From 4d8fff9b555b03572752c9b02d58507f1136a46a Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 25 Jun 2025 04:04:12 +0000 Subject: [PATCH] Auto-Update: 2025-06-25T04:00:32.435730+00:00 --- CVE-2025/CVE-2025-09xx/CVE-2025-0966.json | 56 +++++++++++++++++++ CVE-2025/CVE-2025-360xx/CVE-2025-36004.json | 56 +++++++++++++++++++ CVE-2025/CVE-2025-487xx/CVE-2025-48798.json | 34 +----------- CVE-2025/CVE-2025-55xx/CVE-2025-5585.json | 60 +++++++++++++++++++++ README.md | 22 ++++---- _state.csv | 19 ++++--- 6 files changed, 193 insertions(+), 54 deletions(-) create mode 100644 CVE-2025/CVE-2025-09xx/CVE-2025-0966.json create mode 100644 CVE-2025/CVE-2025-360xx/CVE-2025-36004.json create mode 100644 CVE-2025/CVE-2025-55xx/CVE-2025-5585.json diff --git a/CVE-2025/CVE-2025-09xx/CVE-2025-0966.json b/CVE-2025/CVE-2025-09xx/CVE-2025-0966.json new file mode 100644 index 00000000000..8dae4db8bab --- /dev/null +++ b/CVE-2025/CVE-2025-09xx/CVE-2025-0966.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-0966", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-06-25T03:15:26.580", + "lastModified": "2025-06-25T03:15:26.580", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM InfoSphere Information Server 11.7 vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify, or delete information in the back-end database." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7236613", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-360xx/CVE-2025-36004.json b/CVE-2025/CVE-2025-360xx/CVE-2025-36004.json new file mode 100644 index 00000000000..5d2a9d66585 --- /dev/null +++ b/CVE-2025/CVE-2025-360xx/CVE-2025-36004.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-36004", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-06-25T03:15:27.687", + "lastModified": "2025-06-25T03:15:27.687", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM i 7.2, 7.3, 7.4, and 7.5 could allow a user to gain elevated privileges due to an unqualified library call in IBM Facsimile Support for i. A malicious actor could cause user-controlled code to run with administrator privilege." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7237732", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-487xx/CVE-2025-48798.json b/CVE-2025/CVE-2025-487xx/CVE-2025-48798.json index 7a3d6a084ab..0503ceeb5b2 100644 --- a/CVE-2025/CVE-2025-487xx/CVE-2025-48798.json +++ b/CVE-2025/CVE-2025-487xx/CVE-2025-48798.json @@ -2,7 +2,7 @@ "id": "CVE-2025-48798", "sourceIdentifier": "secalert@redhat.com", "published": "2025-05-27T14:15:24.307", - "lastModified": "2025-06-25T01:15:23.220", + "lastModified": "2025-06-17T10:15:23.967", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -60,38 +60,6 @@ "url": "https://access.redhat.com/errata/RHSA-2025:9165", "source": "secalert@redhat.com" }, - { - "url": "https://access.redhat.com/errata/RHSA-2025:9308", - "source": "secalert@redhat.com" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2025:9309", - "source": "secalert@redhat.com" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2025:9310", - "source": "secalert@redhat.com" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2025:9314", - "source": "secalert@redhat.com" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2025:9315", - "source": "secalert@redhat.com" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2025:9316", - "source": "secalert@redhat.com" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2025:9501", - "source": "secalert@redhat.com" - }, - { - "url": "https://access.redhat.com/errata/RHSA-2025:9569", - "source": "secalert@redhat.com" - }, { "url": "https://access.redhat.com/security/cve/CVE-2025-48798", "source": "secalert@redhat.com" diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5585.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5585.json new file mode 100644 index 00000000000..5ffc4bdc750 --- /dev/null +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5585.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-5585", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-06-25T03:15:27.853", + "lastModified": "2025-06-25T03:15:27.853", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The SiteOrigin Widgets Bundle plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `data-url` DOM Element Attribute in all versions up to, and including, 1.68.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.svn.wordpress.org/so-widgets-bundle/tags/1.68.4/js/slider/jquery.slider.js", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bb1b93ee-8641-4ddb-8b6b-2e9d30fe338d?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index d1cf555b88f..2259086c155 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-25T02:00:19.678710+00:00 +2025-06-25T04:00:32.435730+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-06-25T01:15:23.220000+00:00 +2025-06-25T03:15:27.853000+00:00 ``` ### Last Data Feed Release @@ -33,27 +33,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -299259 +299262 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `3` -- [CVE-2025-6582](CVE-2025/CVE-2025-65xx/CVE-2025-6582.json) (`2025-06-25T00:15:21.573`) -- [CVE-2025-6583](CVE-2025/CVE-2025-65xx/CVE-2025-6583.json) (`2025-06-25T00:15:22.763`) +- [CVE-2025-0966](CVE-2025/CVE-2025-09xx/CVE-2025-0966.json) (`2025-06-25T03:15:26.580`) +- [CVE-2025-36004](CVE-2025/CVE-2025-360xx/CVE-2025-36004.json) (`2025-06-25T03:15:27.687`) +- [CVE-2025-5585](CVE-2025/CVE-2025-55xx/CVE-2025-5585.json) (`2025-06-25T03:15:27.853`) ### CVEs modified in the last Commit -Recently modified CVEs: `6` +Recently modified CVEs: `1` -- [CVE-2023-5379](CVE-2023/CVE-2023-53xx/CVE-2023-5379.json) (`2025-06-25T01:15:22.283`) -- [CVE-2024-1233](CVE-2024/CVE-2024-12xx/CVE-2024-1233.json) (`2025-06-25T01:15:22.493`) -- [CVE-2024-1249](CVE-2024/CVE-2024-12xx/CVE-2024-1249.json) (`2025-06-25T01:15:22.707`) -- [CVE-2024-1635](CVE-2024/CVE-2024-16xx/CVE-2024-1635.json) (`2025-06-25T01:15:22.900`) -- [CVE-2025-48797](CVE-2025/CVE-2025-487xx/CVE-2025-48797.json) (`2025-06-25T01:15:23.097`) -- [CVE-2025-48798](CVE-2025/CVE-2025-487xx/CVE-2025-48798.json) (`2025-06-25T01:15:23.220`) +- [CVE-2025-48798](CVE-2025/CVE-2025-487xx/CVE-2025-48798.json) (`2025-06-17T10:15:23.967`) ## Download and Usage diff --git a/_state.csv b/_state.csv index f8ae386b5cd..c788d646c7c 100644 --- a/_state.csv +++ b/_state.csv @@ -242690,7 +242690,7 @@ CVE-2023-5375,0,0,00b09fc77d81d6cbc9af2263843a9dfc650ac53776a22c67a488610f78163a CVE-2023-5376,0,0,4171235605b303add154e5f4b59e7c91e8cf517c25489b7b75515fc4ab2a9b31,2024-11-21T08:41:38.610000 CVE-2023-5377,0,0,9e158a360db0e2f37672c4fefc1ba3e996bfed0ca3a54fcf1f29c5e3efa6251a,2024-11-21T08:41:38.790000 CVE-2023-5378,0,0,538e7db12a7a1fc1ced4b1a166ec3555e97e964a669e8e9aef780106211c2093,2024-11-21T08:41:38.930000 -CVE-2023-5379,0,1,f2a4c8600c5266833683416dbf2d9d89247d6bf74a456566bebf759343353111,2025-06-25T01:15:22.283000 +CVE-2023-5379,0,0,f2a4c8600c5266833683416dbf2d9d89247d6bf74a456566bebf759343353111,2025-06-25T01:15:22.283000 CVE-2023-5380,0,0,8f5e0ed6036c80d3ae47b26a94a84281ea889f2ea7c1cb72aa54e1a3537f0eef,2024-11-21T08:41:39.227000 CVE-2023-5381,0,0,f6bc6db40672cf8e8b0eecc59cb13deaa7ff8e55851dd1d78b5ccd3e16f7403c,2024-11-21T08:41:39.387000 CVE-2023-5382,0,0,eb6bfbb63167d2f999b89c3dc9426c7074a951cc86ec7ed2ffdcbebb248cb639,2024-11-21T08:41:39.513000 @@ -247783,7 +247783,7 @@ CVE-2024-12326,0,0,6214bd8c3b6441929fb143e430a818a70c0eda117c1da1c1d4092fdb062e9 CVE-2024-12327,0,0,e8e81366bd93f2cbafbb479a06376db44215f2cd9c6251c0ebac4883f30daea1,2025-01-07T05:15:18.470000 CVE-2024-12328,0,0,34661052bfc4345d9d8ebac2e6c28c5ef38cb920ac58fb144c97623104a72269,2025-01-08T09:15:06.780000 CVE-2024-12329,0,0,71e750a9973a9c0c890f57927fe84490b7903cbe24882faf71ad402678f38f5f,2025-06-05T16:05:14.507000 -CVE-2024-1233,0,1,da32e428abeb4d45f0fc50cfb9ee89b9ac3cd8d251f9cc81472f321799757c48,2025-06-25T01:15:22.493000 +CVE-2024-1233,0,0,da32e428abeb4d45f0fc50cfb9ee89b9ac3cd8d251f9cc81472f321799757c48,2025-06-25T01:15:22.493000 CVE-2024-12330,0,0,dd38f32a8fe1201123bcdc5b82b5d883712c2acc7974b9580df0e29bb65620cf,2025-01-09T11:15:13.090000 CVE-2024-12331,0,0,6c6e9b90da53ab4f2635b2c568c68cfa4d017be1088f155d7e21d426ea9a2f4e,2025-03-05T19:16:29.907000 CVE-2024-12332,0,0,f0bf328e81e8dc6e6391061dc5bf4110c5e0a30cef25e410954b9a99df4dbf02,2025-01-07T05:15:18.687000 @@ -247950,7 +247950,7 @@ CVE-2024-12486,0,0,f221fe06047263b8f4576777d32c700bb8e394bc7cf4c88fb5aed64571bf3 CVE-2024-12487,0,0,dac76ee4b5b6dda43c8a5b25b978c597cbc5bba5f166e4fb0647c5ebb3b008d6,2024-12-12T17:36:03.097000 CVE-2024-12488,0,0,b0f91cfe64e50a95b276c79be22960486f35dadd24e50f2888c194ae5fb489e6,2024-12-12T17:37:05.537000 CVE-2024-12489,0,0,cbaa61dbaaf5450cc4fa4503ae760ba1505725775c654cf5aafb79e23c5892fa,2024-12-12T17:38:15.650000 -CVE-2024-1249,0,1,1952076daf13b3a403d276704557038b01f1c9f112de36c403fc86b87ed933f3,2025-06-25T01:15:22.707000 +CVE-2024-1249,0,0,1952076daf13b3a403d276704557038b01f1c9f112de36c403fc86b87ed933f3,2025-06-25T01:15:22.707000 CVE-2024-12490,0,0,b39fa2be0c4d2229089d571f0a98b21f5ea47c9bb140688e82a03b90ee7fd7c9,2025-04-07T15:16:41.913000 CVE-2024-12491,0,0,d9590e8254ca45b54a5272db38ba7d701c7bc7244fa53f0252652da7575fb348,2025-01-09T11:15:13.520000 CVE-2024-12492,0,0,2b51212ffb72d28387758820ff9bf713490d9e830e5ddea54c6f4af6372d81a6,2024-12-13T17:12:51.283000 @@ -249691,7 +249691,7 @@ CVE-2024-1631,0,0,e9e6578f8c2841fcf55accc66d2d8ed4ff49074482673094d89548de7e2bc4 CVE-2024-1632,0,0,2cc9b424d1e45f344508e96412d6a0780302c60e8fef2d13cc2533af910269a7,2024-12-16T21:04:13.760000 CVE-2024-1633,0,0,56d60136a7442b514c5e6b403331b5f9aef17563c47e24eae33412d5bd81684c,2025-01-24T15:21:06.727000 CVE-2024-1634,0,0,45305cb187d566717a04251929f56eb3faac05db3d2b4efc70507b416ff13ab0,2024-11-21T08:50:58.150000 -CVE-2024-1635,0,1,c0448e33a77e2e0104addea0026b7bcf8aef69040751b082bb7b61e44cc7a670,2025-06-25T01:15:22.900000 +CVE-2024-1635,0,0,c0448e33a77e2e0104addea0026b7bcf8aef69040751b082bb7b61e44cc7a670,2025-06-25T01:15:22.900000 CVE-2024-1636,0,0,39caa7ca41ae1683c62ffcaad59925dff9e09968a84b20eec7448789c4ba6505,2024-12-16T21:05:49.493000 CVE-2024-1637,0,0,b7437c704fbfb1b3fca1af15d0ef06f6ecbdc8f18471c8100476373d9e2e55cd,2024-11-21T08:50:58.600000 CVE-2024-1638,0,0,3645fc3fd5a53c71cfa58f98ad075d1348bbc5dcf758960e5203009589cfd13a,2025-01-17T16:26:03.767000 @@ -283509,6 +283509,7 @@ CVE-2025-0958,0,0,8e934c42a8ae7048365dcc09aa09f32a5218f596be70202f3292fa3b9e1add CVE-2025-0959,0,0,2ef0e74d37106a9147ba132a96f3962a471250250ebc475b9bdb4c0c141acc13,2025-03-13T14:59:44.297000 CVE-2025-0960,0,0,499907aaf0daa1209acd23a8382909ccee8a784758e88e7f103cadb30772d3d2,2025-02-04T20:15:50.103000 CVE-2025-0961,0,0,346daf6e4766249f748146548eba00ad58cef7728e5a80d5d79af93be768a67d,2025-05-28T17:17:22.983000 +CVE-2025-0966,1,1,d87ca3e7a274acde1b865c5c0919cc28cf819680ee7ef4441fa2900e9b6ce630,2025-06-25T03:15:26.580000 CVE-2025-0967,0,0,d8c64e0386338d50f41e26d5ea4b324d68ccfa9e57d63544f495e90b3a5b315a,2025-02-25T19:05:40.627000 CVE-2025-0968,0,0,a4e9e6689859f7c2eea936619747aa6ea0cae6f7cc09990c02ad9c83b9675838,2025-02-25T20:21:17.287000 CVE-2025-0970,0,0,dbb9a878c26220e6c6fcf04d86cb830c57c2ed2708896797c1f2c042f5dde1ff,2025-02-02T23:15:19.027000 @@ -293891,6 +293892,7 @@ CVE-2025-3599,0,0,50511407f557708506d42c82ca157e4b27ffcaf91e7ac0f0029a3b3d58f00d CVE-2025-35995,0,0,a590f4d82a5b6a6ddf49e3e9ff3fcb9f7ad4db6e56f789349ace8583f960ea2e,2025-05-08T14:39:09.683000 CVE-2025-35996,0,0,a68f8bf3039aca0fabffa5365ae47dde1016d171f7f66e0132baceb8c4b864b9,2025-05-02T13:52:51.693000 CVE-2025-3600,0,0,39687de6700cb24ab4e4b1a2e787339a193916dd4e6bd5edd6e893f0c5922e67,2025-05-16T14:43:56.797000 +CVE-2025-36004,1,1,9607d479475c4db7f6c6570a9fe36d71d16713a1fc60b5c59ba5c3e48b0a3bb4,2025-06-25T03:15:27.687000 CVE-2025-36016,0,0,af37919821fdd574b942ee9d20d1ecfb430b58097892e9a643523ecf7010f2dd,2025-06-23T20:16:21.633000 CVE-2025-3602,0,0,9dae34871a5aa21ddbebfa01b8417ba4c26394066febdada550c394e6505596c,2025-06-17T20:50:23.507000 CVE-2025-3603,0,0,8fc219493265409dea0354ed582a157fa1e4783601045e446f4ea74d7c8f20d5,2025-04-29T13:52:47.470000 @@ -297481,8 +297483,8 @@ CVE-2025-48792,0,0,2c0b02c33ee81c6b1c7f3bc9767aecae1b833af65e4351c0dd81998c4a119 CVE-2025-48793,0,0,c894ec9ed8b3b5d1fda9891ce2808a0fb7689dd63eec3c7bb7e9e649736a365c,2025-05-27T04:15:41.090000 CVE-2025-48794,0,0,0f60a10fd5bbac90e9e184a916afa3ee1c6a6178325620c93725d026aac184ad,2025-05-27T04:15:41.160000 CVE-2025-48796,0,0,5c467d1a2669d77ceb69e55cea05d09cde2aaa034119240321683e5490565638,2025-05-28T15:01:30.720000 -CVE-2025-48797,0,1,0f610e462fa71aef647f917d9ca4275a49e1477214074f960a230a5c09486644,2025-06-25T01:15:23.097000 -CVE-2025-48798,0,1,cac8dce99c388d73bf7ccb75438676e428ef366daee3945f14aef371aef27da6,2025-06-25T01:15:23.220000 +CVE-2025-48797,0,0,0f610e462fa71aef647f917d9ca4275a49e1477214074f960a230a5c09486644,2025-06-25T01:15:23.097000 +CVE-2025-48798,0,1,ff65f5121c0e0cda96784e173e6217bb4bf6c6642cebd0c35f064bd9a2b602ed,2025-06-17T10:15:23.967000 CVE-2025-4880,0,0,e66433f376d95dc941d17745f27a53d60427f87111077aee793bacaa1dd21351,2025-05-21T17:33:42.373000 CVE-2025-4881,0,0,3fdda22eaf1afa96c9c6bfb121fd7cc7da116831a6f494c0b7df343d1eed58c4,2025-05-21T19:38:39.660000 CVE-2025-4882,0,0,9ae533a1d17c0bc7b22051d58510b828885d48326cbc794d7bf23ceba43e10c0,2025-05-21T19:38:24.990000 @@ -298604,6 +298606,7 @@ CVE-2025-5581,0,0,c54747d4f47de2d53a0450ac3d2803f6b1ce7f3a8f3dd0d32c7ea29ca0ea8b CVE-2025-5582,0,0,d2f1baa22f55fc38a8f865d0e99938121f7ce9bfb4e6584060e61c164943f9d6,2025-06-04T17:44:37.780000 CVE-2025-5583,0,0,b2ce656eeaab700a8a0873a3d565fbebe88a85c216d85c69e76524b9646991ad,2025-06-04T17:44:26.393000 CVE-2025-5584,0,0,554122312ccf631b36ad0ef789707a593ded0bc038e2cac6c090436b66fd53f2,2025-06-10T15:10:06.207000 +CVE-2025-5585,1,1,a4b85e7f335ebebadeca6227d4a2158131bdc84c9a2d7b4b046eba3dd8869dc4,2025-06-25T03:15:27.853000 CVE-2025-5586,0,0,b91049de82efb55ef679cf10931aa4f56290c24a8f2fbf45be0281fcede07341,2025-06-06T14:07:28.330000 CVE-2025-5589,0,0,6c79a04993e971b42452f3a0ae16618b76eb63bb362b0f3291c861226ed4734d,2025-06-16T12:32:18.840000 CVE-2025-5592,0,0,36c388f33c323490a93ebd79d5f124d5f4fdc10d946cc1144d6e587fb6694158,2025-06-09T15:02:45.030000 @@ -299256,5 +299259,5 @@ CVE-2025-6578,0,0,af2637c61ea16d05cecb01cac485eded383d41ec954985f1f245d4df176aee CVE-2025-6579,0,0,fcfc4d99bfb161b15743945c897440f1876e453b66f81d9d6e2cf977514af419,2025-06-24T20:15:27.630000 CVE-2025-6580,0,0,313407b4cee1635580ede523b24ed2b3dcbbc329fd4419df576cddce24dcb01a,2025-06-24T22:15:22.620000 CVE-2025-6581,0,0,75623302546846f37527192251955bf6abcfbc1a9ea07c9cd358376605100cb3,2025-06-24T23:15:21.087000 -CVE-2025-6582,1,1,07de1b4aeb0f61802c9e0cc74625b01ba79e53908e01fff010b8340554ca8af3,2025-06-25T00:15:21.573000 -CVE-2025-6583,1,1,977de4c8030c0fb1eb7d105ab776e053eb3c692f9cd94c3095f7ae1f288cef79,2025-06-25T00:15:22.763000 +CVE-2025-6582,0,0,07de1b4aeb0f61802c9e0cc74625b01ba79e53908e01fff010b8340554ca8af3,2025-06-25T00:15:21.573000 +CVE-2025-6583,0,0,977de4c8030c0fb1eb7d105ab776e053eb3c692f9cd94c3095f7ae1f288cef79,2025-06-25T00:15:22.763000