-2023-33439,0,0,f3af0a0427500f94c6b3b138f4e3fa36fb9bfc88f5c6b1efc27138be8bba0 CVE-2023-3344,0,0,be98701b195b53def24896f087665cc45329af9abedde7087f97191910e5fedc,2025-05-05T16:15:45.150000 CVE-2023-33440,0,0,6eb23ef764cdc1e6f8c91c5365c2450f157a6eae9d074cfe3f802aeee1be7620,2025-01-14T21:15:08.377000 CVE-2023-33443,0,0,6c4ad59b45035b5c88ac135965bacacb2dedc93413c60d04ce25fba05f45224c,2025-01-06T21:15:10.830000 -CVE-2023-3345,0,0,219d5c772aa02f0c4a4b16b09721d8934adb3c1505c85a870be2fa6ad37ab3fd,2024-11-21T08:17:03.907000 +CVE-2023-3345,0,1,e53d94e79d9c9c1cb78413356db8a04c067360ae09c43cc3b085129675d26070,2025-06-10T11:56:01.460000 CVE-2023-33457,0,0,7eee79e2e603000fdc9c79d0c7f54a28226aded759ba1bc0cbce35446680feba,2025-01-08T16:15:29.587000 CVE-2023-3346,0,0,09f68a6670d4a69cff8e11fa4ad9eea39d73cc8d7fe0a2dacd2a911bbd61aee1,2024-11-21T08:17:04.037000 CVE-2023-33460,0,0,6e418258c1a2b91b79efff9c4f69791d5894d1876ad79ba0f82b40a9644edd3e,2025-01-08T17:15:12.020000 @@ -243531,7 +243531,7 @@ CVE-2023-6632,0,0,b1c54670c8f8c580830f651c478abdde4fbaf49444ee1158170f1e733bd098 CVE-2023-6633,0,0,8de7c9ebad96e1b1e63f7ee0917437d9c45b07d67508fbd0e4ab2d9fea33ad99,2024-11-21T08:44:15.430000 CVE-2023-6634,0,0,4af0f8971e0f53e2ae5ef41811e9e37b2a73aed3245e588807fa0f78f7b0d874,2025-06-03T14:15:38.520000 CVE-2023-6635,0,0,b930d159660c5d2dffbcce188a715975fef9441e89d59344c487a6ad08f8bfaa,2025-05-15T20:15:29.143000 -CVE-2023-6636,0,0,429cb004753d2958d8159d67d03a4c3da4034ff661609c524ad4820a55c5adc8,2024-11-21T08:44:15.893000 +CVE-2023-6636,0,1,0f338d074e17636e80ea5e1670bcee09c12c45a9dacacebb343d78dfc70dbbc9,2025-06-10T11:44:28.910000 CVE-2023-6637,0,0,7c52b1639bf05012c19eced66616ae6b856e66a997b8457370ac22577ad50c58,2025-06-03T14:15:38.693000 CVE-2023-6638,0,0,8202a3e7efa91557985af40a6a0d3f94586e929450e1bc51f40a6c7f47210d9b,2025-06-03T14:15:39.293000 CVE-2023-6640,0,0,4c1de3385a32f286c0b75b0b253dae7e11e4d89cf203bb099ad3f58f6c385c6a,2025-02-12T16:52:28.897000 @@ -247531,7 +247531,7 @@ CVE-2024-12392,0,0,a8156bd94e9672d4635a84a6a0bddbfa7b852dc1cc5b768dabdbd22341a78 CVE-2024-12393,0,0,0bb58765d8feb8f28285c647b089ee899cbf94b23d666e28361039e2bb2522cf,2025-06-02T16:21:01.907000 CVE-2024-12394,0,0,c9fba954279bfd0e370c88894a9572158e1b0315e8ae3de4dd675a4e1ed310f4,2025-01-09T11:15:13.310000 CVE-2024-12395,0,0,75ff5ef98722c35fb11d383db877ddbb73a300c7cb334e918191d763e24090f0,2024-12-17T12:15:20.377000 -CVE-2024-12397,0,0,05ba7e0b8df1e3d8b761874a9aada6fc62cc7d0aeb21c968842feab985ace9d8,2025-03-19T21:15:35.480000 +CVE-2024-12397,0,1,0f39153bc1d1ac0d13fae9e507b21fa619e36a6fa865060fa716d3d92d7c36e3,2025-06-10T11:15:21.283000 CVE-2024-12398,0,0,3ddf453ac35312a996d38b789ad3b4ef0601d638e0d2eee33b4135d2d780af47,2025-01-21T21:12:02.310000 CVE-2024-12399,0,0,52bff9c41a163f77665f2da9fc0a8dd83c998cfb340cf3f1d77c6844e18524bb,2025-01-17T10:15:06.697000 CVE-2024-1240,0,0,28733ede53b96385ee0de4a7c5187b3db0d925b1e4ab6e977522dc277dee75de,2024-11-19T19:04:53.913000 @@ -247880,7 +247880,7 @@ CVE-2024-1274,0,0,f1db1f9b98565ee12acd91ee04a48a5ea9d9022420902832299251e567dee9 CVE-2024-12740,0,0,e6c4d03a8c2935c7f946e2ddf8fb2efb52eeb4b7b990af277f1511faff48b8c0,2025-01-27T18:15:36.743000 CVE-2024-12741,0,0,8d4c06d6204bde3983a442ab297408366d3d8d84bd77eb948d96a8745c52828f,2024-12-18T20:15:22.390000 CVE-2024-12742,0,0,d58ef6138e359837d0633f7d853b532ab5b996d40e60c1b8567bd5b194ec44e0,2025-03-06T17:15:17.740000 -CVE-2024-12743,0,0,62e1184f57129404b8941aacc25c68e38e14fd392dd612ecdadef7bd57a7bdd1,2025-05-20T20:15:32.620000 +CVE-2024-12743,0,1,d47e3f3c79c8d0a3041386d9c423398edff04065d61dbea54e5f1c9b09640b4b,2025-06-10T11:53:54.447000 CVE-2024-12744,0,0,d9bcd7b60c79640d4995955dca329cb96a3574a3f475005b85edf507783c7d57,2024-12-26T15:15:06.290000 CVE-2024-12745,0,0,56f1c84b33bef267b3eb5e88e8c9c1273071ba9706fba6301263255413a17152,2024-12-26T15:15:06.527000 CVE-2024-12746,0,0,3dc399827dbe6da7d4657aa1f300fc1452e75823ea53e19ad5a88d067d48a8c0,2024-12-26T15:15:06.650000 @@ -247903,7 +247903,7 @@ CVE-2024-12763,0,0,828b2bb544f2e61dd11f51daf4dde3c9326c6a38ab958bf084c901608bda1 CVE-2024-12764,0,0,520ef7a415b759131cb40460656f8f00fedd52ee179d3018b43ad66d1c2ea33c,2025-02-11T02:15:33.817000 CVE-2024-12765,0,0,f7917c17906425e707a3ca48a19a2a85665883890f2e41423afe14a68f13711c,2025-02-11T02:15:33.873000 CVE-2024-12766,0,0,9649c1c42978a503b019c31f940763a525ea514d4d13ceba23be095167719680,2025-03-20T14:15:18.387000 -CVE-2024-12767,0,0,0d418cb8d56acc0fdcc9ff3b4928fd9f3dc695660cec1404cca944d3f5b3b5e5,2025-05-16T17:15:49.970000 +CVE-2024-12767,0,1,6593b5f975dfd5395109e7e47c23143559826c2e726fd8f4f452ca566e9cbeac,2025-06-10T11:53:16.670000 CVE-2024-12768,0,0,cbf9ff20e80bb09942852fa2e956342eb17e9d4f27cf212ff4c0d8344126a292,2025-05-12T01:04:06.597000 CVE-2024-12769,0,0,55524fcacc88be74a2aaad2cb01ce12a99e5536d12743064ed3841d6d460e936,2025-04-29T17:54:19.490000 CVE-2024-1277,0,0,2a6d3c94fab76f050717b5ee760be8ca9b7ac565da514f487f74b0cc7aeb5545,2025-03-04T12:34:06.490000 @@ -248227,7 +248227,9 @@ CVE-2024-13085,0,0,162bf1e91a247b7e6da6855dca3faf3ee63c65213e4a36036c19ad648c40f CVE-2024-13086,0,0,7ac42c524055e40fca53eb99442db6298fae490b3d2a5b9bd9dde151851588be,2025-03-07T17:15:18.430000 CVE-2024-13087,0,0,de9220c2f3228338d6992a72f028e115aecfe3e99735d21a56e1a464c6d673c9,2025-06-09T12:15:47.880000 CVE-2024-13088,0,0,f092e286d50e3d3e98d13de53109368260b6d1e8323f34fd9cce2a144359b3de,2025-06-09T12:15:47.880000 +CVE-2024-13089,1,1,f5454d17f3f57010b12e68642616d13cb796efaa305513504b071cad5533df66,2025-06-10T11:15:52.113000 CVE-2024-1309,0,0,46059633232401d149997e4f4dfdb966bb51f1c7d1649dc6d177fd25783e7c4a,2024-11-22T20:03:02.910000 +CVE-2024-13090,1,1,f59bcd6fcdd4929ff55844b6e1f081fff64cd2cd1ab56a6fb30361561be373be,2025-06-10T11:15:52.477000 CVE-2024-13091,0,0,e9978d25b15eb759e2bc9cfbde0802cf5e89ad556f7a4c0b02504deb75ff452d,2025-01-24T18:42:25.563000 CVE-2024-13092,0,0,a2750c0c790f467a547694b70414fe45b0b02ded27bb4d4c2a0fae1c1a0700ca,2025-04-03T14:45:17.077000 CVE-2024-13093,0,0,cb18337e8ee0e8d57eaca2c3b85d5fad081ebf6db3df956f09ca020aa48a7de0,2025-04-03T14:43:53.770000 @@ -249098,9 +249100,9 @@ CVE-2024-13910,0,0,6885427b6394b62d7dcb79523e61be62dd8281aad81e8cab0af59c67e1bee CVE-2024-13911,0,0,4ecdacf9340f565972d67d0fd0f16ebfb137c877e410b587b04d73d76789b018,2025-03-01T08:15:33.803000 CVE-2024-13913,0,0,97e9263ea64a11bf1d9dd911c989e4107d7a928b53ec2e2ca6bd3929a0fde8a1,2025-03-14T06:15:24.490000 CVE-2024-13914,0,0,2af344b4b59c1a7104b4453c8c333847114f5fbef4676b0e1849066fad060e76,2025-05-16T14:43:26.160000 -CVE-2024-13915,0,1,6fe2f006afc76e62529cad238e1d7c5fa1e81ebbb017ddd7987d1601087231ea,2025-06-10T09:15:22.463000 -CVE-2024-13916,0,0,1c86da198e7ad03ce361d7ce29aaeaaf2aee1adf8190249fefeb9d64238107dd,2025-05-30T16:31:03.107000 -CVE-2024-13917,0,0,79aaa8862ed6cde99f132d7719a925663858e201dfad9471c9e04355fd7d8561,2025-05-30T16:31:03.107000 +CVE-2024-13915,0,0,6fe2f006afc76e62529cad238e1d7c5fa1e81ebbb017ddd7987d1601087231ea,2025-06-10T09:15:22.463000 +CVE-2024-13916,0,1,616a3a974a6f01de2c87e25818465d874537e8e70683ef59a680af8227940de2,2025-06-10T10:15:21.443000 +CVE-2024-13917,0,1,d7f074eb3bc2e28f3b38b1720523e72dbce348ba1de7ad8e965baa1b1f59ff10,2025-06-10T10:15:26.553000 CVE-2024-13918,0,0,42b43ee8cd03c685390e4720249fe990efc04f95289c224e1def5175db4f83ef,2025-03-24T14:15:59 CVE-2024-13919,0,0,e47cf885ddbb3552eadad29313f1bea2b10cd197fed90bc6c347d954f876d2b0,2025-03-24T14:14:53.337000 CVE-2024-1392,0,0,7d376d426c7bde42291bb43e543815dd80a04cb004b570eb44a0e5840366c498,2025-01-17T19:53:57.010000 @@ -252287,7 +252289,7 @@ CVE-2024-23174,0,0,b365b4a7fe1ddb2e20fb66243fbd5adf68894f7b7cd98618c8d61e49dd2ec CVE-2024-23177,0,0,657988e82fc58793fb35144a73273b10bccc46bb10e02359ba79eb0adb30003e,2025-06-03T14:15:46.497000 CVE-2024-23178,0,0,4f65f9875f3e43b2db767153c71363ddbe13dd87e4f9f4f76dc9f3b3643a1450,2025-06-03T14:15:46.693000 CVE-2024-23179,0,0,8fe0b61f68b15248ff6f58e9fa788ade334a5eb3775d6fe6f432905314bfee6f,2024-11-21T08:57:07.983000 -CVE-2024-2318,0,1,4f719f579c6a416a19438c2c6d49f17790490188c2a9a2cb141bb0ba42b01e16,2025-06-10T08:15:21.797000 +CVE-2024-2318,0,0,4f719f579c6a416a19438c2c6d49f17790490188c2a9a2cb141bb0ba42b01e16,2025-06-10T08:15:21.797000 CVE-2024-23180,0,0,ffa291fdcb2038e838e41bc7a77aceea4655e19526604527988f8ee139c2d66a,2025-06-04T16:15:29.313000 CVE-2024-23181,0,0,a08c47ff39f6f27a6222d039572c5b3f922cabf077166b961c152ed71ef139aa,2024-11-21T08:57:08.347000 CVE-2024-23182,0,0,bea03d623844f4fae489adb4af1b45de0402092d2fffc22402486a79a22f10dc,2025-05-30T15:15:34.027000 @@ -268587,7 +268589,7 @@ CVE-2024-44001,0,0,175a5c76eaa0c47ffbee0289add49207844bb4c67d99ffcbaaa126343821b CVE-2024-44002,0,0,fb0f9d9f4deabfd4ae1435b962e7db8b5241e501eddbb5d325e8dc3232296abc,2024-09-25T20:06:13.100000 CVE-2024-44003,0,0,23e0564b892dd423e7259e31c83d1277fbb7208f6d70fd5f18df7ac3fcafb2ea,2024-09-25T20:03:29.867000 CVE-2024-44004,0,0,bbc19a7af2ebbf830c254cf451b28c5ea08ca0da1e15859da6b1d1952425238b,2024-09-24T19:22:14.760000 -CVE-2024-44005,0,0,444ceaf4fc88ad7c815dbe7f8ebee5e9b48e322f542430761c5fd31dffd62e35,2024-09-25T15:25:30.083000 +CVE-2024-44005,0,1,96a48922146014b4096b0e3da854976801051d3d24069d441538abeeacd253ac,2025-06-10T11:44:28.910000 CVE-2024-44006,0,0,07a7b2d93672ddd0e2d64af483cf570ba63f1e65d2ff5fdafe3c8385cb34625a,2024-11-08T21:08:38.960000 CVE-2024-44007,0,0,eb31863e8cc5fd1d114916effb9a6848710b326ebc0b4750aa792a8d30574b0c,2024-09-24T22:08:52.857000 CVE-2024-44008,0,0,f7af8bcf24d7662d22f83ecd74e944dec78b8e1307eefd0e495f38cb1e19aae0,2024-09-24T22:08:01.060000 @@ -269606,8 +269608,8 @@ CVE-2024-45474,0,0,0330c0a050b47ef4dac408e17e94f7b65d5f673de4ba016262e4ba29a6154 CVE-2024-45475,0,0,917726b522de021fb94492588041b210e1311150d54a008d8bc77ac4f1e2d46a,2024-12-10T14:30:43.673000 CVE-2024-45476,0,0,af2645c959f7fb40898aee3a6516acece8ac0169d007f0fa6a4f1b42b4456564,2024-12-10T14:30:43.853000 CVE-2024-45477,0,0,e64486945a7233685155bac32e1cee1ee1baed194f1170f1d979f1137af05eea,2024-11-21T09:37:50.293000 -CVE-2024-45478,0,1,88c76a6576896123f03dd4b9980d5337fc1f5a01d914774be128ca19ee9a54dd,2025-06-10T09:15:22.687000 -CVE-2024-45479,0,1,84bec843f91bb21db5ef2ec2468b56bbd8299993819e1572bac37f7cb4bdb8be,2025-06-10T09:15:23.043000 +CVE-2024-45478,0,0,88c76a6576896123f03dd4b9980d5337fc1f5a01d914774be128ca19ee9a54dd,2025-06-10T09:15:22.687000 +CVE-2024-45479,0,0,84bec843f91bb21db5ef2ec2468b56bbd8299993819e1572bac37f7cb4bdb8be,2025-06-10T09:15:23.043000 CVE-2024-4548,0,0,c7401b17e35ff1b34998f05de06d9924efc8296217fd62d20718b595e94aba23,2024-11-21T09:43:04.937000 CVE-2024-45480,0,0,6f8c399265c28d8f30d1be5584149815f4f10b4a9a7604b6361eb6f6588833d9,2025-03-27T16:45:46.410000 CVE-2024-45481,0,0,af204bcc6a197076943be1004764d4663ee00d5011c570a2bf5a36bfaae8814c,2025-03-27T16:45:46.410000 @@ -279394,7 +279396,7 @@ CVE-2024-6803,0,0,c9d0d2c3d0be3aefc707e36eaf28cd5ea3dcf93c01833cc1b0e4aab37df6e1 CVE-2024-6804,0,0,5addc897df7d832e4b0119316199dc712939d8129e5c666ecdfe3d141c170f4d,2024-09-12T21:31:45.747000 CVE-2024-6805,0,0,1c210d059e5406d15a939f7588c555a69c38d162b88d34499e6d9a21643fd31d,2024-11-21T09:50:21.653000 CVE-2024-6806,0,0,bd9029223cfe8d0849ca636b94ad7a5588631303a0efbbe7c8640e9f42ceb678,2024-11-21T09:50:21.780000 -CVE-2024-6807,0,1,5e55c9668d3f0b7997efaa63dbf72073e6e305e1f8180a43358b0dfbd1ca2f01,2025-06-10T08:15:22.123000 +CVE-2024-6807,0,0,5e55c9668d3f0b7997efaa63dbf72073e6e305e1f8180a43358b0dfbd1ca2f01,2025-06-10T08:15:22.123000 CVE-2024-6808,0,0,69f62605e7fb121e33aa81824d018e7482a9cb46dab12ce4cdf216b5192e6597,2024-11-21T09:50:22.057000 CVE-2024-6809,0,0,f0c95020a6da6e2550d0224d353969ecf7c3932c45d2c1e469fdf78eb5c6babc,2025-06-05T14:21:45.653000 CVE-2024-6810,0,0,3aa0289c5b55c0813f23eeba3dd4eab1a11c03e2079bbbda39ffbd6f73ab2601,2025-02-26T13:15:40.600000 @@ -289111,7 +289113,7 @@ CVE-2025-27017,0,0,487799b83e349646c0969a6714868b1c6a1e0d2f10d5e6737c1115cacdd0b CVE-2025-27018,0,0,48d58c9e9c902b1eaa7722cd7e4f3337c69ebc3fec7269de4a4a5a702e3570f7,2025-06-03T21:11:28.860000 CVE-2025-2702,0,0,7ef0bfa66e07c4fb7c181b57cab1217f373873ecf500d50de0d874610b07459c,2025-03-24T10:15:12.943000 CVE-2025-27029,0,0,f19508e0628f7c772651f93e1b12fe9874fd4060cecec22f220c71602c00f8da,2025-06-04T14:54:33.783000 -CVE-2025-2703,0,0,1cd2ec1071e8a854a09aaa20f8e960bae5b0d0c1a938baebd649e294b60810d4,2025-04-23T14:08:13.383000 +CVE-2025-2703,0,1,d5ea40e178148932f49d90ec4c309716760c7d3b1ed975c047629950db3be6df,2025-06-10T11:15:52.680000 CVE-2025-27031,0,0,9fa4d5238e55dfabc5a9becc0748532469d6008767dbc00fd4050a94f50be84d,2025-06-04T14:54:33.783000 CVE-2025-27038,0,0,fe0578cb45b48dbd7571220d905a674d9df1e67d36609a2b08ca2656fb74b6b8,2025-06-04T17:23:58.387000 CVE-2025-2704,0,0,2cd2fdcb7bf078b49adccb5ec3568934eab2cf5655946edca476f7cde559986a,2025-05-24T01:38:01.433000 @@ -289721,9 +289723,9 @@ CVE-2025-27811,0,0,6df32dd39138756dd7fa6b11625de7738255484a05afc02ff0b73116671b1 CVE-2025-27812,0,0,490eea28d11bf4042efca85e606a63ea8705fbb9895bc0e4fb69498d1dff9f35,2025-04-11T15:39:52.920000 CVE-2025-27813,0,0,810e9a9403b82aebefac61476a9e0011d443081011347b72d18ecc06e7e5914d,2025-04-11T15:39:52.920000 CVE-2025-27816,0,0,9ab27d50becb6f1925043133c65bc558001d86f2d9081231a272e11d17cb2516,2025-03-07T20:15:38.900000 -CVE-2025-27817,1,1,7dd4c0bd1a46bb395067ed1b44269b1e6f06f079144a4b41be7d2c719bd94ee0,2025-06-10T08:15:22.367000 -CVE-2025-27818,1,1,42d27206e0aa04dd785d158861e6b931e38e64a728de10e6a627883d7468c48e,2025-06-10T08:15:22.533000 -CVE-2025-27819,1,1,bbd21378e3e0969ce37ff9bf4077c7ef169d69d769b03d6976946abc183827a2,2025-06-10T08:15:22.687000 +CVE-2025-27817,0,0,7dd4c0bd1a46bb395067ed1b44269b1e6f06f079144a4b41be7d2c719bd94ee0,2025-06-10T08:15:22.367000 +CVE-2025-27818,0,0,42d27206e0aa04dd785d158861e6b931e38e64a728de10e6a627883d7468c48e,2025-06-10T08:15:22.533000 +CVE-2025-27819,0,0,bbd21378e3e0969ce37ff9bf4077c7ef169d69d769b03d6976946abc183827a2,2025-06-10T08:15:22.687000 CVE-2025-2782,0,0,f7b2edc498b938674db351470dcc82477b82d7a96a3f89a710e19cd683cf7f7a,2025-04-01T20:26:30.593000 CVE-2025-27820,0,0,30e553492644fd74a08595ea9e898b31b3ee3235057c290c91dd23e5320f10ac,2025-05-16T23:15:20.193000 CVE-2025-27822,0,0,8db44093401926706a840ce0e19328855573d2443e1e01b57e17b296b11ec387,2025-03-07T22:15:37.927000 @@ -291415,7 +291417,7 @@ CVE-2025-31116,0,0,dc27938d19edcd1cce30d4459a9fe18b415a789e32b8ab57b4b823d2ab133 CVE-2025-31117,0,0,f0c358e12e54ff66d31fcc4e22278028cbeb68331cb3fa3477004c51e39175df,2025-04-30T16:08:43.337000 CVE-2025-31118,0,0,8da7d44eafe0503663067ec8d1c233ee1d46933828d48e4543d1ad74f2a2b420,2025-05-13T15:27:06.077000 CVE-2025-31119,0,0,8d9ab5def7d45f10e19e138b367b0c6d22067c0f28db2fa5e859ed729d9d01d5,2025-04-07T14:18:34.453000 -CVE-2025-3112,1,1,bd7d405aca649ec3146442d73241021e418210c7fcc9d2ce417ac895ba40e069,2025-06-10T09:15:23.437000 +CVE-2025-3112,0,0,bd7d405aca649ec3146442d73241021e418210c7fcc9d2ce417ac895ba40e069,2025-06-10T09:15:23.437000 CVE-2025-31120,0,0,bd5940b740e50f8b7e82621062c510c568ad671de0b27daf1d574c8dd878a638,2025-05-13T15:24:49.437000 CVE-2025-31121,0,0,0ff275f8523f35ea34ff5d81766304fcf6f1675875b2819d2beeb0b90139b53d,2025-05-07T15:35:41.393000 CVE-2025-31122,0,0,9d10a08abcc76e6c9132fba1b31fc54c931fbd5a244a4acba0d835f767d49ffb,2025-04-01T20:26:22.890000 @@ -291442,14 +291444,14 @@ CVE-2025-31141,0,0,fdf8b65d0398f5604032ea500e1efd4ef3165adf25ebb1cbf6d5791a08d29 CVE-2025-31144,0,0,c250fdf328ee74061a9d52a259b43ae4d05dc83889572b3d2df6bcba1de40634,2025-04-29T13:52:10.697000 CVE-2025-31147,0,0,b4b9372e5c8a5e40ec0d018e08c7d412a3cd39ffe19cf8f186844b6fcf8ffb0e,2025-04-16T13:25:37.340000 CVE-2025-3115,0,0,24a856fe651071984693ab7b99fa6f73c29fbb171f1a48b9abf496d4fc3cc5dc,2025-04-22T16:46:51.650000 -CVE-2025-3116,1,1,3f08ff586b7d22a9cac95bb1a2842dcb548bf7d56cba2f784cc3c1f6e692e5af,2025-06-10T09:15:23.657000 +CVE-2025-3116,0,0,3f08ff586b7d22a9cac95bb1a2842dcb548bf7d56cba2f784cc3c1f6e692e5af,2025-06-10T09:15:23.657000 CVE-2025-31160,0,0,82f17d7889cbcc07a050e3bd5a0bf584b89c18037b9043c83c638bc1493fe9fc,2025-04-07T01:15:42.477000 CVE-2025-31161,0,0,b63c370c3afb95f65e043db6573c233ef54ac00fde0ad33fa5ea3bb2d36c3fab,2025-04-21T21:03:07.753000 CVE-2025-31162,0,0,cfeafc9944d79e10529164231b0943be3a87194c4053baabeebe9b961989cbf3,2025-04-01T20:26:39.627000 CVE-2025-31163,0,0,0d23fc46a79319324af9251b76f99e828668eada4156c0f4488a35318beebb85,2025-04-01T20:26:39.627000 CVE-2025-31164,0,0,4b001c140896288467c92c772e2ebf8f58e53bdc0e31f0e36dc064cef4c67cc1,2025-04-01T20:26:39.627000 CVE-2025-31165,0,0,890d4b71d79960b8670f39224093c3ef99c7f92edd823784cbe3204f4aa998a2,2025-03-27T16:45:27.850000 -CVE-2025-3117,1,1,e90c4aaa3d506f7805f298702043894715d4e0dcd3b21abaa68d7129e3cd6aa0,2025-06-10T09:15:23.873000 +CVE-2025-3117,0,0,e90c4aaa3d506f7805f298702043894715d4e0dcd3b21abaa68d7129e3cd6aa0,2025-06-10T09:15:23.873000 CVE-2025-31170,0,0,c3da7797f519ed212ad3546b655748de4a071c1dd7a177d6ab90edafcaedfe9b,2025-05-07T20:46:57.603000 CVE-2025-31171,0,0,4a534626edebc2023d516705ae4ea70b272964868d24a4e37b00e8d466eedd94,2025-06-06T07:15:25.090000 CVE-2025-31172,0,0,90e32b574e57aaae3c88f8457f70e0bd6dfca1d0be15fef48145d614510dc82f,2025-05-07T20:08:51.903000 @@ -293795,14 +293797,14 @@ CVE-2025-3893,0,0,1ab86d04da56f98bab184b01c702cbbec8f916378a6e5df504f9128fd6b706 CVE-2025-3894,0,0,5fc1ef7ab55e4a66950bb4d6ad69ffb2f2004eb936be378e0237154abb754876,2025-05-23T15:54:42.643000 CVE-2025-3895,0,0,9d24bc256da3d45e242029d4ef6ca15a30f74d3a742ef680b58f60274e1455ef,2025-05-23T15:54:42.643000 CVE-2025-3897,0,0,a76833041004e7ae266165bf906a6eb79929fb700817c1b5afa0458a2a32ab3c,2025-05-12T17:32:32.760000 -CVE-2025-3898,1,1,62d852c4d043fbcbfe105f82313388052ae5393b13c925a378e0e5fd926cad13,2025-06-10T09:15:24.137000 -CVE-2025-3899,1,1,86971ea1af781bb77e4d0a800d118a586809ecc465a11006c4a6a82907b13abd,2025-06-10T09:15:24.333000 +CVE-2025-3898,0,0,62d852c4d043fbcbfe105f82313388052ae5393b13c925a378e0e5fd926cad13,2025-06-10T09:15:24.137000 +CVE-2025-3899,0,0,86971ea1af781bb77e4d0a800d118a586809ecc465a11006c4a6a82907b13abd,2025-06-10T09:15:24.333000 CVE-2025-3900,0,0,0d562be7b180640d1fa0f8676fba7fa2392337449d93ebe74c33a5f4dae11360,2025-04-29T13:52:47.470000 CVE-2025-3901,0,0,2ba85ef5f554a9662d34880d6756dc984d3f9d34a1b66af96036fb769e6d7e2b,2025-04-29T13:52:47.470000 CVE-2025-3902,0,0,0d69ac5d2bd331eaadcef424ae9ca509a524e67597728ddd5b904c6a193ad755,2025-04-29T13:52:47.470000 CVE-2025-3903,0,0,6fd629d73b6d4872a7ffae56d6c3c0b7253c2c832af05b126210d15454d1d4cf,2025-04-29T13:52:47.470000 CVE-2025-3904,0,0,a15d72d0f1a0535bebf9df4e01b6cfc45c014de0879ce9d249803945f26fce3b,2025-04-29T13:52:47.470000 -CVE-2025-3905,1,1,1d661ec7bb97d8c96fffef59b1efed90ddec38d868a38d42a2db62b6d060fb09,2025-06-10T09:15:24.543000 +CVE-2025-3905,0,0,1d661ec7bb97d8c96fffef59b1efed90ddec38d868a38d42a2db62b6d060fb09,2025-06-10T09:15:24.543000 CVE-2025-3906,0,0,7df8181df29dfc516be3edbe2d2bfb26ce2c1c65dc37aa85eebac37ffd9820bc,2025-04-29T13:52:10.697000 CVE-2025-3907,0,0,a80de78c9c3d1ebab04e1ed8752735e7a3019c19f3ec8149f3413ad730abea82,2025-04-29T13:52:47.470000 CVE-2025-3908,0,0,bea5a1819efe78ab71d639f11ed9041d68358c7880c06e0924fcdfb544a65197,2025-05-21T20:25:33.823000 @@ -294229,7 +294231,16 @@ CVE-2025-40650,0,0,b06bd04057578be69f52c26cfd738aa4aa83676839010f4d9f35ce7436a21 CVE-2025-40651,0,0,1dd3c6768789fd8cb58af27a11d14826bfd53d1b5bf2d2d5309827d197f9e05c,2025-05-28T15:01:30.720000 CVE-2025-40652,0,0,3ed1e73ca0af4a402b191efa99599865fb897bbf50a3feb00af29861487f2b95,2025-05-28T15:01:30.720000 CVE-2025-40653,0,0,952d6149fd41bb3446d99ef1d9980a07fed39db01b9836f114bc421cd10405d3,2025-05-28T15:01:30.720000 +CVE-2025-40654,1,1,70021833c5d4fccb4cbab7f376b6dbbbb5eeb1659b7238abf2213972c41ec464,2025-06-10T10:15:26.990000 +CVE-2025-40655,1,1,13fc8c330d3ba042b4fb0ff74338f42d57b0e0f02cdf25fc26d82ac7a7f3d5c3,2025-06-10T10:15:27.620000 +CVE-2025-40656,1,1,445d56d9e8b8681815d2b427356cf93650e73d35491684b06c257d23b1914704,2025-06-10T10:15:27.843000 +CVE-2025-40657,1,1,1fdd7fa0fa4630dcad1d0ec16e781e4cf9a241d066312193320c856179404876,2025-06-10T10:15:28.043000 +CVE-2025-40658,1,1,9e0dd0bf5f4d48d3430e2ac214ac9f11499f92444af36de6b77d763cbd260454,2025-06-10T10:15:28.237000 +CVE-2025-40659,1,1,5ab65d9a1e9e8fe6f49a660ca7b98dbb76f21ef7918c07bd366a37006d8c05b2,2025-06-10T10:15:28.430000 CVE-2025-4066,0,0,6b866ef67faa41ec2689ec4b83aa9ca62c69a8051911732f639e5179e5df1a9e,2025-05-12T19:35:25.097000 +CVE-2025-40660,1,1,29911c79c9521fcfb5c5e7a057e47c4234cb1dee864fe0c64a3a17305c4c417a,2025-06-10T10:15:28.627000 +CVE-2025-40661,1,1,0f28040d1797055ea2a2b8beac85a17e088e312b347c25778f9cefcc8d55c4cf,2025-06-10T10:15:28.827000 +CVE-2025-40662,1,1,2d08d93cd316b56d55652ae4d161fcc5bf4f67c333a3b98aa7ec6815f72b2464,2025-06-10T10:15:29.103000 CVE-2025-40663,0,0,4aa8c64bc18f7e33ebb6be208f9cd3156bb0660dc9a760545e0a74283cf88190,2025-05-28T15:01:30.720000 CVE-2025-40664,0,0,e366ae4d0edc3020bccb4958e82dfc623d961bfd022fb180a3be2259f2bb55f6,2025-05-28T15:01:30.720000 CVE-2025-40665,0,0,80c9d614a0e728f77e8ffb6c772411e08f1a3422b53c0225c9a2a3eda1f363a3,2025-05-28T15:01:30.720000 @@ -294389,6 +294400,7 @@ CVE-2025-41652,0,0,61b56e820debad0d6ed87e53925b75193550ab4911ec76df587d7530bd8f7 CVE-2025-41653,0,0,450cb90166822151ca98533cba100a0f07716a6f9e2e385d8b8766038d4b0cb2,2025-05-28T15:01:30.720000 CVE-2025-41654,0,0,c22856a515f49ccd204a32143b656fc257abf14e343863bdec0d026ca010bcd0,2025-05-28T15:01:30.720000 CVE-2025-41655,0,0,d4e55c0bf8ee1b4fb7f9a5a70eabfb748935a97fe6cc917be3646a99349642c3,2025-05-28T15:01:30.720000 +CVE-2025-41657,1,1,fe785a8a271a8bfed9a8574477bebed4f54bcc892e6c96de3103c865106136b3,2025-06-10T11:15:53.150000 CVE-2025-4166,0,0,5bfebbee34c2356ee039434bb4ac7a8705ff7fab6fe8d313f7df39c4661cee90,2025-05-05T20:54:45.973000 CVE-2025-4168,0,0,a6468df4f7a2597ad76d3cb7aeb08566a4877cfddb2b3e40039e98441ddbce5f,2025-05-05T20:54:19.760000 CVE-2025-4169,0,0,bfc728158ddf7f1a565291bbe3bc05c4816fdb9cc64adedded01a1b86d632adf,2025-05-16T14:42:18.700000 @@ -295451,7 +295463,7 @@ CVE-2025-46782,0,0,190c817e4f3c09faf97df326ed9cdbea1555cc1850d161b9d9da454d08c1d CVE-2025-46785,0,0,37929d48b75dcb8104d52e2202c99878d7f4f635a8670bbd0e6f5af54cd711d3,2025-05-16T14:43:56.797000 CVE-2025-46786,0,0,65c9b4d28548a814ac9da85c56a6b20b3ea8dfdc3f7521c8b14e0368cd0ae6bc,2025-05-16T14:43:56.797000 CVE-2025-4679,0,0,bd384669d27df6a466ec06c3f367687ccacf0536beef14e450b7ad3bf52b421e,2025-05-30T16:59:38.433000 -CVE-2025-4680,1,1,04917fb52ac97f3671fa5a524c2313e959c1a69b6f3077d1b477790fd3bd9981,2025-06-10T09:15:24.753000 +CVE-2025-4680,0,0,04917fb52ac97f3671fa5a524c2313e959c1a69b6f3077d1b477790fd3bd9981,2025-06-10T09:15:24.753000 CVE-2025-46801,0,0,11def8e560cfea337e905c8ff57c25c4d9f1a43db749a66daaa006ba67ef4e63,2025-05-19T13:35:20.460000 CVE-2025-46802,0,0,e0845e0a2badfb8351bf85ec4dfd1c99c7e29caf4bb332a81fa1375afc25e8ec,2025-05-28T15:01:30.720000 CVE-2025-46803,0,0,0a5de4a7042abfff99e6c11ab58d1e1483a67b11f4bef7e11f8857a336030c12,2025-05-28T15:01:30.720000 @@ -295459,7 +295471,7 @@ CVE-2025-46804,0,0,33150bb68c13eed9accf4cb312a19408b88b9f75691eb7f11163f9cad134f CVE-2025-46805,0,0,b1097088aa0dbd2e4b45c8b3983be6a33e94edc138942af1ff1720f9da99ad58,2025-05-28T15:01:30.720000 CVE-2025-46806,0,0,a0ddbfd719345d086b34b9d7a2c69bfbfaed6eb3a3eaf75605585e97e87f5fcb,2025-06-02T17:32:17.397000 CVE-2025-46807,0,0,363492342a9bdfb1d61e6eaa455191488139e20c169340caf4edce4ef34cbca1,2025-06-02T17:32:17.397000 -CVE-2025-4681,1,1,04674e91ef20651e4d9621e9887af179c3465e7bc41acc2bb6c583b7d0e803f2,2025-06-10T09:15:24.933000 +CVE-2025-4681,0,0,04674e91ef20651e4d9621e9887af179c3465e7bc41acc2bb6c583b7d0e803f2,2025-06-10T09:15:24.933000 CVE-2025-46812,0,0,efbba45e18cc8937b9f87a0e29f466265a1e1be9d804a38357596ef0f2987dda,2025-05-12T17:32:52.810000 CVE-2025-46813,0,0,01deee0db3f748e6f8e958a47d5a96825a2f5d578da6e58d6d8c34dd9ef7b2a5,2025-05-05T20:54:19.760000 CVE-2025-46814,0,0,a39c61eb85c9c40f8b1a1b3b957ff5b21067cc488cde122058f10a18468e916d,2025-05-07T14:13:20.483000 @@ -297118,10 +297130,10 @@ CVE-2025-5736,0,0,3a3445c9dd8bccb0eab19420a8c3ff563d54017819fff7f9ce75aaae518015 CVE-2025-5737,0,0,08daa88b0f47d96d464bb5d9df986f1f88b3c61d0636f7d9794766640f13fa32,2025-06-06T14:07:28.330000 CVE-2025-5738,0,0,40160f872c6c36d854905fad1108d58a096f60c1e64b8c34f437851763611290,2025-06-06T14:07:28.330000 CVE-2025-5739,0,0,a0de668636e833e77f2e9d40411491def3e08bcb75e4e696079fb6b5aab62971,2025-06-06T14:07:28.330000 -CVE-2025-5740,1,1,29d7029db250bcbd5771abc037ffd871f9c30fcd9c5af585652c08b614e9861b,2025-06-10T09:15:25.093000 -CVE-2025-5741,1,1,e07e920074146946e112ca297f361b1e60b188a1abdd71ff1dbdf456dc8bac37,2025-06-10T09:15:25.290000 -CVE-2025-5742,1,1,a5e49209b2c51ae2aa02947ec521d1e977dd6fe9e1ebc7b2481ad20c87625792,2025-06-10T09:15:25.493000 -CVE-2025-5743,1,1,0f5a7db666c277c41c19f4c1f8e4208c2e9cbb2dca988861fee4bde592648776,2025-06-10T09:15:25.703000 +CVE-2025-5740,0,0,29d7029db250bcbd5771abc037ffd871f9c30fcd9c5af585652c08b614e9861b,2025-06-10T09:15:25.093000 +CVE-2025-5741,0,0,e07e920074146946e112ca297f361b1e60b188a1abdd71ff1dbdf456dc8bac37,2025-06-10T09:15:25.290000 +CVE-2025-5742,0,0,a5e49209b2c51ae2aa02947ec521d1e977dd6fe9e1ebc7b2481ad20c87625792,2025-06-10T09:15:25.493000 +CVE-2025-5743,0,0,0f5a7db666c277c41c19f4c1f8e4208c2e9cbb2dca988861fee4bde592648776,2025-06-10T09:15:25.703000 CVE-2025-5745,0,0,3580be19c456f8a1a42e4194fda4fe5138a1c28c64f6ee9c28042cef6c57327d,2025-06-06T14:07:28.330000 CVE-2025-5747,0,0,bd30b9109ec2b512691e79e8454cb527e5b877dfc8564ef4c3e4be6a95e872d8,2025-06-09T12:15:47.880000 CVE-2025-5748,0,0,b761ade174b0cc8fcfa37b7bf22c809e0fbc46ef538ca5441f6bcf38746a2c13,2025-06-09T12:15:47.880000 @@ -297240,5 +297252,5 @@ CVE-2025-5918,0,0,5fae4533f01b7c4f6585a87e7b2331625bf70aa585af023c3c09519081c4b2 CVE-2025-5925,0,0,573daaf55ea018a58bf2bd7e92cad13cf577779f7064f5ad7d1f8de96931b737,2025-06-10T04:15:54.330000 CVE-2025-5934,0,0,1ba42daaa63d058bbd118ea21d90f49dd5a949e0cf3049fe0f8f381cc6ec4483,2025-06-10T04:15:55.327000 CVE-2025-5935,0,0,bca6b82aff793b09175597d3d76faef10a884937cddad66c78fab2ba223eb2cd,2025-06-10T05:15:22.780000 -CVE-2025-5945,1,1,c7e4d5fd43d260b09c3d268ba39649757ca6834ec123b67f85c953ef50c7c56d,2025-06-10T09:15:25.930000 +CVE-2025-5945,0,0,c7e4d5fd43d260b09c3d268ba39649757ca6834ec123b67f85c953ef50c7c56d,2025-06-10T09:15:25.930000 CVE-2025-5952,0,0,f3a4e649f505b0fd93baf65191971ffe21485a7c802124ab53f303aeb8bcf467,2025-06-10T05:15:23.023000